SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Unit 3

 Object Oriented analysis process
2. Identifying use cases
3. Classification
4. Identifying object
   relationships,attributes and
   methods
Identifying use cases:
                 Objective
•   Use case modeling and analysis
•   Identifying actors
•   Identifying use cases
•   Developing effective documentation
Identifying use cases
• Introduction
• Objective of analysis
  – To capture complete, unambiguous , consistent
    picture of requirements of system
  – Separating system’s behavior from behavior
    implementation
     • What the system must do to satisfy users requirement and
       needs
     • Won't specify how to do it
     • Requires to view the system from users perspective
Cont.. Of introduction
• Transformation 1
  – users need to problem statement and
    requirement
• Tools to extract information about a
  system
  – examination of existing system documentation
  – Interviews
  – Questionnaire
  – observation
Why analysis is a difficult activity
• Analysis activity involves understanding
  – problem
  – Associated constraints
  – Methods to overcome this constraints
• Iterative process
Cont..
• Sources that makes analysis difficult
  – Fuzzy descriptions
     • Bcs of interpretation problem
  – Incomplete requirements
     • Due to users forgetting to identify them, High cost,
       politics
  – Unnecessary features
Business object analysis:
 understanding the business layer
• Process of
  – understanding sys requirement
     • Developing use case
        – Discussing uses and objectives with users
        – Understanding expected inputs, desired response
     • Prototype
        – Helps to understand how the system ’ll be used
  – Establishing goals
• Outcome of this process
  – Identifying classes
  – Relationship
Use case driven object oriented
    analysis: the unified approach
                                      Identify
          Develop     Develop        classes ,      Refine
actors   usecase &   interaction   relationships,      &
          activity     diagram       attributes,    iterate
          diagram                     methods
           Build
         prototype
Business process modelling
• Not necessary for all project
• When required business process and
  requirements can be modelled to any level
  of detail
• Activity diagram support this modelling
• disadv
  – Time consuming process
• Adv
  – familiarity
yes   yes      Go to
           yes          Go to                                                   counter and
                     counter and                                                 check out
                       return                                                    the books
Return                 books
book?
                                               yes
                                   yes
                                                     Interlibrary
                                                         loan
                  borrow                       no
                   book?
                              no
                                                     Search for
                                                       book



                                         yes         Do
                 Do search
                                                research on
                                                   topics
                             no



                                         yes         Read news
                 Read news                           paper and
                 paper?
                             no                      magazine



         Acivty diagram –library system
Use case model
•   Senarios for understanding the system
•   Interaction bw user and system
•   Captures users goal and systems responsibility
•   Used to discover classes and relationship
•   Developed by talking to users
•   Use case model
    – Provides external view of the system
• Object model (UML class diagram)
    – Provides internal view
Use cases and microscope
• A use case is a sequence of transaction in a
  system whose task is to yield results of
  measurable value to an individual actor of the
  system
• Actor
  –   Role played by the user with respect to the system
  –   Single actor may perform many use cases
  –   Can be external system
  –   Can be one get value from the system, or just
      participate in the use case
Borrow books       uses

                                            Check library card
                        extends
                                      uses
                   Get an
              interlibrary loan
                                     uses

               Return books
member                                                 Circulation clerk

