Professional Documents
Culture Documents
Full Project Documentation From Group - 15 Students PDF
Full Project Documentation From Group - 15 Students PDF
Getnet Kornsa
i
Acknowledgement
First of all, we would like to thank our almighty God, who gives us love, patience,
healthy, wisdom and ability to walk through all the problems and obstacles during the period
of our document preparation. Secondly, we would like to thanks to our advisors Mr. Getnet Kornsa
for their willingness of constructive, invaluable, Suggestions and comments until the completion
of the documentation of the project .And next for all college of computing and Informatics staff
who contributed in the development of this document. Thirdly, we also like thanks for our
classmates for their help in sharing idea. Fourthly, we would like to say thanks Wolkite police
station office for giving us full information about how the current system work. Finally, thanks to
group members and other peoples who support us for our project document completion.
ii
Abbreviations
AIMS--------------------------------Accident Information management system
BR ----------------------------------------Business Rule.
PHP---------------------------------------Hypertext Preprocessor.
UI ----------------------------------------User Interface
UML ------------------------------------Unified modeling language.
iii
Table of Contents
Contents
APPROVAL SHEET ................................................................................................................................... i
Acknowledgement ....................................................................................................................................... ii
Abbreviations ............................................................................................................................................. iii
Table of Contents ....................................................................................................................................... iv
List of Tables ............................................................................................................................................ viii
Abstract....................................................................................................................................................... ix
Chapter One ................................................................................................................................................ 1
1.1 Introduction ........................................................................................................................................... 1
1.2 Background about the organization .................................................................................................... 1
1.3 Statement of the problem ..................................................................................................................... 1
1.4 Objective ................................................................................................................................................ 2
1.4.1 General objective ........................................................................................................................... 2
1.4.2 Specific objective ............................................................................................................................ 2
1.5 Scope and Limitation of project .......................................................................................................... 2
1.5.1 Scope of project .............................................................................................................................. 2
1.5.2 Limitation of the project................................................................................................................ 3
1.6 Significance and Target beneficiaries of the system .......................................................................... 3
1.6.1 Significant of the project ............................................................................................................... 3
1.6.2 Beneficiaries of project .................................................................................................................. 3
1.6.2.1 Police station ............................................................................................................................ 3
1.6.2.2 Citizens ..................................................................................................................................... 4
1.6.2.3 Police Department .................................................................................................................... 4
1.6.2.4 Team member ........................................................................................................................... 4
1.7 System Development Methodology...................................................................................................... 4
1.7.1 Data collection ................................................................................................................................ 4
1.7.2 Data Analysis .................................................................................................................................. 5
1.7.3 System development tool ............................................................................................................... 5
1.8 Feasibility study of the new system ..................................................................................................... 5
1.8.1 Technical feasibility ....................................................................................................................... 5
1.8.2 Economic Feasibility ...................................................................................................................... 5
iv
1.8.3 Operation feasibility ...................................................................................................................... 5
1.8.4 Political feasibility .......................................................................................................................... 5
1.9 Document Organization ....................................................................................................................... 6
Chapter Two ................................................................................................................................................ 7
Description of the Existing System .............................................................................................................. 7
2.1 Introduction ........................................................................................................................................... 7
2.2 Organization structure ......................................................................................................................... 7
2.3 users in the existing system .................................................................................................................. 8
2.4 Major functions of the Current System .............................................................................................. 8
2.5 Existing System Workflow structure .................................................................................................. 9
2.6 Report generated in the existing system ........................................................................................... 10
2.7 Forms and other documents of the existing systems ........................................................................ 10
2.8 Bottlenecks of the existing system...................................................................................................... 12
2.8.1 Performance (response time) ...................................................................................................... 13
2.8.2 Input (Inaccurate/redundant/flexible) and Output (Inaccurate)............................................. 13
2.8.3 Security and Controls .................................................................................................................. 13
2.8.4 Efficiency ...................................................................................................................................... 13
Chapter Three ........................................................................................................................................... 14
Proposed system ........................................................................................................................................ 14
3.1 Introductions ....................................................................................................................................... 14
3.2 Business Rules ..................................................................................................................................... 14
3.3 Functional Requirement ..................................................................................................................... 14
3.3.1. Performance requirements......................................................................................................... 16
3.3.2. Process requirements .................................................................................................................. 16
3.3.3. Input related requirements ........................................................................................................ 16
3.3.4. Output related requirements ..................................................................................................... 16
3.3.5. Storage related requirements ..................................................................................................... 16
3.4. Nonfunctional Requirements ............................................................................................................ 17
Chapter Four ............................................................................................................................................. 19
System Analysis ......................................................................................................................................... 19
4.1 Scenarios .............................................................................................................................................. 19
4.2 System models ..................................................................................................................................... 20
4.2.1 User class and characteristics (Actor Identification) ................................................................ 20
v
4.2.2 Use case Diagram ......................................................................................................................... 21
4.2.3 Object model: Class Diagram ....................................................................................................... 40
4.2.4 Sequence Diagram ....................................................................................................................... 42
4.2.5 Activity Diagram .......................................................................................................................... 49
4.2.6 State Diagrams .............................................................................................................................. 53
Chapter Five .............................................................................................................................................. 59
System Design ............................................................................................................................................ 59
5.1. System Overview ................................................................................................................................ 59
5.2. Design Considerations ....................................................................................................................... 59
5.2.1 Design Goals ................................................................................................................................. 59
5.2.2 Design Trade-offs ......................................................................................................................... 60
5.3. Architecture of the proposed System ............................................................................................... 61
5.3.1 Sub-system Decomposition ........................................................................................................ 62
5.3.2 Hardware/Software mapping (Deployment design) ............................................................... 64
5.4.3 Persistent data management ....................................................................................................... 66
5.3.4 Class interfaces ............................................................................................................................. 68
5.4 User interface design........................................................................................................................... 73
Chapter six................................................................................................................................................. 76
Implementation and testing ..................................................................................................................... 76
6.1 Introduction ...................................................................................................................................... 76
6.2 Hardware software acquisitions ........................................................................................................ 76
6.3 User manual preparation ................................................................................................................... 77
6.3.1 Tanning ......................................................................................................................................... 77
6.3.2 Installation process ...................................................................................................................... 77
6.3.3 Startup strategy ............................................................................................................................ 77
6.4 Algorithm ............................................................................................................................................. 78
6.5 Maintenance ........................................................................................................................................ 84
6.5.1 Maintaining code .......................................................................................................................... 84
6.5.2 Maintaining database .................................................................................................................. 84
6.5.3 Maintaining user interface .......................................................................................................... 84
CHAPTER 7 .............................................................................................................................................. 85
Testing plan ............................................................................................................................................... 85
7. 1 Introduction ........................................................................................................................................ 85
vi
7.2 Purpose................................................................................................................................................. 85
7.3 Features to be tested and not to be tested ......................................................................................... 85
7.3.1 Features to be tested .................................................................................................................... 85
7.3.2 Features not to be tested .............................................................................................................. 86
7.4 Sample Test Cases ............................................................................................................................ 86
7.5 Test Procedure .................................................................................................................................... 90
7.5.1 Unit Testing .................................................................................................................................. 90
7.5.2 Integration Testing.................................................................................................................... 90
7.5.3 System Testing.............................................................................................................................. 90
7.5.4 Acceptance Testing ...................................................................................................................... 91
Chapter Eight ............................................................................................................................................ 92
Conclusion ................................................................................................................................................. 92
8.1 Summary of Final product ................................................................................................................. 92
8.2. Recommendation................................................................................................................................ 92
References ................................................................................................................................................... 93
vii
List of Tables
Table 1 use case description for login ......................................................................................................... 26
Table 2 use case description for Adding user ............................................................................................. 27
Table 3 use case description for Updating user count................................................................................. 28
Table 4 use case description for Delete user account ................................................................................. 29
Table 5 use case description for updating record ........................................................................................ 30
Table 6 use case description for deleting records ....................................................................................... 31
Table 7 use case description for Emergency report .................................................................................... 32
Table 8 use case description for Open incident .......................................................................................... 33
Table 9 use case description for Accident Handle report ........................................................................... 34
Table 10 use case description for Active report .......................................................................................... 35
Table 11 use case description for Posted information ................................................................................ 36
Table 12 use case description for View posted information ....................................................................... 37
Table 13 use case description for Add resource ........................................................................................ 38
Table 14 use case description for Allocate Resource.................................................................................. 39
Table 15 use case description for Logout ................................................................................................... 40
Table 16 Test case to register account ....................................................................................................... 87
Table 17 Test case to Login ........................................................................................................................ 88
Table 18 Test case to send report ................................................................................................................ 89
viii
List of Figures
Figure 1 Organization structure .................................................................................................................... 8
Figure 2 Existing System Workflow structure .............................................................................................. 9
Figure 3 Use case diagram .......................................................................................................................... 22
Figure 4 Despatcher detail diagram ............................................................................................................ 23
Figure 5 Accident Control Team detail diagram ........................................................................................ 24
Figure 6 Field Officer Detail diagram......................................................................................................... 24
Figure 7 Society detail diagram .................................................................................................................. 25
Figure 8 Class Diagram .............................................................................................................................. 41
Figure 9 Login sequence Diagram .............................................................................................................. 42
Figure 10 Updating Database Sequence Diagram ...................................................................................... 43
Figure 11 Deleting record sequence Diagram............................................................................................. 44
Figure 12 Generate Emergency Report Sequence Diagram ....................................................................... 45
Figure 13 Accident handle report Sequence Diagram ................................................................................ 46
Figure 14 Add user account sequence diagram........................................................................................... 47
Figure 15 Add resource sequence diagram ................................................................................................. 48
Figure 16 Login activity diagram................................................................................................................ 49
Figure 17 Accident Report generation activity diagram ............................................................................. 50
Figure 18 accident handle activity diagram ............................................................................................... 51
Figure 19 Update activity diagram.............................................................................................................. 52
Figure 20 Create Account activity diagram ................................................................................................ 53
Figure 21 State chart Login Diagram .......................................................................................................... 54
Figure 22 Report emergency state diagram ................................................................................................ 55
Figure 23 Post Information state diagram ................................................................................................... 56
Figure 24 Post View state diagram ............................................................................................................. 57
Figure 25 Update State diagram.................................................................................................................. 58
Figure 26 Architecture of the proposed System.......................................................................................... 62
Figure 27 Sub-system Decomposition ........................................................................................................ 63
Figure 28 Hardware/Software mapping ..................................................................................................... 65
Figure 29 Persistent data management........................................................................................................ 66
Figure 30 Class interfaces of Resource ....................................................................................................... 68
Figure 31 Class interface of Emergency report........................................................................................... 69
Figure 32 Class interface of Incident Handle report .................................................................................. 70
Figure 33 Class interface of society............................................................................................................ 71
Figure 34 User Home page Interface .......................................................................................................... 73
Figure 35 Admin/Dispatcher page Interface ............................................................................................... 74
Figure 36 User emergency report interface................................................................................................. 75
viii
Abstract
The project developing as web based Accident Information Management (AIM) system for
Wolkite Police station. The purpose of this project is changing the existing system in to Centralized
information control and improved accessibility of data. In Accident Information management
system institution for Wolkite city police station the emergency report generate and manage file
even today very old practices used. This may leads them for lack of security, resource
consumption. Proper generation of report take time to produce, Retrieval of information takes a
lot of time, Need large space to store file and Human energy loss. The main objective of this
project is solving problems by identifying problems in the existing system and we analyses the
problem, gather requirements and designing of the system to solve existing system problem. This
project can perform many functions like Manage file, Manage account, manage resource, post new
and Emergency report generating. The project is web based so it is user friendly system and it
provide more significant for the user, developer, and the organization.
ix
Chapter One
1.1 Introduction
Accidents are global problems affecting all sectors of society. It brings huge economic loss to the
global economy in every fiscal year. The development of one country is analyzed from many
direction or factors such as peace, security of the people and their property etc. Those are protected
by accident management station such as police and society. The institution of accident
management station is standing to protect peoples and their property from danger. Our project
aimed to develop new web based accident information management system. The proposed system
applies to accident information management institution all across the country and specially looks
in the subject of accident information management system of Wolkite city. The efficiency of the
accident controlling and the effectiveness with which it deals with accident depend on what
quality of information it can drive or received from where the accident is occur and how fast it
can have response to it.
But still this task is managed manually beginning from collecting and recording data about the
accident and the technique of response to the accident. The accidents that can be happened either
natural or human made. Some of these are traffic accident, fire accident, killing or murder, flood,
electric current accident, earth quake etc.
1
Difficult of communication of field office, society and the station to give and get real time
response to the accident.
Difficult to generate report.
Difficult of getting available resource to control and detect the accident at real time and to save
human life and property.
Difficult in conducting consistent reports because the record is documented
manually and require much time and human power to search and get wanted information (file).
