SlideShare uma empresa Scribd logo
1 de 30
   Software requirement engineering also called
    requirement analysis bridges the gap
    between system engineering and software
    design.
                  System
                  Engg.
                               S/w req.
                               analysis
                                              S/w design




        Participated by both the customer and developer
Software requirements and analysis--
 Problem recognition
 Evaluation and synthesis
    ◦ focus is on what not how
   Modeling
   Specification
   Review
  Before requirements can be analyzed, modeled or
   specified, they must be gathered through an
   elicitation process.
2. Initiating the process
•   The most commonly used requirement elicitation technique is
    to conduct a meeting/interview.
•   Participants- analyst and the customer.
•   Type of question asked---
    Context free, process questions, meta questions.
2. Facilitated Application Specification
    Technique (FAST) :
• A team oriented approach to requirement

  gathering.
• Encourages creation of a joint team of

  customers and developers who work together
  to identify the problem, propose solution and
  identify a preliminary set of requirements.
Basic guidelines for FAST :
•   Meeting is arranged at a neutral site and attended by
    both s/w engineers and customers.
•   Rules for preparation and participation are established.
•   Agenda is set.
•   Appoint a facilitator to control the meeting (can be
    developer, customer or outside expert.)
•   Participants should not criticize and debate.
    Goal should be to identify problems, propose solution
    and identify a preliminary set of requirements
FAST session preparation :
• Initial meetings between customer and

  developer occur where scope is established
  and an overall perception of a solution is
  determined.
• ½ page product request is documented .
• Meeting place, time, date for FAST are

  selected and facilitator is chosen.
• Product request is distributed to all attendees

  before meeting date.
Every FAST attendee is asked to make :
2. List of objects.

3. List of services.

4. List of constraints.
5. List of performance criteria.

Activities of FAST session.
• Each participant presents his/her list of constraints.

• Combined list is prepared eliminating redundant

   entries and adding new ideas.
• List is finalized by the facilitator.
A microprocessor based home security system needs to be built that
would protect against a variety of undesirable situations such as
smoke, fire , illegal entry etc.
The product would use appropriate fire and smoke detectors, window
and door sensors and an alarm that would be set when an untoward
situation occurs and automatically telephone a monitoring agency.
List of objects : Fire detector, smoke detector, window and door
                    sensors, telephone, alarm.
List of services : setting the alarm , monitoring the sensors,
          dialing the phone etc.
List of constraints : Manufacturing cost less than 80 $, must be
                       user friendly, must interface directly to the
             standard phone line.


Performance Criteria : Sensor event should be recognized within 1
  sec.
3. Quality Function Deployment
   This is a technique that translates the needs of the customer into
   technical requirements for software.
 It emphasizes an understanding of what is valuable to the customer.
   Customer satisfaction is of prime importance.
 It identifies three types of requirements
   ◦ Normal requirements: These requirements are the objectives
     and goals stated for a software during meetings with the
     customer.
     Eg : For a Result management system –
     Normal requirement could be-
   • Merit list report
   • Failed student report
   • Calculation of results
◦ Expected requirements: These requirements are
  implicit to the software and are so fundamental that the
  customer does not explicitly state them.
  Eg. Usability, Reliability, ease of installation

◦ Exciting requirements: These requirements are
  features that go beyond the customer's expectations
  and prove to be very satisfying when present.
  Eg :Sophisticated virus protection system
4. Use Case
 It describes the sequence of interactions
  between actors and the system necessary to
  deliver the service that satisfies the goal.
How to create a use case ?
• Identify the different users (actors) of the

  system.
• Create use cases which captures who (actor)

  does what (interaction) without dealing with
  the system internals.
•    Used to gain a better understanding of the
     problem.
•    Based on constructing a partial implementation of a
     system
•    Prototyping can be :
4.   Throwaway (Closed ended)
•    Here the prototype serves only to demonstrate
     requirements and is discarded after the desired
     knowledge is gained.


•    Since the prototype is ultimately discarded it need
     not be maintainable or use efficient algorithms.
2. Evolutionary (Open ended)
•   Once the prototype has been used and requisite knowledge
    has been gained it is eventually incorporated into the final
    system.
•   Must exhibit all quality attributes of the final product.
Tools used to conduct rapid prototyping :
5.  Fourth generation techniques :
•   4GLs reduce programming effort, the time it takes to
    develop software, and the cost of software development.
Report generators (Oracle repots,QUEST, GEMbase)
Screen generators (Oracle forms etc)
Database Query Languages (SQL, Ingres etc )


•   These tools generate an executable code quickly and hence
    are ideal for rapid prototyping
2. Reusable software components :
• Assemble rather than build the prototype by

  using a set of existing s/w components
3. Formal Specification languages:
• Replace natural language specifcation
• Eg. Set notation , algebraic notation.
• There are tools which convert these formal

  language specifications into executable code.
   The software requirement specification is produced at the
    culmination of the analysis task.
   SRS document is a contract between the development team and the
    customer.
   The SRS document is known as black-box specification since the
    system is considered as a black box whose internal details are not
    known and only its external is visible
SRS
SRS
SRS
SRS
SRS
SRS
SRS
SRS
SRS
SRS
   SRS-foundation of the development stage.
   Review is conducted to ensure completeness,
    accuracy and consistency in SRS.
   Avoid vague terms in SRS(usually,often)
   Once review is complete SRS is signed off by
    both customer and developer.

Mais conteúdo relacionado

Mais procurados

Capability Maturity Model (CMM) in Software Engineering
Capability Maturity Model (CMM) in Software EngineeringCapability Maturity Model (CMM) in Software Engineering
Capability Maturity Model (CMM) in Software EngineeringFaizanAhmad340414
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assuranceAman Adhikari
 
Designing Techniques in Software Engineering
Designing Techniques in Software EngineeringDesigning Techniques in Software Engineering
Designing Techniques in Software Engineeringkirupasuchi1996
 
Requirement analysis and specification
Requirement analysis and specificationRequirement analysis and specification
Requirement analysis and specificationM.E. at GTU- PG School
 
Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9koolkampus
 
Estimating Software Maintenance Costs
Estimating Software Maintenance CostsEstimating Software Maintenance Costs
Estimating Software Maintenance Costslalithambiga kamaraj
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration ManagementPratik Tandel
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process ModelsAtul Karmyal
 
Chapter 1 2 - some size factors
Chapter 1   2 - some size factorsChapter 1   2 - some size factors
Chapter 1 2 - some size factorsNancyBeaulah_R
 
Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)Er. Shiva K. Shrestha
 
Quality and productivity factors
Quality and productivity factorsQuality and productivity factors
Quality and productivity factorsNancyBeaulah_R
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)IIUI
 
Defining the Problem - Goals and requirements
Defining the Problem - Goals and requirementsDefining the Problem - Goals and requirements
Defining the Problem - Goals and requirementsStephennancy
 
Planning the development process
Planning the development processPlanning the development process
Planning the development processSiva Priya
 

Mais procurados (20)

Software quality
Software qualitySoftware quality
Software quality
 
Capability Maturity Model (CMM) in Software Engineering
Capability Maturity Model (CMM) in Software EngineeringCapability Maturity Model (CMM) in Software Engineering
Capability Maturity Model (CMM) in Software Engineering
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
Designing Techniques in Software Engineering
Designing Techniques in Software EngineeringDesigning Techniques in Software Engineering
Designing Techniques in Software Engineering
 
Design notation
Design notationDesign notation
Design notation
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Requirement analysis and specification
Requirement analysis and specificationRequirement analysis and specification
Requirement analysis and specification
 
Software design
Software designSoftware design
Software design
 
Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9
 
Software metrics
Software metricsSoftware metrics
Software metrics
 
Estimating Software Maintenance Costs
Estimating Software Maintenance CostsEstimating Software Maintenance Costs
Estimating Software Maintenance Costs
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Chapter 1 2 - some size factors
Chapter 1   2 - some size factorsChapter 1   2 - some size factors
Chapter 1 2 - some size factors
 
Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)
 
Software process
Software processSoftware process
Software process
 
Quality and productivity factors
Quality and productivity factorsQuality and productivity factors
Quality and productivity factors
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)
 
Defining the Problem - Goals and requirements
Defining the Problem - Goals and requirementsDefining the Problem - Goals and requirements
Defining the Problem - Goals and requirements
 
Planning the development process
Planning the development processPlanning the development process
Planning the development process
 

Destaque

CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelmohamed khalaf alla mohamedain
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specificationKrishnasai Gudavalli
 
Design concepts and principles
Design concepts and principlesDesign concepts and principles
Design concepts and principlessaurabhshertukde
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysisasimnawaz54
 
Image analysis basics and principles
Image analysis basics and principlesImage analysis basics and principles
Image analysis basics and principlesMohsin Siddique
 
Software analysis and it's principles
Software analysis and it's principlesSoftware analysis and it's principles
Software analysis and it's principlesGhulam Abbas
 
Beit 381 se lec 15 - 16 - 12 mar27 - req engg 1 of 3
Beit 381 se lec 15 - 16 -  12 mar27 - req engg 1 of 3Beit 381 se lec 15 - 16 -  12 mar27 - req engg 1 of 3
Beit 381 se lec 15 - 16 - 12 mar27 - req engg 1 of 3babak danyal
 
Cocomo ii estimation
Cocomo ii estimationCocomo ii estimation
Cocomo ii estimationjujin1810
 
SRS(software requirement specification)
SRS(software requirement specification)SRS(software requirement specification)
SRS(software requirement specification)Akash Kumar Dhameja
 
Kano Analysis and Software Requrements
Kano Analysis and Software RequrementsKano Analysis and Software Requrements
Kano Analysis and Software RequrementsCraig Brown
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9Ian Sommerville
 
Flow oriented modeling
Flow oriented modelingFlow oriented modeling
Flow oriented modelingramyaaswin
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9Ian Sommerville
 
Lecture 4 software process model (2)
Lecture 4   software process model (2)Lecture 4   software process model (2)
Lecture 4 software process model (2)IIUI
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9Ian Sommerville
 

Destaque (20)

Analysis modeling
Analysis modelingAnalysis modeling
Analysis modeling
 
Analysis modelling
Analysis modellingAnalysis modelling
Analysis modelling
 
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
 
Design concepts and principles
Design concepts and principlesDesign concepts and principles
Design concepts and principles
 
Modeling and analysis
Modeling and analysisModeling and analysis
Modeling and analysis
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysis
 
Image analysis basics and principles
Image analysis basics and principlesImage analysis basics and principles
Image analysis basics and principles
 
Software analysis and it's principles
Software analysis and it's principlesSoftware analysis and it's principles
Software analysis and it's principles
 
Beit 381 se lec 15 - 16 - 12 mar27 - req engg 1 of 3
Beit 381 se lec 15 - 16 -  12 mar27 - req engg 1 of 3Beit 381 se lec 15 - 16 -  12 mar27 - req engg 1 of 3
Beit 381 se lec 15 - 16 - 12 mar27 - req engg 1 of 3
 
Cocomo ii estimation
Cocomo ii estimationCocomo ii estimation
Cocomo ii estimation
 
SRS(software requirement specification)
SRS(software requirement specification)SRS(software requirement specification)
SRS(software requirement specification)
 
Kano Analysis and Software Requrements
Kano Analysis and Software RequrementsKano Analysis and Software Requrements
Kano Analysis and Software Requrements
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9
 
Flow oriented modeling
Flow oriented modelingFlow oriented modeling
Flow oriented modeling
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
 
Uml
UmlUml
Uml
 
Lecture 4 software process model (2)
Lecture 4   software process model (2)Lecture 4   software process model (2)
Lecture 4 software process model (2)
 
Kano
KanoKano
Kano
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9
 

Semelhante a Analysis concepts and principles

Softwareenggineering lab manual
Softwareenggineering lab manualSoftwareenggineering lab manual
Softwareenggineering lab manualVivek Kumar Sinha
 
Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )eshtiyak
 
Software Requirements
Software RequirementsSoftware Requirements
Software RequirementsNethan Shaik
 
Software Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationSoftware Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationNishu Rastogi
 
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdfJayanthi Kannan MK
 
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxUNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxLeahRachael
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringSweta Kumari Barnwal
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to qualityDhanashriAmbre
 
Introduction to Software engineering ch03
Introduction to Software engineering ch03Introduction to Software engineering ch03
Introduction to Software engineering ch03YousefYassin5
 
SE Unit 2(1).pptx
SE Unit 2(1).pptxSE Unit 2(1).pptx
SE Unit 2(1).pptxaryan631999
 
Software testing
Software testingSoftware testing
Software testingRavi Dasari
 
Chapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptx
Chapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptxChapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptx
Chapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptxBayesayohannis
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notesSiva Ayyakutti
 

Semelhante a Analysis concepts and principles (20)

Softwareenggineering lab manual
Softwareenggineering lab manualSoftwareenggineering lab manual
Softwareenggineering lab manual
 
Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )
 
lec 3rd.pptx
lec 3rd.pptxlec 3rd.pptx
lec 3rd.pptx
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
Software Requirements
Software RequirementsSoftware Requirements
Software Requirements
 
Software Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationSoftware Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and Specification
 
software engineering
software engineering software engineering
software engineering
 
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
 
SE Unit-1.pptx
SE Unit-1.pptxSE Unit-1.pptx
SE Unit-1.pptx
 
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxUNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to quality
 
Introduction to Software engineering ch03
Introduction to Software engineering ch03Introduction to Software engineering ch03
Introduction to Software engineering ch03
 
SE Unit 2(1).pptx
SE Unit 2(1).pptxSE Unit 2(1).pptx
SE Unit 2(1).pptx
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Requirement engineering
Requirement engineeringRequirement engineering
Requirement engineering
 
Software testing
Software testingSoftware testing
Software testing
 
Chapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptx
Chapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptxChapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptx
Chapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptx
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notes
 
Sdlc phases
Sdlc phasesSdlc phases
Sdlc phases
 

Mais de saurabhshertukde (17)

Revision sql te it new syllabus
Revision sql te it new syllabusRevision sql te it new syllabus
Revision sql te it new syllabus
 
Oodbms ch 20
Oodbms ch 20Oodbms ch 20
Oodbms ch 20
 
Introduction er & eer
Introduction er & eerIntroduction er & eer
Introduction er & eer
 
Introduction er & eer
Introduction er &  eerIntroduction er &  eer
Introduction er & eer
 
Integrity & security
Integrity & securityIntegrity & security
Integrity & security
 
Er model
Er modelEr model
Er model
 
Er & eer to relational mapping
Er & eer to relational mappingEr & eer to relational mapping
Er & eer to relational mapping
 
Eer case study
Eer case studyEer case study
Eer case study
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
J2 ee archi
J2 ee archiJ2 ee archi
J2 ee archi
 
J2 ee architecture
J2 ee architectureJ2 ee architecture
J2 ee architecture
 
Software project-scheduling
Software project-schedulingSoftware project-scheduling
Software project-scheduling
 
Softwareproject planning
Softwareproject planningSoftwareproject planning
Softwareproject planning
 
Pressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelsPressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-models
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Analysis concepts and principles

