Kebele Managemnet System One
Kebele Managemnet System One
FACULITY OF TECHNOLOGY
DEPARTMENT COMPUTER SCIENCE
Advisor: Mr.______________
BY
NAME ID NO
This is to confirm that the project report entitled web based Kebele Management System for Ginba
city, 01 tuluawuliya kebele, in the institute of technology department of computer science in partial
fulfillment of the requirement for the award of the degree of Bachelor of Science in computer science
is an original work carried out by group members, under my guidance. The matter embodied in this
project is reliable and is genuine work done by the student and has not been submitted whether to this
University or to any other University /Institute for the fulfillment of the requirement of any study.
Project Title: Web Based Kebele Management System for 01 tuluawuliya kebele, ginba city
This is to certify that we have read this project and that in our opinion it is fully adequate, in scope and
quality, as a project for the degree of Bachelor of Computer Science.
It is approved that this project has been written in compliance with the formatting rules laid down by
the department.
ACKNOWLEDGEMENTS
First of all, we would like to thank GOD for giving us strength and health to do this project. Secondly
we would like to thank to our advisor Mis. Feven and Co-advisor, Mr. Girmaye for their motivation
and guidance. We would like to forward our special thanks to 01 tuluawuliya administrator, Mr.
Abebe. We also thank to our department head Mr. Kbede for giving us a clue and recommendation
letter to gather information from 01 tuluawuliya administrator. Finally, we want to thank to our
parents for their encouragement and support throughout our study.
Table of Contents
Acknowledgements.....................................................................................................................................3
LISTS OF FIGURES..................................................................................................................................III
LISTS O TABLES.....................................................................................................................................IV
ACRONYMS/ABBREVIATION...............................................................................................................V
1 CHAPTER ONE: INTRODUCTION..................................................................................................1
1.1 Back ground.................................................................................................................................1
1.2 Motivation...................................................................................................................................1
1.3 Statement of the Problem.............................................................................................................1
1.4 Objective of the Project...............................................................................................................2
1.4.1 General Objective................................................................................................................2
1.4.2 Specific Objective................................................................................................................2
1.5 Literature Review........................................................................................................................2
1.6 Scope and Limitation of the project.............................................................................................3
1.6.1 Scope of the project.............................................................................................................3
1.6.2 Limitation of the project......................................................................................................3
1.7 Methodology................................................................................................................................4
1.7.1 Data Collection Technique...................................................................................................4
1.7.2 System Analysis and Design Methodology..........................................................................4
1.8 System Development Model........................................................................................................5
1.9 System Development Tool...........................................................................................................6
1.9.1 Hardware Tool.....................................................................................................................6
1.9.2 Software Tool......................................................................................................................6
1.9.3 Documentation Tools...........................................................................................................7
1.10 Significance of the project...........................................................................................................7
1.11 Feasibility study...........................................................................................................................7
1.11.1 Operational feasibility..........................................................................................................7
1.11.2 Technical feasibility.............................................................................................................7
1.11.3 Economic feasibility............................................................................................................8
1.12 Work Breakdown structure and Schedule feasibility...................................................................9
Mekdela Amba University Computer Science Graduate Students (2015EC). Page III
LISTS O TABLES
Table 1-1 Hardware Tool.................................................................................................................6
Table 1-2 Software Tool..................................................................................................................6
Table 1-3 Documentation Tool........................................................................................................7
Table 1-4 Proposed System Cost Estimation...................................................................................8
Table 1-5 Existing System Cost Estimation....................................................................................9
Table 1-6 Time schedule.................................................................................................................9
Table 2-1 Use case Description for Login.....................................................................................16
Table 2-2 Use case Description for create account.......................................................................17
Table 2-3 Use case Description for De-activate account...............................................................18
Table 2-4 Use case Description for activate Account...................................................................19
Table 2-5 Use case Description for Change Password..................................................................20
Table 2-6 Use case Description for Give ID.................................................................................21
Table 2-7 Use case Description for Renew ID..............................................................................22
Table 2-8 Use case Description for Give Marriage Certificate.....................................................23
Table 2-9 Use case Description for Give Birth Certificate............................................................24
Table 2-10 Use case Description for Give Divorce Certificate.....................................................25
Table 2-11 Use case Description for Give Death Certificate........................................................26
Table 2-12 Use case Description for Post News...........................................................................27
Table 2-13 Use case Description for Generate Report..................................................................28
Table 3-1 Access control and Security..........................................................................................50
Kebele is generally defined spatially as a specific geographic area and functionally as a set of
social community. Then, kebeles are the spatial units in which face-to-face social interactions
occurs the personal settings and situations where residents seek to realize common values,
socialise youth, and maintain effective socials. Each kebele consists of at least five hundred
families, or the equivalent of 3,500 to 4,000 persons. Things to dividing the kebele can be
measured forthe amount of human resources, budget, location, ways of control in which it can be
devide.
Woldia town has 3 Kebeles since 2001 E.C. After 2002 E.C The number of kebeles becomes 6
and each kebele is administered by Woldia town. So, Debre Gelila, Yeju Genet, Tinfaz, Defergie
Kibikalo, Admas Bashager, Addis Ketema kebeles inside the town.[4]
1.2 Motivation
We are lived above 5 years in ginba city, 01 tuluawuliya kebele and for many situations we have
the chance to see how they perform their activities, the way they handle files and the way of
services delivering of customers.
In this process we understand so many problems like customer lots of time and resource, work
load for employees and difficulties for file handling and searching. So in these cases we are
motivated to develop web based kebele management system for 01 tuluawuliya kebele.
Currently, there is no web based kebele management system for thios kebele, and in the city; due
to this there is wastage of time and cost to handle the problems such as registration of Id, renew
id, vital certificates like (mirraige, birth, death, divorced) and so on.
In order to achieve the general objective of this project we will address the following specific
objectives.
From what we were interviewed and gathered information from ginba city, 01 tuluawuliya
kebele as the chairman of the kebele told us still now there is no computerized system regarding
to the kebele not only 01 tuluawuliya kebele and kebeles in the city, but also in other kebeles
which are found in Amhara Region. So we have taken the guide line of the form what they are
used in the existing paper based system and we try to automate the existing system in to
computerized one.
Due to the above reason we have taken a decision to develop this system to solve the problems
which are found in the all in this kebele such as; register Id, register renewal Id, vital registration,
to minimize work load for the employees, to keep residences information permanently and
finally reduce the wastage of resource such as time, cost...
When a person goes to the kebele administration to retrieve or renew ID, he first goes to the
kebele manager's office and then the manager leads him to register for the record officer and
payment to finance. The manager will sign it and give it to him. [4]
The scope of this project focuses mainly on functional aspects of Kebele management system
Our analysis will not include some activities which are related with the Kebele: -
1.7 Methodology
1.7.1 Data Collection Technique
Data collection is the most important part of the project to find the main requirement of the
system and to understand how the system does. We have used different methods to collect data.
Among the methods, we used the following:
We use the object oriented approach which examines requirements from the perspective of the
class and objects found in the problem domain. The reasons that we use the object oriented
approach are:
We can inherit properties of the class that are defined in the super class.
We can reuse methods for avoiding redundancy.
The data and functions are encapsulated in the objects that help us for easily
debugging purpose.
It enables us to comprehensively model a system before we develop it.
Iterative model requires less time to design and to write document this means, we can start
implementation in early stage and back to requirement analysis at any stage if needed, because it
allows going backward and forward at any time. For example when we are doing something in
chapter two and error occurs in chapter one or any other chapter we can easily handle that error.
[2]
1. Planning Phase: This is the first stage of the iterative model, where proper planning is done
by the team, which helps them in mapping out the specifications documents, establish software
or hardware requirements and generally prepare for the upcoming stages of the cycle.
