Professional Documents
Culture Documents
First and foremost and above all our biggest thanks would be to Almighty GOD because nothing
could be possible without his free will and the completion of this project is supported by him.
Secondly we would like to thank our Advisor Mr. Misrak.
I
ABSTRACT
The Project is focused on Madda Walabu University Main Campus Students Online Clearance
System. Currently Madda Walabu University is using manual clearance system. This Online
clearance system for student is a system that will serve as a more reliable and effective means of
undertaking students’ clearance during end of year. It is discovered that students faced various
problems such as queuing up during clearance, delay in processing of clearance form,
unavailability of some key staffs while processing clearance form thereby leading to students’
consistent visit in a particular office, loss of vital documents etc. This has led students to the
issue of delayed youth’s service as a result of their inability to complete the tedious manual
process of clearance. It is based on this problem that the project is focused on the development of
students’ online clearance system to solve and eliminate the shortcomings of the manual system.
This automate system will be carried out and implemented using PHP, HTML and MYSQL for
database and can be accessed when the LAN connection is available in the university. The
students can access the system by using either personal computer or desktop computer.
II
Contents
ABSTRACT.....................................................................................................................................I
Lists of Acronyms...........................................................................................................................V
CHAPTER ONE..............................................................................................................................1
INTRODUCTION...........................................................................................................................1
1.2 Statement of the problem.......................................................................................................1
1.3 Significance of the project.....................................................................................................2
1.4 Objective of the project..........................................................................................................3
1.4.1 General Objective............................................................................................................3
1.4.2 Specific Objective...........................................................................................................3
1.5Scope and Limitation of the project........................................................................................3
1.5.1 Scope of the project.........................................................................................................3
1.5.2 Limitation........................................................................................................................3
1.6 Methodology and Tools.........................................................................................................4
1.6.1 Data Collection Method..................................................................................................4
1.6.2 System Analysis and Design Methodology.....................................................................4
1.6.3 Development Environment and Programming Tools......................................................5
1.7 Project management Technique.............................................................................................6
1.7.1 Project Schedule (Gantt chart, pert chart).......................................................................6
1.7.2 Project budget (cost break down estimation)..................................................................6
1.7.3 Project Work Break Down..............................................................................................7
1.7.4 Risk Analysis, Identification, Mitigation and Monitoring..............................................8
1.8 Feasibility Analysis................................................................................................................9
1.8.1 Economic Feasibility.......................................................................................................9
1.8.2 Technical Feasibility.....................................................................................................10
1.8.3 Behavioural/Political Feasibility...................................................................................10
III
1.8.4 Operational Feasibility..................................................................................................10
CHAPTER TWO...........................................................................................................................11
CURRENT SYSTEM....................................................................................................................11
2.1 Introduction..............................................................................................................................11
2.2 Description of current system..............................................................................................11
2.2.1 Players in the current system.........................................................................................11
2.3 Literature Review.................................................................................................................12
2.4 Draw Back of the Current System.......................................................................................12
2.5 Practice to be preserved from the Current System...............................................................13
2.6 Business Rule.......................................................................................................................13
2.7 Alternative Solutions............................................................................................................14
CHAPTER THREE.......................................................................................................................16
PROPOSED SYSTEM..................................................................................................................16
3.1 Overview of the Proposed System.......................................................................................16
3.2 System Constraint................................................................................................................16
3.3 Functional Requirement.......................................................................................................16
3.4 Non Functional Requirement...............................................................................................16
3.5 Graphical User Interface......................................................................................................17
3.5.1 Specification..................................................................................................................19
3.5.2 User Interface Description.............................................................................................19
3.6 Hardware and Software Requirement..................................................................................19
3.7 Security and Safety Procedure.............................................................................................21
CHAPTER FOUR.........................................................................................................................22
SYSTEM MODELLING...............................................................................................................22
4.1 Introduction..........................................................................................................................22
4.2 System use case diagram......................................................................................................23
4.2.1 Actor description...........................................................................................................23
4.2.2 Use cases description (scenario)....................................................................................24
4.3 Object Modelling.................................................................................................................30
4.3.1 Class diagram................................................................................................................30
4.4 Dynamic modelling..............................................................................................................31
4.4.1 Sequence diagram..........................................................................................................31
IV
4.5 Activity diagram..................................................................................................................46
Lists of Acronyms
Description about abbreviation used in our project:-
V
2. info...................information
3. JS.......................java script
5. DB.....................data base
9. IE.......................internet explorer
11. REQ......................Requirement
VI
VII
CHAPTER ONE
INTRODUCTION
Clearance is a status granted to individuals typically students allowing them access to
information. The term clearance is also sometimes used in private organizations that have a
formal process to check the employee’s information. A clearance by itself is normally not
sufficient to gain access the organization must determine the cleared individual has needed to
know the information.
