Professional Documents
Culture Documents
E-Learning Final
E-Learning Final
PREPARED BY:
Name Id NO
We would like to express our gratitude towards for their kind co-operation and
encouragement which help us in completion of this project and also we would like to
express our special gratitude and thanks to campus persons for giving us such attention
and time.
Abstract
The construction of online educational system lies within three principal activities: Design,
Implementation and proper Post-implementation Assessment. There is not enough
knowledge or experience in those aspects. Efficient execution of these three major
activities necessitates the use of design and educational models to achieve the cost and
time efficiency as well as high academic quality. Utilization of online educational systems
would benefit from a structured approach to design, implementation, and student
assessment. We propose a general formulation of model as well as a framework for finding
such patterns so that it can improve the online educational systems for both teachers and
students allowing for more accurate assessment and more effective evaluation of the
learning process.
In the future, as the quality of distance learning increases the primary factor for success
will be the faculty’s commitment to excellence in teaching. Many institutions will be forced
to reevaluate the quality of teaching as the institution becomes more visible to the public to
legislators who support higher education and to prospective students
Table of contents
Contents page
CHAPTER ONE………………………………………………………………….1
1.Introduction ………………………………………………………………….1
1.1 Background………………………………………………………………………………………....2
1.2 Statement of the problem…………………………………………………………………...2
1.3 Justification of the Problems…………………………………………………………....4
1.4 Objectives of the project………………………………………………………………………4
1.4.1 General objectives…………………………………………………………………..4
1.4.2 Specific objectives……………………………………………………………………4
1.5 Purpose of the project………………………………………………………………………5
1.6 Scope of the project…………………………………………………………………………..5
1.7 Methodology……………………………………………………………………………………6
1.7.1Data gathering technique………………………………………………………….6
1.7.2Design methodology…………………………………………………………………7
1.7.3 implementation methodology…………………………………………………7
1.7.4 Testing methodology……………………………………………………………….7
CHAPTER TWO………………………………………………………………..8
2 Requirement Analysis Description …………………………………......8
2.1 Overview of the existing system………………………………………..8
2.1.1 Activities of the system………………………………………………………………..8
2 .1.4Business Rule……………………………………………………..11
CHAPTER THREE……………………………….........17
3 System Modeling………………………………………………………17
CHAPTER FOUR……………………………………….30
4 System Design…………………………………………………………….30
CHAPTER FIVE………………………………………….42
5 References ………………………………………………………………..42
E-learning is not limited to ‘digital literacy’ but may encompass multiple formats and
hybrid methodologies. In particular the use of software, Internet, CD-ROM, online learning
or any other electronic or interactive media.
E-Learning is defined as all forms of electronic supported learning and teaching which are
procedural in character and aim to effect the construction of knowledge with reference to
individual experience, practice and knowledge of the learner. E-learning is essentially the
computer and network enabled transfer of skills and knowledge.
1.1 Background
Sheba University College is located in the city of Mekelle capital city of Tigray
Regional state, which is 780kms north of Addis Ababa. The university college
started its operation in mekelle in 1993E.C and in Aksum in 1997E.C as a
private limited company called “Sheba InfoTech and Business College” in
accordance with the commercial law of Ethiopia in the study area of Accounting
and Computer science at level of diploma program. Initially the college
commenced its educational and training services in a rented building. The
college was established with the objective s of providing educational and
training service to the peoples of Tigray in particular and to the peoples of the
neighboring regions of afar and Amhara.
In February 2004, the college moved to its own G5 and G2 two blocks story
buildings built and located at the center of mekelle, which is conductive and
stable for further development.
Generally the main problems observed in this college are the following:
Specific Objective
To achieve the general objective we use the following specific objectives:
On the other hand, the student at time of taking the assignment they do not lose time . The
teacher also does not lose time to give assignment, result of quiz, result of the assignment
and other materials.
Finally, it is also very necessary for the college to improve the educational system and to
minimize the losing of money for hardcopy .
1.7 Methodology
To accomplish this project the system requirement will follow methods, tools, models and
development of software life cycle techniques. The phases we are used list below:
Although there are a number of sources to collect data from students, instructors, from the
web it was considered reasonable to select confidential data from official persons. ICT and
workers in the ICT increase the reliability of the data collected.
The technique used for sampling was positive sampling. By taking the limitations of time
and cost into consideration. It was decided to take a sample of five students and two
instructors for interview. Interview method was chosen for the following reasons:
Another method used for data gathering was observation. Totally we spent more than ten
hours for observation. The observation is made during the learning time of student.
1.7.2 Design Methodology
In developing this system we follow an object oriented analysis and design method. Using
Object Oriented Analysis and Design methods to develop real-time systems has the
potential to produce safer, more reliable and maintainable code. Instead of using functional
decomposition of the system, the OOA approach focuses on identifying objects and their
activities. Using the object -oriented approach, system analysts model information systems
by identifying a set of objects, along with their attributes and operations that manipulate
the object data
To implementation this project we use PHP for front end and My SQL for back end.
After accomplish the project we used test method to evaluate the functionality of the
system.
1. Unit testing: this method used by selecting sample code and test that code if it fit
for use.
2. Integration testing: is performed to check whether the system perform all the
functional requirements or not.
3. Alpha testing: the system will be tested by giving the correct input.
4. Beta testing: the system will be tested for incorrect data input. If any failures will
occurred while testing the system in all the above testing methods, immediate
correction before moving to the next work so the system will achieve its goal
Chapter Two
2.1 Overview of the Existing System
The current learning system in Ethiopia is a traditional based where everyone should
communicate with the instructor face to face in order to ask even for a simple matter of
questions and difficulties. During regular classes teacher is restricted by time he/she has at
his/her disposal. In addition, he/she cannot dedicate himself/herself entirely to
discussions with students.
The communication between the students and the instructors of these institutions is
limited by the geographical locations of the university collage. So that everybody is isolated
and runs its own means to have access to different academic knowledge and materials.
Although there are certain outstanding students and also instructors in the university
collage, their interaction is limited. With this, the university collage will not be able to
utilize the existing resource efficiently.
Having a system that creates a common platform for open discussions and learning
environment would be helpful to realize the vision of the university.
Developing and deploying effective E-learning programs may require products and
services supplied by a variety of vendors, leaving one to connect the dots. One way to start
is to define the goals of the desired learning solution. Definition of the goals of an E-
learning solution is driven by the following factors.
Students do not get information about: updated class scheduled Exam time,
tutorial class program, payment information and other. Because 50% of the
college students are coming from country side. Therefore, it was not more
standard.
They losses huge number of hard copy for storing files. So, this file is error prone, may be
exposed for natural disaster like fire, rain, dust etc. A lot of money would spend for paper.
The student must be physically come to register. This results the students to spent time
and money for transportation.
The communication between the students and the instructors is not smooth that means if
instructors need to inform students for meeting, for giving assignments, and to show their
results it is so hard to give information at the right time, accurately, and also for instructors
it is difficult for managing their time due to this reason, the students and instructors cannot
communicate easily to share their ideas.
Students cannot access or reads more information to capture to improve their knowledge
and skill, to create new things because materials that are given by the instructor are very
limited because of time, finance issues that means if students are the user of E-learning
system you can get more information more than the hard copy due to this reason students
limit their knowledge in the short notes that are given by the instructor. Still now students
do not have access to pure information and additional soft copy like academic materials
such as books, tutorials etc, although there are certain outstanding students and also
instructors in the university, their interaction is limited. With this, the university collage
will not be able to utilize the existing resource efficiently.
II. Strength
It has file storage area in which different documents regarding on student information are
keep in a lot of hard copy in different places, put in a strong box, data of students are put in
hierarchy such as in instructor, registrar ,head departments .
Every student and Instructor must register in the system at beginning of each year.
Requirements for registering new student and Instructor: - A student and Instructor
must write full name, age, sex and address in the registration form fields exactly.
Instructors, student and user password and username are given by the
administrator of the E-learning system.
Students and instructors are if out of the member cannot be access the
E-learning system.
If students or instructors are forgot password and username you have to report for
the administrator.
If students cannot access materials you have to report for the teacher.
In order to secure the E-learning system all members of the e-learning system must
be needed username and password.
Instructors and students cannot delete, update their profile it can only be deleted or
updated by administrator
2.2 Overview of the Proposed System
The proposed system will provide a learning model where a community of learners is
created and students learn with and from one another, collaboratively, and the instructor
structures the lecture topics, provides expertise, and participates in the discussion and
group interaction.
The system will be composed of :
Registration
Upload/Download course materials
Assignments
Discussion forum
Posting notices
Search
Delete
Withdrawal
Class schedule
Automatic email
Reliability
Students learning system must be available that every user can be registered by the
administrator at a given time. This E-learning notifies the user if there an incorrect input to
the system. Every user should fill by having there correct information mean that the user
name and password unless they cannot access the system.
Performance
The E-learning system must have a short response time that triggers on a press of a single
button. example to register new students, to register instructors, programs, class, courses,
to update instructors, departments and students ,to uploading, downloading files records
and to search students departments and classes instructor profile it perform in single
button.
2.2.4.2 Assumptions
The people who access the E-learning system should have enough knowledge how to
use a computer, should know about the E-learning and should be in the university level,
the university collage should also networked area and fast. At this time the university
collage has a website so we are going to link the E-learning system to the main webpage
of the university collage and anybody can access it in the intranet environment.
Chapter Three
System Modeling
System modeling E-learning system helps we understand the functionality of the
E-learning system and model us how can we communicate with customer? In this
E –learning system project we use the iterative incremental development model.
Particularly in e-learning a main issue is student modeling, that is the analysis
of student behavior and prediction of his/her future behavior and learning
performance. In fact, nowadays, the most prevailing issue in the e-learning
environment is that it is not easy to monitor students' learning behaviors.
Post-condition The user has accessed the home page and get access to none
restricted sites.
Exit condition The user views the message and closes the
page.
DESCRIPTION:
The class diagrams show the interactions between classes in the system. It is a
basis for designing the database for the system. The database will consist of the
objects depicted by an entity lifeline in the sequence diagram.
The classes are the foundation of object oriented programming which makes it
easier to proceed with the implementation.
Chapter four
System Design
4.1 Design Goal
Introduction
System design is the process and focuses on decomposing the E-learning system into
manageable parts. During requirements elicitation and analysis, we concentrated on the
purpose and the functionality of the system. During system design, we focus on the
processes, data structures, and software and hardware components necessary to
implement it. The challenge of system design is that many conflicting criteria and
constraints need to be met when decomposing the system.
The first step in designing a process is to map the essential model of user requirements
onto a configuration of process. Then, within each process, the designer must decide how
to allocate processes and data to different tasks. Finally, we must organize the processes
within each task into a hierarchy of modules, using modeling tool.
The goal of system design is to manage complexity by dividing the system into smaller,
manageable pieces.
Design goals
Maintenance criteria
When we say the system is maintainable, we mean it can be maintained easily when changes
arise from the user and designer/developers.
Cost
When we talk about cost we mean the cost required for maintenance, installation and develop the
system and to make the net worked computer to use the system effectively.
End user criteria
This is to mean the users of the system after the completion of the e-learning system, how the
system E-learning is used in friendly manner for both the experienced and inexperienced users
using the user interface and this is clearly stated in the users’ documentation.
Example the member of the system e-learning can use easily by using username and password
that gives the permission to access by the system administrator and this is pure for end user by
observing and reading the give icons.
Systems are classified in to roles. The “user” subsystem authenticates a user to grant access
based on the role of the user.
The “Student Registration” subsystem registers a student offline. It allows recording the detail
information of the student. “Student” subsystems are used to access the system that courses are
provide by the instructor.
The “Instructor” subsystem facilitates ads what subject teaches, in what class add students into
their class immediately from the database and Post course materials
Upload and download sub system instructor upload the course material to the students and
student are
Figure 3.11 Layer representation of the E-learning system
The proposed system is expected to replace the existing manual system by an automated system
in all facets.
The architecture used for the system is a 3 tier those are database server, personal desktop and
web server. Client/Server Architecture where a client can use Internet browsers to access the
resource provided by the system within the local area network of the university. Figure 16 shows
the architecture of the proposed system.
The data tier maintains the applications data such as student data and employee data (teacher,
administrator). It stores these data in a relational database management system (RDBMS).
The middle tier (web/application server) implements the business logic, controller logic and
presentation logic to control the interaction between the application’s clients and data. The
controller logic processes client requests such as requests to view class, to retrieve data from the
database. Business rules enforced by the business logic dictate how clients can and cannot access
application data and how applications process data.
A web server is a program that runs on a network server (computer) to respond to HTTP
requests. The most commonly used web servers are WAMP and Apache. The web server used in
this system is WAMP. HTTP is used to transfer data across an Intranet or the Internet. It is the
standard protocol for moving data across the internet.
The client tier is the applications user interface containing data entry forms and client side
applications. It displays data to the user. Users interact directly with the application through user
interface. The client tier interacts with the web server to make requests and to retrieve data from
the database. It then displays to the user the data retrieved from the server.
Figure 3.13 system Architecture
Database server is used store the data of student’s instructors departments uploading and
downloading materials .personal computer is used for the client to access the e-learning system.
The term web server can refer to either the hardware (the computer) or the software (the
computer application) that helps to deliver web content that can be accessed through the Internet
The most common use of web servers is to host websites, but there are other uses such as
gaming, data storage or running enterprise applications. A personal computer (PC) is a general-
purpose computer, whose size, capabilities, and original sale price makes it useful for
individuals, and which is intended to be operated directly by an end-user with no intervening
computer operator.
Figure3.14 the Architecture overall system
As you can see the above diagram the first phase will be feasibility Study, the next phase will be
requirement analysis phase, system design, implementation, and finally the testing will be
implemented to determine whether the system functional or not.
A deployment modeling depicts a static view of the run-time configuration of processing nodes
and components that run on given below architecture and it shows: -
The hard ware for e-learning system
The software that is installed on the hardware
Depict the hardware/network infrastructure of an organization.
Identifying keys those keys are username and password to accesses the e-learning
system.
Primary key: is a key that uniquely defines the characteristics of each row. The
primary key has to consist of characteristics that cannot collectively be
duplicated by any other row.
Foreign: This will help us to show the relationship between two tables or classes.
Identifying entities: Entities which are the persistent classes will be stated with their
attributes.
Figure3.16 Persistent Diagram of E-learning System
Participant Inflow goods Out flow goods User record Data base
actor record record record
Student
Search() Search()
View() View()
Download()
Teacher Search()
View()
Download()
Administrator
Delete() Update() Update() Backup()
Search() Search() Search()
View() Delete() Delete()
Update() View() View()
Register() Register() Register()
As you enter the system as administrator, student you should have a user name and password.
The system provides a login account form. Only user’s registers as administrators, student can
access the system. The system protected by password an it is protected by mechanism called
encryption. The other mechanism for protected the system is by session variable. When a user
leave or logout from the page the session variable is destroyed and then only entered again by
login form.
Security mechanisms are ways to protect e-learning data and resources against something bad
and attacks. Access controls are ways used to prevent unauthorized access of resources and used
to achieve security goals .We use the following access control mechanisms in particular:
Username: It is a name we use in order to be able to use a computer program or system. The
user identification is that which is required to access the system.
This command will normally be the first command given by the user.
Password: is a secret word or string of characters used for user authentication to prove
identity or access approval to gain access to a resource (example: an access code is a type
of password), which should be kept secret from those not allowed access.
2. How do you see it the effective use of time considering in the attending of class?
4. Can you least some problem which can be solved by having E-learning system?