Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Realized by:
Sοfien Khalifa
Bechir Rοmmani
Farah Chammem
Karim Ghοdhbane
Khaled Tabοubi
Akrem Dridi
Year: 2019-2020
Summary
Intrοductiοn ............................................................................................................................1
Cοnclusiοn .............................................................................................................................8
Intrοductiοn
Fοr οur study οf the existing, we realize that there are many interesting
applicatiοns available in the market, but they all include sοme issues.
During this phase,we will define the general conext of our application and define
the actors that will interact with the system and its expected features.
Identification of actors:
-There are 3 actors who interact with our application:
-Manager
-HR Admin
-Employee
Functional Requirements:
Module Functionalities
-Manage employees check-ins
and work
-Manage Working tickets
-Update the employees
Timesheet Management timesheets by the administrator
-Consult the hours worked per
day,per week..
-Consulting absences status
-Fill a day off request
-Prepare the evaluation file
-Manage the evaluation file by
Evaluation Management the concerned employee
-Reaching a verdict according
the evaluation score
-Manage evaluation indicators
-Manage evaluation criterias
-Employees Management -Managing social media
(publishing a post, liking a post,
Following another employee..)
-Consulting a specific
interface(Recrutement page,
holidays page..)
Non-Functional Requirements:
Availability: degree to which users can depend on the system to be up and able
to function during normal operating times
Confidentiality: degree to which the software system protects sensitive data and
allows only authorized access to the data
Maintainability: ease with which faults in a software system can be found and
fixed
Reusability: extent to which a portion of the software system can be converted to
use in another system
Access security : extent to which the system is safeguarded against deliberate
and intrusive faults from internal and external sources
Integrity : degree to which the data maintained by the software system are
accurate authentic , and without corruption
Methodology 2TUP
Global Use Case
Class Diagram
Functional Architecture
Conclusion