SlideShare a Scribd company logo
Object Oriented Software Modeling and Design  CE 350 Abdel-Karim Al-Tamimi, Ph.D. [email_address] http://faculty.yu.edu.jo/altamimi Al-Tamimi 2011 ©
Overview Door Master Example Al-Tamimi 2011 ©
Door Master System Door Master System : a security system for controlling entry of employees through a secured door Al-Tamimi 2011 ©
Door Master: Description Employees  and  security guards  enter freely through the door when Door Master is disabled.  ( Enter Disabled Door ) Employees  and  security guards  enter  through the door by following these steps: entering the entry code on the numeric keypad,  entering through the door closing the door behind them The alarm is raised if the door is left open too long or if the door is not shut when Door Master is enabled ( Enter Secured Door ) Al-Tamimi 2011 © Enter Secured Door Enter Disabled Door
Door Master: Description   Security guards   change  the entry code by  pressing the change entry code button on the control panel providing authorization by entering the security code on the numeric keypad entering the new entry code on the numeric keypad verifying the new entry code by reentering it on the numeric keypad ( Change Entry Code ) Al-Tamimi 2011 © Change Entry Code
Door Master: Description Security guards  change  the security code by: pressing the change security code button on the control panel  providing authorization by entering the old security code on the numeric keypad entering the new security code on the numeric keypad verifying the new security code by reentering it on the numeric keypad. ( Change Security Code ) Al-Tamimi 2011 © Change Security Code
Door Master: Description Security guards  enable  Door Master by: pressing the enable button on the control panel providing authorization by entering the security code on the numeric keypad. Door master turns off the disabled light  turns on the enabled light locks the door The alarm is raised if the door is left open too long or if the door is not shut when Door Master is enabled ( Enable Door Master ) Al-Tamimi 2011 © Enable Door Master
Door Master: Description Security guards  disable  Door Master by  pressing the disable button on the control panel providing authorization by entering the security code on the numeric keypad Door master then  turns off the enabled light turns on the disabled light unlocks the door  ( Disable Door Master ) Al-Tamimi 2011 © Disable Door Master
Door Master: Initial Use-Case Diagram Al-Tamimi 2011 ©
Door Master: Refining Use-Cases These two use cases are common among the use cases and thus can be considered as abstract  include  use-cases Employees  and  security guards  enter  the entry code by pressing five keys on the numeric keypad followed by the enter key. Door master beeps after each key and verifies the entry code. ( Enter Entry Code ) common in ( Enter Secure Door, Change Entry Code ) Employees  and  security guards  enter  the entry code by pressing seven keys on the numeric keypad followed by the enter key. Door master beeps after each key and verifies the entry code . ( Enter Security Code ) common in ( Change Entry Code, Change Security Code, Enable Door Master, Disable Door Master ) Al-Tamimi 2011 © Enter Entry Code Enter Security Code <<include>> <<include>>
Door Master: Refined Use-Case Diagram Al-Tamimi 2011 ©
Door Master: Refining Use-Case Diagram The following abstract use case extends the use cases The alarm is raised if the door is left open too long or if the door is not shut when Door Master is enabled. The  security guards  disable the alarm by  entering the security code . ( Raise Alarm ) extends ( Enable Door Master )  and ( Enter Secured Door )   Al-Tamimi 2011 © Raise Alarm <<Extend>>
Door Master: Refined Use-Case Diagram Al-Tamimi 2011 ©
Course Registration System Use Case Example Al-Tamimi 2011 ©
Course Registration System: Description At the start of each semester a student can request a course list. Information about a course is provided, such as the tutor (instructor), department and pre-requisites. The new system will allow the students to create a schedule, then select four courses.  Each student can choose two other courses in case their first choices become full or cancelled  Al-Tamimi 2011 ©
Course Registration System: Description No course can have more than 10 students No course can have less than 3 students or it will be cancelled These functionalities will be available to other users of the system When registration is complete, the registration system sends a message to the billing system to send out a bill to the student Al-Tamimi 2011 ©
