Professional Documents
Culture Documents
Aravind
Aravind
SYSTEM DESIGN
3.1 SYSTEM ARCHITECTURE
Architecture of the System Every computer operating system is made to work with a
specific type of computer architecture. The majority of software programs are only
compatible with specific operating systems and hardware configurations. While some
operating systems and programs are architecture -independent, most require recompilation in
order to function on a different architecture.
Service Provider
Login,
Accessing
View User Profile Trained and Tested
Data Accuracy Results,
Remote User
Tweet Server
REGISTER AND LOGIN,
Tweet Server
PREDICT PROFILE IDENTIFICATION STATUS,
Tweet Server
VIEW YOUR PROFILE.
One of the most significant models in the Software Development Life Cycle that
supports risk handling is the Spiral Model. In-depth discussion of the Spiral Model is the
main goal of this essay.
1.Planning
The first segment of the Spiral Model is the making plans segment, in which the scope of the
assignment is decided and a plan is created for the following new release of the spiral.
2. Risk Analysis
The first segment of the Spiral Model is the making plans segment, in which the scope of the
assignment is decided and a plan is created for the following new release of the spiral.
3. Engineering
In the engineering phase, the software program is evolved primarily based totally at the
necessities accumulated withinside the preceding iteration.
4.Evaluation
In the assessment phase, the software program is evaluated to decide if it meets the
customer’s necessities and if it's far of excessive quality.
5. Planning
The subsequent new release of the spiral starts off evolved with a brand-new making
plans phase, primarily based totally at the outcomes of the evaluation. The Spiral Model is
frequently used for complicated and huge software program improvement projects, because it
lets in for a extra bendy and adaptable technique to software program improvement. It is
likewise well-suitable to tasks with extensive uncertainty or excessive tiers of risk.
The Radius of the spiral at any factor represents the expenses(cost) of the mission to
this point, and the angular size represents the development made to this point withinside the
cutting-edge phase. Each section of the Spiral Model is split into 4 quadrants as proven
withinside the above figure.
1. Risk Handling: The initiatives with many unknown dangers that arise because the
improvement proceeds, in that case, Spiral Model is the pleasant improvement version
to comply with because of the threat evaluation and threat dealing with at each phase.
2. Good for massive projects: It is usually recommended to apply the Spiral Model in
massive and complicated projects.
3. Flexibility in Requirements: Change requests withinside the Requirements at a later
section may be included correctly with the aid of using the usage of this model.
4. Customer Satisfaction: Customers can see the development of the product at the
early phase of the software development and thus, they habituated with the system by
using it before.
5. Iterative and Incremental Approach: The Spiral Model affords an iterative and
incremental method to software program development, bearing in mind flexibility and
adaptableness in reaction to converting necessities or surprising events.
6. Emphasis on Risk Management: The Spiral Model places a strong emphasis on risk
management, which helps to minimize the impact of uncertainty and risk on the
software development process.
7. Improved Communication: The Spiral Model presents for everyday reviews and
reviews, that could enhance verbal exchange among the purchaser and the
improvement team.
8. Improved Quality: The Spiral Model permits for a couple of iterations of the
software program improvement process, that can bring about stepped forward
software program great and reliability.
Providers must use a working user name and password to log in to this module.
Following a successful login, one can perform a number of tasks, including Train and Test
Data Sets for User Profiles See the User Profile Accuracy Tested and Trained Bar Chart, the
User Profile Accuracy Tested and Trained Results, and the Complete Profile Identity
Prediction. Locate and View the Prediction Ratio for Profile Identity. View All Remote Users,
Download Predicted Data Sets, and View User Profile Identity Ratio Results.
Login
Yes No
Status
Log Out
View User Profile Trained and
Tested Accuracy Results,
Login
Yes No
Status
Register IDENTIFICATION
PREDICT PROFILE and Login STATUS,
Logout