Simple application to model a garden, Computer Engineering

Assignment Help:

Requirement Specification for a Simple Application to Model a Garden The following is a requirements statement for a simple application to model the design of a garden.

The required system has to allow a garden designer to construct a three dimensional model of a garden. The model will allow the designer, and any of their clients, to view the garden at any time in the future and from above or through any vertical cross section.

This will enable the application to simulate to a client what a person will see while in the garden as the garden grows. 

The designer will be able to specify the shape of the garden based on a grid of squares.

Each square will be the same size. The size of each will depend on the detail of the garden shape.  Once the garden shape is specified plants can be placed in the garden by the designer. 

The plants can cover one or more grid squares, depending on their size and the size of the grid squares.  Plants will be assigned an initial height and radius.  Plants will also be assigned growth rates for height and radius.  The Growth rates can be entered for each season (spring, Summer, Autumn, Winter) and the soil type (sandy, clay, silt, loam, chalk, or peat).  However, one growth rate for height and one growth rate for radius can also be assigned, or rates can be assigned that are independent of either season or soil type.  Each grid square will be assigned a soil type.

The designer can remove or change any plants in the garden and adjust the plant parameters in order to optimize the garden layout.  

Once the garden layout has been completed the garden and plants can be viewed at the initial time or at a given time in the future.   In the future the plants will have a size calculated based on their growth rates in height and radius.

Your analysis of the Garden Application will not include any interface classes but your model classes should allow the straightforward construction of an MVC interface.


Related Discussions:- Simple application to model a garden

Binary equivalent of the decimal number 368 , What is the binary equivalent...

What is the binary equivalent of the decimal number 368 ? Ans. 101110000 is the Binary equivalent of the Decimal number 368. From Decimal number to Binary number conversioni

Hardware implementation for signed-magnitude data, Hardware Implementation ...

Hardware Implementation for signed-magnitude data When multiplication  is  implemented  in  digital  computer,  we  change  process lightly. Here, in place of providing registe

Illustrates several names of popular internet browsers, Illustrates several...

Illustrates several names of popular internet browsers? Popular Internet Browsers are: Internet Explorer, Netscape Navigator and Mosaic, Google chrome and Mozilla and Opera.

Why the tcp checksum is necessary, Is the TCP checksum necessary? Yes, ...

Is the TCP checksum necessary? Yes, TCP Checksum is essential. TCP layer is liable for error detection, transmission of packets if needed, error control, reassembly of packe

What are transmission bridges, What are transmission bridges? A usual ...

What are transmission bridges? A usual transmission bridge is demonstrated in figure. The series capacitance and the shunt inductances of the two relays give a high-pass filte

What is strong-typing versus weak-typing, What is strong-typing versus weak...

What is strong-typing versus weak-typing? Which is preferred? Why? Strong type is checking the types of variables as early as possible, usually at compile time. Whereas weak ty

Predicates, Fred, Barney and Ralph belong to the La Trobe Mountain Club. Ev...

Fred, Barney and Ralph belong to the La Trobe Mountain Club. Every member of the Club is either a skier or a hiker. Anyone that doesn't like snow does not like skiing. No hikers li

Explain about the biometrics, Explain about the Biometrics  This inclu...

Explain about the Biometrics  This includes obtaining data and identifying characteristics automatically in security systems e.g. use of palm prints, finger prints, facial ima

Sql injection, SQL Injection includes entering SQL code into web forms, eg....

SQL Injection includes entering SQL code into web forms, eg. login fields, or into the browser address field, to access and manipulate the database across the site, application or

Find minimum number of resource so that no deadlock arise, An operating sys...

An operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlocks will ever arise is? Ans. The minimum

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd