0% found this document useful (0 votes)
372 views89 pages

Full Doc Proj

The document provides background information on the Bale Zone High Court in Ethiopia and outlines a proposed computerized case management system project. Currently, the court uses a manual paper-based system that faces problems related to data storage, security, accessibility, and efficiency. The proposed system aims to address these issues by developing a web-based case management software with modules for civil and criminal case details, scheduling, document management, and allowing online communication. The scope of the project is limited to the Bale Zone High Court. System development will use investigation, analysis, design and implementation methodologies.

Uploaded by

Nesruden Abamoga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
372 views89 pages

Full Doc Proj

The document provides background information on the Bale Zone High Court in Ethiopia and outlines a proposed computerized case management system project. Currently, the court uses a manual paper-based system that faces problems related to data storage, security, accessibility, and efficiency. The proposed system aims to address these issues by developing a web-based case management software with modules for civil and criminal case details, scheduling, document management, and allowing online communication. The scope of the project is limited to the Bale Zone High Court. System development will use investigation, analysis, design and implementation methodologies.

Uploaded by

Nesruden Abamoga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 89

CHAPTER ONE

INTRODUCTION
Computer science benefits the world by allowing organization to work more efficiently and to maximize productivity. As a result,
running with world without computer technology is difficult. It is known that every process is digitalized to manage complex tasks.
Bale zone court is not an exception of the organization in which complex tasks are processed. To manage those complexities, gaining
the benefit of computer technology is must. Therefore implementing computer science based system will bring dramatic change to this
organization.

1.1. Back ground of the organization


1.1.1. Project area
Bale ZoneHighCourt is located Bale Robe, Ethiopia. The organization is owned by Federal Democratic Republic of Ethiopia (FDRE).
The Bale Zone high court was established in 1950. At that time there were one president and three lawyers and two legal officers and
other workers. The organization is located around the Bale Robe Hospital on the Goba road. The purpose of the court is to provide
legal decision for those plaintiffs and defendants based on their evidences as well as for those who do crimes. The lawyers make
decision based on the constitution of the country. The court information management system contains two major cases those are civil
case and criminal cases.

1.1.2. Background of the Organization

The system based on the information management system that improves the manual data processing. Court Management Systemis
document management system or handling of data, dataflow system, court schedule, court fee and also concern with a customers’
comment. There are two major types of cases. Those are civil law and criminal law. Each of them contains their own sub branches. In
order to execute those cases some process takes place.

As we visited the work place of Bale Zone high court; how the court management system takes place; we have seen some problems in
data processing and handling. During the process there may be many difficulties of manual processing of files/data. Not only this but
also giving comment for one court may be difficult because of distance. This means there is no online givingcomment service before
for the court found on the distance.

College of computing
Department of computer science
MaddaWalabu University
1
Now we are going to develop software that can solve problems of data processing, data handling, scheduling and etc. we can achieve
our aim by using hardware (pc) and software (programming language). The main purpose of doing this project is that to save person’s
file from damage, store files forever, secure files that must be secured, will send the files to the concerned party in secure way. There
will be data communication from one party to the other. There will be many advantages after the end of our project. The following
things will be the result after the implementation of the software we are going to develop.

o Protect the data from danger.


o Prevent the data from the thieves, robbers.
o Save the data in secure way if needed.
o Send the file/data online to the concerned party.
o Giving comment online for court workers is possible.
o Detail of accuser, accused, witnesses, defendant and advocate will be saved properly.
o If appeal is needed by somebody it will be sent online to the concerned court.
o Dead files can be seen by a person who wants to see it but active file is secure.
1.2. Statement of the problem
Court management system of Bale Zone does on both criminal and civil case type. As mentioned above these major types contain so
many sub branches. Criminal case is initiated when crime is committed, then investigation held to collect informationand evidence
about what is happened to determine who committed the crime. After that the accused is charged with the crime and taken into
custody.

Based on evidence, then the judge determine whether he/she guilty or not guilty. At the end the decision is presented. This process is
done manually. Also Civil court cases arise where an individual or a business believe their rights have been attacked in some way. All
these processes and documentation system is takes place manually. By this system the following problems will appear.
 Courtscheduling is May difficult. This makes tedious for both users and employees of the organization.
 Difficulty of storing the documents neatly, which leads to loss of data.
 Files may be stolen by thieves, robbers or internal attackers (living Trojan horse).
 Files may be fade because of long life.
 Files may be destroyed by natural disasters like fire, flood.

College of computing
Department of computer science
MaddaWalabu University
2
 Giving comment may be difficult for customers on distance place.
 Documents at low level sent to the higher level in the form of written paper or in the form of printed form. E.g. from justice
office to court.
 Customers (users) may lost appeal paper during their journey to other court.

E.g. when he/she goes to court from justice office.

 Even though they use password individually as security but it is not more secure.
 Difficulty of retrieving needed document timely.
 Detail of accuser, accused, witnesses, defendant and advocate may be lost.
 Recording examination, cross examination and reexamination may difficult while collecting evidence from witness.
1.3. Objective of the project
1.3.1. General objective

Our main objective is to develop web based court information management system for Bale Zone highcourt.

1.3.2. Specific Objective

The target of this project is to develop software that controls court information system. This system contains the modules like civil and
criminal details, court scheduling, public defenders prosecutors, document managements, dispositions and sentencing, database and
etc.

 Civil and criminal details: The civil and criminal details are recorded or registered, updated by selecting a case or any
elements of case and retrieved from the database.
 Public defenders and accuser: In this public defenders, accuser, accused and event frequent expert witnesses may be
entered and saved by the system.
 Document managements: This refers to security of files. The achieving document are accomplished and completely
secured.
 Disposition and sentencing: The entire sentence, including lengthy sentencing conditions may be viewed with ease.
 Database development: This refers to storing data in DB. Central database is implemented for storing data’s.

College of computing
Department of computer science
MaddaWalabu University
3
 Data communication: this refers to sending one document or files to the concerned parties (sending appeal to the higher
court, giving comment).

1.4. Scope and limitation of the project


1.4.1. Scope of the Project

The scope of this study limited to Bale Zone High Court Management system. The functionality of the software we are going to
develop is:

 Record accuser details, charge, petition, appointment.

 Record accused details , response , words

 Record witness’ detail and words.

 Record examination, cross examination and reexamination while collecting evidence from witness.

 Send appeal online if needed to the concerned party.

 Search files in a simple way

 Record Advocate detail if there.

 Save active files and dead files separately.

 Save decision of judges.


 Accept comment from customer on line.

 Scheduled according to appointment

 Record public defenders and prosecutor

1.4.2. Limitation of the Project


College of computing
Department of computer science
MaddaWalabu University
4
 Our system has no Online Court fee or online payment.

 The system has no online judgment or rendering decision.

 Our system does not takesonline evidence from the witness.

 Our system works only by English Language.

 Our system has no sound and video record.

1.5. System Development and Methodology


In order to achieve our aim, we use different methods to bring the system from imagination to realization. These methods include
different models, techniques and tools for our work.

1.5.1. Investigation (Fact-finding) Methods


To get a precise data from the society the team has used the following fact finding techniques.
Those are: -
For the collection of data: Observation, Interview and Document analysis was used.
Observation:-Observation is common methods of scientific research to collect the data. We used observation to know how the
existing system work, to know exactly how different sub offices and how office member are handling the work in the office.
Interview:-Interview is particularly useful for getting the history behind the participant’s experiences. We used interview to get
information about the existing system for developing our project. The interview was conducted on the head of High Court and staff
members.
Document Analysis: - Document analysis is used to understand how the system is working. We used this method to know all
about the staff mission, vision, function and overall of their work in short and brief.
1.5.2. System Development Tools

In order to develop the software we are going to use both hardware and software.

College of computing
Department of computer science
MaddaWalabu University
5
Hardware are: - pc (personal computer) including its internal part and external part (i.e. system, keyboard, mouse, monitor, storage
parties and etc.).

Software part: - software is the main requirement to develop the project. Software we are going to use in our project are;
programming language such as html and Php since the project is web based.

1.6. Significance of the project


This document aims to give a brief description about the Bale Zone High Court management System. Accurate, timeliness, reliable,
secured, relevant and valuable data are needed for high court management in all dimensions.
This project will reduces work overload of High Court development office workers.
The system increase document preservation without need of large area.
This project will provide a basis for validation and verification process.
Fast accessibility of stored data and saving of resource.
1.7. Beneficiaries of the Project
After the implementation of this project, it provides various benefits for courts and for societies.

i. Benefits for the court


 Employers will have confidence on handling data.
 Searching documents when it is needed is easy.
 They can secure active files and dead file as they want.
 They will send appeal online to the concerned parties (from woreda to zone).
 Information about court can be accessed any time from any place based on given privilege.
 The project will contribute by making the court part of the paperless society.
 Data communication is possible
 Calculating court fee depending on cases become simple.
 Scheduling be come in simple way.
 They can upload something on the web for customers.
ii. Benefits for societies

College of computing
Department of computer science
MaddaWalabu University
6
 Customers will give their comment online without going there, i.e. to give comment for judges or for other employees giving there
is not mandatory.
 They could not fear for their documents, especially when they want to receive appeal to the upper court.
 Customers could see from the web what they want to see.

1.8. Feasibility Analysis


Feasibility study is an important phase in both research and software development process. It enables the developer to have an
assessment of the product beingdeveloped. It refers to thefeasibility study of the product in terms of outcomes of the product,
operational use and technical support required for implementing it. Feasibility analysis is undertaken to prove if the proposed system
is valuable to implement.
1.8.1. Operational Feasibility
The organization brought changes by building central database and web based system on the top of the existing system. To adopt with
the system introduction to computer is required. The existing staff has no problem to adopt this system, since they use computers by
themselves. In case if there are people who need an assistant of the system, website has its own help page. Generally the system is
operationally feasible to operate it. Concerned on the operation of the developed system,the project will provide online case
submission to the concerned high court if the plaintiff or the defendant is unhappy to the decision made and when the appeal is
needed. Also it will provide online comment for the court workers.
1.8.2. Technical feasibility
The court management system will deliver service by using digital system of file handling and transferring files digitally, which will
simplify task. It has a graphical user interface to assist employers and customers of the organization. The system can be easily
maintained, portable, available and reliable. It is also support multi user, data handling system and easy to install. Generally the
system is technical feasible.
1.8.3. Economic Feasibility
Total estimated capital requirement is 95574.00 birr. This includes cost of hardware and software’s. In addition of this cost of
transportation for customers is reduced unless they are obligated to do so. The web based management system developed by
considering budget of an organization which is economically feasible.
This refers to the benefits or outcomes we are deriving from the product as compared to the total cost we are spending for developing
the product.
College of computing
Department of computer science
MaddaWalabu University
7
1.8.4. Time Feasibility
Time feasibility refers to the time that particular work takes to implement or too performed. A System that going to be developed
should save times than the exist system. I.e. The software we are going to develop could perform action within short time when
compare with current system. Searching, saving, viewing details, should be shorter than before action.

1.9. Risk Analysis


Risk are situations or happenings which might or might not occur, but in the case ofoccurrence would have negative impact on the
development process of the system oron the system itself.
 While we are doing this project we encounter or come across different problems or risks.
 The problem of contacting the office manager at the time we needed.

 Lack of enough reference: -To read information from different sites, using internet when there is access.
 Lack of financial support from the department: -Use own money appropriately and effectively.
 When office manager in not available during we want: -To arrange time for meet with manager.
 Some others common of the risks faced in the developing the system are:-
 Lack of internet access.
 Unexpected man power failure.
 Virus attack on computer.
 Failure of electric power.
 Time management problem.

College of computing
Department of computer science
MaddaWalabu University
8
1.10. Time Schedule
List of activities are depicted in the following Gantt chart. Major tasks are listed here and routines of activities can be performed
accordingly. Tasks conducted as scheduled. See index I

College of computing
Department of computer science
MaddaWalabu University
9
2016 2017 2017 2017 2017 2017 2017
ID BZHCMS Start Finish Duration

1 Proposal 21/11/2016 21/12/2016 4.6w

2 Requirement analysis 22/12/2016 20/1/2017 4.4w

3 System design 23/1/2017 6/2/2017 2.2w

4 Object design 21/2/2017 20/3/2017 4w


Implementation and
5 21/3/2017 21/4/2017 4.8w
testing
6 User manuals 21/4/2017 19/5/2017 4.2w
Conclusion and future
7 22/5/2017 15/6/2017 3.8w
work
Figure 11 Gantt chart

College of computing
Department of computer science
MaddaWalabu University
10
CHAPTER TWO
REQUIREMENT ANALYSIS
2.1. Introduction

This chapter contains the requirements of the system and the problem that we are going to solve. This phase includes requirement
analysis, requirement gathering and description, current system description, problem analysis and user need, requirement modeling,
system analysis, alternative solution, feasibility analysis, proposed system description and Analysis modeling.
2.2. Purpose of the System
The existing system in our country can give services for all the customers in different ways by giving some information for the
customers (users) about high court.
The language that the customers of the existing system use is English language. Since this language is not Ethiopian language, some
users may not understand the detailed information of the items from the website.
This may cause the customers satisfaction to be very low. Also in the existing system even if it is on line, there’s no enough website
developed for the users to use very nicely to get the information that describes the items they want and actually in our country on line
transaction is difficult in case of security.

2.3. Overview of the existing system


Existing System Description

College of computing
Department of computer science
MaddaWalabu University
11
In Bale Zone high court management system has providing many services. But we concentrate to Court management system. That
how to hold data or file. So this description contains two major cases. Those are civil case and criminal case including their sub
branches according to our scope.
Civil case proceeding is case among or between two individuals. Types of civil case are family issue, property and succession. Since
civil case takes place between two individuals; the plaintiff opens the case to the court. The court registered the case. This is done by
law officer or registrar office. The law officer verifies the case. In this case or during verification; the case may be accepted or
rejected. If the case accepted the law officer receive court fee. The amount of the court fee depends on the case type. Then he/she
register court fee on the paper. After that the database administrator records the amount of the court fee into the database including
plaintiff details. Then the law officer write the summon for the plaintiff. The plaintiff sends summon to the defender. On the day of
appointed the defendant present and asks the question.
This is called hearing process. During this process the defendant is allowed to defend. Also the right to bring the advocator is allowed.
All these things (information) record on paper and documented. In the second phase the judge sees the case and rendering decision is
given by judgment passer. If extra information is needed the appointment takes place? The process repeated in the same manner.
Starting from hearing to rendering decision.

The criminal case is the same process like civil case what makes it different is that it can be conducted between state and individuals.
Public prosecutor investigates, collect information and evidence and so on. The summon send to the accused when the accused is
present on the appointment he/she can defense the case. If accused (defendant) cannot defend by him/herself finding advocator is
allowed like in civil case. In both civil and criminal case all information, detail of accuser and accused as well as advocator detail and
also their words registered on the paper.
If plaintiff, accuser, advocator or public prosecutor does not satisfied to the decision of judges he/she can ask appeal to the upper
court. There is limitation date to ask appeal after decision made by judges. Then if one asks appeal, the hard copy of all his/her
document including words of witnesses given to him/her within a given time.
The other is if customer wants to give his/her comment for employees or for organization; he/she writes and put it in comment box. In
order to give comment for them one must go there. On the holding of data; the file saved in two ways active files and dead files. Those
files handle manually. Also searching document is takes place manually.
2.3.1. Players in the Existing System

College of computing
Department of computer science
MaddaWalabu University
12
Existing systems encompasses different players (actors) to carry out the job. Among those different actors (players), the following are
some:-
Judge:- judge going to view the assigned case, record evidence such as words of witness, examination, cross examination,
reexamination, make decision and arrange appointment.
Admin: - Admin going to create account, update account, delete account, report, view comment of customers, view decision made
and give access control.
Law Officer: - Registrar, Registration of case type, those are civil case and criminal case. Register details of participants such as
plaintiff, advocator, public prosecutor and defendant. Also record court fee, set schedule, write summon and give appeal if needed.
Other Players in the Existing System:-
Plaintiff: -The plaintiff sends summon to the defender.
Defendant: -. On the day of appointed the defendant present and asks the question.
The defendant is allowed to defend. Also the right to bring the advocator is allowed.
Advocator: -isa person which supports defendant and plaintiff in order to process theiractions in the court.
Customers: - any users which access and uses this website.

2.3.2. Major function of the existing system

Major activities in existing system can be taken as inputs the following components to providethose things:-

Currently Bale Zone High Court Management System is fully manual, so problems related to manual systems are generally problems
for the existing system, to be more exhaustive we have listed the problems below.

The drawback of the Existing System is:


o Site is not attractive.
o Wastage of time and human resource.

2.3.3. Business Rule

There are some business rules and constraint to prevent any violation during process. This focuses on access control issue. In court
management system Administrator has responsibility to manage all the system in court. He/she has authority to managing information
College of computing
Department of computer science
MaddaWalabu University
13
(view decision made, view comments, report…), financial order, and ordering work flow, manage employee and etc. Also all
employees have their own responsibility such as to come on time at the work place, do their work as rule and regulation of the court.
Seeing active case except the judge assigned is impossible for the others.

2.3.4. Report generated in the existing system

In the existing system there are different kinds of reports which are generated for court case purposes. Those reports include report
from agent and report from media.
Report from agent:-The agents provide some forms for criminal case and civil case by considering the information.
Report from media: - The media can provide the reports for all society and in the form of publicity. When we say this, the media
generate report for crimes depending on their required information for finding solution. And also media can be provide report for
society depends on the courtmanagement system.

2.3.5. Forms and Documents

The following form is the form that we take from the Bale Zone High Court use for open the case types that court is process for
prosecutor or defender and etc.
TO’ANNAA DAANGAA YEROO
Guyyaagalmeenbaname______________________
Daangaaka’ameef____________________________
Guyyaaxumuraargachuuqabu________________
Kanmurtaa’egaafa__________________________

Mootummaanaannoooromiyaatti
Galmee mana murtii ol’aanaa godina Baalee
በኦሮሚያብሔራዊክልላዊመንግስት
የባሌዞንከፍተኛዞንፍ/ቤት
Lakk galmee_________________________________________________
የመዝገብቁጥር
Himataa________________________________________________________
ከሳሽ
Himatamaa__________________________________________________
ተከሳሽ
Gosa himannaa_______________________________________________
የክሱአይነት
Guyyaa galmee baname_______________________________________
College of computing
Department of computer science
MaddaWalabu University
14
መዝገቡየተከፈተበትቀን
Dhaddacha itti qajeelfame_______________________________________________________
ፋይሉየተመራበትችሎት
Guyyaa murtaa’e__________________________________________________________________
የተወሰነበትቀን
Lakk. G.M.M Aanaa____________________________________________________________
የወረዳፍ/ቤትመዝገብቁጥር
Bakka galmeen irraa dhufe_____________________________________________________
መዝገብየመጣበትቦታ
Godina_______________________Aanaa____________________________________ Boordii____________________________________
ዞንወረዳቦርድ
Kan biroo_____________________________________________________________________________
ሌሎች
Sadarkaa dhimmichaa
የጉዳዩደረጃ
Himataa duraa ol- iyyataa ijibbaata kan xiyyeeffannoo addaa

ቀጥታክስይግባኝሰበር

Gosa dhimmichaa

የጉዳዩአይነት

H.H yakka falmii hojii

ፍትሃብሄርወንጀልየሥራክርክር

Baay’ina Qr. Falmii_________________________________Qarshii seerummaaf kaffalame__________________________________________

የክርክሩገንዘብመጠንለዳኝነትየተከፈለገንዘብ

Baay’ina fuulaa(galmee yoo banamu)____________________________________

የገፅብዛት(ፋይሉሲከፈት)

Beellama

ቀጠሮ

____________________________________ ____________________________ ____________________________

____________________________________ _____________________________ _____________________________

Maqaa I/G guute______________________________mallattoo_______________________Guyyaa________________________

College of computing
Department of computer science
MaddaWalabu University
15
የሞላዉ ኃላፊ ስም ፊርማ ቀን

College of computing
Department of computer science
MaddaWalabu University
16
2.3.6. Problem of the Existing System

Even though the existing system provides different functions that are stated above, it is not to mean that those functions are
satisfactory. This is because all the processes (actions) performed are not effective and efficient. To overcome or improve these
operations, the team comes up with a new proposed system High Court Management System (HCMS). This new system is a Web
based application that enables the users to access many services given by the system through the Internet. The new system is targeted
to address the problems of the current system and to support additional functionalities. Based on the user inspection, the proposed
system can hold a user friendly environment, which also incorporates some local language interface.
2.4. Proposed System
Existing system covers the description of the existing system, problem of the existing system and what issues the proposed system
going to improve and details about functional and non-function requirements of proposed system.

2.4.1. Overview of the Proposed System

The Bale Zone High Court Management System is web based that allows the Office of the Registrar to use it well to search court
system in the desired format. These web based is designed to work on internet. It has also a help option to facilitate the working
environment effectively. The system will be designed to be used very easily, for those who have prior knowledge of the internet. The
user has an access to learn how to use it with the help option.

High Court Management System for Bale Zone is all about providing the system users what they really need in a time saving accurate
and reliable manner, therefore the proposed system is the one where:

 Protect the data from danger.


 Prevent the data from the thieves, robbers.
 Save the data in secure way if needed.
 Send the file/data online to the concerned party.
 Giving comment online for court workers is possible.
 Court fee can be registered and saved into database.
 Detail of accuser, witnesses, plaintive, defendant and advocate will be saved properly.

College of computing
Department of computer science
MaddaWalabu University
17
 If appeal is needed by somebody it will be sent online to the concerned court.
 Dead files can be seen by a person who wants to see it but active file is secure.
2.4.2. Functional Requirements

Afunctional requirement specifies what the system should do to perform some task. The following are some functionalities of the
system.
 Handle the data properly.
 Search the file within short time.
 Assign the cases to the judges.
 Suitable for sending appeal to the higher court online.
 Suitable for giving comment online.
 Register the details of plaintiff, defender,advocator and judge properly.

2.4.3. Non-Functional Requirements


Reliability: The application which runs on the desktop can work on computer if the computer is working properly. The system
application should be believable.
Security: The system should provide the control access. For security issue, only authenticated user can visit the system. An authorized
user can update, delete, or create and maintain the system. Privilege is given for only authenticated person to do something.
Usability: The system is user friendly. It can be easily understandable by the user. Any user who have known how about computer can
easily do with it.
Portability: can work on different platforms.
Error handling: The system handles an error done by the user and display error message.
2.4.4. Maintainability Requirements

The system is easily maintainable .we can maintain the system if it gets some failure.

2.4.5. User Interface and Human Requirements

College of computing
Department of computer science
MaddaWalabu University
18
The system will use a user friendly and simple for users to understand, it has different user interfaces for the system users. The system
provides a user friendly, Intuitive GUI. It contains various forms, buttons, textboxes and dropdown menus to help users interact with
the system. The user must not be challenged in any way to locate functionality of the system.
2.4.6. Hardware Requirements

For the development of the system we used the following hardware and software:

Hardware’s
 Printer: For printing documentation
 Server: for connection to the client computer (to host the system)
 Computers
 Network connection materials
 CD_ROM
2.4.7. Software Requirements

Software’s
To develop this system the following software’s are used.
 XAMPP/wamp server
 Edraw max
 Notepad++
 MySQL database server
2.4.8. Security Issues

As long as personal information of the crime and cases is stored in the database, the system is expected to provide security options.
For this reason the Software will apply Software level securities.

2.5. System Model


The system model document describes all data, functional and behavioral requirements of the software under production or
development.
The following lists of objects are System Model for High Court Management System.
College of computing
Department of computer science
MaddaWalabu University
19
 Use Case diagram list and their details description
 Description of actors
 Activity diagram
 Class diagram
 Sequence diagram
 User Interface prototyping diagram
2.5.1. Use Case Diagram

Essential use cases are of primary importance early in a project’s analysis phase. Essential use case contains actors, use cases, and
description. An Actor is a person, organization or an external system/sub-system/program that has interactions with the application
and drawn in stick man shape. A use case describes a sequence of actions that provide something of measurable value to an actor and
drawn in horizontal ellipse.

Actors Use case Description


Judge Login, view assigned The judge login the system view the
case, record evidences, assigned case, record or collect
make appointment and evidences, make appointment if
make decision, needed and provide decision on the
cases
Law officer Login , assign case, Law officer login to the system,assign
change password, case, change password, registration,
Registration, give give appeal, generate report, view
appeal, generate report, report, post notice
view report, post notice
Admin Login ,create account, He/she login to the system to: Login
delete account, update ,create account, delete account, update
account, give report to account, give report to the higher court
the higher court
College of computing
Department of computer science
MaddaWalabu University
20
Comment Comment Any customer can give a comment

Table 1.1 use case scenario description

College of computing
Department of computer science
MaddaWalabu University
21
College of computing
Department of computer science
MaddaWalabu University
22
Figure 2.1 Use case diagrams.

2.5.2. Description of Actors

Activities: Login
Actors: judge, admin and law Officers
Description: judge, admin and Law officers going to login the system.
Precondition: judge, admin and law officer should have authority to inter to the system.
Post condition: they enter to the system.
Basic course of action:
1. Judge login to the system (alternative 1)
1.1. The judge wants to do
1.2. The judge login to the system
1.3. The judge wants to pass decision
1.4. The judge sees the assigned case
1.5. The judge confirm the case
1.6. The judge record the detail of evidence
1.7. The judge passes decision.
2. Admin login to the system (alternative 1)
2.1. The administrator login to the system
2.2. Wants to manage or control the information
2.3. Create account
2.4. Update account
2.5. Delete account

College of computing
Department of computer science
MaddaWalabu University
23
2.6. View decision made
2.7. View comment
2.8. Write report
3. The low officer login to the system (alternative 1)
3.1. Verify the case, Register the case
3.2. Register details of plaintiff
3.3. Assign case to judge
3.4. Assign advocator to the case
3.5. Set schedule
3.6. Write summon
3.7. Write appeal s
Alternative course of action:
1. User id and password is not correct
Activities: judge process
Actor: judge
Description: judge going to view the assigned case, record evidence such as words of witness, examination, cross examination,
reexamination, make decision and arrange appointment.
Precondition: case should be accepted by low officer.
Post condition: make decision and verify on the case.
Basic course of action:
1. The judge login to the system
2. The judge wants to pass decision
3. The judge sees the assigned case
4. The judge confirm the case
5. The judge record the detail of evidence
6. Appointment (alternative 1)
7. Write next day summon (alternative 2)
8. The judge passes decision.

College of computing
Department of computer science
MaddaWalabu University
24
Alternative course of action:
1. Appointment is not needed
2. Next day summon is not needed
Activities: Manage Info

Actor: Admin

Description: Admin going to create account, update account, delete account, report, view comment of customers, view decision made
and give access control.
Precondition: There should be the user
Post condition: Give access control
Basic course of action:
1. The administrator login to the system
2. Wants to manage or control the information
3. Create account (alternative 1)
4. Update account ( alternative 3)
5. Delete account ( alternative 2)
6. View decision made (alternative 4)
7. View comment (alternative 5)
8. Write report
Alternative course of action:
1. There is no user
2. There is no account to be deleted
3. There is no account to be updated
4. There is no decision made
5. There is no received comment
Activities: Register
Actor: Law officer

College of computing
Department of computer science
MaddaWalabu University
25
Description: Registration of case type. Those are civil case and criminal case. Register details of participants such as plaintiff,
advocator, public prosecutor and defendant. Also record court fee, set schedule, write summon and give appeal if needed.
Precondition: The case should be accepted and opened.
Post Condition: The case is registered.
Basic course of action:
1. Verify the case, register the case (alternate 1)
2. Register details of plaintiff
3. Assign case to judge
4. Assign advocator to the case ( alternative 2)
5. Assign public prosecutor (alternative 3)
6. Register court fee
7. Set schedule
8. Write summon
9. Write appeal (alternative 4)
Register details of plaintiff, defender, advocator and public prosecutor
Register cases as well court fee
Alternative course of action:
1. Reject the case
2. Advocator is not needed
3. The case is not criminal case
4. Appeal is not needed
Activities:comment

Actor: plaintiff, defendant, advocator and other customers.

Description: a comment is created by one of the above.


Precondition: there should be a comment to be given.
Post condition: the comment is given for organization.
Basic action of course:
College of computing
Department of computer science
MaddaWalabu University
26
1. Search the site (alternative 1)
2. Write the comment
3. Send the comment
Alternative course of action
1. Connection is not available
2.5.3. Activity diagram
Activity diagram is another important diagram in UML. The basic purpose of activity diagram is to show the message flow from one
object to another activity. An action is indicated on the activity diagram by a "capsule" shape or container shape or shell shape.An
activity diagram defines one individual activity.Branches divide the sequence into several alternatives specified by different
conditions. Forks divide the sequence into concurrent sub-sequences.Object Flow States is an inputs or outputs of activities and are
accordingly connected by transitions to them.

College of computing
Department of computer science
MaddaWalabu University
27
Figure 2.3 Activity diagram for Login

College of computing
Department of computer science
MaddaWalabu University
28
Bale Zone High Court Management System Activity Diagram for Manage Info

Manage Info

not exist User not exist


User exist exist

Create Account
Update Account

Delete Account Give access

College of computing
Department of computer science
MaddaWalabu University
29
Figure 2.3Activity diagram for manage info

College of computing
Department of computer science
MaddaWalabu University
30
College of computing
Department of computer science
MaddaWalabu University
31
Figure 2.4 Activity diagram for registration

College of computing
Department of computer science
MaddaWalabu University
32
College of computing
Department of computer science
MaddaWalabu University
33
Figure 2.5Activity diagram for judge process

Figure 2.6Activity diagram for comment

College of computing
Department of computer science
MaddaWalabu University
34
2.5.4. Class Diagram

College of computing
Department of computer science
MaddaWalabu University
35
College of computing
Department of computer science
MaddaWalabu University
36
Figure 2.7 Class diagram

2.5.5. Sequence Diagram


A sequence diagram is the interaction between different objects in the system. This shows the exact sequence of the interactions
between the objects step by step. One object interact the other by passing the message.

College of computing
Department of computer science
MaddaWalabu University
37
BZHCMS Sequence diagram1

1. The user Login Database Display home


enter
the password
and Top Package::User(actor)
user ID
in order to
access 1. Enter user ID and password
the service.
1.1. Verify
1.1. The system
verify
the entered one
and
pass to DB. 1.2. check
1.2. DB checks
the PW
and
the user ID.
2. if it is not
valid
it prompts
the user
try again.
3. if it is
valid it allow
the user 2. Invalid password and user ID try again
to access 3. Valid password and user ID
what he/she
wants.

Figure 2.8Sequence diagram for login


College of computing
Department of computer science
MaddaWalabu University
38
BZHCMS Sequence diagram

Manage info Login Admin mgmt info Database

1. The Admin
wants
to manage Top Package::Admin
information
by login to 1. Wants to manage and control the information
the system.
2. When the
Admin
1.1. Admin menu displayed
menu is
displayed
select the
option to 3. select option to do
do creation,
deletion,
updation and
give access 3.1. The select option is displayed
permission
as well as save
it to the DB. 4. create, delete, update account, report view comment and give access permission
3. The Admin
logout the
4.1. save
system.

4.1.1. Successfully done


College of computing
Department of computer science
MaddaWalabu University
5. logout() 39
Figure 2.9sequence diagram for Admin

College of computing
Department of computer science
MaddaWalabu University
40
BZHCMS sequence diagram

Case Login LawOfficerMenu Database

1. The
lawOfficer
wants to LawOfficer
verify 1. Wants to verify
the case.
2. The
case is 2. Rejected
rejected
2.1. Accepted
after
verification.
3. If the
2.2. Use()
case
is accepted 2.2.1. Displayed
uses
the login
the LawOfficer
Menu
is displayed.
4. The
LawOfficer
selects the 2.2.1.1. Menu displayed
menu and
the
menu is 3. Select from the menu
displayed
for him.
5. The 3.1. The selected menu is diplayed
LawOfficer
register the
case to the
4. Register the case
database. College of computing
6. Successful Department of computer science
MaddaWalabu
4.1. Successfully registered University
41
Figure 2.10 Sequence diagram for the Law Officer to register

College of computing
Department of computer science
MaddaWalabu University
42
BZHCMS sequence diagram

writeSummon Login LOMgmtSystem WriteSummon Database

1. The
lawOfficer LawOfficer
wants to 1. Want to write
write the
Summon by
login the 1.1. login()
system.
2. To display
the form 2. click on it
it clicks on
the
LOMgmtSystem 2.1. FormDisplayed
the form is
displayed. 3. Fill information
3. The
LawOfficer
3.1. Check validity
fill the form
and the 3.2. summonWritten
system
check
the validity. 3.2.1. successfully written
4. Summon is
written to
DB and the
hard copy is
given to
the user.
5. The
4. Logout()
LawOfficer
logout the system

College of computing
Department of computer science
MaddaWalabu University
43
Figure 2.11 Sequence diagram of Law Officer with Summon

College of computing
Department of computer science
MaddaWalabu University
44
BZHCMS sequence diagram

setSchedule Login setScheduleMenu createSchedule Database

LawOfficer
1. The
lawOfficer 1. Want to set
wants to
set schedule
for the users 1.1. login
by login
2. getCalender
the system.
2. The
lawOfficer 2.1. Display calender
get calender
from set
schedule 3. Click on it
menu.
3. lawOfficer
click on create 3.1. Display form
schedule to
get form and
fill the form. 4. Fill form
4. The system
checks for 3.2.1. successfully written 4.1. Check validity
validity of
5. setSchedule
the form.
5. setted schedule
is written to
the database. 5.1. Successfully
College ofsetted
computing
6. Then the Department of computer science
law officer logout 6. Logout() MaddaWalabu University
the system.
45
Figure 2.12sequence diagram of law officer to set schedule

College of computing
Department of computer science
MaddaWalabu University
46
BZHCMS sequence diagram

Assign judge Login LOMSystem setSchedule Database

1. The
lawOfficer LawOfficer
wants to
assign the 1. Want to assign 2. login()
judge by
login to
the system. 3. Click here
2. The
lawOfficer
click to the
lawOfficer 3.1. Display form
management
system to 4. getSchedule()
display the form,
then the form is
displayed. 5. Fill the form
3.See the set
6. Check validity
schedule to get
free judge.
4. Fill the displayed 7. Judge assigned
form.
5. System verify 7.1. Display success message
the form and
judge is assigned.
6. Success message
is displayed for
law officer logout
the system.
8. Logout()

College of computing
Department of computer science
MaddaWalabu University
47
Figure 2.13Sequence diagram of law officer to assign judge

College of computing
Department of computer science
MaddaWalabu University
48
BZHCMS sequence diagram

Record evedence Login Judge page Database

Judge
1. Want to record
1.1. Enter to system
2. Entered

1. The
judge
wants to 3. Select options to operate
record, then
login to
the system. 3.1. Selected option displayed
2. Judge page
displayed with
many options. 4. View assigned case record events, make decision
3.Judge select
what he/she
want to do 4.1. Save
from option.
4. Option selected
displayed and 4.1.1. Successfully done
do what he/she
want.
5.Then send to
the database.
6. Exit

5. Logout()
College of computing
Department of computer science
MaddaWalabu University
49

Figure 2.14sequence diagram for


judging process

College of computing
Department of computer science
MaddaWalabu University
50
BZHCMS sequence diagram

Wabe page Home page Database

Customer
1.The
customer or
user search 1. Search
for a
wabe page
and get the 1.1. getSite()
site.
2. The 2. select page
customer
select a page
and click on 3. click on the comment button
the comment
button and get 3.1. Display the form
the form.
3.The
customer
fill the form 4. Fill the form
and the
4.1. Check for validity
system
check for
validity after
that submit
5. submit
to the DB
and
obtain College of computing
successfully Department of computer science
submitted 5.1. Successfully submitted MaddaWalabu University
message. 51
Figure 2.15sequence diagram for customers’ comment

College of computing
Department of computer science
MaddaWalabu University
52
BZHCMS sequence diagram

Appeal case Login Home page Database

1.Lower court Lower court


(judge) wants 1. Want to appeal 2.Login
to send the
appeal to the 2.1. Obtain home page
higher court. 2.1.1. Home page displayed
2. The
judge login
to the system 3. Click on the appeal button
to obtain
home page.
3. Home page 3.1. Appeal form displayed
displayed.
4. The judge
click on the
appeal button
to get the 4. Fill the form
appeal form
and the form 4.1. verify
is displayed.
5. The judge fill 4.2. Submit the case
the form and
the system 4.2.1. Successfully submitted
checks validity
of the form.
6.The case is
submitted to 5. Logout()
the high court
and message
returned.
7. The judge College of computing
logout Department of computer science
the system. MaddaWalabu University
53
Figure 2.16sequence diagram for appeal case

2.5.6. User Interface Prototype


Application will be accessed through a Browser Interface. The software would be fully compatible with Microsoft Internet Explorer,
Mozilla Firefox and Google Chrome. No user would be able to access secured part of the application without logging on to the system.
The system should be accessed over WAN. The BZHCMS is also user friendly that it is simple to be used by any users. The user
interface of this application is shown below.