There is no fast and efficient way of sharing critical information across the station as well as
with the external environment.
The current system high work load for staff of police department.
Also there is security problem, the existing system is manually system in which document are
stored in packed paper files so that the file are highly exposed to damage and can be stolen by
any other unauthorized person or group.
1.4 Objective
1.4.1 General objective
The general objective of this project is developing web based accident information management
system for wolkite city police station.
Analyze the current system to design new data base system operated easily using web based
system.
2
information (post unknown people die in accident), report accident, Presence of centralized
documented and organized record, Learn society they protect from accident, facilitate timely
management decision making and enable to have real time response to the accident detect it,
enabling the workers of the system to get reliable information where and when occurred as well as
the type and level of accident to give reliable to response on detecting the accident, the can use
English language, total number of each accident can be see easily and they can be prepared report
easily.
3
Enhance security mechanisms to protect crime records.
1.6.2.2 Citizens
Multiple channels to access services from police.
Simplified process for reporting the accident.
Can view posted information’s by the station anywhere at any time.
Faster and assured response from police to any accident
The project team had interviewed Wolkite city police station manager and other member police as
well as some peoples who live in the city too deeply understand the manual system and to develop
the proposed system perfectly.
Document Analysis
Document analysis is used to understand how the system is working. We used this method to know
all about the police station mission, vision, function and overall of their work in short and brief.
Questioners
We used this method to gathering information through preparing questions to user.
Observation
4
The project team observed different things to get the overview of the existing system,
understanding the overall work flow and how everything is handled in and its overall system.
6
Chapter Two
Description of the Existing System
2.1 Introduction
In this chapter we studied the existing system deeply, since it is necessary to know the existing
working system so as to develop a better system. When we studied the existing system we gave
emphasis for here under listed questions.
After studying the existing system, we also determined the requirement or the feature that must be
included in the proposed system. Furthermore by analyzing the current system, we could also
estimate how the propose system solve the setbacks of the existing system.
Dispatcher
7
Figure 1 Organization structure
If the field officer exist in accident place report the accident to the dispatcher in police
station.
Directly work with society.
Collect all necessary information about the accident.
The dispatcher accept the emergency accident report and based on emergency report
assign resource and give information to accident control team.
The dispatcher checks the availability of resources
View previous accident report
Accident report the dispatcher send accident controlling team in the place of the accident.
Generate report:-the report prepared in day, three day weeks, month, three month, six month,
year report. This report is major report generate time. All report generate is very tedious and
complex because all thing is done in manually so difficult to prepared report, especially the month,
8
three month, six month, year report are more difficult and additional task to police department to
search the file.
Store the accident file:-the existing system store the accident information in manually. This
method is not secured, also have not backup. The accident file only in one document if the paper
damage also damage the accident file.
society
Field officer
Accident controlling
Dispatcher
team
Information desk
When an accident occurs in a society, the society informs the occurrence and other reliable
information about the accident for the field officer. Then, the field officer informs the dispatcher
9
by preparing emergency report to detect the accident. After the dispatcher view the detail
information sent by the field officer, he/she allocates resource and sends the accident controlling
team to the place where the accident has occurred.
10
Accident/Incident Report Form
Address:
__________________________________________________________
Phone
Number(s): ________________________________________________________
Details of accident
__________________________________________________________
11
__________________________________________________________
Signature date
Difficult of getting real information at real time when accident occurred that help to have
real time response to accident.
Difficult to manage the overall system.
Accident file control mechanism is very tedious and complicated.
Data redundancy and inconsistency
Difficult of communication of field office, society and the station to give and get real time
response to the accident.
Difficult to generate report
The officer loss the paper that write the report is also loss the information about the
accident.
Difficult of getting available resource to control and detect the accident at real time and
to save human life and property since there is no organized detective in the system to
control the accident rather than the society and police are tries to detect the accident as
much as possible.
Difficult in conducting consistent reports because the record is documented manually and
require much time and human power to search and get wanted information (file).
There is no fast and efficient way of sharing critical information across the station as well
as with the external environment.
System has work load for police department.
Also there is security problem as we mentioned before, the existing system is manually
system in which document are stored in packed paper files so that the file are highly
exposed to damage and can be stolen by any other unauthorized person or group.
12
2.8.1 Performance (response time)
The performance of the existing systems is very low because all activities can be done in manual
form this manual activity can consume more time and takes more response time.
2.8.4 Efficiency
In existing system, there is no efficiency because all activities performed manually in the paper. It
can reduce the efficiency of the system. As we observed in existing system to perform some action,
it takes more time and many resources and it results economic problem
13
Chapter Three
Proposed system
3.1 Introductions
The main aim of this project is to automate the current system and it will solve the problems that
are exists in the manual system. We are going to design a web application that address the existing
system problems. This chapter will fully describe Business rules, all the functional and
nonfunctional requirements, and other factors necessary to provide a complete and comprehensive
description of the requirements in accident management system for Wolkite city.
Br3: Dispatcher police officer view the incident report that come from field officer and should
work for 24 hours to accept accident reports
Br6: The Accident Controlling Team should go to the place where the accident has occurred.
Br7: Then the accident Controlling Team generate accident active report when it’s needed and the accident
should get fast response.
14
Manage accident report: system easily manage accident report because everything should be
done in web based. Accident report Date, accident Time, Information Type, Place of accident,
Name of Police, and Received Time take the system as input. After inputting data validation checks
on various fields is performed. On submission of the information the record is stored on database.
If the submitted information is valid, and found in the database then the corresponding record is
displayed.
Manage accident file: manages accident file using web based system in manner that more
secured than previous system. Every accident record in a database so, the system user can simply
access and make the system secured from illegal or unauthorized users or persons.
Manage resource: Manage resource that means added resource, allocate /Set/resource and check
the availability resource is easily performed by the new system.
Emergency accident report online: The Users would be able to emergency accident online
without coming to the police station office by using the proposed system. The society and the field
officer report emergency accident easily using the proposed system. The users of the system fill
all the necessary information, if enter the data correct the system report to dispatcher and get the
acknowledgement.
Sending SMS: Our system will send SMS notification so as to inform the emergency accident to
the wolkite police station.
Update accident information: The system able to search, insert, delete and update the accident
information when it is needed in propose system they can update easily because all data are in the
database so we can update easily and in short time.
Posting news: the system can post news for the society in order to make them inform about the
some additional information.
Retrieve accident files: we can easily retrieve the accident information from database by only
enter the accident number, and accident type name. Then the system checks that accident type and
accident number the system processes it if it valid display the information.
