Conan: Rescue the Princess System Overview Presentation Presented To: Initech Presented By: OutSource Inc.

Slides:



Advertisements
Similar presentations
The Active Participant- Key Process C Evaluate Performance Critically Analyse Comment on strategies and tactics Always compare against the perfect model.
Advertisements

Software Quality Assurance Plan
Evaluation Overview Set 1: Building the Form. Setting up the Form From the dashboard From the Requirements form menu Name your form Confirm COI Statement.
1 Interactive Fiction CIS 487/587 Bruce R. Maxim UM-Dearborn.
Garrett Boren Jordan Necovski.  Set in the middle ages, your character is out on a hunt with some friends, as per his usual weekend. As a renowned hunter,
Battle For Throne by Pattarapong Rojanasthien Present to Dr. Kepuska Software/Hardware Integration ECE 2552.
CLEANROOM SOFTWARE ENGINEERING
© Nintendo Game Document Game Development - Spring
Lesson 19: Configuring Windows Firewall
Senior Design – Acceptance Test Plan Review The goal is to: define the criteria for approving the application. Tightly coupled to the Requirements document.
Idea created by: Nolan Morganstern, Lilly Cline, Jessica Weber, Morgan Grubaugh, Emma Kotkowski, Emily Graves, Cameron Crabtree, and Emma Dockery.
Relative clauses or Adjective Clauses
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
CSCI 101 Introduction to Software Development and Design.
 A project is “a unique endeavor to produce a set of deliverables within clearly specified time, cost and quality constraints”
S/W Project Management
ABSTRACT Zirous Inc. is a growing company and they need a new way to track who their employees working on various different projects. To solve the issue.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 9 Introduction to Design.
The Short Tale of Adlez: First Iteration Design ENGI 5895: Software Design Spencer Bellows & Robert Gash.
RFID Pet Door Andrew Parr Conner Rocole Ben Peetz Eric Sturm EE 494, Fall 2006.
Tunnelsnakes Rule!. Story and Genre The game is about surviving waves of enemies for however long you can while gunning for a high score. You play the.
Online Roleplaying Game System Ben Hall CS 470 4/14/2011.
SWE 316: Software Design and Architecture – Dr. Khalid Aljasser Objectives Lecture 7 Requirements and Domain Classes SWE 316: Software Design and Architecture.
© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of Designing the User Interface: Strategies for Effective Human-Computer.
Fundamentals of Game Design
Microsoft Windows Vista Chapter 1 Fundamentals of Using Microsoft Windows Vista.
1. Chapter 25 Protecting and Preparing Documents.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 7 Introduction to Practice Partner Electronic Health Records.
The Design Document The Design Document Introduction Game Mechanics Artificial Intelligence Characters, Items, and Objects/Mechanisms Story.
TEMPLATE DESIGN © Last Resort Animation, Modeling, AI, Networking, and Backend Alex Bunch, Nick Hunter, Austin Lohr, Robert.
CS160: Interactive Prototype Gary Wu - Jordan Berk - Mike Kendall - Mohammed Ali - Hao Luo.
Usage Documentation.  Room Scheduling  Retrieve Room Schedules  Schedule Ad-Hoc Meetings  E-Lock Access  Use your phone to unlock a room  Request.
System Overview & Demonstration Conan: Rescue The Princess Presented To: Initech Presented By: OutSource Inc.
The Recyclables Designed by Red Handed. Red Handed Sanya Mayes Phylicia Tindal- Stevens Connor Leonhardt Jimmie Aaron.
Battle of Bombers 김정수, 박현욱, 백대현, 윤지석.  UML, Development progress, Index.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
Kevin Clow: Artificial Intelligence Programmer Level Designer 3D modeler Matthew Vaughan: Project Manager Graphical User Interface Programmer Audio Programmer.
Geun-woo Kim ( 김근우 ) Bo-seung Kim ( 김보승 ) Jung-pil Yoon ( 윤정필 )
A university for the world real R © 2009, Chapter 9 The Runtime Environment Michael Adams.
© Glenn Rowe AC Lab 3 An adventure game.
Manager Training in My Learning Link Manager Training Guide HR Services – September 2013.
Budgeting Tool Brandon Ganch Chris George Paul Perello Mike Schmidt.
Graphics Qubed SCE Presentation of Epoch: Relic of Time.
Battle of Bombers 김정수, 박현욱, 백대현, 윤지석.  Concept Bomberman, Crazy Arcade- like game Characters are from the game “Angry Bird” All of the items are associated.
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
CHESS 2: Castling and Forking…and a Stalemate A Levoy Power Point.
Student slidesBusiness Communication Krizan, Merrier, Logan, & Williams Ch Chapter 13 Interpersonal Communication and Teamwork.
Fundamentals of Game Design, 2 nd Edition by Ernest Adams Chapter 15: Role-Playing Games.
Financial Management Paish Tooth provides so much more than just an accounts preparation service which your business calls upon once a year. We like to.
Graphical Interface for Organizations in IPDS Presentation 3 Donald lee.
Drill-Through Features Cognos 8 BI. Objectives  In this module we will examine:  Cognos 8 Drill Through Overview  Model / Package Drill Through  Cross.
Meghe Group of Institutions Department for Technology Enhanced Learning 1.
1 Software Testing & Quality Assurance Lecture 15 Created by: Paulo Alencar Modified by: Frank Xu.
Design Brief Presentation For An Unlikely Hero. Background to Game Genre: Text Based Adventure Game set in Real Time Setting: Medieval World Characters:
Ro-Sham-Go! A JOURNEY THAT REQUIRES MORE THAN CHANCE. TEAM DEFAULT.
World of Wokcraft The very best in Single pan cooking themed fantasy gaming!
Story composition Pt. 2 Game Design.
Systems Analysis Lecture 5 Requirements Investigation and Analysis 1 BTEC HNC Systems Support Castle College 2007/8.
Overview & Basic Functionality Supply Chain Platform: Rolls-Royce Training for Controls and Data Services Limited May 2015.
Vocabulary PowerPoint. rescue In traditional fairy tales, princes often rescue or save, young women in trouble.
Information Technology (IT) Audits
Large-Scale Design Process
Fundaments of Game Design
3D Game Pitch Niki Farquhar
Maze Defender By Jon and Mohammad.
X-DIS/XBRL Phase 2 Kick-Off
Rapid software development
Introduction to Project Management
Presentation transcript:

