Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

2.

SYSTEM DESIGN
3.1 SYSTEM ARCHITECTURE
Architecture of the System Every computer operating system is made to work with a
specific type of computer architecture. The majority of software programs are only
compatible with specific operating systems and hardware configurations. While some
operating systems and programs are architecture -independent, most require recompilation in
order to function on a different architecture.

Service Provider

Login,

Train & Test User Profile Data Sets,


Accepting all Information
Web Server
View User Profile Trained and Tested
Datasets Results Storage
Accuracy in Bar Chart,

Accessing
View User Profile Trained and Tested
Data Accuracy Results,

Process all View All Profile Identity Prediction,


user queries
Find and View Profile Identity Prediction
Ratio,
Store and retrievals
View User Profile Identity Ratio Results,

Download Predicted Data Sets,


WEB
View All Remote Users
Database

Remote User

Tweet Server
REGISTER AND LOGIN,
Tweet Server
PREDICT PROFILE IDENTIFICATION STATUS,
Tweet Server
VIEW YOUR PROFILE.

Fig 1: SYSTEM ARCHITECTURE


3.2 SDLC (Spiral Model):

Fig 2: Spiral model

One of the most significant models in the Software Development Life Cycle that
supports risk handling is the Spiral Model. In-depth discussion of the Spiral Model is the
main goal of this essay.

What is the Spiral Model?

A methodical and incremental approach to software development is offered by the Software


Development Life Cycle (SDLC) model known as the Spiral Model. In diagrammatic form, it
resembles a spiral with several loops. It is uncertain how many loops there are in the spiral;
the number can differ from project to project. A phase of the software development process is
denoted by each loop in the spiral.
1. Depending on the project risks, the project manager may alter the precise number
of phases required to build the product.
2. Because they dynamically determine the number of phases in the spiral model
product development process, project managers are essential to the process.
3. The approach is built on a spiral model, without each iteration reflecting a software
development cycle, including requirements gathering, analysis, design,
implementation, testing, and maintenance.
PHASES OF SPIRAL MODEL
The Spiral paradigm is a risk-driven paradigm, which means that it focuses on risk
management over numerous iterations of the software development process. The process
includes the following phases: planning.

1.Planning
The first segment of the Spiral Model is the making plans segment, in which the scope of the
assignment is decided and a plan is created for the following new release of the spiral.

2. Risk Analysis
The first segment of the Spiral Model is the making plans segment, in which the scope of the
assignment is decided and a plan is created for the following new release of the spiral.

3. Engineering

In the engineering phase, the software program is evolved primarily based totally at the
necessities accumulated withinside the preceding iteration.

4.Evaluation

In the assessment phase, the software program is evaluated to decide if it meets the
customer’s necessities and if it's far of excessive quality.

5. Planning

The subsequent new release of the spiral starts off evolved with a brand-new making
plans phase, primarily based totally at the outcomes of the evaluation. The Spiral Model is
frequently used for complicated and huge software program improvement projects, because it
lets in for a extra bendy and adaptable technique to software program improvement. It is
likewise well-suitable to tasks with extensive uncertainty or excessive tiers of risk.

The Radius of the spiral at any factor represents the expenses(cost) of the mission to
this point, and the angular size represents the development made to this point withinside the
cutting-edge phase. Each section of the Spiral Model is split into 4 quadrants as proven
withinside the above figure.

The capabilities of those 4 quadrants are mentioned below:

1. Objectives determination and identify alternative solutions: Requirements are


gathered from the customers and the objectives are identified, elaborated, and
analysed at the start of every phase. Then alternative solutions possible for the
phase are proposed in this quadrant.
2. Identify and resolve Risks: During the second quadrant, all the possible solutions
are evaluated to select the best possible solution. Then the risks associated with
that solution are identified and the risks are resolved using the best possible
strategy. At the end of this quadrant, the Prototype is built for the best possible
solution.
3. Develop the next version of the Product: During the third quadrant, the
identified features are developed and verified through testing. At the end of the
third quadrant, the next version of the software is available.
4. Review and plan for the next Phase: In the fourth quadrant, the Customers
evaluate the so-far developed version of the software. In the end, planning for the
next phase is started.
ADVANTAGES
Below are a few blessings of the Spiral Model.

1. Risk Handling: The initiatives with many unknown dangers that arise because the
improvement proceeds, in that case, Spiral Model is the pleasant improvement version
to comply with because of the threat evaluation and threat dealing with at each phase.
2. Good for massive projects: It is usually recommended to apply the Spiral Model in
massive and complicated projects.
3. Flexibility in Requirements: Change requests withinside the Requirements at a later
section may be included correctly with the aid of using the usage of this model.
4. Customer Satisfaction: Customers can see the development of the product at the
early phase of the software development and thus, they habituated with the system by
using it before.
5. Iterative and Incremental Approach: The Spiral Model affords an iterative and
incremental method to software program development, bearing in mind flexibility and
adaptableness in reaction to converting necessities or surprising events.
6. Emphasis on Risk Management: The Spiral Model places a strong emphasis on risk
management, which helps to minimize the impact of uncertainty and risk on the
software development process.
7. Improved Communication: The Spiral Model presents for everyday reviews and
reviews, that could enhance verbal exchange among the purchaser and the
improvement team.
8. Improved Quality: The Spiral Model permits for a couple of iterations of the
software program improvement process, that can bring about stepped forward
software program great and reliability.

3.3 MODULES OF THE PROJECT

3.3.1 SERVICE PROVIDER

Providers must use a working user name and password to log in to this module.
Following a successful login, one can perform a number of tasks, including Train and Test
Data Sets for User Profiles See the User Profile Accuracy Tested and Trained Bar Chart, the
User Profile Accuracy Tested and Trained Results, and the Complete Profile Identity
Prediction. Locate and View the Prediction Ratio for Profile Identity. View All Remote Users,
Download Predicted Data Sets, and View User Profile Identity Ratio Results.
Login

Yes No
Status

Train & Test User Profile Data Sets, Username &


Password Wrong

View User Profile Trained and


Tested Accuracy in Bar Chart,

Log Out
View User Profile Trained and
Tested Accuracy Results,

View All Profile Identity Prediction,

Find and View Profile Identity Prediction Ratio,

View User Profile Identity Ratio Results,

Download Predicted Data Sets,

View All Remote Users

Fig 3: SERVICE PROVIDER

3.3.2 VIEW AND AUTHORIZE USERS


The administrator may see a list of all enrolled users in this module. The administrator
may see information about the user, including name, email address, and address, and they can
also approve people.

3.3.3 REMOTE USER


This module has n numbers of user accounts. Prior to beginning any actions, the user must
register. The user's information is saved in the database when they register. Upon successful
registration, he must use his permitted user name and password to log in. After logging in
successfully, the user may perform several tasks such as VIEW YOUR PROFILE, PREDICT
PROFILE IDENTIFICATION STATUS, and REGISTER AND LOGIN.
Start

Login

Yes No
Status

REGISTER AND LOGIN Username & Password


Wrong
Register and Login

Register IDENTIFICATION
PREDICT PROFILE and Login STATUS,

VIEW YOUR PROFILE

Logout

You might also like