Thursday, April 4, 2019

Data Storage for Art Gallery

Data retentiveness for graphics g on the whole tolderyExecutive SummaryThis assignment is base upon an imposture Gallery. beingness the dust psychoanalyst and designer the maneuver header is hopeful I demonstrate professionalism and propose a reckonerized cataloging body which they require. before long the wile Gallery has 8 exhibition suite where they display graphics decimal focuss from around the word. These circumstances dont only operate to the Art Gallery simply by other owners, be it other galleries or private collectors. These items ar borrowed to enhance the exhibition rooms which change exhibits e really 3 months.The aim is lead by a curator and 6 friend curators to see ab issue its daily operations. One of the major issues of the imposture gallery is the cover up based form which they use to keep record exhibits in storage or in exhibition, in addition and acquire and ingatheringing of items to their respective owners. thither argon several te chnologies available in which these theme forms elicit be transferred directly into the archive body which I am designing for the finesse gallery. These technologies would be re drawed and the best suited technology would be recommended for the transfer of the paper forms to the calculatorized arranging.In mental synthesis this chronicle it is required that only the curator and retainer curators hurt aver, write, edit and delete dies once the scheme is right installed. These functions would be given with discretion to the drug user according to rank i.e. the curator would be given bother to the entire catalogue system granting him permissions to all CRUD functions whereas the 6 assistant curators would give up specific main ancestry and could only delete certain items in the system. This is required for credential issues.In this proposal submitted must be a prototype interface so the users can see how the system would look before the give-and-take from the cur rent paper based system to the computerized catalogue. The prototype would demonstrate the following functionsAdding a brisk itemEditing item dilateSearching for the location of an itemListing items repayable for returnThis system would make the curator and assistant curators demonstrate efficiency and effectiveness in the blind gallery as it is a step into the modern way or storing data which is utilise by more businesses worldwide. corporate Modelling Language, or UML, is a set of diagrammatic techniques, which argon specifically tailored for object-oriented development, and which have puzzle an industry standard for modelling object-oriented systems.In developing this cataloguing system for the art gallery, specialized diagrams would be used to model the system through stunned the development make. These diagrams would represent part of the system but non the undivided thing. Some of the diagrams that would be shown areuse grapheme diagramsuse case specifications ap plication diagrams segmentation diagrams eon diagrams declare forgescommunication diagrams phthisis Case DiagramsUse case diagrams are translation of the system from the users point of view. This would entail an actor, use case and system boundary. Three use case diagrams are presented to the art gallery to the show some functional requirements of the system but not the whole system. The art gallery system, keep an eye oning the art itemization and returning the art item are demonstrated below.This use case describes all the functions carried bulge in the art gallery system which take ons all the actors from the curator, assistant curator, owner and the public. Some of the use cases include maintain art disceptation, maintain owner list, maintain exhibition, manage store rooms, borrow and returning of art. fight down Art list is a function carried out by the curator. This use case was generated from the Art Gallery System use case in figure 1. It extends to describe the descr iption of what the curator could do in the cataloguing system, which are CRUD functions.reverting of art is a function which the assistant curator performs. This use case was developed from the Art Gallery System in Figure 1 and gives a details listing of the function the assistant curator can perform.Use Case SpecificationThe use case description is a narrative description of the functional requirements from the use case. It describes the use case goal and gives the description of what normally hap indites and the normal course of so farts. Following are the use case specifications from the previous use case diagrams.Use Case Maintain Art ListActors conservatorGoal Managing the entire art list expositionThe curator logs into the system, the user name and password is verified. Access is give and the curator continues to function. A search is carried out on a particular art ID to ensure it does not exist, once affirmed the curator whitethorn create the new record with all the art details required. Other functions granted to the curator are update, delete and print functions which follow along the same line. formerly the curator is finished with the particular functions so desired he then logs out the system.Use Case Maintain Art ListActors CuratorGoal Managing the entire art listOverviewThe curator logs into the system, the user name and password is verified. Access is granted and the curator continues to function. A search is carried out on a particular art ID to ensure it does not exist, once affirmed the curator whitethorn create the new record with all the art details required. Other functions granted to the curator are update, delete and print functions which follow along the same line. Once the curator is finished with the particular functions so desired he then logs out the system.Typical course of exitsAlternative coursesStep 6 the art learning whitethorn already exist in the system in the event of adding a new art item and may choose a new art ID.Use Case Returning ArtActor Assistant CuratorGoal To return art to respective