Font Size: a A A

The Appliance Of The Software Engineering Theory In The PC Security Project

Posted on:2005-07-01Degree:MasterType:Thesis
Country:ChinaCandidate:W TangFull Text:PDF
GTID:2168360125955976Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Some of the concepts and methods explored in the early stage of the computer science not only counteracted the development of the software, but also are widely used today. People did not realize the cause of the failure; on the contrary, the faulty concepts and methods are still applied. It is true in practice that the faulty concepts and methods will come to mind naturally, which is related to the way in which the developer thinks and independent of the projects. Therefore, the key is to import the practice-proved theory of software engineering to the software development process and influence the thought and decision making process of the developer, which can avoid the formation of the faulty concepts and methods from the human and process aspect.The first chapter introduced the Fingerprint Identification project and its basic information, and pointed out the scope of the software engineering, which is also the scope of this article. Furthermore in this chapter, the problems with software production are analyzed, which are essential or accidental, and the accidental ones can be amenable to research breakthroughs while the essential ones can not be changed. The second chapter discussed several software life cycles with the advantages and disadvantages of each cycle, and the adaptability is also involved. From this aspect of process, the right life cycle is selected and applied to the Fingerprint Identification project. Through analyzing the life cycle model, the object-oriented life cycle was selected, and following the object-oriented paradigm, the whole development process was appropriately guided. The third chapter focused on the organization of the team, which is from the human aspect. The human and process are interdependent aspects of software development. Only the utility of CMM or Extreme Programming will not guarantee the success of the product. In this Fingerprint Identification project, it is essential that both the communication between team members and the review of test should be met in the small size team. These problems were solved largely due to the analyzing. The skill and technique used in requirement analysis, specification and design phases of the PC Security are explained in chapter four to six. The more mature the skill is the more useful and adaptive it will be in the project.Following this idea, the selected skills were proved to be productive in the process of development.The Fingerprint Identification project was just coming to the design phase when this thesis started to be written, so the rest of the development phases are omitted.
Keywords/Search Tags:Software Engineering, Life Cycle Model, Requirements, Specification, Design
PDF Full Text Request
Related items