4 5767053811851990868
4 5767053811851990868
1.6 Methodology....................................................................................................................................... 5
i
1.8 Project Scope and Limitation ............................................................................................................ 10
ii
2.16 User Interface Prototype ................................................................................................................ 55
3.9 Appendix………………………………………………………………………………………………………………………………………72
3.10 Reference………………………………………………………………………………………………………………………………….76
iii
Table of Figures
Figure 1 Existing System Use Case Diagram.................................................................................................. 3
Figure 2 the Architecture of Cafeteria Management System ...................................................................... 13
Figure 3 use case diagram of the proposed system..................................................................................... 21
Figure 4 Sequence diagram for login .......................................................................................................... 34
Figure 5 Sequence diagram for register student.......................................................................................... 35
Figure 6 Sequence for generate report ........................................................................................................ 36
Figure 7 Sequence diagram for update student ........................................................................................... 37
Figure 8 Sequence diagram for view comment .......................................................................................... 38
Figure 9 Sequence diagram for serve student ............................................................................................ 39
Figure 10 Sequence diagram for post news ................................................................................................ 40
Figure 11 Login activity diagram................................................................................................................ 41
Figure 12 Registration activity diagram...................................................................................................... 42
Figure 13 Update student info activity diagram.......................................................................................... 43
Figure 14 Report generate activity diagram ................................................................................................ 44
Figure 15 Post news activity diagram ......................................................................................................... 45
Figure 16 Serve student activity diagram ................................................................................................... 46
Figure 17 State-chart for login .................................................................................................................... 48
Figure 18 State chart for register student .................................................................................................... 49
Figure 19 Generate report state chart .......................................................................................................... 50
Figure 20 State chart for update student info .............................................................................................. 51
Figure 21 State chart for serve student........................................................................................................ 52
Figure 22 CRC diagram .............................................................................................................................. 53
Figure 23 Conceptual Class Diagram ......................................................................................................... 54
Figure 24 create account prototype ............................................................................................................. 55
Figure 25 login prototype............................................................................................................................ 56
Figure 26 change password prototype ....................................................................................................... 56
Figure 27 User interface of home page ....................................................................................................... 57
Figure 28 Registration form user interface .................................................................................................. 58
Figure 29 Subsystem decomposition diagram ............................................................................................ 60
iv
Figure 30 Design Class Diagram ................................................................................................................. 61
Figure 31 Inheritance Class Diagram .......................................................................................................... 62
Figure 32 Collaboration diagram for login .................................................................................................. 63
Figure 33 Collaboration diagram for serve student .................................................................................... 64
Figure 34 Collaboration diagram for report generate ................................................................................. 65
Figure 35 layering class diagram ................................................................................................................. 66
Figure 36 Component diagram ................................................................................................................... 67
Figure 37 Deployment Diagram .................................................................................................................. 68
Figure 38 Persistence modeling diagram .................................................................................................... 69
v
Table of Table
Table 1 time feasibility .................................................................................................................................. 9
Table 2 team organization ............................................................................................................................ 9
Table 3 login use case scenario ................................................................................................................... 22
Table 4 register student use case scenario .................................................................................................. 24
Table 5 Use case scenario to generate report ............................................................................................. 26
Table 6 Use case scenario post news .......................................................................................................... 27
Table 7Use case scenario of update student info ........................................................................................ 29
Table 8 use case scenario of give comment ................................................................................................ 31
Table 9 Use case scenario of serve student ................................................................................................. 32
Table 10 Access control and Security ……………………….......................................................73
Table 11 summery of Appendix……………………………………………...............................75
vi
Acknowledgement
First of all we would like to express our special thanks to Almighty Allah who helped me a lot in
all our life. Next we would like to express our deepest gratitude to our Department Information
Technology for his all way help and kind assistance in our project.
This project would not have been possible without the support of many people. From the
formative stages of this paper to the final, we would like to express our Last but not the least we
would like to give our best gratitude from bottom of our heart to our advisor Mr. ABEBAW
ESHETU for his valuable advice and comments.
We would also like to thank our Coordinator Mr.Wogayehu and all staffs in Information
Technology department those who help us in our project. Special thanks also to all our graduate
friends, especially group members Sadik, Aliy, Mohammed, Miftaha and Sherifa for sharing the
literature and invaluable assistance. Not forgetting to our best friends who always been there.
