Bulk Fodder Storage System (BFSS) - Requirements Practice Assignment

Verified

Added on  2023/01/19

|19
|4303
|68
AI Summary
The report is written for Bulk Fodder Storage System (BFSS) project. It is the project that is being funded through the drought assistance measures of Queensland. The primary aim of the system will be to make sure that the capability is provided for holding fodder for various properties present in Warrego catchment and Murweh shire. There will be a number of resources and activities involved in the project and it will result in relief for the farmers as well as the graziers. BFSS is first of such systems being prepared.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
qwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopa
sdfghjklzxcvbnmqwertyuiopasdf
ghjklzxcvbnmqwertyuiopasdfghj
klzxcvbnmqwertyuiopasdfghjklz
xcvbnmqwertyuiopasdfghjklzxcv
bnmqwertyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwe
rtyuiopasdfghjklzxcvbnmqwerty
uiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopas
dfghjklzxcvbnmqwertyuiopasdfg
hjklzxcvbnmqwertyuiopasdfghjk
lzxcvbnmrtyuiopasdfghjklzxcvbn
Requirements Practice Assignment
Bulk Fodder Storage System (BFSS)
4/26/2019
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BFSS
Table of Contents
Introduction...........................................................................................................................................2
Context diagram....................................................................................................................................2
System External Interfaces....................................................................................................................2
Interface Analysis..............................................................................................................................3
Impact Analysis/Control Analysis.....................................................................................................4
Framework.....................................................................................................................................4
Establish the Context.....................................................................................................................4
Risk Identification.........................................................................................................................4
Risk Analysis.................................................................................................................................5
Risk Evaluation.............................................................................................................................7
Risk Treatment..............................................................................................................................8
Conclusion.........................................................................................................................................9
Trade Studies.........................................................................................................................................9
Requirements Breakdown Structure....................................................................................................13
Conclusion...........................................................................................................................................16
References...........................................................................................................................................18
Document Page
BFSS
Introduction
The report is written for Bulk Fodder Storage System (BFSS) project. It is the project that is
being funded through the drought assistance measures of Queensland (Doman, 2018). The
primary aim of the system will be to make sure that the capability is provided for holding
fodder for various properties present in Warrego catchment and Murweh shire. There will be
a number of resources and activities involved in the project and it will result in relief for the
farmers as well as the graziers. BFSS is first of such systems being prepared.
The report covers the context diagram, external interfaces of the system, system-level trade
studies, and resource background structure.
Context diagram
System External Interfaces
There will be a number of external interfaces associated with the BFSS. In this section, the
details of these system external interfaces are presented. Also, these system external
interfaces will be labelled on the context diagram prepared for the project.
The external interfaces associated with the system are included in the table below.
Document Page
BFSS
External Interface Description
Security System BFSS will comprise of expensive material and equipment. It
will, therefore, be essential that the security of the entire
facility is considered and is maintained at all times. Theft and
vandalism shall not emerge as the issues and the security
systems will be necessary to be installed to protect all of the
materials. These will comprise of physical and technical
security systems.
User Interface There will be a tracking system incorporated to make sure that
the storage is tracked continuously. The access to the same and
the execution of such operations will be conducted using the
user interface.
Interface Analysis
It is necessary to have detailed information around the interfaces to understand their role in
the system. The analysis of the interface that is developed is conducted to explain the nature
and properties associated with the same.
Interface Statement The BFSS will be required to be kept safe and secure at all times.
The safety of the facility along with the materials and equipment will
be necessary.
ID 1
Name Security System
Short Title Security
Description
Who The local and state government along with the project team will be
involved in the process of ensuring that the security system is
installed and the safety of the facility along with the materials and
equipment is provided at all times.
What BFSS will comprise of expensive material and equipment. It will,
therefore, be essential that the security of the entire facility is
considered and is maintained at all times. Theft and vandalism shall
not emerge as the issues and the security systems will be necessary
to be installed to protect all of the materials. These will comprise of
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BFSS
physical and technical security systems (Doman, 2018).
How The security systems will include physical and technical security
tools and devices in the form of alarms, authentication systems,
access controls, and monitoring devices.
When The security systems will be integrated with the BFSS during the
implementation phase of the project.
Where The security systems will be available at the facility site.
Why There are numerous safety and security issues that may come up and
it will be essential to protect the systems against these issues.
Impact Analysis/Control Analysis
It will be necessary to undertake the impact and control analysis on the selected interface to
determine the associated risks and come up with the resolution to treat these risks.
Framework
The framework that will be used for impact/control analysis will be AS/NZS ISO
31000:2009. The framework will comprise of the phases as establish the context, risk
identification, risk analysis, risk evaluation, and risk treatment. The use of the framework will
provide the ability to manage the risks. There will be step by step execution of these methods
that will be done to make sure that the risk management is adequately done. The information
on these methods and mechanisms is included in the sections below.
Establish the Context
The identification of the risks will be done using the data collection and gathering techniques,
such as surveys, questionnaires, interviews, observations, and domain analysis.
There will be a number of data sources that will be involved and will be utilized.
The analysis of the risks will be done using the probability and impact score that will be
allotted in three categories as low, medium, or high. The risk score will be determined on the
basis of the probability and impact scores as low, medium, or high.
Risk Identification
The security system interface that will be integrated with the BFSS may have certain risks
and issues associated with it. The description of these issues is included in the table below.
Document Page
BFSS
ID Name Description
1 Installation
Errors
The physical and technical security devices and tools will
be required to be installed. There may be certain errors that
may emerge in the installation process.
2 Integration
Issues
The physical and technical security devices and tools will
be required to be integrated. There may be certain errors
that may emerge in the integration process in terms of sync
issues or performance gaps.
3 Vendor Issues –
Contractual
Problems
The security tools and devices will be procured from the
third-party vendors and there may be gaps in the contractual
processes or the delivered tools may not fall in line with the
expected outcomes (Spangenberg, 2012).
4 Technical Errors There may be technical gaps or errors that may be
encountered in the process.
5 Operational
Issues
The operational errors and issues may be observed in the
installation and integration process.
6 Quality Issues There may be gaps in the quality norms and guidelines that
may be witnessed.
7 Communication
Gaps
The resources may not communicate with the vendors
resulting in the gaps in understanding of the requirements.
Risk Analysis
There are several risks associated with the external system interface identified. The analysis
of these risks will provide information on the probability and impact levels associated with
the risk. The risk score will be determined on the basis of these levels so that the treatment of
the risks can be accordingly done.
I
D
Name Description Probability Impact Risk Score
1 Installation
Errors
The physical and technical security devices and
tools will be required to be installed. There may be
certain errors that may emerge in the installation
process.
The
probability
level
identified
and
The impact
level
identified
and
calculated
On the
basis of
risk
probability
and impact
Document Page
BFSS
calculated
for the risk
is Low
for the risk
is Medium
levels, the
score for
the risk is
Medium
2 Integration
Issues
The physical and technical security devices and
tools will be required to be integrated. There may be
certain errors that may emerge in the integration
process in terms of sync issues or performance gaps
(Selim, Hagag & Yousef, 2018).
The
probability
level
identified
and
calculated
for the risk
is Low
The impact
level
identified
and
calculated
for the risk
is Medium
On the
basis of
risk
probability
and impact
levels, the
score for
the risk is
Medium
3 Vendor Issues –
Contractual
Problems
The security tools and devices will be procured from
the third-party vendors and there may be gaps in the
contractual processes or the delivered tools may not
fall in line with the expected outcomes.
The
probability
level
identified
and
calculated
for the risk
is Low
The impact
level
identified
and
calculated
for the risk
is Medium
On the
basis of
risk
probability
and impact
levels, the
score for
the risk is
Medium
4 Technical
Errors
There may be technical gaps or errors that may be
encountered in the process.
The
probability
level
identified
and
calculated
for the risk
is Medium
The impact
level
identified
and
calculated
for the risk
is Medium
On the
basis of
risk
probability
and impact
levels, the
score for
the risk is
Medium
5 Operational
Issues
The operational errors and issues may be observed
in the installation and integration process.
The
probability
level
The impact
level
identified
On the
basis of
risk
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BFSS
identified
and
calculated
for the risk
is Medium
and
calculated
for the risk
is Medium
probability
and impact
levels, the
score for
the risk is
Medium
6 Quality Issues There may be gaps in the quality norms and
guidelines that may be witnessed.
The
probability
level
identified
and
calculated
for the risk
is Low
The impact
level
identified
and
calculated
for the risk
is High
On the
basis of
risk
probability
and impact
levels, the
score for
the risk is
High
7 Communication
Gaps
The resources may not communicate with the
vendors resulting in the gaps in understanding of the
requirements.
The
probability
level
identified
and
calculated
for the risk
is Medium
The impact
level
identified
and
calculated
for the risk
is High
On the
basis of
risk
probability
and impact
levels, the
score for
the risk is
High
Risk Evaluation
The risks with the risk score as low can be acceptable in a project. However, in the case of
security system risks, all of the risks have been mapped with the risk score as medium or
high.
Therefore, all of these risks have been kept in the risk category as non-acceptable and
treatment of these risks will be essential.
Document Page
BFSS
Risk Treatment
There are different treatment mechanisms that can be applied to the risks. The treatment of
the risks can be done by responding the risk with the strategy as risk avoidance. Mitigation,
sharing, and transfer are the other strategies that can be applied to treat the risk.
I
D
Name Description Risk Score Evaluation Treatment
1 Installation
Errors
The physical and technical security
devices and tools will be required to be
installed. There may be certain errors
that may emerge in the installation
process.
Medium The risk has
been identified
as a non-
acceptable risk
and shall be
treated.
The risk shall be
treated using the
response method
as avoidance of the
risk.
2 Integration
Issues
The physical and technical security
devices and tools will be required to be
integrated. There may be certain errors
that may emerge in the integration
process in terms of sync issues or
performance gaps.
Medium The risk has
been identified
as a non-
acceptable risk
and shall be
treated.
The risk shall be
treated using the
response method
as avoidance of the
risk.
3 Vendor Issues –
Contractual
Problems
The security tools and devices will be
procured from the third-party vendors
and there may be gaps in the
contractual processes or the delivered
tools may not fall in line with the
expected outcomes.
Medium The risk has
been identified
as a non-
acceptable risk
and shall be
treated.
The risk shall be
treated using the
response method
as transfer of the
risk.
4 Technical
Errors
There may be technical gaps or errors
that may be encountered in the process.
Medium The risk has
been identified
as a non-
acceptable risk
and shall be
treated.
The risk shall be
treated using the
response method
as transfer of the
risk.
5 Operational
Issues
The operational errors and issues may
be observed in the installation and
integration process.
Medium The risk has
been identified
as a non-
The risk shall be
treated using the
response method
Document Page
BFSS
acceptable risk
and shall be
treated.
as avoidance of the
risk.
6 Quality Issues There may be gaps in the quality norms
and guidelines that may be witnessed.
High The risk has
been identified
as a non-
acceptable risk
and shall be
treated.
The risk shall be
treated using the
response method
as avoidance of the
risk.
7 Communication
Gaps
The resources may not communicate
with the vendors resulting in the gaps in
understanding of the requirements.
High The risk has
been identified
as a non-
acceptable risk
and shall be
treated.
The risk shall be
treated using the
response method
as avoidance of the
risk.
