RAD - Web Based Wosagn Kunetoch MGT System
RAD - Web Based Wosagn Kunetoch MGT System
RAD - Web Based Wosagn Kunetoch MGT System
Institute of Technology
Faculty of Informatics
Department of Information Technology
Project title: - Web based Wosagn Kunetoch Management System for Hawassa Town
Group members
NAME ID No
List of Table..................................................................................................................................................6
List of Figure................................................................................................................................................7
List of Acronyms..........................................................................................................................................8
CHAPTER ONE...........................................................................................................................................1
1. Introduction..........................................................................................................................................1
1.1. Background of the Study.............................................................................................................1
1.2. Statement of the Problem............................................................................................................2
1.3. Objectives of the Project..............................................................................................................2
1.3.1. General Objective.................................................................................................................2
1.3.2. Specific Objectives................................................................................................................2
1.4. Scope of the Project......................................................................................................................3
1.5. Limitation of the Study................................................................................................................3
1.6. Significance of the project...........................................................................................................3
1.7. Methodology.................................................................................................................................4
1.7.1. Data Collection Methodology..............................................................................................4
1.7.2. System Analysis and Design Methodology.........................................................................5
1.7.3. Testing and Deployment Methodology...............................................................................5
1.7.4. Development Environment..................................................................................................6
1.7.5. System Requirement............................................................................................................6
1.8. Feasibility Study...........................................................................................................................8
1.8.1. Economic Feasibility............................................................................................................8
1.8.2. Technical Feasibility............................................................................................................8
1.8.3. Operational Feasibility........................................................................................................8
1.8.4. Political Feasibility...............................................................................................................8
Chapter Two.............................................................................................................................................9
2. Description of Existing System...........................................................................................................9
2.1. Introduction of the Existing System...........................................................................................9
2.2. Proposed System Description....................................................................................................10
2.3. Strength of Existing System......................................................................................................11
2.4. Weakness of Existing System....................................................................................................11
Chapter Three............................................................................................................................................13
3. System Features..................................................................................................................................13
2
3.1. Introduction................................................................................................................................13
3.2. Functional Requirements...........................................................................................................13
3.3. Non-Functional Requirements..................................................................................................14
3.4. Analysis Models..........................................................................................................................14
3.4.1. Use Case Diagrams.............................................................................................................14
3.4.2. Sequence Diagram..............................................................................................................30
3.4.3. Activity Diagram................................................................................................................38
3.4.4. Class diagram.....................................................................................................................49
3.4.5. User Interface Prototyping................................................................................................50
3.4.6. User Interface Design.........................................................................................................51
Reference.....................................................................................................................................................66
Appendixes..................................................................................................................................................66
3
List of Table
Table 1. 1: Hardware Requirement..................................................................................................6
Table 1. 2: Software Requirement...................................................................................................7
4
List of Figure
Figure 2. 1: Death certificate of Existing systems.........................................................................10
5
Figure 3. 40: user interface design of Login page..........................................................................52
Figure 3. 41: user interface design of Register page......................................................................53
List of Acronyms
ICT........................Information Communication Technology
USA......................United State of America
RAM....................Random Access Memory
CPU......................Central Processing Unit
GB........................Giga Byte
GHZ....................Giga Hertz
TB.........................Tera Byte
UTP......................Unshielded Twisted Pair
RJ............................Register Jack
UML......................Unified Modelling Language
UC...........................Use Case
1
CHAPTER ONE
1. Introduction
The age of information has brought lot of opportunities to world which are revealed by
information and communication technology (ICT). The vital role that ICT can play in facilitating
and accelerating socio economic development has been recognized worldwide. Developed
countries such as Canada, Australia and USA have benefited a lot from the opportunities that
ICT brought. On the other hand developing countries like Ethiopia are facing new challenges
with their socio economic development as a result of the upcoming information age.
To satisfy the demand of the current global economic system developing countries have
ICT as a crucial tool and means to eradicate poverty , speed up socioeconomic development,
provide effective and efficient public service implement E- government and speed up good
governance.
Vital Events (Wosagn Kunetoch) management system is the systematic recording of the
occurrence and characteristics of vital events (birth, death, marriage, adoption, and divorces). A
birth certificates is considered as a ticket to citizenship, on the other hand , death certificate is
mandatory proof of relieving a person from the entire social, legal and financial obligation and
supports his/her family members on having the property rights. Marriage and divorce certificates
are also proof officially being married and separated from husband or wife.
1.1. Background of the Study
Vital events (Wosagn Kunetoch) are the events those are main happenings in the life time
like birth, adoption, death, marriage, and divorce. Since these kinds of events are the main
components for any personal profile, they should be registered well.
Despite governmental organization is assigned which is eligible for registering vital events,
still there are people who are using other institutions (hospitals and churches) registrations as
eligible for many purposes. For example using church’s baptizing certificate or hospital’s
vaccination certification as a birth certification.
Currently the office is open for registering events like birth, adoption, marital status (single,
married) and death. According to the office the event registration is carried using paper works,
2
which may lead to data loss.
3
1.2. Statement of the Problem
The way information is secured is weak since paper are prone to be stolen which
result in loss of information.
The manual system takes time in which number of customer to be served per days.
The manual system is hard to update the vital events information.
It is difficult to generate report.
Paper can be damaged easily by accidents.
Data is not well organized in those area difficult to analyze statistically.
It is also difficult to find information about users when it’s needed because they don’t
have access to any automated system.
When we see the forms registrars may forget to fill spaces and leave them empty this
leaves data incomplete.
In the manual system duplication of data is occurred.
Errors that occur on papers cannot be corrected easily also it affect economically.
4
1.4. Scope of the Project
The system will do registration of birth, adoption, marriage, divorce, and death.
The administrator post News about vital events.
Events will have their own form to register and can be viewed by actors that have
privilege.
Update the customer’s information.
This system will have well organized central database that is accessible by every
stage employees.
The system will generate report and give printed certificate if it is necessary.
The administrator has the privileges to create and deactivate manager account.
The manager has the privileges to create and deactivate officer account.
The resident create account themselves.
Resident Sends request to the officer to get a printed certificate.
Save time,
5
Avoid workload of employees,
Avoid decentralized of information in different area such as (church, hospital),
Avoid data lost and increase accuracy of data.
After completion of this project, the system will provide benefits to different users such as
Customers: -They will save time since they served quickly than the previous system. It
also use customer to store data as secure in computerized manner.
Employees: - The vital event registration workers will get a simple and helpful tool
during retrieve, updating data, register event.
Company: - The administration will be benefited because it able to control all vital
events in centralized and computerized manner.
1.7. Methodology
Observation: This technique is the most reliable fact finding techniques because we use this
method when observing the existing vital events (Wosagn Kunetoch) management system done
by employees. We have observe the following about the existing system:-
6
Hawassa town. We have also interview Sidama National Regional State Vital Events registration
Agency Director of Educational and Training Directorate Ato Frew. We also asked some
question about the existing system like:-
The reason why we selected object oriented system development is because it has the following
advantages.
A. Hardware Requirement
The Followings are hardware requirements for developing the system such as:
Client Server
RAM 4GB 8 GB
8
B. Software Requirement
The Followings are Software requirements for developing the system such as:
C. Programming Language
We will use different types of programming languages to implement or change our system from
document to practice. The system that we are going to develop must be user interactive, easy to
understand, and interesting to use in order to achieve those features we will use the following
programming language.
9
1.8. Feasibility Study
Feasibility studies are conducted in our project development. The aim of this study is determine
whether or not the new system is feasible in different feasibility study such as economic,
technical, operational and political feasibility.
The system in which we are developing is also compatible to all operating systems and web
browsers. So our proposed system is operational feasible.
10
Chapter Two
2. Description of Existing System
2.1. Introduction of the Existing System
The existing system try to reach users from federal to Keble in every stage there is vital event
registrar with employees that are responsible for every action. The registration starts from Keble.
In Keble the registration is done by the Keble manager with help of nominators. These
nominators have their own responsibility which is to give information for the Keble manger if
there is new vital event (birth, adoption, death, marriage and divorce.) with in Keble. Then data
is copied within four papers called honour files and sent it to region and other stages. Within
every office (regional, federal and one for central statistics agency) they take one copy from
every type of vital event registration papers for themselves. The Ethiopian federal vital event
registration agency has many responsibilities including print the registration papers (honour files)
and distribute them to regions.