We would also like to convey thanks to the Department of Information Technology for
providing the computer laboratory facilities. We wish to express our love and gratitude to our
beloved families; for their understanding & endless love, through the duration of our studies.
Finally we want to thanks all people who give necessary information and help us during
information gathering.
vii
Abstract
The study focus on the functionality of Automated Student Meal service management system in
terms of Ticking system, data handling, accuracy, security, stability and adaptability in giving
service to students. This study was conducted in Haramaya University specifically in college of
computing and informatics by group members of Information Technology department students
during the first semester academic year 2014-2015. The respondents of this study were the
manual system Ticker of all cafeterias of the Haramaya University Tickers and food item
distribution of them. They properly respond to us over all activity of the process of making the
ticking and also we asked Cafeteria manager. The study concluded that the manual and the
automated Student Meal service management system are both functional. However, the
automated system is more functional because of its extra features which solve the primary
problems in ticking system. We used object oriented approach to analysis and to design the
system. Also we used method of data collection interview and observation. The system is
developed by JAVA SERVLET and MYSQL Server and the system is successfully deployed to
support all cafeteria of the Haramaya University. The system analysis phase shows that what the
existing system do and what the problems are. But the design phase shows the new proposed
system and it shows the solutions to the problems of the existing syste
viii
1
CHAPTER ONE
1.1. Introduction
One of the remarkable and much known products of technology advancement is the conversion
of manual system into automated system. Automation produces a great impact in the lives of
man, particularly in the field of industry, business, medicine and educations. It is the fact that
making the cafeteria barcode enabled ticking system and automation of some activities such as
food item distribution, meal menu, redundancy of data, double entry of students, report of the
activities in the cafeteria and identifying depends on their case(i.e. fasting and non-fasting). But
before cafeteria use the manual system to perform these activities. This application improves the
traditional manual processing system.
With the manual system, more time, money and labor force is required to plot, to prepare meal
card, arrange and control the attendance of the workers and meal menu. With these problems, we
have planned to improve ticking system and food item distribution control by making barcode
enabled cafeteria ticking system and automated food item distribution control. Through these
advancement errors in operations have been minimized and time, cost and manpower have been
conserved.
1.2. Background
HU cafeteria was established in 1952 and the system is paper based, no one has been tried to
automate it. Still the office is working different activities through this manual system. Because of
this, the office is facing a lot of problems such as loss of data or paper, wastage of time in data
processing, lack of manageable tasks, burdens of work on the workers, conflict between student
and tickers and so on.
As the Cafeteria becomes growing its services providing also became complex and it is difficult
to accomplish in efficient way because the system is manual system. So, need to be automated.
1
1.3 Description of Existing System
The cafeteria management of HU is manual. It has many drawbacks like, managing workers and
students while using cafeteria services, which leads to be unmanageable. Since it works
manually, information accessing is very slow, and get some task to be accomplished it goes
through many processes this is time consuming and it is costly.
The cafeteria management System has four major subsystems; namely workers management,
resource management, operational and student’s management during they are getting services
from cafeteria. Among these subsystems we are going to automate the food item distribution
control and students management subsystem that can involve in the cafeteria services. Since,
activities of Cafeteria Management System are performed in the manual system, there are many
drawback starting from giving meal card to students up to managing while they are using the
service and managing whether the workers of cafeteria giving appropriate service or not. Our
aim is to make ticking system and workers management computerized and so that the problems
faced in the manual system will be minimized. The purpose of this system is to automate and
manage the ticking system and food item distribution control.
2
1.3.1 Use Case of Existing System
3
1.4 Statements of the Problem
HU Meal Service Management System currently has so many problems, because the system is
manually operating. Those problems are:-
Time consuming and costly:- by giving the meal card to the students, which can
take much time, money and need many labor force
Boring: - Ticking the students’ meal card while they are entering the cafeteria to
get food services.
Re-printing when the students lost their meal card
Problem of information distribution
Problems of information redundancy
Inaccuracy of information:- due to fault occurred during food item distribution to
each cafeteria
Error during reporting
Problems occur concerning special case and readmitted students
4
To minimize the amount of cost paid by semester to print meal card
To reduce the redundancy of information
To generate efficient report
To handle the problem of readmitted and special case student
1.6 Methodology
A system development methodology refers to the framework that is used to structure, plan,
and control the process of developing an information system. Generally we are going to do a
thorough research and inspection to gather the right amount of data needed to develop this
website either directly from the client or by research methods.
