Wednesday, June 5, 2019

Data Storage for Art Gallery

Data Storage for Art art g either(prenominal)eryExecutive SummaryThis assignment is establish upon an Art Gallery. Being the transcription of rules analyst and power the contrivance gallery is hopeful I demonstrate professionalism and propose a ready reckonerized cataloging corpse which they require. Currently the Art Gallery has 8 exhibition rooms where they display maneuver items from around the word. These items dont entirely belong to the Art Gallery but by other owners, be it other galleries or private collectors. These items atomic human activity 18 borrowed to rise the exhibition rooms which change exhibits every 3 months.The gallery is lead by a conservator and 6 assistance conservators to command ab emerge its casual operations. One of the study issues of the guileistic production gallery is the musical composition based get to which they utilize to keep record exhibits in storage or in exhibition, in addition and borrowing and reverting of items to th eir individual owners.There be several technologies available in which these paper pee-pees throw out be transferred directly into the catalogue establishment which I am designing for the art gallery. These technologies would be reviewed and the best suited engineering would be recommended for the transfer of the paper forms to the electronic computerized formation.In building this catalogue it is requisite that only the curator and henchman curators support read, write, edit and strike down functions once the system is congruously installed. These functions would be given with discretion to the user according to direct i.e. the curator would be given feeler to the entire catalogue system granting him permissions to all CRUD functions whereas the 6 adjuvant curators would have circumstantial access and could only scrub certain items in the system. This is required for pledge issues.In this proposal submitted must be a proto sign interface so the users can see ho w the system would look before the interchange from the current paper based system to the computerized catalogue. The prototype would demonstrate the following functionsAdding a saucy item redaction item detailsSearching for the localization of function of an itemListing items due for returnThis system would make the curator and assistant curators demonstrate efficiency and forcefulness in the art gallery as it is a step into the modern way or storing data which is used by m some(prenominal) jobes worldwide.Unified pattern Language, or UML, is a set of diagrammatic techniques, which are specifically tailored for object-oriented development, and which have become an industry standard for modelling object-oriented systems.In developing this cataloguing system for the art gallery, specialized diagrams would be used to model the system through emerge the development process. These diagrams would represent part of the system but non the whole thing. near of the diagrams that woul d be shown areuse plate diagramsuse cuticle specifications bodily function diagramsclass diagramssequence diagramsstate machinescommunication diagramsUse encase DiagramsUse case diagrams are description of the system from the users point of view. This would entail an actor, use case and system boundary. Three use case diagrams are presented to the art gallery to the show some functional requirements of the system but not the whole system. The art gallery system, obligateing the art list and returning the art item are show below.This use case describes all the functions carried out in the art gallery system which includes all the actors from the curator, assistant curator, owner and the public. Some of the use cases include maintain art list, maintain owner list, maintain exhibition, manage store rooms, borrow and returning of art.Maintain Art list is a function carried out by the curator. This use case was generated from the Art Gallery System use case in figure 1. It extends t o describe the description of what the curator could do in the cataloguing system, which are CRUD functions.Returning of art is a function which the assistant curator performs. This use case was developed from the Art Gallery System in form 1 and gives a details listing of the function the assistant curator can perform.Use Case SpecificationThe use case description is a narrative description of the functional requirements from the use case. It describes the use case goal and gives the description of what usually happens and the normal course of events. Following are the use case specifications from the previous use case diagrams.Use Case Maintain Art ListActors CuratorGoal Managing the entire art listDescriptionThe curator logs into the system, the user name and password is verified. Access is minded(p) and the curator continues to function. A face is carried out on a particular art ID to ensure it does not exist, once affirmed the curator whitethorn create the new record with a ll the art details required. Other functions granted to the curator are update, delete and print functions which follow along the same line. one time the curator is finished with the particular functions so desired he wherefore logs out the system.Use Case Maintain Art ListActors CuratorGoal Managing the entire art listOverviewThe curator logs into the system, the user name and password is verified. Access is granted and the curator continues to function. A search is carried out on a particular art ID to ensure it does not exist, once affirmed the curator may create the new record with all the art details required. Other functions granted to the curator are update, delete and print functions which follow along the same line. Once the curator is finished with the particular functions so desired he then logs out the system.Typical course of eventsAlternative coursesStep 6 the art information may already exist in the system in the event of adding a new art item and may choose a new art ID.Use Case Returning ArtActor Assistant CuratorGoal To return art