Professional Documents
Culture Documents
EXECUTIVE SUMMARY-------------------------------------------------------------------------------------- I
ACKNOWLEDGMENT---------------------------------------------------------------------------------------- II
LIST OF ACRONYMS---------------------------------------------------------------------------------------- III
1 INTRODUCTION--------------------------------------------------------------------------------------- 1
1.1 BACKGROUND OF THE PROJECT------------------------------------------------------------------------------------------------2
1.2 STUDY OF EXISTING SYSTEM----------------------------------------------------------------------------------------------------3
1.3 STATEMENT OF THE PROBLEM--------------------------------------------------------------------------------------------------4
1.4 SIGNIFICANCE OF THE PROJECT-------------------------------------------------------------------------------------------------5
1.5 OBJECTIVES----------------------------------------------------------------------------------------------------------------------6
1.5.1 General Objectives----------------------------------------------------------------------------------------------------- 6
1.5.2 Specific Objectives----------------------------------------------------------------------------------------------------- 6
1.6 SCOPE AND LIMITATIONS OF THE PROJECT------------------------------------------------------------------------------------7
1.6.1 Scope of the Project--------------------------------------------------------------------------------------------------- 7
1.6.2 Limitations of the Project-------------------------------------------------------------------------------------------- 7
1.7 METHODOLOGY AND TOOLS----------------------------------------------------------------------------------------------------8
1.7.1 Data Collection Methodology--------------------------------------------------------------------------------------- 8
1.7.2 System Analysis and Design Methodology-----------------------------------------------------------------------9
1.7.3 System Development Tools----------------------------------------------------------------------------------------- 10
1.7.3.1 Hardware Requirement--------------------------------------------------------------------------------------------------- 10
1.7.3.2 Software Requirement---------------------------------------------------------------------------------------------------- 10
1.8 PROJECT MANAGEMENT TECHNIQUE----------------------------------------------------------------------------------------11
1.8.1 Project Schedule------------------------------------------------------------------------------------------------------ 11
1.8.2 Project Budget-------------------------------------------------------------------------------------------------------- 12
1.8.3 Project Breakdown--------------------------------------------------------------------------------------------------- 13
1.8.4 Risk Analysis, Identification, Mitigation and Monitoring----------------------------------------------------14
1.8.4.1 Risk----------------------------------------------------------------------------------------------------------------------------- 14
1.8.4.2 Mitigation-------------------------------------------------------------------------------------------------------------------- 15
1.8.4.3 Monitoring------------------------------------------------------------------------------------------------------------------- 15
2 REQUIREMENTAL SPECIFICATIONS---------------------------------------------------------16
2.1 FUNCTIONAL REQUIREMENT--------------------------------------------------------------------------------------------------16
2.2 NON-FUNCTIONAL REQUIREMENTS------------------------------------------------------------------------------------------17
2.3 FEASIBILITY ANALYSIS----------------------------------------------------------------------------------------------------------18
2.3.1 Economic Feasibility------------------------------------------------------------------------------------------------- 18
2.3.2 Technical Feasibility-------------------------------------------------------------------------------------------------- 19
2.3.3 Political Feasibility--------------------------------------------------------------------------------------------------- 19
2.3.4 Operational Feasibility---------------------------------------------------------------------------------------------- 19
3 SYSTEM ANALYSIS--------------------------------------------------------------------------------- 20
3.1 ACTOR AND USE CASE IDENTIFICATION--------------------------------------------------------------------------------------20
3.2 USE CASE DIAGRAM-----------------------------------------------------------------------------------------------------------21
3.3 USE CASE DESCRIPTION-------------------------------------------------------------------------------------------------------23
3.4 SEQUENCE DIAGRAM----------------------------------------------------------------------------------------------------------30
3.5 COLLABORATION DIAGRAM---------------------------------------------------------------------------------------------------38
3.6 ACTIVITY DIAGRAM------------------------------------------------------------------------------------------------------------41
3.7 STATE CHART DIAGRAM-------------------------------------------------------------------------------------------------------49
CONCLUSIONS------------------------------------------------------------------------------------------------- 60
REFERENCES-------------------------------------------------------------------------------------------------- 61
EC Ethiopian Calendar
GB Giga Bytes
ID Identification Number
IE Internet Explorer
IP Internet Protocol
MS Microsoft
UC Use Case
UI User Interface
Over the past decades, students identification and verification has been a major problem in
large institutions as documents, certificate and studentship can be forged at a great rate and
easy way, using the computer negatively. Forgers fail to know that in this fast moving world,
the computer has equally served as an aid to decision making, verification and authentication.
This is because of computers efficiency in terms of speed, accuracy, reliability, cost and
security among others. In recent years, awareness has existed and created in people as it
concerned the use of computer in verifying, authenticating and security activities either
through web-based (internet) or window-based. The value of every degree is the reputation of
the institution and the students produced, hence, the greatest obstacle to any academic
institution which is dishonesty and forgery has to be checked with verification and
authentication systems and processes. Certificate verification is mandatory for most of the
reputed companies or organizations in order to reduce the risks related to it. Most of the
universities as well as educational providers comes up with computerized verification
systems and also support electronic verifications. But Madda Walabu University still now has
no such verification system that can help essential for the graduated students when they are
hiring or hired in any organization. Also enrolment verification is designed to fulfil the
verification requirements of companies that offer products or services requiring proof of a
student's enrolment status. For accessing several academic documents graduated students
spends much time and cost and loose several good career opportunities in their life.
Document Analysis: To get information about background of the system project team
review necessary documents, books that support this project. To make this project
more feasible and structured the team are analysing other thesis management websites
from universities other in our country and others, and internet for explanation about
some word definitions and for search books.
Analysis
Design
Implementation
Testing
Integration
Operation and
Maintainace
Activities Tools
Training Papers
Writing Something Pen
Writing Soft copy of Documentation Part Computer (Desktop or Laptop)
Printing Purpose Printer
Storing File CD
File Transferring Flash 8 GB
Writing Something Pencil
Binding Purpose Binder
Designer
2 Bayisa Guta EISR/0670/05 0919370911 Project Leader,
Programmer
3 Geleta Mosisa EISR/0682/05 0917639375 System Tester
4 Sosina Yared EISR/0700/05 0961025804 System Analyst
The technical team of this project comprises 4 Information Systems B.Sc. undergraduate
students with experience of doing different mini projects. The ultimate objective of the team
members is to develop a reliable and proficient verification and service system for graduated
students.
1.8.4.1 Risk
1.8.4.2 Mitigation
Data loss happens, so the team uses different back up techniques through our daily
activity in the project.
The project is not completed on schedule so the other group members cover those
parts.
The development tools not working so re-configure the setup.
1.8.4.3 Monitoring
2 REQUIREMENTAL SPECIFICATIONS
3 SYSTEM ANALYSIS
This chapter covers the functional aspect of analysis that is functional modelling. The set of
functional requirements that have to be analysed is done in an object-oriented way. UML
(Unified Modelling Language) an object-oriented, graphic language, is unified for all the
aspects of the requirement analysis. The functional model consists of use case modelling to
show the system functionality from user point of view, use case description, activity diagram
to describe the details of internal system functioning and sequence diagram, collaboration
diagram and state chart diagram.
