Professional Documents
Culture Documents
CSD 68
0|Page
1 Contents
What is SDLC?........................................................................................................................................................ 5
SDLC phases:......................................................................................................................................................... 6
Requirement planning or feasibility.................................................................................................................. 6
Requirement analysis or defining...................................................................................................................... 7
What is Requirement?................................................................................................................................... 8
Activities for Requirement Analysis...............................................................................................................8
Designing phase................................................................................................................................................ 9
Roles & Responsibilities of designing phase:.................................................................................................9
Development Phase.......................................................................................................................................... 9
Roles & Responsibilities...............................................................................................................................10
Testing Phase................................................................................................................................................... 10
Implementing/Deployment and maintain.......................................................................................................10
Implementing.............................................................................................................................................. 10
Maintaining................................................................................................................................................. 11
SDLC Models........................................................................................................................................................ 11
Iterative model................................................................................................................................................ 12
Agile model.................................................................................................................................................. 13
Spiral Model................................................................................................................................................ 15
Sequential models........................................................................................................................................... 17
Waterfall Model.......................................................................................................................................... 17
V-Model....................................................................................................................................................... 19
Spiral model........................................................................................................................................................ 22
Risk handling of the spiral model.................................................................................................................... 23
Why is the spiral format called meta mode?...................................................................................................24
Advantages of Spiral........................................................................................................................................ 24
Disadvantages of Spiral................................................................................................................................... 24
Why we cannot use waterfall model for large software development process?................................................25
What is feasibility study?.....................................................................................................................................25
Feasibility Study Process:................................................................................................................................ 26
Need of Feasibility Study:............................................................................................................................ 27
Requirement analysis or defining........................................................................................................................27
What is Requirement?..................................................................................................................................... 28
1|Page
Activities for Requirement Analysis.................................................................................................................28
Requirement gathering techniques.................................................................................................................29
Interviews.................................................................................................................................................... 29
Group Interviews......................................................................................................................................... 29
Question Papers / Surveys:..........................................................................................................................29
Combined Application Plans / JAD...............................................................................................................30
feasibility criteria and constraints....................................................................................................................... 31
Executive Summary............................................................................................................................................. 32
Feasibility Study Types.................................................................................................................................... 33
Technical Feasibility..................................................................................................................................... 33
Time feasibility............................................................................................................................................ 34
Legal Feasibility........................................................................................................................................... 34
Operational Feasibility.................................................................................................................................34
Financial Feasibility..................................................................................................................................... 35
Project Overview................................................................................................................................................. 36
Background Information..................................................................................................................................... 36
Feasibility Type: A................................................................................................................................................ 37
Feasibility Study Solutions problems & solutions............................................................................................37
Assessments.................................................................................................................................................... 37
Feasibility Type: B................................................................................................................................................ 37
Feasibility Study Solutions problems & solutions............................................................................................37
Assessments.................................................................................................................................................... 37
Conclusion........................................................................................................................................................... 38
Features........................................................................................................................................................... 39
Requirements.................................................................................................................................................. 39
References........................................................................................................................................................... 39
Appendix............................................................................................................................................................. 40
2. Your name *................................................................................................................................................ 40
3. your profession in hospital *....................................................................................................................... 40
4. Gender......................................................................................................................................................... 40
5. Do you have Basic Computer Knowledge ? *.............................................................................................. 40
6. what is the details you ask from the patients *...........................................................................................41
7. how you note down the details ? *............................................................................................................. 41
8. how you find the details if you need it again ? *.........................................................................................41
2|Page
9. how you divide the data *........................................................................................................................... 42
10. how do you keep diet plans for patients*................................................................................................42
11. how do you keep Recipes for patients *...................................................................................................42
12. how do you update your file system *......................................................................................................43
13. how do you set remainder for important works? *..................................................................................43
Software Requirements Specification................................................................................................................. 44
Introduction.......................................................................................................................................................... 0
Purpose............................................................................................................................................................. 0
Document Conventions..................................................................................................................................... 0
Intended Audience and Reading Suggestions....................................................................................................0
Product Scope................................................................................................................................................... 0
References......................................................................................................................................................... 0
Overall Description................................................................................................................................................ 1
Product Perspective.......................................................................................................................................... 1
Product Functions............................................................................................................................................. 1
User Classes and Characteristics....................................................................................................................... 1
Operating Environment..................................................................................................................................... 2
Design and Implementation Constraints........................................................................................................... 2
User Documentation......................................................................................................................................... 2
Assumptions and Dependencies........................................................................................................................2
External Interface Requirements...........................................................................................................................3
User Interfaces.................................................................................................................................................. 3
Hardware Interfaces.......................................................................................................................................... 5
Software Interfaces........................................................................................................................................... 6
Communications Interfaces...............................................................................................................................6
System Features.................................................................................................................................................... 6
Dataflow Diagram.............................................................................................................................................. 6
Activity diagram............................................................................................................................................... 10
Use Case Diagram............................................................................................................................................ 11
Sequence diagram........................................................................................................................................... 11
Other Nonfunctional Requirements.................................................................................................................... 12
1.1 Performance Requirements..................................................................................................................12
1.2 Safety Requirements.............................................................................................................................12
1.3 Security Requirements..........................................................................................................................12
3|Page
1.4 Software Quality Attributes.................................................................................................................. 12
1.5 Business Rules....................................................................................................................................... 12
Software development process...........................................................................................................................13
Software development models....................................................................................................................... 13
Procedure........................................................................................................................................................ 14
Data manipulation........................................................................................................................................... 14
Data-driven paradigm......................................................................................................................................14
Object-orientation paradigm...........................................................................................................................15
Data based operating model........................................................................................................................... 15
The complexity of data processing.................................................................................................................. 15
Data based operating model........................................................................................................................... 16
Consumer intelligence................................................................................................................................. 16
Determination............................................................................................................................................. 16
Distribution.................................................................................................................................................. 16
Business intelligence................................................................................................................................... 16
Data conversion........................................................................................................................................... 16
The importance of a data-based plan..................................................................................................................17
Limited state machinery...................................................................................................................................... 18
Limited State Machine vs. Unclear State Machine..........................................................................................18
Comparison of FSM and EFSM.........................................................................................................................19
References........................................................................................................................................................... 20
4|Page
Part-01.1
2 What is SDLC?
SDLC- it aims to produce high quality system that meets or exceeds customer expectations, works efficiently in
the current and planned information technology infrastructure, and is inexpensive to maintain and cost
effective to enhance.
when making the software, it must fulfill these areas, maximum client satisfaction, robust and high accuracy,
easy to use and user-friendly, can anytime update. all of these things can make if we have a structure that can
be make software as the client requested. To do this, the SDLC process gives us hand.
the SDLC is the flow of the steps of making and developing software.
ISO/IEC 12207 is an international standard for software life-cycle processes. It aims to be the standard that
defines all the tasks required for developing and maintaining software. SDLC is a process that is being followed
to a software project in a software development company. It consists of a detailed plan that describes,
maintain, restoration, and modifying specific software. The living cycle defines the quality and the overall
development process.
3 SDLC phases:
The process fallows to develop the software is SDLC. each phase of SDLC produces deliverable required by the
next to phase of the lifecycle. Requirements are translated in to design. Code is produced according to the
design. Testing should be done on develop to product based on requirement. Deployment should be done
once the test invest completed.
1. Requirement planning/ feasibility
2. Requirement analysis or defining
3. Designing
4. Development/building or coding
5. Testing
6. Implementing/Deployment and maintain
5|Page
3.1 Requirement planning or feasibility
The first step is to find out if the project offered by a client is affordable to their organization. A feasibility
study should be done and the profit of the company from the development of the software and its future
benefits should be examined. Feasibility study is carried out based on many purposes to analyze whether
software product will be right in terms of development, implantation, contribution of project to the
organization etc. In feasibility studies, there are several types of feasibility studies. It mainly focuses on five
areas.
This economic feasibility study is the most important part of the feasibility analysis and the legal feasibility
study is not considered the feasibility analysis.
Requirement Analysis, additionally called demand Engineering, that is the method of process user
expectations for a brand-new package being designed or changed. In software engineering, it's generally
remarked loosely by names like necessities gathering or necessities capturing. Requirement’s analysis
encompasses those tasks that come in determinative the wants or conditions to satisfy for a brand new or
6|Page
altered product or project, taking account of the probably conflicting necessities of the assorted stakeholders,
analyzing, documenting, verificatory, and managing package or system necessities.
Here are the objectives for performing requirement analysis in the early stage of a software project:
From What to How: Software engineering task is the bridge that between system requirements
engineering and software design.
3 Orthogonal Views: Provides software designer with a model of:
1. system information (static view)
2. function (functional view)
3. behavior (dynamic view)
Software Architecture: Model can be translated to data, architectural, and component-level designs.
Iterative and Incremental Process: Expect to do a little bit of design during analysis and a little bit of
analysis during design. (paradigm, 2020)
3.2.1 What is Requirement?
Requirement Analysis Techniques: Software requirement is the ability of the user to solve a problem or
achieve a goal. A requirement is the software capability that a system or system component must meet or
have in order to fulfill a contract, standard, specification, or other formally imposed documentation. Finally,
what we want to achieve is to develop quality software that meets the needs of our customers on time and on
a budget.
The biggest challenge facing software developers is sharing the look of the end product and its experience
with the customer. There should be a common understanding of what a product should do among all the
stakeholders in a project, developers, end-users, software managers, customer managers, or someone will be
confused when it is delivered. Software confusion is never good news.
3.2.2 Activities for Requirement Analysis
Requirement analysis is critical to the success or failure of a systems or software project. The requirements
should be documented, actionable, measurable, testable, traceable, related to identified business needs or
opportunities, and defined to a level of detail sufficient for system design.
Conceptually, requirements analysis includes four types of activity:
1. Needs Selection: The task of deciding which customers and users identify their needs in consultation
with. This is sometimes referred to as need gathering.
2. Needs Analysis: Determining whether the requirements are published and documented, ambiguous,
incomplete or contradictory and then resolving those issues.
3. Requirement Modeling: Requirement documents
4. Can be configured in a variety of ways. They can be documented in a variety of formats, such as natural
language documents, usage cases, user stories, or process specifications.
5. Review and reconsider: Team members reflect on what happened in the iteration and identify actions
to move forward.
Requirement analysis is a team effort that combines the specialization of hardware, software, and human
factors engineering as well as the skills of dealing with people.
Here are the main activities involve in requirement analysis:
1. Identify customer's needs.
7|Page
2. Evaluate system for feasibility.
3. Perform economic and technical analysis.
4. Allocate functions to system elements.
5. Establish schedule and constraints.
6. Create system definitions.
7. Requirement Analysis Techniques
Needs analysis helps organizations determine the real needs of stakeholders. At the same time, it enables the
development team to communicate with stakeholders in a way that they understand (such as charts,
templates, streaming charts).
Once the requirements have been assembled, we document them in the Software Requirements Specification
(SRS), use the cases, or approve them as user stories. This document is easy for the average user and
developer to understand. (Model, 2020). (paradigm, 2020)
8|Page
6. Developer/Construction Team – Assist in finalizing data conversion strategy; review of the architecture
and software components.
7. Testing Team/Tester – Assist with identifying and finalizing testing strategy; review of the architecture
and software components.
8. Database Team – Assist with architecture design and data conversion strategy.
9|Page
3. Database Administration Group – Assist with integration of the solution design and data conversion
tests.
4. Implementation manager – Assist with analysis of test results.
5. Integration manager – Assist with analysis of test results.
Error Correction - Errors are reported only occasionally. This is because it is difficult to test all the
components to cover the entire system.
Upgrade - Update the app to the latest versions of the software
Improvement - Adding some new features to existing software
The main focus of this SDLC phase is to ensure that the requirements continue to be met and that the system
continues to operate according to the specifications outlined in the first phase.
Successfully delegate software maintenance to the relevant team. The software distribution team provides the
software maintenance team with detailed documentation and training, and this information facilitates the
configuration, administration, and troubleshooting of common problems. (Uconn, 2019)
Roles and Responsibilities:
Software Distribution Team - Prepares all software documentation and manuals for the maintenance
team. Maintenance team technicians will be provided with any training requested by the software
distribution team to learn solution behavior.
10 | P a g e
Software Maintenance Team - Supports the software by reviewing all software documentation until
the terms of the maintenance agreement expire.
4 SDLC Models
Software Development life cycle (SDLC) is a spiritual model used in project management that defines the
stages include in an information system development project, from an initial feasibility study to the
maintenance of the completed application.
There are different software development life cycle models specify and design, which are followed during the
software development phase. These models are also called "Software Development Process Models." Each
process model follows a series of phase unique to its type to ensure success in the step of software
development.
There are two models in the industry uses:
1. Iterative model
2. Sequential model
In this model, we can create a high-level design of the application before actually designing the
software, launching and defining the design solution for the entire product. Later, a skeletal version of
it could be designed and built into another piece of software, and then the design could be expanded
based on what was built.
The relevant software in this model is built and improved step by step by building products. Therefore,
deficiencies in relevant program components can be found from an early stage. This prevents the
shortcomings from flowing down.
Software developers can get reliable user feedback in this format. When presenting software product
outlines and maps for user feedback, the company urges them to think about how the software
product works. Then, if there are any shortcomings, they can be rectified at the same time and move
forward.
In a repeat format, less time is spent documenting and more time is spent planning. It can produce
more quality software.
11 | P a g e
Examining and troubleshoot while the fewer iteration is simple.
Hazards are recognized and fixed through iteration, and every iteration can be simply handled.