15
Poste unknown people die in accident: this very important for new system because
someone come other place then sadly die in accident. So the user of the system is post easily this
person using this automate system.
The accident information management system can do the following functions those are: -
The system automatically gives the form to fill to the users of the system whom want to report the
accident. Data error from the user’s end and from the back-end database-processing
end must be gracefully handled.
The above requirements are input related requirements of our system, and the facilities that
the system uses to take inputs from the users are listed below:
Forms: This makes users fill their forms, which is required to be filled.
Dialog: This enables users to make their confirmation for any request.
16
The system should allow accidents report data stored in to the database.
The system should allow to store data in organized manner, which must be easy to access.
The system should allow to modify stored data easily.
The system allows updating, modifying and even deleting the existing information.
Speed: AIMS will respond the requested task and operation quickly as fast as possible.
Reliability: the system should be reliable in retrieving and displaying only the requested
data for the user. Users can rely on the information be gotten would be true and dependable.
Security: The system will apply security mechanisms in which users can only
access information and perform any operation through their privilege. Only authenticated
users can access the system.
Security measures are provided to prevent unauthorized access of the system at various levels.
Security is the main issue to protect and secure the entire project to unintended loss of data,
deletion of data and modification by unauthorized and unauthenticated users. We try to handle
this though
Prevent unauthorized access of data: Users are restricted to access specifically what
the grant they are provided.
Only assigned users can use the system to increase reliability.
Prevent unauthorized by presentation of Use Name and password: Only authorized
user is use the system.
Quality: The system allows putting backup of data and it fulfills all user requirements.
17
User friendly interface: Simple and interactive user interface components should be part
of the system. This user friendly interface requirement of the system will be available in
any end user and system administrator interface of the application.
Usability: The system provides a help and support menu in all interfaces or
give direct input for the user to interact with the system. The user can use the system by
reading help and support.
Performance: Our system speed operation is very high. That means the accuracy and
response time of the system should be very fast.
Availability: The system should always be available for access at 24 hours, 7 days a week.
Maintenance: New additional features can be added if required and also the system
components i.e. memory, disk, drives shall be easily serviceable without much alteration
in the code.
Generate error message for invalid inputs: Wrong input entry shouldn’t be accepted by
the system it should prevent and notify for the user so that wrong output will not be
generated.
Portability: The system supports every operating system.
18
Chapter Four
System Analysis
4.1 Scenarios
Scenario is the description that shows the process or steps while the interaction between the
system and user. We can describe scenario of the system as follows:-
Scenario Name: S #1
Actor: Dispatcher
Flow of event:
The dispatcher of the system activates the system to login in to the system and then enter his/ her
password and user name. The system checks either the entered Password or Username is correct
or not. If the Password and Username corrects then the user access system, if not the system
displays the message like “the Password or Username you entered is incorrect please try again!”
19
4.2 System models
We can represent our system by using different system models such as use case models, object
models, Sequence Diagram, activity diagram, and state diagrams. The system models describe
problem to be solved and as system models represented by graphically they are more
understandable than more detailed natural language description of the system requirement.
Manage resource
Allocating resource based on the emergency report come from field officer
Managing staff
Detecting and controlling accident by going on the shortest path i.e. generated by the
system.
Generate Handled accident detection report which includes the process of accident control
and effect of the accident.
Active report
Field officer: has the following responsibilities
20
To generate emergency report and to send to the Dispatcher.
Updating the report if any information is received.
21
Accident information management
system
Check availability
resource
Allocate resource
Extend
Extend
Add resource
Update report
Manage resource Extend
<<Include>>
Request
<<
Open incident Inc emergency
lud
e>
Dispatcher >
Field officer
<<Include>>
<<
Inc
Send notice lud
e>
>
View request
<<
Inc
lud
e>
>
<<Include>>
Post information
<<Include>>
emergency request
<<Include>>
Manage staff Login
<<Extend>>
Delete User
<<Include>>
<<Include>>
View notice
Add User
Active report
Handled Incident
report
Accident Control
Team
22
II. Detail Diagram and description for each use cases
Detail Diagram
Check availability
resource
d
ten
Ex
Extend Allocate resource
Manage resource Ex te
nd
Add resource
<<
Open incident << Inc
Inc lud
lud e>
e> >
>
<<In
c lude
Send notice >>
Login
>>
c lude
<<In
>>
Post information c lude
Dispatcher <<In
Extend
Add User
Manage staff Ex te
nd
Ex
ten
d Delete User
Update User
23
Accident Control Team Detail Diagram
View notice
>
e>
c lud
< <In
<<Include>>
Login Active report
<<In
c lude
>>
Accident Control
Team
Handle Incident
Report
Update report
>>
l ude
c
< <In
>> Request
c lude
<<In
Login emergency
<<
Inc
lud
e>
Field officer
>
View request
24
Society Detail Diagram
emergency
request
Society
View information
25
Description for each use cases
Use case description provides critical information needed to understand in what context the use
cases are and briefly explain how the functionalities precede using natural language in a step wise
manner. Here is the use case description for Wolkite city police station Accident management
system:
UC_ID UC_01
Description This use case is used to ensure security for login into the system.
Precondition The user must have at least correct User Name and Password
26
Use case: Adding User
UC_ID UC_02
Actor Dispatcher
Post condition The new user information are add to the database
27
Use case: Updating user account
UC_ID UC_03
Actor Dispacher
It describes how the dispatcher modify the user database.
Description
Step1: The dispatcher wants to Step3: The system display appropriate user
update an account and he/she information.
login to the system. Step6: The updating process ends.
Step2: The dispatcher enter ID of
Post condition The system modifies the records with the new entered data.
Alternative course of System restores the previous information if failure occurs.
action
28
Use case: Delete user account
Actor Dispatcher
Description It describe how the dispatcher removes the user account from database.
29
Use case: updating record
UC_ID UC_05
30
Use case: deleting records
UC_ID UC_06
Step1: The User wants to delete the step3: The system display delete form
record and he/she login to the system. page.
Flow event Step2: The user selects the delete Step6: The system checks the entered
option. information with the existing account in
the database
Step4: The user enters the accident
type and accident number. Step7: The system display message
Step5: The user click on delete button.
“Do you want to delete?” to the users
Step8: The users selects the yes
option. Step9: The system delete the record
Post condition The system removes the user details from the record
Step 6.1: If the enter accident type and accident number is incorrect the system
Alternative course of displays “try again” message.
action
Step7.1: if the investigative users select the no option, the system displays
‘Updating aborted’ message.
