1、软件工程分析文档1. Function modeling1) First scenario of the borrow use caseA borrower hands a book and card to librarian.1. The librarian input B in the computer, then scan the bar codes on the book and the card.2. The system tell us that this book hasnt kept by another borrow.3. The system update the rele
2、vant book data.The librarian sign the book then hand book and card to the borrower. 2) Second scenario of the borrow use caseA borrower hands a book and card to librarian.1. The librarian input B in the computer, then scan the bar codes on the book and the card.2. The system tell us that this book h
3、as been kept by another borrower.Librarian cant lend this book to the borrower, The librarian return the card to borrower.3) Third scenario of the borrow use caseA borrower hands a book and card to librarian.1. The librarian input B in the computer, then scan the bar codes on the book and the card.2
4、. The system tell us that this book has been kept by this borrower.3. The system clear the kept, update the relevant book data.The librarian stamps the book then return the book and the card to the borrower.4) First scenario of the return use caseA borrower hands a book to the librarian. The book is
5、 not kept by another borrower.1. The librarian input R to the computer. Then scans the bar code on the book.2. The system update the relevant book data.The librarian set the book on the return book stack.5) Second scenario of the return use caseA borrower hands a book to the librarian. The book is k
6、ept by another borrower.1.The librarian input R to the computer. Then scans the bar code on the book.2.The system update the relevant book data.Librarian place the book on the special stacks. 5) First scenario of the keep use caseA borrower hands the librarian a form bearing the number of a book, to
7、gether with his card.1. The librarian input K to the computer. Then type in the book number and scan the bar code on the card.This book is already kept by another borrower.2. The system tell us this message.Librarian tell this to the borrower, return the card, and refuse lending the book to the borr
8、ower.6) Second scenario of the keep use caseA borrower hands the librarian a form bearing the number of a book, together with his card.1. The librarian input K to the computer. Then type in the book number and scan the bar code on the card.This book is not kept by another borrower.2. The system upda
9、te the relevant book data.The librarian returns the card to the borrower, and set aside the form for recycling.7) First scenario of the Longest keeping time use caseThe keeping time is not longer than the longest keeping time1. The system show that any thing is ok8) Second scenario of the Longest ke
10、eping time use caseThe keeping time is longer than the longest keeping time1. The system tell us this message,and sign the book and the card number.2. Librarian phone the borrower tell borrower return the book9) First scenario of the book information use case1. A borrower input A= followed by an aut
11、hors name.2. The system display the requested information.10) Second scenario of the book information use case1. A borrower input T= followed by the title of a book2. The system display the requested information.11) Third scenario of the book information use case1. A borrower input S= followed by th
12、e subject area2. The system display the requested information.12) First scenario of Modif use case1. A librarian input + to computer, then scans the bar code on a new book.2. The system insert the relevant book data.The librarian set the book aside to be placed in the book stacks.13) Second scenario
13、 of Modif use case1. A librarian input - to computer, then scans the bar code on a book.2. The system delete the relevant book data.The librarian sets the book aside to be pulped.2Entity class modeling Using Noun Extraction technologyDescription:An automated library circulation system is to be const
14、ructed. Each book in the library. As well as each borrower, can be identified by a bar code. A book can be borrowed. Provided it is not being kept by another borrower, at most one borrower can have a keep on a book borrowed by another borrower. A borrower borrow a book it will has a longest keeping
15、time, if keeping time is longer than the longest keeping time, system will show this message. When a book is returned, a librarian checks it in. Borrowers and librarians are permitted to query a book information catalog of library holdings.Identify the nouns:An automated library circulation system i
16、s to be constructed. Each book in the library. As well as each borrower, can be identified by a bar code. A book can be borrowed. Provided it is not being kept by another borrower, at most one borrower can have a keep on a book borrowed by another borrower. A borrower borrow a book it will has a lon
17、gest keeping time, if keeping time is longer than the longest keeping time, system will show this message. When a book is returned, a librarian checks it in. Borrowers and librarians are permitted to query a book information catalog of library holdings.With regard to the nouns in the previous paragr
18、aph, borrower and librarian are actors, and bar code is an attribute of a book and of a borrower. Accordingly, these nouns can not correspond to classes, In addition, Library, keep, keeping ,longest keeping time and system are abstract nouns. Finally, book information catalog is information that relates to books. This leaves Book Class as the sole candidate class.CLASS DIAGRAM3Dynamic Modeling State diagramIteractive diagram1) Use case borrow book 2) Use Case Return Book 3) Use Case Keep Book 4) Use Case Longest Keeping Time5) Use Case Book Information6) Use Case Modif
copyright@ 2008-2022 冰豆网网站版权所有
经营许可证编号:鄂ICP备2022015515号-1