Registrar
External User View Certificate
Verification Link Association
Approve
Manage Graduate <<include>> Service Request
Information <<include>>
Association
Login <<extend>>
Table 3:11 Use case descriptions for insert, update search, and delete graduates
information
Table 3:13 Use case description for approve verification service request
1: Wants to
login to the
2: Enter user 3: Request for
system
name and validation
password
5: Invalid User name and
Password 4: If Invalid
6: Access
User Account Page Displayed
1: Initiate for
Service request 2: Click Request
Service
3: Access
8: Send 9: Validation
7: Display Error Message
1: Initiate
2: Click Check
Payment
3: Access
Figure 3:7 Sequence diagram for approving services (for credentials from
graduates)
1: Initiate
For 2: Click Verify
Verification 3: Access
4: Display Verification Page
1: Initiate
For 2: Click Search
Searching 3: Access
4: Display Data Search Form
Figure 3:9 Sequence diagram for searching graduates information from the
database
1: Initiate for
Create Account 2: Click Create 3: Access
Account
7: Error Message
8: Send
No Shapes Representation
Join symbol, represent when two con-current
1 activities combined
Enter User ID
and Password Cancel Operation
<<Controller>>
NO Login
Display the
YES Requested Page
<<Controller>>
Select Required Service
<<Controller>>
Submit
Invalid Valid
Send Stored Basic Display
Display Error
Information For Confirmation
Message
Approval Message
NO
Not Approved Approved
YES
Enter Remark
and Submitt it
Remark
Submitted to
Database
<<Control>>
Clickk List for
Approval
Send Message to
External User
Invalid
Figure 3:17 Activity diagram for approve service by the registrar director
Display Cancel
Application Form
Fill the
Application Form
Invalid
Valid
<<UI>
Display Admin Page
<<Controller>>
Click Search
NO
Enter Search
Parameter
YES
Display
Information from
Database
Figure 3:19 Activity diagram for search, update, delete and insert (manage graduate
information)
<<UI>>
Admin Page
Displayed
<<Controller>>
Click Create
Acount
Display Create
Cancel Account Form
YES
Account Created
Enter Username
and Password
Error Message
Displayed
CHECK USERNAME
NO
AND PASSWORD
Validate
YES
Register Employee
and Company
Send Request
D isprove d
Request Stored on
Database
Approve
U n V erified
Approved
Verify
Compare saved
and Entered data
Report is
Generated
Verified
Validate Generate Report
Request UI Page
Display
Request UI
Page Displayed
Enter Data
Fill Request
Form
Send
Home Page
Enter Username
and Password
No Login
In s e, rUt p d a t e a n d
Validate
D e le t e D a t a
Yes
4 SYSTEM DESIGN
System design is the transformation of analysis models of the problem space into design
models (based on the solution space)[ CITATION Haw94 \l 2057 ].
Examples
Web server.
Application server.
Database server.
Deployment modeling used to show the hardware of the system, the software that is installed
in the hardware and also the middleware that is used to connect the disparate machines to one
and other. It also shows how the software and the hardware components work together.
Client Machine
:Chrome TCP/IP
Web Server Admin
:E xp l o r e r
:WAMP
:Mozilla
PHP
:MYSQL
View
Verification Link Temporary
Create Account
Report
Report
Original Degree
Report
USER NAME:
PASSWORD:
Login Clear
REFERENCES
Graduates Credential Verification Systems for MWU Page
1. [Online] http://www.mwu.edu.et.
2. [Online] https://en.m.wikipedia.org/wiki/Functional_requirement.
3. Stellman. Software Requirements. 2nd. s.l. : Microsoft Press, 2003. ISBN 978-0-596-00948-9.
4. Stellman, Andrew, Greene, Jennifer. Applied software Project Management. s.l. : O'Reilly Media,
2005. p. 113. ISBN 978-0-596-00948-9.
5. [Online] http://www.businessdictionary.com/definition/feasibility-study.html.
6. [Online] http://msdn.microsoft.com/en-us/library/dd409477.aspx.
7. [Online] http://www.smartdraw.com/sequence-diagram/.
8. [Online] http://refcardz.dzone.com/refcardz/getting-started-uml.
9. [Online] http://www.lucidchart.com/pages/uml-activity-diagram-symbols-meaning.
11. Hawryszkiewycz, Igor T. Introductions to Systems Analysis and Design. s.l. : Prentice Hall PTR,
1994.