31
USE CASE: Emergency report
UC_ID UC_07
Step1: The user click emergency Step2: system display the emergency
report option. report form.
Flow event Step3: The user fill accident report Step5: The system checks the filled
form. form.
Step6: displays successful message to
Step4: Next click the emergency
user.
report button.
Step7: send emergency report to
Dispatcher.
32
Use case: Open incident
UC_ID
UC_08
Actor
Dispatcher
Step1: The user wants to see the Step3: system display incident
incident and she/he login to system. reports.
33
USECASE: Accident Handle
Description This is used to know daily, monthly, 3 months, half of year, and 1 year
information’s about the accident detections.
34
USECASE: Active report
UC_ID UC_10
35
Use case: Posted information
UC_ID UC_11
Actor Dispatcher
The user entered valid user name and password then he/she can
Post condition post the information.
Alternative course of Step 5.1: The system display an error message.
action
36
USECASE: View posted information
UC_ID UC_012
Actor Society/User
Description
This use case allows the user to see posted information’s.
37
Use case: Add resource
UC _ID UC_14
Actor Dispatcher
Description In this use case the dispatcher add resource in to the system
Precondition The dispatcher should have to enter a valid user name and password to add
resources.
Step1 The dispatcher wants to add Step3: The system drops different
Flow event resources, he/she login to the system. links of from manage resource
Step2: The dispatcher click on the page.
manage resources links. Step5: The system generate forms
Step4: Then the dispatcher click on the Step8: The system checks all the
add resource links. entered information.
Step6:The dispatcher fill the form Step9:The system displays
Step7: The dispatcher click on the add successful message
button Step10: End the use case.
Post condition The system inserts all information into the database.
38
USECASE: Allocate Resource
UC_ID UC_15
Actor Dispatcher
Description In this use case the dispatcher allocate resources in to the system.
Precondition The dispatcher should have to enter a valid user name and password to
add resources.
Post condition The system allocate resources into the database and announce to the
accident control team.
39
Use case: Logout
UC_ID UC_16
The System administrator, field officer, and accident controlling team should have
Precondition Internet connection.
Flow Event:
Actor action System response
Step 1:The user click logout button
Step3: End use case Step2: The system returns to login page
40
Resource
+Name:string
+Amount:string
+Catagory:string
+Viewstatus()
+CheckAvailability()
+Allocateresource()
+addresource() Society
+Name:string
+IDNo:string
Communication +phone:int
AccidentControllingTeam -Geneder:string
FieldOffice -UserName:string -Location:string
+Sendmessage()
-Password:string
+GenerateReport() +ViewMessage()
+UpdateReport() +Notify() +handledIncidentReport() +GenerateReport()
+Acknowledge() +ViewAllocateResource()
0...*
+ControlTime()
1..*
0..*
HandleIncident
+IncidentNo:int
Dispatcher EmergencyReport
+Date:date
Incident 1..* TypeAccident:string +ReportNo:int
+OpenInccident() 1 AccidentWieght:string +Date:date
+AllocateResource() Name:string
+Optimizepath() +TypeIncident:string -Time:time
+GenerateDectReport()
+AddResource() +IncidentNo:int -Location:string
+AddUser() WeightIncident:string +AccidentType:string
+Time:time +AccidentWeight:strng
+Date:date
+GenerateReport()
-Location:string
+Generate() 1 1..*
User 1...*
+FName:string Message
+LName:string +Subject:string
+PhoneNumber:strig +Comment:string
+Role:string +Date:date
+username:string
+Password:string
+sendMessage()
+ViewMessage()
+AddUser()
+Cnagestatus()
+Viewuser()
0....*
41
4.2.4 Sequence Diagram
Login
User page
Login Login Login Database <<UI>>
<<Link>> <<UI>> <<controller>> <<server>
Constraint
User
1:click
2:send
3:display
4:Fill form
7:check
5:click on login button
validity
6:send
8:valid 9:check
8:invalid autoniticate
10:not
autoniticate
10:autoniticate
Display user page
42
Update
Constraint
Actor
1: Login
2:send
3:click
4:display
9:[Invalid]
9:[valid]modify()
43
Delete
Actor
Constraint
1: login
2: send
3: click
4:display
5:Enter Info ID
8:check
6:Click Delete button
7:send
9:[Invalid] 9:[Valid]drop
44
Generate
Emergency report
Constraint
Constraint Constraint
Constraint Constraint
Field
officer
Constraint
1:login
2: send
3: click
4:display
5:Fill form
10:Acknowlegement
45
Generate Accident
handle report
Constraint Constraint
Constraint Constraint
Constraint
Constraint
Accident
control Team
1: Login
2:send
3: click
3:display
8:[Invalid]
8:[Valid] send
9:Acknowlegement ()
46
Add user
Constraint
Dispatcher
1:Login
2:send
3: click
4:display
5:Fill form
9:[Invalid]
9:[valid]save
47
Add Resource
Constraint
Dispatcher
1:Login
2:send
3: click
4:display
5:Fill form
7:send 8:check
9:[Invalid]
9:[valid]save
48
4.2.5 Activity Diagram
An activity diagram describes a system in terms of activities. Activities are states that
represent the execution of a set of operations. The completion of these operations
triggers a transition to another activity. They can be used to represent control flow
(i.e., the order in which operations occur) and data flow (i.e., the objects that are
exchanged among operations Login to the System)
Valid
Logged
49
Login to the click emergency
system report link
Fill emergency
report form
Click emergency
report button
Valid
Successfully
generated
50
click Accident
Login to the
handle report
system
link
Click Accident
handle report button
Valid
Successfully
generated
51
Login to the Click
system Update Link
Click Update
button
Is Input Invalid
Error message
valid
Valid
Updated
52
login to the click Create
system Account link
Fill create
Account
Form
Click create
Account
button
Valid
Created
53
system dynamically. States are defined as a condition in which an object exists and it
changes when some event is triggered. So the most important purpose of State chart
diagram is to model life time of an object from creation to terminal.