In the iteration model, concise time is consumed on record, and extended time is provided for
outlining. (Kumar, 2021)
Disadvantages of the model:
Improved resources may be required as this involves relatively high labor costs.
Although the modification cost of each step is low, it does not always match the modification
specifications to the original specifications.
Additional administrative recognition is required as several teams are involved in the development
work here.
This format is not suitable for short projects.
Extremely skilled resources are required to test the capabilities of program design in this format.
Project development depends largely on the risk assessment stages.
The whole system can be defined by determining the gradual increase.
For which designs the iterative model should be used:
When the requirements of the complete system are clearly defined by the buyers.
When the project is large and complex.
First of all, the main requirements must be defined
Some details about the software may evolve over time.
Examples for iterative models:
1. Agile model
2. Spiral Model
4.1.1 Agile model
This model is especially used in the production of functional software to focus on faster and customer
satisfaction systems. Diligent methods break down the product into smaller and growing varieties. These
buildings are given from repetitions. In each iteration, cross-action groups work in different areas
simultaneously.
The agile is: The diligent model here believes that every project is different and needs to be handled
differently and properly. Existing methods should be tailored to best suit all project needs.
In Agile, tasks are divided into time frames (small time frames) to provide specific features for a single system
partition. A repeat approach is taken for each step and a working software is created after each iteration. Each
building is enhanced according to the features of the system building steps; The final system build includes all
the features the customer needs.
Below are some of those aspects:
planning
Requirement analysis
design
Coding
Unit inspection and
12 | P a g e
Acceptance test.
At the end of the iteration, a working product is displayed to the customer and important stakeholders.
Graphical illustration of the Agile Model is given below
This is a very realistic approach to software development. This is because it deals with mutual
understanding with the regular customer.
Promotes teamwork and cross-training. Here, several groups need to work together. All actions here
are based on cooperation and understanding between groups and within a group.
Activity can be rapidly developed and demonstrated. Rapid growth can be achieved with the
participation of several groups and a large number of people.
Suitable for changing needs. All the steps here are repeated so that the customer can work without
any problems when changing ideas and adding ideas.
Provides previously semi-working solutions due to step splitting and moving in both directions between
steps.
Easy to manage as you can move back and forth between steps.
Dividing all the steps of the complex into smaller subsets gives developers flexibility.
Disadvantages of agile model:
This leaves less room for designing, making it riskier for sustainability, maintenance, and extension.
There must be an overall plan, an agile leader, and an agile Prime Minister habit and without it, this
model cannot be implemented. This requires skilled and experienced engineers so novices will not
have the opportunity. So, it will cost more and the apprentices will not get a chance.
13 | P a g e
If customer clarity and understanding are lacking as they rely heavily on customer interaction, the
development operations team can go in the wrong direction. Transferring technology can be a bit
challenging for team members as the use of documents here is minimal.
There is a very high level of personal dependence as it relies on minimal documentation.
4.1.2 Spiral Model
The idea of repetitive development with systematic controlled aspects of the waterfall model is the basis of
this model. This spiral model is a repetitive development process model. This model has been developed
through risk analysis of the waterfall model, which is a sequential linear growth model. It allows for product
release or enhancement refining through each iteration around the spiral. (point, 2021)
The spiral model consists of four stages, and a repetitive software project called a spiral repeat itself through
those stages.
Identification
This phase begins with the addition of the business requirements of the basic spiral. Once the production
process has reached its final stages, in the subsequent spiral, system requirements identification, subsystem
requirements, and unit requirements are performed at this stage.
The system analyzer processes the report files according to the customer's request requirements. This phase
also includes understanding the system requirements through continuous communication between the
customer and the system analyst.
design
The design phase begins with the conceptual design of the basic spiral, which includes the architectural
design, the logical design of the modules, the physical product design and the final design implementation and
subsequent design of the spirals.
Construction or erection
The construction phase takes place while creating a virtual software product in every spiral situation. In the
basic spiral, POC (Evidence of Concept) is developed at this stage to get customer feedback when designing
the product considering the product.
Here a functional model of the build software is produced with a world number of spirals with more clarity of
requirements and design details. This bundled step is sent to the customer for response.
Evaluation and risk analysis
Risk analysis involves identifying technical feasibility and management risks, such as schedule slippage and
cost overruns. Further risk analysis here includes technical feasibility assessment and monitoring. After
inspecting the build, at the end of the first iteration, the customer evaluates the software and provides
feedback.
The following illustration illustrates the spiral model and lists the activities in each phase:
14 | P a g e
(point, 2021)
Based on customer feedback and feedback, the software development process enters the next iteration.
Following that entry, the customer adopts a linear approach to implementing the suggested responses. The
process of repetition along the spiral is repeated throughout the life of the software.
Spiral Format Application:
This model is widely used in software development. Because it coincides with the natural development
process of any software product and learns with maturity, it poses minimal risk to the consumer as well as
development companies.
When there is a strict budget limit and risk assessment is important. For medium to high-risk projects.
For long-term projects where needs change over time and economic priorities change.
Usually when the customer does not have a clear understanding of their needs.
Requirements are complex and cannot be properly assessed due to ambiguity.
4.1.2.1 Spiral model - advantages and disadvantages
The main advantage of the spiral life cycle model is that the element can be added to the product when the
element of the product is available or when the element is not known. This ensures that there is no conflict
with previous requirements and plans.
15 | P a g e
This system is compatible with multiple software build and release approaches that allow for the formal
transition to a maintenance function. Another positive aspect of this method is that the spiral model forces
the original user to join the system development effort.
Advantages of Spiral SDLC Model:
As management becomes more complex, skilled and experienced professionals should be used in
software development. So, this is not suitable for small or low risk projects and can be expensive for
small projects.
The process is complex and as a result the end of the project may not be known in advance. Further
this can go on indefinitely.
Because there are a large number of intermediate stages, more documentation is required.
4.2.2 V-Model
The V-model is an SDLC model and the process activation takes place in a sequential V-shape. It is also known
as the authentication and validation form. This is an extension of the waterfall model itself and is based on the
relationship of an experimental phase to each of the corresponding developmental stages in the waterfall
model. This means that there is a phase of testing that is directly related to each stage of the development
cycle. This is a very light format and the next stage starts after the previous stage is completed.
V-Mode - Design
Under the V-model, the corresponding test phase of the development phase is designed in parallel. So, on one
side of 'V' is the verification stage and on the other side there are validation stages. The coding phase is
slightly V-mode and connects to both sides. (points, 2021)
18 | P a g e
(points, 2021)
19 | P a g e
At this stage the detailed internal design for all system modules is specified and is referred to as the Lower-
Level Plan (LLD). It is important that this design be compatible with other modules of system architecture and
other external systems. Unit testing is an essential part of any development process and helps to eliminate
maximum errors and omissions at an early stage. These unit tests can be planned at this stage based on the
internal module design.
Coding Phase
The actual encoding of the designed system modules is taken during the coding phase. The best programming
language depends on the system and architectural requirements.
Coding is done based on code instructions and standards. The code goes through many code reviews and is
optimized for best performance before the final build enters the store.
Validation phase
Below are the different validation stages of a V-model.
Inspection of the unit
All unit tests designed during the module design phase are coded and executed during this validation phase.
Inspection of the unit is only a symbolic test and it helps to remove the defects in the initial stage but the unit
test does not reveal all the shortcomings.
Combined tests
This test is associated with the architectural design phase. Combined tests are performed to test coexistence
and communication within the internal module of the system.
Systems testing
This system test is directly related to the system design phase. Systems testing thoroughly examines the
system functionality of all systems as a whole and the communication of the developing system with related
external systems. Since many other external systems are involved in system design, the functionality of the
existing hardware and software must be monitored. Many software and hardware compatibility issues can be
detected during this system test.
Acceptance test
The acceptance test is associated with the business needs analysis phase. Here the software takes full
attention of the user. Evaluates how the software behaves in a user environment. It measures the
performance of other systems in the user environment. Tests reveal compatibility issues with other systems in
the user environment. I can also detect non-functional issues such as loading and performance errors in the
real user environment.
4.2.2.1 V-Model - Advantages and Disadvantages
The advantage of the V-mode system is that it is very easy to understand and apply. The simplicity of this
model makes it easy to manage. The downside is that the model is not flexible to change and it can be very
expensive to change if there is a need change that is so common in today's dynamic world.
20 | P a g e
4.2.2.2 Advantages of the V-model system
This is a very disciplined format and the stages are all done at once. Therefore, it works well for small
and well-understood projects.
The steps here are all simple and easy to understand so they are easy to use. You can also involve
novice software developers. This is perfect for getting more results in less time and for quick and quick.
This is especially suitable for start-up companies and small projects.
Easy to manage due to the rigidity of the model. Each stage has a smooth distribution because it has a
specific distribution and review process. (points, 2021)
4.2.2.3 Disadvantages of the V-model system
There is a lot of risk and uncertainty here. The steps here are not between steps as they flow forward
at once. Once one step is completed, that step will not be reviewed again. So, this is not a good
example for complex and object-oriented projects.
This is not suitable for long and continuous projects. Why The simplicity of the steps here gives quick
results but it is difficult to confirm its success.
Not suitable for large projects whose requirements change from time to time and for projects with a
high risk of changing from moderate. This is because during the testing phase of an application, it is
difficult to go back and change the functionality. (Points, 2021)
Part 1.2
5 Spiral model
Spiral mode is one of the most important software development lifecycle models that provides support for risk
management. The number of spiral loops is not accurately calculated and may vary from project to project.
Each loop in the spiral is referred to as one stage in the software development process. The project manager
can change the number of specific stages required to improve the product and those changes should be made
based on the project risks. Because the project manager dynamically determines the number of stages, the
project manager plays an important role in developing a product using a spiral model.
The radius of the spiral represents the cost (cost) of the project at any given time and the angular dimension
represents the progress made so far in the present phase.
The following diagram shows the different stages of the spiral model: -
21 | P a g e
Each stage of the spiral model can be divided into four squares as shown in the figure above. The functions of
these four squares are as follows:
1. Set objectives and identify alternative solutions: At this stage all the requirements from the
customers are collected. Objectives are identified at the beginning of each stage. Described and
analyzed. Alternative solutions for further stages are suggested within this square.
2. Risk Identification and Resolution: During the second quarter, all currently proposed and usable
solutions are evaluated to select the best possible solution to a problem. The risks associated with that
solution will then identify other shortcomings and address the risks through the best possible strategy
for the problem. At the end of this square, the prototype is built for the best solution.
3. Prepare the next version of the product: Examination of the features identified during the third
trimester and confirmation of those features through those tests and conclusions. The next version of
the software will be available later this quarter.
4. Review and plan for the next phase: In the fourth quarter, customers will evaluate the version of
software they have developed so far. Finally, you can start planning for the next stage based on the
feedback from customers.
22 | P a g e
5.2 Why is the spiral format called meta mode?
The spiral format is called the meta mode because it is compatible with all other SDLC models. Subordination
to all other SDLC models means that, as a view, a spiral with a single loop represents the waterfall model. The
spiral model includes a step-by-step approach to the classic waterfall model. The spiral model acts as a risk
management technology. At the beginning of each stage, a prototype model approach is used to create a
prototype. Also, the spiral shape can be considered as a support for the evolutionary model. Repetition along
the spiral can be considered as the evolutionary levels at which the entire system is built. (Pal, 2021)
Part 01.3
According to the scenario, there is a need to develop software for the management of hospital day-to-day
works. So, this is one database and there is no complex database management or network system or AI
system or any complex and hard functionality running in this software. So, not this is a simple software with a
simple database. they need only keep their records in a database. and more, they need a backup system and a
simple functionality system with a user-friendly User interface. and I think they need this software as soon as
possible. So, I choose the waterfall model to develop this software.
why I choose the waterfall model for this:
This is simple and small software and for small software, we can use waterfall methodology.
There are no complex changes among the developing. because all details can collect at once. So, we do
not need to do it part by part. The project can be taken over at once and completed and delivered to
the customer.
23 | P a g e
this project is can make with a low budget. there are no complex functionalities. So, we can make it
under the limited assets.
we have limited time to do this project. because they already start the management system with
bookkeeping. and they are in a lot of trouble with this paper system. So, with the waterfall model, we
can give them that software in a limited time period.
Part 01.4
6 Why we cannot use waterfall model for large software development process?
The waterfall model is a simple model with one direction of the flow between steps. There is no turning back
between the steps. if you collecting the requirements from the client then you move to the next step, you
cannot go to the first step of requirement collecting. in the middle of the process, let's think that is a coding
phase, the client cannot add or change their mind. because in the coding phase there is no way to go back to
the requirement collecting step.
for a long time, project, there is a lot of change middle of the process. because according to the budget or
Attitudes, ideas, timely economic changes the client will need to change his software. but in waterfall model
cannot do that.
in large projects, we need to get more developers and more managers for design projects. all of these
employees are work at the same stage. So, in sitting the same phase they cannot do this thing. because when
developing the large software, we need to check every time that software will Make sure it matches with the
customer opinions. we cannot do this with the waterfall model.
Part 02.1
24 | P a g e
1. Technical feasibility:
In Technical feasibleness current resources, each hardware-software system at the side of needed technology
square measure analyzed/assessed to develop the project. This technical feasibility study offers a report on
whether or not there exists correct needed resources and technologies which can be used for project
development. On the side of this, the feasibility study additionally analyzes technical skills and capabilities of
the technical team, existing technology is often used or not, maintenance and up-gradation is simple or not for
chosen technology, etc.
