You are on page 1of 18

DEBREMARKOS UNIVERSITY BURIE CAMPUS

DEPARTMENT OF COMPUTER SCIENCE

E-LEARNING SYSTEM FOR DMU BURIE CAMPUS

Android Documentation

Submitted by

NAME ID
1 .Mamen Melese -------------------------------157/10
2.Yaschlal Eyasu---------------------------------171/10
3.Birhan Mantie----------------------------------134/10
4.Habtamu Akoye--------------------------------150/10
5.Tadesse Sisay------------------------------------167/10
6.Beletu Bimrew-----------------------------------129/10
7.Kidist Yared--------------------------------------100/10
8.Gizachew Worku--------------------------------149/10
CHAPTER ONE

1. Introduction

1.1. Introduction:
E-Learning system is a form of electronically learning and teaching methodology. It is the use of
computer and internet technologies to deliver necessary material to the students or learners are
enable to learn using internet service.

The learning process needs techniques and tools to present the knowledge (from different
resources) interact with it and share it with others. In this context, E-Learning is becoming an
important tool to support the learning system to achieve its goal.

E-learning is not intended to replace conventional methods of training such as classroom Teaching.
Its aim is to create an augmented learning environment where technology is used to deliver a
combined range of teaching techniques aimed at maximizing the individual's participation in the
learning process.

1.2. Statement of the problem


 Instructors may not be available at the time when the student is convenient.
 Paper work prone to error and security problems.
 The teaching learning process is not 24 hours for a day.
 The students also waste time, money and effort in always going back to their
instructor to submit assignments and to view the result of course.
 In order to prepare course materials such as papers, and other preparation
equipment’s is also needed. Those materials distribution system leads the
University to great crisis of economy.
 If there is different instructor assigned in different section of the same department
there will not have the same kind of knowledge.

1.3. Objective of the Project


1.3.1. General objective
• The general objective of our project is to develop e-learning system for DMU BURIE
campus.

1.3.2. Specific objective


To gather the required information from the existing system of learning teaching process.
To analyzing and synthesis the gathered information of these learning teaching process.
To design the proposed learning teaching process system.

1
To implement the proposed e-learning system.
To test the proposed e-learning system.
To deploy the proposed e-learning system.

1.4. Scope of the project


 Registration: the system registers student, course, department and instructor
 Online examination.
 Upload resource information to the user.
 Provide course materials online that students can access it everywhere, at all time.
 Providing online Assignment for students.
 View course result for students online.
 Students submit their assignment online.

1.5. System requirements

1.5.1. Hardware Requirement


 Desktop or pc: To write documentation and to develop the system.
 Flash : To transfer data from one computer to other computer in the time of
documentation and implementation of project.
 Printer: to print the documentation.
 Pen, paper: to write documents.

1.5.2. Software Requirement

Modeling software
 EDRAW Max.
 Used to draw diagrams like use case diagram and activity diagram.

Designing Software
 My SQL server
 This software will used for designing Database.

Implementation Software
 Operating System: Windows 7
 To have good speed of operations or execution time of tasks.
 Notepad and Notepad++.

2
 To write PHP scripts.

1.6. Data collection methodology and approaches


 Interview.
Gathering information by interviewing the DMU BURIE campus academic dean officers about
the existing system.

 Observation: we used in order to analyze the conditions to which the current system is acting. It is
useful to observe how jobs are done, how information flows.
 Document analysis.
This technique provides information on how the existing system works .There for documents
related to the existing system of the organization will be assessed.
1.7. Feasibility Study
Operational Feasibility:-this project is operationally feasible, since it operate all
operations what we are expect.
Technical Feasibility:-our project is technically feasible, since there is resource
availability and our team members are technical each individual.
Economic Feasibility:-this project is economically feasible since our project is
completed with estimated cost.
Political Feasibility:-this project is free from any political aspect.
Schedule Feasibility:-our project has probability to be completed in one month with its
implementation.

1.8. Significance of the project


After completion of this project it will provide the following significant for DEBRE MARKOS
UNIVERSITY BURIE campus.
Minimize work overload of the employee.

Providing full access of course material for the students.

Allowing students to receive and submit their assignment with short period of time.

It will reduce cost of learning materials to duplicate and distribute.

To easy access of uploaded resources.

To perform their works faster, efficiently and accurately.

