Professional Documents
Culture Documents
1. YALEMWORK YESHANEH…………………………1454/08
2. CHILENEW BELACHEW…………………………….1296/08
3. WORKU GIRMA………………………………….......1452/08
4. BEKELECH ALIKO……………………………..……1275/08
5. SAMRAWIT LEMMA…………………………………2036/07
Supervised By “Ins.Eden.A”
Name Signature
i
Acknowledgment
First, we would like to thank Almighty (omnipotent) GOD, for giving strength; he has given us
throughout our life and the project. Secondly, we would like to express our deepest gratitude to our
advisor Ins.Eden.A for her excellent guidance, caring, patience, and providing us with an excellent
atmosphere for doing this documentation. We would also like to express our gratitude to Debre Berhan
University special student supporting information management system for debere berehan university
Officials who gave enough information for our questionnaires with patience and full of voluntariness.
We would also like to acknowledge our teachers and our class meet student who are help us for unclear
part.
ii
Abstract
The system that we want to develop website for DBU special supported student information
management system. That will help the office to perform their task within few amount of time
and resource in case of data management, resource utilization, and security.
The system develops simple graphical user interface, so that users can use and interact with the
system in a simple way and user-friendly manner provides a file sharing to enable users to share
files to each other.
The implementation of our project will be using an appropriate programing language such PHP
and html is in such a way that a server responds for any connection request from clients and then
sending back to a list of recipients.
The development methodologies of our project using object oriented design methodology. The
reason why our project is conducted to solve: -
The extravagance of offices resource and member’s time.
The manually working style of the office worker.
Communication system of office workers and student.
Contents
iii
Approval letter............................................................................................................................................i
Acknowledgment.......................................................................................................................................ii
List of table.................................................................................................................................................vi
List of figure...............................................................................................................................................vii
List of Acronyms.......................................................................................................................................viii
CHAPTER ONE........................................................................................................................................1
1. Background and Introduction about the Project................................................................................1
1. 1 Introduction........................................................................................................................................1
1.2 Background information of the organization..................................................................................1
1.2.1 Background of the project........................................................................................................1
1.3 Statement of the Problem....................................................................................................................2
1.4 Team Composition.............................................................................................................................3
1.5 objective of the project........................................................................................................................4
1.5.1 General objective of the project...............................................................................................4
1.5.2 Specific objective.......................................................................................................................4
1.6 Feasibility of the project......................................................................................................................4
1.6.1 Economic Feasibility.................................................................................................................4
1.6.2 Political Feasibility....................................................................................................................5
1.6.3 Technical Feasibility.................................................................................................................5
1.6.4 Schedule feasibility...................................................................................................................5
1.6.4.1 Tasks and schedule.........................................................................................................................5
1.7 Significance of the Project...................................................................................................................5
1.8 Target beneficiaries of the system......................................................................................................6
1.9 Methodology of the project.................................................................................................................6
1.9.1 Data Collection Methodology.................................................................................................6
1.9.2 System Analysis and Design Methodology............................................................................7
1.9.3 Case Tools...............................................................................................................................7
1.9.4 Requirements Specification Testing Procedure......................................................................8
1.10 Scope and Limitation of the Project.................................................................................................9
1.10.1 Scope of the Project................................................................................................................9
1.10.2 Limitation of the Project........................................................................................................9
1.11 Assumption and Constraint’s...........................................................................................................9
CHAPTER TWO.....................................................................................................................................11
iv
2. Description of Existing System...........................................................................................................11
2.1 Introduction of Existing system........................................................................................................11
2.1.1 Players in the existing system.................................................................................................11
2.2 Business Rules.....................................................................................................................................12
2.3 Forms and other documents of the existing system.........................................................................14
2.3.1 Report Generating in the Existing System............................................................................15
2.3.2 Major functions/activities in the existing system like inputs, processes &outputs.............15
2.4 Bottlenecks of the existing system (using for example PIECSS frame work)................................17
Performance.................................................................................................................................17
Service..........................................................................................................................................18
2.5 Practices to be preserved...................................................................................................................19
2.6 Proposed Solution for the New System............................................................................................19
2.7 Requirements of the Proposed System.............................................................................................19
2.7.1. Functional Requirements......................................................................................................19
2.7.2 Nonfunctional Requirement.................................................................................................21
CHAPTER THREE.................................................................................................................................23
System Analysis.......................................................................................................................................23
3.1 Introduction.......................................................................................................................................23
3.2 Scenarios............................................................................................................................................23
3.3 Use Case Model..................................................................................................................................25
3.4 Use case description.........................................................................................................................26
3.5 Analysis level class diagram (conceptual modeling)........................................................................36
3.6 Dynamic model..................................................................................................................................37
3.6.1 Sequence diagram...................................................................................................................37
3.7 Activity diagram................................................................................................................................44
3.8 State diagram.....................................................................................................................................49
3.9 User interface prototype....................................................................................................................51
3.10 Supplementary Specifications.........................................................................................................52
CHAPTER FOUR...................................................................................................................................53
System Design..........................................................................................................................................53
4.1 Introduction.......................................................................................................................................53
4.1.1 Purpose of the system.............................................................................................................53
4.1.2 Design goal..............................................................................................................................53
v
4.2 System architecture...........................................................................................................................56
4.2.1 Current software architecture...............................................................................................56
4.2.2 Proposed software architecture.............................................................................................56
4.3 Class modelling................................................................................................................................57
4.4 Component Diagram.........................................................................................................................58
4.5 Subsystem Decomposition.................................................................................................................59
4.5.1 Hardware/Software Mapping................................................................................................63
