Functional hierarchy diagram of the system

Assignment Help Basic Computer Science
Reference no: EM13933196

Part 1:

A system is needed to assist people with severe disabilities to live a relatively comfortable life. For this assignment you may assume that the patients reside in their own premises with a carer available to look after them. However the carer is often doing other household duties and may not be in the same room as the patient. The patients also have expressed the desire to be as independent as possible. You may assume that the patients have no movement from their neck down. You may also assume that the patient can freely move their heads and eyes, and can speak, though sometimes very softly. Patient surveys indicate that they would like to have the ability to:

• Adjust the bed height and the inclination of the backrest.
• Summon the carer (without having to shout).
• Be monitored for vital medical signs if needed and to alert the carer if there is any danger (the system monitoring the vital signs already exists and is being supplied independently of your system).
• Adjust the room's environment (temperature, light levels, opening and closing
• of window curtains).
• Turn the entertainment system on or off, and to adjust volume levels, channels, and the like. The entertainment system consists of a Television, a DVD player, a music system including CD, mp3 and Radio.
• Make, and respond to, phone calls.
• Receive, read, compose and send emails

You are required to provide a functional hierarchy diagram of this system developed to at least 4 levels (level 1 being the top level, and level 4 being the lowest), a functional flow block diagram showing the flow through at least one aspect of the system's functionality, and an N2 Chart You may make reasonable assumptions regarding the requirements that the owners may have for these systems. Based upon your functional analysis, postulate some high-level system requirements for the system. Demonstrate that your

requirements are "good" requirements by applying the parsing and the primitive requirements analysis techniques on at least three of your requirements.

Part Two - Model Based Systems Engineering.

Research the topic: System of Systems (SoS). You must use scholarly Journals and authoritative literature for this. Wikipedia and similar sources will not be sufficient for this. From your research identify the following:

• The key concepts of SOS.
• How did they evolve? What prompted such evolution?
• What are the key current issues (if any) and discussions concerning systems engineers and managers regarding SOS?
Present your findings as follows:
• Produce a power-point presentation suitable for a 20-minute talk on SOS, meant to "educate" people unfamiliar with them. You are to produce a maximum of 8 power-point charts, with no more than 5 bullet points on each. You may use diagrams if these get your message across more clearly. (Note: you will NOT be required to give this presentation).
• Produce "speaker notes" to accompany your charts - no more than 5 bullet points per chart. These speaker notes should be in the notes section of your charts (use the PowerPoint notes view to see this). The speaker notes should be your group's own work, and not "cut and paste" from other sources.
• Provide references to your information sources.

Reference no: EM13933196

Questions Cloud

Conceptual framework for the research question : 1. Identify and describe the conceptual framework for the research question. 2. Review the relevant theoretical and empirical literature both for the system being studied and related systems.
Skills of people with disabilities are used to the fullest : Question: If you are running an organisation and you want to make sure that the skills of people with disabilities are used to the fullest, what would you do? You may use other organisational examples as supporting cases to illustrate your plan.
Prepare more than ogive curve with imaginary figures : Discuss the utility of the graphic method of presenting statistical data. What points should be taken into account in the construction of graphs? Prepare more than ogive curve with imaginary figures.
To create a read-only property : To create a read-only property (where the Set accessor is omitted), precede keyword Property with the keyword ReadOnl y.
Functional hierarchy diagram of the system : You are required to provide a functional hierarchy diagram of this system developed to at least 4 levels (level 1 being the top level, and level 4 being the lowest), a functional flow block diagram
What is the value to the client or customer : What is the value to the client or customer? Give an overview of all the value this project will bring to the busi ness. Why should they allocate money for the project
Basic of bachelor degree in hospitality and tourism : Only require basic of Bachelor Degree in Hospitality and Tourism. Not too further in Higher Education. This is the requirement from marks rubric Provides a great level of information plus some discussion of published literature.
Issues of access to target population : Discuss the methods you would use to carry out the research. You should cover the issues of access to your target population, the proposed sampling method, the instrument(s) to be used and the recording of data.
What type of statistical data is represented by apie diagram : What type of statistical data is best represented by apie diagram? Illustrate your answer with Example. What conditions must generally be borne in mind while presenting statistical data?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Design two level and-or and not circuit

Design a two level AND , OR ,NOT circuit for the following I/O priority circuit,when the ack input is true ack will be made true for the smallest j for which req is true.

  Hardware-software requirements for small business

My name is Jason Long. I am the CEO of IL Corporation. IL is an investment firm that performs financial services to many organizations. We currently have a staff of 4 employees. We have 2 support staff members and 2 staff members, including myself..

  Which design strategy would you recommend

Assume that you are developing a new system for a local real estate agency. The agency wants to keep a database of its own property listing and also wants to have access to the city wide multiple listing service used by all real estate agency. Which ..

  Inserting radio-frequency identification

Some organizations have gone as far as inserting radio-frequency identification (RFID) chips into their employees to control their access into secure areas and to monitor their movement and location.

  Point out which following functions exist and which cannot

Point out which of the following functions can exist and which cannot. Provide either reasons for functions that cannot exist, or examples for functions that can exist a. A bijection from Ø to 2^Ø b. A bijection from ? to ?

  Notes on lyt2

seabreeze is a fictional, midsize city in southern California. Once prosperous due to its enviable location on the coastline, the city has undergone a change in fortune.

  Write quickest and easiest way to recover data

What is the quickest and easiest way to solve most urgent problem, recovering data? Write the major steps in that process.

  Sketch the input and output timing waveforms

For a 3-to-8 decoder with high outputs and an active high enable line (EN): a) List the truth table: b) write the boolean equations: c) sketch the input and output timing waveforms for all input combinations.

  What type of malware attack is this

What type of malware attack is this and what vulnerability is she trying to exploit in order to get her malware code past the network firewalls of these companies?

  initialize the temperature to 100 degrees celsius

Initialize the temperature to 100 degrees Celsius. In a loop, decrement the Celsius value and compute the corresponding temperature in Fahrenheit until the two values are the same.

  What is the impact of emi on fiber optic cables?

What is the impact of EMI on fiber optic cables?

  Guest lecturer at a local university for an ethical hacking

Imagine you've been sought out as a guest lecturer at a local university for an ethical hacking course. You have been asked to prepare a paper for the students, as well as a PowerPoint presentation, regarding the use of cryptography in corporations t..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd