The iterative waterfall model and agile methodology for software development is compared below:
Iterative Waterfall Model |
Agile Software development |
It is identified that in iterative waterfall model, the procedure of iteration mainly occurs by simply implementation different set of small software requirements that iteratively helps in enhancing the evolving versions of the entire systems (Raval and Rathod 2014). |
Agile software development is one of the group development methodologies that is dependent on iterative as well as increment development where all the solutions as well as requirements evolve with the help of collaboration between different cross-functional teams. |
It does not mainly starts with full specification of requirements and as a result, development of the system starts by implementing the software only. After its implementation, the entire software is reviewed in order to find out further requirements (Alshamrani and Bahattab 2015). |
In this methodology, all the requirements as well as needs of the project are specified properly so that the project manager does not have to review the project after each phase (Moran 2014). |
Risks as well as challenges that are identified during each increment procedure can be applied to the next increment process. |
Risks as well as challenges that are identified cannot be applied to the next increment. |
System architecture as well as design issues arise as all the requirements are not gathered during the beginning of the cycle. |
These models not create design issues as all the requirement of the system are specified before the beginning of the cycle. |
It is identified that agile software development methodology is mainly selected, as with the help of agile methodology the mine pump monitoring and control system can be developed error free because all the requirements of the system are specified before the initiation phase of the project (Smith, Joubert and van 2015). Proper implementation of the system is quite useful for minimizing flood as well as other safety hazards.
The various functional as well as non-functional requirements for mine pump monitoring and control systems are provided below:
Functional requirements
The various types of functional requirements for mine pump monitoring and control system are as follows:
Pump operation: The operation of the pump is dependent on the sensors. When the high-level water sensor senses that the level of flooding exceeds its maximum level then the pump begins and when the minimum level of flood is reached the pump stops (Martins and Oliveira 2014). The pump is switched off only when the water has pumped out and the minimum level of the flood is sensed by the low water sensor.
Pump monitoring: The entire behavior of the pump is monitored in order to examine the state of transitions that it generally undergoes. The sensors that are present within the pump help in monitoring the level of water. It is identified that high water sensor is mainly utilized for measuring the maximum acceptable level of flooding within the shaft while the low water sensor assists in monitoring the minimum acceptable level of flooding. The pump monitoring is mainly required in order to get proper information about the number of transition together with the time of each transition.
Environment monitoring: It is identified that values from the methane sensor are periodically read as well as logged (Liu, Lau and Li 2014). The level of methane in the air is monitored with the help of sensor, which is generally utilized for triggering an alarm when the methane level enhances.
Operator information: The operator of the system must have information as well as data about all the critical events including the readings about environment sensor as well as crossing critical thresholds. All the information that is provided must be accurate so that the entire system can function properly.
Non-functional requirements
The various types of non- functional requirements for mine pump monitoring and control system are as follows:
a.) Dependability
The dependability requirement of the system mainly concerns the security as well as reliability of the system.
Reliability: It is found that the reliability of the entire system is mainly measured to the extent to which the entire pump operates (Westfall 2014). The requirement of reliability is measured in context to work shifts that is generally prepared to lose.
Safety: The entire safety of the system is measured with the probability of explosion by the pump operation when the level if methane is high.
b.) Timing
There are number of requirements that are mainly related with the timelines of the system actions.
Monitoring periods: The maximum time that is taken for reading the sensors can be dictated with the help of legislation (Sung et al. 2014).
Shut down deadline:In order to avoid various types of explosion, there is a deadline within which the pump is required to be switched off once the methane level exceeds a critical threshold.
c.) Security
The requirement of security is that an operator must not masquerade as the supervisor therefore they can be able to acquire the entire capability to switch the pump off or on as per the level of water (Canedo, Schwarzenbach and Faruque 2013).
Figure 1: Use case Diagram
(Source: Created by Author)
Name |
Log In |
Brief Description |
The supervisor and the operator log in into the system. |
Actor(s) |
Logged In User |
Flow of Events |
|
Basic Flow |
|
The use case generally starts when the use enter the login page Both the username as well as password is required by the system Both the username as well as password is entered by the user The username and the password is mainly validated by making sure that the use enters correct details The user sign in The entire use case ends |
|
Alternate Flows |
|
Title |
Description |
User Fails Authentication |
If the password or username entered by the user is not correct then The system provides details about the user failed authentication The system provides the suggestion to change password The system prompts for providing the opportunity to re-enter the details again The basic flow continues. |
Pre-Conditions |
|
Title |
Description |
(none) |
|
Post-Conditions |
|
Title |
Description |
Success |
The user is generally authenticated and home page is displayed as per the user type. |
Failure |
The user are unable to login |
Extension Points |
|
None |
Name |
Waterlevel |
Brief Description |
The level of the user is operated by both supervisor and operator. |
Actor(s) |
Monitors water level |
Flow of Events |
|
Basic Flow |
|
The use case follows: The user measures analyzes data for monitoring water level Information about the water level is provided by the system The pump is witched off if the level of water is low If the level of water is high, the user switch on the pump After that, the use case ends. |
|
Alternate Flows |
|
Title |
Description |
If the methane evacuation occurs |
If methane gas triggers evacuation then: The user enters into the system The user checks the level of water In spite of focusing on the level of water, the user switch off the system |
Pre-Conditions |
|
Title |
Description |
(none) |
|
Post-Conditions |
|
Title |
Description |
Success |
The user is capable of operating the system for monitoring the level of water |
Failure |
The user is unable to monitor the water level |
Extension Points |
|
None |
Name |
Methane level |
Brief Description |
The supervisor and the operator log in into the system. |
Actor(s) |
Monitoring methane level |
Flow of Events |
|
Basic Flow |
|
The use case starts when the level of methane triggers evacuation: The user enters the system The user checks the water level In spite of the water level, switch off the pump The use case ends |
|
Alternate Flows |
|
Title |
Description |
None |
|
Pre-Conditions |
|
Title |
Description |
(none) |
|
Post-Conditions |
|
Title |
Description |
Success |
The user is able to switch off the pump |
Failure |
The user is unable to switch off the pump |
Extension Points |
|
None |
The tools and technique that are required for designing as well as developing an information system is provided below:
Proper development methodology: Agile software development methodology is mainly utilized in order to develop the information system. Agile software development is one of the conceptual frameworks that help in minimizing the risks that are related with the development of Information System (Ghobadi and Mathiassen 2016). This methodology is mainly utilized as it generally follows quick as well as less co-ordinate movement. It is identified that quick development as well as testing assists in recognizing the gaps that generally exists in the procedure of system development.
Modeling technique: The modeling technique that is needed in order to design as well as develop an information system is UML diagrams. The UML is one of the modeling languages that are mainly utilized for specifying, visualizing, developing as well as documenting the software system (Bazydlo, Adamski and Stefanowicz 2014). It generally helps in offering flexibility for visualizing all the way for different procedures of business.
Development tool: The tool that is utilized for the mine pump monitoring and control system is embedded system development. It is identified that embedded system development tool helps in providing appropriate degree of control to the developer so that they can utilize the resources effectively.
Figure 2: Class Diagram
(Source: Created by Author)
The system that is developed is useful in minimizing the problems that causes during flood or due to the exposure of methane. However, if some additional features are incorporated within the system then it helps in providing number of advantages. The various aspects of improvements within the system include:
Excavator alarm data for surface of coalmine: An excavator in a surface of a coalmine can be utilized in order to transmit the status of alarm as well as operational data to the cabin of the operator (Ladegard and Gjerde 2014). It helps in replacing all the flexible cable connections, which are unreliable.
Video monitoring: ELPRO wireless Ethernet can be utilized for connecting video cameras that can be useful for monitoring the cabins as well as the condition during flood (Mare Kriel and Marais 2016). The wireless video connection helps in enabling the carrier driver to monitor the entire area for various unsafe situations during emergency.
References
Alshamrani, A. and Bahattab, A., 2015. A comparison between three SDLC models waterfall model, spiral model, and Incremental/Iterative model. International Journal of Computer Science Issues (IJCSI), 12(1), p.106.
Bazydlo, G., Adamski, M. and Stefanowicz, L., 2014, June. Translation UML diagrams into Verilog. In Human System Interactions (HSI), 2014 7th International Conference on(pp. 267-271). IEEE.
Canedo, A., Schwarzenbach, E. and Faruque, M.A.A., 2013, April.Context-sensitive synthesis of executable functional models of cyber-physical systems.In Cyber-Physical Systems (ICCPS), 2013 ACM/IEEE International Conference on (pp. 99-108).IEEE.
Ghobadi, S. and Mathiassen, L., 2016.Perceived barriers to effective knowledge sharing in agile software teams. Information Systems Journal, 26(2), pp.95-125.
Ladegard, G. and Gjerde, S., 2014. Leadership coaching, leader role-efficacy, and trust in subordinates. A mixed methods study assessing leadership coaching as a leadership development tool. The Leadership Quarterly, 25(4), pp.631-646.
Liu, X., Lau, S.K. and Li, H., 2014. Optimization and analysis of a multi-functional heat pump system with air source and gray water source in heating mode. Energy and Buildings, 69, pp.1-13.
Maré, P., Kriel, C.J.R. and Marais, J.H., 2016, August. Energy efficiency improvements through the integration of underground mine water reticulation and cooling systems. In Industrial and Commercial Use of Energy (ICUE), 2016 International Conference on the (pp. 112-117). IEEE.
Martins, L.E.G. and de Oliveira, T., 2014, August. A case study using a protocol to derive safety functional requirements from fault tree analysis. In Requirements Engineering Conference (RE), 2014 IEEE 22nd International (pp. 412-419). IEEE.
Moran, A., 2014.Agile Software Development.In Agile Risk Management (pp. 1-16).Springer International Publishing.
Raval, R.R. and Rathod, H.M., 2014.Improvements in Agile Model using Hybrid Theory for Software Development in Software Engineering. International Journal of Computer Applications, 90(16).
Smith, T., Joubert, H.P.R. and van Rensburg, J.F., 2015, August. Automated control of mine dewatering pumps to reduce electricity cost. In Industrial and Commercial Use of Energy (ICUE), 2015 International Conference on the (pp. 62-69). IEEE.
Sung, T., Kim, K.H., Han, S. and Kim, K.C., 2014. Thermodynamic Analysis on Hybrid Turbo Expander-Heat Pump System for Natural Gas Pressure Regulation. Journal of the Korean Institute of Gas, 18(4), pp.13-20.
Westfall, L., 2014. What, Why, Who, When, and How of Software Requirements. In Handbook of Research on Emerging Advancements and Technologies in Software Engineering (pp. 1-18).IGI Global.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download