Professional Documents
Culture Documents
Gate Pass Managment System11
Gate Pass Managment System11
Gate Pass Managment System11
Institute of Technology
Faculty of Electrical and Biomedical Engineering
Department of Electrical and Computer Engineering
(Computer stream)
Internship Report
By
Place: Hawassa
This Internship Report has been submitted for examination with my approval as a university
mentor.
Signature: --------------------------------
Date: --------------------------------------
Most engineering students struggle to translate their theoretical knowledge and abilities into real-
world practical skills, so they may use the knowledge and skills they gain throughout their
university experience to solve issues and develop technical improvements. We found this
internship program to be quite beneficial in overcoming the aforementioned difficulty and
preparing us to perform effectively in companies.
Our internship report paper work is divided into four sections. In the first section, we give a
quick overview of our hosting company, ASTU ICT center. We discussed the company's brief
history, its major objective and goal, its primary customer, and the company's overall
organization and process. In the second section of the report, we go over our entire internship
experience, including how we got into the company, which section we worked in, the work tasks
we completed in the company, and the challenges we faced at work, including how we solved the
problem and the procedure we used to complete the task. The third section discusses the practical
skills, theoretical knowledge, inter-personal communication skills, team-playing skills,
leadership skills, and entrepreneurship skills that we gain during the internship program. The
fourth section is about the project we were assigned to work on, which covers the following
topics: problem identification and proposed solutions, methods and tools utilized to complete the
project, system design, end outcome, and project codes. Finally, the conclusion and
recommendation are written.
ER-----------------------------------------------Entity relationship
HO----------------------------------------------Higher Official
1. BACKGROUND OF ASTU
1.1. Historical Overview of ASTU
Adama Science and Technology University (ASTU) were first established in 1993 as NTC,
offering degree and diploma level education in technology fields. Later, the institution was
renamed as NCTTE, a self-explanatory label that describes what the institution used to train back
then candidates who would become technical teachers for TVET colleges/Schools across the
country. In 2003, a new addition to NCTTE came about introduction of business education.
Nonetheless, the new entries were solely meant for similar purposes these graduates were also
expected to help overcome the existing dearth of educators in vocational institutions.
Figure 1:ASTU
Although it is an institution with a history of only two decades, ASTU is known for its dynamic
past. It has always been responsive to the realization of national policies: training of
technologists at its early stage, and later shifting to training of technical trainers, as well as
business educators, to fill the gap in TVETs. Following its inauguration in May 2006 as Adama
However, it was not until it was nominated by the Ministry of Education as Center of Excellence
in Technology in 2008 that it opened various programs in applied engineering and technology.
For its realization, it became a university modeled after the German paradigm: it not only
became the only technical university in the nation, but also the only one led by a German
professor.
Notwithstanding closure of some disciplines as per the new vision and mission, the ensuing three
years saw flourishing of graduate programs, of which some (like a few in the undergraduate
program) were exceptional to our university. The same period saw pioneering of the university in
introducing PhD by Research and MA/MSC by Research programs. Before 2008, the university
was stratified into faculties, and ASTU’s reach was limited to its only campus in Adama town.
The university has now extended its reach to Asella, where two of the total seven schools are
located. The faculties at the main campus include: School of Business, School of Engineering
and Information Technologies, School of Humanities and Law, School of Natural Sciences, and
School of Educational Science and Technology Teachers Education. On the other hand, the two
schools in Asella are the School of Agriculture and School of Health and Hospital.
In addition to its main concern (academics), ASTU is also host of research Institutes and
enterprises. In the main campus, apart from the ICDE, there exist two others: The Further
Training Institute FTI and Adama Institute of Sustainable Energy. The sister town where the two
schools are located, Asella, is also host to the Artificial Insemination Institute and Asella model
Agricultural Enterprise.
Following its renaming by the Council of Ministers as Adama Science and Technology
University in May 2011, the university has started working towards the attainment of becoming a
center of excellence in science and technology, thereby allowing for the realization of goals set
in the GTP. To this end, a South Korean has been appointed as President of the University.
Currently, ASTU is setting up a Research Park, in collaboration with stakeholders and other
concerned bodies: one of a kind in the Ethiopian context. The university is also venturing out to
the wider community and is currently engaged in various joint undertakings.
The mission of ASTU is to provide ethical and competent graduates in applied science and
technology through quality education, demand driven research and community service. ASTU
also provides innovative knowledge to support the socio-economic development of the nation.
• Delivering world class education and training in strategically priority science and technology
disciplines based on national economic demand.
• Conducting problem solving applied research to support the productivity and
competitiveness of industries.
• Serving as a center of knowledge and technological adaption, innovation and transfer
• ASTU aspires to be the first choice in Ethiopia and the premier center of excellence in
applied science and technology in Africa by 2030.
Core Values
Core values of ASTU written below are the operating principles that guide the organizations
internal conduct as well as their Relationship with their customers, partners, and shareholders.
Nurturing diversity
Professional ethics
• Video conference
• University-industry linkages
• Website development
2.5 Procedures we have been using while performing our work tasks
Before we started our project, we requested our consultant to advise us on how the team has
handled different software development projects. We began completing the jobs in accordance
with the methods that have been in use by the team for a long time. Using the steps listed below,
we were able to complete our job.
Gathering information: First we gathered information about the project title from
guards, employees, and visitors they are invited for different purposes and they give us
how the gate system is manual and very backward.
Preparing proposal: We prepared a proposal for the project. Then we presented our
proposal to our adviser. Our adviser gave us useful comments and suggestions on the
proposal.
System designing: Then we start system design which includes database design,
Software design
Server side design and coding: Next we start server side design and coding. We have
instructed to use a Laravel framework for the project. So we start installing WAMP
server, visual studio code editor to write the codes and configuring the framework on our
computer.
Final presentation: Our final works are evaluated by our adviser and lastly we present
the project for the whole team. We have been evaluated and suggested by the developers.
We got so many constructive comments which provide us advanced insight on the area of
study.
We were first concerned that we lacked practical experience because it was our first time
working in such an environment. However, once we got started, we were able to finish the job
and solve the company's problem. We reviewed various user guides and conducted an internet
search for information on new issues that arose during the procedure. We had a wonderful
relationship with our adviser, and he routinely gave us feedback on our work, which we used to
remedy our errors and get positive results.
We also developed our teamwork skills by actively participating in group projects. This
increased our personal confidence in issue solving, as well as our ability to come up with fresh
ideas and gain problem-solving experience while at work. We were also urged to be on time
when completing our tasks. Our proposal was presented to our advisor as well as the software
development team. According to their comments, they praised the effort we put in throughout the
internship and our project's accomplishment.
The overall benefits that we have gained are grouped into different categories. Such as:
After all, when we enter the real world, we will not be unfamiliar with real-world issues, and the
internship program provided an excellent opportunity to hone practical abilities.
As a result: -
We have started speaking with each employee in the organization after learning about the
benefits of interpersonal communication. However, we barely communicated at the start of the
internship. This prevents us from obtaining the materials needed to further our academic
understanding. We improved our communication with each individual after a specific day, and
solid interpersonal communication skills are a must for many roles in a company. As a result of
the internship, interpersonal communication skills increase.
Punctuality
The office discipline
Loyalty
Honesty
Cooperation
Accountability
Responsibility
4 PROJECT
4.1 INTRODUCTION
With the rise of technology in the 21st century, new and creative gadgets and applications were
developed to ease life. Still, university safety is the most significant component to precede
research with advanced technology. Adama Science and Technology University has a pass slip
operation/policy implemented, which aims to secure the employees' safety and record
information, monitor the employees going out of the gate status, and record the visitors' visit.
However, using the manual system of recording, it has been noted that it could lead to losing
files and documents when the administration needs information. Thus, this study aimed to
develop and design an ASTU Automated Gate Pass Management System, centralizing the record
of employees going out, visitors coming to the campus and resources they take.
It is evident at the cited studies that using a traditional-manual process may lead to inconsistency
of information and difficulty in generating records. ASTU manual gate pass slip has no available
database and system to systematically and conveniently perform transactions. In so far, the
institution has never had an existing system duly integrated with an electronic gate pass slip.
With this, the main challenges faced by the ASTU security guards are the fragmented massive of
paper-based pass slip records of the faculty and staff. Besides, it has been noted that the
Automated Gate Pass Management System aimed to modernize the manual pass slip system,
which will be considered a technology to address the gap using PHP, WAMPP, and MySQL.
Thus, this study is deemed to address the present situation in the Gate Pass Management Present
System, designed to manage records, particularly in facilitating information for an employee,
visitors and resources they taken passing the school premises. Records are accessed to an
informed decision making of the administration.
1. To design and develop a system with the following features and modules: (USER
Satisfaction level, easy inquiry, varies type of service, time efficiency)
Gate pass module
End-user module
Admin module
Reports module
Registration module
2. To integrate and implement ASTU Automated Gate Pass Management System supported
with PHP, WAMPP, and MySQL.
3. To evaluate the system in terms of usability and functionality.
4.4 SCOPE
The introducing system, gate pass management system, which is going to be implemented for
Adama University will automate the operation of gate pass system of the center. This web based
gate pass management system provides users (HR, HO, guard and administrator) to get
registered on the web platform and gives the access to write gate detail to administrator. It is
supported with a well-designed database. A friendly user interface is provided to facilitate
different services such as login, generate id, submit and view report. Although this system is
designed for gate pass security for employee, visitors and resources they take, we can make it
available to all entry and exit since it is flexible.
• Data Gathering
Before we start the project we gathered information by interviewing the workers in the
ICT center and security officers of the compass about the problem that they are facing
on not using web based gate pass management system and how the normal gate pass
process held in the company.
• Requirements Analysis
Based on the data we gathered and information that have given to us by our advisor,
we have set certain requirements that our project must meet. These are: -
1. Technical requirements
3. Non-functional requirements
Technical requirements
What pertains to the technical aspects that a system must fulfill is what is termed as a technical
requirement . The following are the technical requirements for the proposed system:
The system will provide services to users through the gate personnel who will capture their
details in the system. Scalability The system will allow for addition of users.
Security
The system will be secured from unauthorized access by use of a login form as an entry point to
the contents of the system. Only valid login credentials will allow access to the system.
Availability
The system will be available for access at any time of the day, every day of the year.
Portability
The system can only be accessed by the institution security personnel from the devices it has
been installed in.
Functional requirements
Detail description of what the system can do as well as input and Output of the System with
respect to role of the actor. The product consists of the following the functional requirements
based on the role of the actors.
Non-functional requirements are the criteria used to judge the system rather than the system’s
behavior. They include:
Security requirements
Entry to the system is limited only to authorized registered users. The users will also have
restrictions on what content they can edit or delete. The administrator has unlimited access to add
users and content, edit it and even delete accounts and content deemed useless.
Performance requirements
The system user interface is friendly and appealing and accomplishes the minimum required
actions.
Reliability
The system can be relied upon to do what it is expected since its underlying architecture is well-
built.
Maintainability
The system is coded in PHP and MySQL for the backend and HTML5, CSS for the frontend.
These programming and markup languages are easy to understand hence ensuring that anyone
Physical Environment
The system is deployed or installed on the server side script but for more feature we recommend
that the system to deploy on Adama university server that is free from any disaster
MVC separates an application into three components - Model, View, and Controller.
Model: Model represents the shape of the data. A class in PHP is used to describe a model.
Model objects store data retrieved from the database. Model represent the data.
View: View in MVC is a user interface. View display model data to the user and also enables
them to modify them. View of MVC is HTML, CSS, and some special syntax (Razor syntax)
that makes it easy to communicate with the model and the controller. View is the User Interface.
Controller: The controller handles the user request. Typically, the user uses the view and raises
an HTTP request, which will be handled by the controller. The controller processes the request
and returns the appropriate view as a response. Controller is the request handler.
4.5.2 TOOLS
Hardware Tools
• Personal computer (PC) or laptop: almost all tasks of our project are
performed on computer.
• Flash: required for data movement.
Software Tools
The approach we used in system design is unified modeling language (UML) in which it depends
on the visual modeling of the system. Visual modeling is the process of taking the information
from the modeling and displaying it graphical using some sort of standard set of graphical
element that includes: -
In relational databases, and flat file databases, a table is a set of data elements (values) using a
model of vertical columns (identifiable by name) and horizontal rows, the cell being the unit
where a row and column intersect. A table has a specified number of columns, but can have any
number of rows. Each row is identified by one or more values appearing in a particular column
subset. A specific choice of columns which uniquely identify rows is called the primary key.
"Table" is another term for "relation"; although there is the difference in that a table is usually a
multisite (bag) of rows where a relation is a set and does not allow duplicates. Besides the actual
data rows, tables generally have associated with them some metadata, such as constraints on the
table or on the values within particular column
System admin
Guard
Manager(HR)
HO(Inviter)
Log in
Manage account
View report
Internship Report, Hawassa University Page 25
View guard detail
Restrict entry
View entry gate detail
Add visitor
Invite visitor
Class diagram is a static diagram. It represents the static view of an application. Class diagram is
not only used for visualizing, describing, and documenting different aspects of a system but also
for constructing executable code of the software application.
Class diagram describes the attributes and operations of a class and also the constraints imposed
on the system. The class diagrams are widely used in the modeling of object oriented systems
because they are the only UML diagrams, which can be mapped directly with object-oriented
languages
In general, because it is a web-based application, it does not need a large infrastructure. Because
our primary dealing with Gate Pass management system is online, this system may be run simply
by adding it to the main system.
The following figure shows login page which is used to authenticate users:
4.8.2 Recommendation
The scope of our project is limited to the security and reporting of gate passes for entrance
purposes only; however, we recommend that you work on an in and out (entry/exit) gate pass
management system for employees that will be used to track employee attendance as they enter
and exit.
As electrical and computer engineers, we must keep up with current technology, and it is
preferable to master the latest programming languages and technologies as part of our education.
Our courses should focus on these areas because the whole objective of lecture classes and
theoretical information is to apply it in real life.
REFRENCE
<?php
use App\Http\Requests;
use App\Http\Requests\CreateGatepassRequest;
use App\Http\Requests\UpdateGatepassRequest;
use App\Repositories\GatepassRepository;
use Illuminate\Http\Request;
use Illuminate\Support\Facades\Lang;
use App\Models\Gatepass;
use App\Models\Employee;
use App\Models\Gate;
use Flash;
use Prettus\Repository\Criteria\RequestCriteria;
use Response;
use Auth;
use Sentinel;
private $gatepassRepository;
$this->gatepassRepository = $gatepassRepo;
/**
* @return Response
*/
$this->gatepassRepository->pushCriteria(new RequestCriteria($request));
$gatepasses = $this->gatepassRepository->all();
return view('guard.gatepasses.index')
->with('gatepasses', $gatepasses);
/**
* @return Response
return view('guard.gatepasses.create');
/**
* @return Response
*/
$input = $request->all();
$gatepass = $this->gatepassRepository->create($input);
return redirect(route('guard.gatepasses.index'));
/**
* @return Response
*/
$gatepass = $this->gatepassRepository->findWithoutFail($id);
if (empty($gatepass)) {
return redirect(route('gatepasses.index'));
/**
* @return Response
$gatepass = $this->gatepassRepository->findWithoutFail($id);
if (empty($gatepass)) {
return redirect(route('gatepasses.index'));
/**
* @return Response
*/
$gatepass = $this->gatepassRepository->findWithoutFail($id);
return redirect(route('gatepasses.index'));
return redirect(route('guard.gatepasses.index'));
/**
* @return Response
*/
$error = '';
$model = '';
$confirm_route = route('guard.gatepasses.delete',['id'=>$id]);
$sample = Gatepass::destroy($id);
return redirect(route('guard.gatepasses.index'))->with('success',
Lang::get('message.success.delete'));
// For Barcode
$employee = Employee::where('id_number',$request->barcode)->first();
$result = "";
if (empty($employee)) {
}else{
$logged_user = Sentinel::getUser()->id;
$gate_id = Sentinel::getUser()->gate_id;
'emp_id'=> $employee->id,
]);
$gatepass->save();
return response()->json(['employee'=>$result]);