2. Analysis and Design Phase: Once the planning is complete for the cycle, an analysis is
performed to point out the appropriate business logic, database models and to know any other
requirements of this particular stage. Moreover, the design stage also occurs in this phase of
iterative model, where the technical requirements are established that will be utilized in order to
meet the need of analysis stage.
3. Implementation Phase: This is the third and the most important phase of the iterative model.
Here, the actual implementation and coding process is executed. All planning, specification, and
design documents up to this point are coded and implemented into this initial iteration of the
project.
4. Testing Phase: After the current build iteration is coded and implemented, testing is initiated
in the cycle to identify and locate any potential bugs or issues that may have been in the
software.
5. Evaluation Phase: The final phase of the Iterative life cycle is the evaluation phase, where the
entire team along with the client, examine the status of the project and validate whether it is as
per the suggested requirements.
This is a measure of how beneficial and practical development of the system which we want to
develop is studied. Measures time completion of the system, cost estimation and how much the
system is effective and it is also what benefits person, organization, populations and company get.
Feasibility study is a test of system proposal according to its workability, impact of the
organization, ability to meet needs and effective use of the resources. To consider this
feasibility we categorize as follows [2].
The system to be developed will provide accurate, active, secured service and decreases labor of
workers and also it is not limited to particular groups or body. And also it is platform independent
i.e. it run’s in all operating system. This makes our system feasible operationally.
The technically feasibility of this system is to overcome the technical bug or error of the previous
system. Some of the technical feasibilities of this system are:-
The system will be developed using the object oriented development technique, so
the team members have enough knowledge of methodologies and tools to develop
this system.
Manpower: The proposed system will be friendly. Thus there is no requirement of highly
qualified staff in computers requiring. Anyone will understand easily only by giving little
training. Therefore the proposed system is financially feasible.
When we are looking towards the Economic feasibility of the system and also the system
constraints, we will develop the system using the existing resources. Reduce human labor
(money spend for payment reduced as the number of employs decrease). Generally in economic
feasibility the tangible and intangible benefits are considered. The following issues will use to
estimate the economic feasibility of the proposed system:
Hardware and Software Cost: The system needs no more complicated hardware and complex
software to install our system. Therefore the organization no needs to pay additional cost. This
will make the system economically feasible. Generally our proposed system cost estimation is
described in table 1.4 below
Time schedule is the most important consideration in the development of any project. The time
schedule required for the development of this project is very important since more development
time affect efforts; cost and cause delaying development of other system.Preparation of the
system will finish within given time interval.
Time
Oct 25 -
Mar 12-
May16-
e2017-
Mar 10
Apr26-
May15
Apr 25
Nov10
June1
20D
Nov
Jan
Project Proposal
Requirement Analysis
System Design
Implementation &Coding
Testing
project Defense
Software development life cycle encompasses the phases that a software developer goes through
when developing new software, it consists of five phases. Finding the domain problem is one of
the phases its aim is finding the analysis the domain problem of the current system, helps the
developer refine and structure the functional requirements. In the previous chapter we described
the background of the system, the problem of the current system, scope of the system, and the
feasibility of the system. In this chapter we will describe the detail overview of the current
system, problem of the current system, functional and nonfunctional requirement of the system,
business rules of the organization that helps to perform their activity efficiently and effectively
and analyzing the new system using different object-oriented UML modeling diagrams such as
Use case diagram, sequence diagram, class diagram, activity diagram and ER-diagram of the
system database [4].
The current existing system is the Kebele Management System for 01 tuluawuliya kebele has
been done manually. This includes registration of Id and renew id, generate report, register vital
certificate are some important task and base for information to make plan for the society.
The Kebele has its own administrative rules to manage the society. Each person in the Kebele
must follow the principle of the Kebele. A person who wants to register and get other services in
the Kebele must fulfill the following criteria:
This is the result of lack of computerized system. When the project team was analyzing the
existing system, the team has tried to study the detailed nature and procedure of the tasks and
operations. The project team analyses the existing system problem as.