College of computing
Department of computer science
MaddaWalabu University
54
College of computing
Department of computer science
MaddaWalabu University
55
Figure 2.17 User interface prototype

College of computing
Department of computer science
MaddaWalabu University
56
CHAPTER THREE
SYSTEM DESIGN
3.1. Introduction
After the analysis phase, the project proceeded to the detailed design phase, where the requirements were translated into a
representation of the system. Court management system is popular system and useful in developed countries. Most of the time the
court management software is used to implement crime related case process improvement strategies by providing time tested and
accurate information about criminal. The system completely web-based, linking to data base and accessible by remote server. In this
document we describe the detailed design using UML.
3.2. Design goals
The design goals represent the desired qualities of court management system and provide consistent set of criteria that must be
considered when making design decisions.

The following design goals are identified:

Availability: The system is available at any time as long as there is no power, operating system or hardware failure.
Usability: The system interface should be interactive with the users so as to enable them to use the system effectively
without entering invalid data.
Security: User must access the system under some restrictions and this is specified using user roles and access control.
Maintainability: The system can handle errors to be corrected and can be maintained if any system structure is changed.
The Design goal below represents the quality of BZHCMS web based focus on:

3.2.1. Performance
The system will respond after the request has issued within 7 to 10 seconds with the Hardware Configuration specified in RAD. With
a limited life span the system might display first the splash form, then the login page, loading page, finally users personal seating
(mean page).
3.2.2. Dependency Criteria
It determines how much effort should be expand in minimizing system crushes and there consequence as listed below:
 Without the privilege of the user the system should not display or activate tasks.
College of computing
Department of computer science
MaddaWalabu University
57
The difference between specified and observed behavior is less that is the system Reliable.
3.2.3. Data Store
Permanent data of BZHCMS must be stored in MySQL data format.
3.2.4. Maintenance
Maintenance criteria highlights how new functionalities can be added to the system in the future.
3.2.5. Programming Language
The programming language used for the system development is HTML, Java ScriptandWamp (Xampp) for Database Development, by
using those languages, the system is easy to add new class of the system, easy to change the functioning of the system and easy to port
the system to different platforms.

The BZHCMS is implemented using a front side by php and the Back Side by MySQL data base.

3.2.6. Usability
The interface of the system should be user friendly, easy to use, fully descriptive and self-guarding, so that it is highly user friendly
and interactive so that it is easy to use.

3.2.7. Class type Architecture


The class type architecture of this project has the following layers: - Interface layer, control layer/process layer, business/domain
layer, Persistent layer and data source layer. This architecture describes how the system works and interacts with the user by dividing
work into different layers.

College of computing
Department of computer science
MaddaWalabu University
58
Figure 3.18 Class type architecture
College of computing
Department of computer science
MaddaWalabu University
59
3.2.8. Interface Layer
This layer is a layer that the user interacts with high court system for both cases website, which means it provides the user access to
the system.
3.2.9. Controller/ process Layer
This layer is a layer of different process or applications of the system like admin,update, delete, createand so.
3.2.10. Business /Domain Layer
This layer checks whether the user pay his payment to use the system.
It is used to transfer data from application layer or presentation layer to data layer.
3.2.11. Persistence Layer
This layer encapsulates the capability to store, retrieve and delete objects or data.
It is also a class to get or set data to the database queries back and forth.
3.2.12. System Layer
This layer provides operating system specific functionality for the system.
System layer also communicate all of the remaining four layer.
3.2.13. Sub-System Decomposition
Subsystem decompositions will help reduce the complexity of the system. The subsystems can be considered as packages holding
related classes or objects. The CIMS under consideration is decomposed in to subsystems as shown by the following diagram. These
subsystems are further decomposed into other subsystems. The major sub systems identified are Login, Manage Info, Register case,
Decision (judge process) and Comment. Those major subsystems also have Its own subsystem except comment.

College of computing
Department of computer science
MaddaWalabu University
60
BZHCMS sub system decomposition

CMS

LawOf Custo
Admin Judge
ficer mer

Manag Judge Comm


Login register
e info process ent

Figure 3.19 Sub-system decomposition


3.2.14. Hardware /software mapping
The BZHCMS will have three main hardware components: the client/user, the web server and database server
 The client/user - Access the website via their internet browser
 The web server - The web server will run on Internet Information system (IIS) and it contains the application server which
performs all tasks.
 Will use php for the front-end application
 XAMPP server to configure a MySQL database and to use php applications for easy configuration and maintenance.

3.2.15. Access Control


Here we will describe the privileges or authorities of actors over the functionalities.
In this system there are two actors User and Admin. Each has their own privileges to gain access of the system.

College of computing
Department of computer science
MaddaWalabu University
61
In our proposed systems, all actors have their own accessibility to different functionalities. The following table explains the
accessibility of Actors to perform particular action.

Actors Functionalities
Manage Info Register Judge Process Comment

Admin Has authority to create,


update, delete account
and to report, see
decision made, see
comments
Law Officer Has a permission to login Has authority to
to his/her account. register case, assign
the case to judge,
assign advocator,
give appeal, set
schedule.
Judge Has permission to login Register cases , Has permission to
to his/her account details of witnesses , access case
as well their words assigned to
him/her,
permission to
record events, give
appointment,
making decision.
Customer Access home page Write and
send the
comment

College of computing
Department of computer science
MaddaWalabu University
62
Table 2 Accessibility of actors

3.2.16. Component Diagram


Component diagram are used to provide physical view of current model. The purpose of component diagram is to visualize the
components of a system and relationships of the components.

Figure 3.20 Component diagram

3.2.17. Deployment diagram


Deployment diagram are used to visualize the topology of the physical components of a system when the software components are
deployed. The purpose of the deployment diagrams are used for describing the hardware component where the software components

College of computing
Department of computer science
MaddaWalabu University
63
are deployed. This diagrams show the hardware system, the software that is installed on that hardware, and the middleware used to
connect the disparate machines to one another.