                Do research



         Read books and news paper




              Purchase supplies
                                                        supplier
Uses and extends association
• Uses
  – common sub flows are extracted and
    separate use case is created
  – Relationship bw usecase and extracted one is
    called uses relationships
• Extends
  – Used when use case is similar to other, but do
    bit more or more speciliazed
• Abstract use case
  – No initiating actor
  – Used by concrete use cases
• concrete use cases
  – Interacts with actors
Identifying actors
• Actor
   – Role played by the user
• Actors found thru answers of following question
   – Who is using the system
   – Who is affected by the system
   – Which group needs help from the system
   – Who affects the system, which user groups are needed by the
     system to perform it functions
   – Which external h/w or other systems use the system to perform
     tasks
   – What prob does this application solve and for whom
   – How do users use the system(ie use case), and what they are
     doing with the system
• Accounts need not be human. It is an external system
Identifying actor (cont..)
• Two-three rule
  – Used to identify the actors
  – Start with naming at least 2 or 3 , people who
    could serve as the actor in the system.other
    actor can be identified in the subsequent
    iteration
Guideline for finding use cases
• For each actor, find the tasks and function that
  the actor should be able to perform or that the
  system needs the actor to perform (use case)
• Name the use cases
• Describe the use cases briefly by applying terms
  with which the user is familiar (to make less
  ambiguous)
• Each use case has only one main actor
  – Isolate users from actor
  – Isolate actors from other actors(separate
    responsibilities)
  – Isolate use cases that have different initiating actors
How detailed must a use case be? When to
stop decomposing it and when to continue
• Develop system use case diag
• Draw package
  – to represent business domains of the system . for
    each package create child use case diagram
• Prepare at lest one senario for each use case
  – Each scenario shows different sequence of
    interaction , with all decisions definite
• When the lowest use case level is arrived, which
  can’t be broken further, sequence and
  collaboration diagram is drawn
Dividing use case into package
• Whole system is divided into many
  packages
• Each package encompasses multiple use
  cases
Developing effective documentation
• Effective document provides
  – Reference point
  – Form of communication
  – Reveals issues and gaps in the analysis and
    design
Guidelines for developing effective
            document
• Common cover
  – Identify document
  – Current version
  – Individuals responsible for doc
• 80-20 rule
  – 80% of work can be done with the 20% of doc.
  – 20% -easily accessible, 80%-only who needs can
    access
• Familiar vocabulary
• Make the doc as short as possible
• Organize the document
Unit 3

Contenu connexe

Tendances

web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoTFabMinds
 
Distributed objects & components of corba
Distributed objects & components of corbaDistributed objects & components of corba
Distributed objects & components of corbaMayuresh Wadekar
 
Grasp patterns and its types
Grasp patterns and its typesGrasp patterns and its types
Grasp patterns and its typesSyed Hassan Ali
 
Publish Subscribe pattern - Design Patterns
Publish Subscribe pattern - Design PatternsPublish Subscribe pattern - Design Patterns
Publish Subscribe pattern - Design PatternsRutvik Bapat
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
Lamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionLamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionNeelamani Samal
 
Object Modeling Techniques
Object Modeling TechniquesObject Modeling Techniques
Object Modeling TechniquesShilpa Wadhwani
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitivesStudent
 
Dynamic and Static Modeling
Dynamic and Static ModelingDynamic and Static Modeling
Dynamic and Static ModelingSaurabh Kumar
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systemskaran2190
 
Identifying classes and objects ooad
Identifying classes and objects ooadIdentifying classes and objects ooad
Identifying classes and objects ooadMelba Rosalind
 
OOAD UNIT I UML DIAGRAMS
OOAD UNIT I UML DIAGRAMSOOAD UNIT I UML DIAGRAMS
OOAD UNIT I UML DIAGRAMSMikel Raj
 
Distributed computing bsics
Distributed computing bsicsDistributed computing bsics
Distributed computing bsicsDeepak John
 
Lecture 5 - Agent communication
Lecture 5 - Agent communicationLecture 5 - Agent communication
Lecture 5 - Agent communicationAntonio Moreno
 

Tendances (20)

web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
Distributed objects & components of corba
Distributed objects & components of corbaDistributed objects & components of corba
Distributed objects & components of corba
 
Grasp patterns and its types
Grasp patterns and its typesGrasp patterns and its types
Grasp patterns and its types
 
Ooad presentatin crc cards
Ooad presentatin crc cardsOoad presentatin crc cards
Ooad presentatin crc cards
 
Ooad
OoadOoad
Ooad
 
Publish Subscribe pattern - Design Patterns
Publish Subscribe pattern - Design PatternsPublish Subscribe pattern - Design Patterns
Publish Subscribe pattern - Design Patterns
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Lamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionLamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusion
 
Object Modeling Techniques
Object Modeling TechniquesObject Modeling Techniques
Object Modeling Techniques
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 
Dynamic and Static Modeling
Dynamic and Static ModelingDynamic and Static Modeling
Dynamic and Static Modeling
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
Identifying classes and objects ooad
Identifying classes and objects ooadIdentifying classes and objects ooad
Identifying classes and objects ooad
 
OOAD UNIT I UML DIAGRAMS
OOAD UNIT I UML DIAGRAMSOOAD UNIT I UML DIAGRAMS
OOAD UNIT I UML DIAGRAMS
 
Distributed computing bsics
Distributed computing bsicsDistributed computing bsics
Distributed computing bsics
 
