Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Civil Defense Command & Control System

INTRODUCTION

A computerized system can manage the process of receiving calls and move the appropriate units to respond and take necessary measures to address any emergency situation. The system works with information system integration of digital maps and GPS units using the satellite. The system is a bridge linking all parties and relevant agencies to deal accidents and various events in the Kingdom.

The employee receive calls at command and control center, and the system automatically locate the caller on the map, then the employee enter the information in the report template on the system, and the employee identifies the mechanisms to resolve the problem, and then the system processes the information, and on the basis of which determines the nearest available center and available requirements, and sends the report to them, and the system facilitate the employee to follow up the incident and response.

We expect after the completion of this project that we have a system that strengthens the possibilities of civil defense will help to manage the receipt of reports better and faster than before, and the request could be sent for supplies and follow-up will be done automatically by the system.

Domain Analysis

We visited the Civil Defense in Riyadh and we found that:

They have a system to receive calls and to determine their location by a maps system (GPS) then the officer will move the appropriate units (according to experienced employee) by wireless.

But this system has many problems:

  •  This system works on an old operating system (Windows 2000).
  •  Sometimes the system does not respond you must restart it.
  •  The maps on the system are not updated (old maps).
  •  There are no database to save information about the centers and the mechanisms available.
  •  The system cannot determine the nearest Civil Defense form the location of the problem.
  •  The report cannot be sent by the system automatically.

RISK/CONSTRAINTS

  •  Interface to ambulance and police department.
  •  GIS system is not flexible.
  •  No GPS system in Machineries & Tech equipment’s in all vehicles of civil defense.
  •  Difficulties in using English.
  •  Each member has his own busy plan that makes a challenge to get a free time for the group to meet.
  •  This is the first time for each member to work with other member in a project, that may make “in the beginning” some trouble in communication.

REQUIREMENTS

USE-CASES

A description of the Actor in this system:

  •  C2 employee (Employee in Civil Defense Center'998'): To receive calls and take information from callers and enter it into the system
  •  CDC employee (Employee in Civil Defense): To receive reports of the (Headquarters) and the mechanisms required to move.
  •  Manager: To manage employee information in the database.
  •  Police system: Opportunity to link the system with the police system.
  •  Ambulance system: Opportunity to link the system with the police system.

INTERACTION DIAGRAM

Sequence diagram

A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram that shows how processes operate with one another and in what order. It is a construct of a Message Sequence Chart.

Sequence diagrams are sometimes called event diagrams, event scenarios, and timing diagrams.

A sequence diagram shows, as parallel vertical lines (lifelines), different processes or objects that live simultaneously, and, as horizontal arrows, the messages exchanged between them, in the order in which they occur. This allows the specification of simple runtime scenarios in a graphical manner.

Activity diagram

Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency. In the Unified Modeling Language, activity diagrams can be used to describe the business and operational step-by-step workflows of components in a system. An activity diagram shows the overall flow of control.

DESIGN CLASS

USER INTERFACE MOCKUP

DATABASE SCHEMA

ER:

Data models are tools used in analysis to describe the data requirements and assumptions in the system from a top-down perspective. They also set the stage for the design of databases later on in the SDLC.There is three basic elements in ER models:

• Entities are the "things" about which we seek information.

• Attributes are the data we collect about the entities.

• Relationships provide the structure needed to draw information from multiple entities.

Schema:

A database schema is described in a formal language supported by the database management system (DBMS). In a relational database, the schema defines the tables, the fields in each table, and the relationships between fields and tables.

Schemas are generally stored in a data dictionary. Although a schema is defined in text database language, the term is often used to refer to a graphical depiction of the database structure. (Mutara)

Architectural

Architectural Style:

  • The appropriate architectural style of this system is Client-Server.
  • In this style there is a client who requests a service and a server who provide a service and also the connectors are protocols.
  • We choose this style for this system because the system is working on a private network. That’s why we need a style have client and server.

Global Overview:

In every city there is a major center of civil defense (C2) to receive all calls, and this center will manage the units under him (CDC), and also is connected to calls system.

We need to connect these parts a safe and reliable and integrity network and we will do so through a private network.

  • In C2 we have C2 PC’s this has three screens connected with the C2's PC and Application server And Database Server And Switch to contact C2 pc's and application and Database Servers together and Router to connect C2 network (LAN) with radio tower.

  • In CDC we have CDC Employee PC to receive report & follow up and we have Router to connect CDC with radio tower.

Expected Deployment

Conclusion

In our project we do a senior design and development software project that was give the chance to us to apply the knowledge and acquired in the curriculum on a real project of appropriate complexity within a team under realistic constraints. The outcome of our project significant software system, employing knowledge gained from courses throughout the curriculum. The project covers most phases of the software lifecycle. In this part of the project, the focus was on software process and development methodologies, requirements analysis & specification, high-level design, as well as on management of the project. We use software case tools to realize our work.

OBJECTIVES:

 To have a fast system

 To provide services automatically.

 To speed up the response time of civil incidents.

 To enhance quality of communication and services.

 To document incidental information for later retrieval.

 To sends and receives reports and follow-up summery automatically.

Civil defense command & control system is a program that is installed on the computer systems of command and control center for civil defense, and also to be installed at the centers of civil defense.

Functional Requirements :

  • There are three screens in front of the employee in the operations center (screen calls, and a screen to fill the form, and a screen for maps and locate the caller).
  • There is one screen in front of the employee in the civil defense center (screen to receive report and to request supplies).
  • There is in each vehicle of the civil defense device locating (GPS).
  • System receives the caller in the civil defense center 998 (screen calls).
  • Identifies the location of the caller and displays caller location on the map (screen for maps).
  • Fill the employee (in the operations center) form during the call.
  • The report form should be filled automatically from the caller initial call (without the copy and paste from the employee).
  • The employee can display a complete list of all the nearest available centers are available and the mechanisms.
  • Select the nearest civil defense for location of problem and sends the report to them.
  • After pressing on the submit button from the operations room must ring alarm bells in the center / centers required, And send the desired location (coordinate) to the required vehicles.
  • Make sure the arrival of reports and follow-up.
  • Ability to manage machineries & tech equipment's (insert, update, delete).
  • Ability to manage employees and coverage groups by assigning an employee to a coverage group, moving an employee from one coverage group to another, etc.
  • Ability to manage report (insert, update and delete report). Any employee (in operating room) can enter new reports while updating and deleting existing reports require specific privileges.
  • In the operating room you can watch the status, further requirements and follow up the movements of all vehicles of civil defense.
  • All calls are recorded and stored in the database independently, and only manager must access this database. Data can be saved to DVDs are other media if there is memory is insufficient on the database for later retrieval and investigation.

Non-Functional Requirements :

  •  The response time of the system must not exceed 90 seconds when employee is processing the call and enters data.
  •  The explore time (browse) time for searching the nearest (CDC) center must not exceed ten seconds.
  •  The system must have the ability (back up) to remain operational in different conditions.
  •  The system must have the capacity to receive two thousand reports in a day with high efficiency.
  •  When you send the report to (CDC) it must reply to (C2) in a 60 second, Otherwise the system will re-send again.
  •  The program must be easy to use for employees overall.
  •  Civil Defense is a government body, so it must be strong security, and data should be encrypted.
Learn more about creating dynamic, engaging presentations with Prezi