Idle
Home page
Activate
Login link
Click
Login form
Login button
Incorrect
Clickon
If valid
Correct
Confirm login
Display appropriate
page
Final state
Home page
Activate
Login link
Report emergency
link
Click
Fill
Error
Is Valid Input Invalid
message
Valid
Generate Report
55
Initial State
Idle
Home page
Activate
Login
Post Link
Click
Post form
Fill
Post button
Incorrect
click
Is Valid
correct
Confirm posting
is successful
Final State
56
Activate Click on view
user page Click and login report
Home page Login link View report link Report type
Select
Report
Initial state
Display
Final state
57
Idle
Activate
Home page
Click
Login link
Click
update link
Update page
Click
Update button
click
Invalid
Is valid Input Error message
Valid
Updated
58
Chapter Five
System Design
5.1. System Overview
System design is the transformation of the analysis model into a system design model. Up to now
we were in the problem domain. System design is the first part to get into the solution domain in
a software development. This chapter focuses on transforming the analysis model into the design
model that takes into account the non-functional requirements and constraints described in the
problem statement and requirement analysis sections discussed earlier. The purpose of designing
is to show the direction how the system is built and to obtain clear and enough information needed
to drive the actual implementation of the system. It is based on understanding of the model the
software built on. The objectives of design are to model the system with high quality.
Implementing of high quality system depend on the nature of design created by the designer. If
one wants to change to the system after it has been put in to operation depends on the quality of
the system design. So if the system is design effectively, it will be easy to make changes to it. The
purpose of design phase is to plan a solution for problem specified by the requirements.
In this section, the systems is described by defining the design consideration of our project, by
decomposing the system into smaller subsystems that can be easily realized or proposed system
architecture and by selecting strategies for building the system, such as the hardware or software
platform on which the system will run, the persistent data management strategy and Class
interfaces. The result of system design is a clear description of each of these strategies, subsystem
decomposition, and a deployment diagram representing the hardware/software mapping of the
proposed system.
The designer’s goal is to produce a model or representation of an entity that will later be built.
Beginning, once system requirement has been specified and analyzed, system design is the first of
the three technical activities -design, code and test that is required to build and verify software.
The importance can be stated with a single word “Quality”. Design is the place where quality is
fostered in software development.
59
Documentation: System users are provided with proper documentation about the
software’s features.
Performance: The system should be able to serve a number of users which are
expected to access it concurrently.
Error Handling: The system should be robust enough to handle error conditions and
continue with normal operations.
Security: The system should prevent the sensitive data from unauthorized
access.
AIMS provides many functions for users such as manage staff, manage resource,
manage file etc. Each function of the system requires extra design and this causes an
extra cost for the development. Without functionality, the system is nothing so, we
focus on functionality rather than development cost.
Understandability versus Efficiency
Understandability of the code is too important especially during the testing phase.
Each class and method must be readable, so number of methods increase in the
system and functions must be implemented in a clear way. Writing comments into
the source code increases the understandability of the code. This causes an
additional time taking in the developing phase.
Security versus Availability
In AIMS (Accident information management system), users must have authorized to
connect to the system from web, and unauthorized people should not be able to access
the system. Each user will be able to login to the system by using the username and
password that is assigned by Administrator.
Moreover, Availability is the degree to which a system or component is operational
and accessible when required for use. We know that if the system is available,
discussing about security is nothing.
60
5.3. Architecture of the proposed System
Our proposed system uses three tier software architecture systems i.e. three-tier
architecture is a client-server architecture in which the functional process logic, data
access, computer data storage and user interface are developed and maintained as
independent modules on separate platforms. Three-tier architecture is a software design
pattern and well-established software architecture. It has client side, server side and
database.
Client Tire (user interface): which runs on the user’s computer or in this side
Dispatcher, accident control team, Field officer and other workers and other
interface exists in this side. It is also called presentation logic is responsible
for formatting and presenting data on user’s screen.
Server side: This middle tier runs on a server and is often called the application
server or the web server connects to the database and gives respond for client
request. It handles processing logic, business rule logic and data management
logic.
Database Server: that stores the data required by the middle tier. It is also
called data storage tire. Database communication, MYSQL queries and
completing them via the related API.
The general architecture of the software looks like the following picture. At the top
layer the user interface of the system is set, at the middle the AIM process and at the
end the database that store the data.
61
<<Web browser>>
Web server response
Response
Ip/Tcp Request Include
MYSQLI Request
Web server
Database server
Client
Figure 26 Architecture of the proposed System
62
The Communication controller subsystem this subsystem allows communication between the
dispatcher with the Field Officers and Accident Controlling in the form of sending report or
notification service.
System decomposition identifies the sub-system from the functional requirements outlined earl
in analysis:
Report
subsystem
-Generate report
-View report
Incident Communication
management Controller
subsystem subsystem
-Open Incident
-Update incident Connection -Send notice
-Delete incident Subsystem -View notice
Database connection
Manage Staff
subsystem
Manage Resource
subsystem
-Add Resource
-Allocate Resource
-Check availability resource
63
5.3.2 Hardware/Software mapping (Deployment design)
The deployment design architecture used for our system is a three tier Client/Server Architecture
where a client can use Internet browsers to access the online report accident and other services that
provided by the system anywhere using the Internet.
The client tier is the system user interface containing data entry forms. Users interact directly with
the application through user interface.
Aweb server is a program that runs on a network server (computer) to respond to HTTP
requests.The web server used in this system is apache web server. HTTP used to transfer data
across the Internet. The application server implements the placement logic.
Database server stores all information of the system.
The hardware software mappings illustrated by UML deployment diagram to diagrammatically.
Deployment diagrams show the configuration of run-time processing elements and the software
components, processes, and objects that live on them. Software component instances represent
run-time manifestations of code units.
64
Hardware and Software mapping
Application Server
Allocate resource
OPen incident
MYSQLI Database Server
Request
Client Computer
Manage user Login
account security
HTTP Request
Response
Report generate
Web Browser
Response
View information
Database
Generate
emergency
accident
Post unknown
people die in
accident
65
5.4.3 Persistent data management
Persistent data management deals with how the system is going to handle the actual
data need to be stored on the database of the system. The purpose of persistence
modeling is which objects in the system design are required to be stored persistently.
Clearly, in a database driven application like this one, almost all system interactions
have deal with persistent data. Online accident information management system will largely
depend on a relational database to perform day-to day operations and storing log data.
Data will be stored in a MySQL Data Base Management system and manipulated
through the Database Subsystem, which will ensure data integrity and consistency.
Database Subsystem will contain all necessary SQL queries that will be accessible by
the rest of the Subsystems.
