SlideShare ist ein Scribd-Unternehmen logo
1 von 30
   Software requirement engineering also called
    requirement analysis bridges the gap
    between system engineering and software
    design.
                  System
                  Engg.
                               S/w req.
                               analysis
                                              S/w design




        Participated by both the customer and developer
Software requirements and analysis--
 Problem recognition
 Evaluation and synthesis
    ◦ focus is on what not how
   Modeling
   Specification
   Review
  Before requirements can be analyzed, modeled or
   specified, they must be gathered through an
   elicitation process.
2. Initiating the process
•   The most commonly used requirement elicitation technique is
    to conduct a meeting/interview.
•   Participants- analyst and the customer.
•   Type of question asked---
    Context free, process questions, meta questions.
2. Facilitated Application Specification
    Technique (FAST) :
• A team oriented approach to requirement

  gathering.
• Encourages creation of a joint team of

  customers and developers who work together
  to identify the problem, propose solution and
  identify a preliminary set of requirements.
Basic guidelines for FAST :
•   Meeting is arranged at a neutral site and attended by
    both s/w engineers and customers.
•   Rules for preparation and participation are established.
•   Agenda is set.
•   Appoint a facilitator to control the meeting (can be
    developer, customer or outside expert.)
•   Participants should not criticize and debate.
    Goal should be to identify problems, propose solution
    and identify a preliminary set of requirements
FAST session preparation :
• Initial meetings between customer and

  developer occur where scope is established
  and an overall perception of a solution is
  determined.
• ½ page product request is documented .
• Meeting place, time, date for FAST are

  selected and facilitator is chosen.
• Product request is distributed to all attendees

  before meeting date.
Every FAST attendee is asked to make :
2. List of objects.

3. List of services.

4. List of constraints.
5. List of performance criteria.

Activities of FAST session.
• Each participant presents his/her list of constraints.

• Combined list is prepared eliminating redundant

   entries and adding new ideas.
• List is finalized by the facilitator.
A microprocessor based home security system needs to be built that
would protect against a variety of undesirable situations such as
smoke, fire , illegal entry etc.
The product would use appropriate fire and smoke detectors, window
and door sensors and an alarm that would be set when an untoward
situation occurs and automatically telephone a monitoring agency.
List of objects : Fire detector, smoke detector, window and door
                    sensors, telephone, alarm.
List of services : setting the alarm , monitoring the sensors,
          dialing the phone etc.
List of constraints : Manufacturing cost less than 80 $, must be
                       user friendly, must interface directly to the
             standard phone line.


Performance Criteria : Sensor event should be recognized within 1
  sec.
3. Quality Function Deployment
   This is a technique that translates the needs of the customer into
   technical requirements for software.
 It emphasizes an understanding of what is valuable to the customer.
   Customer satisfaction is of prime importance.
 It identifies three types of requirements
   ◦ Normal requirements: These requirements are the objectives
     and goals stated for a software during meetings with the
     customer.
     Eg : For a Result management system –
     Normal requirement could be-
   • Merit list report
   • Failed student report
   • Calculation of results
◦ Expected requirements: These requirements are
  implicit to the software and are so fundamental that the
  customer does not explicitly state them.
  Eg. Usability, Reliability, ease of installation

◦ Exciting requirements: These requirements are
  features that go beyond the customer's expectations
  and prove to be very satisfying when present.
  Eg :Sophisticated virus protection system
4. Use Case
 It describes the sequence of interactions
  between actors and the system necessary to
  deliver the service that satisfies the goal.
How to create a use case ?
• Identify the different users (actors) of the

  system.
• Create use cases which captures who (actor)

  does what (interaction) without dealing with
  the system internals.
•    Used to gain a better understanding of the
     problem.
•    Based on constructing a partial implementation of a
     system
•    Prototyping can be :
4.   Throwaway (Closed ended)
•    Here the prototype serves only to demonstrate
     requirements and is discarded after the desired
     knowledge is gained.


•    Since the prototype is ultimately discarded it need
     not be maintainable or use efficient algorithms.
2. Evolutionary (Open ended)
•   Once the prototype has been used and requisite knowledge
    has been gained it is eventually incorporated into the final
    system.
•   Must exhibit all quality attributes of the final product.
Tools used to conduct rapid prototyping :
5.  Fourth generation techniques :
•   4GLs reduce programming effort, the time it takes to
    develop software, and the cost of software development.
Report generators (Oracle repots,QUEST, GEMbase)
Screen generators (Oracle forms etc)
Database Query Languages (SQL, Ingres etc )


•   These tools generate an executable code quickly and hence
    are ideal for rapid prototyping
2. Reusable software components :
• Assemble rather than build the prototype by

  using a set of existing s/w components
3. Formal Specification languages:
• Replace natural language specifcation
• Eg. Set notation , algebraic notation.
• There are tools which convert these formal

  language specifications into executable code.
   The software requirement specification is produced at the
    culmination of the analysis task.
   SRS document is a contract between the development team and the
    customer.
   The SRS document is known as black-box specification since the
    system is considered as a black box whose internal details are not
    known and only its external is visible
SRS
SRS
SRS
SRS
SRS
SRS
SRS
SRS
SRS
SRS
   SRS-foundation of the development stage.
   Review is conducted to ensure completeness,
    accuracy and consistency in SRS.
   Avoid vague terms in SRS(usually,often)
   Once review is complete SRS is signed off by
    both customer and developer.

Weitere ähnliche Inhalte

Was ist angesagt?

Software Process Models
Software Process ModelsSoftware Process Models
Software Process ModelsHassan A-j
 
Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5koolkampus
 
verification and validation
verification and validationverification and validation
verification and validationDinesh Pasi
 
Software process and project metrics
Software process and project metricsSoftware process and project metrics
Software process and project metricsIndu Sharma Bhardwaj
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assuranceEr. Nancy
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality AssuranceSachithra Gayan
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process FrameworkJAINAM KAPADIYA
 
Requirement specification (SRS)
Requirement specification (SRS)Requirement specification (SRS)
Requirement specification (SRS)kunj desai
 
Defining the Problem - Goals and requirements
Defining the Problem - Goals and requirementsDefining the Problem - Goals and requirements
Defining the Problem - Goals and requirementsStephennancy
 
Quality and productivity factors
Quality and productivity factorsQuality and productivity factors
Quality and productivity factorsNancyBeaulah_R
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance Webtech Learning
 
Designing Techniques in Software Engineering
Designing Techniques in Software EngineeringDesigning Techniques in Software Engineering
Designing Techniques in Software Engineeringkirupasuchi1996
 
Evolving role of Software
Evolving role of SoftwareEvolving role of Software
Evolving role of SoftwareShankar Dahal
 

Was ist angesagt? (20)

Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5
 
Software Metrics
Software MetricsSoftware Metrics
Software Metrics
 
verification and validation
verification and validationverification and validation
verification and validation
 
Software Development Process
Software Development ProcessSoftware Development Process
Software Development Process
 
Software process and project metrics
Software process and project metricsSoftware process and project metrics
Software process and project metrics
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process Framework
 
Requirement specification (SRS)
Requirement specification (SRS)Requirement specification (SRS)
Requirement specification (SRS)
 
Staffing level estimation
Staffing level estimation Staffing level estimation
Staffing level estimation
 
Defining the Problem - Goals and requirements
Defining the Problem - Goals and requirementsDefining the Problem - Goals and requirements
Defining the Problem - Goals and requirements
 
Analysis modeling
Analysis modelingAnalysis modeling
Analysis modeling
 
Analysis modeling
Analysis modelingAnalysis modeling
Analysis modeling
 
Software requirements
Software requirementsSoftware requirements
Software requirements
 
COCOMO model
COCOMO modelCOCOMO model
COCOMO model
 
Quality and productivity factors
Quality and productivity factorsQuality and productivity factors
Quality and productivity factors
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance
 
Designing Techniques in Software Engineering
Designing Techniques in Software EngineeringDesigning Techniques in Software Engineering
Designing Techniques in Software Engineering
 
Evolving role of Software
Evolving role of SoftwareEvolving role of Software
Evolving role of Software
 

Andere mochten auch

CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelmohamed khalaf alla mohamedain
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specificationKrishnasai Gudavalli
 
Design concepts and principles
Design concepts and principlesDesign concepts and principles
Design concepts and principlessaurabhshertukde
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysisasimnawaz54
 
Image analysis basics and principles
Image analysis basics and principlesImage analysis basics and principles
Image analysis basics and principlesMohsin Siddique
 
Software analysis and it's principles
Software analysis and it's principlesSoftware analysis and it's principles
Software analysis and it's principlesGhulam Abbas
 
Beit 381 se lec 15 - 16 - 12 mar27 - req engg 1 of 3
Beit 381 se lec 15 - 16 -  12 mar27 - req engg 1 of 3Beit 381 se lec 15 - 16 -  12 mar27 - req engg 1 of 3
Beit 381 se lec 15 - 16 - 12 mar27 - req engg 1 of 3babak danyal
 
Cocomo ii estimation
Cocomo ii estimationCocomo ii estimation
Cocomo ii estimationjujin1810
 
SRS(software requirement specification)
SRS(software requirement specification)SRS(software requirement specification)
SRS(software requirement specification)Akash Kumar Dhameja
 
Kano Analysis and Software Requrements
Kano Analysis and Software RequrementsKano Analysis and Software Requrements
Kano Analysis and Software RequrementsCraig Brown
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9Ian Sommerville
 
Flow oriented modeling
Flow oriented modelingFlow oriented modeling
Flow oriented modelingramyaaswin
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9Ian Sommerville
 
Lecture 4 software process model (2)
Lecture 4   software process model (2)Lecture 4   software process model (2)
Lecture 4 software process model (2)IIUI
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9Ian Sommerville
 
Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3Ahmed Alageed
 

Andere mochten auch (20)

Analysis modelling
Analysis modellingAnalysis modelling
Analysis modelling
 
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
 
Design concepts and principles
Design concepts and principlesDesign concepts and principles
Design concepts and principles
 
Modeling and analysis
Modeling and analysisModeling and analysis
Modeling and analysis
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysis
 
Image analysis basics and principles
Image analysis basics and principlesImage analysis basics and principles
Image analysis basics and principles
 
Software analysis and it's principles
Software analysis and it's principlesSoftware analysis and it's principles
Software analysis and it's principles
 
Beit 381 se lec 15 - 16 - 12 mar27 - req engg 1 of 3
Beit 381 se lec 15 - 16 -  12 mar27 - req engg 1 of 3Beit 381 se lec 15 - 16 -  12 mar27 - req engg 1 of 3
Beit 381 se lec 15 - 16 - 12 mar27 - req engg 1 of 3
 
Cocomo ii estimation
Cocomo ii estimationCocomo ii estimation
Cocomo ii estimation
 
SRS(software requirement specification)
SRS(software requirement specification)SRS(software requirement specification)
SRS(software requirement specification)
 
Kano Analysis and Software Requrements
Kano Analysis and Software RequrementsKano Analysis and Software Requrements
Kano Analysis and Software Requrements
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9
 
Flow oriented modeling
Flow oriented modelingFlow oriented modeling
Flow oriented modeling
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
 
Uml
UmlUml
Uml
 
Lecture 4 software process model (2)
Lecture 4   software process model (2)Lecture 4   software process model (2)
Lecture 4 software process model (2)
 
Kano
KanoKano
Kano
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9
 
Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3
 

Ähnlich wie Analysis concepts and principles

Softwareenggineering lab manual
Softwareenggineering lab manualSoftwareenggineering lab manual
Softwareenggineering lab manualVivek Kumar Sinha
 
Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )eshtiyak
 
Software Requirements
Software RequirementsSoftware Requirements
Software RequirementsNethan Shaik
 
Software Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationSoftware Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationNishu Rastogi
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement AnalysisSADEED AMEEN
 
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdfJayanthi Kannan MK
 
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxUNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxLeahRachael
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringSweta Kumari Barnwal
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to qualityDhanashriAmbre
 
SE Unit 2(1).pptx
SE Unit 2(1).pptxSE Unit 2(1).pptx
SE Unit 2(1).pptxaryan631999
 
Software testing
Software testingSoftware testing
Software testingRavi Dasari
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notesSiva Ayyakutti
 

Ähnlich wie Analysis concepts and principles (20)

Softwareenggineering lab manual
Softwareenggineering lab manualSoftwareenggineering lab manual
Softwareenggineering lab manual
 
Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )
 
lec 3rd.pptx
lec 3rd.pptxlec 3rd.pptx
lec 3rd.pptx
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
Software Requirements
Software RequirementsSoftware Requirements
Software Requirements
 
Software Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationSoftware Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and Specification
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
software engineering
software engineering software engineering
software engineering
 
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
 
SE Unit-1.pptx
SE Unit-1.pptxSE Unit-1.pptx
SE Unit-1.pptx
 
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxUNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to quality
 
SE Unit 2(1).pptx
SE Unit 2(1).pptxSE Unit 2(1).pptx
SE Unit 2(1).pptx
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Requirement engineering
Requirement engineeringRequirement engineering
Requirement engineering
 
Software testing
Software testingSoftware testing
Software testing
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notes
 
Sdlc phases
Sdlc phasesSdlc phases
Sdlc phases
 
Sdlc phases
Sdlc phasesSdlc phases
Sdlc phases
 

Mehr von saurabhshertukde (17)

Revision sql te it new syllabus
Revision sql te it new syllabusRevision sql te it new syllabus
Revision sql te it new syllabus
 
Oodbms ch 20
Oodbms ch 20Oodbms ch 20
Oodbms ch 20
 
Introduction er & eer
Introduction er & eerIntroduction er & eer
Introduction er & eer
 
Introduction er & eer
Introduction er &  eerIntroduction er &  eer
Introduction er & eer
 
Integrity & security
Integrity & securityIntegrity & security
Integrity & security
 
Er model
Er modelEr model
Er model
 
Er & eer to relational mapping
Er & eer to relational mappingEr & eer to relational mapping
Er & eer to relational mapping
 
Eer case study
Eer case studyEer case study
Eer case study
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
J2 ee archi
J2 ee archiJ2 ee archi
J2 ee archi
 
J2 ee architecture
J2 ee architectureJ2 ee architecture
J2 ee architecture
 
Software project-scheduling
Software project-schedulingSoftware project-scheduling
Software project-scheduling
 
Softwareproject planning
Softwareproject planningSoftwareproject planning
Softwareproject planning
 
Pressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelsPressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-models
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Analysis concepts and principles