to several(prenominal) ownerDescriptionThe assistant curator logs into the system, the user name and password is verified. A search is carried to verify all items that are due. The list is obtained and the assistant curator/s may contact the respective owner making them aware the due date is soon. The contract is ended for borrowing the art item, a report is printed and the art is returned. Once successful the assistant curator logs out.Use Case Returning ArtActor Assistant CuratorGoal To return art to respective ownerOverviewThe assistant curator logs into the system, the user name and password is verified. A search is carried to verify all items that are due. The list is obtained and the assistant curator/s may contact the respective owner making them aware the due date is soon. The contract is ended for borrowing the art item, a report is printed and the art is returned. Once successful the assistant curator logs out.Typical course of eventsDescriptionThe art gallery system includes the daily operations of the art gallery this includes the maintaining art list, owners list and exhibition carried out by the curator. The assistant curators also maintain the exhibition rooms, the storage rooms and carry out the functions of borrowing and returning the art items. The owner of the art items are also included in the borrowing and returning of the items and viewing the exhibitions in conjunction with the public.Activity DiagramsActivity diagrams show the internal flow of control in a process. Activity diagrams can be used to represent sequence, selection and iteration and they can also illustrate where all activities can be carried out in parallel.According to IBM.com Activity diagrams are upholdful in the following phases of a projectBefore starting a project, you can create activity diagrams to model the most important workflows.During the requirements phase, you can create activity diagram s to illustrate the flow of events that the use cases describe.During the analysis and design phases, you can use activity diagrams to help define the behaviour of operations.This diagram shows the activity of events in swim lanes with the assistant curator, art list and the owner. It shows the process of the activity of events taking place in the returning process.Class DiagramsThe class diagram is central to object-oriented analysis and design, it defines both the software program package package architecture. It is used to model classes and the relationships between classes, and also to model higher-level structures comprising collections of classes grouped into packages. The class diagram appears through successive iterations at every stage in the development process.Designed are class diagrams illustrating the super class, hierarchy and attributes and operations for the proposed catalogue system for the Art Gallery.Transfer MethodsCurrently the Art Gallery stores and process es all information on paper based forms which outlines the name, location, owner, value of art, due date, etc. This system could set about problems in finding location of art items and generating due dates because of the frequent change in the exhibitions and in storage.The Art Gallery wishes to fully change this paper based style and produce a catalogue which would improve the efficiency and effectiveness in the work place that would entail the same information from the paper forms. The system would also grant permission to only the Curator and Assistant Curators to have read, write, edit and delete functions. In order to commence this catalogue all the paper forms must be transferred to the computerised system.There are many techniques in which this catalogue could be created, but only the most efficient one would be chosen as it is critical to implement this system. These techniques range from human data main course, document skim overning and even voice citation tools. The mentioned techniques and technologies would be compared and contrasted where only the best weft would be chosen to perform the functions necessitate.Human Data EntryBeginning with the very basic and most popular way of entering information into a system is human data entry. This operation is fully dependant on the data entry clerk or in the Art Gallerys case the assistant curator to read the document and manually key information from the paper forms into the catalogue on the computer system.This process would be strenuous and lengthy as it is a fully manual process. There are only six assistant curators employed at the Art Gallery and this would be highly unattainable to implement in a short period. The curators not only have to borrow and return art items, but mange the store rooms and exhibitions so clock would be limited in such, to perform data entry.It is assumed that if this technique is chosen at least both of the assistant curators would perform the functions of keying the information into the system. wherefore this option is not best suited for the art gallery due to condemnation constraint and the amount forms that would be re-processed even though a specific number of records wasnt given, it is alleged that there are a profound amount of documents to be entered into the catalogue.Advantages of Human Data EntryMethod requires simple software systems and low-end compute hardwareLess costly in the sense of hardware and software in addition depending on cost of manpowerA large number of PCs would be available for use after censusDisadvantages of Human Data EntryRequires more staffTime consuming compared to automated data entryHuman errors may consistStandardisation of operations is difficult as performance may be individually dependant optic Mark scholarship (OMR)According to tiscali.co.uk OMR is a technique that enables marks made in predetermined positions on a computer input form be detected optically and input to a computer.Optical Mark e rudition is used to process data entry form in various institutes and companies. This technology shines a unused beam onto the document and is able to detect