TITLE: WEB BASED NATIONAL VITAL EVENTS REGISTRATION SYSTEM BY: Acknowledgement

10
AKSUM UNIVERSITY COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTING TECHNOLOGY PROGRAM OF COMPUTER SCIENCE TITLE: WEB BASED NATIONAL VITAL EVENTS REGISTRATION SYSTEM BY: NAME ID 1. MULUKEN TEWAJU………………………………………..AKUR/0901/03 ADVISOR DEMELASH GASHAW __________________ FINAL PROJECT SUBMITED TO: COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTING TECHNOLOGY PROGRAM OF CS, IT AND IS FEBRUARY:2014

Transcript of TITLE: WEB BASED NATIONAL VITAL EVENTS REGISTRATION SYSTEM BY: Acknowledgement

AKSUM UNIVERSITY

COLLEGE OF ENGINEERING AND TECHNOLOGY

DEPARTMENT OF COMPUTING TECHNOLOGY

PROGRAM OF COMPUTER SCIENCE

TITLE: WEB BASED NATIONAL VITAL EVENTS

REGISTRATION SYSTEM

BY:

NAME ID

1. MULUKEN TEWAJU………………………………………..AKUR/0901/03

ADVISOR DEMELASH GASHAW

__________________

FINAL PROJECT SUBMITED TO:

COLLEGE OF ENGINEERING AND TECHNOLOGY

DEPARTMENT OF COMPUTING TECHNOLOGY

PROGRAM OF CS, IT AND IS

FEBRUARY:2014

Acknowledgement

The success and final outcome of this project required a lot of guidance and assistance from

many people and I am extremely fortunate to have got this all along the completion of my project

work. Whatever I have done is only due to such guidance and assistance and I would not forget

to thank them.

I heartily thank for my God to give healthy life to finish the project properly and until know.

I respect and thank Mr. Demelash Gashaw, for giving me an opportunity to do the project

work in national vital events registration System and providing me all support and guidance

which made me complete the project on time. I am extremely grateful to him for providing such

a nice support and guidance.

My profound gratitude for Mr. Abay Teshager for Selecting the title of the project to make

me interested on project work and also he guided me until he live the College,

I would not forget to remember my class meet tesfaya eyasu and Two IT Class student’s

habtamu and faysel for the giving Support over their time to initiate me to work the project

properly with their guidance till the completion of the project work.

I am thankful to and fortunate enough to get constant encouragement, support and guidance

from all Teaching staffs of Department of computer technology which helped me in successfully

completing my project work. Also, I would like to extend my sincere regards to all the non-

teaching staff of Aksum city vital events registers and judiciary body’s for the giving of much

information with in their timely supporting me.

Student: Muluken Tewaju

ABBREVIATIONS

EDRS: Electronic Death Registration System

Etc.: Extra

GB HDD: Gaga Byte Bard Disk Space

GHz: Gaga Hertz

GB: Ram Gaga Byte Random Access Memory

GUI: Graphical User Interface

ICT: Information Communication Technology

ID: Identification Card

IE international electronics

IT: Information Technology

Kb/s: Kilobyte per Second

MB Ram: Megabyte Random Accesses Memory

MB HDD: Megabyte Hard Disc

OS: Operating System

PHP: Hypertext Preprocessor

RN_O: Registration Number

SNNP: Southern Nation Nationality and People

UN: United Nation

VER: Vital Event Registration

VERS: Vital events Registration System

WAN: Wide Area Network

Operational definition

Login: a policy that giving access for authorized users.

Automated issuance of certificate: providing certificate using electronic device.

Waterfall model: task dividing using top down approach from requirement gathering to system

maintenance.

Unit testing: method in which individual source code are tested.

Integration testing: combination of unit test or phase in which individual software modules are

combined and tested as a group.

System testing: is complete, integration of systems to evaluate compliance with its specified

requirements.

Recovery Testing: is a system test that forces the software to fail in a variety of ways and verifies

that recovery is properly

Security Testing: attempts to verify that protection mechanisms built into a system will, in

fact, protect it from improper penetration.

Graphical user interface Testing: is a process of testing product’s graphical user interface to

ensure the specifications.

Compatibility Testing: part of software non-functional tests, is testing conducted on the

application to evaluate the application's compatibility with the computing environment

Alpha Testing is a type of acceptance testing carried out at developers site by users. In this

type of testing, the user goes on testing the system and the outcome is noted and observed by the

developer simultaneously

Beta Testing is a type of testing done at users’ site. The users provide feedback to the developer

for the outcome of testing. This type of testing is also known as field testing. Feedback from

users is used to improve the system/product before it is released to other users/customers

SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats)

Use case model Use case diagram is a visualization representation of the different scenario of

interaction between actors and process.

Use case Diagram Use case diagram is used to capture the dynamic nature of the system it

contains use case actors and their relationships

Sequence diagram the interaction between the objects which are participating in the use case

can be viewed using sequence diagram.

Class diagram UML class diagram which mapped directly with object oriented language it shows

static view of an application it describes attributes and operations.

Robustness The System will face different interactions from different users and each interaction

may bring an invalid input to the system.

Accessibility The system should be accessible from woredas, regions and federal institutions

through the Woreda Net network.

Security Since the system is going to handle sensitive data concerning an individual, the personal

information of an individual should be handled with a great care.

Readability The code should be documented well so that it will be easily understandable in time

of maintenance.

Usability The system should be intuitive and user friendly so that users can use it easily without

confusion

System decomposed the electronic vital events registration system is decomposed in to eight

subsystems in order to reduce complexity in the solution domain of the overall system.

Deployment diagram the deployment (Hardware/Software Mapping) diagram it shows the

relationship among run time components and hardware nodes.

Contents of figure

Figure 1 waterfall model design method ......................................... Error! Bookmark not defined.

Figure 2 Over View of Existing vital events Registration ................. Error! Bookmark not defined.

Figure 3 Activity of VERS .................................................................. Error! Bookmark not defined.

Figure 4 Use case Diagram ............................................................... Error! Bookmark not defined.

Figure 5 Sequence diagram for LOGIN SUCCES ............................... Error! Bookmark not defined.

Figure 6 Sequence diagram login error ........................................ Error! Bookmark not defined.

Figure 7 Sequence diagram for change password ........................... Error! Bookmark not defined.

Figure 8 Sequence diagram for SEARCH .......................................... Error! Bookmark not defined.

Figure 9 Sequence diagram for register Vents ................................ Error! Bookmark not defined.

Figure 10 Sequence diagram for generating report ........................ Error! Bookmark not defined.

Figure 11 Issue certificate ............................................................. Error! Bookmark not defined.

Figure 12 sequence diagram for Issue certificate for clerk ............. Error! Bookmark not defined.

Figure 13 Manage account .............................................................. Error! Bookmark not defined.

Figure 14System Decomposition ..................................................... Error! Bookmark not defined.

Figure 15 system Architecture ......................................................... Error! Bookmark not defined.

Figure 16 deployment diagram ........................................................ Error! Bookmark not defined.

Contents tables

Table 1 Actor specification ............................................................... Error! Bookmark not defined.

Table 2 Use case Description for LOGIN .......................................... Error! Bookmark not defined.

Table 3 Use case Description for Generate report .......................... Error! Bookmark not defined.

Table 4 Use case Description for Search .......................................... Error! Bookmark not defined.

Table 5 Use case Description for Register Vent ............................... Error! Bookmark not defined.

Table 6 Use case Description for issue certificate ........................... Error! Bookmark not defined.

Table 7 Use case Description for update Information ..................... Error! Bookmark not defined.

Table 8 Use case Description for change password ........................ Error! Bookmark not defined.

Table 9 Use case Description for Manage account.......................... Error! Bookmark not defined.

Table 10 Birth entity attributes ........................................................ Error! Bookmark not defined.

Table 11 Registration place attributes ............................................. Error! Bookmark not defined.

Table 12 Death entity attributes ...................................................... Error! Bookmark not defined.

Table 13 Access Control and security .............................................. Error! Bookmark not defined.

Table of contents

Chapter 1 ......................................................................................................................................... 1

1. Introduction ............................................................................................................................. 1

1.1 Background ........................................................................................................................ 1

1.2 Statement of the problem ................................................................................................. 2

1.3 Objectives of the project ................................................................................................... 2

1.3.1 General Objective ....................................................................................................... 2

1.3.2 Specific objectives ....................................................................................................... 3

1.4 Purpose of the project ....................................................................................................... 3

1.5 Scope of the project .......................................................................................................... 4

1.6 Methodology ..................................................................................................................... 5

1.6.1 Data gathering techniques .......................................................................................... 5

1.6.2 Design Methodology ................................................................................................... 6

1.6.3 Implementation Methodology ................................................................................... 7

1.6.4 Testing Methodology .................................................................................................. 8

Chapter two .................................................................................................................................. 10

2 Requirement Analysis Descriptions........................................................................................ 10

2.1 Overview of the existing .................................................................................................. 10

2.1.1 Activities of the system ................................................ Error! Bookmark not defined.

2.1.2 Problem of Existing System .......................................... Error! Bookmark not defined.

2.1.3 SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats) system ... Error!

Bookmark not defined.

2.1.4 Business Rules ........................................................................................................... 16

2.2 Overview of the proposed system ......................................... Error! Bookmark not defined.

2.2.1 Functional Requirement ........................................................................................... 18

2.2.2Non-Functional Requirement .................................................................................... 20

2.2.3 Systems Requirement (Hardware and Software requirement) ................................ 22

2.2.4 Constraints and Assumptions ................................................................................... 23

Chapter 3 ....................................................................................................................................... 24

3. System Modeling .................................................................................................................. 24

3.1 Use case model ................................................................................................................ 24

3.1.1 Actor Specification .................................................................................................. 24

3.1.2 Use case Diagram ...................................................................................................... 26

3.1.3Use case Description .................................................................................................. 27

3.2 sequense diagram ............................................................................................................ 32

3.3 class diagram ................................................................................................................... 41

Chapter 4 ....................................................................................................................................... 42

4. System Design ....................................................................................................................... 42

4.1 Design Goals .................................................................................................................... 42

4.2 System decomposed ........................................................................................................ 43

4.3 System Architecture ........................................................................................................ 45

4.4 Deployment diagram ....................................................................................................... 46

4.5 Persistent Data Management .......................................................................................... 46

4.6 Access Control and security ............................................................................................. 50

4.7 User Interface Design ...................................................................................................... 51

5. References ............................................................................................................................ 53

6. Appendix (if any .................................................................................................................... 53

ABSTRACT

This project is done by AKSUM University, College of engineering and technology

Department of Computing Technology Program of Computer Science student. I have done this

project to initiate me in web based projects for future working life but it is recommended for the

fulfillment of my first degree in computer science. To do so, I have developed a dynamic website

for national vital events registration system for Ethiopia and to provide various registration, repots

and certificate services for the customer .This paper contains the documentation of the web page

that is being developed by me.