Conclusion
There will be a number of external interfaces associated with the BFSS. There will also be
numerous risks associated with the system. The treatment of these risks will be essential so
that the integration of the external interface with the system can be successfully done (Blasco,
Garcia-Quevedo & Teruel, 2013).
The management of these risks will be done in a series of phases as identification, analysis,
evaluation, treatment, and closure.
Trade Studies
There will be a number of trade studies involved with the project. The details of the same are
included in the table below.
Trade Study Group Priority Allocate Resources
Security Options Required 3 Project team, Project
Managers, Funds for the
devices and equipment
Installation Options Required 4 Project team, Project
Managers, Funds for the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BFSS
devices and equipment
Procurement and
Contractual Methods
Required 5 Project team, Project
Managers, Funds for the
devices and equipment,
vendor groups
Storage emergency
options
Mandatory 1 Project team, Project
Managers, Funds for the
devices and equipment,
facility manager, site staff
Building Options Mandatory 2 Project team, Project
Managers, Funds for the
devices and equipment,
construction team
T004 – Storage emergency options
Trade study objective – The objective of the storage emergency options trade study is store the
material at any point and weather condition.
Justification of the trade study – BFSS shall be storing bulk food for drought times. And it has been
built using expensive material and equipment.
Requirements of the trade study – In order to implement the storage trade study, the required
resource and equipment should be available.
Scope of the trade study – The storage study study shall take care of storage of approved materials
and equipments.
Data available for solution – It is assumed that data related to storing what amount of which
material are already available.
Resources for the trade study – Case studies related to security mechanism of different storage
facilities.
Identification of alternate solutions – The storage of material needs to be done in any condition
such as under non-availability of electricity power or under rainy season. Since all equipments work
require power to conduct any task, an alternate solution should be find out when non-power is
available:
Solution options Justification Type
Solar power Minimize operating cost and
also provide power during
power shutdown or storage,
Hybrid – The equipment will be
installed once and then can be
outsourced for the BFSS.
Document Page
BFSS
Nomination of selection criteria
The solar power alternate solution should be selected after defining a nomination criteria. The
criteria for solar power should be based performance, management and reliability.
ID Selection criteria Quantitative measure Rationale
1 Performance Amount of bulk storage per
year
Performance is critical for every
system or for the solar option
alternate solution hence it is
expected that the
2 Management Coordination and
management level to achieve
the required capability of
alternative solution.
3 Reliability Average number of shutdown
per year
Determination of criteria weighting
Criteria Weighting Rationale
Performance 1 To ensure that bulk is stored without any disruptions.
Management 3 Simple and effective system
Reliability 4 To ensure that system is available under any condition.
Definition of scoring functions
Scores are assigned between 0 to 10 and must be applied to all criteria:
System
Management Performance Relaibility
Document Page
BFSS
Score Value Description
-- (Very Poor) -2 Relative to other solution, it tends to be very poor
- (Poor) -1 Relative to other solution, it tends to be poor
S (Same) 0 Relative to other solution, it tends to be same
+ (better) 1 Relative to other solution, it tends to be better
++ (Very better) 2 Relative to other solution, it tends to be very better
Scoring function:
ID Selection
Criteria
Score
1 2 3 4 5 6 7 8
1 Performance
(average
amount of
bulk storage
per year)
Less
than
1000
1000-
2000
3000-
4000
4000-
5000
5000-
6000
6000-
7000
7000-
8000
More
than
8000
Evaluation of alternatives
Once all the weights and scoring functions have been defined, now assessment will be carried out:
Alternative Performanc
e
Weight Reliability Weight Management Weight Weighted
score
Solar
power in-
house
6 0.5 6 0.2 8 0.4 7.4
Sensitivity study
In order to conduct the sensitivity analysis, the above aspects are increased by 1:
Alternative Performanc
e
Weight Reliability Weight Management Weight Weighted
score
Solar
power in-
house
7 0.5 7 0.2 9 0.4 8.5
The above aspects are decreased by 1:
Alternative Performanc
e
Weight Reliability Weight Management Weight Weighted
score
Solar
power in-
5 0.5 5 0.2 7 0.4 6.3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BFSS
house
Conclusion
It has been inferred that solar power option when installed in-house will be beneficial as it
has passed the sensitivity analysis test as increasing or decreasing the values of aspects by 1,
does not have much impact on the weighted score.