the marks filled from check boxes and fill-in fields on a printed form, and then the software interprets the output from the scan and translates it to the desired format, bearing in mind the use of a keyboard is nonexistent.OMR is best applicable for processing large number of hand filled forms which are needed to be processed quickly and accurately, which may include survey reply cards, questionnaires and ballots. The speed of OMR is very fast as it could process approximately 85-130 pages per minute and up to 4000 pages per hour depending on the type of machine used.Advantages of Optical Mark RecognitionImproved data accuracyFaster than human data entry receive speeds around 4000 forms per hourEquipment is relatively inexpensive as costs are predictable and definedIt is simple to install and runWell established technology th at is used by many countriesDisadvantages of Optical Mark RecognitionThere are restrictions as to form designRestrictions on type of paper and signOMR cannot recognise hand written or machine printed charactersImages are not captured by scanners so electronic retrieval is not possibleResponse boxes should be correctly marked with appropriate pen or pencilThe Art Gallery forms are hand written documents and OMR technology doesnt recognise hand written documents therefore this technology is at fault with the requirements of the Art Gallery. Even though this technology has many advantages and of its use worldwide, another type of technology must be considered for transferring the paper based forms to the computerized system.Optical Character RecognitionAccording to wisegeek.com Optical Character recognition is the process of converting printed or hand written materials into schoolbook or word processing files that can be easily stored and edited. any OCR systems require hardware an d software for analysing the images. A scanners is used to scan the text on a page, then breaks the fonts into a series of dots called bitmap in addition it reads most common font and can determine where lines start and stop. The bitmap is then translated to computer text.This technology fits the requirements of the Art Gallery as it is able to read hand written documents. There have been a lot of advances to this technology over the long time as to improve the recognition of handwriting or fonts similar to hand writing. As we observed before in human data entry if we cute to document one of the forms which is currently used by the Art Gallery someone would have to manually type the document word for word, but with OCR you just scan the document and it could be converted to several formats such as Microsoft Word, Excel, Access, PDF or HTML.OCR would save a lot of time as it is fast in reading documents, just scan a document and it would be ready in seconds. A lot of disdaines hav e chosen this technology as it cuts time in producing a document which would usually take days to complete can now be accomplished in a minute.As give tongue to in the scenario the documents which the Art Gallery has are neatly handwritten characters which are easy to read so the problems with recognising font wouldnt be of a problem to cramp the operations carried out by this technique.Advantages of Optical Character RecognitionQuicker processing, up to 60 sheets per minuteSavings in costs and efficiencies by not having the paper questionnairesScanning and recognition allowed efficient management and planning for the rest of the processing workloadReduced long term storage requirements, hard replica documentation could be destroyed after the initial scanning, recognition and repairQuick retrieval for editing and reprocessingMinimizes errors associated with visible handling of the questionnairesDisadvantages of Optical Character RecognitionHigher costs of equipmentHigh calibre I T staff required to support the systemHandwriting on census forms be as close as possible to the model handwriting to avoid recognition errorPossibility for error during character substitution which would affect data qualityTuning of recognition engine to accurately recognize characters is critical with trade-off between quality and costIntelligent Character Recognition (ICR)Intelligent Character Recognition is sometimes compared with Optical Mark Recognition because of their similarities, but the divergency with ICR is its advancement in recognition patterns allowing the technology to recognise all fonts and different styles of handwriting. This technology also allows automaton care updates to the recognition of new hand writing patterns in its database.This technology is best suited for the transferring of the forms in the Art Gallery because it would recognise the handwriting on the forms without any editing taking place. The process of documenting the forms to the computerised system would entail the form being scanned the data is captured then analyzed and translated using ICR software that enables pattern-matching and automatic indexing. Just corresponding OCR the data could be transferred into several formats such as Word, Excel, Access, PDF, XML etc.According to managedoutsource.com some features and benefits of using ICR areCan recognize any text of a form or a checkAllows manual key boarding step-down or deletionMaximum process automation of documentsRecognize text regardless of its specific typeface, style or size.Batch processingAutomated updating, reports display and automated mass spectra interpretationAutomatic checking of the information against databases and dictionariesCosts reduction for your businessBecause of the similarity with ICR and OCR the advantages and disadvantages may be the same. Therefore the following disadvantages are reiterations of OCR disadvantages as described earlier.RecommendationVoice recognition technology is anoth er formula of converting the paper based forms to the computerized system but due to all the training involved in this technology only the fastest and most reliable techniques were discussed.It is recommended that the museum use the