ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Software Engineering Methodologies

Verified

Added on  2022/12/23

|11
|1190
|1
AI Summary
This study material provides an overview of software engineering methodologies, including entity relationship diagram, data flow diagram, control specifications, and data dictionary. It discusses the concept of fund transferring applications and how they reduce manual effort. The ERD provides insight into the required data attributes for the database, while the DFD shows how data flows through various processes. The state machine diagram illustrates the different states of the application. The data dictionary provides detailed information about the tables and attributes used in the application. Overall, this material offers a comprehensive understanding of software engineering methodologies.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: SOFTWARE ENGINEERING METHODOLOGIES
Software Engineering Methodologies
Name of the Student
Name of the University
Author’s note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1SOFTWARE ENGINEERING METHODOLOGIES
Table of Contents
Introduction: ............................................................................................................................... 2
Entity Relationship Diagram: ...................................................................................................... 3
Data Flow Diagram: .................................................................................................................... 4
Control Specifications: ................................................................................................................ 5
Data Dictionary: .......................................................................................................................... 5
Conclusion: ................................................................................................................................. 9
Bibliography: ............................................................................................................................ 10
Document Page
2SOFTWARE ENGINEERING METHODOLOGIES
Introduction:
The fund transferring applications are very popular now a days. These application reduces
the amount of effort needed to transfer amount to another bank manually at the bank. Each instance
of the application is installed at the client side or sender. The concept of sender and recipient is
completely dependent on the application instance. The ERD will provide insight to the data
attributes required for database. The DFD shows how the data flows through various processes.
Finally the state machine diagram shows each state of the application what activates the state.
Document Page
3SOFTWARE ENGINEERING METHODOLOGIES
Entity Relationship Diagram:
Sender
Account
Transfer
Recipient
user_idPK
email
password
name
address
contact
account_numberPK
signature
net_banking_passwor
d
branch
bank
balance
user_idFK
transfer_idPK
sender_idFK
recipient_idFK
amount
recipient_idPK
account_numberFK
name
contact_number
Figure 1: ERD of Bank File Transfer Application
(Source: Created by Author)
The above database model has four entities. Each of the entities represent different element
and factors of the process. The sender and recipient entities represent the human beings who has
account in bank. The sender is the one who authenticate the transaction. If a person who is recipient

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4SOFTWARE ENGINEERING METHODOLOGIES
in one person’s application is sending money to that person then role of sender and recipient
interchanges.
Data Flow Diagram:
1.0
Authenticate
Sender
User_id and password
2.0
Select Recipient
Recipient
Info
2.1
Enter Recipient name
and Account Info
Recipient Data
3.0
Complete Transfer
2.2
Enter O.T.P.
SMS Code
Transfer
D1 Sender
User_id and password
D2 Saved Recipient
Name and Account Info
D3 Saved Recipient
Name
and
Account Info
D4 Transfer
Sender, recipient, amount
Figure 2: DFD of Bank File Transfer Application
(Source: Created by Author)
The data flow diagram is a level one data flow diagram. The diagram has only one external
entity called sender. The sender is the only person who interacts with the application instance. The
recipient is a virtual entity. The sender details are stored in application instance which can be used
for authenticating the user. Then the sender selects the recipient for the transfer. The recipient data
Document Page
5SOFTWARE ENGINEERING METHODOLOGIES
can either be saved in the application or it can be new. If the recipient data is not saved then the
sender have to enter it manually. The sender will complete the transfer and transfer related data
will be stored in the database.
Control Specifications:
Initiated
Select Fund Transfer
Reciepient Selected
Recpient Verified
Saved Recipient
Reciepient Entered
Recpient Verified
Enter Recipient
Transfer Complete
Transfer Confirm
Transfer Confirm
Code
verified
Figure 3: State Machine Diagram of Bank File Transfer Application
(Source: Created by Author)
Process Activated
Control action
Recognize
Sender
Show
Recipient
Details
New
Recipient
SMS
verification
Authenticate user 1 0 0 0
Fetch saved recipient data 0 1 0 0
Store new recipient 1 0 1 0
Verify SMS 0 0 1 1
Complete transfer 0 0 0 0
Data Dictionary:
Table: Sender
Document Page
6SOFTWARE ENGINEERING METHODOLOGIES
Attribute Data
Type
Length Description Primary
Key
Foreign
Key
user_id Int 11 The unique key of the table
which allows finding rows
individually
Yes No
name Varchar 200 The full name of the sender No No
address Varchar 200 The residential address of
the user
No No
contact Int 10 The contact number without
state code
No No
email Varchar 200 The email address of user to
which emails can be sent
No No
password Varchar 200 Password for authentication No No
Table: Account
Attribute Data
Type
Length Description Primary
Key
Foreign
Key
account_number Int 11 The unique key of the
table which allows
finding rows
individually
Yes No

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7SOFTWARE ENGINEERING METHODOLOGIES
user_id Int 11 Reference to the sender
entity primary key
No Yes
branch Varchar 200 The name of the
branch within which
the bank account was
opened
No No
bank Int 10 Name of the bank in
which the account was
opened
No No
balance Varchar 200 The current balance of
the account
No No
signature Varchar 200 Digital signature of the
sender
No No
net_banking_password Varchar 200 Password for
authentication of net-
banking facility
No No
Table: Recipient
Attribute Data
Type
Length Description Primary
Key
Foreign
Key
Document Page
8SOFTWARE ENGINEERING METHODOLOGIES
recipient_id Int 11 The unique key of the table
which allows finding rows
individually
Yes No
account_number Int 11 Reference to the account
entity primary key
No Yes
name Varchar 200 The full name of the
recipient
No No
contact Int 10 The contact number
without state code
No No
Table: Transfer
Attribute Data
Type
Length Description Primary
Key
Foreign
Key
transfer_id Int 11 The unique key of the
table which allows
finding rows
individually
Yes No
user_id Int 11 Reference to the sender
entity primary key
No Yes
recipient_id Int 11 Reference to the
recipient entity
primary key
No Yes
Document Page
9SOFTWARE ENGINEERING METHODOLOGIES
branch Varchar 200 The name of the
branch within which
the bank account was
opened
No No
amount decimal 10,2 Amount of fund to be
transferred in the
transaction
No No
Conclusion:
From the above study it can be concluded that this application can be a very effective way
of handling money transfer. The bank will be able to monitor and control the flow of transfer. As
the money will be transferred through digital medium, there is no need to flow cash physically.
The processing time for fund transfer can be significantly low. The database model has been
created by focusing on the very specific process of fund transfer. No data other than essential has
been considered in the proposed models.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10SOFTWARE ENGINEERING METHODOLOGIES
Bibliography:
[1] Al-Masree, H.K, ‘Extracting Entity Relationship Diagram (ERD) from relational database
schema’, International Journal of Database Theory and Application, 8(3), pp.15-26, 2015.
[2] Dennis, A., Wixom, B.H. and Roth, R.M, ‘Systems analysis and design’. John wiley & sons,
2018.
[3] Yanushkevich, S.N., Miller, D.M., Shmerko, V.P. and Stankovic, R.S, ‘Decision diagram
techniques for micro-and nanoelectronic design handbook’, CRC Press, 2018.
[4] Damjan, P. and Vatanawood, W, ‘Translating UML state machine diagram into Promela’,
In Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol.
1, 2017.
1 out of 11
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]