Professional Documents
Culture Documents
Wastage of resources,
Loss of data and poor organized and unsecured data. This also leads to Security problem not protect the data
from an unauthorized person and doesn’t keep the organizations’ safety.
Date or time limitation problem in which the system doesn’t keep track of sending and receiving different
materials deliver in the customers’ expected time and date. Example, postponing the expected time or date.
The problems that raised in the above limit the organization not to give reliable and fast service to its customers.
1.4. Objective
1.4.1 General Objective
The general objectives of this project is to develop and implement Online postal service for Ethiopia .That is to
develop and provide a full internet application or web based application, then can be accessed by any customers
throughout the world as well as branch organizations are communicate each other through online network application.
It helps customers to use their time and other resources effectively and efficiently whenever they use postal service.
1.4.2 Specific Objective (step by step tasks to achieve the general objective).
The specific objectives are listed below:-
To minimize resources
To minimize the time consumption and work load for both the organization and customers
To minimize the data storage space
To encourage data security
To design central and well-structured database management system
To eliminate redundancy of data
To make online with web based application through an internet connection.
To keep truck mails.
1.5. Proposed System
In this proposed system we have tasks to do and needs to fulfil this project currently, where the technological
innovations and the use of computerized and mobilized systems are highly being increasing from time to time, the
knowledge of mobile and computers and knowing how to operate with them is very much important.
1.6. Literature Review and Related Work
Based on the discussion with quality and security department of the Ethiopian postal service department on time
delivery is basically all about delivery on agreed time which is within 48 hours after acceptance (is about punctuality
instead of speed, percentage of all deliveries on time and deliveries at the desired time windows at acceptable cost) and
completeness and accuracy of orders delivered which is all about quality of delivery and it may include (received
quantity corresponds with delivered quantity, avoiding loosing of goods to maintain delivery obligation, very low rate
of returns due to shipment damage & shipment errors and percentage of accurate deliveries). In addition to this on time
a package is considered on time if tracking information is recorded within 48 hours of entering the shipment
confirmation.
1.7. Scope and Limitation (Limitation should be with detail reason)
a. Scope
The proposed system that we will try to automate is limited and bounded on the Ethiopian postal services. It will
perform how to:-
Track the sent messages of customers through their user account
Update information
Box management
Mail management
Search information
Store data in data base
Automate and make online service
b .Limitation
The Ethiopian postal service system provides services to its customers using manual system and somewhat automated
to provide service to its customers. Due to this reason the systems have the following drawbacks:-
It take much time to perform a single task
The system cannot seek the given data
It is no cascading sheet style but it simply implemented by frame
The system does not performing tracking well
Take time to retrieve data
It need more space to store files or cabinets
1.8. Methods and Tools
1.8.1 Data Source and Data Collection Methods
When we propose this project, we have used the following data collection method.
To gather the requirement of the system we use different types of fact finding methods those are:-
Interview
To know how the postal service system is work, we prepared questions concerning on postal service and
interviewed the counter and manager of Hosanna town post office. The counter is person who performs managing
the all transactions inside the post office, as well as the manager is a person who controls and manages the overall
system. He also called postmaster. So from the manager we gained the overall description of the system, and from
the counter we gained how the postal service transactions are going on.
Observation
By observing the current working environment of Hosanna post office, we collect data which necessary for
automating of Hosanna postal service system. In our observation we have tried to observe things mentioned below
The general system of providing service in the current system.
Document analysis: -We also see different documents in order to obtain the information about
the practices and problems of the current manual system. We gathered information in regards to
practices and problems of the existing manual system.
1.8.2 System Analysis and Design Methods
System Analysis: - requirement engineering like use case model object model etc.
System Design: - physical data base design like physical data base design, design elements, design system
architectures, design component.
1.8.3 System Implementation Methods and How to use Methods
Implementation is a realization of a technical specification or algorithm as a program, software component through
programming. there are different types of tools available to implement the system from those tools we select php to
develop front end of the system, Xamp2.5 server to develop back end of the system ,UML editor to sketch different
UML diagrams and Microsoft word 2010 to prepare the documentation part of the project .
1.8.4 Development Environment and Programming Tools
The development method we are using to develop the proposed system is the Waterfall approach.
Waterfall Methodology: All projects can be managed better when segmented into a hierarchy of chunks such
as phases, stages, activities, tasks and steps.
Programming Tools
The tools that we are going to use throughout our project are listed in the following table as grouped into hardware
tools & software tools
Tools
Hardware Software
Processor: Intel(R) core(TM).i3- Microsoft 2010 :to write the entire documents
2120cpu@3.30GHZ Power point 2010 :for presentation for both
Flash Disk : at minimum 8GB phase1 and phase 2
RAM : to the maximum of 1.90GB Wamp server 2.5 :To run the site on the tool
Hard Disk: to the maximum of bar
464.6GB npp.6.5.5.Installer : To edit the entire
CD-R : to the maximum of 700MB implementation code
SQL database server: To store data
Visual paradigm for UML 10.2 : to draw
UML diagrams
Owner/Seller
Buyer
Agent
Administrator/manager of the organization.
1.11. Feasibility Study
Feasibility study is a study that determines whether a proposed system is technically, financially, and operationally
viable.Preliminary Investigation is the first phase in any system developing life cycle. The Feasibility Study is a major
part of this phase.
Feasibility Study means selecting the best system that meet the performance requirement.The feasible development of
the software is going to be in terms of the following aspects:
1.11.1Technical Feasibility Study
The system to be developed by using technologically system development techniques such as asp.net, Java script,CSS
and MYSQL database server without any problems and the group members have enough capability to develop the
project. So the system will be technically feasible.
1.11.2Economic Feasibility Study
The purpose of the economic feasibility assessment is to determine the positive economic benefits to the organization
that the proposed system will provide. It includes quantification and identification of all the benefits expected. This
assessment typically involves a cost/ benefits analysis.
1.11.3Operational Feasibility Study
Operational feasibility it measures the degree of how much the proposed system reduce the existing system problems.
The system to be developed will provide accurate, active, secured service and decreases labor of workers and also it is
not limited to particular groups or body. And also it is plat form independent i.e. it run’s in all operating system
1.11.4Legal Feasibility Study
The system to be developed is not conflict with any government directives, because it
gives services for the people effectively and efficiently, all the stakeholders also
agreed before the system developed. So the citizen is profitable and the system will be
politically feasible.
1.12. Project Plan
A project plan defines project goals and objectives, specifies tasks and how goals will
be achieved, identifies what resources will be needed and associated budgets and
timelines for completion. A project plan defines all work in a project and identifies
who will do it.
1.12.1 Time Schedule
1 Information
gathering
11 day
2 Project
information and
12 days
planning
5 Project 75 days
Implementation
1.12.2 Budget Plan
2 Printing 200~300
4 Visio free
5 Ms office free
6 paper 100
9 Notepad++ free
TOTAL ~400
CHAPTER -2-
DESCRIPTION OF THE EXISTING SYSTEM OR APPLICATION
2.1. Introduction
Currently the Ethiopian Postal Service System mostly follows manual based
system and somewhat automated to provide service to its customers. The services
provided by the system are:-
Sending and receiving airmail
Renting post box
Giving western union service
Paying pension
Forming of DV lottery
Selling SIM ,CDMA/WCDMA, mobile cards
Income tax Collection
Duties stamp sales
Tele agency license tax collection
Boucher Card sale
a. Sending airmail
On the process of sending airmail if a customer want to send an airmail, first she/he
contact the counter, then he/she must select the types of airmail, the counter receives
the airmail to check whether the address of both sender and receiver are valid or
not .Second, the counter measures the weight of the airmail, attach postage stamp and
record the information available on airmail (date of sending, registration no, sender
address, receiver address, weight, cost and price) in three copies on the form. Finally
the customer pays the price and receives the receipt. Then the counter starts to collect
daily received airmails and group together according to their destination, then packed
and gives to the messenger/postman. The messenger/postman takes the packed
airmails to the bus station and distribute to different expected sites of the customers.
b. Receiving airmail
Every day the messenger/postman brings the packed airmails from the bus station
and gives to the counter. The counter registers all received airmails. Then, if the
airmail is ordinary or first order airmail the counter distribute it to the post box of a
customer .But type of airmail is either registered or parcel, the counter distribute
registered letter 1st advice form (if the customer received a single airmail) or
collective 1st advice form (if the customer has more than one received letter).
For EMS the messenger/postman directly contact the customer and gives the
airmail.
v. Forming of DV lottery
The customers who want to apply DV lottery of a year through postal system
fill the form by fulfilling all requirements. The counter collects and registers all DV
lottery forms.
vi. Selling SIM, CDMA/WCDMA, mobile cards
The counter sells SIM card to different customers by registering their personal
information such as name, id. Number, address, phone number, PIN code and PUK
code of the sold SIM card.
The new digitization roadmap is expected to modernize the existing services and even
add new innovative service packages.
According to a study by the universal postal service potential digital services the post
can provide includes online postal shopping portal, online customs declaration,
integration of postal web services with e-merchant sites, online bill payment, online
postal products shop, online lookup, online customer service, electronic postal
invoicing, enhanced item tracking and electronic notification.
Ethiopian Postal Service has recently started a process to establish its own bank and
a mobile money service.
F Use more human power: - since the system is not some more
computerized it use more human power to give service.
F There is duplication of data:-because of the data are not well
organized and structured.
F There is disorder of data: - because the data are not stored
sequentially.
successfully ” message
6. The system saves the registered user account
of the Users.
7. Use case ends.
Post condition The account of the users registered (created).
Alternative A1: Wrong data Entry Message
course of action 1.The system displays “Wrong data Entry!”
message.
2.The system resumes at step 3.
A2: Missing of Required Information Message
1.The system displays “Fill all information!”
massage.
2.The system resumes at step 3.
Table3. The scenario or use case description of the rent post box use case
UC Name Renting post box
data.[A1:A2]
4. The system displays “material information
recorded” message
5. Use case ends
Post condition Material information is registered.
Alternative A1: Wrong data Entry Message
course of action 1. The system displays “Wrong data Entry!”
message.
2. The system resumes at step 2.
A2: Missing of Required Information Message
3.The system displays “Fill all information!”
massage.
3. The system resumes at step 2.
Table5. The scenario or use case description of the sent airmails registration use
case.
UC Name Sent airmail register
UC Description Allows counter to register sent airmails.
Actor Counter
Precondition The counter should have logged into the system
Flow of event 1. They selects “Add material” menu.
2. They should complete and submits airmail’s
registration form by clicking “Add” button.
3. The system checks and validates the entered
data. [A1].
4. The system displays “airmail information
UC-05
recorded” message
5. Use case ends
Post condition Sent airmail information is registered
Alternative A1: invalid data
course of action A.1 The system informs the counter the entered data
is invalid by displaying “you have entered invalid
data” message and prompts the user to enter the data
correctly.
A.2 Use click “ok” button.
A.3 Use case resume at step 2
Table6. The scenario or use case description of the received airmails
registration use case.
UC Name Received airmail registration
number[A1]
4. The system display and view the searched information
5. Use case ends.
Post condition Administrator will view the searched information.
Alternative A1: invalid registration number
course of action A.1 The system informs the administrator the entered
registration number is invalid by displaying “you have
entered invalid registration number” message and prompts
the administrator to enter the registration number correctly.
A.2 Use click “ok” button.
A.3 Use case resume at step 2.
Table8. The scenario or use case description of the update user use case
UC Name Update user
registration number[A1].
4. The system display and view the searched
information
5. Use case ends.
Post condition Counter will view the searched information.
Alternative A1: invalid data
course of action A.1 System displays “Invalid data entries please try
again”
A.2 User click “ok” button.
A.3 Use case resume at step 2.
Table11. The scenario or use case description of the update airmail use case
UC Name Update airmail
registration number.
3. The system checks and validates the entered
registration number
4. The system display and view the searched
information
5. Use case ends.
Post condition Postman will view the updated information.
Table14. The scenario or use case description of the update materials use case
UC Name Update material
UC Description Allow counter to search or view post box data from the
database.
Actor Counter
Precondition The Counter should have logged in to the system.
Flow of event 1. The Counter selects the “Search” button.
2. The system requests the user to enter correct post
box number.
3. The system checks and validates the entered
UC-16
registration number
4. The system display and view the searched
information.
5. Use case ends.
Post condition Counter will view the searched information.
Alternative invalid data
course of action A.1 System displays “Invalid registration number
entries please try again”
A.2 User click “ok” button.
A.3 Use case resume at step 2.
Table17. The scenario or use case description of the updated post box use case
UC Name Update post box
UC Description Allow counter to update or change post box data from the
database.
Actor Counter
Precondition The Counter should have logged in to the system.
Flow of event 1. The counter selects the “update” button.
2. The system requests the user to enter correct
registration number.
3. The system checks post box number. [A1]
4. The system display and view the searched
information.
UC-17
UC Description Allow counter to delete or remove post box data from the database.
Actor Counter
Precondition The Counter should have logged in to the system.
Flow of event 1. The counter enters post box number.
2. The administrator click “Search” button.
3. The system checks and validates the post box number.
4. The system displays the searched information.
5. The counter click “clear” button.
6. The counter enters post box number.
UC-18
5. The system displays access page for the respective user and
shows information.
6. Use case ends.
Post condition The user entered to the system and can check the material
where it reaches through tracking the system.
Alternative course A1: Information Not Filled Message
of action 3. The system displays “Please enter your user name and
password!” message.
4. The system resumes at step 3.
A2: Invalid Entry Message
3. The system displays “Incorrect User Name or Password!”
massage.
4. The system resumes at step 3.
Table20. The scenario or use case description of the Create_account use case
UC Name Create_account
UC Description Enables all customers to create their account and then they can have
full information about their materials and airmails through tracking
with which where it reach. Generally, they will be a user member of
post office of Ethiopia.
Actor Customers
Precondition The users shouldn’t have an account before.
Flow of event 1. The user activates the system page.
2. The system displays the main window.
3. Then displays Create_account page
4. The system displays Create_account interface for the respective
user.
UC-19
5. Then the user fulfills the entire provided space and click “Signup
“button.
6. The system checks and validates the entered information. [A1:A2].
7. The system displays “you have successfully created your account”.
8. Use case ends.
Post condition The customers successfully create their account.
Alternative course A1: Information Not Filled Message
of action 5. The system displays “Please fulfill the entire information!”
message.
6. The system resumes at step 5.
A2: Invalid Entry Message
The system displays “Incorrect data entry!” massage.
6. The system resumes at step 5.
3.5. Requirement Analysis
3.5.1. Activity Diagram
An activity diagram describes a system in terms of activities. Activities are
states that represent the execution of a set of operations. The completion of these
operations triggers a transition to another activity. Activity diagrams are also
similar to flowchart diagrams in that they can be used to represent control flow
(i.e., the order in which operations occur) and data flow (i.e., the objects that are
exchanged among operations).
Administrato
r
Invalid Valid
Select
Action
update user
Manage
Manage system
Register
users
user Control
Delete airmails
user
Search user
Login/system login
Check UN and PW
Invalid Valid
Select
Action
update airmails
Manage post box
Rent post box
Register Airmails
Control
Delete airmails airmails
Search airmails
Login/system
login
Check UN and
PW
Invalid Valid
Select
Action
Update
Register material
materials Delete
materials
Search
material
Login/system
login
Check UN and
PW
Invalid Valid
Select
Action
Create
Check account
track
The overview of the system design document is the transformation of analysis model
into design model according to its function and user interfaces. During design model
the system defines the goal and decomposes the system into subsystems.
Generally throughout this system design the system performs the following tasks to
make the system effective and well designed to the clients; the hardwareorsoftware
platform, on which the system will run, the persistent data management strategy, the
global control flow, the access control policy and, the handling of boundary
conditions.
Finally, as the result of above mentioned details the system operates its task as
follows:
A clear description of each of these strategies.
Subsystem decomposition.
UML deployment diagram representing the hardware/software
mapping of the system.
Set and Modify password: -He/she can have an authority to change and control
the modification.
Login: administrator can only login to his/her adminpage.
User registration: - the administrator registers and adds any users through user
registration form into the database table.
Post notice: - an administrator can post any notice on post page
View comments: - the system admin can also see what customers may suggest
any kind of comments.
User modification operations (update user, delete user, search user): -
administrator can have to modify users.
B. Material subsystem
This subsystem is responsible for the following functionalities which can be
performed by the Postman.
Send materials:- materials can send to the expected destination
Receive materials: - the Postman should receive materials to the Counter of
the system.
C. Counter modulesubsystem
This subsystem is responsible for the following functionalities which can be
performed by theCounter.
Register materials: the postman is responsible to insert materials in to the
database table
Search materials:searching materials from the database
Update materials:updating materials in the database
Delete materials:deletematerials from the database
Search materials: -searching materials from the database
Register airmails:the counter is responsible to insert airmails in to the
database table
Search airmails: searching airmails from the database
Update airmails:-the counter can modify airmails
Delete airmails: - he/she can delete materials that are may be unnecessary or
out of date from the database.
View airmails: -view airmails data entry from the database
D. Box management subsystem
This subsystem is the subsystem of counter subsystemin such a way that it
responsible for the following activities that performed by the counter.
Manage box: providing the management of box to rent service for the users.
Renting box: renting the boxes for customers.
E. Tracking & Tracing module subsystem
This subsystem is responsible for the following functionalities which can be
performed by the Customers.
Track: - customers can check track of their sent materials and any postal
related things by clicking this button with their own shipment id.
F. Customers Module subsystem
This subsystem is responsible for the following functionalities which can be
performed also by the Customers.
Create account: - customers can create their own account in create account
page
Rent box:The customers can rent the services from the system.
Login:- the customers can login to their existing account with expected
username and password
Comment:-the customers writes comment about the system and its services
4.5. Deployment Diagram
Application
Server
MYSQL
Database
Web
Server
Service
provider
Client: PC
We Browser
b s
Our system user interfaces contribute to a system's quality in the following ways:
Increased efficiency: If our system fits the way its users work and if it
has a good design, users can perform their tasks efficiently. They do
not lose time struggling with the functionality and its appearance on
the screen.
Improved productivity: Our system user interface does not distract
the user, but rather allows them to concentrate on the task to be done.
Reduced Errors:Theseso-called 'customers errors' can be attributed to
poor user interface quality. Avoiding inconsistencies, ambiguities, and
so on, reduces user errors.
Reduced Training: A well-designed user interface encourages its
users to create proper models and reinforces learning, thus reducing
training time.
Improved Acceptance: Users/Customers prefer systems whose
interface is well-designed. Such systems make information easy to find
and provide the information in a form which is easy to use
4.8. User-Interface (UI) Design
a. User Interface: Home page interface
b. User Interface: Admin Login page interface
.
CHAPTER-5-:
IMPLEMENTATION AND TESTING
5.1. Introduction
5.2. Algorithm Design
5.3. Sample Code
5.4. Testing
5.4.1 Unit Testing
5.4.2 Integration Testing
5.4.3 System Testing
5.5. User-Manual
5.6. User Training
5.7. Start-Up
References: