Preview

electronic lab seg2505

Powerful Essays
Open Document
Open Document
1846 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
electronic lab seg2505
Rapport de Laboratoire
Lab # 2
Cours SEG2506

Remis le 5 Février 2014 dans le cadre du cours de SEG2506
Université d’Ottawa
Objectif:
L’objectif du laboratoire 2 est de développer une machine d’état UML pour les différents modèles de feu de circulation (léger, modéré et élevé) mais aussi de générer le code java en utilisant UMPLE et l’intégrer dans un programme existant.

Introduction :

// A FAIRE

Conception

1. Modèle de circulation léger ou LowTrafficLight

• Machine d’état

• Code Umple class LowTrafficLight { status { northAndSouthArrow { entry / { trafficLightManager.northArrow(); } entry / { trafficLightManager.southArrow(); } entry / { trafficLightManager.westRed(); } entry / { trafficLightManager.eastRed(); } timerGreen() -> northAndSouthGreen; } northAndSouthGreen { entry / { trafficLightManager.northGreen(); } entry / { trafficLightManager.southGreen(); } entry / { trafficLightManager.westRed(); } entry / { trafficLightManager.eastRed(); } timerGreen() -> northAndSouthYellow; } northAndSouthYellow { entry / { trafficLightManager.northYellow(); } entry / { trafficLightManager.southYellow(); } entry / { trafficLightManager.westRed(); } entry / { trafficLightManager.eastRed(); } timerYellow() -> northAndSouthRed; } northAndSouthRed{ entry / { trafficLightManager.northRed(); } entry / { trafficLightManager.southRed(); } entry / { trafficLightManager.westGreen(); } entry / { trafficLightManager.eastGreen(); } timerGreen() -> westAndEastYellow; } westAndEastYellow{ entry / { trafficLightManager.northRed(); } entry / { trafficLightManager.southRed(); } entry
/ { trafficLightManager.westYellow(); } entry / { trafficLightManager.eastYellow(); } timerYellow() -> northAndSouthArrow; } }
}
• Code java
/*PLEASE DO NOT EDIT THIS CODE*/
/*This code was generated using the UMPLE 1.19.0.3395 modeling language!*/ package SEG2106.core;

// line 1

You May Also Find These Documents Helpful

  • Satisfactory Essays

    LAB 20C

    • 561 Words
    • 3 Pages

    1. Moles of NaOH = 0.500 mol/L X 0.010525 L = 5.26 x 10-3 mol…

    • 561 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    The benefits of a partial in the cost and a full meh would be required where large sums of money and data are exchanged and can have almost none down time.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab 7 SC

    • 2232 Words
    • 17 Pages

    I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface…

    • 2232 Words
    • 17 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab8 is3440

    • 129 Words
    • 1 Page

    1 Bascially RPM command is used for installing, uninstalling, upgrading, querying, listing, and checking RPM packages on your Linux system.…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. What happens to the volatile memory when the power is lost? –RAM is deleted…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 7 Lab 1

    • 753 Words
    • 4 Pages

    On NYC-VS1 desktop Click Start, and in the Start Search box, type C:\WUA7\64bit_rep.jpg and press Enter. Review the report, after reviewing close the window.…

    • 753 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Geol 1345 Lab 9B

    • 377 Words
    • 2 Pages

    1. Scroll down the CBOFS website and click on now-cast under the water level icon. The water level animation which appears displays the most recent water levels in local time at a [ (1) (2) (3) ]-hour interval.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    pt2520 unit 8

    • 287 Words
    • 1 Page

    When a client connects to the MySQL server, the server uses the username provided by the client and the client host to select the appropriate account row from the mysql.user table. It then uses this row to authenticate the client. Before MySQL 5.5.7, the server authenticates the password provided by the client against the Password column of the account row. As of MySQL 5.5.7, the server authenticates clients using plugins. Selection of the proper account row from the mysql.user table is based on the user name and client host, as before, but the server authenticates the client credentials as follows: The server determines from the account row which authentication plugin applies for the client. If the account row specifies no plugin name, the server uses native authentication; that is, authentication against the password stored in the Password column of the account row. This is the same authentication method provided by MySQL servers older than 5.5.7, before pluggable authentication was implemented, but now is implemented using two plugins that are built in and cannot be disabled. If the account row specifies a plugin, the server invokes it to authenticate the user. If the server cannot find the plugin, an error occurs. The plugin returns a status to the server indicating whether the user is permitted to connect.…

    • 287 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Netw 240 Lab 1

    • 2291 Words
    • 10 Pages

    Note: If you would like to install the 64-bit version of Fedora, open your browser to http://archive.fedoraproject.org/pub/fedora/linux/releases/14/Fedora/x86_64/iso and click on Fedora-14-x86_64-DVD.iso to download the Fedora installation image.…

    • 2291 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1310 unit 1 lab 1

    • 673 Words
    • 3 Pages

    • How much time do you spend talking on the phone, and when do you make your calls? Some providers offer free incoming calls, or free nights and weekends, but those aren’t helpful if you make lots of outbound calls during business hours.…

    • 673 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    Yes, although such tools like these would automatically find security flaws with high degree of confidence that what it found was a flaw.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Eg462

    • 407 Words
    • 2 Pages

    alarms or misses, this may influence bias. If the stimulus is a bomber, then a miss (failing to detect the plane) may increase deaths, so a liberal bias is likely. In contrast, crying wolf (a false alarm) too often may make people less likely to respond, grounds for a conservative bias.”(www.wikipedia.org)…

    • 407 Words
    • 2 Pages
    Satisfactory Essays