A) Interview: This is one of data collection method that enables to gather information from
the organization directly in the form of asking question and getting answers for those
questions. So, we have used this method to gather information by asking the head and
staff of cafeteria management system some basic questions.
i) Question that we are asked
How ticking system is going on?
During ticking are there any problems? If there what are they?
What requirements are needed for the process?
Who is responsible for what?
How to handle problem of special case and readmitted student?
How to control food item distribution to each cafeteria?
How to generate report?
B. Observation: This is also another data collecting method. In fact we have also used
this observation method to gather data. This method enables us observing and
understanding how the cafeteria management system is done.
5
management system. They told us the main actors of the system and their responsibilities.
From the documents given to us we understand some terms which are new for us, and we
used those terms and their interpretation in the time of identifying actors and use cases of
the system.
i) Software:-
Window 7 operating system
Netbeans
MYSQL server version 5.1.4
XAMPP Server
MICROSOFT OFFICE 2010
Star UML
ii) Hardware
Computers
Cables
Barcode reader
Barcode
News TV
6
1.6.5 Approach
The object-oriented approach to software development is decidedly a part of the mainstream
simply because it has proven to be of value in building systems in all sorts of problem domains
and encompassing all degrees of size and complexity. Furthermore, most contemporary
languages, operating systems, and tools are object-oriented in some fashion, giving greater cause
to view the world in terms of objects. Object-oriented development provides the conceptual
foundation for assembling systems out of components using different technology such as.
1.7 Feasibility
Feasibility is a measure of how beneficial and practical the development of an information
system will be. Given enough time, money, and personnel, almost all system projects are
feasible. Feasibility studies provide the information that allows management to:
Pick one of several possible alternative systems that meet the requirements.
Decide if a system project should proceed to the next phase
Choose between several systems projects that must compete for the same set of limited
resources.
II) Intangible Benefits: -Benefits from the system that areas unquantifiable are;
Better decision making
7
1.7.2 Operational Feasibility
Operational feasibility is a measure of how well the solution will work in the organization.
Operational feasibility is dependent up on the human resources available for the system. It can
solve the problems in Student meal card ticking system and food item distribution management;
therefore it will minimize the amount of effort to do all through manually. And it will perform
the basic content Barcode enabled ticking system and food item distribution management
functionality.
8
2014 2015
No. Task Name Dec15,2013 Dec24,2013 Jan3,2014 jan18,2014
Mar26, 2014 May 20,2014
1 Requirement
gathering i
2 SRS
3 Design Document
4 Implementation
document
5 Operation testing
9
1.7.6 Communication Plan
Communication plan provides a description of the communication procedures to be followed
management and our team members. Rules that we assign for the success of our project is as
follows.
Among those constraints time, budget, and information accessing are the major ones. We select
the activity that can be done by automating ticking system and by the manager of the subsystem
of the cafeteria management system of HU.
10
Connecting with branch campus(Pilate project)
Attendance track of the workers
11
CHAPTER TWO ANALYSIS
Some of the activities which are performed under the existing systems are:
The cafeteria management system has four subsystems, namely workers management, resource
management, operational management and student’s management during they are getting
services from cafeteria. Among this subsystem we are going to automate food item distribution
and barcode enabled cafeteria system. The architecture of existing cafeteria management system
is as follow
12
Head of cafeteria
Assistant chief
Junior shift
13
2.2 Activities Performed under the Existing System
Activities performed in the existing system of HU CMS are done manually. Starting from giving
meal card to the students which can take many times and needs man labor force up to ticking
students meal card while they are entering the cafeteria hall to get food services.
The ticking system of HU cafeteria using now is first they print the meal card that has its unique
number for each student and distribute it for all students. This need much man power and money
efforts of that man power and approximately 2 weeds. These meal cards are only used for one
semester and the process is continues in the second semester. These can take much time, man
power effort and many losses of printed papers every semester. After that when the students use
the cafeteria services the tickers used to tick for all students for breakfast, lunch and dinner three
times per day. This is a difficult work to control those much student properly.