The proposed system is an automated kebele management system for 01 tuluawuliya kebele in
ginba city that overcomes the existing system problems by conducting the works of the
organization. This system will develop to overcome mainly the time consumption and less
accuracy when filling forms in the existing system.The major thing in the proposed system is
authenticated users that means, Authorized one only access the system and prevented by user
name and password mechanism.
Hopefully the new system will solve these problems. The general overview of our proposed
system is to address the problem of the existing manual system and solves those entire problems
which are faced in the manual system. The new system able to save time and resources as well as
increases transparency of employees during implementation of kebele management system.
Functional requirements describe the interactions between the system and its environment
independent of its implementation. The environment includes the user and any other external
system with which the system interacts. Some of the functional requirements of this system are: -
System Administrator:
Create accounts
Activate the account
Deactivate the account
View account
Manage Kebele
Kebele Manager:
Give ID
Renew ID
Social Court service
Post news
Record new user
Login into the system and logout
Change password
View Residence
Record officer:
Birth certificates
Divorce certificates
Marriage certificates
Death certificates.
Report generate
Login into the system and logout
Change password
Customers: The customer get service form the kebele and participating in the Kebele issue.
An oval represents a use case such as create, view, give id, activate accounts, generate report etc.
A stick figure represents an actor such as System administrator, kebele manager, record officer,
and customer.
In these system actors interacts with the system to perform meaningful work that helps us to
achieve a goal and has access to define overall role in the system and the scope of their action.
Actors of this system as follows
1. System Administrator: manages the user account and controls the activity of each user.
2. Kebele Manager: The kebele manager login to the system to Generate ID card, clearance,
generat report, Record new user, Social court service and post news.
3. Record officer: The record officer logs in, registration of the marriage, birth, divorced,
death certificates, and generat report.
4. Customer: view post
We have used Use Case to identify, clarify, and organize system requirements. The use case is
made up of a set of possible sequences of interactions between systems and users in a particular
environment and related to a particular goal. It consists of a group of elements (for example,
classes and interfaces) that can be used together in a way that will have an effect larger than the
sum of the separate elements combined.
Login
Manage Account (create, activate, deactivate, view, change password).
Give ID card
Renewed ID card
Giving (mirraige, death, birth and divorce) certificates.
Social court services(poor or not and marriage or not)
Message
Clearance(give and receive)
Record new user
Supportive letter
Generate report
Use case id UC 1
Description The user enters authorized user name and password in order to access
the system.
Use case id UC 2
Description System Admin will Create Account for kebele manager, record officer.
Description The system admin deactivates the users account when the user is out
of the organization.
Pre-condition The System Admin Login to the system and there should be account
with the user out of the organization.
Use case id UC 4
Description The system admin Activates the users account during they back to their
work that has been deactivated.
Pre-condition The System Admin Login to the system and there should be deactivated
account.
Use case id UC 5
Description System Admin Can change passwords for all actors if their password is
lost.
Use case id UC 6
Description Kebele manager can Give ID card for residences that lived more than 2
years and above and if their age is above 18.
Pre-condition The kebele manager has login the system and has an authorization for
giving ID card.
Basic course of 1) The kebele manager click on give ID card menu button
action 2) The system displays give ID card form
3) The kebele manager fills required field.
4) generate Id card.[A]
5) The system verifies that person is resident or not.
6) The system update list
7) The use case ends
Alternative Course A1: If the field is not correctly filled the system displays “please fill
of action A form” and go to step 3.
A2: Use case ends.
Post condition The kebele manager give ID for residences
Use case id UC 7
Description Kebele manager can Renew ID card for residences if their ID card is lost
or blurred.
Pre-condition The kebele manager has login the system and has an authorization for
renewing ID card.
Basic course of 1) The Kebele manager click on give ID card menu button
action 2) The system displays the form of renew ID card form
3) The kebele manager fills required field
4) System validate the required information is correct.[A]
5) The system update list.
6) The use case ends.
Alternative Course A1: If the field is not correctly filled the system displays “please fill
of action A form” and go to step 3.
A2: Use case ends.
Post condition The ID card is renewed.
Use case id UC 8
Description The Record officer can generate certificate for all residences become
married if they live in the kebele or if they have ID.
Pre-condition The Record officer has login the system and has an authorization for
generate Certificate.
Use case id UC 9
Description The Record officer can generate certificate for all residences become
birth if they live in the kebele or if they have ID.
Pre-condition The Record officer has login the system and has an authorization for
generate Certificate.
Use case id UC 10
Description The Record officer can generate certificate for all residences become
divorced if they live in the kebele or if they have ID.
Pre-condition The Record officer has login the system and has an authorization for
generate Certificate.
Use case id UC 11
Description The Record officer can generate certificate for all residences become
death if they live in the kebele or if they have ID.
Pre-condition The Record officer has login the system and has an authorization for
generate Certificate.
Use case id UC 12
Description Kebele manager can post news for residences with email.
Alternative Course A1: If the field is not correctly filled the system displays “please fill
of action A form” and go to step 4.
A2: Use case ends.
Post condition Post News Successfully
Use case id UC 13
Pre-condition The kebele manager and record officer have login the system and has an
authorization for generate Report.
We use sequence diagram to design the interaction between different objects in the system.
Different objects in the sequence diagram interact with each other by passing "messages". A
sequence diagram is made up of objects and messages. Objects are represented exactly how they
have been represented in all UML diagrams as rectangles with the class name within the
rectangle. A sequence diagram shows, as parallel vertical lines (lifelines), different processes or
objects that live simultaneously, and, as horizontal arrows, the messages exchanged between
them. [2]
We use it to refine the use case diagram and define a detailed design of the system. The class
diagram classifies the actors defined in the use case diagram into a set of interrelated classes. The
classes in a class diagram represent both the main objects, interactions in the application and the
classes to be programmed. In this system class diagram describes the structure of a system by
showing the system's classes, their attributes, methods, and the relationship among the classes.
System Adminnistrator
Account
Kebele manager
Record Officer
Marriage, birth, divorce and death
Clearance
Social court service
Id
+ Represent public method
-Represent private method
Entities in ER diagrams are represented in the form of rectangles or rounded rectangles. From
this system the entities are
System Administrator
Kebele manager
Record officer
ID
Account
Certificate
Renew ID
Customer
The diamond shape indicates relationship between from one entity to other entity. The
relationships for this system are
System Administrator attributes are ID, sex, username, password phone number...etc.
Account has attributes like user name, password etc.
Record officer has attributes like ID, sex, name, etc.
We have used the entity relationship diagram to show the entities and their attributes in
the system. The E-R data model is based on aperception of areal world that consists of
asset of basic objects called entities, and of relationships among these objects. There
are three basic notions that the ER Model: entitysets, relationships, and attributes.
3.1.1 Introduction
Web-based Kebele management system design document describes the proposed system in
detail. It also presents the proposed system architecture and decomposition into its manageable
subsystems. It presents the requirement information that is previously dealt in the requirement
analysis part of the RAD (requirement analysis document) in a more simplified and specific way
for the implementation of the new system so that it achieves the system specifications identified
during requirement analysis. This document provides list of design goals, hardware/software
mapping, access control and boundary conditions in addition to presenting the proposed
architecture, its components and the persistent data management. [2]
Generally, the purpose of this design phases is to determine how to build the system and the
information needed to device the actual implementation of the project.
3.1.3 Design Goal
The design goals are derived from non-functional requirements that means non-functional
requirement is the description of the feature characteristics and attribute of the system as well as
any constraints that may limit the boundary of the proposed solution.
Design goals describe the qualities of the system that the developers should consider.
Portability: -The systems operate on desk top and laptop as well as other devices.
Access security: -The user log in password shall not been known by others.
1. Client (Presentation) Tier The client tier is the applications of user interface containing
data entry forms and client side applications. The client tier interacts with the
web/application server to make requests and to retrieve data from the database. It then
displays to the user the data retrieved from the server.