Course Registration System: Description Tutors use the system to find which classes they are teaching and who are the students in the class The registrar will administer the system For a period of time at the beginning of the semester, the students can change their schedule. Students must be allowed to access the system during the this time to add or delete courses Al-Tamimi 2011 ©
CRS : Actors Actors: Student Tutor Billing System Registrar Al-Tamimi 2011 ©
CRS: Use-Cases/Goals Student: View Course List Register for Courses and pay the semester bill Tutor View Teaching Courses Registrar Maintain course information Maintain student information Maintain tutor information Maintain curriculum  Generates course lists Al-Tamimi 2011 ©
CRS: Initial Use-Case Diagram Al-Tamimi 2011 ©
Documenting Use-Cases Informal Style Use case : Register Courses Brief Description : The student initiates the use case to create, read, update or delete a course for the coming semester Primary flow of events :  The student initiates the use case by entering a student number Al-Tamimi 2011 ©
Documenting Use-Cases Informal Style Primary flow of events(cont): The system validates the student number and prompts the student for the preferred activity Create a schedule  Review the schedule  Change the schedule by adding or deleting a course The student indicates when finished A schedule is printed The system sends details to the Billing System Al-Tamimi 2011 ©
Documenting Use-Cases Informal Style Alternative flow of events : If the student enters an invalid number, the student is denied access with an error message If a schedule already exists and a new one is created, the student will be informed and asked for another option Al-Tamimi 2011 ©
Documenting Use-Cases Formal Style We will add the following sections: Primary and secondary actors  Pre-conditions  Minimum guarantees  Success guarantees/Post-Conditions Al-Tamimi 2011 ©
Documenting Use-Cases Formal Style Al-Tamimi 2011 © Use case name Register Courses Use case ID UC-100 Super use case - Actor(s) Primary Actor(s): Student Secondary Actor(s): Billing System Brief description The student initiates the use case to create, read, update or delete a course for the coming semester Preconditions Registrations for the Semester are open to Students. Post-conditions A Schedule has been created/updated for a Student.
Documenting Use-Cases Formal Style Al-Tamimi 2011 © Flow of events The Student initiates the use case by entering a student number and password The System prompts the student for one of the following options:  •  Create a schedule  •  Review a schedule  •  Change a schedule (to add or delete a course offering)  3. The Student selects an option, completes the task and indicates when finished  4. The System saves any changes made, sends billing details to the Billing System and prints the schedule 5. The use case ends
Documenting Use-Cases Formal Style Al-Tamimi 2011 © Alternative flows and exceptions 1a:  Invalid Student Details Entered  1. The System denies access and displays an error message 2. The use case resumes at step 1 (of Primary flow)    Continued on next slide Priority High Non-behavioral requirements The system should be able to handle at least 10,000 students concurrently Assumptions Issues Refer to UI Specification xxx for the user interface associated with this use case Source User Interview Memo 21, 8/9/01
Documenting Use-Cases Formal Style Al-Tamimi 2011 © Alternative flows and exceptions 2 :  Student Selects to Create a Schedule  1. The System checks that the Student does not already have a Schedule for the upcoming semester.  2. The Student selects 4 primary course offerings, 2 alternative course offerings and submits their selections.  3. The System checks that the prerequisites are satisfied and adds the Student to the course offerings.  4. The System generates charges associated with the selections made.  5. The use case resumes at step 4 (of Primary flow). 3 :  Student has an existing Schedule IRM Training - White Paper   1.  The System displays an error stating the Student already has  an existing Schedule and cannot create a new one.  2.  The use case resumes at step 2 (of Primary flow).
Resources http://www.irm.com.au/papers/How_to_use_Use_Cases.PDF Al-Tamimi 2011 ©