For peoples that live out of Ethiopia there are organizations that are responsible for registration
of vital events like (defense ministry of Ethiopia, foreign ministry of Ethiopia and Ethiopian sea
transportation and logistics service organization) this organization register vital events and send
to federal vital event registration agency
If someone wants to register vital events he or she needs to have Keble identity card and if it is
birth event the parents of the child should appear physically to the registrars and get registered. If
parents are not alive or cannot go to the registrars because of work or other reasons the person
who is responsible for the child must appear and register but he or she should have delegation
paper from courts.
All vital events has its own certificate form. For example form used for Death certificate is
shown below in the figure.
11
Figure 2. 1: Death certificate of Existing systems
12
2.3. Strength of Existing System
The Existing System has the Following Strength:-
It creates opportunities to work because it needs number of workers since it works manual.
No cost of electronic devices and other costs like internet connection.
Information become centralized in one office. Means existing system ignore certify event
from other institutions like (hospital, churches).
All peoples use the system because of there is no need of electronic device knowledge.
It increase the human interaction.
Have Problem in data Storage and management: In the current system data are stored in a
paper form, due to this reason it is very difficult to store and manage papers data by the
current Wosagn Kunetoch management system. If the number of paper data is huge it is
tedious to manage that data by human beings. Therefore, proper and systematic database
should be used to store these data and to allow user to manage data efficiently and
effectively.
Problem in data security: Data management and storage are most common issues of
security, in the current manual system, there is no any types of software security rather it has
only physical security. The current system has no software security therefore it leads
sensitive data to be changed or lost. The current system has no authentication method to
identify who is the correct authorized user.
Performance and Response time: The current system has low performance and response
time because the system does not use machine (mobile and computers) to facilitate their
work.
Problems in data back upping: back upping of data are difficult because the data is
organized in a paper form so to back up such types of data there must be a room to store
paper data. When the paper data is large it is difficult to back up all data in a room.
Problem in information retrieval: the information retrieval is very less this is due to the
problem of not having computerized and centralized database to retrieve information to some
13
body that wants to access the information or data.
14
Problem in economic: lots of money is spent on paper print, pens, record books so and so
on.
Problem in time:- recording of data is very time consuming due to the operation of
existing system are operated by manual system. Writing everything on paper is also time
consuming.
Problem to generate report: - it is difficult to generate report.
Problem in paper formulation: - peoples may leave empty space on the registration papers.
15
Chapter Three
3. System Features
3.1. Introduction
This chapter outlines the functional and non-functional requirements of the system. It also
demonstrates the requirement elicitation of the system using system models which include the
use case diagram, class diagram, sequence diagrams and activity diagram.
3.2. Functional Requirements
Functional requirements are the description of the facility or feature required. Functional
requirements deal with what the system should do or provide for users. They include description
of the required functions, outlines of associated reports or online queries, and details of data to be
held in the system.
Our system has the following Functional requirement.
The system should allow the user to login to the system.
The system should allow the user to create account for users.
The system should allow the user to lock account of users.
The system should allow the user to update account of users.
The system should allow the user to unlock account of users.
System should allow Generate report based on the activities.
The system allows View report.
The system should allow Register event based on customers’ information.
The system should allow View event.
The system should allow Give certificate based on registered event.
The system should allow Add news.
The system should allow Update news.
The system should allow View news.
The system should allow Logout.
The system should allow send Event request to get certificate.
The system should allow communication between users.
16
3.3. Non-Functional Requirements
Nonfunctional requirement is the second type of requirements that describe invisible aspects of
the system and additional quality of system. Such as accuracy, maintainability, portability,
reliability, performance, graphical user interface, and etc.
Accuracy: The system will be accurate to search; update, register and login to system and
user get correct and real information.
Security: The new user should allow login for authorized user who has an account. The
system should allow password must be encrypted when it is placed in the data base.
Availability: The availability of system will be for everyone who has an internet connection.
The system will be available for 24 hours.
Accessibility: Since the new system is web based it can access easily
Correctness: The result of function should be correct and accurate.
Maintainability: The new system can maintain when the problem will occur. After the
deployment of the project if any error occurs then it should be easily maintained by the
system developer.
