Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

School of Computing

SRM IST, Kattankulathur – 603 203

Course Code: 18CSC206J

Course Name: Software Engineering and Project Management

Experiment No 5

Title of Experiment Prepare Work breakdown structure, Timeline chart, Risk identification
table
Name of the candidate Jeel Marvaniya

Register Number RA2111003010558

Date of Experiment 20-02-2023

Mark Split Up

S.No Description Maximum Mark Mark Obtained


1 Exercise 5
2 Viva 5
Total 10

Staff Signature with date

Aim:
To Prepare Work breakdown structure, Timeline chart and Risk identification table

Team Members:
Sl No Register No Name Role
1 RA2111003010558 Jeel marvaniya Rep

Text Extractor

Phase 1: Project Initiation


 1.1 Define Project Objectives and Scope
 1.2 Identify Stakeholder
 1.3 Define Project Deliverables
Phase 2: Requirements Gathering
 2.1 Define Text Types
 2.2 Determine Text Sources
 2.3 Identify Special Requirements
Phase 3: Design and Development
 3.1 Develop Text Extraction Algorithm
• 3.1.1 Analyze Text Structure and Format
• 3.1.2 Develop Extraction Rules
• 3.1.3 Implement Algorithm
 3.2 Create User Interface
• 3.2.1 Design User Interface Requirements
• 3.2.2 Develop User Interface Components
• 3.2.3 Integrate User Interface with Algorithm
 3.3 Test Text Extractor
• 3.3.1 Define Testing Requirements
• 3.4.2 Develop Test Cases
• 3.4.3 Perform Tests
 3. Document Text Extractor
• 3.4.1 Develop User Training Materials
• 3.4.2 Develop Technical Documentation
Phase 4: Deployment and Maintenance
 4.1 Deploy Text Extractor
• 4.1.1 Prepare for Deployment
• 4.1.2 Install Text Extractor
• 4.1.3 Perform Acceptance Testing
 4.2 Support and Maintenance
• 4.2.1 Provide User Support
 4.2.2 Perform Maintenance and Upgrades

TIMELINE – GANTT CHART


RISK ANALYSIS – SWOT & RMMM:

Strengths: Weaknesses:

 Innovation Constant improvement


 Personalized recommendations
Dependence on technology
 Experienced Developer
 Entrepreneurial mindset Single man Job
SWOT

Analysis
Opportunities: Threats:

 Improvement by using better AI  Intense competition


 Partnership Opportunities  changes in regulations and
 Expansion of services policies (if occurs)

Risk mitigation framework for a text extractor presented in tabular


form:

Risk Impact Likelihood Mitigation

Failure to extract Low to High, High Implement machine learning algorithms


accurate information depending on to continually improve accuracy and
use case validate results against known data sets.
Implement fallback options to address
potential errors.

Data privacy High Medium Implement robust security measures to


violations protect user data. Ensure compliance
with applicable data privacy regulations.

Integration issues Low to Medium Conduct thorough testing and


with other software Medium, debugging to identify and resolve any
systems depending on integration issues before deployment.
use case

Legal and compliance High Medium Consult with legal experts to ensure
risks related to the compliance with all relevant laws and
use of extracted text regulations. Implement strict data access
controls and audit trails to track access
and use of extracted text.

Technical High Low to Implement redundant systems and


infrastructure failures Medium, backups to minimize downtime in the
depending on event of a technical failure. Conduct
use case regular maintenance and updates to
ensure system stability.

Result: Thus, the work breakdown structure with timeline chart and risk table were
formulated successfully.

You might also like