Ooad unit – 1 introduction
Ooad unit – 1 introductionOoad unit – 1 introduction
Ooad unit – 1 introduction
 
Lecture 5 - Agent communication
Lecture 5 - Agent communicationLecture 5 - Agent communication
Lecture 5 - Agent communication
 
Ooad
OoadOoad
Ooad
 
Design rule 3
Design rule 3Design rule 3
Design rule 3
 

En vedette

3. use cases
3. use cases3. use cases
3. use casesAPU
 
DOORS Tips and Tricks
DOORS Tips and TricksDOORS Tips and Tricks
DOORS Tips and TricksManageware
 
Object relationship model of software engineering,a subtopic of object orient...
Object relationship model of software engineering,a subtopic of object orient...Object relationship model of software engineering,a subtopic of object orient...
Object relationship model of software engineering,a subtopic of object orient...julia121214
 
Unit 5 usability and satisfaction test
Unit 5 usability and satisfaction testUnit 5 usability and satisfaction test
Unit 5 usability and satisfaction testgopal10scs185
 
Object Oriented Relationships
Object Oriented RelationshipsObject Oriented Relationships
Object Oriented RelationshipsTaher Barodawala
 
Object Oriented Approach for Software Development
Object Oriented Approach for Software DevelopmentObject Oriented Approach for Software Development
Object Oriented Approach for Software DevelopmentRishabh Soni
 
Dynamic Object-Oriented Requirements System (DOORS)
Dynamic Object-Oriented Requirements System (DOORS)Dynamic Object-Oriented Requirements System (DOORS)
Dynamic Object-Oriented Requirements System (DOORS)David Groff
 
Object Oriented Design Concept
Object Oriented Design ConceptObject Oriented Design Concept
Object Oriented Design ConceptSharath g
 
Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12koolkampus
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysisMahesh Bhalerao
 
Structured Vs, Object Oriented Analysis and Design
Structured Vs, Object Oriented Analysis and DesignStructured Vs, Object Oriented Analysis and Design
Structured Vs, Object Oriented Analysis and DesignMotaz Saad
 
Object oriented methodologies
Object oriented methodologiesObject oriented methodologies
Object oriented methodologiesnaina-rani
 

En vedette (20)

Analysis
AnalysisAnalysis
Analysis
 
Unit3
Unit3Unit3
Unit3
 
3. use cases
3. use cases3. use cases
3. use cases
 
3rd unit
3rd unit3rd unit
3rd unit
 
DOORS Tips and Tricks
DOORS Tips and TricksDOORS Tips and Tricks
DOORS Tips and Tricks
 
Object relationship model of software engineering,a subtopic of object orient...
Object relationship model of software engineering,a subtopic of object orient...Object relationship model of software engineering,a subtopic of object orient...
Object relationship model of software engineering,a subtopic of object orient...
 
Unit 5 usability and satisfaction test
Unit 5 usability and satisfaction testUnit 5 usability and satisfaction test
Unit 5 usability and satisfaction test
 
Object Oriented Relationships
Object Oriented RelationshipsObject Oriented Relationships
Object Oriented Relationships
 
Object Oriented Approach for Software Development
Object Oriented Approach for Software DevelopmentObject Oriented Approach for Software Development
Object Oriented Approach for Software Development
 
Dynamic Object-Oriented Requirements System (DOORS)
Dynamic Object-Oriented Requirements System (DOORS)Dynamic Object-Oriented Requirements System (DOORS)
Dynamic Object-Oriented Requirements System (DOORS)
 
Ooad
OoadOoad
Ooad
 
Unit3
Unit3Unit3
Unit3
 
Object Oriented Design Concept
Object Oriented Design ConceptObject Oriented Design Concept
Object Oriented Design Concept
 
Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12
 
Object Oriented Design
Object Oriented DesignObject Oriented Design
Object Oriented Design
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
 
Ooad
OoadOoad
Ooad
 
Structured Vs, Object Oriented Analysis and Design
Structured Vs, Object Oriented Analysis and DesignStructured Vs, Object Oriented Analysis and Design
Structured Vs, Object Oriented Analysis and Design
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
Object oriented methodologies
Object oriented methodologiesObject oriented methodologies
Object oriented methodologies
 

Similaire à Unit 3

Ppt ooad ooad3unit
Ppt ooad ooad3unitPpt ooad ooad3unit
Ppt ooad ooad3unitramyalaksha
 