4.6 Deployment Diagram........................................................................................................................63
4.7 Database design.................................................................................................................................64
4.7.1 Persistent Data Management...............................................................................................64
4.7.2 Access Control and Security..................................................................................................65
References................................................................................................................................................68
List of table
Table 1 Team composition......................................................................................3
Table 2 tasks and schedule.....................................................................................5
vi
Table 3 Business rules-1........................................................................................12
Table 4 Business rules-3........................................................................................13
Table 5 Business rules-4........................................................................................14
Table 6 Use case Description for Login...............................................................26
Table 7 Use case Description for Assign Role.....................................................27
Table 8 Use case Description for Create User Account.....................................28
Table 9 Use case Description for Delete Account...............................................29
Table 10 Use case Description for online Registration.......................................30
Table 11 Use case Description for record material............................................31
Table 12 Use case Description for chat................................................................32
Table 13 Use case documentation of comment...................................................33
Table 14 Use case documentation of manages information...............................34
Table 15 Use case documentation of file transfer...............................................35
Table 16 Use case Description for speech recognition.......................................36
Table 17 Access control and security...................................................................67
List of figure
vii
Figure 1 student register form...............................................................................................................14
Figure 2use case diagram for WCYD........................................................................................................25
Figure 3 Diagram for Analysis label class diagram....................................................................................37
Figure 4 Sequence Diagram for Login.......................................................................................................38
Figure 5 Sequence Diagram for Delete Account.......................................................................................39
Figure 6 Sequence Diagram online registration for student......................................................................40
Figure 7Sequence Diagram for Change password.....................................................................................41
Figure 8 Sequence Diagram for manage information................................................................................42
Figure 9 Sequence Diagram for chatting...................................................................................................43
Figure 10 Sequence Diagram file share.....................................................................................................43
Figure 11 Activity Diagram for Login.......................................................................................................44
Figure 12 Activity Diagram for Create Account........................................................................................46
Figure 13 Activity Diagram for Change Password....................................................................................46
Figure 14 Activity Diagram for chatting...................................................................................................47
Figure 15 Activity Diagram for file management.....................................................................................48
Figure 16 Activity Diagram for speech recognition...................................................................................49
Figure 17 State chart Diagram for login...................................................................................................50
Figure 18 State Chart Diagram for online student Registration System.....................................................51
Figure 19 user interface prototype.............................................................................................................52
Figure 20 system architecture...................................................................................................................57
Figure 21 class modeling diagram.............................................................................................................58
Figure 22 component diagram...................................................................................................................59
Figure 23 Subsystem decomposition diagram...........................................................................................62
Figure 24 hardware software diagram.......................................................................................................63
Figure 25 deployment diagram..................................................................................................................64
Figure 26 database diagram.......................................................................................................................65
List of Acronyms
BR---------------------------------------------------Business Rule
CD----------------------------------------------------Compact Disc
viii
DB-------------------------------------------------Data Base.
DBU-------------------------------------------------Debre Berhan University.
DFD ------------------------------------------------Data Follow Diagram.
DVD-------------------------------------------------Digital Versatile Disc
FK-------------------------------------------------Foreign Key
HTML------------------------------------------------Hypertext Mark Up Language.
HTTP---------------------------------------------Hypertext Transfer Protocol.
HTTPS---------------------------------------------Hyper Text Transfer Protocol Secure
NGO------------------------------------------------ None Governmental Organization.
OOSA -------------------------------------------------Object Oriented System Analysis.
OOSD-------------------------------------------------Object Oriented System Design
OS----------------------------------------------------Operating System
PHP----------------------------------------------------Hypertext Pre Processor.
PIECSS--------------------------Performance, Input output Inaccurate, Efficiency, Service,
Security.
RAM-------------------------------------------------Random Access Memory.
SQL--------------------------------------------------Structural Query Language
UC--------------------------------------------------Use Case
UI----------------------------------------------------User Interface.
UML-------------------------------------------------Unified Modeling Language
PC------------------------------------------------ Personal Computer.
PK------------------------------------------------ Primary Key
SSSIMT. Special Student Supporting Information Management .
ix
CHAPTER ONE
1 Background and Introduction about the Project
1.1 Introduction
This chapter will introduce about the background of the study, and overview of the system that
developed which is the project aims and objectives, summary modules description, project scope,
project schedule, project team composition the outline of methodology, Fact Finding,
development environment, operational environment used, significant of the study, and testing
procedure.
The project is concerned web based system of SSSIMT. The current system does not have any
computerized way of communication. Therefore, our system is the first that intended to change
the manual operations into computerized system. This simplifies the workload of staff members.
The office of SSSIMT established because of lack of attitude among the university community
about special students and Physical disable students in DBU in many directions including
educational, material, financially and other services.
This website will be fun, educating and entertaining that will attract many students.
1
1.4 Statement of the Problem
In the existing system, there are a lot of disadvantage related to time, cost and other related
factors. In addition to that On the office, most works done manually, this increase the workload
of the employees for performing different activities.
The following are the most common problems related to current manual system: -
The communication between sponsor and director, and also student and director is always
manual or paper based.
Manual registration of student and sponsor makes the director tirades and loss of time.
luck of information distribution.
increase the workload of employees.
2
1.5 Team Composition
The project team is composed from five members as follows
To develop the online registration system module for student and NGO or sponsor.
To develop various report generation module.
To design a search module to find all information easily.
To design a user-friendly user interface and interactive system.
To develop manage information system module for student.
Develop chatting rooms.
Reviewing how the current system works and operates.
Analyze the current system to design new data base system operated easily using web
based system.
To develop file sharing system.
3
aspects of feasibility. Some of these are Economic, Political, Technical feasible and schedule
feasibility.
Tangible benefits
Since this project is going to computerized system, there is reduction of cost for material that
used for manual operation, save time and make comfortable working environment for the users.
Intangible benefits
The intangible benefits we have pointed out the system development are the following: -
4
Tasks Months
No Steps Nov18- Nov Dec Dec Jan App16- App16-june5
28 30- 11- 26- 19- may15
Dec Dec25 Jan app
10 18 15
1 Proposal
2 Data collection
and
Requirement
3 System
analysis
4 System design
5 Implementatio
n
6 Testing
7 Documentation
Total Overall project
time
Users can access the system everywhere they can get different services at the same
time and hence the system saves time.
5
1.9 Target beneficiaries of the system
There are different bodies that will benefited from this system. The main beneficiary of these
systems is-
The first beneficiary of this system is students and other customers and office workers.
The system supports communication between users.
How to interact with people around them
Also sharing files and practicing safe and responsible use of information and
technology
For director beneficiary
The director gets timely ways of generating report, easily data reporting and accessing
, and reduce the cost and to create easy change of information between college coordinator,
disability center coordinator and other.
The project has initiated our team to get knowledge of how to develop the required application
system and the team members will get a comprehensive knowledge and experience in developing
and designing a new system. It also used to create team Spirit among the development team.
Interview: - is making the asking and answering the needed thing. We have made the
interview with the special student supporting office about how to the whole activity in the
special student supporting office management system look like in the DBU. In addition, we
make an interview with some students and employees that work related with issue about their
role and responsibility in the office.
6
Observation: - in addition to the interview, we have observed many things when we went to
the office in the data collection time. We can analyze how the office prepares recording
information including by getting the form. Generally, we can observe what the current
system of these office look like. Moreover, it helps as to how we propose the next system.
Object Oriented System Analysis (OOSA): during this phase, the team will look at the
problem domain and with the aim of producing a conceptual model of the information that exists
in the area, which will have analyzed. Moreover, this model the functions of this system (use
case modeling), identifying the business objects, organize the objects and the relationship
between them and finally model the behavior of the objects.
Object Oriented System Design (OOSD): during this phase, the model interactions and
behaviors that support the use case scenario, and finally update object model to reflect the
implementation environment. Moreover, transforms the conceptual model produced in object
oriented analysis to take account of the constraints needed to our system, so that we will use this
phase to improve the use case model to reflect the implementation environment.
7
Microsoft Office Word 2013: We use this software for documentation preparation and
proposal preparation.
Hardware requirement tools:
Computer: We use any desktop computer for all project activities.
RAM: We use 4GB RAM for our project preparation.
Disks (CD, DVD); -necessary for the movement of relevant data and for backup and
recovery mechanism.
Flash: We will use 16 GB Flash for managing our project proposal, documentation etc.
We set two approaches to test the proposed system. These approaches are functionality testing of
the proposed system and implementation testing of the system. Each testing approaches use
different techniques. The examiners will test the functionality of the system. In order to test the
functionality of the system, testers will use Black-Box testing technique.
The developers using White-Box testing technique will test implementation of the proposed
system.
Black-Box Testing: - used by testers who do not know the design and structure of the code? The
tester in this case has a set of input values and respective desired outputs from the system. On
providing input, if the output is matches to the desired output the system is tested “OK”. In
addition, problematic otherwise.
White-Box Testing: -We use this testing technique to test the program and its implementation in
order to improve code efficiency and structure of our system.
Testing Levels
There are different testing levels for a system. However, we will use the following testing levels.
These are:
Unit Testing
8
While coding, the project team performs some tests on that unit of program to know if it is error
free. This testing level helps us to decide that individual units of the program are working as per
requirement and are error free. We use white-box testing approach for this level of testing.
Integration Testing
Even if the units of the system are working fine individually, there is a need to find out if the
units were integrating together would also work without errors. For example, we test argument
passing and data updating.
It concerned about creating a website that makes special student supporting office
effective and efficient by creating text chat room in-group and private, file sharing,
uploading and download files on the website.
It concerns about increase the participation of NGO (sponsor).
To manage available information &generating reports for special student
supporting office.
There are many constraints within our proposed system that limit their effectiveness of
performance. Our system is limited only in the process of web based SSSIM system of the Debre
university but does not include about hole management system, the system depends on electric
power and network connection. The above activities or subsystems are proposed system
limitations because of the following reason
Time Is the main factor of limitation our proposed systems that limit its performance
because while we are developing the system it takes more time and we may not get
enough time to automate the system.
The system does not support any payment system for students using bank.
9
1.12 Assumption and Constraint’s
1.12.1Assumptions
This section must include any assumptions if not true, would require changes to the
requirements.
The system depends on the software components and operating system which are needed for
the system.
The hardware used to interact with the system will be standard keyboard as required
The users know how to start the program from the GUI, and can interact with a user interface
using a standard keyboard, mouse, and monitor.
1.12.2Constraint
Unfortunate failure of system: To handle this problem we have some method to resist not
completely but partially by using back up mechanisms using flash disks, CD/DVD and by
storing the data in more than two computers.
Virus attack: It is difficult to control data from virus but try to scan the data, installing and
updating antivirus software for any time.
Time management problem: we solve this problem by working cooperatively, divide our
time by schedule for each phase of the project and we try to use this schedule effectively
Therefore, whatever situation happen or occurred that hinder during the progression of the
project the team try to do what expected and reform it continuously.
CHAPTER TWO
2 Description of Existing System
2.1 Introduction of Existing system
This chapter describes what the existing system looks like and how the special student
supporting office of DBU work. The current system on special student supporting office is the
Manuel system.
10
This activity includes generating report mechanism, student and sponsor registration, file
sharing, communication system and other related activities.
The existing system uses Microsoft offices like an excels for its day to day activities that include
storing data’s and other operations and office have no its own website.
The Director of the office: the highest responsible body of the office who controls all over
activities of the employees of the office and others sub office is that found in special student
supporting offices.
The role of Director in the existing system firstly every plan of the office is preparing
by her.
The other duty of the director is preparing reports for NGO (sponsor) that support the
SSSIMS office financially and materially.
The third role for the directories views disability care support reports.
The fourth role for the director in the existing system includes participating in different
kinds of meetings with stakeholders with in the university and outside of the
University.
Students: those uses the system to get different service online and by direct contacting from the
system
College coordinator: are those uses the system in order performs office task like: - give
Photocopy service for students and send student grade to director.
The role is providing psychological support for the students and the whole DBU society
11
Sponsor (NGO): an organization (persons) give service for students by the help of SSSIMS
office.
Admin: a person who manages and assign the roles of each sector officials
Identifier BRULE-001
Name Application Requirement
Description Student should have a support letter from their respective residence
Keeble/woreda/ preparatory school to apply firstly.
Example Student who has a support letter from its residential Keble can apply for
the SSSIMS office regarding educational and pocket money support.
Source SSSIMS office policy and procedure.
Table 3 Business rules-1
Identifier BRULE-002
Name Approve student information
Description Approve student whether the application letter is valid or not.
Example
12
Identifier BRULE-003
Name Student selection(screen out)
Description Students selected based on the criteria.
Example
Student whom applied firstly in the application process and this process
approved by student union and college coordinators (approved) by directorate
based on the criteria set by the SSSIMS office.
Source SSSIMS office rules and regulation
Identifier BRULE-004
Name Support students
13
Registration application forms: - this form used to register the students whom need to apply for
the SSSIMS office firstly.
Screen selection forms: - this form used to screen out the registered students.
2.3.2 Major functions/activities in the existing system like inputs, processes &outputs
The current system has the following major function that includes-
14
A. Preparing reports for NGO’s
Input
Process
By combining both its quarter and annual year functions and activities, the office of SSSIMS
prepares both reports for its financial donor is which Non-governmental organizations are.
Output
Report documents
Input
Process
Based on the criteria, the SSSIMS office will select those whom are financially weak students of
DBU.
Output
Pocket money
Input
15
Process
After selecting based on the criteria, the office of SSSIMS provides different kinds of
educational materials for each student whom passed those criteria for support.
Output
Process
In every single year the office of disable student prepares its quarter and annual year
report to the SSSIMS office based on activate done by the sub office.
Output
Report documents
2.4 Bottlenecks of the existing system (using for PIECSS frame work)
PIECSS framework is a checklist for identifying problems with an existing SSSIMS office
services information system. We classify the problem according to PIECES framework as
follows: -
Performance
16
Response time: the time a system takes to react to a given input.
This is not also relevant in the existing system because for example a student may not get a
support from the SSSIMS office at necessary time because of longer time taken for selecting
and screening out the students.
Input and output Inaccurate/redundant
Input Inaccurate
The existing system is poor in managing the students’ data. Student’s data is capture redundantly
because of poor handling of data’s on the computer system. This happen because of the workload
on the employees of the SSSIMS office, there is no enough skilled IT professional on that office.
There is inaccuracy on the data, because the data contains errors because of the existing system
is not fully automate and it may be subject to human errors.
Output (inaccurate)
Irrelevant and redundant information because of the above problem occurred by the
stored data.
Information that is not accurate because there is a probability to capture wrong input
information so the output is also wrong.
There is also loss of data’s because of the malicious attacks like viruses on the
computer system, that may cause partial or full loss of data’s.
17
Service
The quality of service in the existing system is poor due to certain factors that were citied on
the above. To improve the current system and to satisfy its user the office should be fully
automate.Generally, the following problems are existing in the current system.
Most of the time uses manual ways to operate their tasks
It takes more time and effort.
Difficult for getting feedbacks.
Problems of data loss and data redundancy
It is requirements of the system, director, disability center coordinator, college coordinator and
managers of the system that needs the system to perform. To uniquely identify our user
requirements, we used “REQ #” Where: -
REQ requirement and
REQ 1. Login: director, disability center coordinator, sponsor/NGO, student and college
coordinator login to website by using his or her own username and password to access the web
site.
REQ 2. Create account: The administrator can create the account for each sector in order to use
the website.
REQ 4. Online registration: student and NGO/sponsor can register online in order to perform
their task.
REQ5: Approve Registration: The director can have approved the profiles of the registered
student and sponsor
REQ 6: delete User Account: The administrator can delete user accounts.
REQ8: View Report: director and NGO/sponsor can View the report that generated by the
system.
REQ9: Update Information: directors and disability center coordinator can update student
information.
REQ10: Uploading and download necessary information about SSSIMS office related file.
REQ11: Allowing communicate through group and private chat between student and office
worker.
19
REQ12: disability center coordinator registers material that gives for disable students any other
special students.
System requirement
Provide user account management capability. the system shall allow an authorized use to
inactive, active, create, and change password.
Provide manage information capability. the system enables manage information capability.
Generating report. The system can be generating a report from disability center office and
director office.
It describes aspects of the system that are concerned with how the system provides the functional
requirements.
Usability: The system allows users to access and operate on it, because the user interfaces are
easily understandable and user guideline will have prepared to help users to access the system so
the interface is user friendly.
Usability includes viewing, capturing, and stating requirements based around user interface
issues, e.g. accessibility, interface aesthetics and consistency within the user interface
Reliability: Reliability includes aspects such as availability, accuracy, and recoverability for
example, from shutdown failure. The system is effective and consistent in that integrity of
information maintain and supply to the system. The new system shall be 90% reliable.
Performance: Performance involves issues such as transition of information, system response
time (which also relates to usability), recovery time and start-up time. Therefore, our system
should be fast in order to access the required information and services of the SSSIMS office. The
proposed system is expected to be response to queries, making updates and generating different
20
reports with short period of time no more than 15 seconds for a single response. It shall also
avoid redundant works, errors and other functions. It shall also avoid redundant works by using
keys. Such as primary key and foreign keys and avoid errors by using validation mechanism and
other functions.
Supportability: This is a summation of requirements, which address supporting the software;
for example, adaptability, maintainability, compatibility, configurability, install-ability,
scalability and localizability.
Security and Access permissions: - The subsystem should provide a better level of security and
integrity of the data held by the system as compared to the current system, only authorized
person of the system can gain access to the organization secured page on the system; and only
users with valid password and username can login to view user’s page.
The system must confidentially be control from being access by unauthorized Students or people.
It must protect the SSSIMS offices confidential information and data’s. Encryption is the mean to best
diminish the access exposure of privacy information. It helps in ensuring the confidentiality of
information transferring across networks. User access the confidential information over network protected
by encryption techniques. Therefore, our system will use this encryption method when users enter their
password.
CHAPTER THREE
3 System Analysis
3.1 Introduction
System modeling is the process of developing abstract models of a system, with each model
presenting a different view or perspective of that system and in this section, the functionalities of
the system describes and modeled using UML models and describes the interaction between the
user and the system. This section also used to identify the actors of the system who interacts to
the system and who is use on what function.
21
The following are describing scenario of how the user uses the systems to perform operations.
Actor: students
first activates the system and enter to the homepage by searching student’s id the
system displays the registration form and the student fills the form according to
their requirements. After finishing the form, they submit the form in the SSSIMS
office approved the form which is correct or much to their original profile.
Actor: admin
Flow of Event: administrator first activates the system, then he enters the home
page, he presses the login link from the homepage in order to enter login page he
must fill the exact user name and password. The administrator page is display
from the different categories he should select on the link ‘delete account ‘pressing
this link the user is expected to enter the id of the user to be delete then clicks on
the search button. Therefore, the system will display the required account with its
details including a button saying ‘delete account’ at the bottom of the retrieved
22
account detail. Administrator views all the available information is of the account
since it is necessary to delete he press the delete button. System will save the
information in the database and display a message with “account is delete
successfully”.
Flow of Event: - SSSIMS office first activates the system, and then he enters the home page.
After entering to the page he logins to the system and inter his user name and password then after
he clicks the report generating button and he/ she can view the report as required.
Flow of Event: -director of SSSIMS office first activates the system, then he enters the home
page, then login by its user name and password the presses the manage information link from
the page in order to enter manage student information he must select the exact updated
information. The director of SSSIMS office page is display from the different categories like
update, search information. He should select on the link ‘manage information ‘pressing this link
the user is expected to enter required updated information. Therefore, the system will display the
required information with its details including a button saying ‘manage information’ at the
bottom of the retrieved information detail. Director of SSSIMS office views all the available
information’s of the manage information since it is necessary to update, and search he press the
manage information. System will save the information in the database and display a message
with “manage information is successful”.
23
3.3 Use Case Model
uc Use Case for WCYD
ManageFile
Another sub system
Assign role
USERS Update
«extend» Manage Admin
Manage File Account «extend» Account
«extend» View
Create «extend» Comment
«extend» Account Inactive
«extend» Account
Student
Download Manage Director
Director Approve
College File Student Information
«extend»
Coordinator Upload File Information
Disablity Center «extend»
«extend»
Coordinator Update generate
Sponsor Information Aproved report
Sponsor
Information
Record
Material View Report
Sponsor
Register
Comment
Chat
Disability Center
Coordinator «extend»
«extend»
Private Chat
Send request
Information
College Coordinator
24
Trigger When user want to start their work
25
privilege is not valid).
6. The use case ends.
Alternative A5: if the privilege is not valid, the
course: system displays error message and allows
back to choose the correct privilege for
the user.
Preconditions The administrator should logged into the system and identify the role of
the users.
Post condition Assigned Role that related to the privilege.
26
1. 1. The Administrator Clicks “Create 2. The system display “Create new Account
new Account Link”. Form”.
1. 3. Admin fills information to create new 4. The system Validate data, and Save (A4:
Basic Course of account, Clicks “Create New Account” If data is invalid).
action. button. 5. The system Display “Account Created
2. 6. The admin confirms the “success Successfully” message.
message”.
3. 7. The use case end.
27
1. Clicks on manage account 2. The system displays “account information
link. form”.
3. Clicks on “View” button. 4. The system displays “account list”.
Typical 5. The Admin select account to delete, 6. The system removes the selected user
course of click “Delete” button. account.
events 8. The Admin confirms “success 7. The system displays “successful
message”. message”.
9. The use case ends.
28
5. Use case end. format.
Precondition The student and NGO/sponsor should have logged in the system.
s
Post The student and sponsor can registered successfully
condition
Trigger Disability center coordinators and the officer wants to record materials.
29
course of input is invalid”
events
Alternative A4 “please input the correct format”.
course: The use case resumes to step3.
30
Actors action: Step2. The system displays the chatting home
1. Click on the chat link. page.
3. User select receiver. 4. The system connects sender with receiver.
5. Sender write message 7. The system return success message and (A7
6. Send the written message to the receiver.
if message is not send.)
Typical 8. Use case end.
course of
events
Alternative 6.If the text is not sent the system displays” message is not sent”
course: 4. The use case resumes to Step 6.
31
Typical Actor Action System Response
course of 1. User must open the home page. 2. System displays comment box.
32
5. Actor may Approve, delete or If Submitted is not correct.)
modify information.
6. click Submit button
Alternative 7.If the user enters incorrect information system back step5
course:
Precondition Any user should be login first.
s
Post Student information is manage successfully.
condition
Table 14 Use case documentation of manages information.
Alternative 4. If file is not selected the system display select the file message.
course: 2. Prompt the user to select the file from the folder.
33
Precondition The system users should be login to the system.
s
Post The users must upload or download the file.
condition
Table 15 Use case documentation of file transfer.
The class diagram is the main building block of object-oriented modeling. It is used both for
general conceptual modeling of the systematic of the application, and for detailed modeling
translating the models into programming code. Class diagrams can also use for data
modeling. The classes in a class diagram represent both the main objects, interactions in the
application and the classes to be programmed.
In the diagram, classes are representing with boxes, which contain three parts:
In the design of a system, a number of classes are identifying and grouped together in a class
diagram, which helps to determine the static relations between those objects. With detailed
modeling, the classes of the conceptual design often split into a number of subclasses.
This section discusses classes and their variations, including templates and instantiated classes,
and the relationships between classes association and the contents of classes (attributes and
operations). Class diagrams show the static structure of the model, in particular, the things that
exist (such as classes and types), their internal structure, and their relationships to other things.
34
class analysis class diagram
USER
chat User Account
+ age: int
- Chat content: string has - password: varchar(30)
+ email: varchar(50)
- message time: date - user id: varchar(25)
+ Father Name: varchar(25) 1 1
send/recive - user name: varchar(30)
- reciepant: string + First Name: varchar(25)
- user name: int 1..* 1..* - user role: varchar(30)
+ Grandfather Name: varchar(25)
+ group chat() + personal id: varchar(30) + login()
+ private chat() + phone: varchar(13) + manage account()
+ sex: varchar(6)
+ Chatting()
should login Login
Manages
+ File Managment()
1..* - Password: Varchar(50)
- User Name: Varchar(20) manages
1..* + login()
ISA
+ Logout()
File
- adate: date
Report
- flie name: string Sponsor Admin
- location: string - Date: Varchar
- address: varchar(30) Views - Type: Varchar
+ dowload file() + Assign Role()
- job: string - Generate()
+ upload file() 1..* 1..* + Create Account()
- View(): short
+ Comment() + Delete Account()
+ Registration() + Update Account()
1..*
+ View Report() Approve Disability Center
1 Coordinator
Student
Director
+ record material()
- account number: int
Officers
- deparetement: varchar(25) Approve 1
- Family status: varchar(25) + aprove student infor()
- Photo: file 1..*
1 + search student information()
+ Comment() + update student information()
1..*
+ registration()
College coordinator 1
ISA add
+ Send Report()
disable student
1..*
gets
- type of injured: varchar(30)
Matrerial
1..*
- amount: double add
- material id: varchar(30)
1..*
- Name: varchar(50)
- type: varchar(30)
35
3.6.1 Sequence diagram
Sequence diagram shows interaction between objects over a specific period time and describe the
flow of messages, events, and actions between objects. We show concurrent processes,
activations and time sequences to these are not depict easily in other diagrams.
sd sequence diagram for login
Terminate
user
WCYD hompage login form controller login database
1.initate()
Director
Student
College 2.click login button()
coordinator
3.activ ate login form()
Disability center
coordinator
Sponsor 4.diplay login form()
5.1 fill user name ()
Officer
8. request to database()
9.response()
check()
11.sucsses to login()
36
sd sequence diagram for delete account
Admin Adimin
delete account user account delete account user account user account
form controller list database
1. initate()
2. create()
10 .response()
11.check()
[if not]:11.1.try again
()
[if deleted]:11.2. remov e user account()
14. close()
Terminate
Terminate Terminate
Terminate Terminate
37
sd sequence diagram for online register
student
home page registration registration register database
form controller
1. open home page()
student
registration
2.click registration link()
7.submit data()
8.request to database()
9.response()
10. check()
[if invalid]:10.1.try again()
11.registration succsse()
38
sd sequence diagram for change passw ord
Admin
home page Change passw ord Controller Database
form
1. log in to home page()
8.validate()
10.confirm()
39
sd squence diagram for manage information
diractor
home page manage Controller Database
5. submit()
6.check()
[if changed]:8.continue
()
40
sd squence diagram for chat
Terminate
user
login page controller home page chat page chat database
Student
user name and passw ord()
Director
Sponsor
Officer
v alidate()
College
coordinator
Disability center v alidate()
coordinator
initate()
open()
chating()
submit()
sav e()
chating sucsess()
user
home page controller database web page file transfer
1. click login()
Student
3.fill user name and password()
Sponsor
4.check()
Director
Officer
Disability center
coordinator 5.invalid()
6.invalid user information()
College coordinator 7.display()
11.logout()
41
3.6.2 Activity diagram
Activity diagram used to document the logic of a single operation/method, a single use case,
or flow of logic of business operation. In many ways activity diagram is the object-oriented
equivalent of flow charts and data flow diagrams (DFD) from structured development to
represent the flow from one activity to another activity. It is one of the components of UML
and highlights the activities performed in the system activity. The processing with in an
activity goes to completion and then an automatic transition to the next activity occurs an
arrow represents the transition from one activity to the next. A filled-in circle and an end
represent the starting point of an activity diagram.
Inti al
Login
If Incoorect
Correct
Display Aproporiate
Page
End
42
act activ ity diagram for create account
enter user id
succsessfully created
43
Figure 12 Activity Diagram for Create Account
act Changepassw ord activ ity Diagram
Click ChangePassword
Displaye Change
password form
Click Change
Check
[if Correct]
Change successfuly
44
act activ ity diagram for chating
Ini ti al
chat
i nval i d
is valid?
val i d
Chat Page
Displayed
Start Chatting
recive
send message
message
exit
ActivityFinal
45
act activ ity diagram for manage information
valid
file
displayed
dow nload
file upload file
FlowFinal
46
most important purpose of State-chart diagram is to model lifetime of an object from creation to
termination. The main purpose of using state -chart includes to model dynamic aspects of a
system, to model lifetime of an object, and to describe different states of an object during
lifetime.
[Action Completed]
Login Sucsess
Final [User Name Or Passw ord Inv alid]
Failed Login
47
stm State Diagram sponsor Registration
Registration Failed
[ReturnRegistration Information]
[Additional Information Required]
Sponsor Registration
[Idel]
[fill Sponsor Information] validate
Initial Information
Required
Cancle Registration
Success
Validate User
Account
Information
Account Created
[abnormal termination]
Login Sponsor
Page
Final
48
The style sheet is used to design each form and in this style sheet we use header, menu and aside
Static part and section that is everything is on it.
Home page
Assign role
View report
Manage information View report
49
Figure 18 User interface prototype
50
CHAPTER FOUR
4 System Design
4.1 Introduction
In this chapter, we have discussed in detail about the design goals, system architecture (current
software architecture) and proposed software architecture, Subsystem description, Subsystem
services, Component diagram and Deployment diagram in detail.
System design is the transformation of the analysis model into a system design model. The main
objective of designing a system is to show how the system is build and obtain clear and enough
information needed to drive the actual implementation of the system.
The goals of the system are identifying from the following four major quality perspective.
Performance
Dependability
Maintainability
End User Criteria
51
Performance Criteria
This include the speed and the space requirement imposed on the system. According to
the following three performances criterion are identifies.
Response Time
Throughput
The resources upload by the SSSIMS office will be access by different users and hence it is
required to accomplish several users request.
Memory
The proposed system will require any size of storage space that fits within the size of the
resources to be stored.
Dependability Criteria
This criterion determines the effort that will be expend in minimizing system crushes and their
consequences. The following are identifying as the main dependability criteria.
Robustness
The system should have the ability to withstand invalid user input by validating all the user
inputs.
Availability
The resources uploaded by the SSSIMS offices should be able to be available to the
perspective users of the system as long as users are connecting to the internet. It takes few
seconds to fetch a single data from the server. Since the user can access the required
resources in a short fractions of time.
Reliability
52
The system should behave in a way, which is reliable. It should have the ability to
authenticate all users, and validate each, and every user inputs, and other operations to
ensure reliability.
Fault Tolerance
To ensure fault tolerance of the system backup services of both the application and
database server will be maintaining, and hence will be switched to, whenever the primary
servers experience a failure
Security
Because of, the system is access over a public network; the system is likely to be expose
to vulnerabilities unless appropriate security measures are takes. To withstand intrusions
and hacking of the system firewall and other appropriate security measures shall be in
place. Moreover, the system is expected to compromise a security policy to protect
sensitive areas of the operation like Admin registration and other user registration from
malicious users.
Maintenance Criteria
Maintenance criteria determines how difficult it is to change the system after deployment. It also
determines how easily new functionalities can be added. The following are identified as
maintenance criteria.
Extensibility
Since the proposed system uses Object Oriented Design approach, new functionalities and
new classes can be easily added.
Modifiability
The new SSSIMS offices system should be well documented which will make it easily
modifiable after deployment without hampering the current working system.
53
Usability
The system should be user-friendly system so that users can easily learn and use it easily
without convenience.
The presentation layer (UI): -this layer is the top-level part and displays information related to
services available on the server. This is the user interface displayed when the user opens the
application.
The Service/application tier or business logic (BL) is the middle tier, which is pull from the
user interface. It performs controlling the application functionalities by performing detailed
processing. The main responsibility of this tier is connecting the user interface and the database.
The data tier (DB) is a house for database servers where information is store
54
deployment deployement diagram for SSSIMS
«device»
HTTP response
personal SQL Serv er
w eb serv er
computer mysql
brow ser
HTTPS Rquest
55
Figure 20 class modeling diagram
56
cmp COMPONENT DIAGRAM FOR SSSIMS
admin
manage account
subsystem
director
manage
information
subsystem
system security
disabilty center
v iew report
coordinator
chat subsystem
college
coordinator
file management
sponsor
DataBase
registration
subsystem
student
Subsystem decomposition constitutes the bulk of system design. In order to reduce the
complexity of application domain smaller parts called classes are identified, and organized in to
packages. Similarly, to reduce the complexity of the solution domain, a system is decomposed
into simpler parts, called subsystems, which are made of a number of solution domain classes.
Normally each subsystem is realizing independently.
57
During system decomposition, different system-wide issues need to be address. The initial
subsystem should be drive from the functional requirements. The next step in subsystem
decomposition is to keep functionally related objects together using use case.
Generally, the following heuristics use in grouping the objects in to the subsystems.
3. Registration Subsystem
This subsystem has the following functional requirements.
58
This subsystem has the following functional requirements.
5. Manage information
6. Chatting Subsystem
7. Comment Subsystem
59
cmp SubSystem Decomposition
Group Chat
Register Delete Account
Sponsor
Update Account
Register
Material
Asign Role
SSSIMS
inactiv e account
View Report Generation
Delete information
Search Information
View Comment
Dow nLoad Approv ed Sponsor Information
Send Comment
Update Information
60
deployment Hard w are Soft w are Mapping
T CPAP
Application Serv er
«devi ce»
Personal Computer «devi ce»
Manage Account Mobile
HT T PS
HTT PS
Web
Brow ser Mobile
Brow ser
View Report
HT T PS
HT T PS
HT T PS
Registration HT TPS
HTT PS
HTT PS
File Managment
HTT PS
HT T PS
HT T PS Chat HTT PS
Manage
Information
sql
DataBase Serv er
DBMS (sql
serv er)
61
deployment deployement diagram for SSSIMS
w eb Serv er
«device»
Personal Computer(client)
WebBrow ser
https
php
tcp/i p
DataBase
my sql
62
UserAccount * FileManagement *
UserId FileManageUser *
FileId
UserName FileUseId
FileType
FiledId
Status FileSize
User_id User_id
Location
FileName
User_id
Student * StudentMaterial *
StumatId
Role * StudId
RoleId
Employee * MaterialId
Year
EmpId
StudId
Name USER * Deparetement
User_id
UserId Email User_id
Qualification
Discription Name AccountNumber
FatherName Familystatus DisableStudent *
StudId
GrandfatherName EmpId
TypeOfInjured
Sex photo
Material Age
MaterialId Phone
Quantity
Comment CommUser
Type CommId StuId
EmpId CommentDescribition
CommId
Sponsor * StudId SpoId
User_id SpoId ComUseId
SpoId
Adress
Job
ChatUser * Type
ChatUserId EmpId
ChatId
Chat *
User_id ChatId
MessageTime
MessageContent
User_id
Unauthorized access
Malicious modification of data or destruction
Accidental introduction of inconsistency
63
. Each user has a security access level and each document has a sensitivity level.
Update account
Delete account
Create account
Assign role
Send report
Download files
Upload files
Record materials
Private chat
Group chat
Online register
Comment
View report
Approved student
information
Update student
information
Register support
student
Approve a
sponsor
information
Logout
Table 16 Access control and security
64
CHAPTER FIVE
65
5.3 language specification and selection strategy
To implementation (developing) this project we will have used PHP for front end (developing
Graphic user interface). Because PHP works great with html, interactive features and easy to
learn and My SQL for back end (for database).
<?php
include("../connection.php");
session_start();
if(isset($_SESSION['UserName'])){
$UserName=$_SESSION['UserName'];
$ret=@mysql_query($sql);
$db_field=@mysql_fetch_assoc($ret);
$fname=$db_field['UserName'];
}else{
66
?>
<script>
alert(window.location='../login.php');
</script>
<?php
?>
<HTML>
<head>
<title>wcyd dbu</title>
<script type="text/javascript">
</script>
</head>
<center>
<?php
require("header.php");
?>
<?php
67
require("menudcc.php");
?>
</table>
style="margin-top:0px;height:166px;background:url(index's_file/)">
</table>
<tr>
</tr>
<tr>
</td></tr>
<tr>
<?php
require("left.php");
?>
</tr>
</table>
</td>
<!--center -->
<td width="6px"> </td>
<!--center -->
<form method="post">
68
<table align="center" border="0"cellpadding="4px"cellpadding="4px" style="margin-top:100px">
<?php
while($getDprog = @mysql_fetch_array($d_program)){
$id = $getDprog['user_id'];
?>
<?php
} ?>
<tr><td>material type:</td><td>
<?php
<?php } ?>
</select></td></tr>
<tr><td>taker id:</td><td>
<?php
<?php } ?>
</select></td></tr>
69
<tr><td>quantity </td><td><input type="text"id="quantity"pattern="([0-9]{1,30})"name="quantity"
required /></td></tr>
<?php
$today=date('y-m-d',time());
$new=date('y-m-d',strtotime($today));
//echo $new;
?>
</tr></table>
<?php
if (isset($_POST['submit']))
//$user_id=$_POST['user_id'];
$borrowe_id=$_POST['studid'] ;
$quantity=$_POST['quantity'] ;
//$mattype=$_POST['mattype'] ;
$matid=$_POST['matid'] ;
if(!$db)
$quantit=$row['quantity'];
70
if($total<0){
else{
$qury1 = @mysql_query($sql1);
$row1=@mysql_fetch_array($qury1);
//$date=date('y-m-d',time());
//$st=$_GET['st'];
$prev=$row1['date'];
$dbtime=date('y-m-d',strtotime($prev));
$x=$new-$dbtime;
echo"$x";
if($prev==0)
$result_set1=@mysql_query($ins,$conn);
if(!$result_set1)
die("Query faill".mysql_error());
else{
71
else if(($x/(60*60*24)>90))
} else if($x/(60*60*24)<90){
} }}?>
<!--center end-->
<td>
<div id="siderightindexphoto11">
<div id="siderightindexphoto112">
Calander
</div>
<?php
require("../date.php");
?>
</div>
<div id="siderightindexadational">
<div id="siderightindexadational1">
Social link
</div>
<table >
<tr><td><div id="facebook"></div></td><td>
72
<tr><td><div id="you"></div></td><td><p><a href="https://www.youtube.com/" style="text-
decoration: none;"> Youtube</a></p></td></tr>
</div>
</td>
</table>
</td>
<table width="1310px"
<tr>
<?php
include("../footer.php");
?>
</td></tr></table>
</td></tr></table>
</center>
</body>
</html>
73
<?php
include("config/config.php");
session_start();
if(isset($_SESSION['']))
$mail=$_SESSION[''];
?>
<HTML>
<head>
74
<SCRIPT language='Javascript'>
<!--
function isNumberKey(evt)
return false;
return true;
-->
</SCRIPT>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.js"></script>
</head>
<body>
<center>
<?php
require("header.php");
?>
<?php
require("menuindex.php");
?>
75
</table>
style="margin-top:0px;height:166px;background:url(index's_file/)">
</table>
<tr>
</tr>
<tr>
</td></tr>
<tr>
<td>
<?php
require("left.php");
?></td>
</tr>
</table>
</td>
<!--center -->
<script type='text/javascript'>
function validate(){
var firstname=document.getElementById('fname');
76
var lastname= document.getElementById('lname');
return true;