Performance: The proposed system performs tasks and produces an output with in short
period of time. That means it take short response time to perform all activities such as
retrieve, register information. The system shall minimize errors and should display clear error
message that guides users there will be various way of retrieving data and it shall take less
time.
User Interface: The user interface should be user friendly and attractive graphical user
interfaces that ease to use and learn the system.
17
Actors
Officer
Manager
Administrator
Resident
Use Case
Login Send Request
Register Event Change Password
Update Event Lock Account
See Event Unlock Account
Give Printed Certificate See Report
Search Resident Add Kebele
Send Message Post News
View Message Update News
Generate Report Delete News
Create Account Logout
18
Below is the use case diagram for Web based Wosagn Kunetoch Management System for
Hawassa Town.
19
Use Case Description
Login
Use case Number UC-01
Use Case Name Login
Actors Officer, Resident, Manager, and administrator.
Description This use case describes how each user login into the System.
Precondition All user must have previously created account.
Post condition If the use case was successful, the user is now logged into the
system. If not, the system state is unchanged.
Normal flow of 1. The users open system.
events 2. The user click login button.
3. System displays the login form.
4. The User enters user name and password and click login
button.
5. The system verifies the password and username.
6. The system logs in the user.
7. Use case end.
Alternative flow of If user simply click login button without enter password and
event name
Please enter the username and password Message displayed.
If user enter incorrect password and username
Invalid username and password combination message display
Use case end.
20
Register Event
Use case Number UC-02
Use Case Name Register Event
Actors Officer
Description The use case is about registering new event
Precondition A user must be logged as an officer.
Post condition New event is registered on the database
Normal flow of 1. Officer click add event button.
events 2. System Display alternative to select event type.
3. Officer select event type.
4. System displays event form
5. Officer fill information and click register button.
6. System validate the entry and register event in the database.
7. Use case end.
Alternative flow of If user enter invalid data
event Please enter correct data message displayed
Use case end.
Table 3. 2: Register Event use case description
Search Resident
Use case Number UC-03
Use Case Name Search Resident
Actors Officer
Description Searching the information from the database.
Precondition The user must be logged in first.
Post condition Get the search information.
Normal flow of 1. User click search button
events 2. System display the form.
3. Fill the entry to search.
4. System check and display the event information
21
5. Search event successfully.
6. Use case end.
Alternative flow of If the required information is incorrect
event Fill the information again message displayed
Use case end.
Table 3. 3: Search Resident Use case Description
Update Event
Use case Number UC-04
Use Case Name Update Event
Actors Officer
Description Update the customer information in the database.
Precondition Officer logged in first and customer information must be exist.
Post condition The customer information updated.
Normal flow of 1. Officer click update button.
events 2. System display search form.
3. Officer select event type to update and enter required
information.
4. System search and displays the result in the selected event
type to update.
5. System display search result.
6. Officer select the event to update.
7. System display event update form.
8. Officer enter new information and click update button.
9. System validate the information.
10. System update and save on the database.
11. Use case end.
Alternative flow of If the required information is incorrect
event No result found try again message display.
If user enter incorrect information.
22
The inputs are invalid please enter correct data message displayed
Use case end.
Table 3. 4: Update Event Use case Description
Create Account
Use case Number UC-05
Use Case Name Create Account
Actors Resident, Manager, Administrator
Description Describe how to create account.
Precondition Some user must logged in first and Resident without logged in
first.
Post condition Create account.
Normal flow of 1. Click create account button.
events 2. System display form.
3. Fill the information and click submit button.
4. System validate the information.
5. System register the information to the database.
6. Successfully account create.
7. End use case.
Alternative flow of If the required information fill is incorrect.
event please try again message display
Use case end.
Table 3. 5: Create account use case description
Lock Account
Use case Number UC-06
Use Case Name Lock Account
Actors Manager, Administrator
Description Describe how account to be locked
Precondition User must previously must have account.
23
Post condition Account become locked.
Normal flow of 1. User click account button.
events 2. System display list of user form page.
3. User select the user account to be locked.
4. User click Lock button.
5. System lock account from database.
6. The system displays successful locked user account message.
7. Use case end.
Alternative flow of If the required information fill is incorrect.
event please try again message display
Use case end.
Table 3. 6: Lock Account use case Description.
See Report
Use case Number UC-07
Use Case Name See Report
Actors Manager
Description Describe how the user see report.
Precondition User must logged in and report must be present previously
Post condition User see report.
Normal flow of 1. User opens the see produced report page.
events 2. System displays the produced report.
3. User see the report.
4. Use case end.
Table 3. 7: See Report use case Description.
Generate Report
Use case Number UC-08
Use Case Name Generate Report
Actors Officer
24
Description Describes how to generate report.
Precondition User logged in first
Post condition Generate report.
Normal flow of 1. User click generate report button.
events 2. System display page.
3. User fill the information.
4. System validate the information.
5. System save it to file.
6. Generate report success message displayed.
7. Use case end.
Alternative flow of If option form fill incorrect.
See Event
Use case Number UC-9
Use Case Name See Event
Actors Officer, Manager
Description Describe how user see event.
Precondition First register event must exist
Post condition Event saw by user.
Normal flow of 1. Click see event button.
events 2. System display alternative to select event type to see.
3. User select event to see.
4. System show the information.
5. Use case end.
Table 3. 9: See event use case Description
25
Give Certificate
Use case Number UC-10
Use Case Name Give Printed Certificate
Actors Officer
Description Describe how to give Printed certificate.
Precondition User logged as Officer and event must be registered.
Post condition Give certificate to the customer.
Normal flow of 1. Officer click give certificate button.
events 2. System display search form.
3. Officer select event to give certificate.
4. Enter required information.
5. System search and display the result in the selected event
type.
6. Officer select event to give certificate.
7. System display certificate preview.
8. Officer click print button.
9. System print the Certificate.
10. Use case end.
Alternative flow of No result found please try again. Message displayed.
event Use case ends.
Table 3. 10: Give Printed Certificate use case Description
Change Password
Use case Number UC-11
Use Case Name Change Password
Actors Officer, Resident, Manager, Administrator.
Description Describe how to change password of the users.
Precondition User must have account previously.
Post condition Users change password
26
Normal flow of 1. Click change password button.
events 2. System displays form.
3. Fill the information.
4. Press change password button.
5. System validate the information.
6. System update information on the database.
7. Success message display.
8. Use case end.
Alternative flow of Invalid input. Please try again message displayed.
event Use case ends.
Table 3. 11: Change Password use case Description
Unlock Account
Use case Number UC-12
Use Case Name Unlock Account
Actors Manager, Administrator
Description Describe how to Unlock account.
Precondition User must logged in as an administrator and as a Manager and
account has exist.
Post condition Unlock account.
Normal flow of 1. Click unlock account button.
events 2. System display page.
3. Administrator select locked account and click unlock button.
4. System unlock the account.
5. Success message display.
6. Use case end.
Table 3. 12: unlock account use case Description
27
Logout
Use case Number UC-13
Use Case Name Logout
Actors Officer, Resident, Manager, Administrator
Description Describe how to logout from the system
Precondition User must logged in to the system.
Post condition User logout from the system.
Normal flow of 1. User click logout
events 2. System return to login page
Table 3. 13: Logout use case Description
Post News
Use case Number UC-14
Use Case Name Post news
Actors Administrator
Description Describe how Administrator post news
28
Update news
Use case Number UC-15
Use Case Name Update news
Actors Administrator
Description Describe how Administrator update news.
Precondition User must logged as administrator and news must be posted
before.
Post condition News will be updated.
Normal flow of 1. Administrator click news button.
events 2. News page display.
3. Administrator clicks edit button on the news to be updated
from news table.
4. System display form.
5. Admin fill information and click update button.
6. System validate the input.
7. System update the news to database.
8. Success message display.
9. End use case.
Alternative flow of Enter the required form is incorrect please try again message
event display
Use case end
Table 3. 15: update news use case Description
Delete News
Use case Number UC-16
Use Case Name Delete news
Actors Administrator
Description Describe how Administrator delete news.
29
Precondition User must logged as administrator and news must be posted
before.
Post condition News will be deleted.
Normal flow of 1. Admin click news button.
events 2. News page displayed.