2. Operational feasibility:
In Operational feasibleness degree of providing service to needs is analyzed alongside what quantity simple
product are to work and maintenance once prepared. alongside these alternative operational scopes square
measure determinant usability of the product, determinant advised resolution by the package development
team is suitable or not, etc.
3. Economic Feasibility:
In the Economic feasibility study price and advantage of the project are analyzed. suggests that underneath
this feasibility feasibleness study a detailed analysis is distributed what is going to be the price of the project
for development which has all needed prices for final development like hardware and code resource needed,
style and development price, and operational price and then on. at the moment it's analyzed whether or not
projects are going to be helpful in terms of finance for the organization or not.
4. Legal Feasibility:
In Legal feasibility, the study project is analyzed in lawfulness purpose of reading. This includes analyzing
barriers to the legal implementation of projects, knowledge protection acts or social media laws, project
certificates, licenses, copyright, etc. Overall, it will be aforesaid that the Legal practicability Study is studying to
grasp if the planned project conforms to legal and moral necessities.
5. Schedule Feasibility:
In Schedule feasibility Study in the main timelines/deadlines square measure analyzed for the projected
project which has what number times groups can want a complete final project that includes a nice impact on
the organization as the purpose of the project could fail if it can’t be completed on time.
Part 02.2
Requirement Analysis, additionally called demand Engineering, that is the method of process useexpectations
for a brand-new package being designed or changed. In software engineering, it's generally remarked loosely
by names like necessities gathering or necessities capturing. Requirement’s analysis encompasses those tasks
that come in determinative the wants or conditions to satisfy for a brand new or altered product or project,
taking account of the probably conflicting necessities of the assorted stakeholders, analyzing, documenting,
verificatory, and managing package or system necessities.
Here are the objectives for performing requirement analysis in the early stage of a software project:
26 | P a g e
From What to How: Software engineering task is the bridge that between system requirements
engineering and software design.
3 Orthogonal Views: Provides software designer with a model of:
4. system information (static view)
5. function (functional view)
6. behavior (dynamic view)
Software Architecture: Model can be translated to data, architectural, and component-level designs.
Iterative and Incremental Process: Expect to do a little bit of design during analysis and a little bit of
analysis during design. (paradigm, 2020)
27 | P a g e
12. Establish schedule and constraints.
13. Create system definitions.
14. Requirement Analysis Techniques
Needs analysis helps organizations determine the real needs of stakeholders. At the same time, it enables the
development team to communicate with stakeholders in a way that they understand (such as charts,
templates, streaming charts).
Once the requirements have been assembled, we document them in the Software Requirements Specification
(SRS), use the cases, or approve them as user stories. This document is easy for the average user and
developer to understand. (Model, 2020). (paradigm, 2020)
28 | P a g e
A general guideline for determining questions is to ask, "How, where, when, who, what, and why?"
"How do we meet this business need?" "How do we know this is complete?" Where: "Where does the
process begin?" "Where does the user get this feature?" "Where can I see the results?" When: "When
to use this feature?" "When does the feature fail?" "When are we ready to start?" For whom: "Who
uses this feature?" "Who provides inputs for the feature?" "Who provides the results of the feature?"
For what: "What do I know about this feature?" "What to do for this feature?" "What is the end
result?" "What should happen next?" (Eid, 2015)
8.3.4 Combined Application Plans / JAD
All of the above technologies are traditional need collection methods and this method of adding needs is a
modern and relatively more successful method. Introduced Integrated Application Development (JAD) in the
late 1970s, this method was able to solve some of the problems experienced by users of traditional methods
used to meet the needs. 40% or more of JAD record organizations report on project planning. This method has
shown successful results in reducing the time as the user and other key members are heavily involved in the
process. (Eid, 2015)
The main goal here is to get the plan right in the first place and thereby reduce the number of repetitions. JAD
usually collects people associated with aging in a place other than the workplace. This helps to reduce
distractions.
Participants for JAD include:
JAD session leader (also known as facilitator), users, managers, sponsors, system analysts, author and other IS
staff members. The entire process is usually managed by a facilitator who is trained in project management
and system analysis. The facilitator is responsible for keeping the team on the agenda and resolving conflicts.
Most importantly, facilitators do not contribute ideas. They ask for the team’s opinions. User participation
helps to dispel their uncertainty about the system development process. The user stays connected throughout
the JAD session and can make a huge contribution as they are the ones using the new system. Managers can
provide a better understanding of the organizational aspects of the system. The sponsor does not attend all
JAD sessions, but usually only the beginning or end, and since they do not contribute ideas, they sponsor the
process. There are system analysts to learn from users and managers. As with other requirements collection
technologies, they should not be biased. The author takes detailed notes during the session. Other IS staff
members, such as programmers or database analysts, contribute to the technical aspects of the proposed
ideas. (Eid, 2015)
Some of the benefits of JAD include:
29 | P a g e
Part 02.3
Technical Feasibility:
The technical facet explores if the project practicableness is at intervals the boundaries of current technology
and will the technology exist in the slightest degree, or if it's out there at intervals given resource constraints
(i.e., budget, schedule…). within the technical practicableness, the system analyst appearance between the
wants of the organization, such as, (I) data input device which might enter an oversized quantity of
information within the effective time (II) Output devices which might manufacture output in an exceedingly
bulk in an efficient time (III) the selection of process unit depends upon the kind of process needed within the
organization.
Operational Feasibility:
This facet defines the urgency of the matter and therefore the satisfactoriness of any answer. It shows if the
system is developed, can it's have used. The operational study includes people-oriented and social problems:
internal issues, like hands issues, labor objections, manager resistance, structure conflicts, and policies;
additionally, external problems, together with social satisfactoriness, legal aspects, and government laws.
It takes into thought whether or not these work practices and procedures support a brand-new system and
social factors of however the structural changes can have an effect on the operating lives of those stricken by
the system.
Time Feasibility:
Given his technical experience, the analyst ought to confirm if the project deadlines area unit cheap whether
or not constraints placed on the project schedule are fairly met. Some come area unit initiated with specific
deadlines. you wish to work out whether or not the deadlines area unit obligatory or fascinating. If the
deadlines area unit fascinating instead of obligatory, the analyst will propose various schedules. it's preferred
(unless the point is totally mandatory) to deliver a properly functioning data system 2 months late than to
deliver AN erring, useless data system on time! lost schedules area unit unhealthy, however inadequate
systems area unit worse!
We could have the technology, however, that doesn’t mean we have the abilities needed to properly apply
that technology. True, all info systems professionals will learn new technologies. However, that learning curve
can impact the technical practicableness of the project, specifically, it'll impact the schedule.
Legal practicability:
30 | P a g e
Determines whether or not the projected system conflicts with legal necessities e.g. an information process
system should accommodates the native knowledge Protection Acts. once a corporation has either internal or
external legal counsel, such reviews square measure generally customary. However, a project could face legal
problems once completion if this issue isn't thought-about at this stage.