ownerDescriptionThe assistant curator logs into the system, the user name and password is verified. A search is carried to verify all items that are cod. The list is obtained and the assistant curator/s may clutch the respective owner do them aware the referable date is soon. The contract is ended for borrowing the art item, a report is printed and the art is returned. Once favored the assistant curator logs out.Use Case Returning ArtActor Assistant CuratorGoal To return art to respective ownerOverviewThe assistant curator logs into the system, the user name and password is verified. A search is carried to verify all items that are cod. The list is obtained and the assistant curator/s may cope with the respective owner making them aware the due date is soon. The contract is ended for borrowing the art item, a report is printed and the art is returned. Once successful the assistant curator logs ou t.Typical course of eventsDescriptionThe art gallery system includes the daily operations of the art gallery this includes the maintaining art list, owners list and exhibition carried out by the curator. The assistant curators excessively maintain the exhibition rooms, the storage rooms and carry out the functions of borrowing and returning the art items. The owner of the art items are also included in the borrowing and returning of the items and viewing the exhibitions in conjunction with the public. activity DiagramsActivity diagrams show the inside flow of control in a process. Activity diagrams can be used to represent sequence, selection and iteration and they can also illustrate where all activities can be carried out in parallel.According to IBM.com Activity diagrams are helpful in the following phases of a go steadyBefore startle a project, you can create activity diagrams to model the most important workflows.During the requirements phase, you can create activity diagra ms to illustrate the flow of events that the use cases describe.During the analysis and design phases, you can use activity diagrams to help define the behaviour of operations.This diagram shows the activity of events in swim lanes with the assistant curator, art list and the owner. It shows the process of the activity of events taking place in the returning process.Class DiagramsThe class diagram is interchange to object-oriented analysis and design, it defines both the packet architecture. It is used to model classes and the relationships between classes, and also to model higher-level structures comprising collections of classes grouped into packages. The class diagram appears through successive iterations at every stage in the development process.Designed are class diagrams illustrating the super class, hierarchy and attributes and operations for the proposed catalogue system for the Art Gallery.Transfer MethodsCurrently the Art Gallery stores and processes all entropy on pap er based forms which outlines the name, location, owner, value of art, due date, etc. This system could cause problems in finding location of art items and generating due dates because of the frequent change in the exhibitions and in storage.The Art Gallery wishes to fully change this paper based style and produce a catalogue which would improve the efficiency and effectiveness in the work place that would entail the same information from the paper forms. The system would also grant permission to only the Curator and Assistant Curators to have read, write, edit and delete functions. In order to commence this catalogue all the paper forms must be transferred to the computerised system.There are many techniques in which this catalogue could be created, but only the most efficient one would be chosen as it is critical to implement this system. These techniques range from human data approach, document scanning and even voice recognition tools. The mentioned techniques and technologies would be discriminated and contrasted where only the best option would be chosen to perform the functions needed. compassionate Data EntryBeginning with the very basic and most popular way of debut information into a system is human data introduction. This operation is fully dependant on the data entry clerk or in the Art Gallerys case the assistant curator to read the document and manually key information from the paper forms into the catalogue on the computer system.This process would be strenuous and prolonged as it is a fully manual process. There are only six assistant curators industrious at the Art Gallery and this would be highly im accomplishable to implement in a sententious period. The curators not only have to borrow and return art items, but mange the store rooms and exhibitions so time would be limited in such, to perform data entry.It is assumed that if this technique is chosen at least two of the assistant curators would perform the functions of keying the info rmation into the system. Therefore this option is not best suited for the art gallery due to time constraint and the amount forms that would be re-processed even though a specific number of records wasnt given, it is alleged that there are a profound amount of documents to be entered into the catalogue.Advantages of piece Data EntryMethod requires simple parcel systems and low-end computing hardwareLess costly in the sense of hardware and software in addition depending on cost of manpowerA life-size number of PCs would be available for use by and by censusDisadvantages of Human Data EntryRequires to a greater extent staffTime consuming compared to automate data entryHuman errors may consist standardization of operations is difficult as performance may be individually dependant visual note Recognition (OMR)According to tiscali.co.uk OMR is a technique that enables marks made in predetermined positions on a computer input form be detected optically and input to a computer.opthal mic point out Recognition is used to process data entry form in various institutes and companies. This technology shines a light beam onto the document and is able to detect