Professional Documents
Culture Documents
Bharati Vidyapeeth
Bharati Vidyapeeth
Bharati Vidyapeeth
Submitted By :-
Hitesh rana ( 8846)
Kapil dongare (8845)
Sarthak binewale (8844)
Problem Statement.
To develop a system that will manage:-
To produce a web based system that allows customer to
register and reserve bike online for the company to effectively
manage their bike rental business.
To ease customer task whenever they need to rent a bike.
Availabilty of bike round the clock.
Wide range of vehicles.
Maintaining record of each booking history.
Online payment option.
Login and account generation
Getting a rental bike helps people get around despite the fact
they do not have access
To their own personal vehicle or don’t own a vehicle at all .
Waterfall Model:-
Incremental Model:-
SRS Format:-
Purpose:-
The purpose of a bike rental system is to provide users with a convenient and affordable way to rent
a bike for a short period of time, typically for a few hours or a day. Bike rental systems can be found
in many urban areas, where they provide an alternative to traditional transportation methods such
as cars, buses, or taxis.
Scope of project:-
The scope of a bike rental system project typically involves the following:
System Objectives: The main objective of the bike rental system is to provide users with a
convenient and affordable way to rent bikes for short periods of time.
System Features: The bike rental system should have the following feature.User Registration and
Login,Bike Reservation and Rental,Bike Return,Payment Gateway,User Interface,System
Architecture,Integration Requirements,Testing and Quality Assurance,Implementation and
Deployment
Overall, the scope of a bike rental system project involves designing, developing, and implementing
a system that meets the needs of users and stakeholders, and provides a convenient and
sustainable transportation option for short trips in urban areas.
Overall description:-
bike rental system is a service that allows users to rent bikes for a short period of time, typically for
a few hours or a day. The system consists of a network of rental stations, where users can pick up
and drop off bikes.
The system typically has an online platform that allows users to register and create an account,
reserve a bike, and pay for the rental. The platform also provides information on bike availability,
rental rates, and station locations.
Users can pick up a bike from any rental station within the system, and return it to any other station
when they are done. The system tracks the location and usage of each bike, and provides real-time
information on station occupancy, bike availability, and other key metrics
Software Requirement:-
The security requirements of a bike rental system typically include:
Reliability:-
The reliability of a bike rental system is essential for providing a positive user experience and
ensuring that the system meets the needs of users and stakeholders. Here are some of the key
aspects of reliability that should be considered in the design and implementation of a bike rental
system:
System availability,Performance,Fault tolerance,Data integrity,User Support.
Extensibility:-
Extensibility refers to the ability of a bike rental system to easily accommodate future changes,
additions, or upgrades without requiring significant modifications to the system architecture or
codebase. In other words, an extensible system can be easily adapted to new requirements or use
cases, without impacting the system's stability, reliability, or performance.
Activity Diagram:-
Decision Diagram:-
Condition Action
Customer selects a bike to System checks bike
rent availability
Bike is available System reserves the bike for
the customer
This decision table outlines the various conditions that could occur during the bike
rental process and the corresponding actions that the system should take. By
following this decision diagram, the system can ensure that all necessary steps are
taken to provide a smooth rental experience for customers while also protecting
the company's assets.
Sequence Diagram:-
Risk Probability Effects
1. Organizational financial Low Catastrophic
problems force reduction in
project budget.
RMMM PLAN:-
Risk: Computer Crash
Mitigation The cost associated with a computer crash resulting in a loss of data is crucial. A
computer crash itself is not crucial, but rather the loss of data. A loss of data will result in not
being able to deliver the product to the customer. This will result in a not receiving a letter of
acceptance from the customer. Without the letter of acceptance, the group will receive a
failing grade for the course. As a result, the organization is taking steps to make multiple
backup copies of the software in development and all documentation associated with it, in
multiple locations.
Monitoring
When working on the product or documentation, the staff member should always be aware
of the stability of the computing environment they are working in. Any changes in the
stability of the environment should be recognized and taken seriously.
Management
The lack of a stable-computing environment is extremely hazardous to a software
development team. If the computing environment is found unstable, the development team
should cease work on that system until the environment is made stable again, or should
move to a system that is stable and continue working there.
Mitigation
The cost associated with a late delivery is critical. A late delivery will result in a late delivery
of a letter of acceptance from the customer. Without the letter of acceptance, the group will
receive a failing grade for the course. Steps have been taken to ensure a timely delivery by
gauging the scope of project based on the delivery deadline.
Monitoring
A schedule has been established to monitor project status. Falling behind schedule would
indicate a potential for late delivery. The schedule will be followed closely during all
development stages.
Management
Late delivery would be a catastrophic failure in the project development. If the project
cannot be delivered on time the development team will not pass the course. If it becomes
apparent that the project will not be completed on time, the only course of action available
would be to request an extension to the deadline form the customer.
Mitigation
In order to prevent this from happening, meetings (formal and informal) will be held with
the customer on a routine business. This ensures that the product we are producing, and the
requirements of the customer are equivalent.
Monitoring
The meetings with the customer should ensure that the customer and our organization
understand each other and the requirements for the product.
Management
Should the development team come to the realization that their idea of the product
requirements differs from those of the customer, the customer should be immediately
notified and whatever steps necessary to rectify this problem should be taken. Preferably a
meeting should be held between the development team and the customer to discuss at
length this issue.
Mitigation
In order to prevent this from happening, the development team will be required to learn the
languages and techniques necessary to develop this software. The member of the team that
is the most experienced in a particular facet of the development tools will need to instruct
those who are not as well versed.
Monitoring
Each member of the team should watch and see areas where another team member may be
weak. Also, if one of the members is weak in a particular area it should be brought to the
attention by that member, to the other members.
Management
The members who have the most experience in a particular area will be required to help
those who needs help. It should not come to the attention of the team that a particular
member needs help.
Function Point:-
Measurement parameter Count Simple Average Complex
Number of user inputs 3 * 3 4 6
=9
=16
Number of user inquiries 2 * 3 4 6
=15
Number of files 4 * 7 10 15
=28
Number of external Interfaces 3 * 5 7 10
=15
Count total 74
Step 1:-
Calculate the function point:-
F = 14 * scale
Scale varies from 0 to 5 according to character of complexity adjustment factor
(CAF). Below table shows scale:
0 – No influence
1 – Incidental
2 – Moderate
3 – Average
4 – Significant
5 – Essential
F = 14 * 2
F = 28
Step 2 :-
Calculate Complexity Adjustment Factor (CAF).
CAF = 0.65 + (0.01 * 28)
= 0.93
Step 3:-
Calculate Unadjusted Function point (UFP).
UFP = (3*4 + 4*5+2*4+4*10)
= 80
Step 4:-
Calculate Function Point.
FP = UFP * CAF
= 80 * 0.93
= 74.4
Semidetached
Embedded
According to Boehm, software cost estimation should be done through three
stages:
Basic Model
Intermediate Model
Detailed Model