The distribution of food item was the big serious issues that may leads to conflict coworkers of
the cafeteria. The reason of this is that, the number of food items that was distributed at one time
for one cafeteria was so many this difficult to manage. The other reason behind this that, the
workers do not give attention while they took these food items this leads to inappropriate report
on the food item distribution of cafeteria to the manager. Due these and the other reasons the
students cannot use their cost sharing properly as budgeted from the campus.
14
Punish the wrongdoer student based on the cafeteria rule.
2.3.2 Tickers
Give meal card to the students.
Ticking the meal card of the student while they take service.
Post news related with cafeteria.
Control student
2.3.3 Students
Appling to be registered.
Getting the meal card.
See news posted by ticker on board.
Give comment by coming physically to the tickers’ head, manager etc. ---.
Getting cafeteria service.
The following common rules and constraints associated with different resources:
#BR1:-Cafeteria system management is the office who is responsible for giving meal
services for the students.
15
#BR2:-The office prepare meal card having two weeds and distribute for the students by the
semester
#BR3:-Students who is negligible to make meal card is the one who is registered and have the
slip
#BR11:- The students cannot enter twice for one meal time
#BR12:- The students cannot enter the cafeteria without meal card
#BR14:- Time slot can be scheduled for meals only if they are already informed by head of
cafeteria
16
problem, providing the solution is the main significance but to specify the following are also the
significance:
Reduce the time and tasks required to perform the operation within the cafeteria
It will change the manual processing to the automated one
It will provide speed, efficient, flexibility, reliability, and security
For managers, better food items distribution control and report generation
It will reduce information redundancy
I. Security
Consideration of the security issue has a great advantage for our system, because the database
server should be secured from unauthorized users. Only the system administrator (the cafeteria
manager should use system for security purpose) and those who have access permission can
access the database. To prevent from the unauthorized users, the administrator should have a
password and it is used privatized only for who has access right. To do this our system
introduces the hash security authentication for the manager of the cafeteria.
II. Performance
Performance characteristics include speed constraints: this system will be accessed by authorized
BEMFIDC system and it will handle huge amount of student’s records and food item records.
Therefore it is important to consider the speed of access data from the database.
Response time, the speed imposed on the system. The system should be responsive
maximum number of tasks within a minimum time.
Throughput:- number of tasks accomplished in a fixed period of times
Memory: - memory space available for speed optimization should used efficiently.
III. Reliability
17
That’s no system error so far from testing, /therefore the system is reliable. All information
modified or uploaded by manager didn’t lead to any conflict or error to the system.
IV. Availability
In computer systems and networking, availability is a general term that is used to describe the
amount of time over a one year period that the system resources is available in the wake of
components failures in the system. Our system can also available to give services and as it
needed it can be maintained.
V. Maintainability
Maintainability is characteristics of design and installation which determines the probability that
a failed equipment, machine or system can be restored to its normal operable state within a given
timeframe, using the prescribed practices procedures. Its two main components are serviceability
(ease of conducting scheduled inspections and servicing) and reparability (ease of restoring
service after a failure).
VI. Portability
The system is able to run on different platforms as long as operating system is installed
Login into the system; authorized user can login the system
Manage user’s account including creating and updating
Post updated news; for students such information is, menu change time or date.
In addition to these our system performs the following functionality.
i. Provides Information about HU Students:
18
Since the existing system of CMS of HU particularly in giving the meal card and ticking system
is the major tasks that done to give service while the students are using the cafeteria.
The system stores the student’s record and information related to the ID’s barcode and the
process how to distribute to the student and should retrieve the information when necessary. The
retrieval of information should be easy and data should be saved properly in a well organized
database server so that the process of data retrieving would be simple and faster.
The system must incorporate reports generalization facilities so that an administrator of the
system can easily filter out the report of each task. The functional requirement of the system is to
reduce the degree of occurrence of the above mentioned problems. So it is very crucial to
identify the input and out requirements of the proposed system.
The functional requirement of the giving ID’s barcode and scanning system are the inputs and
outputs necessary for this subsystem.
An actor makes use of a system in different ways. Each of these ways is known as use cases. Use
case is a behaviorally related sequence of transaction (performed by a user/actor) in a dialog with
the system. A use case may involve a number of actors, just as an individual actor may make use
of several use case.