the marks filled from crisp boxes and fill-in palm on a printed form, and then the software interprets the output from the scan and translates it to the desired format, bearing in sagacity the use of a keyboard is nonexistent.OMR is best applicable for processing large number of occur filled forms which are needed to be processed quickly and accurately, which may include survey reply cards, questionnaires and ballots. The speed of OMR is very dissipated as it could process approximately 85-130 pages per minute and up to 4000 pages per hour depending on the type of machine used.Advantages of Optical Mark RecognitionImproved data accuracyFaster than human data entryCapture speeds around 4000 forms per hourEquipment is relatively inexpensive as costs are predictable and specifyIt is simple to install and run Well established technology that is used by many countriesDisadvantages of Optical Mark RecognitionThere are restrictions as to form designRestrictions on type of paper and inkOMR cannot recognise hand written or machine printed charactersImages are not captured by scanners so electronic retrieval is not possibleResponse boxes should be correctly marked with appropriate pen or pencilThe Art Gallery forms are hand written documents and OMR technology doesnt recognise hand written documents therefore this technology is at fault with the requirements of the Art Gallery. Even though this technology has many advantages and of its use worldwide, some other type of technology must be considered for transferring the paper based forms to the computerized system.Optical grapheme RecognitionAccording to wisegeek.com Optical typeface recognition is the process of converting printed or hand written materials into textbook or word processing files that can be easily stored and edited. All OCR systems require hardware and software for analysing the images. A scanners is used to scan the text on a page, then breaks the fonts into a series of dots called bitmap in addition it reads most common font and can determine where lines start and stop. The bitmap is then translated to computer text.This technology fits the requirements of the Art Gallery as it is able to read hand written documents. There have been a lot of advances to this technology over the years as to improve the recognition of manus or fonts similar to hand writing. As we observed before in human data entry if we wanted to document one of the forms which is currently used by the Art Gallery someone would have to manually type the document word for word, but with OCR you just scan the document and it could be born-again to several formats such as Microsoft Word, Excel, Access, PDF or HTML.OCR would save a lot of time as it is fast in reading documents, just scan a document and it would be ready in seconds. A lot of businesses have chosen this technology as it cuts time in producing a document which would unremarkably take days to complete can now be accomplished in a minute.As stated in the scenario the documents which the Art Gallery has are neatly handwritten characters which are easy to read so the problems with recognising font wouldnt be of a problem to hinder the operations carried out by this technique.Advantages of Optical Character RecognitionQuicker processing, up to 60 sheets per minuteSavings in costs and efficiencies by not having the paper questionnairesScanning and recognition allowed efficient management and planning for the rest of the processing work loadReduced long term storage requirements, hard copy documentation could be destroyed after the initial scanning, recognition and repairQuick retrieval for editing and reprocessingMinimizes errors associated with natural handling of the questionnairesDisadvantages of Optical Character RecognitionHigher costs of equipme ntHigh calibre IT staff required to support the system manus on census forms be as close as possible to the model handwriting to suspend recognition errorPossibility for error during character substitution which would usurp data qualitytune of recognition engine to accurately recognize characters is critical with trade-off between quality and cost sharp Character Recognition (ICR)Intelligent Character Recognition is former(prenominal)s compared with Optical Mark Recognition because of their similarities, but the difference with ICR is its advancement in recognition patterns allowing the technology to recognise all fonts and different styles of handwriting. This technology also allows automatic updates to the recognition of new hand writing patterns in its database.This technology is best suited for the transferring of the forms in the Art Gallery because it would recognise the handwriting on the forms without any editing taking place. The process of documenting the forms to the c omputerised system would entail the form being scanned the data is captured then analyzed and translated victimization ICR software that enables pattern-matching and automatic indexing. in effect(p) like OCR the data could be transferred into several formats such as Word, Excel, Access, PDF, XML etc.According to managedoutsource.com some features and benefits of using ICR areCan recognize any text of a form or a checkAllows manual key boarding reduction or deletionMaximum process automation of documents have it off text regardless of its specific typeface, style or size.Batch processingAutomated updating, reports display and automated mass spectra interpretationAutomatic checking of the information against databases and dictionariesCosts reduction for your businessBecause of the similarity with ICR and OCR the advantages and disadvantages may be the same. Therefore the following disadvantages are reiterations of OCR disadvantages as described earlier.RecommendationVoice recognition technology is another aspect of converting the paper based forms to the computerized system but due to all the training involved in this technology only the fastest and most reliable techniques were discussed.It is recommended that the museum use the