Intelligent Character Recognition method for the transfer of the forms to the computerized system. Even though it is stated that the forms are easy to read and in standard English the Optical Character Recognition would have been the ideal choice, but doesnt know what the future holds while the process is actually being implemented and what errors may occur.One of the major downfalls the company would face with the ICR technology is its cost. This equipment quite costly and the budget of the Art Gallery are unknown. Instead of buying the machine it could be rented at a cheaper cost, because this technology is only being used to transfer the old forms and nothing further. This would result in a more economical status for the museum.Another form is to buy the machine and rent it out to other businesses who demand the use of this technology for the same purpose. The income generated from the ICR machine could be used in the borrowing of the art items from other galleries and private collectors.Prototype User InterfaceAccording to agilemodeling.com a prototype user interface is an iterative technique where users are involved in the development of the User Interface for the system.Since the actual system isnt necessary to demonstrate to the users all desired are snapshots of the designed prototype interface. Includes are the searching for the location of an item, editing an items details, adding a new item and listing the due for return to their owners by a selected date.In the searching process there are two options available to the user, by either entering the Art ID or browsing the current collection with the option of choosing the item type or by selecting the item. Once an option of choice is chosen the art details would be listed below. In the art item details there would be the name of the item what type of art it is, and its current location, further information could be granted to either see what exhibition room or store room it is located in.This form is designed to add a new art item into the catalogue. It gives the option of entering all the art details into the form, once completed the curator has the option of going to another record and view all records in the catalogue or add another record in the system, once completed the curator could close the form.This image is similar to adding the art information the only difference is the editing aspect. The curator and assistant curators have specific functions where editing is concerned. First they search the record by browsing through the forms and choose the edit button to make changes to the art information. Once completed the new information is automatically protected then the user can close the form.Generating due dates is a function which the assis tant curator does in the returning of an art item process. The assistant curator has two options of searching for the due dates. Either by entering a desired date and then the catalogue would list all the due art items on that particular day or by entering an art id which would display the due date of the item. When the search is completed the assistant curator could then print out a report of the information gathered or close the form and continue with the returning art item process. credential IssuesSecurity is a continuous process of protecting an object from unauthorized access. It is as a state of being or feeling protected from harm. That object in that state may be a person, an organization or straightlacedty such as a computer system.Many businesses suffer the loss of their business due to lack of security. Security doesnt only have to be securing the computer system of the Art Gallery but also its physical surroundings. Objects in the art gallery can either be tangible or non-tangible, tangible objects being hardware and paintings, and intangible being information and data in the system that the art gallery depends on for its continuation. There Art Gallery has many art items which are on loan from different galleries and private collectors which may be priceless or one of a kind art work so losing this could cost the art gallery fortunes.Listed below are the possible threats to security to the art gallery system. sensible SecurityThis may vary in different ways, if there is poor security measures such as little or no implementation of swipe cards, biometrics, security guards, surveillance cameras and identification cards, this may result in a negative effect on the company as there may be imposters wishing to harm the operations of the business. Businesses sometimes think if securing your computer with anti-virus and firewalls would help secure your business but the little things like an unauthorized person gaining access to the building and removin g the server, purloining hardware or by vandalizing equipment could make businesses suffer continuity. Therefore the Art Gallery should have proper implementation security guards, surveillance cameras, swipe cards and other media to help with securing the exhibition rooms and store rooms in the Art Gallery.Physical AttacksPhysical attacks may result in the event of malicious activity, natural disasters or it may be an accident these attacks results from denial of service. Listed are some physical attacks that may be harmful to the Art GalleryFire destruction of art and equipmentWater swamping or leaks in the art galleryElectrical spot SurgesTemperature air condition failureNatural Disasters Hurricanes, earthquakes, etc.Equipment Failure failure in servers, surveillance cameras, swipe readers.Tampering of equipmentWith respect to the physical attacks once proper planning and prevention of the above mentioned are complied with the art gallery may be protected against any harmf ul measures.Faulty SoftwareFaulty software may be unintentional mishaps, it doesnt necessary means sabotage in a business but manufacture problems. These could occur if there is a hemipteran in the Operating System causing it to malfunction software was misconfigured during installation or database software