UX Workshop at Startit@KBC
UX Workshop at Startit@KBCUX Workshop at Startit@KBC
UX Workshop at Startit@KBCUXprobe
 
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)Northern User Experience
 
evaluation technique uni 2
evaluation technique uni 2evaluation technique uni 2
evaluation technique uni 2vrgokila
 
Session1 methods research_question
Session1 methods research_questionSession1 methods research_question
Session1 methods research_questionmilolostinspace
 
Assessing user experience of e-books in academic libraries
Assessing user experience of e-books in academic librariesAssessing user experience of e-books in academic libraries
Assessing user experience of e-books in academic librariesTao Zhang
 
Software Practice 12 breakout - Tracking usage and impact of software
Software Practice 12 breakout - Tracking usage and impact of softwareSoftware Practice 12 breakout - Tracking usage and impact of software
Software Practice 12 breakout - Tracking usage and impact of softwareSoftwarePractice
 
INTELLECTUAL AND PROPERTY RIGHTSunit 1 R23 (1).pptx
INTELLECTUAL AND PROPERTY RIGHTSunit 1 R23 (1).pptxINTELLECTUAL AND PROPERTY RIGHTSunit 1 R23 (1).pptx
INTELLECTUAL AND PROPERTY RIGHTSunit 1 R23 (1).pptxSamuelAbragham
 
Analytic emperical Mehods
Analytic emperical MehodsAnalytic emperical Mehods
Analytic emperical MehodsM Surendar
 
Lecture 6 Interaction Design for VR
Lecture 6 Interaction Design for VRLecture 6 Interaction Design for VR
Lecture 6 Interaction Design for VRMark Billinghurst
 
Validating Ideas Through Prototyping
Validating Ideas Through PrototypingValidating Ideas Through Prototyping
Validating Ideas Through PrototypingChris Risdon
 
Terra incognita with no GPS: A case study approach to mapping assessment
Terra incognita with no GPS: A case study approach to mapping assessmentTerra incognita with no GPS: A case study approach to mapping assessment
Terra incognita with no GPS: A case study approach to mapping assessmentMargot
 
User Experience Design Fundamentals - Part 1: Users & Goals
User Experience Design Fundamentals - Part 1: Users & GoalsUser Experience Design Fundamentals - Part 1: Users & Goals
User Experience Design Fundamentals - Part 1: Users & GoalsLaura B
 
Methods of research
Methods of researchMethods of research
Methods of researchNavneet Nair
 
COMP 4010: Lecture 5 - Interaction Design for Virtual Reality
COMP 4010: Lecture 5 - Interaction Design for Virtual RealityCOMP 4010: Lecture 5 - Interaction Design for Virtual Reality
COMP 4010: Lecture 5 - Interaction Design for Virtual RealityMark Billinghurst
 
Medical Research paper writing
Medical Research paper writingMedical Research paper writing
Medical Research paper writingdrnikhilpanse
 
Introduction to UX Research: Fundamentals of Contextual Inquiry
Introduction to UX Research: Fundamentals of Contextual InquiryIntroduction to UX Research: Fundamentals of Contextual Inquiry
Introduction to UX Research: Fundamentals of Contextual InquiryMarc Niola
 

Similaire à Unit 3 (20)

Ppt ooad ooad3unit
Ppt ooad ooad3unitPpt ooad ooad3unit
Ppt ooad ooad3unit
 
User Research
User ResearchUser Research
User Research
 
UX Workshop at Startit@KBC
UX Workshop at Startit@KBCUX Workshop at Startit@KBC
UX Workshop at Startit@KBC
 
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)
 
R vaughan
R vaughanR vaughan
R vaughan
 
evaluation technique uni 2
evaluation technique uni 2evaluation technique uni 2
evaluation technique uni 2
 
Session1 methods research_question
Session1 methods research_questionSession1 methods research_question
Session1 methods research_question
 
Assessing user experience of e-books in academic libraries
Assessing user experience of e-books in academic librariesAssessing user experience of e-books in academic libraries
Assessing user experience of e-books in academic libraries
 
Software Practice 12 breakout - Tracking usage and impact of software
Software Practice 12 breakout - Tracking usage and impact of softwareSoftware Practice 12 breakout - Tracking usage and impact of software
Software Practice 12 breakout - Tracking usage and impact of software
 