Intelligent Character Recognition regularity for the transfer of the forms to the computerized system. Even though it is stated that the forms are easy to read and in standard incline the Optical Character Recognition would have been the ideal choice, but doesnt know what the future holds while the process is truely being implemented and what errors may occur.One of the major downfalls the club would face with the ICR technology is its cost. This equipment quite costly and the budget of the Art Gallery are unknown. Instead of buying the machine it could be rented at a cheaper cost, because this technology is only being used to transfer the old forms and nothing further. This would result in a more economical status for the museum. Another form is to buy the machine and rent it out to other businesses who demand the use of this technology for the same purpose. The income generated from the ICR machine could be used in the borrowing of the art items from other galleries and private collectors.Prototype User InterfaceAccording to agilemodeling.com a prototype user interface is an iterative technique where users are involved in the development of the User Interface for the system.Since the actual system isnt necessity to demonstrate to the users all desired are snapshots of the designed prototype interface. Includes are the probing for the location of an item, editing an items details, adding a new item and listing the due for return to their owners by a selected date.In the searching process there are two options available to the user, by either entering the Art ID or browsing the current collection with the option of choosing the item type or by selecting the item. Once an option of choice is chosen the art d etails would be listed below. In the art item details there would be the name of the item what type of art it is, and its current location, further information could be granted to either see what exhibition room or store room it is placed in.This form is designed to add a new art item into the catalogue. It gives the option of entering all the art details into the form, once established the curator has the option of going to another record and view all records in the catalogue or add another record in the system, once completed the curator could close the form.This image is similar to adding the art information the only difference is the editing aspect. The curator and assistant curators have specific functions where editing is concerned. First they search the record by browsing through the forms and choose the edit button to make changes to the art information. Once completed the new information is mechanically saved then the user can close the form.Generating due dates is a func tion which the assistant curator does in the returning of an art item process. The assistant curator has two options of searching for the due dates. each by entering a desired date and then the catalogue would list all the due art items on that particular day or by entering an art id which would display the due date of the item. When the search is completed the assistant curator could then print out a report of the information gathered or close the form and continue with the returning art item process. certification IssuesSecurity is a continuous process of protecting an object from unauthorized access. It is as a state of being or feeling protected from abuse. That object in that state may be a person, an organization or appropriatety such as a computer system.Many businesses suffer the termination of their business due to lack of warranter. Security doesnt only have to be securing the computer system of the Art Gallery but also its physical surroundings. Objects in the art g allery can either be tangible or non-tangible, tangible objects being hardware and paintings, and intangible being information and data in the system that the art gallery depends on for its continuation. There Art Gallery has many art items which are on loan from different galleries and private collectors which may be priceless or one of a kind art work so losing this could cost the art gallery fortunes.Listed below are the possible threats to security to the art gallery system.Physical SecurityThis may vary in different ways, if there is poor security measures such as little or no implementation of swipe cards, biometrics, security guards, surveillance cameras and identification cards, this may result in a negative effect on the company as there may be imposters wishing to harm the operations of the business. Businesses sometimes think if securing your computer with anti-virus and firewalls would help secure your business but the little things like an unauthorized person gaining ac cess to the expression and removing the server, stealing hardware or by vandalizing equipment could make businesses suffer continuity. Therefore the Art Gallery should have proper implementation security guards, surveillance cameras, swipe cards and other media to help with securing the exhibition rooms and store rooms in the Art Gallery.Physical AttacksPhysical attacks may result in the event of malicious activity, natural disasters or it may be an accident these attacks results from denial of service. Listed are some physical attacks that may be harmful to the Art GalleryFire destruction of art and equipmentWater deluge or leaks in the art galleryElectrical Power SurgesTemperature air condition failure instinctive Disasters Hurricanes, earthquakes, etc.Equipment Failure failure in servers, surveillance cameras, swipe readers.Tampering of equipmentWith respect to the physical attacks once proper planning and prevention of the above mentioned are complied with the art gallery may be protected against any harmful measures.Faulty SoftwareFaulty software may be unintentional mishaps, it doesnt necessary means sabotage in a business but manufacture problems. These could occur if there is a glitch in the Operating System causing it to malfunction software was misconfigured during installation or database