2. Middle (Application) Tier The middle tier (web/application server) implements the
business logic, controller logic and presentation logic to control the interaction between
the applications clients and database. The controller logic processes client requests such
as request to view questions, answers, search questions or forum, deactivate or activate
data from database.
3. Database (Data) TierThe system has data access layer which requires SQL skill in the
form of DDL and DML contains methods to connect with database and to perform insert,
update, delete, get data from database based on users input data.
Any system can be decomposed in to different sub system based on the functional services. A
subsystem is characterized by the services it provides to another sub system. Services are a set of
related operations that has a common purpose. In order to make the implementation easy and
manageable, the newly developed system decomposed in to the smaller subsystems. Subsystem
decompositions will help to reduce the complexity of the system. The sub systems that we take
the classes that our systems contain and the operation performed in the class.
Create accounts
Activate account
Deactivate account
Change Password
Manage kebele
View Account
In this Diagram components of the system will be wired showing that there is relation among
components, management of the system, database and operations performed on databases some
security issue. This in some extent shows which component or objects will be accessed by whom
and what type of security infrastructures it is using. The diagram is draw as the following:
Deployment modeling is used to show the hardware of the system, the software that is installed
in the hardware and also the middleware that is used to connect the dissimilar machines to one
and other. It also shows how the software and the hardware components work together in order
perform thetask.
Persistent data management is basically used to represent the design of the database, usually a
Relational Database. Database design is the process of producing a detailed data model of a
database. This logical data model contains all the needed logical and physical design choices and
physical storage parameters needed to generate a design in a Data Definition Language, which
can then be used to create a database. Database design describes many different parts of the
design of an overall database system. Database designs also include ER (Entity-relationship
model) diagrams. An ER model ER model is an abstract way of describing a database. Design
process of a database includes:
The access control for the woidiatownkebele management system will be implemented through
the capabilities lists such as
Create
Account ()
Deactivate
account ()
Manage
kebele ()
Give Id ()
Renew Id ()
Generate
Report ()
Post News ()
Clearance ()
Marriage()
Birth()
View Post ()
Logout ()
Users may provide invalid information (like string for integer, etc), when the system reach such
kinds of exceptions, the system provide the correct information suggests the user to provide the
correct input. In this system there is a login form, if the user does not enter correct user name and
password, the system displays an error message and let them to try again.
Tuluawuliya kebele management system will have boundary conditions to start, shutdown, and
handle failures of the system.This system is going to formulate the recognition of the kebele by
providing services like give id, register house, register population, generate report etc to the
kebele. Therefore, the system is not expected to be started and shutdown at all times rather the
system should be available all the time to support different services to the residents of the kebele
User interface prototype is to indicate the surface that can be used by user and the system. This
method involves a series of iterations and refinement until the prototype product is a fully
working system, and the user is satisfied. The process of prototyping identifies basic requirement
including the input and output information desired details, such us security, can typically be
ignored. The initial prototype is developed that includes only user interfaces. Here, the
implemented system is described. How the user interacts with the system and some of the results
of interaction with the system along with the screen shots are described. When a user starts the
application, a login screen is displayed as shown. The reasons of using prototype models are
Since in this methodology a working model of the system is provided the users get a
better understanding of the system being developed.
Error can be detected much earlier
Qucker user feed back is available leading solution.missing functionality can beidentified
easily
Confusing or difficult function can be identified requirements validation, quick
implementation of in complete, but functional, application.
REFFERENCE:
[1] D. James, "Google," UML Use Case Dessign, 3 may 2018. [Online]. Available:
https://www.smartdraw.com/use-case-diagram.html. [Accessed 22 Jan 2020].
[2] C. Robin, "google," Soft Ware Engineering, 3 September 2016. [Online]. Available:
https://www.smartdraw.com/sequence-diagram. [Accessed 2 Dec 2020]
[3] Wikipedia, the free encyclopedia(en.wikipedia.org)
[4] )1 tuluawuliya management system Documents 2015G.C, Ginba
APPENDICES
Annex 1 Existing system forms for Birth and MarriageResidence