INTELLECTUAL AND PROPERTY RIGHTSunit 1 R23 (1).pptx
INTELLECTUAL AND PROPERTY RIGHTSunit 1 R23 (1).pptxINTELLECTUAL AND PROPERTY RIGHTSunit 1 R23 (1).pptx
INTELLECTUAL AND PROPERTY RIGHTSunit 1 R23 (1).pptx
 
Analytic emperical Mehods
Analytic emperical MehodsAnalytic emperical Mehods
Analytic emperical Mehods
 
Lecture 6 Interaction Design for VR
Lecture 6 Interaction Design for VRLecture 6 Interaction Design for VR
Lecture 6 Interaction Design for VR
 
Validating Ideas Through Prototyping
Validating Ideas Through PrototypingValidating Ideas Through Prototyping
Validating Ideas Through Prototyping
 
Terra incognita with no GPS: A case study approach to mapping assessment
Terra incognita with no GPS: A case study approach to mapping assessmentTerra incognita with no GPS: A case study approach to mapping assessment
Terra incognita with no GPS: A case study approach to mapping assessment
 
User Experience Design Fundamentals - Part 1: Users & Goals
User Experience Design Fundamentals - Part 1: Users & GoalsUser Experience Design Fundamentals - Part 1: Users & Goals
User Experience Design Fundamentals - Part 1: Users & Goals
 
Methods of research
Methods of researchMethods of research
Methods of research
 
COMP 4010: Lecture 5 - Interaction Design for Virtual Reality
COMP 4010: Lecture 5 - Interaction Design for Virtual RealityCOMP 4010: Lecture 5 - Interaction Design for Virtual Reality
COMP 4010: Lecture 5 - Interaction Design for Virtual Reality
 
Medical Research paper writing
Medical Research paper writingMedical Research paper writing
Medical Research paper writing
 
E3 chap-09
E3 chap-09E3 chap-09
E3 chap-09
 
Introduction to UX Research: Fundamentals of Contextual Inquiry
Introduction to UX Research: Fundamentals of Contextual InquiryIntroduction to UX Research: Fundamentals of Contextual Inquiry
Introduction to UX Research: Fundamentals of Contextual Inquiry
 

Plus de gopal10scs185 (20)

Os5
Os5Os5
Os5
 
Os4
Os4Os4
Os4
 
Os1
Os1Os1
Os1
 
Os8
Os8Os8
Os8
 
Os8
Os8Os8
Os8
 
Os7
Os7Os7
Os7
 
Os6
Os6Os6
Os6
 
Os4
Os4Os4
Os4
 
Os3
Os3Os3
Os3
 
Os2
Os2Os2
Os2
 
Unit4 desiging classes
Unit4 desiging classesUnit4 desiging classes
Unit4 desiging classes
 
Unit three identifying actors
Unit three  identifying actorsUnit three  identifying actors
Unit three identifying actors
 
Unit 5 testing
Unit 5 testingUnit 5 testing
Unit 5 testing
 
Unit 5
Unit 5Unit 5
Unit 5
 
Unit 5 usability and satisfaction test
Unit 5 usability and satisfaction testUnit 5 usability and satisfaction test
Unit 5 usability and satisfaction test
 
Unit 5 testing -software quality assurance
Unit 5  testing -software quality assuranceUnit 5  testing -software quality assurance
Unit 5 testing -software quality assurance
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 4 designing classes
Unit 4  designing classesUnit 4  designing classes
Unit 4 designing classes
 
Unit 3 object analysis-classification
Unit 3 object analysis-classificationUnit 3 object analysis-classification
Unit 3 object analysis-classification
 
Unit 3 attributes, methods, relationships
Unit 3 attributes, methods, relationshipsUnit 3 attributes, methods, relationships
Unit 3 attributes, methods, relationships
 

