Beruflich Dokumente
Kultur Dokumente
VERSION: 1.0
Revision History
Date Description Author Comments
19 May, Version 1.0 Zain Saleem First Submission on turnitin
2017
26 May, Version 1.1 Tayyab Razzaq Second Submission on
2017 turnitin
Document Approval
The following Software Requirements Specification has been accepted and approved by the following:
Signature Printed Name Title Date
Dr. Supervisor, CSIT 21306
1. INTRODUCTION........................................................................................................ 3
1.1 Purpose................................................................................................................. 3
1.2 Scope.................................................................................................................... 4
1.3 Overview............................................................................................................... 4
1.4 Reference Material................................................................................................... 4
1.5 Definitions and Acronyms.......................................................................................... 5
2. SYSTEM OVERVIEW.................................................................................................. 5
2.1 Product Perspective............................................................................................. 5
2.2 Product Functions................................................................................................ 5
2.3 User Classes and Characteristics.............................................................................. 6
2.4 Operating Environment......................................................................................... 7
2.5 Design and Implementation Constraints....................................................................7
2.6 User Documentation............................................................................................ 7
2.7 Assumptions and Dependencies..............................................................................8
3. SYSTEM ARCHITECTURE........................................................................................... 8
3.1 Architectural Design................................................................................................. 8
3.2 Decomposition Description......................................................................................... 9
4. DATA DESIGN.......................................................................................................... 10
4.1 Data Description.................................................................................................... 10
5. COMPONENT DESIGN........................................................................................... 11
6. UML Diagram........................................................................................................ 11
6.1 Use Case Diagram.................................................................................................. 11
6.2 Sequence Diagram................................................................................................. 12
7. REQUIREMENTS MATRIX......................................................................................... 17
Functional Requirements.............................................................................................. 17
Non-functional Requirements........................................................................................ 18
1. INTRODUCTION
1.1 Purpose
The report determines the product necessity particular for Class Learning Management
System. The product necessity particular archive is set up for certain class of groups of
1 Bamatraf, A., Ibrahim, R., Salleh, M., and Mohd, N.: A new digital watermarking
algorithm using combination of least significant bit (LSB) and inverse bit, arXiv preprint
arXiv:1111.6727, 2011
2 Aparna, J., and Ayyappan, S.: Comparison of digital watermarking techniques, in Editor
(Ed.)^(Eds.): Book Comparison of digital watermarking techniques (IEEE, 2014, edn.),
pp. 87-92
3 Abdullatif, M., Zeki, A.M., Chebil, J., and Gunawan, T.S.: Properties of digital image
watermarking, in Editor (Ed.)^(Eds.): Book Properties of digital image watermarking
(IEEE, 2013, edn.), pp. 235-240
4 Bansal, N., Deolia, V.K., Bansal, A., and Pathak, P.: Digital Image Watermarking Using
Least Significant Bit Technique in Different Bit Positions, in Editor (Ed.)^(Eds.): Book
Digital Image Watermarking Using Least Significant Bit Technique in Different Bit
Positions (IEEE, 2014, edn.), pp. 813-818
5 Pevn, T., Bas, P., and Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix,
information Forensics and Security, IEEE Transactions on, 2010, 5, (2), pp. 215-224
2. SYSTEM OVERVIEW
2.1 Product Perspective
The website pages (XHTML/JSP) are available to give the UI on client customer side
communication amongst client and server is given through HTTP/HTTPS conventions. The
Client Software is to give the UI on framework client customer side and for this TCP/IP
conventions are utilized on the server side web server is for EJB and database server is for
putting away the data.
2.2 Product Functions
Virtual Classroom System is an administration that bolster computerized learning procedure
of instructing and learning in the classroom and can be separated essentially at a few different
classes at a few distinct areas. Understudies can pick courses, go to addresses, take exams,
Understudy: Each understudy can take part instructors by sending a demand to the
speaker through the site. They can see the white load up and the introductions ongoing
while at the same time tuning in to the address. They can likewise associate with the
teacher and alternate understudies without intruding on the address and furthermore can
take part online exams the instructor has given.
Workforce: As resources, they can circulate their addresses constant without remaining
in a classroom however having every one of the elements in a classroom. A product white
board is given to show the addresses. The documentations/introductions can be conveyed
before the address. Teacher can cooperate with the understudies by noting their inquiries.
Instructor can likewise lead an exam by putting away an arrangement of inquiries. As per
the directions given by the teacher, the framework will create an exam paper.
Hardware Interface
CLIENT SIDE
PROCESSOR RAM DISK SPACE
6. UML Diagram
6.1 Use Case Diagram
A use case diagram is a type of behavioral diagram created from a Use-case analysis. The purpose
of use case is to present overview of the functionality provided by the system in terms of actors, their
goals and any dependencies between those use cases.
Actors: - Faculty , Management , Admin , Student
Student Registration
Notice
Files (Lectures)
Examination Management
Discussion
Report
Profile Management
7. REQUIREMENTS MATRIX
Functional Requirements
Students can choose courses, attend lectures, take exams, view their attendance records, progress
reports etc as per their convenience.
Attend lectures either at the scheduled time or on request view lecture at a later time.
Faculties can take lectures, upload assignments, announcements, evaluate answer sheets and also
can upload lectures and other discussions in various formats as in videos, power point
presentation etc.
Upload and download of various assignments, college notices, students notices, journals, videos.
Real time collaboration among users via chat rooms, shared and interactive whiteboards.
Asynchronous communication in the form of Emails, discussion boards that enable
communication to occur at "convenient-times" that suit student schedules and are not accessed at
simultaneous or prearranged times.
Non-functional Requirements
Reliability: The video quality should be clear and good .The audio could be heard well. The video and
audio of lectures should be synchronized well.
Responsiveness: Less response time should be there so that student and faculty should feel good while
using this virtual classroom system
Availability: 24 X 7 availability should be there so that student can use it at any time according to his
convenience.
Scalability: Number of users supported in the class will mainly depend on the server load, server
processing capacity and its memory. It should scale maximum number of users.
Security: HTTPS enables access to web application to secure access of confidential data (student
information). Database Access There will be no external access to the database, except through the XML
protocol. Administrators of the system will have full database administration rights and Lecturers may
have access to a copy of parts of the VCS database, for editing purposes.