The proposed system over comes problems those done by manual system. It reduces misuse of
manpower, avoids errors, it saves time, to provide comfort clearance process for the students and
to provide insurance for the offices especially for workers who play role in the clearance
processing system. This system works for students of Madda Walabu University. The online
clearance processing system allows the students to register for the membership to access the
service of the system.
Madda walabu University student’s clearance processing system is one of the processes that will
be done to be cleared the students from the campus. The manual clearance system starts the
process as Madda Walabu University was established in 1999E.C.
The system gives its function to many user of the University. The numbers of students grow
from year to year in many numbers. Now a day, there are many users of the clearance processing
system. But the project gives a service only the students. The students get one copies of
clearance sheet from department and get signature and stamp from around eight offices. These
are Advisor, Bookstore, Library, Health and physical Education, Student’s Proctor, Student
Service, and College/Institute Registrar, police office cafe and laboratory. After they finished all
necessary requirements, finally the students take copies of sheet that has all signature and stamp
from all offices.
The main significance of the this projects are to change the users as well as the university
attitudes towards modern information technology area, to make system fast and easy, to store and
retrieve information in organized manner, to make system secure by using authentication and
authorization, to reduce data redundancy. Other significance are to distribute clear, reliable,
effort saving and consistent information among the different offices for the clearance, and it
enables the university to work clearance effectively and efficiently.
Those are:
It is developed by using PHP language, CSS, JavaScript, Notepad++ or sublime text and
MYSQL for databases access. It runs in the environment of OS like windows7, windows8,
windows10. The main users of the project are students of the university. The system runs on
desktop and personal computers; it uses an internet cable and LAN connection. The students
send the clearance request in the system and the system checks about recorded things of the
student internally in each office.
1.5.2 Limitation
For the proposed system or new system, we preferred the object oriented system analysis
and design (OOSAD) approach, which is by using unified modelling language (UML). Because
it includes the overall features of OOSAD. The other reason is that using object-oriented
programming we can write clear, more reliable, more easily maintained programs.
We preferred Object-oriented approach for the following advantages: -
Tools Activities
Project Schedule
I Tasks Start Finish Duratio Dec Jan Feb Mar Apri May Jun
d n l
1
0
3 Pen 10 4 40
2 Notepad++ Free
6 Evaluation
This involves questions such as whether the most of the technology needed for the system has
exists in the Madda walabu University compound. Because the system is too customized
according to MWU information transferring system there will be no difficulty to build the
clearance system, and also the staff and other concerned bodies has or will have enough
experience using this system.
Behavioural feasibility is the measure that how users use the system effectively. The proposed
system should be easy to operate, convenient in maintenance and effective in its working. Since
developing this new system will solve the clearance system problems, the users will undoubtedly
have positive attitude towards the system and the system is politically feasible and free from any
legal claims.
The proposed system will solve the business and time problem for the organization.
CURRENT SYSTEM
2.1 Introduction
The current clearance system is the manual system that needs intensive human labour, resource,
consume time, less security .Here, the student to visit all the clearance offices with a form for
them to fill and get sign by the respected offices. Once these forms are signed, it proves that the
users have been cleared. This process takes some days to be completed and possess a lot of stress
to all the users and workers who provide clearance system.
Currently, the manual student clearance system works starting from the registrar that prepares
clearance form. Then the student takes clearance form from the Registrar after he/ she has been
checked for his/her existence in the university. Then, the student fills all required fields correctly
and brings it to head of department/Academic dean to get signature and stamp. If there is no
problem here, the department head puts signature and stamp on student clearance form. After
that student can go to the library with his/her clearance form and id, then the Bookstore keeper
checks whether he/she has taken any book and manuals or not. If there is no problem here, both
Bookstore keeper and Library/Chief of Circulation put signature and stamp. Otherwise, the
student must finish any problem case in each office. After that he/she gets signature and stamp.