Figure 29 Persistent data management
Feedback Feedback<<Table>>
+User_ID varchar(20)<<PK>>
+User_ID varchar(20) +Name Varchar(20)
+Name Varchar(20) +Address Varchar(15)
+Address Varchar(15) +Email Varchar(20)
+Email Varchar(20) +Content Varchar(500)
+Content Varchar(500)
EmergencyReport
EmergencyReport
<<Table>>
ActiveIncident ActiveIncident
66
HandleIncident<<Table>> HumanResource
HandleIncident HumanResource <<Table>>
+IncidentNo Varchar(20)
<<PK>>
+IncidentNo Varchar(20) +Date date +Name Varchar(20) +Name Varchar(20)
+Date date +TypeAccident Varchar(20) +IDNo Varchar(10) +IDNo Varchar(10)<<PK>>
+TypeAccident Varchar(20) +AccidentWieght Varchar(20) -Position Varchar(15) -Position Varchar(15)
+AccidentWieght Varchar(20)
Document Document
User Account User Account<<Table>>
<<Table>>
+DocumnetNo int(15) +FName Varchar(20)
+DocumentNo int(15) <<PK>> +FName Varchar(20) +Lname Varchar(20)
+Time timestamp +Time timestamp +Lname Varchar(20) ID Varchar(20)<<PK>>
-Date Varchar(10) -Date Varchar(10) User_ID Varchar(20) +Sex Varchar(10)
+Name Varchar(20) +Name Varchar(20) +Sex Varchar(10) +accountType Varchar(20)
+Type_accident Varchar(20) +Type_accident Varchar(20) +AccountType Varchar(20) -UserName Varchar(20)
+Accident_weight Varchar(10) +Accident_weight Varchar(10) -UserName Varchar(20) -Password Varchar(20)
+Location Varchar (30) +Location Varchar (30) -Password Varchar(20)
67
5.3.4 Class interfaces
Figure 30 Class interfaces of Resource
Resource
+Name:string
+Amount:string
+Catagory:string
+Viewstatus()
+CheckAvailability()
-Allocate()
Class Resource
Attribute: Name
Description: It identifies name of Resource.
Type: String.
Maximum-size: 20
Visibility: public.
Attribute: Amount
Description: It contains amount of Resource.
Type: Integer.
Maximum-size: 20
Visibility: public.
Attribute: Category
Description: It identifies category of Resource.
Type: string.
Maximum-size: 20
Visibility: public.
Method: ViewStatus ()
68
Pre-condition:- Must have login to the system to view the status of the resource.
Post –condition: - Resource status view.
Method: CheckAvailablity ()
Pre-condition:- Must have login to the system
Post-condition:-Check availability resource
Method: Allocate ()
Per-condition: - Must have login to the system to allocate the resource.
Post-condition: -Allocate resource to the Accident control team.
Figure 31 Class interface of Emergency report
EmergencyReport
+ReportNo:int
+Date:date
-Time:time
-Location:string
+AccidentType:string
+AccidentWeight:strng
+GenerateReport()
Class EmergencyReport
Attribute: ReportNo
Description: It unique identification of Emergency.
Type: Integer.
Maximum-size: 15.
Visibility: public.
Attribute: Date
Description: It contains date of Emergency report.
Type: Time stamp.
Maximum-size: 15.
69
Visibility: public.
Attribute: Location
Description: It contains location of Emergency.
Type: String.
Maximum-size: 20.
Visibility: private.
Attribute: Accident Type
Description: It contains the Type of the accident.
Type: String.
Maximum-size: 20.
Visibility: Public.
Attribute: Accident Weight
Description: It contains the weight of the accident.
Type: String.
Maximum-size: 20.
Visibility: Public.
Method: GeneratReport ()
Per-condition: -Must have login to the system and fill emergency report form.
Post-condition: - Generate emergency report.
Figure 32 Class interface of Incident Handle report
HandleIncident
+IncidentNo:int
+Date:date
TypeAccident:string
AccidentWieght:string
+GenerateDectReport()
Class HandleIncident
Attribute: IncidentNo
70
Attribute: Date
Per-condition: -Must have login to the system and fill accident handle report form.
Post-condition: - Generate handle incident report.
Figure 33 Class interface of society
Society
+Name:string
+IDNo:string
+phone:int
-Geneder:string
-Location:string
+GenerateReport()
Class Society
Attribute: Name
Description: It identifies name of society.
Type: String.
Maximum-size: 20
Visibility: public.
71
Attribute: IDNO
Description: It unique identification of the society.
Type: String.
Maximum-size: 20
Visibility: public.
Attribute: Phone
Description: It contains the phone number of the society.
Type: Integer.
Maximum-size: 20
Visibility: public.
Attribute: Gender
Description: It contains the gender of the society.
Type: String.
Maximum-size: 20
Visibility: private.
Method: GenerateReport ()
Per-condition: - Must have fill Emergency report form.
Post-condition: -Generate emergency report.
72
5.4 User interface design
73
Figure 35 Admin/Dispatcher page Interface
74
Figure 36 User emergency report interface
75
Chapter six
Implementation and testing
6.1 Introduction
Implementation refers to the coding of the all documents gathered starting from requirement
analysis to Design phase. All documents, business logic, information gathered are designed into
the code so that the system will be implemented for the user to be used for the purpose it
developed. The chapter here describes about the final testing system, hardware and software
acquisitions, and installation process. The functional system from the design phase above is the
key input to the implementation phase. The deliverable of the implementation phase (the project)
is the operational system that will enter the operation and support stage of the system’s life cycle.
Here is the sample code for each module.
Hardware
Computers
Printer: For printing Documentation
Network cable: for used to connecting internet.
Server: for connection to the client computer (to host the system)
Software tools
76
Notepad
Edraw Max
Visual paradigm for UML diagram.
77
6.4 Algorithm
The code for home page
<!-- Navigation-->
<span class="navbar-toggler-icon"></span>
</button>
<br/>
<br/><br/>
<span class="nav-link-text">Home</span>
</a>
</li>
</a>
</li>
78
<i class="fa fa-envelope-o"></i>
</a>
</li>
</a>
</li>
<?php
if(isset($_SESSION['user_role'])) {
if(isset($_GET['p_id'])) {
$the_post_id = $_GET['p_id'];
?>
<span class="nav-link-text">Feedback</span>
</a>
</li>
79
<span class="nav-link-text">Contact Us</span>
</a>
</li>
</ul>
</a>
</li>
</ul>
</div>
</nav>
<div class="content-wrapper">
<div class="modal-content">
<span aria-hidden="true">×</span>
</button>
</div>
</div>
</div>
80
The code for login
<?php session_start();
unset($_SESSION['userid']);
header("Location:index.php");
?>
<?php
if(isset($_POST['login']))
$_SESSION['user']="true";
$_SESSION['user_id']="true";
if (isset($_POST['username'])&&($_POST['password']))
$username=$_POST['username'];
$user_password = md5($_POST['password']);
$records = mysqli_num_rows($result);
if ($records==0)
echo
"<script type=\"text/javascript\">".
81
"top.location = 'sidebar.php';".
"</script>";
else
$_SESSION['username']=$username;
while($row=mysqli_fetch_array($result))
$status=$row['user_role'];
$username=$row['username'];
$pass=$row['password'];
$_SESSION['logged']="true";
$session = "1";
$user_role=$row['user_role'];
if($status=="dispatcher")
session_start();
$_session['userid']=$row['user_id'];
$_session['pass']=$row['password'];
$_session['username']=$row['username'];
$_SESSION['logged']="true";
$username=$row['username'];
$session = "1";
header("location:admin/index.php");
else if ($status=="fieldofficer")
82
session_start();
$_session['userid']=$row['user_id'];
$_session['pass']=$row['password'];
$_session['username']=$row['username'];
$_SESSION['logged']="true";
$session = "1";
header("location:accidentp/index.php");
else if ($status=="controlteam")
session_start();
$_session['userid']=$row['user_id'];
$_session['pass']=$row['password'];
$_session['username']=$row['username'];
$_SESSION['logged']="true";
$session = "1";
header("location:accidentc/index.php");
} else
header("location:sidebar.php");
}}
}}
mysqli_close($connection);
} }
?>
83
6.5 Maintenance
Our system is maintainable in the following different perspective mentionable.
84
CHAPTER 7
Testing plan
7. 1 Introduction
In this chapter we discuss about introduction for testing, purpose of testing, features what we are
tested, what we are not tested, what we use testing tools and environments to test the system and
discus about testing procedures.
This project's goal is providing an automated system for Wolkite city accident information
management system. Once the system is working successful, the finding of Organization that
gives accident information performance will increase at certain level than the former stair.
However, once the system is operational, this initial selection of products will be reviewed to
determine if they will ultimately provide the kind of scalability needed for the foreseeable future.
Specifically, testing will now consist of the following phases (listed chronologically): · Unit and
integration level – adherence to coding standards and successful communication between units
and integration level · System level – compatibility, performance, usability, functionality etc. ·
System Quality Assurance & Acceptance (acceptance into Production).
7.2 Purpose
Software testing is performed to verify that the completed software package functions according
to the expectations defined by the requirements/specifications. The overall objective to not to find
every software bug that exists, but to uncover situations that could negatively impact the students
and organizations, usability and/or maintainability. From the module level to the application level,
this article defines the different types of testing. Depending upon the purpose for testing and the
software requirements, a combination of testing methodologies is applied.
85
Sub system communication
Data base transaction
Login capability
Access privileged
User interface and database interaction
Coding structure style
Software platform
86
Table 16 Test case to register account
Test case description: Admin enters basic info of the user, then presses register button.
Client program contacts with server, server contacts with the database, and database checks
for registration and sends message to the administrator.
Test Environment: Apache MySQL server must be in running state, Database Should
contain appropriate table and link must be established between server and client program.
Test Setup/Pre-Conditions: Apache server should be in running state and all fields should
be filled.
The administrator should login and press the register menu. Displays registration page.
If some fields are not filled the system display to fill the fields again.
87
Table 17 Test case to Login
Test case description: Admin enters Username and Password, then presses login button.
Client program contacts with server, server contacts with the database, and database checks
for authentication and displays administrator page.
Test Environment: Apache MySQL server must be in running state, Database Should
contain appropriate table and link must be established between server and client program.
Test Setup/Pre-Conditions: Apache server should be in running state and User name and
Password fields should be filled correctly.
The administrator should enter the correct user name and Displays administrator page.
password to login.
If user name and password are not filled correctly the system display to fill the user name
and password again.
88
Table 18 Test case to send report
Test case description: the reporter that means Field officer and Accident control team should
login to the system. Reporters fill the fields to report the information and press send button.
Test Environment: Apache MySQL server must be in running state, Database Should contain
appropriate table and link must be established between server and client program.
Test Setup/Pre-Conditions: The reporter’s login to the system and fill the report form
If the report is not fill correctly, the system will display to fill the basic info.
89
7.5 Test Procedure
7.5.1 Unit Testing
Unit test is a way of testing each of the system functionality independently. Unit testing is done at
the source or code level for language-specific programming errors such as bad syntax, logic errors,
or to test particular functions or code modules. The unit test cases shall be designed to test the
validity of the programs correctness.
In this level of testing process, the Accident Information Management system developers test the
different sub procedures, and functions tested.
Sample Tests
Sample Tests
Check the interaction between individual functionality which performs the specific tasks.
Evaluate the functionality of subsystem after combination all individual functionality.
Identify the Independence of each subsystem with other subsystem.
Sample Tests
Evaluate the functionality of subsystem after combination of individual sub system weather
it works correctly or not.
Check the coherence and coupling of each subsystem.
Check the overall functionality of Accident Information Management System that achieves
the user’s requirement.
Measure the system boundary which is beyond the goal or not.
Measure the weakness and the strength of the system using different metrics.
Check the interaction of each subsystem that performs the specified business process.
Verify the system completeness-based user’s requirement.
91
Chapter Eight
Conclusion
8.1 Summary of Final product
Currently Accident Information Management System is manual based Accident information
management system. Due to this many problem are there. Like to society communicating with
their police station to give information about the accident and, communicating between Field
officer, Accident control team and Dispatcher has taken more time and resource.
By analyzing this problem, the group team proposed, analyze, design, and implement this
computerized accident information management system for Wolkite city Accident information
management system station. The system that will provide more efficiency, and accuracy than the
manual based Accident information management system. So, the new computerized accident
information management system performs many operations than manual based. It prevents the loss
of paper documents, time, effort and so on. This system solves many problem of the organization,
society, and police station. It reduces work load of police station and society. The new system can
retrieve data in real time. From this we conclude that the project is very important in work
environment of the Wolkite police station Accident information management system and society
of that areas.
In general during the various phases of the project, we have learned a lot in multidisciplinary
technologies required to be embed with this system and these technologies would be useful in our
future techno-economic career.
8.2. Recommendation
While doing this system the team has faced different types of challenges. But by the cooperation
of all the group members and the adviser, the team is now able to reach to the final result. All the
group members strongly fought these challenges and take the turn to the front.
We would like to recommend some of the extra features to this System which we could not do
due to time limitation and unavoidable reasons and challenges including the following features.
92
References
93