Conan: Rescue the Princess System Overview Presentation Presented To: Initech Presented By: OutSource Inc

Presentation Overview  Introduce the team  Presentation objective  Current project progress  Conan game requirements  Conan game architecture

Team Members  Mike Mallinson Project Manager, Lead Quality Assurance  Billy Logan Lead Documenter, Lead Requirements Analysist  Richard Peters Lead Designer, Lead Developer

Presentation Objective  Display the current project progress  Obtain customer feedback and approval  Respond to any customer questions

Project Progress 4. Final Product 3. User Manual 2. Detailed Design 1. Requirements Analysis

Conan Overview  Conan must fight his way through a series of rooms in a castle to find the Princess.  Upon finding the princess he will fight the King.  Defeating the King allows the Princess to join your party and causes the Prince to swear a vendetta against you as he flees for his life.  Now Conan must battle his way out of the castle while protecting the Princess.

Requirements: Map  A linear series of rooms for Conan to progress through.  The exit to each room is locked and contains a key for the door.  Each room is a maze and employs a “Fog of War” technique so Conan must explore to find the key and exit.  Battles are encountered randomly with an increased probability of an encounter with each step.

Requirements: Battle  Display statistics of Conan (and the Princess)  Prompt the user for an action on Conan’s turn.  Actions include: Attack - Damage the enemy based off Conan’s strength Berserker – Attack 10 times in rapid succession (once per room) Defend – Reduce the damage received Item – Use an item to restore health Run – Flee from battle

Layer Decomposition Manages interaction with the user Manages characters, items and the internal game dynamics Manages storing and retrieving saved game data - - -

Domain Layer: Class Tree Game Battle Enemy AreaCharacter Inventory Item Princess

Summary  Project is currently on schedule and on budget  Game requirements have been briefly described  Basic game design layout has been discussed

Questions and Concerns