  • 1.
  • 2. Software requirement engineering also called requirement analysis bridges the gap between system engineering and software design. System Engg. S/w req. analysis S/w design Participated by both the customer and developer
  • 3. Software requirements and analysis--  Problem recognition  Evaluation and synthesis ◦ focus is on what not how  Modeling  Specification  Review
  • 4.  Before requirements can be analyzed, modeled or specified, they must be gathered through an elicitation process. 2. Initiating the process • The most commonly used requirement elicitation technique is to conduct a meeting/interview. • Participants- analyst and the customer. • Type of question asked--- Context free, process questions, meta questions.
  • 5. 2. Facilitated Application Specification Technique (FAST) : • A team oriented approach to requirement gathering. • Encourages creation of a joint team of customers and developers who work together to identify the problem, propose solution and identify a preliminary set of requirements.
  • 6.
  • 7. Basic guidelines for FAST : • Meeting is arranged at a neutral site and attended by both s/w engineers and customers. • Rules for preparation and participation are established. • Agenda is set. • Appoint a facilitator to control the meeting (can be developer, customer or outside expert.) • Participants should not criticize and debate. Goal should be to identify problems, propose solution and identify a preliminary set of requirements
  • 8. FAST session preparation : • Initial meetings between customer and developer occur where scope is established and an overall perception of a solution is determined. • ½ page product request is documented . • Meeting place, time, date for FAST are selected and facilitator is chosen. • Product request is distributed to all attendees before meeting date.
  • 9. Every FAST attendee is asked to make : 2. List of objects. 3. List of services. 4. List of constraints. 5. List of performance criteria. Activities of FAST session. • Each participant presents his/her list of constraints. • Combined list is prepared eliminating redundant entries and adding new ideas. • List is finalized by the facilitator.
  • 10. A microprocessor based home security system needs to be built that would protect against a variety of undesirable situations such as smoke, fire , illegal entry etc. The product would use appropriate fire and smoke detectors, window and door sensors and an alarm that would be set when an untoward situation occurs and automatically telephone a monitoring agency. List of objects : Fire detector, smoke detector, window and door sensors, telephone, alarm. List of services : setting the alarm , monitoring the sensors, dialing the phone etc. List of constraints : Manufacturing cost less than 80 $, must be user friendly, must interface directly to the standard phone line. Performance Criteria : Sensor event should be recognized within 1 sec.
  • 11. 3. Quality Function Deployment This is a technique that translates the needs of the customer into technical requirements for software.  It emphasizes an understanding of what is valuable to the customer. Customer satisfaction is of prime importance.  It identifies three types of requirements ◦ Normal requirements: These requirements are the objectives and goals stated for a software during meetings with the customer. Eg : For a Result management system – Normal requirement could be- • Merit list report • Failed student report • Calculation of results
  • 12. ◦ Expected requirements: These requirements are implicit to the software and are so fundamental that the customer does not explicitly state them. Eg. Usability, Reliability, ease of installation ◦ Exciting requirements: These requirements are features that go beyond the customer's expectations and prove to be very satisfying when present. Eg :Sophisticated virus protection system
  • 13. 4. Use Case  It describes the sequence of interactions between actors and the system necessary to deliver the service that satisfies the goal. How to create a use case ? • Identify the different users (actors) of the system. • Create use cases which captures who (actor) does what (interaction) without dealing with the system internals.
  • 14.
  • 15.
  • 16. Used to gain a better understanding of the problem. • Based on constructing a partial implementation of a system • Prototyping can be : 4. Throwaway (Closed ended) • Here the prototype serves only to demonstrate requirements and is discarded after the desired knowledge is gained. • Since the prototype is ultimately discarded it need not be maintainable or use efficient algorithms.
  • 17. 2. Evolutionary (Open ended) • Once the prototype has been used and requisite knowledge has been gained it is eventually incorporated into the final system. • Must exhibit all quality attributes of the final product. Tools used to conduct rapid prototyping : 5. Fourth generation techniques : • 4GLs reduce programming effort, the time it takes to develop software, and the cost of software development. Report generators (Oracle repots,QUEST, GEMbase) Screen generators (Oracle forms etc) Database Query Languages (SQL, Ingres etc ) • These tools generate an executable code quickly and hence are ideal for rapid prototyping
  • 18. 2. Reusable software components : • Assemble rather than build the prototype by using a set of existing s/w components 3. Formal Specification languages: • Replace natural language specifcation • Eg. Set notation , algebraic notation. • There are tools which convert these formal language specifications into executable code.
  • 19. The software requirement specification is produced at the culmination of the analysis task.  SRS document is a contract between the development team and the customer.  The SRS document is known as black-box specification since the system is considered as a black box whose internal details are not known and only its external is visible
  • 20. SRS
  • 21. SRS
  • 22. SRS
  • 23. SRS
  • 24. SRS
  • 25. SRS
  • 26. SRS
  • 27. SRS
  • 28. SRS
  • 29. SRS
  • 30. SRS-foundation of the development stage.  Review is conducted to ensure completeness, accuracy and consistency in SRS.  Avoid vague terms in SRS(usually,often)  Once review is complete SRS is signed off by both customer and developer.