Professional Documents
Culture Documents
Group Members
Kushabo Kurawo.......................................................…RCSC-1575/17
Mulualem Wondim….................................................RCSC-8795/17
Hailemariyam Mengstie….........................................RCSC-4750/17
Maereg Hailu..............................................................RCSC-4499/17
Salegeta Ambachew....................................................RCSC-1580/17
Dilla, Ethiopia
January 2021
ABSTRACT
In SNNPRS, Gedeo zone a large section of people works in the agriculture sector. The remaining
is also directly dependent on the field. This is because from agriculture, we get various raw
materials, especially food crops, which serve as prerequisites for food. As the sector is basic for
the Zone, the region as well for our country’s economy, we need to give much attention and we
need to apply some modern technologies to improve our country’s economy. This team
develops a web-based system titled “Agro Farming Management System” in order to facilitate
the information sharing between agro offices.
Our project documentation is comprises of four chapters. Chapter one, which is the introduction
part, is mainly about statements of the problem, objectives, methodology and scope of the
project. The second chapter focuses on the description of existing system. The requirement
specification of the project by including different subtitles like functional and non-functional
requirements, system model, use case diagrams with brief description, sequence diagrams and
activity diagrams are the major focus area of chapter three. The last chapter is mainly about
system design which includes purpose and goals of design, deployment and component
diagrams, subsystem decomposition and user interface design.
i
ACKNOWLEDGMENT
First of all, we would like to thank our God keeping us healthy. Secondly, we would like to express our
special thanks to our advisor Mr. Girmaye Teklay for the valuable guidance and advice he gave us. We
also would like give thank for the SNNPRS Region Pastoral and Agro pastoral Research Institute
(RPARI) head Mr.Ali Bashe and SNNPRS Crop Protection Expert Mr. Wolde Berta and other staff
member of the office. They give us very important information and idea with much respect that helped
us in doing our project to know about so many new things we are really thankful to them. Our thanks
and appreciations also go to department of computer science and anyone who willingly helped us in
developing this project. Finally, we would also like to thank our family and friends who helped us a lot
in finalizing this project within the limited time frame.
ii
TABLE OF CONTENTS
Contents
ABSTRACT.................................................................................................................................................................... i
ACKNOWLEDGMENT..................................................................................................................................................ii
LIST OF ABBREVIATION..............................................................................................................................................vi
LIST OF TABLES..........................................................................................................................................................vii
TABLE OF FIGURE......................................................................................................................................................vii
CHAPTER ONE.............................................................................................................................................................1
1.INTRODUCTION.......................................................................................................................................................1
1.1Background of the Organization........................................................................................................................1
1.2. Statement of the Problem...............................................................................................................................2
1.3. Objectives of the Project.................................................................................................................................2
1.3.1. General Objective.....................................................................................................................................2
1.3.2. Specific Objective.....................................................................................................................................2
1.4. Scope of the Project.........................................................................................................................................3
1.5. Limitation of the Project..................................................................................................................................3
1.6. Methodology of the Project.............................................................................................................................3
1.6.1 data gathering methodology.......................................................................................................................3
1.6.2. Systems Analysis and Design...................................................................................................................4
1.7. Significance of the Project...............................................................................................................................4
1.8. Risk Assessment and Management.................................................................................................................5
1.9. Operating Environment...................................................................................................................................5
1.9.1. Hardware Tools........................................................................................................................................5
1.9.2. Software Tools..........................................................................................................................................6
1.10. Feasibility Analysis.........................................................................................................................................6
1.10.1. Technical Feasibility...............................................................................................................................6
1.10.2. Operational Feasibility............................................................................................................................6
1.10.3. Legal Feasibility.....................................................................................................................................7
1.10.4. Economic Feasibility..............................................................................................................................7
1.11. Project Time Schedule and Cost Estimation...................................................................................................7
1.12.Team Composition..........................................................................................................................................9
1.13. Document Organization...............................................................................................................................11
iii
CHAPTER TWO..........................................................................................................................................................13
1. DESCRIPTION OF THE EXISTING SYSTEM...................................................................................................13
2.1. Introduction...................................................................................................................................................13
2.2. Main Activates in the Existing System...........................................................................................................14
2.3. Functions of the Existing System...................................................................................................................14
2.4. Players in the Existing System........................................................................................................................15
2.5. Report Generated in the Existing System......................................................................................................15
2.6. Forms and Other Documents of the Existing Systems...................................................................................15
2.7. Weakness of the Existing System...................................................................................................................15
2.8. Strength of the Existing System.....................................................................................................................16
2.9. Alternative Solutions.....................................................................................................................................17
CHAPTER THREE.......................................................................................................................................................15
2. REQUIREMENT SPECIFICATION AND ANALYSIS.........................................................................................15
3.1. Introduction...................................................................................................................................................15
3.1.1. Purpose...................................................................................................................................................15
3.1.2. Intended Audience and Reading Suggestions.........................................................................................15
3.1.3. Document Convention............................................................................................................................16
3.2. Objectives......................................................................................................................................................16
3.3. Functional Requirements...............................................................................................................................16
3.4. Product Perspective.......................................................................................................................................17
3.5. Product Functions..........................................................................................................................................17
3.6. Principal Actors..............................................................................................................................................18
3.7. User characteristics.......................................................................................................................................18
3.8. General constraints.......................................................................................................................................19
3.9. Assumptions and Dependencies....................................................................................................................19
3.10. Non Functional Requirements.....................................................................................................................20
3.11. System models.............................................................................................................................................21
3.11.1. Use Case Diagram................................................................................................................................21
3.11.2. Use Case Descriptions..........................................................................................................................24
3.11.3 Sequence Diagram.................................................................................................................................36
3.11.4. Class Diagram (Conceptual Modeling).................................................................................................48
3.11.5. Activity Diagram..................................................................................................................................49
CHAPTER FOUR.........................................................................................................................................................56
iv
3. SYSTEM DESIGN........................................................................................................................................56
4.1. Introduction to System Design......................................................................................................................56
4.2. Goals of System Design..................................................................................................................................56
4.2.1. Performance Criteria...............................................................................................................................58
4.2.2 Maintenance Criteria................................................................................................................................58
4.2.3. End User Criteria....................................................................................................................................58
4.3. System Architecture......................................................................................................................................58
4.4. Subsystem Decomposition............................................................................................................................61
4.5. Component Modeling....................................................................................................................................62
4.6. Deployment Modeling...................................................................................................................................63
4.7. Persistence Data Management......................................................................................................................65
4.8. Access Control and Security...........................................................................................................................65
4.8.1. Boundary condition.................................................................................................................................54
4.8.2. Exception handling.................................................................................................................................54
4.9. User Interface Design....................................................................................................................................54
Chapter Five: Implementation and Testing..............................................................................................................59
5.1. Introduction to Implementation and Testing.................................................................................................59
5.2. Final Testing Procedures of the System.........................................................................................................59
5.3. Hardware software acquisitions....................................................................................................................75
5.3.1. Hardware:-..............................................................................................................................................75
5.3.2. Software:-...............................................................................................................................................76
5.4. User Manual Preparation...............................................................................................................................76
5.5. Training..........................................................................................................................................................76
5.6. Installation Process........................................................................................................................................76
5.7. Start-up strategy............................................................................................................................................77
Chapter Six-Conclusion and Recommendation.........................................................................................................78
6.1. Conclusion.....................................................................................................................................................78
6.2. Recommendation..........................................................................................................................................78
REFERENCES.............................................................................................................................................................79
v
LIST OF ABBREVIATION
SNNPRS---------------------South nation nationality and people’s regional state
WBFMSGZ-----------web based farming management system for Gedeo zone
vi
LIST OF TABLES
Table 1: Software tools....................................................................................................................6
vii
TABLE OF FIGURE
Figure 11: Sequence diagrams for send type of major crop production........................................37
Figure 19: Activity diagram for post the zone office news & events............................................44
vii
Figure 23: Component Modeling for Web based Farm management system...............................51
viii
CHAPTER ONE
1.INTRODUCTION
This project is a web-based system for an existing manual system. Zones in SNNPRS Region having
an agriculturally based economy do not have a system of this nature. SNNPRS Region, Gedeo(dilla)
Zone economy mainly depends up on agriculture; so, this information system used for Gedeo(dilla)
Zone Agriculture Office. As information system this technology performs controlling roles from
Zone office to each Woreda /District office. So, it is very important requirement to transfer
information online.
Reduced maintenance
code reusability
real-world modelling
Expression web
Documentation Microsoft Office
Presentation Microsoft Power Point
One of the main influences to the new system is to minimize capitals that will be needed to
generate accurate information. In the new system the employees need to have web-based system
that they directly read the information needed right on their own office. This leads to a more
accurate data that will be reported to the office in charge and that estimation will be more
accurate. It’s free so no need to use any cost.
1.11. Project Time Schedule and Cost Estimation
14th -23th 24th - 30th 1th -15th 16th -31th 1th -5th 6th -20th
April
April May May June June
2021 G.C
2021 2021 2021 2021 G.C 2021 G .C
G.C G.C G.C
1 Project
Proposal
2 Requirement
analysis
3 Design
4 Implementat
ion
5 Installation
testing
6 Project
closure
Cost estimation
There are two types of cost to develop new system. These are:
a) Tangible Costs
Miscellaneous Cost which includes hardware development cost and other costs.
Software development cost which is software cost to develop the new system.
B) Miscellaneous Cost
This cost contains the various types of costs in which we spent for the development of the project or the
University covers some of the hardware expenses.
The following table lists the different miscellanies costs that we spent in the process of the development of the
system.
Pen 6 30Birr
a, Human Knowledge
To develop the new system, it requires our knowledge that knowledge may not be measurable in terms of
money.
1.12.Team Composition
The technical team of this project consists of 5 Computer Science B.Sc. under graduate students
with experience of doing different mini projects. The ultimate objective of the team members is
to develop web-based information system for Gedeo zone agricultural sector.
Title
The project organization involves four chapters. Below we are going to list some of the contents
included in each chapter.
Introduction
The second chapter is analysis the existing system phase that includes:
Documents used
Alternative solutions
System models
Subsystem decomposition
Woreda/District Level
Zone Level and
In Woreda/District Level: some corrections will be given to the report which came from the
kebele’s. They also aggregate the total sum of the demands of all the kebele’s. In this level there
is a form paper. In this form paper they put the total of the demands of all kebele’s. In addition to
this they also put the production GDP of last year; this is useful for estimating the demand of the
coming year. Once finished they make copies of it and submit to next level, i.e. zone level.
Zone Level: this level is the same as the Woreda/District level. The only difference is the inputs
for the Woreda/District are kebele’s where as the inputs for this level is Woreda/District. What
they do in this level is, they put the sum total of the demands of all Woreda/District and give a
correction if there is any. In giving correction they analyze the production GDP of the previous
year of each Woreda/District. Then they put the production GDP to the zone and submit it to the
regional office. The drawback of this system can be visualized as:
Time drawback and
Economical drawback.
Time: In the existing system as discussed above there are different levels that are connected
manually, for this particular reason sharing of information is time consuming.
Economical: The capital invested to collect the data is of a huge amount. The first thing done in
order to collect the data is printing the form paper. This requires a lot of papers, so it requires a
great deal of money. In addition to that the government should have to pay money for the people
involved in the collection of the details from the farmers.
Economical Drawbacks after Distributing: the drawbacks we see above lead to under
estimation of demands, so that the agro office will not be able to get the amount of materials or
resources they need. This leads to the decrease in the Production GDP of the country. On the
other hand it results in the under success of the goal or the plan
2.2. Main Activates in the Existing System
Input: The office takes the following components as an input to provide the information within
the office.
Information: The main input in the current system are the data gathered by the Woreda/District
office from the farmers, and this data will be the basis for the office to make estimation on the
materials needed by particular farmers.
Economical: The Zone Office performs all of its tasks manually which requires much of the
work to be done by manpower, and requires huge amount of papers for the manual storage of
data on papers, which lead the manual system to spend much money for human resource and for
purchasing papers and other materials.
Controlling: Since all the records associated with the manual system are recorded and stored
manually the security that the system provides for the privacy of this records is not reliable. The
system cannot provide sufficient protection for access and manipulation of the records associated
with the system.
Efficiency: As we mentioned earlier, the Zone Office system encountered many problems such
as: unnecessary information redundancy, consumption of cost and time and needs more labor to
teach the farmers.
2.8. Strength of the Existing System
Even if the existing system has no capacity to fulfill all of its requirements alongside this, the
System has the following strength:
No internet access requirement.
Allow communication within any language as needed.
The new system will have the same functionality as the old one but in a better implementation.
That is the new system is faster, efficient, effective, economically better and reliable.
2.9. Alternative Solutions
To overcome the problems occurred in existing system our project group members have put
down alternative solution. We proposed that the new system should be automatic
(computerized). Converting the manual system to be automatic makes the system to function
better than the old one. When converting the system from manual to automatic, we will consider
using database, server and network connections. We are proposing to develop a website
application that runs on a server and uses the database to manipulate data. Network connection is
vital in the new system and nothing will be available without it. We will use the network to
connect the Zone and the Woreda’s/Districts so that the information pass between them is in real
time. We use PHP coding to make the generation of the schedule reliable and simple.
CHAPTER THREE
2. REQUIREMENT SPECIFICATION AND ANALYSIS
3.1. Introduction
In this project, the team used an object oriented system development methodology which
incorporates two principal phases. These principal phases are Object-Oriented Analysis and
Object-oriented Design. This chapter discusses the first phase of the methodology: object
oriented analysis (OOA).
3.1.1. Purpose
Analyzing the current system and making requirement determination helps to develop a system,
which includes necessary information and sources for different activities. The purpose of the
software requirements specification document is to maintain functions in web based agro
farming management system for Somali Region Fafan zone. During object oriented analysis the
following major activities are performed.
Since we are developing web based agro farming management system for Fafan zone, more
concern has given for the different woreda offices in Fafan zone. So that we have prepared and
presented the existing system workflow and the optional analysis of our proposed system and we
get the following suggestions from the Agro office workers since they are also part that will be
affected by the system. The proposed system is
Woreda/District Employees:
Send feedback, view emergency responses, send report, send major type of productivity,
view information, view news and events and the like.
User characteristics are about people who are going to use the system. Users of the system are
zone employees and woreda employees. In our case, most of the users are experienced.
Skills: Users should have basic knowledge and should be comfortable using general-
purpose applications on computers especially web applications.
3.8. General constraints
All operations are in English. So, user must have basic knowledge of English.
The email of the user must be any character followed by @gmail.com, @yahoo.com or
@hotmail.com.
The user must type the correct user name and password.
Normally Fafan zone uses manual based activities. Automating this all with short period
seems to be difficult. Therefore, it takes more time to be automating.
The other risk is the price of materials may arise and fall. Therefore, budget may modify
in negotiation. In addition after implementation, if the software fails to run how to fix is
negotiable.
The main risk during the development of the project, is securing the project from unauthorized
access. To overcome such risks we are going to develop a password protection method that gives
access to authorized persons only. The other is data loss, which has caused by virus infection. To
prevent this problem, virus and worms infection, we will install a current updated antivirus. In
addition to installing the updated antivirus, we will take back up of our documents.
The woreda employees, zone employees and the administrator must have valid user name
and password.
A non-functional requirement is a requirement that specifies criteria that can be used to judge the
operation of a system, rather than specific behaviors. It defines how a system is supposed to be.
Non-functional requirements are often called qualities of a system
Performance: Focus should be kept on monitoring and managing the performance and service
availability of software. The system should be available 90% of the time, because of their power
fluctuations 10% the system may be down. The system can assume to support more than 100
concurrent requests at once.
User Interface: Visual layout of the system that a user might interact with.
The designed systems’ user interface graphics will reflects the system.
The user interface will be light weight and easy to use and manage.
Security and Access Permissions: Security requirement are important factors in this system as
classified data/information will be stored in the database. User validation will be done during
login to ensure that the user is valid and that the user only has access to his/her permitted
information.
Backup and Recovery: The proposed system can be damaged or fail if there is virus attack and
continuous power disconnection from the source station and the data can be lost at that time. It
should be holding a backup of the data by using different storage devices like Hard disk, CD,
DVD Flash. Backup can be performed in a week at middle night 6:00 pm because of no works
perform at this time.
A use case diagram at its simplest is a representation on users’ interaction with the system and
depicting the specification of a use case. Below is the use case diagram for web based agro
farming management system for Fafan zone.
Figure 1: Use case Diagram for WBFMSFZ
Use case documentation includes text descriptions of processes with sections like use case
number, Actors, Precondition, aim and alternative action.
Use Case Documentation (for each use case identified)
Alternative If the user did not insert correct user name and password, system
Step 1: Clicks update info link. Step 2: Update info page displayed
Step 4: Select link Zone office
want to update, Step 3: Display update form
Step 5: Click on update button.
Step 6: Give appropriate message.
Alternative -
the area
Pre-condition : Hit the submit data menu item.
Post-condition Send the major types of crop production to Zone office
Normal follow Actor response System response
Step2:The system displays
Step1.The Woreda/District office presses
the page.
send types of crop production link
Step5: The system
Step3: The Woreda/District office writes
notifies as the types of
type’s crop production.
crop production is
Step4: The Woreda/District office presses
successfully submitted.
submit button.
recorded to database.
Step 1: Clicks News and events Step 2: News and events info
info link. page displayed
Step 4: Select link Zone office Step 3: display News and events
want to post News and events form
Step 5: Click post News and Step 6: give appropriate
events button. message.
Alternative -
information.
Pre-condition The Zone office employees must be login-in to the system
Post –condition Production and productivity types of information have been recorded and
Step1: The User press Land use Step2: The system displays the
management link. Land use management form
Step3: The User fill the form Step6: Give appropriate message.
Step5: Click the Landuse
management to Woreda/District
office
Create Account
Figure 3: Sequence Diagram for Create Account
Update Information
9
Figure 11: Sequence diagrams for send type of major crop production
Change Password
Figure 19: Activity diagram for post the zone office news & events
View Production and Productivity
3. SYSTEM DESIGN
This project is designed in a manner that solves the problems of Fafan Zone Agriculture Office
by minimizing the work load that appears on the employees because of the existing system is
manual. In this project design we try to show how the project is designed. It designed to simplify
function of the manual system and it is capable of doing large amount of works in short period of
time.
The goal of system design according to the proposed project is to manage complexity by dividing
the system into smaller and manageable pieces. It mainly focuses on the different types of class
type architectures, such as user interface layer, process/control layer, business /domain layer,
persistent layer, and system layer and also different types of system modeling techniques that are
used for the implementation types of the system such as class modeling, state chart modeling,
component modeling, deployment modeling, persistence modeling and also some system design
techniques such as user interface designing are also to be covered in this design chapter.
The goal of this project is to develop Web based farm Management System for Fafan zone. This
document will provide interface design models that are consistent user friendly and will provide
straightforward transition through the various system functions.
The design goals can be generally grouped in to
Performance criteria
Dependability criteria
Maintenance criteria
End user criteria
Performance, dependability, and end user criteria are usually specified in the requirements or
inferred from the application domain. The customer and the supplier (developer) dictate cost and
maintenance criteria.
4.2.1. Performance Criteria
Performance criteria: - this criterion includes:
Response time, the speed imposed on the system. The system should responsive
maximum number of tasks with minimum times.
Number of tasks accomplished in a fixed period of times. Memory space available for
speed optimizations should be used efficiently.
4.2.2 Maintenance Criteria
When we say the system is maintainable, we mean it can be maintained easily when changes
arise from the user and designer/developers. We prepare full maintenance document and attach
with the web content then the end user can maintain the fall of the system easily by using the
maintenance manual or document.
4.2.3. End User Criteria
This is to mean that users of the system after the completion of the system, how the system is
used in friendly manner for both the experienced and inexperienced users using the user
interface.
The software system architecture is a high-level structure of software system, the discipline of
creating such structures, and the documentation of these structures. There are many recognized
architectural patterns and styles. Among them are:
Client-Server: The Client-Server model of computing is a distributed application architecture
that partitions tasks and workloads between the providers of resources or services, called servers
and service requesters, called clients.
Peer-to-Peer: this architecture is a distributed application architecture that partitions tasks and
workloads between peers. Peers are equally privileged equipotent participants in the application.
Three tier Architecture
Three tiers Architecture is an architecture in which the functional process logic, data access,
computer data storage and user interface are developed and maintained as independent modules
on separate platforms.
User (Presentation) Tier: End-users operate on this tier and they know nothing about any
existence of the database beyond this layer.
Application (Middle) Tier: At this tier reside the application server and the programs that
access the database. For a user, this application tier presents an abstracted view of the database.
End-users are unaware of any existence of the database beyond the application. At the other end,
the database tier is not aware of any other user beyond the application tier. Hence, the application
layer sits in the middle and acts as a mediator between the end-user and the database.
Database (Data) Tier: At this tier, the database resides along with its query processing
languages. We also have the relations that define the data and their constraints at this level.
These are the working areas of the project after the completion of total process. In the sub system
decomposition, we can see different components emanated from system architecture that
collaborate to handle single application at a time.
When the operator runs the intranet application, the user interface appears by preceding login
screen. Next to login screen is the main page that supports other operational directories. The
different subsystems have a coupling to complete entire process.
Manage Account Subsystem: this subsystem enables the administrator to manage user
accounts. The management includes creation of new accounts, removing the existing accounts
and modification of accounts. The management of user account is the responsibility of the
account class. This subsystem also enables the determination of who has access to the official
page of the system at what time. The class that is responsible to establish such a service is called
the access-control class. It is to keep track of the time and date along with the user accessing the
login page, if the user has successfully login in, it also display the recorded information to a user
with the administrator privilege.
Report Management Subsystem: This subsystem enables to generate and view reports.
Production and Productivity Subsystem: This allows information exchange about fertilizer
and seed distribution between woreda and zone offices.
Feedback Subsystem: This subsystem enables the user to send and view feedback.
News and Events Subsystem: In this subsystem the users can post and view news and events.
Component diagrams are different in terms of nature and behavior. Component diagrams are
used to model physical aspects of a system. Physical aspects are the elements like executable,
libraries, files, documents etc that resides in a node. So component diagrams are used to visualize
the organization and relationships among components in a system. These diagrams are also used
to make executable systems.
Figure 23: Component Modeling for Web based Farm management system
Deployment modeling used to show the hardware of the system, the software that is installed in
the hardware and also the middleware that is used to connect the disparate machines to one and
other. It also shows how the software and the hardware components work together.
Figure 24: Deployment Modeling Diagram
4.7. Persistence Data Management
This model used to relate and shows the relationship between each and every of the designed
system database. Persistent data management is basically used to represent the design of the
database, usually a relational database. Database design is the process of producing a detailed
data model of a database. This logical data model contains all the needed logical and physical
design choices and physical storage parameters needed to generate a design in a Data Definition
Language, which can then be used to create a database. Database design describes many different
parts of the design of an overall database system. Database designs also include ER (Entity-
relationship model) diagrams. An ER model ER model is an abstract way of describing a
database. Design process of a database includes:
Determine the purpose of the database.
Here we concerned with determining the allowed activities of legitimate users, mediating every
attempt by a user to access a resource in the system. The objectives of an access control system
are often described in terms of protecting system resources against inappropriate or undesired
user access. From a business perspective, this objective could just as well be described in terms
of the optimal sharing of information.
In our project the system administrator have a full privilege to operate on the system, i.e. he/she
is allowed to create, view and delete accounts and also can change passwords. On the other hand
Users/Zone and woreda office workers are not allowed to do so. They have restricted privilege or
right such that they can simply access the entire system according to the responsibility that
belongs to them. Woreda/District office workers are allowed to send request (it may be about
fertilizer, seed…), feedback, and emergency report and the like. Zone office workers in turn give
53
response; view feedback, post news and events or about seed and fertilizer distribution as the
system platform allows operate on it.
Account and account relate tasks are given only for the system administrator. The system
does not allow users to do the same.
The user should be any one who is an employee or anyone who is a part of Zone or
Woreda agro office staff in a certain department.
Human Interface: Since input from a human user is one of most likely places that exceptional
and invalid inputs can be generated in an embedded system, the user interface should be able to
prevent the operator from causing a fault condition. The interface should constrain the user to
only entering valid inputs into the system.
Security: Many security vulnerabilities are caused by not properly containing exceptional
conditions. For example, many security holes are caused by race conditions and not detecting a
memory buffer overflow. These vulnerabilities can be exploited by people to gain access to and
tamper with restricted systems.
User interface design or UI design generally refers to the visual layout of the elements that a user
might interact with in a website, or technological product. UI must not only be attractive to
potential users, but must also be functional and created with users in mind. The layout of a user
interface design should also be clearly set out for users so that elements can be found in a logical
position by the user. In our case we will try to make it simple, clear and attractive so that users
can operate on our system as quickly and easily as possible.
Hardware Compatibility test- the system is compatible with all the Hardware and
Software listed under the Hardware and Software Acquisitions.
Software compatibility test – the system is compatible with all the software listed
under the development tools table.
User Interface Testing: The team has conducted this testing procedure to evaluate the
GUI elements like field forms drop down box, input type length, radio button are work
properly and suitable for the users. As a result all of these components are working
properly.
Usability Testing: The team has conducted this testing procedure to evaluate the extent
to which a user can learn to operate, prepare inputs for, and interpret outputs of a system
or component and the system’s user friendless.
Test case specification
Log in
Test Case ID
Testing Class Black Box & White Box Test
Testing Name Unit & Integration Test
Unit to Test = User Login
Assumptions = User Successfully Login
Test Data
User Name (valid username, invalid username,
empty user name)
Password (invalid password, valid password,
empty password)
Steps to be
Data Expected Results Actual Results
Executed(Description)
Enter valid user name and valid user name =xxx Display an alert message” go to
Password. password =xxx aproprate page”
Should display an alert Wrong Username
Enter valid username and invalid user name =xxx
message “Wrong Username or or Password click
password. password=xxx
Password here re- Enter
!"
Should display an alert Wrong Username
Enter invalid username and valid username= xxx
message “Wrong Username or or Password click
password. password= xxx
Password ” here re- Enter
Should display an alert Wrong Username
Enter invalid username and username = xxx
message “Wrong Username or or Password click
invalid password. password = xxx
Password here re- Enter
click here to go back”
Should display an alert The following
username=----
Enter empty username and valid message“The following error(s) error(s) occurred:
password=xxx
password. occurred: - username is - username is
required.” required.
Should display an alert The following
Enter valid username and empty username=xxx message“The following error(s) error(s) occurred:
password. password=---- occurred: - password is - password is
required.” required.
Should display an alert The following
message “The following error(s) occurred:
username=---- error(s) occurred: - Incorect - username is
Enter all fields empty
password=--- UserName and Password required.
- Password is
required.
Login code
<?php
include('conn.php');
session_start();
?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>login</title>
<meta name="description" content="website description" >
<meta name="keywords" content="website keywords, website keywords">
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<link rel="stylesheet" type="text/css" href="css/style.css">
<link rel="stylesheet" href="css/main.css">
<!-- modernizr enables HTML5 elements and feature detects -->
<script type="text/javascript" src="js/modernizr-1.5.min.js"></script>
<style type="text/css">
.style1 {
font-size: medium;
}
.style2 {
margin-top: 0;
}
</style>
<style type="text/css">
ul{
padding: 0;
list-style: none;
background: teal;
}
ul li{
display: inline-block;
position: relative;
line-height: 21px;
text-align: left;
}
ul li a{
display: block;
padding: 8px 25px;
color: black;
text-decoration: none;
}
ul li a:hover{
color: white;
background: cyan;
}
ul li ul.dropdown{
min-width: 100%; /* Set width of the dropdown */
background: aqua;
display: none;
position: absolute;
z-index: 999;
left: 0;
}
ul li:hover ul.dropdown{
display: block;/* Display the dropdown */
}
ul li ul.dropdown li{
display: block;
}
</style>
<style type="text/css">
div#container
{
width: 600px;
position: relative;
margin-top: 0px;
margin-left: auto;
margin-right: auto;
text-align: left;
}
body
{
background-color: crimson;
background-image:url(images/index_bkgrnd.png);
color: green;
font-family: Arial;
font-size: 13px;
margin: 0;
text-align: center;
}
</style>
<script type="text/javascript">
function ValidateForm(frm) {
if (frm.user.value == "") {
alert('user name.');
frm.name.focus();
return false;
}
if(frm.pass.value == "") {
alert('Password.');
frm.pass.focus();
return false;
}
return true;
}
</script>
</head>
<body>
<div id="main">
<fieldset>
<header>
<div id="logo">
<div id="logo_text">
<!-- class="logo_colour", allows you to change the colour of the text -->
<img src="images/aaa.jpg" width="146" height="55" align="middle" >
<img src="images/aab.jpg" width="120" height="55" align="middle" >
<img src="images/aac.jpg" width="120" height="55" align="middle" >
<img src="images/aad.jpg" width="120" height="55" align="middle" >
<img src="images/aae.jpg" width="120" height="55" align="middle" >
<img src="images/aaf.jpg" width="120" height="55" align="middle" >
<img src="images/aag.jpg" width="120" height="55" align="middle" >
<img src="images/aad.jpg" width="120" height="55" align="middle" >
<img src="images/aai.jpg" width="120" height="55" align="middle" >
<img src="images/aab.jpg" width="146" height="55" align="middle" >
</br>
<html lang="en">
<head>
<meta charset="UTF-8" />
<meta name="viewport" content=
"width=device-width, initial-scale=1.0" />
<title>Double Layered Text</title>
<style>
body {
background: teal;
}
.geeks {
text-align: center;
</li>
<li><a href="mission.php" class="style2">Vision and Mision</a></li>
<li><a href="contact.php" class="style2">Contact</a></li>
<li><a href="login.php" class="style2">Login</a></li>
</ul>
</nav>
</header>
