TITLE: WEB BASED NATIONAL VITAL EVENTS REGISTRATION SYSTEM BY: Acknowledgement
-
Upload
independent -
Category
Documents
-
view
0 -
download
0
Transcript of TITLE: WEB BASED NATIONAL VITAL EVENTS REGISTRATION SYSTEM BY: Acknowledgement
AKSUM UNIVERSITY
COLLEGE OF ENGINEERING AND TECHNOLOGY
DEPARTMENT OF COMPUTING TECHNOLOGY
PROGRAM OF COMPUTER SCIENCE
TITLE: WEB BASED NATIONAL VITAL EVENTS
REGISTRATION SYSTEM
BY:
NAME ID
1. MULUKEN TEWAJU………………………………………..AKUR/0901/03
ADVISOR DEMELASH GASHAW
__________________
FINAL PROJECT SUBMITED TO:
COLLEGE OF ENGINEERING AND TECHNOLOGY
DEPARTMENT OF COMPUTING TECHNOLOGY
PROGRAM OF CS, IT AND IS
FEBRUARY:2014
Acknowledgement
The success and final outcome of this project required a lot of guidance and assistance from
many people and I am extremely fortunate to have got this all along the completion of my project
work. Whatever I have done is only due to such guidance and assistance and I would not forget
to thank them.
I heartily thank for my God to give healthy life to finish the project properly and until know.
I respect and thank Mr. Demelash Gashaw, for giving me an opportunity to do the project
work in national vital events registration System and providing me all support and guidance
which made me complete the project on time. I am extremely grateful to him for providing such
a nice support and guidance.
My profound gratitude for Mr. Abay Teshager for Selecting the title of the project to make
me interested on project work and also he guided me until he live the College,
I would not forget to remember my class meet tesfaya eyasu and Two IT Class student’s
habtamu and faysel for the giving Support over their time to initiate me to work the project
properly with their guidance till the completion of the project work.
I am thankful to and fortunate enough to get constant encouragement, support and guidance
from all Teaching staffs of Department of computer technology which helped me in successfully
completing my project work. Also, I would like to extend my sincere regards to all the non-
teaching staff of Aksum city vital events registers and judiciary body’s for the giving of much
information with in their timely supporting me.
Student: Muluken Tewaju
ABBREVIATIONS
EDRS: Electronic Death Registration System
Etc.: Extra
GB HDD: Gaga Byte Bard Disk Space
GHz: Gaga Hertz
GB: Ram Gaga Byte Random Access Memory
GUI: Graphical User Interface
ICT: Information Communication Technology
ID: Identification Card
IE international electronics
IT: Information Technology
Kb/s: Kilobyte per Second
MB Ram: Megabyte Random Accesses Memory
MB HDD: Megabyte Hard Disc
OS: Operating System
PHP: Hypertext Preprocessor
RN_O: Registration Number
SNNP: Southern Nation Nationality and People
UN: United Nation
VER: Vital Event Registration
VERS: Vital events Registration System
WAN: Wide Area Network
Operational definition
Login: a policy that giving access for authorized users.
Automated issuance of certificate: providing certificate using electronic device.
Waterfall model: task dividing using top down approach from requirement gathering to system
maintenance.
Unit testing: method in which individual source code are tested.
Integration testing: combination of unit test or phase in which individual software modules are
combined and tested as a group.
System testing: is complete, integration of systems to evaluate compliance with its specified
requirements.
Recovery Testing: is a system test that forces the software to fail in a variety of ways and verifies
that recovery is properly
Security Testing: attempts to verify that protection mechanisms built into a system will, in
fact, protect it from improper penetration.
Graphical user interface Testing: is a process of testing product’s graphical user interface to
ensure the specifications.
Compatibility Testing: part of software non-functional tests, is testing conducted on the
application to evaluate the application's compatibility with the computing environment
Alpha Testing is a type of acceptance testing carried out at developers site by users. In this
type of testing, the user goes on testing the system and the outcome is noted and observed by the
developer simultaneously
Beta Testing is a type of testing done at users’ site. The users provide feedback to the developer
for the outcome of testing. This type of testing is also known as field testing. Feedback from
users is used to improve the system/product before it is released to other users/customers
SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats)
Use case model Use case diagram is a visualization representation of the different scenario of
interaction between actors and process.
Use case Diagram Use case diagram is used to capture the dynamic nature of the system it
contains use case actors and their relationships
Sequence diagram the interaction between the objects which are participating in the use case
can be viewed using sequence diagram.
Class diagram UML class diagram which mapped directly with object oriented language it shows
static view of an application it describes attributes and operations.
Robustness The System will face different interactions from different users and each interaction
may bring an invalid input to the system.
Accessibility The system should be accessible from woredas, regions and federal institutions
through the Woreda Net network.
Security Since the system is going to handle sensitive data concerning an individual, the personal
information of an individual should be handled with a great care.
Readability The code should be documented well so that it will be easily understandable in time
of maintenance.
Usability The system should be intuitive and user friendly so that users can use it easily without
confusion
System decomposed the electronic vital events registration system is decomposed in to eight
subsystems in order to reduce complexity in the solution domain of the overall system.
Deployment diagram the deployment (Hardware/Software Mapping) diagram it shows the
relationship among run time components and hardware nodes.
Contents of figure
Figure 1 waterfall model design method ......................................... Error! Bookmark not defined.
Figure 2 Over View of Existing vital events Registration ................. Error! Bookmark not defined.
Figure 3 Activity of VERS .................................................................. Error! Bookmark not defined.
Figure 4 Use case Diagram ............................................................... Error! Bookmark not defined.
Figure 5 Sequence diagram for LOGIN SUCCES ............................... Error! Bookmark not defined.
Figure 6 Sequence diagram login error ........................................ Error! Bookmark not defined.
Figure 7 Sequence diagram for change password ........................... Error! Bookmark not defined.
Figure 8 Sequence diagram for SEARCH .......................................... Error! Bookmark not defined.
Figure 9 Sequence diagram for register Vents ................................ Error! Bookmark not defined.
Figure 10 Sequence diagram for generating report ........................ Error! Bookmark not defined.
Figure 11 Issue certificate ............................................................. Error! Bookmark not defined.
Figure 12 sequence diagram for Issue certificate for clerk ............. Error! Bookmark not defined.
Figure 13 Manage account .............................................................. Error! Bookmark not defined.
Figure 14System Decomposition ..................................................... Error! Bookmark not defined.
Figure 15 system Architecture ......................................................... Error! Bookmark not defined.
Figure 16 deployment diagram ........................................................ Error! Bookmark not defined.
Contents tables
Table 1 Actor specification ............................................................... Error! Bookmark not defined.
Table 2 Use case Description for LOGIN .......................................... Error! Bookmark not defined.
Table 3 Use case Description for Generate report .......................... Error! Bookmark not defined.
Table 4 Use case Description for Search .......................................... Error! Bookmark not defined.
Table 5 Use case Description for Register Vent ............................... Error! Bookmark not defined.
Table 6 Use case Description for issue certificate ........................... Error! Bookmark not defined.
Table 7 Use case Description for update Information ..................... Error! Bookmark not defined.
Table 8 Use case Description for change password ........................ Error! Bookmark not defined.
Table 9 Use case Description for Manage account.......................... Error! Bookmark not defined.
Table 10 Birth entity attributes ........................................................ Error! Bookmark not defined.
Table 11 Registration place attributes ............................................. Error! Bookmark not defined.
Table 12 Death entity attributes ...................................................... Error! Bookmark not defined.
Table 13 Access Control and security .............................................. Error! Bookmark not defined.
Table of contents
Chapter 1 ......................................................................................................................................... 1
1. Introduction ............................................................................................................................. 1
1.1 Background ........................................................................................................................ 1
1.2 Statement of the problem ................................................................................................. 2
1.3 Objectives of the project ................................................................................................... 2
1.3.1 General Objective ....................................................................................................... 2
1.3.2 Specific objectives ....................................................................................................... 3
1.4 Purpose of the project ....................................................................................................... 3
1.5 Scope of the project .......................................................................................................... 4
1.6 Methodology ..................................................................................................................... 5
1.6.1 Data gathering techniques .......................................................................................... 5
1.6.2 Design Methodology ................................................................................................... 6
1.6.3 Implementation Methodology ................................................................................... 7
1.6.4 Testing Methodology .................................................................................................. 8
Chapter two .................................................................................................................................. 10
2 Requirement Analysis Descriptions........................................................................................ 10
2.1 Overview of the existing .................................................................................................. 10
2.1.1 Activities of the system ................................................ Error! Bookmark not defined.
2.1.2 Problem of Existing System .......................................... Error! Bookmark not defined.
2.1.3 SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats) system ... Error!
Bookmark not defined.
2.1.4 Business Rules ........................................................................................................... 16
2.2 Overview of the proposed system ......................................... Error! Bookmark not defined.
2.2.1 Functional Requirement ........................................................................................... 18
2.2.2Non-Functional Requirement .................................................................................... 20
2.2.3 Systems Requirement (Hardware and Software requirement) ................................ 22
2.2.4 Constraints and Assumptions ................................................................................... 23
Chapter 3 ....................................................................................................................................... 24
3. System Modeling .................................................................................................................. 24
3.1 Use case model ................................................................................................................ 24
3.1.1 Actor Specification .................................................................................................. 24
3.1.2 Use case Diagram ...................................................................................................... 26
3.1.3Use case Description .................................................................................................. 27
3.2 sequense diagram ............................................................................................................ 32
3.3 class diagram ................................................................................................................... 41
Chapter 4 ....................................................................................................................................... 42
4. System Design ....................................................................................................................... 42
4.1 Design Goals .................................................................................................................... 42
4.2 System decomposed ........................................................................................................ 43
4.3 System Architecture ........................................................................................................ 45
4.4 Deployment diagram ....................................................................................................... 46
4.5 Persistent Data Management .......................................................................................... 46
4.6 Access Control and security ............................................................................................. 50
4.7 User Interface Design ...................................................................................................... 51
5. References ............................................................................................................................ 53
6. Appendix (if any .................................................................................................................... 53
ABSTRACT
This project is done by AKSUM University, College of engineering and technology
Department of Computing Technology Program of Computer Science student. I have done this
project to initiate me in web based projects for future working life but it is recommended for the
fulfillment of my first degree in computer science. To do so, I have developed a dynamic website
for national vital events registration system for Ethiopia and to provide various registration, repots
and certificate services for the customer .This paper contains the documentation of the web page
that is being developed by me.