software malfunction or exploitable weakness.Malicious SoftwareMalicious software is software designed to destroy a computer system without the owners informed consent. Malicious software could be developed by hackers or internal employees in the workplace. Some malicious software may includeComputer VirusesWormsTrojan Horse logic BombHackers toolkitSpywareDishonest adwareCrime wareThese malicious software can be contracted due to illegal use of the company internet for personal use other than work related or implanted into the system intentionally.Unauthorised AccessUnauthorized Access may take form in different forms. A common way of unauthorized access is by leaving a system logged on and walking away from your desk, another co-worker may intentionally spy on your computer and steal information this is also called eavesdropping.Counter authentication is another form of unauthorised access which may include individuals guessing passwords, password interception, password cracking and session replay.Session Hijacking is the exploitation of a valid computer session to gain access to information or services in a computer system.Denial of ServiceDenial of service is designed to interrupt normal system functions and affect legitimate users to access the system. Hostile users send a flood of fake requests to a server making the connection impossible to establish. This may result in significant server downtime and financial loss for many companies.All these mentioned security issues are threats to the art gallery even though some attacks are based on a networked system it is assumed that the Art Gallery would implement a network for the comp uterised system.Consequences to buck of securityAccording to the threats discussed earlier they play serious threats to the Art Gallery. Once the art gallery has a breach in security it could harm the continuity of the business depending on the level of attack. Firstly starting off with physical attacks, a natural disaster can destroy the entire building with all the exhibits and computers which could terminate the continuation of the business continuity. Other physical attacks like flooding and fire may harm the business but it could be prevented or stopped once proper implementation of fire extinguishers and proper storage of computer system and art exhibits a secured. The difference is a natural disaster is sometime unpredictable.The loss of vital information pertaining to the catalogue with the owner details of art, and information could eventually result in physical theft of art items in the gallery. Some items in the art gallery may be priceless and belongs to persons all ove r the world therefore loosing these items would endure the gallery into a financial disorder.Art Gallerys integrity and reputation could blemish as it would turn into a public scandal embarrassing they security measures and all private and confidential information exposed.PermissionsUser accounts are the best way of ensuring only the curator and assistant curators have write, edit and delete permissions in the proposed catalogue. Every user account is associated with a username and password, the users contact information, account restrictions allowing access to the database at only certain hours of the day and account status allowing the administrator to temporarily disable an account.The curator would be the administrator of the database allowing him access to any and everything he desires which may include the maintaining the art list, maintaining owners list, maintaining the location of art items etc. These functions would allow the curator have all CRUD functions in the database .Being the administrator no one can delete the account because the system depends on an administrator to function and administrator status could be granted to any a supervisor of the 6 assistant curators.The assistant curators would be granted general access to the database but granted certain permissions. The supervisor of the assistant curators may have write, edit and delete functions, whereas the other users may have write and edit functions. Reasons being a delete function is one of power and this permission should only be granted to persons of stature in an organization. This is also part of security reasons.BibliographyPublicationsDatabase Design Know it all by S. Buxton L. Fryman R. Guting T. Halpin J. Harrington W. Inmon S. Lightstone J. Melton T. Morgan T. Nadeau B. ONeil E. ONeil P. ONeil M. Schneider G. Simsion T. Teorey G. Witt. publish by Morgan Kaufmann 2009 (1st Edition)A Student Guide to Object-Oriented Development by C. Britton J. Doake. Published by Elsevier Bu tterworth-Heinemann 2005 (1st Edition)Database Solutions A step-by-step guide to building databases by T. Connolly C. Begg. Published by Pearson Education Limited 2004 (2nd Edition)Networking All-in-One Desk Reference for Dummies by D. Lowe. Published by Wiley publication Inc. 2008 (3rd Edition)Use Case Driven Object Modeling with UML Theory Practice by D. Rosenberg M. Stephens. Published by Springer-Verlag New York Inc 2007 (1st Edition)Using UML Software Engineering with Objects Components by P. Stevens R. Pooley. Published by Addision-Wesley, Pearson Education Limited 2006 (2nd Edition)ICR, OCR, OMR Published by NCS Pearson, Inc www.PearsonNCS.com 2004Workshop on Consistency Problems in UML-based Software Development by J. Bodaveix T. Millan C. Percebois C. Le Camus P. Bazex L. Feraud R. Sobex. Blekinge Institue of engineering 2002Workshop on Consistency Problems in UML-based Software Development by J. Derrick D. Akehurst E. Boiten. Blekinge Institute of Technology 2 002Websiteshttp//www.computer-realm.net/omr-technology/http//www.drs.co.uk/census_methods.html.http//search.pearson.com/compare/icr-ocr-omr.pdfwww.flatworldsolutions.com/articles/advantages-disadvantages-outsourcing.phphttp//www.scribd.com/doc/8663036/Normalizationwww.cert.org/archive/pdf/inside cross051105.pdfhttp//www.omg.org/technology/uml/index.htm,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.