1. Manager:-the person who control overall activity of the cafeteria as administrator of the
cafeteria
19
2. Ticker:-is the person who serves the students while they are using cafeteria by ticking
their meal card and give the meal card in the case of existing system.
3. Student:- is the user of the cafeteria who is available in the campus for educational
purpose
4. Store keeper:- the person who manage and distribute food item for all cafeteria and
generate report for the manager.
1. Login
2. View comment
3. Generate report
4. Post news
5. Update student info
6. Order item
7. Search item
8. Delete item
9. Update item
10. Serve student
11. Give Comment
12. register student
13. system security
20
System
Generate
report
<<include>> logout
Update
<<Extend>>
manager student info
<<include>>
<<include>>Update
Delete
Register item
<<include>>
student
Order item
Give
comment Serve
student
ticker
View
student news
21
2.10 Use Case Documentation
Table 3 login use case scenario
Login
Identifier UC1
Actor1 Manager
Actor3 Ticker
Pre-condition The user must be authorized user who has username and
password to login to the system and access authorized
pages.
Post-condition
The user access the system.
22
Basic course of action 1. The use case is initiated when the user click on
the login link.
2. The session and cookies are created.
3. The user enters username and password.
4. The Authentication controller validates user
information.
5. The Authentication controller send user
information to account model
6. The system verifies whether the user is
authorized or not.
7. Authentication take user into appropriate page
8. Use case end.
Alternative course of action A4. If controller validate error and the system display
error.
A5. The use case continues at step 3.
A6. If the user does not fill the correct username and
password then the system display error message.
A7). The use case continues at step 3.
A8. Use case end.
23
Table 4 register student use case scenario
include Login
Extend ---
Identifier UC2
Actor1 Manager
Basic course of action 1. The use cases start after login to the
system.
24
4. Deregistration controller validates
information entered.
5. The controller sends data to the register
table.
6. Student registered.
7. Use case end.
Alternative course of action A2. If Authentication control validate error and display
error message.
25
Table 5 Use case scenario to generate report
Include Login
Extend -
Identifier UC3
Actor1 Manager
Basic course of action 1. this use case is initiated when the user
wants to generate report
2. The use cases start after login to the
26
system.
3. The login controller loads the report
generate form or pages
4. The user click on report link
5. The users(manager and stoke keeper)
fill the report they went to generate.
6. The report controller validates the filled
data by the manager and stoke keeper
in the form.
7. The report generated
8. The use case end.
Alternative course of action A6) If the controller validates and get error
then the system display the error
Include Login
Extend -
Identifier UC4
27
Description The process is performed by manager
Actor Manager
Basic course of action 1. The use case starts after the user log in to the
system.
2. The account controller load the post news
form
3. The manager write the news
4.
5. The system save the news
6. The use case end
Alternative course of action A2.if the controller validate user name and password
and get error
28
Table 7Use case scenario of update student info
include Login
Extend -
Identifier UC5
Actor Manager
Basic course of action 1. The use case is start after the manager log in
to the system.
2. The account controller loads the update form.
3. The user fill up the form
29
4. The user presses the update button.
5. The update controller validates the entered
information.
6. The controller send information to the update
table.
7. The system validates the entry.
8. The system changes the information on the
database.
9. The use case end.
30
Table 8 use case scenario of give comment
include -
Extend -
Identifier UC6
Actor Student
Basic course of action 1. The user initiate the page to give comment
2. The system display the comment form
3. The user writes the comment to be sent to
manager.
4. The comment controller validates the entry.
5. The system save the comment
6. The use case end.
.
31
Table 9 Use case scenario of serve student
include Login
extend -
Identifier UC7
Actor Ticker
Basic course of action 1. This use case is initiated when the user
went to give service to the student or
when the user went to scan student ID
2. The ticker wants to loin to the system
3. The user enter his/her name and password
4. The account controller validate the entry
5. The controller send the information to the
student data model
6. The system verifies whether the user is an
authorized or not.
7. The controller loads the Ticker page.
32
8. The ticker scan the student Id
9. The system validate the scanned Id
10. The students get service.
11. The use case end.
Alternative course of action A4. Validate the information error and display error
message
33
Web server Logon screen Main Contoller Security Control Model: session store Model: cookie store Model: database
| | | | | | |
| | | | | |
|
Startup | | |
|
| |
|
| | | | |
Initialize page | | | | |
| | | |
Create new session()| | | |
| | |
| | |
|
| | |
Create| new cookie() |
| |
|
| |
|
| | | |
| |
| | | |
| |
| | | |
| |
Login | | | |
|
| | | |
Onlogin click() | Validate User(name, | |
| |
|
password) | | | |
| | |
|
| | |
| | |
User Detail: |check user detail() |
| |
Validate() | | |
| | |
| | |
| | |
Result Set() | | |
| | |
|
Bool success/failure | | | |
| | | |
Access denied/successful | |
| | | |
| | | |
| |
| | | |
| close | | | | |
| | | | |
| |
| | | |
Take user to alternative page | |
| | | |
| |
| | |
| | |
| | | |
| | |
| | |
| | |
| | close
| close | |
close |
| | close | | close
| close | |
34
login DoRegistration authentication Account model Student model
registerform
manger
Enter(un,pass)
Check user(un,pass)
Validate()
Do select(un,pass)
Close()
success
Close()
Fill form() Close()
Do register()
Do insert(in put value)
Validate()
View update() Success()
Successful registered
Close()
Close() Close()
Close()
Figure 5Sequence diagram for register student
35
login reportpage displayreport authentication reportcontroller doreportdisplay account cafeteria
manager
request
Success()
|
| Validate()
| Load()
| |
Filldata() |
| |
Create() | |
Submit()| | | |
| | Validate()
| |
| | Generate()
| |
| | | Success() |
| | | |
| | | Validate() |
| | Load() |
| |
| | | | |
| | displayreport
| | |
| | |
| | |
| | |
| | |
| | | Success() | | |
| | |
Report() | | |
| | | |
| | |
| | | |
| | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
|
| | | | |
|
| | | |
| |
36
manager loginform Update form Search form Account controller Update controller Search controller :account :updatetable :student
Request()
Validate()
Success()
Validate()
Load()
Enterid()
Check(id)
Validate()
Search()
Success()
validate()
Loadupdate()
Filldata()
Check()
Validate()
Update()
Success()
Updated() Validate()
37
login homepage authentication Viewcomment account comment
manager
Success()
Validate()
Load()
Fetchcomment()
Success()
Send()
Validate()
View comment()
38
manager :login :ServeStudent :StudentDetail:AuthenticationDoserveStudent DoDisplay :Account :Student :Service
1.request
Authenticate()
success()
validate()
loadsspage()
Showid()
ReadId()
validate()
Check()
Success()
SDloaded Create()
Checked()
DetailDisplayed()
Success()
39
homepage login News form authentication Dopost account
manager
Username, password and usertype
Validate()
Check()
Validate()
Success()
Validate()
Filldata()
Create()
Postnews()
Notify()
40
2.12 Activity diagrams
Activity diagram is another important diagram in UML to describe dynamic aspects of the
system. Activity diagram is basically a flow chart to represent the flow form one activity to
another activity. The activity can be described as an operation of the system. So the control flow
is drawn from one operation to another. This flow can be sequential, branched or concurrent.
Activity diagrams deals with all type of flow control by using different elements like fork, join
etc.
The following activity diagrams are specified in the new system of Barcode enabled HU
cafeteria system.
Not valid
Verify Data
Valid
Display Userpage
End
41
yes Get RegisterationForm
Browse Website Display Homepage Logged In
Start
No
Fill Form
Click RegisterButton
valid
Register Student
End
42
yes
Display Login Page LogedIn
OpenUpdateForm Entrt Searching
Value
Start
no
incorrect
Check value
correct
correct
Update Student Fill Data Display Update
Form
incorrect
43
Browse Website Display Homepage Display LoginForm Logged In Yes Get ReportForm
Start
No
Fill ReportForm
Invalid
Click GenerateButton
Verify Form
End Valid
Generate Report
44
Browae Homepage DisplayLoginPage LogedIn Yes
OpenNews
PostForm
Start No
ENterNews
End
Post news
45
Display Homepage DisplayLoginFrom LogedIn
Start
No
Yes
incorrect Open Ticking Page
Generate student
Information
correct
Student show id
Update db
matched
Scan id
End unmatched
Figure 16Serve student activity diagram
46
2.13 State Chart Diagrams
State-chart diagram is one of the five UML diagrams used to model dynamic nature of a
system. They define different states of an object during its lifetime. And these states are changed
by events. So State-chart diagrams are useful to model reactive systems. Reactive systems can be
defined as a system that responds to external or internal events.
State-chart diagram describes the flow of control from one state to another state. States are
defined as a condition in which an object exists and it changes when some event is triggered. So
the most important purpose of State-chart diagram is to model life time of an object from
creation to termination.
47
The state chart of our system is as followed:
Successful completion
Confirm log in
48
Initial state
User activate
Display home Enter(un and pass) Login Normal exit
Idle Verify
page form
Choose file
To register
49
User actives Enter(un and pass) Normal exit
Initial state
Display home
Idle Login form verify
page
Click on generate
Not normal exit reject report
Completion of state
generate
50
initaite Manager activate Enter(un,pass)
Normal exit
DISPLAY LOGIN FORM VALIDATION
IDLE HOME PAGE
Not normal exit
check
Choose update
reject
display
Search form
Not match
Value match
Click on search
Display
Completion state
Update form
Fill data
Update
s
51
Initial state activates Normal exits
IDLE Login form verfiy
Choose tick (
Scan) ID
Completion state
Log out
52
2.14 Key Abstraction with CRC Analysis
Class Responsibility Collaborator (CRC) Modeling is a method to gather and define the user
requirements for an object-oriented application. The output of CRC Modeling is a CRC model
which is a collection of CRC cards that represent the whole or part of an application or problem
domain.
53
2.15 Conceptual: modeling class diagram
In object oriented system Analysis, Real world concepts are modeled into objects. Conceptual
modeling here by allows us to model these concepts which later involve in to a complete class
models. A class is a set of objects that share a common structure and a common behavior (the
same attributes, operations, relationships and semantics).A class is an abstraction of real world
items.
54
2.16 User Interface Prototype
Input fields
Input fields
55
Login UI Prototyping
E-mail id Password
Change password
Confirm password
Input field
56
Figure 27 User interface of home page
57
Figure 28 Registration form user interface
58
CHAPTER THREE: DESIGN
3.1 Introduction
System design is the transformation of the analysis model into a system design model. System design
is the first part to get into the solution domain in a software development. This chapter focuses on
transforming the analysis model into the design model that takes into account the nonfunctional
requirements and constraints described in the problem statement and requirement analysis sections
discussed earlier.
Performance: The system should respond fast with high throughput, i.e. It should perform searching
information, post news, and, registration processing and generating report in a time less than a minute.
Dependability: The office needs the system to be highly dependable. The system should be
robust (forceful) i.e. it should be able to carry on invalid user inputs, fault tolerant, reliable
and available. The system shouldn’t allow non-authorized users to access students’ personal data
or modify.
Cost: The system should be developed, deployed, administered and maintained with minimum
cost possible.
Maintenance: The code for the system should be easily readable, understandable and
should be easily mapped to specific requirements. Means it is platform.
End User Criteria: The system should have simple and understandable graphical user interface
such as forms and buttons which have descriptive names. It should give reliable response for
each user request at least before the session expires.
59
Usability: Usability is the extent to which a product can be used by specified users to achieve
specified goals with effectiveness, efficiency and satisfaction in a specified context of use.
60
3.3.2. Design Class Diagram
A class diagram shows a set of classes, interfaces, and collaborations and their relationships. We
use class diagrams to model the static design view of a system. Class diagrams are also the
foundation for a couple of related diagrams: component diagrams and deployment diagrams.
61
3.3.3. Inheritance Class Diagram
Inheritance class diagram is class diagram that is inherited from design class diagram that have
common properties with each other. It is used to show the relation of two or more classes that
have common properties that are inherited from each other.
62
3.4 Collaboration Diagram
1 start up()
3. create new session()
2 initiaize page 5. enter username
And password
Session
4. create new cookies()controller
11. access success/denied
user Logon screen
6 onlogin click()
9. success/ failure
7. validate nuser(name Cookies controller
And password)
10. validate
8. check user detail()
Authentication
9. respond bool() account
63
2.Enter (u name,pass,user 3. validate()
1. request() type)
Login form
7. Show id() Authentication
ticker 6.Load()
4. Authenticate()
5. successs()
10. check()
13. load ()
11. success()
12. craete()
15. validate()
Display page
13.checked
16. Detail display()
Do display
14. sucess
64
2.Enter (u name,pass,user 3. validate()
1. request() type)
Login form
7. fill data() Authentication
ticker 8. click submit() 6.Load()
4. Authenticate()
5. successs()
10. Validate()
Report page 9. craete() account
17. see result
65
3.5 Layering Class Diagram
A common architectural strategy, layering class model, is to layer the architecture of a system
into several layers. The various layers are represented by the rectangles and collaboration
between layers by the arrows. The primary name of a layer is indicated first, and other common
names in parenthesis.
Authentication Form
Serve Student Form
Register Student Form
Report
Comment
Process Class
Domain class
Student Account controller
Ticker Registration controller
Serve student controller System Class
Cafeteria
Manager
storekeeper
Persistance Class
Database
66
3.6 Component Diagram
In this Diagram components of the system will be wired showing that there is relation among
components, management of the system, database and operations performed on databases such
security issue. This in some extent shows which component or objects will be accessed by whom
and what type of security infrastructures it is using. The diagram is simulated below:
on
rypti
p ort E nc Security
s Re <<infrastructure>>
ces
a Ac ol
D at Report
o ntr
sC
ces
Ac
u nt
cco
Meal Service Management sA
ces Persistence
<<application>> a Ac Account
t <<infrastructure>>
e
a
nc
D
te
s
rsi
nt
pe
tu de
sS
ces
a Ac Student
D at
User Management
<<application>> or
ect
nn
Item l co
em Sq
s s it My
ce
Ac
D ata Mysql
<<database>>
ice
S erv
Store Management nt
de
<<application>> Stu
ss Student Service
Acce
D ata
67
3.6 Deployment Diagram
Deployment modeling is used to show the hardware of the system, the software that is installed
in the hardware and also the middleware that is used to connect the disparate machines to one
and other. It also shows how the software and the hardware components work together.
68
3.7 Persistence Modeling for Object Oriented Database
Persistence modeling is the diagram that shows the relationship between the tables that
interrelated with each other. It also shows self relation of the tables. It is only used for object
oriented database modeling; but for relational database modeling we use Entity Relationship
modeling instead of Persistence to show the relation of tables with each other.
69
3.8 Access Control and Security
Because of our system being multi-user environment, different actors have access to different
functionality and data. During analysis, we modeled this distinction by associating different use
cases to different actors. During system design, we model access by examining the object model,
by determining which objects are shared among actors, and by defining how actors can control
access. Depending on the security requirements on the system, we also define how actors are
authenticated to the system. The following access control matrix shows which user has access to
which function.
Actors Functionalities
manager Has authority to Register student Post news View comment given
create, update, student
delete account and
to generate report,
Has authority to
delete, update and
add item and to
generate report.
70
student Access home page Has the authority to View news Has Write comment
be registered posted by authority
manager to get
service
71
3.9. Appendixes
symbol Description
Actor
System boundary
Decision
Use case
Class
Component diagram
Destroy
Deployment diagram
Note
72
Starting point of activity/state diagram
Xampp server
View of MVC
Controller of MVC
Model of MVC
BR Business rule
Interface
Note
Time Activation
73
Self deligation
Message call
Message return
Horizontal synchronization
Multiplicity many(zero)
Package
Mandatory
Object
Association role
74
Transition
UC Use case
CRC Class Responsibility collaborator
HU Haramaya university
Integrated Development Tool
IDE
UI User Interface
75
3.10. Relevant reference
Mike O’Docherty, (30 JUNE 2002), Understanding System Development with UML
2.0, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester,
West Sussex PO19 8SQ, England
Object-Oriented Analysis and Design Using UML OO-226 Sun Microsystems, Inc.,
4150 Network Circle, Santa Clara, California, 95054, U.S.A.
Scott W. Ambler, The Object Primer, Third Edition, Trumpington Street, Cambridge,
United Kingdom.( http://www.cambridge.org/)
MVC Tutorials given to us by Mr. Abebew Eshetu
76