  • 1.
  • 2. Software requirement engineering also called requirement analysis bridges the gap between system engineering and software design. System Engg. S/w req. analysis S/w design Participated by both the customer and developer
  • 3. Software requirements and analysis--  Problem recognition  Evaluation and synthesis ◦ focus is on what not how  Modeling  Specification  Review
  • 4.  Before requirements can be analyzed, modeled or specified, they must be gathered through an elicitation process. 2. Initiating the process • The most commonly used requirement elicitation technique is to conduct a meeting/interview. • Participants- analyst and the customer. • Type of question asked--- Context free, process questions, meta questions.
  • 5. 2. Facilitated Application Specification Technique (FAST) : • A team oriented approach to requirement gathering. • Encourages creation of a joint team of customers and developers who work together to identify the problem, propose solution and identify a preliminary set of requirements.
  • 6.
  • 7. Basic guidelines for FAST : • Meeting is arranged at a neutral site and attended by both s/w engineers and customers. • Rules for preparation and participation are established. • Agenda is set. • Appoint a facilitator to control the meeting (can be developer, customer or outside expert.) • Participants should not criticize and debate. Goal should be to identify problems, propose solution and identify a preliminary set of requirements
  • 8. FAST session preparation : • Initial meetings between customer and developer occur where scope is established and an overall perception of a solution is determined. • ½ page product request is documented . • Meeting place, time, date for FAST are selected and facilitator is chosen. • Product request is distributed to all attendees before meeting date.
  • 9. Every FAST attendee is asked to make : 2. List of objects. 3. List of services. 4. List of constraints. 5. List of performance criteria. Activities of FAST session. • Each participant presents his/her list of constraints. • Combined list is prepared eliminating redundant entries and adding new ideas. • List is finalized by the facilitator.
  • 10. A microprocessor based home security system needs to be built that would protect against a variety of undesirable situations such as smoke, fire , illegal entry etc. The product would use appropriate fire and smoke detectors, window and door sensors and an alarm that would be set when an untoward situation occurs and automatically telephone a monitoring agency. List of objects : Fire detector, smoke detector, window and door sensors, telephone, alarm. List of services : setting the alarm , monitoring the sensors, dialing the phone etc. List of constraints : Manufacturing cost less than 80 $, must be user friendly, must interface directly to the standard phone line. Performance Criteria : Sensor event should be recognized within 1 sec.
  • 11. 3. Quality Function Deployment This is a technique that translates the needs of the customer into technical requirements for software.  It emphasizes an understanding of what is valuable to the customer. Customer satisfaction is of prime importance.  It identifies three types of requirements ◦ Normal requirements: These requirements are the objectives and goals stated for a software during meetings with the customer. Eg : For a Result management system – Normal requirement could be- • Merit list report • Failed student report • Calculation of results
  • 12. ◦ Expected requirements: These requirements are implicit to the software and are so fundamental that the customer does not explicitly state them. Eg. Usability, Reliability, ease of installation ◦ Exciting requirements: These requirements are features that go beyond the customer's expectations and prove to be very satisfying when present. Eg :Sophisticated virus protection system
  • 13. 4. Use Case  It describes the sequence of interactions between actors and the system necessary to deliver the service that satisfies the goal. How to create a use case ? • Identify the different users (actors) of the system. • Create use cases which captures who (actor) does what (interaction) without dealing with the system internals.
  • 14.
  • 15.
  • 16. Used to gain a better understanding of the problem. • Based on constructing a partial implementation of a system • Prototyping can be : 4. Throwaway (Closed ended) • Here the prototype serves only to demonstrate requirements and is discarded after the desired knowledge is gained. • Since the prototype is ultimately discarded it need not be maintainable or use efficient algorithms.
  • 17. 2. Evolutionary (Open ended) • Once the prototype has been used and requisite knowledge has been gained it is eventually incorporated into the final system. • Must exhibit all quality attributes of the final product. Tools used to conduct rapid prototyping : 5. Fourth generation techniques : • 4GLs reduce programming effort, the time it takes to develop software, and the cost of software development. Report generators (Oracle repots,QUEST, GEMbase) Screen generators (Oracle forms etc) Database Query Languages (SQL, Ingres etc ) • These tools generate an executable code quickly and hence are ideal for rapid prototyping
  • 18. 2. Reusable software components : • Assemble rather than build the prototype by using a set of existing s/w components 3. Formal Specification languages: • Replace natural language specifcation • Eg. Set notation , algebraic notation. • There are tools which convert these formal language specifications into executable code.
  • 19. The software requirement specification is produced at the culmination of the analysis task.  SRS document is a contract between the development team and the customer.  The SRS document is known as black-box specification since the system is considered as a black box whose internal details are not known and only its external is visible
  • 20. SRS
  • 21. SRS
  • 22. SRS
  • 23. SRS
  • 24. SRS
  • 25. SRS
  • 26. SRS
  • 27. SRS
  • 28. SRS
  • 29. SRS
  • 30. SRS-foundation of the development stage.  Review is conducted to ensure completeness, accuracy and consistency in SRS.  Avoid vague terms in SRS(usually,often)  Once review is complete SRS is signed off by both customer and developer.