Preview

electronic lab seg2505

Powerful Essays
Open Document
Open Document
1846 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
electronic lab seg2505
Rapport de Laboratoire
Lab # 2
Cours SEG2506

Remis le 5 Février 2014 dans le cadre du cours de SEG2506
Université d’Ottawa
Objectif:
L’objectif du laboratoire 2 est de développer une machine d’état UML pour les différents modèles de feu de circulation (léger, modéré et élevé) mais aussi de générer le code java en utilisant UMPLE et l’intégrer dans un programme existant.

Introduction :

// A FAIRE

Conception

1. Modèle de circulation léger ou LowTrafficLight

• Machine d’état

• Code Umple class LowTrafficLight { status { northAndSouthArrow { entry / { trafficLightManager.northArrow(); } entry / { trafficLightManager.southArrow(); } entry / { trafficLightManager.westRed(); } entry / { trafficLightManager.eastRed(); } timerGreen() -> northAndSouthGreen; } northAndSouthGreen { entry / { trafficLightManager.northGreen(); } entry / { trafficLightManager.southGreen(); } entry / { trafficLightManager.westRed(); } entry / { trafficLightManager.eastRed(); } timerGreen() -> northAndSouthYellow; } northAndSouthYellow { entry / { trafficLightManager.northYellow(); } entry / { trafficLightManager.southYellow(); } entry / { trafficLightManager.westRed(); } entry / { trafficLightManager.eastRed(); } timerYellow() -> northAndSouthRed; } northAndSouthRed{ entry / { trafficLightManager.northRed(); } entry / { trafficLightManager.southRed(); } entry / { trafficLightManager.westGreen(); } entry / { trafficLightManager.eastGreen(); } timerGreen() -> westAndEastYellow; } westAndEastYellow{ entry / { trafficLightManager.northRed(); } entry / { trafficLightManager.southRed(); } entry
/ { trafficLightManager.westYellow(); } entry / { trafficLightManager.eastYellow(); } timerYellow() -> northAndSouthArrow; } }
}
• Code java
/*PLEASE DO NOT EDIT THIS CODE*/
/*This code was generated using the UMPLE 1.19.0.3395 modeling language!*/ package SEG2106.core;

// line 1

You May Also Find These Documents Helpful

  • Satisfactory Essays

    nt1310 unit 1 lab 1

    • 673 Words
    • 3 Pages

    • How much time do you spend talking on the phone, and when do you make your calls? Some providers offer free incoming calls, or free nights and weekends, but those aren’t helpful if you make lots of outbound calls during business hours.…

    • 673 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LAB 20C

    • 561 Words
    • 3 Pages

    1. Moles of NaOH = 0.500 mol/L X 0.010525 L = 5.26 x 10-3 mol…

    • 561 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    The benefits of a partial in the cost and a full meh would be required where large sums of money and data are exchanged and can have almost none down time.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab 7 SC

    • 2232 Words
    • 17 Pages

    I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface…

    • 2232 Words
    • 17 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab8 is3440

    • 129 Words
    • 1 Page

    1 Bascially RPM command is used for installing, uninstalling, upgrading, querying, listing, and checking RPM packages on your Linux system.…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. What happens to the volatile memory when the power is lost? –RAM is deleted…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 7 Lab 1

    • 753 Words
    • 4 Pages

    On NYC-VS1 desktop Click Start, and in the Start Search box, type C:\WUA7\64bit_rep.jpg and press Enter. Review the report, after reviewing close the window.…

    • 753 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt2580 Unit 2 Lab 1

    • 581 Words
    • 3 Pages

    With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from…

    • 581 Words
    • 3 Pages
    Good Essays
  • Good Essays

    pt2520 unit 8

    • 287 Words
    • 1 Page

    When a client connects to the MySQL server, the server uses the username provided by the client and the client host to select the appropriate account row from the mysql.user table. It then uses this row to authenticate the client. Before MySQL 5.5.7, the server authenticates the password provided by the client against the Password column of the account row. As of MySQL 5.5.7, the server authenticates clients using plugins. Selection of the proper account row from the mysql.user table is based on the user name and client host, as before, but the server authenticates the client credentials as follows: The server determines from the account row which authentication plugin applies for the client. If the account row specifies no plugin name, the server uses native authentication; that is, authentication against the password stored in the Password column of the account row. This is the same authentication method provided by MySQL servers older than 5.5.7, before pluggable authentication was implemented, but now is implemented using two plugins that are built in and cannot be disabled. If the account row specifies a plugin, the server invokes it to authenticate the user. If the server cannot find the plugin, an error occurs. The plugin returns a status to the server indicating whether the user is permitted to connect.…

    • 287 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Lab

    • 252 Words
    • 2 Pages

    ➢ To define a class of your own and use it to create an object.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    PT1420 Lab

    • 409 Words
    • 2 Pages

    A port expander is a hardware device designed to allow a user to utilize more than one device on a single port at one time. There are two basic forms of port expanders: internal and external. An internal expander has a connection inside the computer and the only part that is visible to the user is the expansion plate containing multiple ports. An external device plugs into the existing port and then has multiple places to connect. Expanders are made for nearly every type of port, but the most common household versions are for universal serial bus(USB) and Ethernet ports.(What Is a Port Expander?, 2013)…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw 240 Lab 1

    • 2291 Words
    • 10 Pages

    Note: If you would like to install the 64-bit version of Fedora, open your browser to http://archive.fedoraproject.org/pub/fedora/linux/releases/14/Fedora/x86_64/iso and click on Fedora-14-x86_64-DVD.iso to download the Fedora installation image.…

    • 2291 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Eg462

    • 407 Words
    • 2 Pages

    alarms or misses, this may influence bias. If the stimulus is a bomber, then a miss (failing to detect the plane) may increase deaths, so a liberal bias is likely. In contrast, crying wolf (a false alarm) too often may make people less likely to respond, grounds for a conservative bias.”(www.wikipedia.org)…

    • 407 Words
    • 2 Pages
    Satisfactory Essays