3
CHAPTER TWO

2. System Analysis
2.1. Over view of the existing system
The existing system of DEBRE MARKOS UNIVERSITY BURIE campus learning teaching process is
manually operated, this means Different activities are performed as like distributing modules,
allocating assignments and showing course results are performed by instructor and registration
process is performed by registrar office. The overall teaching learning process is controlled by the
academic dean. The current system that we have observed is faced a lot of problems, due to this
reason we try to provide some alternative solutions.

2.2. System requirement Specification


2.2.1 Functional Requirement

 Upload :
 course material
 assignment
 course result
 add exam
 notice

 Download:
 course material
 assignment
 course result
 student list
 notice

 Take exam:
 The student can take exam based on the course.

 View course result:


 The student can view the course results that are given by the instructor based on the
course take on the curriculum.

 Manage account:
 The administrator can create, activate and deactivate the user account.

4
 Registration:
 Enables registrar office to register student, department, Instructor and course who
fulfill required criteria.
.
 Assign instructor:
 The department head can assign instructor to the student based on the course.

2.2.2. Nonfunctional Requirements (NFRs)

 Performances: the performances of the system are fast response time System can
withstand even though many number of users request the desired service.
 AvailabilityThis system can be available for each site. The users can access the system for
24 hours for a day.
 Security: The system provides security in such a way that unauthorized users are notaccess
the required information. We can use the user password by encryption method in the
database.

 Portability: The system must be designed for plate form independent and the system
supports every operating system.
 Maintainability: The system should be easily modifiable and extensible to add new
functionality without affecting the general frame work of the system.
 Backup and Recovery: Every day the data should be backup even when the operation of
user is not successful this because of performing the operation power failure occurs then
data should be backup.

 Error handling: The system should handle invalid inputs and display informative error
messages to user.

2.3. System requirement analysis

5
2.3.1. Use case diagram

Figure 1.Use Case Diagram

6
7
diagram for Login Figure 2.Activity
Successful Display user page
System validate the login form
User press Login button
Reenter username, password, and Message display Users fill username and password
Login form Display
User open application
2.3.2. Activity Diagram
Figure 3.Activity diagram for create user account

33
Figure 4.Activity diagram for download course material

34
Figure 5.Activity diagram for upload course material

35
1 Manage *
Figure 6.Activity diagram for View course result

36
Figure 7.Activity diagram for upload course result

Chapter three
3.1 design class diagram
37
+Upload Exam ()
+Upload Course Material ()
+Download Course Material () +take Exam ()
- Id:int +Upload Assignment () +Upload Notice ()
-Exam Id :int
38
-Course Code: String +Download Assignment () +view Notice ()
-Course Code: String
-Material Name: String -Question No:int
-Material Type: String -Question: String -Assignment No:int
Assignment Name
CHAPTER FOUR
-Choose: String -Notice id:int
-Mark:int -Assignment
-Notice Type: String
-Answer: String -Type: String
-Notice Date: Date
-Time: time Stamp -Course Code: String
-Dead Line: date
CourseMaterial
* 1 -Submission Date: date
Upload *
1
Exam
Assignment Notice
+Upload Course Material () 1
* 1
+Upload Assignment Ques() 1
Upload *
1
+Download Assignment Answer () Upload
Download
Works On
+Download student list () Take
+Upload Exam ()
+Upload course result () +Register Course () +Upload Course result
+View Notice () ()
* * * View
+View Course result ()
-Course code: String
-course name: String +Download Course Material ()
-Credit Hour: int -Result Id:int +Download Assignment ()
-Year: String -Student id: String +Upload Assignment ()
-Semester: String +Take Exam ()
*
-Course Code: String
-i id: String -Department ID: String -Assignment: int +View Course Result ()
-First name: String -Test: int +View Notice ()
-Last name: String * -Final: int
-Address: String -Total: int
-Sex: String -Grade: string - id: String
*1
View
-Department ID: String Course -First name: String
-Last name: String
*
-Address: String
1 -Sex:String
Course result -Age;int
-Dep't name: String
Student
Instructor
1
* * * Register
Download Manage
* Upload * * *
Manage
+upload Annual () Register 1 1 1
+Download Annual ()
+Download student list () 1 1
+Upload student list() +Assign Instructor ()
1
+Register Course ()
1 +Create user account () +Create user account ()
-Calendar id:int +Activate user account ()
Manage
+Upload Notice ()
1
-Date: date+Register Department () +Deactivate user account ()
-Activity: text+Register Instructor ()+Upload Annual Calendar()
- id: int
-First name: String
-id :Int - id: int
-Last name: String
Calendar -First name: String -First name: String
-Last name: String -Sex: String
-Address: String -Last name: String
* *
-Sex: String
-Address: String -Address: StringValid
1 Registrar Dep't head AdminInvalid
1 1
Upload 1*
Download
4. IMPLEMENTATION

Implementation refers to the Coding of the all documents gathered starting from requirement analysis to Design phase. So now the
team is in a position of converting all documents gathered and designed into the code so that the system will be implemented for the
user to be used for the purpose it developed. For the implementation of this system the user must have a server on which the system
will be hosted.