malfunction or exploitable weakness.Malicious SoftwareMalicious software is software designed to destroy a computer system without the owners informed consent. Malicious software could be developed by hackers or internal employees in the workplace. Some malicious software may includeComputer VirusesWormsTrojan HorseLogic BombHackers toolkitSpywareDishonest adwareCrime wareThese malicious software can be contracted due to illegal use of the company internet for personal use other than work related or embed into the system intentionally.Unauthorised AccessUnauthorized Access may take form in different forms. A common way of unauthorized access is by leaving a system logged on and walking away from your desk, another co-worker may intentionally spy on your computer and steal information this is also called eavesdropping.Counter authentication is another form of unauthorised access which may include individuals guessing passwords, password interception, password cracking and academic term replay.Session Hijacking is the exploitation of a valid computer session to gain access to information or services in a computer system.Denial of ServiceDenial of service is designed to interrupt normal system functions and affect legitimate users to access the system. Hostile users send a flood of fake requests to a server making the connection impossible to establish. This may result in significant server downtime and financial loss for many companies.All these mentioned security issues are threats to the art gallery even though some attacks are based on a networked system it is assumed that the Art Gallery would implement a network for the computerised system.Consequence s to go against of securityAccording to the threats discussed earlier they play serious threats to the Art Gallery. Once the art gallery has a breach in security it could harm the continuity of the business depending on the level of attack. Firstly starting off with physical attacks, a natural disaster can destroy the entire building with all the exhibits and computers which could terminate the continuation of the business continuity. Other physical attacks like flooding and fire may harm the business but it could be prevented or stopped once proper implementation of fire extinguishers and proper storage of computer system and art exhibits a secured. The difference is a natural disaster is sometime unpredictable.The loss of vital information pertaining to the catalogue with the owner details of art, and information could eventually result in physical theft of art items in the gallery. Some items in the art gallery may be priceless and belongs to persons all over the world therefore loosing these items would bust the gallery into a financial disorder.Art Gallerys integrity and reputation could blemish as it would turn into a public scandal embarrassing they security measures and all private and confidential information exposed.PermissionsUser accounts are the best way of ensuring only the curator and assistant curators have write, edit and delete permissions in the proposed catalogue. both user account is associated with a username and password, the users contact information, account restrictions allowing access to the database at only certain hours of the day and account status allowing the executive director to temporarily invalid an account.The curator would be the administrator of the database allowing him access to any and everything he desires which may include the maintaining the art list, maintaining owners list, maintaining the location of art items etc. These functions would allow the curator have all CRUD functions in the database.Being the admi nistrator no one can delete the account because the system depends on an administrator to function and administrator status could be granted to any a supervisor of the 6 assistant curators.The assistant curators would be granted general access to the database but granted certain permissions. The supervisor of the assistant curators may have write, edit and delete functions, whereas the other users may have write and edit functions. Reasons being a delete function is one of power and this permission should only be granted to persons of stature in an organization. This is also part of security reasons.BibliographyPublicationsDatabase Design Know it all by S. Buxton L. Fryman R. Guting T. Halpin J. Harrington W. Inmon S. Lightstone J. Melton T. Morgan T. Nadeau B. ONeil E. ONeil P. ONeil M. Schneider G. Simsion T. Teorey G. Witt. Published by Morgan Kaufmann 2009 (1st Edition)A Student Guide to Object-Oriented maturation by C. Britton J. Doake. Published by Elsevier Butterworth-Hein emann 2005 (1st Edition)Database Solutions A step-by-step guide to building databases by T. Connolly C. Begg. Published by Pearson Education Limited 2004 (2nd Edition)Networking All-in-One Desk Reference for Dummies by D. Lowe. Published by Wiley Publishing Inc. 2008 (3rd Edition)Use Case Driven Object Modeling with UML possible action Practice by D. Rosenberg M. Stephens. Published by Springer-Verlag New York Inc 2007 (1st Edition)Using UML Software Engineering with Objects Components by P. Stevens R. Pooley. Published by Addision-Wesley, Pearson Education Limited 2006 (2nd Edition)ICR, OCR, OMR Published by NCS Pearson, Inc www.PearsonNCS.com 2004Workshop on Consistency Problems in UML-based Software Development by J. Bodaveix T. Millan C. Percebois C. Le Camus P. Bazex L. Feraud R. Sobex. Blekinge Institue of Technology 2002Workshop on Consistency Problems in UML-based Software Development by J. Derrick D. Akehurst E. Boiten. Blekinge Institute of Technology 2002Web siteshttp//www.computer-realm.net/omr-technology/http//www.drs.co.uk/census_methods.html.http//search.pearson.com/compare/icr-ocr-omr.pdfwww.flatworldsolutions.com/articles/advantages-disadvantages-outsourcing.phphttp//www.scribd.com/doc/8663036/Normalizationwww.cert.org/archive/pdf/inside cross051105.pdfhttp//www.omg.org/technology/uml/index.htm,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.