3. Admin clicks delete button on the news to be updated from
news table.
4. System displays confirmation dialog.
5. Administrator choose delete button.
6. System deletes the news from the database.
7. Success message displayed.
8. End use case.
Alternative flow of Error! Cannot open the data base please contact system
event administrator message displays.
Use case end
Table 3. 16: delete news use case Description.
Add Kebele
Use case Number UC-17
Use Case Name Add Kebele
Actors Manager
Description Describes how to add Kebele
Precondition User must be logged in as a manager
Post condition Kebele will be added
30
Normal flow of 1. Manager click add Kebele button.
events 2. System displays the form.
3. Manager fill the information and click submit to add Kebele.
4. System validate the submit information.
5. Success message display.
6. Use case end.
Send Request
Use case Number UC-18
Use Case Name Send Request
Actors Resident
Description Describe how Resident send request to get certificate.
Precondition User must logged as Resident.
Post condition Request is send
Normal flow of 1. Resident click request button.
events 2. System display event alternative.
3. Resident select Event Type
4. System displays event forms
5. Resident fill the information and click send button.
6. System validate the input.
7. System save the input in the database.
8. Success message display.
9. End use case.
31
Alternative flow of If user fill incorrect information
event Enter the required form is incorrect please try again message
display
Use case end
Table 3. 18: Send Request use case Description.
32
Send Message
Use case Number UC-19
Use Case Name Send Message
Actors Officer
Description Describe how user send message.
Precondition User see the request.
Post condition User send message
Normal flow of 1. Click send message button.
events 2. System display pages
3. Select users.
4. Write message and click send button.
5. System validate the message.
6. System sends message to the user.
7. Send message successfully.
8. End use case.
Alternative flow of incorrect input please try again message display
event Use case end
Table 3. 19: Send Message use case Description.
View Message
Use case Number UC-20
Use Case Name View Message
Actors Resident
Description Describe how to view message.
Precondition First message must be exist.
Post condition User view message
Normal flow of 1. User open the message page.
events 2. System display the message.
3. User see the message.
4. Use case End
Table 3. 20: View Message use case Description.
33
3.4.2. Sequence Diagram
The sequence diagram of our system is used primarily to show the interactions between objects
in the sequential order. The main purpose of a sequence diagram is to define event sequences
that result in some desired outcome. Our Sequence diagrams are shows graphically how objects
interact with each other via messages in the execution of a use case or operation. The sequence
diagrams for the above sequence of actions are done as follows.
Login
34
Create Account
Register Event
35
Search Resident
Give Certificate
36
See Event
Logout
37
Change Password
Generate Report
38
See Report
Lock Account
39
Unlock Account
Post news
40
Update News
Delete News
41
3.4.3. Activity Diagram
Activity diagrams are used to show how different workflows in the system are constructed, how
they start and the possibly many decision paths that can be taken from start to finish. They may
also illustrate where parallel processing may occur in the execution of some activities.
Login
42
Create account
Lock Account
43
Register Event
Logout
44
Search Resident
See Event
45
Update Event
46
Give Printed certificate
Generate Report
47
See Report
Post News
48
Delete News
Update News
49
Change password
Unlock Account
50
Add Kebele
Send Request
51
Send message
View Message
52
3.4.4. Class diagram
Class diagrams show the static structure of the model, in particular, the things that exist (such as
classes and types), their internal structure, and their relationships to other classes.
53
3.4.5. User Interface Prototyping
Wosagn Kunetoch Management System website has user friendly user interfaces for its users. It
eases interaction and understanding of the system for different users from their electronic
devices. There are many services in the System The overall structure of the application is
relatively simple, as shown in the following diagram.
54
3.4.6. User Interface Design
User interface design is the overall process of designing how a user will be able to interact with a
system. The goal of user interface design is to make the user's interaction as simple and efficient
as possible, in terms of accomplishing user goals.
Some of our designed interfaces are listed below:-
Home Page Interface
55
Login Page Interface
56
Register Page Interface
57
Reference
1, Federal negarit Gazeta of the federal democratice republic of Ethiopia, 19th year No 13
Addis Ababa 31’nd December, 2012.
Appendixes
Question for Vital Event Registration Agency:-
58
Got Documents image
59
60
61