Wednesday, December 11, 2019

The Analysis on Light Rail Network

Question: Discuss about the Analysis on Light Rail Network. Answer: Introduction: Within this study, the description of the system that is implemented for facilitating the processes of light rail network construction is available. The analysis on the proposed system carried for conducting the system testing, evaluation and validation processes. Moreover, the effect of human factors on the design process is also present in the study. The factors have been recognized in the context of technology, objective, standard and indicators. All the aspects of the system are considered for completing the process of optimizing the proposed system on light rail network project. In addition to that, the presence of the literature review can be found within the study that supports the information that has been used to complete the business report. System Test, Evaluation and Validation: System Test: The system of light rail network construction project will be tested through unit testing. The scope of the test plan will be covering all the aspects of the system. The objective will be to recognize and eliminate the bug that is present in the system as soon as possible (Ravitch, 2016). The prime area of focus will the communication feature of the system and information sharing within the system. The testing phase will be carried out by conducting GUI software testing, Volume testing, Exploratory testing, Reliability testing, Security testing,Capacity testing, Scalability testing and Accessibility testing (Enck et al. 2014). If any bug is recognized within the scope of the testing categories then the responsible person will reconsider the part and eliminate the bug (Haller et al. 2013). System Evaluation: The system will be providing the accurate information to the authorized user at desired time. The system will generate that information by collecting the raw data from various levels of the project. Risks and opportunities based on that information will be created and provided to the project manager. The user will be accessing the system to get the real time information for facilitating the processes of the light rail network project. The users will be communicating with each other through the system so that required conversation details can be acquired as soon as possible. The users can send and receive files while carrying out the conversation (Vasconcelos et al. 2015). As completing a project is a critical task, the members of the project can do mistakes frequently. For alarming the members so that they does not do any mistake while carrying out the proposed task, the system will first collect the information of the proposed task and analyze with the overall project. The system will also notify the user to conduct the task by giving hints (Low and Chen 2012). The project manager must receive all the information of the ongoing activities. It is because within a project, all the tasks are interconnected. If any work is conducted in a wrong way then it can affect the overall project. System Validation: For carrying out the phase, the V-lifecycle model is the most relevant one. User Requirement Specifications, Operational Qualification, Design Specifications, Functional Specifications, Installation Qualification, development and testing of code and Performance Qualification are the aspects of the V-lifecycle model (Pearce and Friedenthal 2013). Figure 1: V-Lifecycle Model Validation Plan (Source: Pearce and Friedenthal 2013, pp-353) Optimization in Design: There are several aspects of the system that needs to be upgraded so that better reliability and maintainability can be achieved. Improving Reliability: The reliability is a crucial factor of a system. It is because the activities of the project rely on the functionality of the system significantly. The system will be implemented within cloud so that, the system failure occurrence can be reduced to minimum possibility. The reliability of the system is associated with the availability of the system (Ward and Peppard 2016). The system can be accessed 24*7*365. The data loss in an information system is not a rare activity. For making sure that the loss of data does not affect the performance of the system, backup/recovery function will be integrated with the system. This will allow the system to get all the lost data immediately. The system will be modified with the updated technology so that the system can be up-to-date at all time. The system will be providing real-time data to the users. The real-time data means providing data to the user before it is stored within the database (Pearlson, Saunders and Galletta 2016). Improving Maintainability: Maintainability can be referred to the characteristic that make use of the proposed procedures and practices for restoring the system within given time frame to its normal operating phase. Before considering any cloud vendor, a complete survey will be conducted for recognizing the best vendor as per the requirement of the system (Carter 2014). The service provider will be completely responsible for maintaining the system. Human Factors in Designing Concepts: Objective Technical Efficiency It is crucial to consider they will mainly use the human impacts as the system. Not all the users are familiar with the information system. The system will be more efficient as the user can interact with the system easily. Recognizing the aspects of the system that can facilitate the usability of the system. The system incorporates the technical input devices that are easily accessible by the normal people. The low-level users can easily access the information that is required for carrying out their respective processes. Understanding the scope of the system. The system will be using a simple and effective user interface that will consist of the hints so that the user can recollect the knowledge of using the system. The management can perform better at taking decisions and allocating resources. Relating the system with the user requirement in an more relevant manner. Simple tools will be integrated within parts of the system that is not central system so that the devices can be optimized as soon as possible. Simple tools eliminate the need of expert team every time the sub systems fail to perform. Table 1: The Human Factors in Information System (Source: Stair and Reynolds 2013) Literature Review: The information system can be referred to the system that can collect the information for organizing, storing and processing the information (Carter 2014). On the basis of the requirement of the processes the information system can be classified into five sections such as executive information system, decision support system, management information support systems, office support system and transaction processing system (Venkatesh, Brown and Bala 2013). For collecting, storing, processing, cancelling or displaying modifications in terms of the transactions, the transaction processing systems are used explicitly. The management information system makes use of the collected data for generating reports for the management (Shapiro and Varian 2013). The decision support system can also be referred to as the knowledge based system that is used for providing the best support to the management in terms of taking decisions. In terms of identification of long-term trends for planning proper courses of action, the senior managers and executives use the executive information system (Venkatesh, Brown and Bala 2013). Figure 2: Architecture of an Information System (Source: Sousa and Oz 2014) The information system provides several advantages such as communication, availability, cost effectiveness and many more. The system provides the opportunity to the user to send message, email, file, conduct video chatting and many more. The system allows the user to access the information and conduct the tasks on the system at every moment, 24*7*365 (Tran et al. 2013). The users can access the system from anywhere. This offer many users at different geographical locations to communicate with each other properly. This will allow the management to keep track of the processes that are done in the field from a far distance. As the information collected information is verified properly before supplying it to any user, more accurate decisions can be made. As the process will be communicated, more effective working culture can be obtained (Hall 2012). Many other components can be incorporated within the system as per the requirement of the construction activates so that the system always r emain relevant. There are also few disadvantages of the system as well. If the system is not configured properly to avoid the cyber attacks then the theft of information and unwanted access to the system can be experienced. As long as the system remains down the work of the overall project, remain paused (Kanehisa et al. 2014). The attacker can hamper the functionalities of the system. if any error is present in the design of the system then the output can be devastating for the overall project. Conclusion: From the above study it can be concluded that the study consist of the relevant information that is required for analyzing the proposed system. The system testing, evaluation and validation proposes a sound base upon which the features of the system can be measured. As the system will be used only for this specific project, deploying the system in the cloud rather than in-house is the key of reducing the cost of the system. Moreover, the management can concentrate on the construction activities more as the responsibility of implementing and maintaining the system is the responsibility of the service provider. References: Bonham-Carter, G.F., 2014.Geographic information systems for geoscientists: modelling with GIS(Vol. 13). Elsevier. Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P. and Sheth, A.N., 2014. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones.ACM Transactions on Computer Systems (TOCS),32(2), p.5. Hall, J.A., 2012.Accounting information systems. Cengage Learning. Haller, M.Y., Haberl, R., Persson, T., Bales, C., Kovacs, P., Chze, D. and Papillon, P., 2013. Dynamic whole system testing of combined renewable heating systemsThe current state of the art.Energy and Buildings,66, pp.667-677. Kanehisa, M., Goto, S., Sato, Y., Kawashima, M., Furumichi, M. and Tanabe, M., 2014. Data, information, knowledge and principle: back to metabolism in KEGG.Nucleic acids research,42(D1), pp.D199-D205. Low, C. and Chen, Y.H., 2012. Criteria for the evaluation of a cloud-based hospital information system outsourcing provider.Journal of medical systems,36(6), pp.3543-3553. Pearce, P. and Friedenthal, S., 2013. A Practical Approach For Modelling Submarine Subsystem Architecture In SysML. InProceedings from the 2nd Submarine Institute of Australia (SIA) Submarine Science, Technology and Engineering Conference(pp. 347-360). Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016.Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley Sons. Ravitch, D., 2016.The death and life of the great American school system: How testing and choice are undermining education. Basic Books. Shapiro, C. and Varian, H.R., 2013.Information rules: a strategic guide to the network economy. Harvard Business Press. Sousa, K.J. and Oz, E., 2014.Management information systems. Nelson Education. Stair, R. and Reynolds, G., 2013.Principles of information systems. Cengage Learning. Tran, S.T., Le Ngoc Thanh, N.Q.B. and Phuong, D.B., 2013. Introduction to information technology. InProc. of the 9th inter. CDIO conf.(CDIO). Vasconcelos, A., Sousa, P. and Tribolet, J., 2015. Enterprise Architecture Analysis-An Information System Evaluation Approach.Enterprise Modelling and Information Systems Architectures,3(2), pp.31-53. Venkatesh, V., Brown, S.A. and Bala, H., 2013. Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems.MIS quarterly,37(1), pp.21-54. Ward, J. and Peppard, J., 2016.The Strategic Management of Information Systems: Building a Digital Strategy. John Wiley Sons.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.