Professional Documents
Culture Documents
Nice
Nice
GROUP: FIVE
WOLKITE UNIVERSITYDORMITORY MANAGEMENT SYSTEM
SECTION: A
MEMBER ID
1. Nebyu kelemu………………………………..cir/139/10
2. ermias bogale………………………………cir/ /10
3. eyasu ayinekulu………………………….cir/111/10
4. biniam shiferaw…………………………...cir/086/10
5. bayileyegne alamir…………………….cir/089/10
============================ ============================
Table of Contents
i
Acknowledgement........................................................................................................................................i
LIST OF FIGURE............................................................................................................................................ii
LIST OF TABLES............................................................................................................................................iii
LIST OF ABBREVATION................................................................................................................................iv
Abstract.......................................................................................................................................................v
CHAPTER ONE..............................................................................................................................................1
1. INTRODUCTION.......................................................................................................................................1
1.1 Background of Dormitory management system in WKU...................................................................2
1.4.6 Legal and constraint feasibility...................................................................................................6
1.5 Scope and limitation of the project.......................................................................................................6
1.5.1 Scope of the system........................................................................................................................6
1.5.2 Limitation of the system.................................................................................................................7
1.6 Significance and Beneficiaries of the project.........................................................................................7
1.6.1 Benefits of the project....................................................................................................................7
1.7 Methodology.........................................................................................................................................8
1.7.1 Data collection methodology..........................................................................................................8
1.7.2 System analyses and design methodology.....................................................................................8
1.7.3 System development model...........................................................................................................9
CHAPTER TWO...........................................................................................................................................12
2 DESCRIPTION OF THE EXISTING SYSTEM.................................................................................................12
Introduction...............................................................................................................................................12
2.1 Description of existing system.............................................................................................................12
2.2. Users of the existing system...............................................................................................................12
2.3 Major functions of existing system......................................................................................................12
2.4 Draw back of the existing system.......................................................................................................13
2.5 Business Rules in the existing system.................................................................................................13
CHAPTER THREE........................................................................................................................................15
3 PROPOSED SYSTEM................................................................................................................................15
Introduction...............................................................................................................................................15
3.1. Proposed system description..............................................................................................................15
3.2 Functional requirement................................................................................................................15
3.3 Non-functional requirement...............................................................................................................16
ii
3.3.1 User Interface and human factors................................................................................................16
3.3.2 Hardware consideration...............................................................................................................16
3.3.3 Security Issues..............................................................................................................................16
3.3.4 Performance characteristics.........................................................................................................17
3.3.5Error Handling and validation........................................................................................................17
3.3.6 Quality Issues................................................................................................................................17
3.3.7 Backup and recovery....................................................................................................................17
3.3.8 Physical environment...................................................................................................................17
3.3.9 Resource issues.............................................................................................................................17
3.3.10 Reliability....................................................................................................................................17
3.3.11 Accuracy.....................................................................................................................................17
3.3.12 Availability..................................................................................................................................17
3.3.13 Documentation...........................................................................................................................18
CHAPTER FOUR.........................................................................................................................................19
4 SYSTEM ANALYSIS..................................................................................................................................19
Introduction..............................................................................................................................................19
4.1 System model.....................................................................................................................................19
4.1.1 Use case modeling........................................................................................................................19
4.1.1.1 Use case diagram...................................................................................................................19
Actor identification............................................................................................................................20
Use case identification.......................................................................................................................20
4.1.1.2 Use case Description..............................................................................................................21
4.1.1.3 USE CASE SCENARIO..............................................................................................................24
4.2 Object Model......................................................................................................................................24
4.2.1 Class Diagram...............................................................................................................................24
4.2.2 Data dictionary.............................................................................................................................25
4.3 Dynamic model...................................................................................................................................26
4.3.1 Sequence diagram........................................................................................................................26
4.3.2 Activity diagram............................................................................................................................28
4.3.3 State chart diagram......................................................................................................................29
CHAPTER FIVE...........................................................................................................................................32
5 System Design........................................................................................................................................32
iii
Introduction..............................................................................................................................................32
5.1 Design goals........................................................................................................................................32
5.1.1 Performance.................................................................................................................................32
5.1.2 Maintenance.................................................................................................................................32
5.1.3 End User.......................................................................................................................................32
5.3 Architecture of the proposed system.................................................................................................33
5.3.1 System Decomposition and description........................................................................................33
5.3.2 Hardware/Software mapping (Deployment design).....................................................................34
5.3.3 Detailed diagram..........................................................................................................................35
5.3.4 Persistent data management........................................................................................................35
5.3.5 Access control and security..........................................................................................................36
5.4 UML Package Diagrams......................................................................................................................37
CHAPTER SIX..............................................................................................................................................43
CONCLUSION AND RECCOMENDATION.....................................................................................................43
CONCLUSION.........................................................................................................................................43
7.2 Recommendation............................................................................................................................43
References.................................................................................................................................................44
Acknowledgement
First we would like to thanks Mr. ISAYAS for giving this project and giving some advice to complete this
project.
iv
Secondly we would like to thank dormitory workers specially proctors and proctor manager for their
willingness of interview and answer for our question about the current dormitory management system
working structure.
v
LIST OF FIGURE
Fig 1: Symbol of actor
Fig 8: activity diagram for proctor manager, proctor and student to login
Fig 9: Activity diagram for proctor, proctor manager and student view student information
Fig 10: Activity diagram proctor manager to allocate block and proctor
Fig 11: State chart diagram for student for block registration
vi
LIST OF TABLES
Table 1: Schedule feasibility of the system
vii
LIST OF ABBREVATION
ABBREVATION MEANING
WKU Wolkite University
OOA Object Oriented Analysis
BR Business Rules
WKUDMS Wolkite University Dormitory Management System
UC Use Case
GPA Average Grade Point
viii
Abstract
This project is concerned with the introduction and description of the existing system dormitory
management system and also the problems of the existing system, develop new system by concerning
system analysis and system design of employee management system of wku and concerned different
types of models used to model the new system under study. Web based dormitory management system
mainly provides effective and fast data processing and controlling of personnel. The main goal of
dormitory management system is to shorten data-processing time, to reduce errors, to improve the
accuracy of input and to provide data reliability of the personnel.
ix
CHAPTER ONE
1. INTRODUCTION
Traditionally dormitory management system uses physical paper for documentation and other
works. We want to make management system easier and comfortable for the user dormitory
system management.
The motivation of building the project has come from digitalization of dormitory management
system which has based on physical before and the system will be digitalized using on line web
based system.
The main objective of dormitory management system is to manage the detail information of old
and new students, distributing room’s to students and managing the dormitory programs using
web system.
1
1.1 Background of Dormitory management system in WKU
Wolkite University is one of the nine newly established as third generation university Ethiopia and
which is found in southern parts of Ethiopia that is located 165 km far from Addis Ababa at the south
west direction. It was started in 2003 etc. the university is located in the southern nation nationalities
regional state in gurage zone, at Gubrie site. The university command post was stationed at wolkite
town until September 2013 but moved to the main campus at Gubrie site.
Dormitory Management System is one of a system designed to enable the university to manage all
aspects of the dorm, efficiently, effectively and transparently. It is a system based on the collection and
analysis of basic information and the routine production of key performance indicators that allow
dormitory officers, administrators and all those who need to use dorm to deliver services, to monitor
dorm costs and performance, and to budget and plan for the future. To perform activities, to monitor
dorm systems, to deliver services to the student, the university official mainly dormitory manager
(proctor) use information. Currently the University gives academic service, bedding, health care,
dormitory and other services for the student’s .In the University different management activities were
performed. Among those the main service which provides the university to the student is Students’
Dormitory Management can be taken as an example. In this process there is a problem associated with
the Dormitory Management. So the project team members were initiated for this project to identify and
analyze those problems and to put possible solutions.
2
1.2Statement of the problem
Currently, wolkite university dormitory management system uses manual approach. To process the
operation first the ministry of education sends all the information to the registrar office of WKU and
gives to the student affairs including dormitory director. After taking the list, they assigned students to
each block and room. At that time they face different problems during performing their tasks. Working
by manual system is not only affecting the management members, but also affect student during
gathering information about their system. Some of those problems are:-
Require more human power to assign the students:-this implies that when we assign dorm to
student more people are required but if it is computerized less man power is needed.
Management inflexibility:-when the proctor manages student, he/she used papers to call
student name, not used another method.
Problems of searching free dorm: - the dormitory managers devote or consume much amount
of time by searching free dorm.
Problem on managing the materials: - after student enters into the campus the proctor give
required material to student and record those materials manually on paper. Due to these reason
proctors consume much amount of time to check the material is either return or not. These are
too difficult to him.
Problem of work load on workers/employees:- these problems are raised more frequently
when the student enter into the campus or leaving the campus, including writing clearance to
student, arranging student in their dorm properly, giving materials to them and checking the
material either return or not.
Problems on generating report on student attendance:-the proctor should control student by
using attendance to know they are present in their own dorm or not during these time the
proctor go to each and every dorm to call the student and then report the attendance to the
higher manager or student dormitory manager. These way of collecting go to every dorm is
difficult to proctors.
Problem on giving clearance:-when students return back to his/her family the proctor write
attendance for every student. The key proctors are faces problem on to deliver command, and
other issue. This way of giving clearance to the student is difficult.
Data is stored repeatedly in different files formats – The same information is stored in many
copies repeatedly in different forms.
Data is not secured. Due to this, some secret information is opened for unauthorized users or
agents.
Economic problem: -Economic problem is mainly concerned with cost control and profit issues.
Manual handling of data is expensive as compared to automated system. In general, cost in
terms of time is very high. As the business entry increases, the existing manual system will
coasty to handle those requirements. As the number of employees to handle the task of manual
processing increases, the university will spend a lot of money for its staff.
3
Difficulties on arranging student for the first time: -if students are entered to the campus their
name is record on paper and put on information board, due to this much amount of time is
wasted to write their name, block and dorm.
Problem of data redundant: -when student’s information are arranged or listed manually, data
can be recorded many times.
Problem on response time: -when someone wants something and ask the proctor, the proctor
is delaying giving answer to the question.
Delaying in producing different reports:-the proctor delay to report the information of student
to the higher official of dormitory management as a result of work over loading or carelessness.
Economic, political and other problems: -these are problems lack of materials that are required
to the student such as water, mat, bed etc. Economic problem is mainly concerned with cost
control and profit issues. When data are recorded on manually much amount of paper are
required, due to these it is very expensive compared to automated system.
4
1.4 Feasibility Study
Feasibility study is essential to evaluate the cost and benefits of the new system. On the basis of the
feasibility study decision is taken on whether to proceed or to cancel the project.
1.4.1 Technical feasibility
This project will be developed by using c#, which is familiar with group members and the group
Members have the ability to develop this system. So the system will be technically feasible or can be
achieved easily from the perspective of technical need.
1.4.2 Operational feasibility
The system will provide simple, accurate, active, secured service. To achieve these goals we will try to
use most available resource of the university that operates in good manner.
1.4.3 Economic feasibility
Our project takes some amount of costs that is for computers, papers, for printing materials, for writing
materials and so on. Finally when we compare the benefit that we got with our cost our benefit is better
so our project is economically feasible.
Generally the system that we developed, WKUDMS brought a number of tangible and intangible
benefits.
Tangible benefits:
1. Cost Reduction
2. Error Reduction
3. Increase Speed of activity
Intangible benefits:
1. Reduce Resource Consumption
2. Increase security
3. Increase Management flexibility
1.4.4Schedule feasibility
Concern potential time frame and completion dates for all major activities within a project meet
organizational deadlines. So the time we take to develop this system is expressed as follows.
No Activity Date
Planning 1 week
1
Problem identification and requirement analysis 2 week
2
System designing 2 week
3
5
Implementation of code 2 week
4
Testing and validation 2 week
5
Online Registration: -The system registers all the information of the institution.
Placement process: the dormitory manager/director will place the student to their
respected block and dorm.
Manage the student profile: the respected proctors will manage the new student as well
as the existing ones.
Message: -the user like student, proctor and dormitory manager can communicate
with each other through this system.
The student enables to get bed service.
6
1.5.2 Limitation of the system
The new system always need internet connection
Need of electricity.
The new web based dormitory management system is important for students, proctors, and for
the management. The significance of the system includes:
To minimize time and efforts needed to perform tasks.
To make tasks simple and efficient in every aspects.
To manage the students easily.
Providing a well-organized record keeping system with minimum space.
For students
7
To know their placement at anytime and anywhere after and before coming to campus
They can easily get clearance for a short period of time when they want to go out of the campus.
There is no disturbance between students because the proctor can easily control them.
1.7 Methodology
1.7.1 Data collection methodology
The main purpose of this project will be shift the dormitory management system from traditional or
manual to computerized .so to do this relevant data will be required and so the relevant data were
collected from different area by using different data collection methods. There two types of data
collection method. They are traditional and modern but for simplicity our proposal information is
collected by using traditional data collection methodology. There are different types of traditional
data collection methodology. Including
Direct observation
We will use these types of traditional data collection methodology to collect information about our
system by directly observing the organization. It helps us to get real information how the organization
performs its function and this helps to strength the data that gathered through interview and document
analysis.
Interviewing:-we use this method to get the basic information by interviewing person who have
information about dormitory management system of Wolkite University.
By reading documents
We apply this method to gather information by reading different books or documents that are
previously printed from Google or other sources.
8
B. Object Oriented Design (OOD)
During this phase designing the sequence, activity diagrams and to model object interactions and
behavior.
Tool
There are hardware and software tool that are used to develop our project.
o A new technology is being used and is being learnt by the development team while working on
the project.
Project plan
9
Planning to do the project identifies business problem.
Analyzing the requirement of the system.
The first month to start the project was February performed mainly for requirement gathering.
This took off course 2 weeks and at the begin April completed requirement analysis and write
the documentation so Through the last two weeks of April and part of May, we were able
to begin designing, after design we began implementation on may. Around the same
time, testing began and continued throughout the remainder of the project. Finally submit
the project. This total date will be completed 8 weeks (56 date).
NO Member Responsibility
Biniam planning
1
Bayileyegne &eyasu Problem identification and requirement analysis
2
3 Nebyu System designing and implementation of code
4 Ermias Testing and validation
Project schedule
10
No.
02\07\2011
17\08\2011
15\09\2011
19\07\2011
03\08\2011
01\09\2011
1 Select title
2 Show proposal
3 System analysis
4 System design
5 Implementation
6 Testing and maintenance
11
CHAPTER TWO
Introduction
This chapter describes the existing system, users in the existing system of WKU. In addition to this the
business rule is identified, report generated, major function of the existing system.
12
Arranging students for allocation: Students are arranged based on their sex, year,
department and faculty for dormitory allocation.
Dormitory allocation: room allocated to students along with associated dormitory
resources, like lockers, tables, chairs, beds and the like.
Generating allocation report: based the dormitory allocation report is prepared and
posted on the board for students when they arrive at the campus.
Managing and controlling dormitory materials: at the beginning and end of each year,
dormitory materials are recorded and controlled whether they are functioning properly or
not, then measure appropriately.
Controlling student’s discipline: student’s discipline controlled and recorded whether they
use the dormitory materials properly or not.
Performance- The current system’s performance is weak due to the following reasons: - the
acceptable quantity rate is relatively high i.e. the time required from initiation to completion of a
particular task is relatively high.
Information- the current system record information manually duo to this reason redundant
information may occur and information lost occur.
Controlling- since all the records on existing system stored manually so the system shouldn’t
provide sufficient protection for access and manipulation of the records associated with the system.
Services- The services given to users are not flexible, reliable and expandable. Those services given
by the system are limited to a particular area.
13
BR2: Students should not change their dorm without the permission of the proctor with sufficient
reason.
BR3: it Male students are not allocated with female students and vice versa.
BR4: Proctors should not assign one student in more than one dorm.
BR5: Proctors should not use student’s personal information for other purposes.
BR6: Buildings should be arranged before the allocation.
BR7: After the allocation reports should be prepared by proctors for students’ i.e. for posting.
14
CHAPTER THREE
3 PROPOSED SYSTEM
Introduction
This chapter describes requirements of the system such as functional and nonfunctional
requirement. Also describes user interface and human factors, hardware consideration, security
issue, performance consideration, error handling, quality issue, backup and recovery of
nonfunctional requirement.
way.
Edit profile- A user with employee role can edit his/her specific personal information by entering
their user name and password.
Manage account- This feature can be used only by admin role type. Admin can update, delete
account, also create account for newly register student or proctor.
Placing student: the system is able to recorded the new employed applicants and able to place
to their respected position.
Input related requirements
Register student online: The system registers applicants’ who wants to be hired in the institution
with appropriate information. Without coming to the office they can be able to register online
by using the system.
The user login into the system.
Manage user information: proctor manager can search and update proctor and student
information by entering user name and password.
15
Login: The user can login to the HRMS system with his/her username and password.
Logout: The user can log out from the HRMS system.
View post information: users can view post information posted by posted by dormitory
manager.
Report generation- the head of department report generation about activities performed in every
week, month and year.
Manage user information: The system is able to search, delete and update the user information
when it is needed. Give task: department give tasks to employee.
View report: the proctor manager view report generated by proctor.
16
3.3.4 Performance characteristics
Performance requirements are concerned with quantifiable attributes of the system such as System
should quickly respond for user request that is system must immediately display the needed service
along with their allocation details after he/she insert needed information to view.
Our system handles the errors in a very efficient manner. It can tolerate to wrong inputs and
prompts the users to correct the inputs. It gives notifications as and when required, guiding the users to
properly utilize it.
3.3.10 Reliability
The reliability of the proposed system will be better due to proper storage of information
when users access the application.
3.3.11 Accuracy
Proposed system will be better due to reduction of error. All operation can be done correctly
and it ensures that whatever information is coming from the data base is accurate.
3.3.12 Availability
This system should always be available for access at 24 hours, 7 days a week if internet
connection and electric power is exist, and the system should be available in all working days, so
that the process is not severely affected.
17
3.3.13 Documentation
Detailed information, in either manual or computerized form, about the system, including its
architecture, design, data flow, and programming logic. The documentation of these system focuses on:
What is involves?
They key to good documentation is that it is clear and concise, so that anybody other than the author
can pick it up and understand it easily. In many cases, it is more beneficial for a technical document to
be prepared by a group of people in order to give awareness for user about the system.
What is produced?
18
CHAPTER FOUR
4 SYSTEM ANALYSIS
Introduction
As we mentioned in the above section, in this project, the team members used an object
oriented system development methodology which incorporates two principal phases. In this
chapter, what the team will do is the object oriented analysis (OOA).
19
Fig 3 Symbol of system boundary
Actor identification
In the use cases an actor interact with the system to perform a piece of meaningful work that
helps them to achieve a goal and has access to define their overall role in the system and the scope of
their action. Depending on the above explanation actors in this system are the following:
Student: The students view his/ her dormitory information online and submit comment.
Proctor: The proctor can assign student and generate report.
Proctor manager: search, generate report and change password.
Administrator: The administrator manages the overall system.
Use case identification
Each Use Case describes the functionality to be built in the proposed system, which can include
another Use Case's functionality or extend another Use Case with its own behavior. The most important
and basic use cases of this system are the following:-
Login
Allocate Student
Create account
View dorm
Submit comment
View comment
Register block (Allocate Proctor)
Register room
View Student Information
Generate report
20
Fig 4: Use case diagram for the proposed system
21
Step4: Fill user name and password
System response
Alternative course of action: If the username and password or student identification number is
incorrect
Precondition: The Student and proctor must have valid Email address.
Actor action:
System response:
22
Step7: Use case ends.
Go to step 5
Step6: The proctor manager fills the form and submits it.
System Response:
Step3: The system displays the option as create account and remove account.
23
Use case ends.
Step 5: if user name and password is valid user page is display next performing his authenticated
operation else display error message.
Step 6: logout
Example: if student, proctor or proctor manager want to login to the system first browse the home
page then the system display login form. After the system display the login form then fill login form and
click login button .If the data is invalid the system display error message else user page is display next
perform his authenticated operation and logout.
Class diagram
Data dictionary
24
Fig 5 Analysis level of Class Diagram
25
lastName Varchar 15 Nigatu Not Null
PhoneNumber int 12 0915259135 Not Null
Gender Varchar 5 Male Not Null
Region Varchar 10 oromia Not Null
salary float --- 4455.8 Not null
The main purpose of a sequence diagram is to define event sequences that result in some desired
outcome. The focus is less on messages themselves and more on the order in which messages occur,
nevertheless, most sequence diagrams will communicate what messages are sent between a system's
objects as well as the order in which they occur.
26
Fig 7 Sequence diagram for View dorm Information
Activity diagram is another important diagram in UML to describe dynamic aspects of the system.
Activity diagram is basically a flow chart to represent the flow form one activity to another activity. The
activity can be described as an operation of the system. So the control flow is drawn from one operation
to another. This flow can be sequential, branched or concurrent. Activity diagrams deals with all type of
flow control by using different elements like fork, join etc.
27
Fig 8 Activity diagram for proctor, proctor manager and student to Login
Fig 9 Activity diagram for proctor, proctor manager and student view student information
28
Fig 10 Activity diagram for proctor manager to allocate block and proctor
A state chart diagram is a view of a state machine that models the changing behavior of a state. State
chart diagrams show the various states that an object goes through, as well as the events that cause a
transition from one state to another.
The most common model elements that state chart diagrams contain are:
States
• Initial State and end states
Transitions
• A state represents a condition during the life of an object during which it satisfies some
condition or waits for some event. Start and end states represent the beginning or
ending of a process.
29
Fig 11: State chart diagram for student for block registration
30
CHAPTER FIVE
5 System Design
Introduction
System design is the transformation of the analysis model into a system design model. In system
analysis level of modeling it focuses on the problem domain but in system design level it the solution
space software development.
The purpose of designing is to show the direction how the system is built and to obtain clear and enough
information needed to drive the actual implementation of the system. The objectives of design are to
model the system with high quality. Implementing of high quality system depend on the nature of
design created by the designer. Facts that are considered in this chapter are: design goals, system
architecture, system decomposition etc.
Design goals describe the qualities of the system that the developers should consider Performance. The
system has a fast response time with maximum throughput and the system should not be taking up too
much space in memory.
5.1.1 Performance
The part of the system a fast response time (real time) with maximum throughput. Furthermore, the
system should not be taking up too much space in memory. The fast response time over throughput and
hence the system should try to be more interactive. In the case of the timetabling subsystem, the
system should be more reliable in order to satisfy the constraints than fast response time.
5.1.2 Maintenance
These shows that the system is requires less cost for Maintenance to recover from failure.
31
least before the session expires. All the interfaces, forms and buttons are written or designed in a
simple language or common language so that the user can access it without any difficult.
There are three layers of architecture that can be used in the proposed software are. The layers are the
following:
32
o Password
o User name
o User Type
View dorm module
• View the block and the dorm number of the student.
Allocate proctor module
o Allocate proctors for each block.
Generate report
Proctor prepare students information and submit to proctor manager.
The proctor manager also prepare proctor information and report to administrator.
33
5.3.3 Detailed diagram
34
Fig 15: Persistence Diagram
35
student Proctor Proctor manager
Create account
Login into account
Allocate block for
student
Submit comment
Allocate proctor
Generate report
Delete account
Update account
Packages are UML constructs that enable you to organize model elements into groups, making your
UML diagrams simpler and easier to understand. It is a structural diagram.
They are most common on use case diagrams and class diagrams because these models have a tendency
to grow. The three types UML packages are
Classes in the same inheritance hierarchy typically belong in the same package.
Classes related to one another via composition often belong in the same package.
It shows several packages and the dependencies between two or more related class.
36
Fig 16: package diagram for login
• In this packages data entities are organize into large-scale business domains.
It included and extending use cases belong in the same package as the base/parent use case.
37
Fig 17: Package diagram, which organizes use cases.
38
Fig 18: graphical user interface for home page
39
Fig: Fig 19: graphical user interface for login
40
Fig 20: graphical user interface for create account
41
CHAPTER SIX
CONCLUSION
Wolkite University Dormitory management System is one of the main Management system found in the
Universities Management. This system is a web based application to serve students as well as the
working group of the system in different direction. Specially:-
1) Students now made possible to know their dorm online which overcomes extra expenditure of
student’s time and resource
2) saving proctors time lost for assigning dorm for students, preparing report while student leave from
campus, etc
Through various challenging, now the team members are coming to the end of this project. Those
different challenges made possible by the cooperation of all the group members. In developing this
project all group members contributed their full capability with maximum interest and all group
members get ways toward developing a project.
7.2 Recommendation
While doing this system the team members has faced different challenges. But by the cooperation of all
the group members and the advisor the team is now able to reach to the final result. I.e. all the group
members strongly fight these challenge and take the turn to the front.
So now all the group members strongly recommend the department that for the coming students, it has
to provide them with better service than the present in better hard ware, guaranteed software’s, giving
orientations how to proceed, offering guest to provide them with more experienced work, support
morally, manually, forming good relation with students, giving students description of each phases and
so on. So that it will get what it expects from its students and satisfy with them.
References
42
[1] c. grannell, modern ,modular approach to standard compliant web design, 2004.
[4] f. g. f. mehammed, online auction management system, 19 april 2004,21 november 2016.
43
44