<div id="site_content" style="height: 471px">
<div class="sidebar_containerde" style="width: 478px; height: 143px">
<div class="sidebar" style="width: 410px; height: 203px">
<?php
if (isset($_POST['log'])){
$username=$_POST['user'];
$password= $_POST['pass'];
$passord_md5= md5($password);
$sql ="SELECT * FROM registration WHERE username='$username' AND
password='$passord_md5'";
$result = mysql_query($sql);
// TO check that at least one row was returned
$rowCheck = mysql_num_rows($result);
$row=mysql_fetch_array($result);
if($row['user_type']=='administrator'){
$_SESSION['ID']=$row['id_no'];
$_SESSION['username']=$row['username'];
echo "<script>window.location='admin.php';</script>";
}
else if($row['user_type']=='zone'){
$_SESSION['ID']=$row['id_no'];
$_SESSION['username']=$row['username'];
echo "<script>window.location='zone.php';</script>";
}
else if($row['user_type']=='woreda'){
$_SESSION['ID']=$row['id_no'];
$_SESSION['username']=$row['username'];
echo "<script>window.location='woreda1.php';</script>";
}
else {
echo'<br>';
echo' <p class="wrong">Wrong User name or Password Please try again!</p>';
echo' <meta content="15;login.php" http-equiv="refresh" />';
}
}
mysql_close($conn);
?>
<!--End of PHP script-->
<html>
<head>
<meta name="viewport"
content="width=device-width, initial-scale=1">
<style>
body {
height: 100%;
font-family: lucida, handwriting;
}
*{
box-sizing: border-box;
}
h1 {
text-align:center;
color:green;
-webkit-text-stroke: 1px black;
}
}
/* Styling the form container */
.container {
position: absolute;
left: 28px;
top: 50px;
margin: 20px;
max-width: 300px;
padding: 16px;
}
{
color:blue;
font-size:24px;
-webkit-text-stroke: 1px gray;
}
/* Full-width input */
input[type=text],
input[type=password] {
width: 100%;
padding: 18px;
margin: 15px 0px;
border: 2px solid green;
}
</style>
</head>
<table style='border:60px solid green;'class="log_table" align='center' background="images/108.jpg"
style="color:white">
5.3.1. Hardware:-
Computers: for writing code &document, design the system.
5.3.2. Software:-
Notepad++
PHP XAMPP
Wamp
EDraw Max 7
Paint
In order to access the system, first of all every user must have an account or permission from
system administrator. So, system administrator should have to create an account for every user
like employee of zone and Woreda. Users should enter to the system parts by using their
individual Username and password and also with the role given to them. These Username and
password is created by the system administrator. Finally the Employee of zone and Woreda can
access the system by using their Username and Password.
5.5. Training
During the deployment of the system, the team will give short time training for the system
administrators and Agricultural Expert explaining how the system works and in what way they
can manage their system.
6.1. Conclusion
In this project, we develop a web-based system that facilitates Agro office information provider
activities. The web-based system enables the user to know activities like view information about
the fertilizer, view information about crop production, view information about seeds, view the
solution, view complains, upload news, response solution and sends complains.
Our model contains analysis model which contains the functional and non- functional
requirements, use case, sequence, state chart, activity diagram, conceptual modeling of classes
and user interface prototypes. And also contains Design Model which consists Class modeling,
Component Modeling, Deployment Modeling, Persistence modeling of classes.
6.2. Recommendation
While doing this system the team has faced different challenges. But by the cooperation of all the
group members, advisor and examiners the team is now able to reach the final result.
We recommend that when the Agro office use this web-based system, it solves the problems in
the current system. Most of the time has been taken for understanding the working of existing
system, how communications are going on in existing system between zone and Woreda office
and what problems are there in the existing system. Finally, we recommend that when the
functional requirements that are not completed by us, are fulfilled by the next generation this
system is very useful to handle the Web based Agro-Farming management system for SNNPRS
Gedeo zone agricultural sector.
REFERENCES
“Increasing Agricultural Productivity and Enhancing Food Security in Africa: New Challenges
and Opportunities”, Addis Ababa, Ethiopia, November 2011.
Ken North, "Sets, Data Models and Data Independence", Dr. Dobb's, 10 March 2010
Development of an object-oriented DBMS; Portland, Oregon, United States; Pages: 472 – 482;
1986
http://newbusinessethiopia.com/index.php/trade/item/75-ethiopia-launches-hotline-to-give-
farmers-information, December 15, 2015