Requirements Breakdown Structure
There will be numerous requirements associated with the BFSS. It is necessary that the
requirements of a system are identified accurately. This is because the detailed account of the
requirements provides clarity to the members of the project team in terms of the tasks and
responsibilities that they need to perform. The requirements can be classified in different
categories. The break-up and classification of the requirements can be represented in
hierarchical manner with the aid of the RBS. The requirements for BFSS will be covered in
the following form and the use of the structure below depicts the different categories of
requirements associated with the system.
The requirements associated with the system are shown in the table below.
RBS Requirement Name Type Active
1 Business Requirements Fixed Yes
Business
Requirements
Stakeholder
Requirements
Solution
Requirements
Functional
Requirements
User
System
Non-Functional
Requirements
Quality
Performance
Security
Transition
Requirements
Document Page
BFSS
Duration
1.1 Central bulk fodder storage facility shall be developed Fixed Units Yes
1.2 The facility shall be capable of holding up to a year's
supply
Fixed Units Yes
1.3 The system shall allow issuing fodder to local property
owners
Fixed Units Yes
1.4 The project shall include the timely delivery of the
system (Wolter & Meinel, 2010)
Fixed Units Yes
1.5 The project shall include the timely delivery of all the
system deliverables
Fixed Units Yes
1.6 Stakeholder Requirements
Fixed
Duration Yes
1.6.1 The system shall accept the bulk fodder delivery by
commercial road train (triples)
Fixed Units Yes
1.6.2 The system shall accept the bulk fodder delivery by
B-doubles
Fixed Units Yes
1.6.3
The system shall accept the bulk fodder delivery by
and standard trucks during the initial stock ‘build up’
phase of operations each year (after harvest)
Fixed Units Yes
1.6.4
The system shall accept the bulk fodder delivery
from several other states including other areas in
Queensland
Fixed Units Yes
1.6.5 Solutions Requirements
Fixed
Duration Yes
1.6.5.1 Functional Requirements
Fixed
Duration Yes
1.6.5.1.1 User Requirements
Fixed
Duration Yes
Document Page
BFSS
1.6.5.1.1.1 The system shall be accessible throughout the
year
Fixed Units Yes
1.6.5.1.1.2 The system shall provide the ability to get the
fodder issued as per the request placed
Fixed Units Yes
1.6.5.1.1.3 The system shall provide drought assistance
and relief
Fixed Units Yes
1.6.5.1.2 System Requirements
Fixed
Duration Yes
1.6.5.1.2.1 The storage and other components shall be
integrated with each other
Fixed Units Yes
1.6.5.1.2.2 The maintenance activities shall be regularly
carried out
Fixed Units Yes
1.6.5.1.2.3 The system shall maintain the supply of the
fodder as per the requests
Fixed Units Yes
1.6.5.2 Non-Functional Requirements
Fixed
Duration Yes
1.6.5.2.1 Quality
Fixed
Duration Yes
1.6.5.2.1.1 The system shall adhere with the quality
standards and protocols
Fixed Units Yes
1.6.5.2.1.2 The system shall provide access to the users as
per their roles
Fixed Units Yes
1.6.5.2.1.3
The system shall not have any issues of lags or
inability to provide fodder at any instance (Chung,
Nixon & Yu, 2014)
Fixed Units Yes
1.6.5.2.2 Security
Fixed
Duration Yes
1.6.5.2.2.1 The system shall provide safety and security
from the external risks
Fixed Units Yes
1.6.5.2.2.2 The system shall generate alerts in the case of
insufficient supplies (Zafar, Arnautovic, Diabat &
Fixed Units Yes
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BFSS
Svetinovic, 2013)
1.6.5.2.2.3 The system shall provide safety from the issues
of fire and other hazards
Fixed Units Yes
1.6.5.2.3 Performance
Fixed
Duration Yes