More Related Content

PPT
Lecture09
artgreen
 
PPT
Lecture08
artgreen
 
PPT
Lecture05
artgreen
 
PPT
Lecture08 examples
artgreen
 
PDF
Lecture04- Use Case Diagrams
artgreen
 
PPT
Lecture04- Use Case Diagrams
artgreen
 
PDF
Aras and Developing Deployment Use Cases and Requirements
Aras
 
PPT
Domain model
Eagle Eyes
 
Lecture09
artgreen
 
Lecture08
artgreen
 
Lecture05
artgreen
 
Lecture08 examples
artgreen
 
Lecture04- Use Case Diagrams
artgreen
 
Lecture04- Use Case Diagrams
artgreen
 
Aras and Developing Deployment Use Cases and Requirements
Aras
 
Domain model
Eagle Eyes
 

Similar to Lecture06 (20)

PPT
Lecture05
artgreen
 
PPT
Lecture05
artgreen
 
PPT
Lecture05
artgreen
 
PPT
Lecture04- Use Case Diagrams
artgreen
 
PPTX
Pre defense Presentatin
Sheikh Toriqul Islam
 
DOCX
SYSTEM ANALYSIS AND DESIGN(COLLEN UB)
Collen Tshebo
 
PDF
Dit yvol5iss32
Rick Lemieux
 
PDF
Project report1
vipul kumar
 
PPT
Lecture09
artgreen
 
PPTX
Online Hotel Reservation System PPT
surabhi shinde
 
PDF
IRJET- Android Application for Training and Placement Cell using Machine ...
IRJET Journal
 
PPTX
Complaint Management system for township.pptx
farmanullahrahi1
 
PDF
Student_results_management_system proposel.pdf
KhondokerAbuNaim
 
PPSX
eFACiLiTY Helpdesk and Knowledge Base System
eFACiLiTY - Enterprise Facilities Management Software
 
PPTX
02-use_cases in Unified modeling languages
NALESVPMEngg
 
PDF
Toll tax management system project report..pdf
Kamal Acharya
 
PPTX
contractor safety briefing
hamidi32
 
PPTX
college-admission-system.pptx
veerdevshreyas1
 
PPTX
Electronic Transactional Records System Proposal
EvettMarban1
 
PPTX
ETRS Proposal - Acme Rental
EvettMarban1
 
Lecture05
artgreen
 
Lecture05
artgreen
 
Lecture05
artgreen
 
Lecture04- Use Case Diagrams
artgreen
 
Pre defense Presentatin
Sheikh Toriqul Islam
 
SYSTEM ANALYSIS AND DESIGN(COLLEN UB)
Collen Tshebo
 
Dit yvol5iss32
Rick Lemieux
 
Project report1
vipul kumar
 
Lecture09
artgreen
 
Online Hotel Reservation System PPT
surabhi shinde
 
IRJET- Android Application for Training and Placement Cell using Machine ...
IRJET Journal
 
Complaint Management system for township.pptx
farmanullahrahi1
 
Student_results_management_system proposel.pdf
KhondokerAbuNaim
 
eFACiLiTY Helpdesk and Knowledge Base System
eFACiLiTY - Enterprise Facilities Management Software
 
02-use_cases in Unified modeling languages
NALESVPMEngg
 
Toll tax management system project report..pdf
Kamal Acharya
 
contractor safety briefing
hamidi32
 
college-admission-system.pptx
veerdevshreyas1
 
Electronic Transactional Records System Proposal
EvettMarban1
 
ETRS Proposal - Acme Rental
EvettMarban1
 
Ad

More from artgreen (10)

PDF
Lecture12
artgreen
 
PDF
Ce350 class project_spring2011_v1.5
artgreen
 
PPT
Lecture11
artgreen
 
PPT
Lecture10.5
artgreen
 
PPT
Lecture10
artgreen
 
PPT
Lecture07 examples
artgreen
 
PPT
Lecture07
artgreen
 
PPT
Lecture-03 Introduction to UML
artgreen
 
PDF
Lecture02
artgreen
 
PPT
Lecture01
artgreen
 
Lecture12
artgreen
 
Ce350 class project_spring2011_v1.5
artgreen
 
Lecture11
artgreen
 
Lecture10.5
artgreen
 
Lecture10
artgreen
 
Lecture07 examples
artgreen
 
Lecture07
artgreen
 
Lecture-03 Introduction to UML
artgreen
 
Lecture02
artgreen
 
Lecture01
artgreen
 
Ad

Recently uploaded (20)

PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Basics and rules of probability with real-life uses
ravatkaran694
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 

Lecture06

  • 1. Object Oriented Software Modeling and Design CE 350 Abdel-Karim Al-Tamimi, Ph.D. [email_address] http://faculty.yu.edu.jo/altamimi Al-Tamimi 2011 ©
  • 2. Overview Door Master Example Al-Tamimi 2011 ©
  • 3. Door Master System Door Master System : a security system for controlling entry of employees through a secured door Al-Tamimi 2011 ©
  • 4. Door Master: Description Employees and security guards enter freely through the door when Door Master is disabled. ( Enter Disabled Door ) Employees and security guards enter through the door by following these steps: entering the entry code on the numeric keypad, entering through the door closing the door behind them The alarm is raised if the door is left open too long or if the door is not shut when Door Master is enabled ( Enter Secured Door ) Al-Tamimi 2011 © Enter Secured Door Enter Disabled Door
  • 5. Door Master: Description   Security guards change the entry code by pressing the change entry code button on the control panel providing authorization by entering the security code on the numeric keypad entering the new entry code on the numeric keypad verifying the new entry code by reentering it on the numeric keypad ( Change Entry Code ) Al-Tamimi 2011 © Change Entry Code
  • 6. Door Master: Description Security guards change the security code by: pressing the change security code button on the control panel providing authorization by entering the old security code on the numeric keypad entering the new security code on the numeric keypad verifying the new security code by reentering it on the numeric keypad. ( Change Security Code ) Al-Tamimi 2011 © Change Security Code
  • 7. Door Master: Description Security guards enable Door Master by: pressing the enable button on the control panel providing authorization by entering the security code on the numeric keypad. Door master turns off the disabled light turns on the enabled light locks the door The alarm is raised if the door is left open too long or if the door is not shut when Door Master is enabled ( Enable Door Master ) Al-Tamimi 2011 © Enable Door Master
  • 8. Door Master: Description Security guards disable Door Master by pressing the disable button on the control panel providing authorization by entering the security code on the numeric keypad Door master then turns off the enabled light turns on the disabled light unlocks the door ( Disable Door Master ) Al-Tamimi 2011 © Disable Door Master
  • 9. Door Master: Initial Use-Case Diagram Al-Tamimi 2011 ©
  • 10. Door Master: Refining Use-Cases These two use cases are common among the use cases and thus can be considered as abstract include use-cases Employees and security guards enter the entry code by pressing five keys on the numeric keypad followed by the enter key. Door master beeps after each key and verifies the entry code. ( Enter Entry Code ) common in ( Enter Secure Door, Change Entry Code ) Employees and security guards enter the entry code by pressing seven keys on the numeric keypad followed by the enter key. Door master beeps after each key and verifies the entry code . ( Enter Security Code ) common in ( Change Entry Code, Change Security Code, Enable Door Master, Disable Door Master ) Al-Tamimi 2011 © Enter Entry Code Enter Security Code <<include>> <<include>>
  • 11. Door Master: Refined Use-Case Diagram Al-Tamimi 2011 ©
  • 12. Door Master: Refining Use-Case Diagram The following abstract use case extends the use cases The alarm is raised if the door is left open too long or if the door is not shut when Door Master is enabled. The security guards disable the alarm by entering the security code . ( Raise Alarm ) extends ( Enable Door Master )  and ( Enter Secured Door )   Al-Tamimi 2011 © Raise Alarm <<Extend>>
  • 13. Door Master: Refined Use-Case Diagram Al-Tamimi 2011 ©
  • 14. Course Registration System Use Case Example Al-Tamimi 2011 ©
  • 15. Course Registration System: Description At the start of each semester a student can request a course list. Information about a course is provided, such as the tutor (instructor), department and pre-requisites. The new system will allow the students to create a schedule, then select four courses. Each student can choose two other courses in case their first choices become full or cancelled Al-Tamimi 2011 ©
  • 16. Course Registration System: Description No course can have more than 10 students No course can have less than 3 students or it will be cancelled These functionalities will be available to other users of the system When registration is complete, the registration system sends a message to the billing system to send out a bill to the student Al-Tamimi 2011 ©
  • 17. Course Registration System: Description Tutors use the system to find which classes they are teaching and who are the students in the class The registrar will administer the system For a period of time at the beginning of the semester, the students can change their schedule. Students must be allowed to access the system during the this time to add or delete courses Al-Tamimi 2011 ©
  • 18. CRS : Actors Actors: Student Tutor Billing System Registrar Al-Tamimi 2011 ©
  • 19. CRS: Use-Cases/Goals Student: View Course List Register for Courses and pay the semester bill Tutor View Teaching Courses Registrar Maintain course information Maintain student information Maintain tutor information Maintain curriculum Generates course lists Al-Tamimi 2011 ©
  • 20. CRS: Initial Use-Case Diagram Al-Tamimi 2011 ©
  • 21. Documenting Use-Cases Informal Style Use case : Register Courses Brief Description : The student initiates the use case to create, read, update or delete a course for the coming semester Primary flow of events : The student initiates the use case by entering a student number Al-Tamimi 2011 ©
  • 22. Documenting Use-Cases Informal Style Primary flow of events(cont): The system validates the student number and prompts the student for the preferred activity Create a schedule Review the schedule Change the schedule by adding or deleting a course The student indicates when finished A schedule is printed The system sends details to the Billing System Al-Tamimi 2011 ©
  • 23. Documenting Use-Cases Informal Style Alternative flow of events : If the student enters an invalid number, the student is denied access with an error message If a schedule already exists and a new one is created, the student will be informed and asked for another option Al-Tamimi 2011 ©
  • 24. Documenting Use-Cases Formal Style We will add the following sections: Primary and secondary actors Pre-conditions Minimum guarantees Success guarantees/Post-Conditions Al-Tamimi 2011 ©
  • 25. Documenting Use-Cases Formal Style Al-Tamimi 2011 © Use case name Register Courses Use case ID UC-100 Super use case - Actor(s) Primary Actor(s): Student Secondary Actor(s): Billing System Brief description The student initiates the use case to create, read, update or delete a course for the coming semester Preconditions Registrations for the Semester are open to Students. Post-conditions A Schedule has been created/updated for a Student.
  • 26. Documenting Use-Cases Formal Style Al-Tamimi 2011 © Flow of events The Student initiates the use case by entering a student number and password The System prompts the student for one of the following options: • Create a schedule • Review a schedule • Change a schedule (to add or delete a course offering) 3. The Student selects an option, completes the task and indicates when finished 4. The System saves any changes made, sends billing details to the Billing System and prints the schedule 5. The use case ends
  • 27. Documenting Use-Cases Formal Style Al-Tamimi 2011 © Alternative flows and exceptions 1a: Invalid Student Details Entered 1. The System denies access and displays an error message 2. The use case resumes at step 1 (of Primary flow)  Continued on next slide Priority High Non-behavioral requirements The system should be able to handle at least 10,000 students concurrently Assumptions Issues Refer to UI Specification xxx for the user interface associated with this use case Source User Interview Memo 21, 8/9/01
  • 28. Documenting Use-Cases Formal Style Al-Tamimi 2011 © Alternative flows and exceptions 2 : Student Selects to Create a Schedule 1. The System checks that the Student does not already have a Schedule for the upcoming semester. 2. The Student selects 4 primary course offerings, 2 alternative course offerings and submits their selections. 3. The System checks that the prerequisites are satisfied and adds the Student to the course offerings. 4. The System generates charges associated with the selections made. 5. The use case resumes at step 4 (of Primary flow). 3 : Student has an existing Schedule IRM Training - White Paper 1. The System displays an error stating the Student already has an existing Schedule and cannot create a new one. 2. The use case resumes at step 2 (of Primary flow).