4.1. programming language used


Our system is implemented in PHP and MYSQL in a server-side or back-end programming languages. And HTML, CSS and
JavaScript in client-side or front-end
We use HTML and CSS for prepare user interface.
 We use java script for form validation
 We use MYSQL database for storage of data. Because
 It’s fast and easy
 It’s cross platform

4.2. Algorithms used for login


Login (Username, password):- that pass/checks three arguments for login function.
 If length of username and password==0:- Check that Zero length is not allowed.
Display error message “username and password cannot be empty”.
Stay in the same page and the actor fills the form after he or she knows the field is required.
The system retrieves username and password which the actor submits.
 If username! =username or password! =password or status! =active: - Authentications for the right actor.
Display error message “Invalid username or password or your account is deactivate”.
 If his/her account detail is correct access the required page.

39
4.3. Sample codes
Coding is the process whereby the physical design specification created by the designers is turned in to working computer code by the
programmer. The code is made simple in such a way that another programmer can easily understand and work on that in future

CHAPTER FIVE

5. Testing
Testing the next phase from the implementation in which specified to check whether the function is correct or not for the developer
intended and user expected system can achieve. We can use different type of testing strategies.
The team used system testing for validating and verifying whether the system:
Meets the requirements that guided its design and development,
Works as expected,
Can be implemented with the same characteristics.

5.1 Sample Test

System Testing

Performance Testing: The system can perform with a short bandwidth response time and also theycan perform or accomplish
specific task within the user intended and they can store user expected resources.

Security Testing: The system has a security protection by using authentication. User of the systemwill be authorized by the system
administrator and get their user name and password to enter into the system. Unauthorized access will be detected when user wants to
access the system. This is done by authenticating user; user with user name and password can only enter into the system. They can
also use encryption techniques for secure use of system.

40
Unit testing

In unit testing each the data in the data base is tested through form with a specific data. This test helps to trap output errors occur in the
form or database value to be inserted and accessed. They can also generated alternative or exception flow of error. Like for the tested
case login form validate Username and password entry as an input from the users of the systems. They can enter correct username and
password display the home page otherwise display the username and password is incorrect try again message.

Integration Testing
The modules can be independent to each other cannot be contradict with the user accessed data. Modules are typically integrated a
top-down incremental fashion. In this testing mechanism each form is tested by a general data. Like login form Check the correctness
of the form to be displayed after login is succeeded that means user expected or intended application.

Validation Testing

When we say valid it is to mean that the software functions as it is intended. The group team can test by giving real data and get real
information from the software. Like all forms can be validate the functionality. The user can expected to provide the function required
by the form

CHAPTER SIX

6. Conclusion and Recommendations


6.1 Conclusion

This project which has different phases; the first phase concerned with the analysis phase of the life cycle, the design phase and the
next phase is about implementation. As the end of the first phase, we need to review that we have covered in accordance with what we
have planned at the beginning. We began our work by identifying the significance of automated system for the store and the overall
techniques to be used in the development process. This involved defining the system development methodology, identifying process.
This involved defining the system development methodology, identifying resource and cost requirements, and setting the deliverable
and scheduled for the project.

41
The analysis helps the team to well understand the major functional areas and processes of the system. Through this method we
evaluate the existing system weakness and strength.

After that, we performed requirements elicitation to discover user and system requirements. This phase consisted of drawing the
functional as well as non-functional requirements of the system. Then we have undertaken a major phase in system development
process: object oriented Analysis. Here, we tried to model the new system we proposed using UML diagrams such as Use case,
sequence, and class diagrams Also, we designed the new system user interface prototype.

6.2. Recommendation

According to scope of our project the team develops web based application. Because of the time and security problem constraint we
may have limitation which should be consideration in, but in the feature the team believes that this system should be fully
operationally by adding some functionality that are not included in the proposed system. We also want to recommend this project can
be expanded and more automated with additional functionalities by integrating with many new technologies. We recommend also to
the user use this system properly.

42

You might also like