2.
OVERALL DESCRIPTION
RCFA – RS computerize RCFA processes. Engineers or staff lodge incident report through system
which notified administrators. The report consists of vital information, for example, location, date of
the incident. Lodging report interface provided by RCFA-RS guide engineer to provide mentioned
vital data.it has three modules, a login/signup module use to authenticate user. Incident Report
Module, for the staff and engineer to lodge report as well as Change Log Module to detect data
changes in incident report and saved person responsible data.
Figure 2.1: RCFA-RS Use Case Diagram
3
2.1 PRODUCT PERSPECTIVE
2.1.1 System Interfaces
RCFA – RS computerize RCFA processes. Engineers or staff lodge incident report through system
which notified administrators. The report consists of vital information, for example, location, date of
the incident. Lodging report interface provided by RCFA-RS guide engineer to provide mentioned
vital data
Figure 2.2: Data Flow Diagram of RCFA – RS
4
2.1.2 User Interfaces
User interfaces Description
Login/Signup User will insert credential to log in.
signup page to register
Homepage Homepage functionality is to redirect
user to designated page based on user
selection
Incident Report, RCFA Team, Data
Collection Details, Analysis Tools,
Finding and Recommendations,
Executive Summary and Changes
Log are at user disposal to report
incident and saved findings related to
incident
Incident Report Incident report interface capture basic
information of incident. Basic
information of the incident includes
incident location, date with guide of
the system
RCFA Team When incident occurred user will
assign team to investigate reported
incident. Team members addition and
deletion can be achieved with only
click of a button
Data Collection Data Collection interface consist of
dropdown selection which shows user
to choose type data collection and
browse button to choose data/file
from user computer
Analysis Tools Analysis Tools interface and
functionality similar to data
collection but with different purpose.
5
User will upload analysis of the
incident from root of the incident to
proposed solution
Finding and Recommendation Finding and recommendation
interface shows table, add, edit,
delete and next button. “Add” button
will prompt form popup for user to
add details and show input data at
table
Executive Summary Executive summary shows summary
of reported incident
Change Log Change Log interface shows table
which reflect changes by user
responsible, timestamp and which
page change occurred.
Table 2.1: User Interface Table
6
2.1.3 Hardware Interfaces
The only hardware that is used for this system are windows desktop. The device should have
internet access in order to use the application, by having the internet access, the device or the
hardware will be to get the information from the real time database and provides the user the
information that they needed.
2.1.4 Software Interfaces
As for the required software that used to develop the application or the system, we use visual basic
as a main language for development and visual studio as its IDE. The graphical interface will
consist of several forms.
● Login
● Incident Report
● Change-log
To store data for authentication purposes from all the inputs that user key-in, we use an embedded
database which vulnerabilities attack from external network is non-existent. It is important for the
system to have a secured database for customer safety.
7
2.1.5 COMMUNICATION INTERFACES
The RCFA – RS will be fully dependent on its embedded database.
2.1.6 MEMORY
The memory usage will rely on the device. As the hardware capabilities keep evolving, It is proved
that this issue is no longer a problem where most computer have a minimum of 4 GB of RAM out
there.
2.1.7 OPERATIONS
Depending on a feature chosen, the application would perform its given task. Since this application
implementing Engineers or staff lodge incident report Several procedures will take place depending
on the choice of users. For example, user input their information onto the login page, the operations
will consist of below:
● Input data, username and password
● Authenticate and process data in database
● Provides access to the application
2.1.8 SITE ADAPTATIONS REQUIREMENTS
Requirements for site adaptations are becoming essential for each software. The aim is to guarantee
that the software meets its intended objective and that the user rightly uses the software with
particular instructions.
Windows : 7 and above
8
2.2 PRODUCT FUNCTIONS
i. Login page – username and password are the data that user needs to insert in the space
provided for verification and authorization purposes.
ii. Registration page – Detailed information must be inserted for registration purposes by the
user. User information such as username are essential to define the user
iii. Main/home page – the values that RCFA-RS provides is Usability and convenience values
for users. At main/home page, it shows Incident Report, RCFA Team, Data Collection
Details, Analysis Tools, Finding and Recommendations, Executive Summary and Changes
Log are at user disposal to report incident and saved findings related to incident
iv. Incident Report – Incident report capture a basic information of an incident, it include
location, date and guide
v. RCFA Team– User will assign teams to explore reported incidents, two team is needed namely
Team Members and Peer Review.
vi. Data Collection – collect the input from the creation of incident report and uploaded it to the
list view
vii. Analysis Tools– this page is similar to data collection but with different purposes. User will
upload analysis of the incident from root of the incident to proposed solution. These analyses
come in form of special flowchart for previous mention explanation.
viii. Finding and Recommendation– Finding and recommendation interface shows table, add,
edit, delete and next button. “Add” button will prompt form popup for user to add details
and show input data at table. As the name suggest, “Edit” button edit data in table and
prompt form popup similar to “Add” button function. To delete data from table, user will
select row and press “delete” button to perform deletion of selected row.
ix. Executive Summary – This page shows basic information and finding recommendation and
“Export to PowerPoint” button. Button will automatically generate PowerPoint and query
data from database to populate.
x. Changelog –Change Log interface displays a table that reflects user-responsible
modifications, timestamps, and page modifications. For subsequent action, the module
enables other users to keep track of user task and document modifications.
9
2.3 USER CHARACTERISTICS
Root Cause Failure Analysis – Reporting System (RCFA – RS) is a system that process for
discovering the main cause of a problem and creating recommendations on how to fix the issues in
future. However, RCFA – RS system only can functions if it meets with the right intended users.
Table below are target user characteristic that specify for RCFA-RS application:
User characteristic Description
Educational level
General
Understand English language as a
medium language
Experience
Has basic experience in handling
computer application
User has an experience navigating
between forms in application
User has an experience and knowhow
to handle report
10
Technical expertise User must understand this
application need to install other
dependencies for full functionality
User must know how office
application works
Software adaption level
User must understand the importance
of authentication for application that
is being made for verification
purpose.
User must be able to adapt with the
application for smooth service and
fulfil user satisfaction (user
satisfaction sometimes also depends
on user adaption).
Table 2.2: User Characteristics Table
11
2.4 CONSTRAINT
RCFA – RS constraint will be the internet connection. The users are required to connect the
application to have its full functionality. Besides that, System only work with windows-based
operating system because development of the system is using Microsoft development
framework.
2.5 ASSUMPTION AND DEPENDENCIES
User of this application is using windows operating system. By using embedded database, the
computer can stored the data without worry for external vulnerabilities attack. As the
application is created using windows IDE, a lot of windows dependencies is needed.
2.6 APPORTIONING OF REQUIREMENTS
If there are any changes after publishing the application based on user feedback, it will be
transferred to the next version of the application to satisfy the needs of the user.
12