Likewise, in some other remained four offices the same rule as library must be performed until
student comes back to registrar. Finally, the registrar puts its signature and stamp after checking
the fulfilment of all signatures and stamps of other respected offices. Lastly, the student comes
with full clearance.
In the existing system there are providers and users of the system. The main players in
the existing system include the following: -
Students: - Students will go to Registrar to get the clearance form and fill the form; then go to
different offices to get sign.
Registrar: - an office that controls the registration, prepare the clearance form for students
and puts final sign on the clearance form.
Dormitory Chief: - checks the dorm materials like bed, window, door, and the door key if all
are not damaged, they sign and put stamp on the students clearance form.
Book Store - Puts signature and stamp after student finishes any problem of books borrowed
from the Bookstore.
Sport Master: - This office check sport materials whether the student taken from the office or
not.
Dean of students: - Any student debt (meal card) is defined in this office.
Head of Department - Checks any problem of students first in the department; then puts
signature and stamp.
Security Guard: - They check the student properties are matched with their clearance paper.
The current system has the problems such as Performance problem, Information Problem, Data
storage problem, Efficiency Problem and Security and control problem.
Performance problem (response time)
Information Problem
The existing system has many drawback concerning data security such as lose of data may
occur, due to manually collecting of data, there is a redundant record and inconsistency
problems, Inaccurate data and information may produce, Incorrect information leads to poor
decision making and poor flow of information between student and respected offices.
Data storage problem
Problems like lack of a well-organized database system, data are not easily accessible due to its
integration and placed in different location, difficult to update information, data redundancy that
leads to inconsistency.
Efficiency
Due to the manual operation most of the activities are easy to wastage of resources like
stationary materials, manpower, time etc. to produce the corresponding outputs. This makes the
current system inefficient while utilizing resources
Security and Controls
Even if the current system has a lot of problems, there are a number of activities that need to be
preserved. The system uses files and forms to define operations and to perform business rules in
the clearance system. Our team members preserve the following practices from the existing
system.
System procedures.
A business rule is effectively an operating principle or polices that we try to specify for both the
existing system and the new system must satisfy. The business rule is a principle or a policy in
which the proposed system operates accordingly.
BR1:- anyone who sign clearance form must be the member of the university
BR2:-Registrar officers give clearance form only for the students of the university
BR3:- Officers of the university are not expected to give service on Saturday, Sunday, and
Holiday.
BR4:- when the students want to sign clearance form they take the clearance form from registrar
officers.
BR5:- when the students want to sign clearance form they must fill the required field and they
must have an ID car of the university to check the validity of the University
BR6:-Every student of the university must sign clearance form at the end of each year
BR7:- students must fulfil their responsibility before they go to sign clearance in officers
BR8:- the officers of the university must put their signature and the date when they sign
BR9:- the student of the university must submit the cleared clearance form to Registrar
BR10:- students should take one piece of approved clearance form from registrar for their
validity
In order to overcome the current system problems that exist in the functioning of clearance
system, our project team members have put down alternative options. These are: -
PROPOSED SYSTEM
3.1 Overview of the Proposed System
The proposed system is aimed to change the manual to web based system for the
students. The manual system has been found to be time consuming as the students have to
physically visit each office and leading to lose their id while they are traveling to each office.
The developments of the web based clearance system minimizes the load of corresponding
offices and allows easy access to the authorized students and clear them without the need to
visit each office.
Defines what the proposed system is not going to perform or what is not including in the
proposed system. This project covers some of the aspects of computer software based online
clearance system using Madda Walabu University as case study. However the following are the
constraints:-
Time constraints.
Financial constraints.
Functional requirements are the description of the facility or feature required. Functional
requirements deal with what the system should do or provide for users. They include description
of the required functions, outlines of associated reports or online queries, and details of data to be
held in the system.
In general, the system is web based application and has the basic functionalities of clearance
request, view information, create account, delete record, search, generate report, update profile,
and approve request and approve clearance.
3.4 Non Functional Requirement
Non-functional requirements are requirements that are not directly concerned with the
specific services delivered by the system to its users.
Performance: -
User Interface: - The developed system provides web application user interfaces that are
compatible browsers like Internet Explorer, Mozilla Firefox, Google chrome, etc.
Backup and Recovery: - When team member standard to develop a system they must have to put
use a backup mechanism by using removable flash disks, or CDs.
Usability:-The system shall be very easy to learn, needs basic computer knowledge to use and
have a help menu to guide the user.
Availability: - There is no delay in the availability of any information, whatever needed, can be
captured very quickly and easily. The server should be always on to be available.
The system user interface should be consistent with all other program.
The caption and the test of user interface should be self-descriptive and clear to understand.
The user interface should be easy to understand.
The user interface should be customized.
The user interface should be accompanied with help files that describe the usage of each user
interface.
The user interface should be designed in the way that they can be extended easily to support
localization.
Hardware Requirement
Client-Computer: in order to run the system the client’s computer must have the following
minimum requirement.
Server Computer: in order to run the system the server must have the following minimum
requirement
Software Requirement
Software requirement for maintain the system
The system provides or contains user name and password for each users based on their privilege.
This performs the following activity: -
Authenticated user with predefined access right will only enter to the information related
to database.
Every users should use strong passwords especially admin.
User must enter valid user name and password to login to system. Without this, access to
the system is denied.
Data is encrypted for security.
System allows only registered users to access clearance system and also allows the users’
to view their own profile not the other users’ profile.
The system provides username and password to prevent the system from
Unauthorized access.
The username must be letters.
The user’s password must be letters or numbers or special characters or the collection of
them. If the student is aimed to access our system, he/ she has to be registered in the
university.
CHAPTER FOUR
SYSTEM MODELLING
4.1 Introduction
This chapter deals with analysing the proposed system by using different UML analysis
modelling techniques such as use case diagrams, the use case descriptions (scenarios), sequence
diagrams, activity diagrams and analysis class diagram.
After identifying the actors and use cases, the use cases are developed and textual descriptions
(scenarios) are stated. The Sequence diagram id depicted based on the use cases which are
developed for the proposed system. Activities will be represented by the activity diagrams.
4.2 System use case diagram
An actor is an idealization of the external person, process or the thing interacting with the
system. An actor characterizes the interaction that the outside user may have with the system.
1. Student Actor
Fill form
Request a special need/ask for clearing
Submit to registrar
2. Book store
Borrow prosperities for the students and check whether they are return or not
After that they sign on the form and cleared the students
Sign and cleared the students
3. Department Head:
Check whether the students fill coast sharing form and whether the instructors complete
their responsibilities such as submitting grade report.
Sign and cleared the students and instructors
4. Registrar
Use-case UC-01
Number
Use-Case Log in
Name
Priority High
Actor Student and Admin
Description This use case describes how each student login into the System.
Post- If the use case was successful, the actor is now logged into the system. If not,
condition the system state is unchanged.
Alternate A1: The system displays error message and redirect to the login page.
course of Action
Table4.1: use case description for login
Priority High
Actor Student
Priority Medium
Description This use case shows how the student view his profile in each office.
Post condition If the use case is successful, the student can see all information
related to his history.
Priority High
Description This use case shows how the Admin creates account for student
based on his/her request.
Post condition If the use case is successful, the student will get an active account.
Priority High
Description This use case shows how the Admin approves the clearance after the student
clearance Request gets all the specific request-approvals from
corresponding officers.
Alternative Course of A1: wait till all the corresponding officers approved the request.
Actions
Table4.5: use case description for Approve Clearance.
g) Use case description for Update.
Priority High
Description This use case allows users to update the user account.
Priority high
Pre-condition The user are not authorized and login in to the system
Description The use case allows the administrator to delete record of students
from database.
Use-CaseNumber UC-09
Priority High
Actor Student
Description This use case allows student and Admin to log out from the system at a
time of accomplishing the task.
Precondition UC-01
Post Condition The System saves the data into the session or the database then logout
from the system.
3.The Student log out button 4. The system redirects to the login
page or Main Home Page.
Table4.9: use case description for Logout
Priority High
Actor(s) Admin
Description The user wants to report how many students are clear from the
university.
It represents the properties of entities, their operations and relationships. Also it drives
use case diagrams from use case.
The class diagram is the main building block in our project modelling.
It is used both for general conceptual modelling of the systematic of the application and
for detailed modelling translating the models into programming code.
The classes in a class diagram represent both the main objects and or interactions in the
application and the objects to be programmed.
Generally the project is including the following class in the class diagram the over view
of the class diagram is:-