10 Executive Summary
Give a professional statement about the company, the area where feasibility report, given credits to
participants, describe the scope of the feasibility, why it was performed, what this feasibility will lead to
This is a hospital. From the hospital management to the cleaners, the staff is on the job. At present, they
usually use data in books. Several other details are recorded daily, including details of patients and staff who
come to the hospital for treatment. Making these notes here is not an easy task. Keeping notes reduces the
accuracy of the data. And when that data is reused, they cannot be clearly separated. There can be big
problems with the order of the data and their accuracy.
Here the database should be kept in one computer and its backup should be kept in a cloud account. MySQL
computer language for database and JAVA for system creation and JAVA Swing for system interface design.
Several computers are used in this system. The administration computer and resection should form a network
of several computers as three computers.
The new system introduces an automated data filing system, replacing the current bookkeeping system.
Features:
This system requires data filing from the following sections:
1. Physician’s file
2. Staff file
3. Patient file
4. Salary processing of staff
5. Provide diet plans for patients
6. Giving prescriptions to patients
7. Providing bill and payment details
Mandatory needs:
Customers expect the following upgrades to this system:
1. A robust and highly accurate system; Since this is a system that works with patients, the accuracy and
reliability of the data contained herein must be high.
2. Must have an accurate and efficient information backup system; The accuracy of the data as well as the
existence of the data must be confirmed.
3. Strong security system; Like any system, this system has sensitive data. They must have a good security
system.
Scope of this system:
31 | P a g e
This system will make the existing paper-based manual system a new automated system. In this way, saving
time is one of the main objectives, and the system is expected to be data accurate and easy to handle. And if
one day the hospital grows with another branch network, the same system can be expanded accordingly.
Existing System:
The current system is a paper based manual system. This spends more time on data errors and data
management. Manipulating data is also a very difficult process.
Proposed System:
Through the new system introduced. With a single click, data can be entered and retrieved, as well as many
other things. This system will ensure the security as well as the accuracy of the data.
After adding some of the basic requirements to the test, the feasibility study report is prepared to test the
impact of the software on the organization, workability, and effective use of resources.
After preparing the basic requirements, the feasibility study report is prepared. Is the report being compiled
through the following features? To check. 1. The impact of software on the organization, 2. The ability to work
with software, 3. Resource productivity. The feasibility study for these tests focuses on these 4 key questions.
1. What are the implications of software for organization?
2. What are the needs of the user / users and does the software meet those needs?
3. Is it worth solving the current problem of the organization?
4. What are the resources available to build the system?
Technical feasibility
33 | P a g e
In the software manufacturing process, knowledge must be exchanged between the client and the
programmer to build the software and use it. The following issues should be discussed there.
What are the problems faced by the customer using the previous system?
What is the difference between the existing system and the new system?
What new knowledge does the user need to work with the new system?
The main change and disruption of the system is to make the whole system digital and computerized.
The pre-existing system is a system that works entirely with manual book files. But with the new system they
have to work with the computer. They should be given the knowledge to work especially with computer
software. So, it takes some time to get used to the new system. We have designed the software for this
purpose in a simple and efficient way so that everyone can use it without any problems.
The main point I felt while collecting the above information was that 40% of the people in this hospital do not
have computer knowledge. Knowledge must be provided here to operate that computer program.
To do this, we can organize a brief workshop on how the system works and how it is maintained.
For the development section, there is no such requirement as our development team consists of
professionally qualified JAVA programmers and graphic designers. Ensures that work is done properly with
experience of the same project in the past.
10.1.5 Financial Feasibility
This is the core of every feasibility study.
It examines a wide range of issues related to economic viability cost-benefit analysis. This is the most
important part of the organization. It considers the revenue and profit that can be earned from the sale of the
system relative to the cost of creating the system.
Economic viability analyzes the following:
1. Total cost of a complete system test
2. Examines whether the project can be done within the existing funds.
3. Cost of new hardware and software components
4. How Much Money Does a System Make as a Profit?
The cost table is given below:
Cost Month
0 1 2 3 4
Software 25,000LKR
Purchase
Hardware 45,000LKR
Purchase
Frameworks & 10,000LKR 10,000LKR
Tools purchase
Development 20,000LKR 20,000LKR 10,000LKR 10,000LKR 20,000LKR
Costs
Unit Testing 20,000LKR 20,000LKR 20,000LKR 20,000LKR 20,000LKR
Costs
34 | P a g e
Testing 30,000LKR
Equipment’s
Salary 300,000LKR 300,000LKR 500,000LKR 300,00LKR 300,000LKR
Payments
Systems 10,000LKR 10,000LKR 10,000LKR 10,000LKR 30,000LKR
Maintains
Total 2,070,000LKR
Costs
Benefits Month
0 1 2 3
Project income 2,000,000LKR 25,000,000LKR
Total Benefits 2,430,000LKR
11 Project Overview
Project Name: Hospital Management and data base System
Project Manager: Mr. P.D. Kodisinghe
Proposal Rev and Date: 2021-08-29
Project Commencement: 2021-08-20
Target Completion: 2022-02-03
12 Background Information
Unlike other systems, the design of a system that supports people dealing with human lives needs to be done
more carefully.
The hospital has well-trained doctors and staff. This system requires good support to get them to do their job.
It is important to manage the data properly through this system.
Unlike before, they expect superior service through the new system. Accurate and up-to-date information
records are required for diagnosis and treatment. Failure to provide accurate data at the right time can cause
serious damage to this hospital.
Not only key data records but also other records such as X-ray report, patient history of medication, sample
report and patient registration need to be properly maintained. Maintaining a good record helps keep the
hospital running well.
The tasting of information must be done in a prescribed manner. Information should be categorized as
necessary, essential, and unnecessary. By doing this you can quickly access any patient report to save time and
resources.
35 | P a g e
13 Feasibility Type: A
Here is the feasibility type A.
Manual report writing and record keeping system Make a database to keep data and manage the
database correctly
13.2 Assessments
Risk Description Risk Possibility Risk Impact Actions required to
(High/Medium/Low.) mitigate risk
Describe a Give a rating to the Which area is affected Solutions or methods to
identified risk risk based on it by the risk when it avoid risks
seriousness and presents itself
affecting scope
14 Feasibility Type: B
14.1 Feasibility Study Solutions problems & solutions
System Problems Possible Solutions
Too late payment and inability to Establishment of a deadly system for payment and
make advance reservations. pre-booking on a single system
14.2
14.3 Assessments
Risk Description Risk Possibility Risk Impact Actions required to
(High/Medium/Avg.) mitigate risk
Here, calculating This will reduce the High Creating a web page for
36 | P a g e
the cost of image of the this system can save a
patients' bills institution as well as lot of time by paying
adds up to all the the day-to-day online.
calculations and attendance of
discounts, if any, patients. And the use of an
add up, so it automated bill
takes a long time processing system
to issue a single
bill. So adding a
few bills can
make the whole
time a lot bigger.
15 Conclusion
This system basically makes the manual activation system currently operating in the hospital an automated
system. This system controls and manipulates all data in the hospital. This system manages patient data and
provides easy and accurate data control.
It also cares about that. This software also comes with a backup facility on request.
The software provides prescription details, laboratory test results, dietary advice, etc., and includes billing and
activity.
37 | P a g e
15.1 Features
The features of the system have been summarized into the following
15.2 Requirements
The following are the minimum requirements for run this software:
Type Requirement
Software Operating system - Win 7,10
Programming languages –Web-Technology, .Net, ASP.NET
Front-end – JAVA, C++
Back End – MySQL, Web Server: IIS
Hardware Core i3 or higher
4GB RAM
2GB free of Hard Drive
16 References
38 | P a g e
17 Appendix
Hospital Management system
This Event: Get ideas from Staff * Required
1.
Mark only one oval.
Option 1
2. Your name *
4. Gender
Mark only one oval.
Male
Female
Yes No
little
39 | P a g e
6. what is the details you ask from the patients *
40 | P a g e
9. how you divide the data *
41 | P a g e
12. how do you update your file system *
Forms
42 | P a g e
Part 03.1
43 | P a g e
19 Introduction
19.1 Purpose
This report is intended to provide an overview of the proposed hospital management system (version 1.0).
The objectives of this hospital management system are as follows:
Automating the existing record management system in operation in the existing hospital
Monitoring the performance of all staff in the hospital
Maintaining records for hospitalized patients
Automatic prescription and health counseling through the system
Provide clinical trials and monitor such test data
Hospital Management System: The proposed digital system to automate the existing overall record
management system
End User: The client or user who intends to use the Software
Database: The database where the same data entry is stored
In any case, any person or group who needs an idea about this project.
Management Hospital Management System:
Expected Audience and Reading Suggestions and Expected viewers of the document:
Introducing a new automated computer system to replace the old manual record management system
currently in use.
19.5 References
https://www.tutorialspoint.com/software_testing_dictionary/software_requirement_specification.htm
Tutorial points details on report
20 Overall Description
20.1 Product Perspective
OPD Management
Admin
The admin is allowed to access the entire system, which means he can manage any activity on the system. He
is the most privileged user who can access the system.
Main Functions:
Software requirements:
Hardware Requirements:
Core i3 processor
4GB Ram
18GB of hard disk space in terminal machines
1TB hard disk space in Server Machine
When the system is released, as part of the system itself, customers are presented with a software manual
that provides an overview of the process. It includes a complete product summary and clear organized steps
to download the program.
In this system:
Each user must have a valid user ID and password, which must be set by the admin.
Users must be logged into the system to access any data.
Files can only be deleted by the administrator
2|Page
21 External Interface Requirements
21.1 User Interfaces
Login Form
Admin Dashboard
Patient Details
3|Page
Pharmacy Details
Lab Details
4|Page
21.2 Hardware Interfaces
Desktop PC:
core i3 processor
4GB RAM
250GB HDD
Used on this computer:
To get the details of the doctors in this hospital
Assistance in obtaining information such as laboratory tests etc.
Display Unit (LED/LCD Monitor):
A monitor with a 23inch screen is used for this. The screen should be usable as well as visible to consumers.
Laser Printer (B/W):
Basically, this machine is for bill printing.
Wi-Fi router:
For internet operations inside a hospital, the Wi-Fi router is used simply to transmit data from pcs to servers.
5|Page
21.3 Software Interfaces
Software Interfaces:
Developing end
JDK - Java is simple, clean, and trustworthy. And many of developers are agree with this.
IntelliJ - IDE for Java developing.
MySQL server - Database connectivity and management
Adobe Illustrator - Logo and other designing such as User interfaces
Client End
OS – Windows 7/8/8.1/10- Very user friendly and common OS
JRE - JAVA Runtime Environment for run Java Application and System
MySQL server - for Database connectivity
NIC (Network Interface Card) — This is a hardware element that allows a device to connect to a network. For
wired and wireless networks, NICs can be used.
High signal integrity CAT 5 network cable
TCP / IP protocol- Internet service provider.
Ethernet Communications Interface- Ethernet is a computer network technology based on systems for local
area networks (LANs)
22 System Features
22.1 Dataflow Diagram
6|Page
7|Page
8|Page
9|Page
22.2 Activity diagram
10 | P a g e
22.3 Use Case Diagram
11 | P a g e
22.4 Sequence diagram
Data backup is important to protect data security. Supports several hard drives and DVDs. It also takes hard
copies and converts them into files.
Administration and data entry operators have unique logins that allow them to identify who is accessing the
system separately.
12 | P a g e
Accuracy: The accuracy of the information / output and the accuracy of the results can be assured.
Stability: The output or output of the device does not change from time to time in each case. The same
output is always generated for a given input.
13 | P a g e
Part - 04.1
UI
Data management
Task Management
Communication Management
Implementation
This process involves creating a commonly used system or program. The software project provides a running
program or computer system; When the software is installed in a physical environment it will provide a mix of
hardware and software.
Procedure
Data driven
Object-oriented
Four samples of the software category can be shown as the path between the real world and the working
program.
14 | P a g e
24.2 Procedure
The model of the system focuses on the algorithm or steps needed to solve a problem. This process divides
the problem into simple sub-problems defined by process-method or method. In general, the breakdown of
action procedures is represented as a hierarchy and further represented as a list or a tree. Computer scientists
usually draw hierarchical trees on the roots at the beginning and the leaves at the bottom. There is no well-
defined set of rules for determining how simple the tasks were to allow for decay or initiation of
programming. When this is further explained; It proves that two separate and talented designers have been
able to create two different designs.
By following this model, the transition from design and analysis to implementation is relatively easy. However,
as the size of the problem increases and the complexity of the problem increases, the procedural model or
problem domain and the gap between analysis and design begin to have a greater impact. It is normal to have
a poor understanding of the problem domain by the paradigm in the procedure, as the interrelationship
between the problem and the functional tree is arbitrary and essentially abstract. But the side effect is that
these trees grow in large numbers, making it difficult for consumers to understand, and the widespread effects
of unexpectedly rippling through trees due to changes in decay (i.e. trees). Finally, the process model and the
associated dissociation trees also contribute to global data and link functions. Even so, owning one is still
beyond the reach of the average person.
15 | P a g e
This analysis identifies existing objects in the real world and abstracts them into classes. The planning stage
involves the addition of class details, the introduction of new classes.
UML class diagrams need to be translated into an appropriate programming language in order to implement
the above classes. This conceptual consistency connects real-world, analysis and design and implementation.
16 | P a g e
complex problem. To do this, you must rely on experts in a range of knowledge and domains. This idea is
known in scientific circles as 'local search'.
17 | P a g e
Coordinate different analysis groups or team members around the company rather than software activities.
Instead of using separate computer technology, data science, and analytics teams, bring together people who
can achieve business goals or complete projects more efficiently.
This database should be linked to the business units and information organization. It must provide a
professional 'data converter' or team with business needs and strategic technical solutions.
Above all, it is good to do "parallel thinking"; That is, you can spend more time working and learning in
completely different fields than in the specialist field.
Compliance: As Wang notes guarantee, “You may have a good company for what other companies do,
but they do not have a data-based company.
Longevity: Increased retention power always goes hand in hand with compliance. Understand the
implicit consumer of the data collected and managed and they will take appropriate action accordingly.
Awareness: Data-based organizations are aware of the ups and downs of sales.
Response: This is the ultimate advantage for data-based organizations, which, in the broadest sense,
make real-time, real-time, and forecast data more responsive and dynamic.
Req: Requirement Test Test Design Test User Test Defect Req:
ID Description cas Desig accep Execution s Coverage
e ner tance Status
ID
Req Login to TC0 Insert invalid PW and ID Comp No pa N N null complete
-01 Application 01 leted ss o o ly
TC0 Insert valid PW and ID Comp No pa N N null complete
02 leted ss o o ly
TC0 Login different type users Comp No pa N N null complete
02 leted ss o o ly
Req View profile TC0 View button click and Comp No pa N N null complete
-02 4 display profile leted ss o o ly
Req Edit User TC0 Edit tables Comp No pa N N null complete
-03 5 leted ss o o ly
Req Logout TC0 Logout from System Comp No pa N N null complete
-04 6 leted ss o o ly
Part 04.2
18 | P a g e
26 Limited state machinery
This is a mathematical concept. This allows programmers, mathematicians, and other
professionals to describe any device with limited or large conditions as a mathematical model.
It can be described as a limited government machine used to simplify any form or complex
problem implemented by software or hardware. All that needs to be considered here is a
limited listing in the FSM, which can only be obtained from one of those states at a time using
the abstract method. It allows you to analyze and evaluate each of the current input and
output opportunities.
Limited state machines are called computer models of automation theory. In automation
theory, computer models include the following:
Limited state machinery - models for any device with minimal conditions.
Pushdown Automation - This involves the use of memory zones called stacks to store
information as part of a template that is more complex than limited state machines.
Linear-Marginal Automated Machines (LBAs) - This is similar to Turin machines. But the
main feature is that the data is limited to an input section that is only in a limited input
group.
Turning machines - have different input combinations to evaluate a large system or
problem. This is the most complex mathematical method in ‘Ottomata’ theory to test
them.
As a practical example of a limited state machine, a video game controller can be used to
identify a series of buttons that correspond to a series of actions in the game. When a user
clicks on a key, the system already knows how to execute the corresponding actions.
26.1 Limited State Machine vs. Unclear State Machine
Creating a finite state machine consists of a set of potential input cases. But they consist of a
set of corresponding output events and predictive statements made by the instrument. In a
limited state machine, the list of possible combinations of these elements is small. But instead,
the data point is vaguely accessible by a state machine, not separately and under pre-named
categories.
Extended limited state machine
It is a collection of traditional state operations, events, actions, and transitions. Government
machines are used to control the flow of data and behavior of software and hardware
components. Many languages are widely used when designing, validating, and testing model-
based software systems.
19 | P a g e
The algorithm maintains a long class of state machinery called register automat. There is a
limited power structure here. Conditions, functions as well as extensions by the guards can be
seen here.
Perform collection of tests, including usable and operational information in Domain Security.
In any case, the process takes place in exactly one step. It is an event where the device is
maintained and switched to another state. In this case, different events can be modified to be
parameterized as part of their significance. The currently undefined method produces a
stream of input events for a valuable source, which can be parameterized using the input
event vector. It is no secret that the algorithm certainly requires a long class of state
machinery called Register Automat. Extended limited state machinery cannot be defined. But
a fraternal transition with the same motivational events and non-digital guards may be
needed.
26.2 Comparison of FSM and EFSM
It is not uncommon for the Phoenician state apparatus to fail to decipher the critical
relationship between events and the status quo in general. Separating data from finite state
machine names is expensive. It also tends to generate unequally large editions. The various
pitfalls are referred to as the extended limited state computer. The code contained therein can
be overly expensive and as a result, when the design encounters a generally non-critical
situation, it is very helpful to balance data restrictions with translations. From an evaluation
point of view, it is common for significant problems to persist with non-diagnostic systems.
The same provision may or may not allow for a continuous sequence of events.
Additions are made to the number of test cases required so that the universe does not detect
an explosion. The finite computer determines whether the data code has a primary number or
not. It has identified many simple languages.
The finite state machine is a system that sets the conditions for predetermined results. It is
also common for the finite state machine to offer a wide range of options for unplanned
results. It shifts a limited state machine, often from one state to another, with an input given,
and an expanded limited state machine when only a specific set of orders is met.
27 References
Eid, M., 2015. Requirement Gathering Methods. [Online]
Available at: https://www.umsl.edu/~sauterv/analysis/F2015/Requirement%20Gathering
20 | P a g e
%20Methods.html.htm
[Accessed 21 08 2021].
Guru99, 2019. What is SDLC. [Online]
Available at: https://www.guru99.com/software-development-life-cycle-tutorial.html
[Accessed 09 05 2021].
Kumar, S., 2021. What is Iterative model- advantages, disadvantages and when to use it?. [Online]
Available at: http://tryqa.com/what-is-iterative-model-advantages-disadvantages-and-when-to-use-it/
[Accessed 19 08 2021].
Pal, S. K., 2021. Software Engineering | Spiral Model. [Online]
Available at: https://www.geeksforgeeks.org/software-engineering-spiral-model/
[Accessed 21 08 2021].
paradigm, v., 2020. Requirement Analysis Techniques. [Online]
Available at: https://www.visual-paradigm.com/guide/requirements-gathering/requirement-analysis-
techniques/#:~:text=Requirement%20Analysis%2C%20also%20known%20as,requirements%20gathering%20or
%20requirements%20capturing.
[Accessed 08 05 2021].
points, T., 2021. SDLC - V-Model. [Online]
Available at: https://www.tutorialspoint.com/sdlc/sdlc_v_model.htm
[Accessed 19 Augest 2021].
Points, T., 2021. SDLC - V-Model. [Online]
Available at: https://www.tutorialspoint.com/sdlc/sdlc_v_model.htm
[Accessed 21 08 2021].
point, t., 2021. SDLC - Spiral Model. [Online]
Available at: https://www.tutorialspoint.com/sdlc/sdlc_spiral_model.htm
[Accessed 21 08 2021].
Uconn, 2019. Post Implementation. [Online]
Available at: https://sdlc.uconn.edu/activity-9-post-implementation/
[Accessed 09 05 2021].
21 | P a g e