Dernier

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 

Dernier (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 

Unit 3

  • 1. Unit 3 Object Oriented analysis process 2. Identifying use cases 3. Classification 4. Identifying object relationships,attributes and methods
  • 2. Identifying use cases: Objective • Use case modeling and analysis • Identifying actors • Identifying use cases • Developing effective documentation
  • 3. Identifying use cases • Introduction • Objective of analysis – To capture complete, unambiguous , consistent picture of requirements of system – Separating system’s behavior from behavior implementation • What the system must do to satisfy users requirement and needs • Won't specify how to do it • Requires to view the system from users perspective
  • 4. Cont.. Of introduction • Transformation 1 – users need to problem statement and requirement • Tools to extract information about a system – examination of existing system documentation – Interviews – Questionnaire – observation
  • 5. Why analysis is a difficult activity • Analysis activity involves understanding – problem – Associated constraints – Methods to overcome this constraints • Iterative process
  • 6. Cont.. • Sources that makes analysis difficult – Fuzzy descriptions • Bcs of interpretation problem – Incomplete requirements • Due to users forgetting to identify them, High cost, politics – Unnecessary features
  • 7. Business object analysis: understanding the business layer • Process of – understanding sys requirement • Developing use case – Discussing uses and objectives with users – Understanding expected inputs, desired response • Prototype – Helps to understand how the system ’ll be used – Establishing goals • Outcome of this process – Identifying classes – Relationship
  • 8. Use case driven object oriented analysis: the unified approach Identify Develop Develop classes , Refine actors usecase & interaction relationships, & activity diagram attributes, iterate diagram methods Build prototype
  • 9. Business process modelling • Not necessary for all project • When required business process and requirements can be modelled to any level of detail • Activity diagram support this modelling • disadv – Time consuming process • Adv – familiarity
  • 10. yes yes Go to yes Go to counter and counter and check out return the books Return books book? yes yes Interlibrary loan borrow no book? no Search for book yes Do Do search research on topics no yes Read news Read news paper and paper? no magazine Acivty diagram –library system
  • 11. Use case model • Senarios for understanding the system • Interaction bw user and system • Captures users goal and systems responsibility • Used to discover classes and relationship • Developed by talking to users • Use case model – Provides external view of the system • Object model (UML class diagram) – Provides internal view
  • 12. Use cases and microscope • A use case is a sequence of transaction in a system whose task is to yield results of measurable value to an individual actor of the system • Actor – Role played by the user with respect to the system – Single actor may perform many use cases – Can be external system – Can be one get value from the system, or just participate in the use case
  • 13. Borrow books uses Check library card extends uses Get an interlibrary loan uses Return books member Circulation clerk Do research Read books and news paper Purchase supplies supplier
  • 14. Uses and extends association • Uses – common sub flows are extracted and separate use case is created – Relationship bw usecase and extracted one is called uses relationships • Extends – Used when use case is similar to other, but do bit more or more speciliazed
  • 15. • Abstract use case – No initiating actor – Used by concrete use cases • concrete use cases – Interacts with actors
  • 16. Identifying actors • Actor – Role played by the user • Actors found thru answers of following question – Who is using the system – Who is affected by the system – Which group needs help from the system – Who affects the system, which user groups are needed by the system to perform it functions – Which external h/w or other systems use the system to perform tasks – What prob does this application solve and for whom – How do users use the system(ie use case), and what they are doing with the system • Accounts need not be human. It is an external system
  • 17. Identifying actor (cont..) • Two-three rule – Used to identify the actors – Start with naming at least 2 or 3 , people who could serve as the actor in the system.other actor can be identified in the subsequent iteration
  • 18. Guideline for finding use cases • For each actor, find the tasks and function that the actor should be able to perform or that the system needs the actor to perform (use case) • Name the use cases • Describe the use cases briefly by applying terms with which the user is familiar (to make less ambiguous) • Each use case has only one main actor – Isolate users from actor – Isolate actors from other actors(separate responsibilities) – Isolate use cases that have different initiating actors
  • 19. How detailed must a use case be? When to stop decomposing it and when to continue • Develop system use case diag • Draw package – to represent business domains of the system . for each package create child use case diagram • Prepare at lest one senario for each use case – Each scenario shows different sequence of interaction , with all decisions definite • When the lowest use case level is arrived, which can’t be broken further, sequence and collaboration diagram is drawn
  • 20. Dividing use case into package • Whole system is divided into many packages • Each package encompasses multiple use cases
  • 21. Developing effective documentation • Effective document provides – Reference point – Form of communication – Reveals issues and gaps in the analysis and design
  • 22. Guidelines for developing effective document • Common cover – Identify document – Current version – Individuals responsible for doc • 80-20 rule – 80% of work can be done with the 20% of doc. – 20% -easily accessible, 80%-only who needs can access • Familiar vocabulary • Make the doc as short as possible • Organize the document