1.3 References IEEE Recommended Practice for Software Requirements Specifications https://ieeexplore.ieee.org/document/720574 Designing Software Requirement Specification Document https://spada.uns.ac.id/pluginfile.php/819931/mod_resource/content/1/W04%20Software%20Requirements%20 Specification
1. User-Centric Design 2. OVERALL DESCRIPTION •Easy Registration •Seamless Book Browsing •Effortless Transactions 3. Security and Trust • Secure Transactions •Confidential user Information • Trustworthy System 2. Convenience and Efficiency • RFID Card Usage • Fast Transaction Processing • User Account . 2.1 PRODUCT PERSPECTIVE 4. Innovation and Technology Integration • RFID Card Technology •Real-time Book Databases •Secure Payment Processing 6. Scalability and Adaptability • Adaptable to Growth •Future-Proof Technology •Expandable Book Inventory 5. Financial Transaction Transparency: • Clear Fare Details •Transparent Charges •Integration with Bank Accounts
2.3 BLOCK DIAGRAM USER REGISTRATION ISSUE RFID CARD VALIDATE INPUT (EMAIL, CONTACT NO, BANK DETAILS) PRINT BOOKRACK DETAILS CONFIRM RETURN BOOK SELECTION (CATEGORY) & BOOK FARE DISPLAY ISSUED BOOKS RETURN BOOK BOOK ISSUANCE DATABASE
2.3 BLOCK DIAGRAM ATM Machine Database RFID CARD RFID Reader Data Link Graphical user Interface (GUI)
2.2 PRODUCT FUNCTIONALITY GENERATE PRINTOUTS DISPLAY DATA SELECT AUTHENTICATION UPDATE DATA PF-1 PF-2 PF-3 PF-4 PF-5
2.4 FUNCTIONAL REQUIREMENTS AUTHENTICATE USER GENERATE RFID CARD VALIDATE USER INPUT REGISTER USER DISPLAY BOOK CATEGORIES FR1 FR2 FR3 FR4 FR5 SELECT BOOK FR6
2.4 FUNCTIONAL REQUIREMENTS DISPLAY ISSUED BOOKS AUTHENTICATE USER FOR RETURN PRINT BOOKRACK DETAILS DEDUCT FARE PROCESS BOOK RETURN FR7 FR8 FR9 FR10 FR11 CONFIRM RETURN FR12
2.5 ASSUMPTIONS AND DEPENDENCIES Assumptions: Dependencies: • STABLE AND RELIABLE INTERNET CONNECTION. • USERS WILL INPUT ACCURATE PERSONAL INFORMATION. • WELL-MAINTAINED AND UPDATED BOOK DATABASE. • DEPENDENCY ON EXTERNAL SERVICES FOR EMAIL VALIDATION. • SECURE AND RELIABLE PAYMENT GATEWAY
4. NON-FUNCTIONAL REQUIREMENTS 4.2 SAFETY AND SECURITY REQUIREMENTS ACCESS CONTROL 02 03 01 04 SECURE COMMUNICATION DATA ENCRYPTION INTRUSION DETECTION AND PREVENTION
06 05 07 PHYSICAL SECURITY MEASURES LOGGING AND AUDITING AUTHENTICATION MECHANISMS 4. NON-FUNCTIONAL REQUIREMENTS 4.2 SAFETY AND SECURITY REQUIREMENTS
4. NON-FUNCTIONAL REQUIREMENTS 4.3 SOFTWARE QUALITY ATTRIBUTES AVAILABILITY Uptime Target Backup and Recovery Monitoring and Alerting USABILITY Intuitive Interface User Assistance and Help PORTABILITY CROSS-PLATFORM COMPATIBILITY REUSABILITY MODULAR DESIGN ROBUSTNESS GRACEFUL DEGRADATION ERROR HANDLING CORRECTNESS DATA INTEGRITY 1 1 2 4 1 5 6 1 3