1.6.5.2.3.1 The system shall meet the needs of the users at
all times
Fixed Units Yes
1.6.5.2.3.2 The system shall not show any issues around
the accessibility (Yang, 2017)
Fixed Units Yes
1.6.6 Transition Requirements
Fixed
Duration Yes
1.6.6.1 The system shall allow ease of transition Fixed Units Yes
1.6.6.2 The system shall accept the supply from varied
sources
Fixed Units Yes
1.6.6.3 The system shall show enhanced levels of
integration
Fixed Units Yes
Conclusion
BFSS is a system that is being developed to provide drought assistance and relief to the
people of Queensland. One of the most significant phases of the system will be to analyse and
design the system aspects correctly. There are numerous system components and properties
associated with the BFSS. The analysis of the system provides the information on the system
context in terms of the system properties, behaviour, dependencies, and boundary. The BFSS
also includes numerous external system interfaces that also need to be analysed to be
correctly implemented. BFSS will comprise of expensive material and equipment. It will,
therefore, be essential that the security of the entire facility is considered and is maintained at
all times. There may be various risks that may be associated with the security system. The
analysis of these risks is done in terms of the identification, analysis, evaluation, and
treatment of the risks. Some of the risks identified with the interface include technical errors,
operational errors, installation issues, communication issues, integration issues, and likewise.
The requirements analysis and breakup of the requirements is also essential to make sure that
Document Page
BFSS
the clarity on the system is achieved. The requirements can be classified in various sub-
requirements and components in terms of business requirements, stakeholder requirements,
etc. The break-up of the requirements will provide clarity to the members of the project team
in terms of the goals and objectives of the project. Also, the short-term goals will be
developed so that the implementation and fulfilment of the requirements is done.
Document Page
BFSS
References
Blasco, A., Garcia-Quevedo, J., & Teruel, M. (2013). Financial Constraints and the Failure of
Innovation Projects. SSRN Electronic Journal. doi: 10.2139/ssrn.2229167
Chung, L., Nixon, B., & Yu, E. (2014). Dealing with change: An approach using non-
functional requirements. Requirements Engineering, 1(4), 238-260. doi:
10.1007/bf01587102
Doman, M. (2018). 'Astonishing intensity': Scientists floored by satellite imagery of
bushfires. Retrieved from https://www.abc.net.au/news/2018-12-08/from-space,-the-
ferocity-of-queenslands-bushfires-is-revealed/10594662
Selim, A., Hagag, M., & Yousef, P. (2018). Risk allocation for infrastructure projects by
PPPs - under environmental management and risk assessment mechanisms.
International Journal Of Risk Assessment And Management, 22(1), 89. doi:
10.1504/ijram.2018.10017043
Spangenberg, S. (2012). An injury risk model for large construction projects. Risk
Management, 11(2), 111-134. doi: 10.1057/rm.2009.5
Wolter, C., & Meinel, C. (2010). An approach to capture authorisation requirements in
business processes. Requirements Engineering, 15(4), 359-373. doi: 10.1007/s00766-
010-0103-y
Yang, L. (2017). Requirements Engineering Practice to Improve Project Performance and
Competitive Advantage. International Journal Of System Modeling And Simulation,
2(3), 1. doi: 10.24178/ijsms.2017.2.3.01
Zafar, N., Arnautovic, E., Diabat, A., & Svetinovic, D. (2013). System Security
Requirements Analysis:A Smart Grid Case Study. Systems Engineering, 17(1), 77-88.
doi: 10.1002/sys.21252
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]