}}}}}}}}}}}}}
return false;
if(elem.value.match(alphaExp)){
77
return true;
}else{
alert(helperMsg);
elem.focus();
return false; }}
if(elem.value.match(emailExp)){
return true;
}else{
alert(helperMsg);
elem.focus();
return false;
}}
if(elem.value.match(numericExpression)){
return true;
}else{
alert(helperMsg);
elem.focus();
return false;
}}
return true;
}else{
alert("Please enter between " +min+ " and " +max+ " characters" +helperMsg);
78
elem.focus();
return false;
}}
if(elem.value.match(alphaExp)){
return true;
}else{
alert(helperMsg);
elem.focus();
return false;
}}
if(elem.value.match(alphaExp)){
return true;
}else{
alert(helperMsg);
elem.focus();
return false;
}}
</script>
79
</td></tr>
</td></tr>
</td></tr>
</td></tr>
</td></tr>
</td></tr>
</td></tr>
</td></tr>
<option value="male">Male</option>
<option value="female">Female</option>
</select>
</td></tr>
<script type="text/javascript">
function ValidateEmail(inputText)
80
{
if(inputText.value.match(mailformat))
form1.email.focus();
return true;
else
form1.email.focus();
return false;
}}
</script>
</td></tr>
</td></tr>
<script type="text/javascript">
$(function () {
$("#submit").on("click", function () {
return false
81
});
return true
});
</script>
</td></tr>
</tr>
</td></tr>
</table>
</form>
<?php
if (isset($_POST['submit']))
$spoid=$_POST['spoid'];
$fname=$_POST['fname'];
$mname=$_POST['mname'];
$lname=$_POST['lname'];
$job=$_POST['job'];
$address=$_POST['address'];
$phone_no=$_POST['phone_no'];
$email=$_POST['email'];
$age=$_POST['age'];
$sex=$_POST['sex'];
$inu="INSERT INTO `user` (`user_id`, `fname`, `mname`, `lastname`, `email`, `sex`, `age`,
`phone_no`,`Role`)VALUES
$result_set=@mysql_query($inu,$conn);
82
$ins="INSERT INTO sponsor(`spoid`, `fname`, `mname`, `lname`, `job`, `adress`, `phone_no`, `email`,
`age`,`sex`,`action`) VALUES
$result_set1=@mysql_query($ins,$conn);
if(!$result_set1&&!$result_set)
die("Query faill".mysql_error());
else{
}}
?>
</h2>
</font>
</td>
<!--center end-->
<!--center end-->
<td>
83
<div id="siderightindexphoto11">
<div id="siderightindexphoto112">
Calander
</div>
<?php
require("date.php");
?>
</div>
<div id="siderightindexadational">
<div id="siderightindexadational1">
Social link
</div>
<table >
<tr><td><div id="facebook"></div></td><td>
</div> </td></table></td>
<table width="1310px"
<tr><?phpinclude("footer.php");?></td></tr></table></td></tr></table></center></body></html>
84
5.5 Final Testing of the system
Once code has begun, the testing process can begin and proceed in parallel. As each program module is
produced, it can be tested individually, as part of the larger program, and then as part of larger system.
The following are different testing strategies. We will perform following testing techniques for checking
functionality of our proposed system.
Unit testing: - First we will test each unit at each system. Each module of the system can be
tested check the working of each classes, methods and attributes of the system. For
immediately maintain at which the problem is occurred.
Integrated testing: - In this testing part, all the modules will be combined together and
tested for their combinability with each other and with the systems functionality. If error
occurs in combining them, the module with problem will be identified and re combined. All
team members perform both units testing and integrated testing during development. Here
users cannot involve.
System testing: - In this testing, the team performs over all functional testing by checking
whether it meets the required target or not.
5.7 Training
Training manuals serve the important purpose of providing a consistent way to communicate
instructions to users about how to perform essential functions of their action by using the system.
The administer office is responsible to give training for the SSIMS user. And the project
developer gives full training to the administrator of the system.
85
creating all the data bases and tables that helps to store the purpose of reuse the data and to
validate the new data with the old data.
Required items to request an agent installation:
To request a web based installation, we need to provide the following information:
Name of organization requesting the installation
Ip address of the server being protected
Host name of the servers
URL being protected
Operating system of the web application server being protected. Give the specific version
of windows, Linux, or Unix, specify whether 32/64 bit
Type of web application server (Apache)
86
CHAPTER SIX
This new project is aimed to give the opportunity for DBU the opportunity student to use this
technology. The developed website has a more advantage for the society, organization and the
member of the university.
6.2 Recommendations
While doing this project the team has faced different challenges. According to the scope of our
project, the team develops web based system which may lack some functionalities. Because of
the time constraints, we cannot do full functionality of the systems, but in the future the team
believes that this system can be fully operational by having enough time and full information.
Next, the team would recommend that further work should be done on the system in order to
make the system improvement. Generally, for the next programmer or system developer, our
project team members recommend to add additional languages (e.g. Amharic and other
languages), speech recognition, speech synthesis, student give money on line system and video
group and private chat.
87
Appendix
Appendix A: diagram used during development
Symbol Definition
Actor
Use case
Package
Component
Node
Device
88
References
Timothy C.Lethbridge and Robert Lananiere. (n.d.). Object-Oriented Software Engineering
(Second edition ed.). (K. Mosman, Ed.) London: McGraw-Hill Education.
Grady Booch and Robert A.marksimchuk. ((2007)). Object Oriented Analaysis and Design with
Application (Third Edition ed.).
Malan Ruth. (n.d.). Functional Requirement and Use Case. Hewelett-Packard Company.
Satzinger, Jackson, and Burd. (n.d.). System Analysis and Design ( Fifth Edition ed.). In a
Changing World.
89