Figure3.21Deployment diagram
3.2.18. Persistence Data Modeling

Persistence information management deals with how the persistent data (file, database, etc) are stored and managed and it outlives a
single execution of the system. Information related to court basic information, case registration judge processes comment and
management information produced and other related information are persistent data and hence stored on a database management
system. This allows all the programs that operate on the CIMS data to do consistently. Moreover, storing data in a database enables
the system to perform complex queries on a large data set. For complex queries over attributes and large dataset Microsoft SQL Server
is implemented, which is a Relational Database Management System.

College of computing
Department of computer science
MaddaWalabu University
64
Figure 3.22 Relationship diagram of tables

College of computing
Department of computer science
MaddaWalabu University
65
3.2.19. User Interface design

The user interface design is the part of software which a user directly interacts with. In software system, user interface prototypes
represent user interface requirements. The following are some of user interfaces of software we are going to develop.

Figure3.23Login interface design

College of computing
Department of computer science
MaddaWalabu University
66
Figure3.24 Home page interface design

College of computing
Department of computer science
MaddaWalabu University
67
College of computing
Department of computer science
MaddaWalabu University
68
College of computing
Department of computer science
MaddaWalabu University
69
Figure3.25 Admin page interface design

College of computing
Department of computer science
MaddaWalabu University
70
Figure 26Judge Page interface design

College of computing
Department of computer science
MaddaWalabu University
71
CHAPTER FOUR
OBJECT DESIGN
4.1. Introduction
In this part of documentation we shall see among others revised class diagram, class description, visibilities and attribute description.
BZHCMS that we are going to develop is going to be web based system, accessed by the authorized user.

4.2. Revised class diagram

Class diagram shows the static structure of data and the operations that act on the data, i.e. itshows the static structure of an object-
oriented model the object class, their internal structure,and the relationships in which they participate. Class diagram represents a
detailed view of asingle use case, shows the classes that participate in the use case, and documents the relationshipamong the classes.
It is a logical model, which evolves into a physical model & finally becomesfunctioning information system.

College of computing
Department of computer science
MaddaWalabu University
72
College of computing
Department of computer science
MaddaWalabu University
73
Figure 3.27 Revised class diagram

4.2.1. Class description


As we can see from the above the revised class diagram has five basic entities. Those entities are: admin, judge, law officer, and
customer. Each entity has their own attributes. Also each attributes have their own characteristics such as parameter type (such as
string, numeric ...etc.)

College of computing
Department of computer science
MaddaWalabu University
74
Judge
As indicated above an entity judge should have to store information like id, name, etc. The judges enter to the judge page using their
account and record evidence and witness. After he/she record the evidence he/she can able to see the record.
 Record evidence and
 View the evidence.
Law officer
A law officer also as judge can store their information in to the data such as user-name, case type. The law officer enter to the
officerpage using their account and register, assign the employer and customer and see report. After they see the report prepared by
the employer, he/she can able to generate report (update and delete).
Customer
A customer also as judge and law officer can have their own password and user name. The customer enters to the customer page using
their account. The customer performs the following operation:-
 View decision
 View appointment
 View comment and
 Change password

Admin

The administrator as customer, law officer and judge can have their own password and user name. The administrator enters to the
admin page using their account. The administrator performs the following operation:-

 Create accountand
 Manage accounts
 Generate report
4.2.2. Visibilities

College of computing
Department of computer science
MaddaWalabu University
75
The system should always keep users informed about what is going on, through appropriate feedback within reasonable time."

Visibility requires that users stay informed about where they are in relation to other pages on the site. This allows them to have a
mental map of the site and easily navigate both to new pages and ones visited previously scheduling system has some features that
help with visibility, but still fails to provide a good visibility experience.

The site generally preserves top navigation throughout. However, besides a title at the top of each page, there is nothing to indicate to
the user what page they are on.

4.2.3. Attribute description


Attributes in entity judge
 User name: - name of the judge.
 Password:-private account number of the judge.
 View decision:-the place where the judge can able to view decision.
 Give appointment: - the judge can give the appointment for customer.
Attributes in entityLaw officer
 User name: - name of the law officer.
 Password:-private account number of the law officer.
 View report:-the place where the law officer can able to view report.
 Generate report: - the law officer can see any other report he/she can generate request to the law officer.
Attributes in entitycustomer
 User name: - name of the customer.
 Password:-private account number of the customer..
 Update:-attribute used to modify an exist accountant to the court system.
 Delete: - attribute used to delete a user from the court system.
 Save: -attribute used to save information added, updated or done to the court system.
 Send: -attribute used to send information to another page, or done to the court system.
Attributes in entityAdmin
College of computing
Department of computer science
MaddaWalabu University
76
 User name: - name of the administrator.
 Password:-private account number of the administrator.
 Create account:-attribute used to create new account.
 Manage account:-attribute used to manage another’s accounts.

CHAPTER FIVE
IMPLEMENTATION AND TESTING
5.1. Introduction
The implementation document enables the user (society) as well as the administrator to work with the system and to use the
application efficiently and effectively. It helps users not to be confused with the system. It includes sample snapshot and some selected
fragment code. It gives the users a brief over view of the system.

5.2. Coding
First phase of implementation is coding. Coding is the process whereby the physical design specification created by the designers is
turned in to working computer code by the programmer. Modern language that used is Hypertext Preprocessor (PHP).The code is
made simple in such a way that another programmer can easily understand and work on that in future.
Sample code
College of computing
Department of computer science
MaddaWalabu University
77
Login Code
<html>
<body>
<?php
if(isset($_POST['login']))
session_start();
$fname=$_POST['fname'];
$password=base64_encode($_POST['password']);
$role=trim($_POST['role']);
//$pwd=md5($p);
// ;andPassword='$pwd' ";
$conn=mysql_connect("localhost","root","");
if(!$conn)
{
die('Could not connect:'.mysql_error());
}
mysql_select_db("bzhcms", $conn);
$result=mysql_query("select * from useraccount1 where
fname='$fname'&&password='$password'&&role='$role'");
$num=mysql_num_rows($result);
$record=mysql_fetch_array($result);

//$_SESSION['login']='yes';
$_SESSION['loginname']=$record['fname'];
$_SESSION['logintype']=$record['role'];
$r=$record['password'];
if($num>0 && $r==$password) //&& $record['password']==$pwd)
{

College of computing
Department of computer science
MaddaWalabu University
78
if($record['role']=='Administrator') //&& $record['password']==$pwd)
{
//if($record['password']==$pwd)){
$_SESSION['login']='yes';
include("Registrar.php");
}

elseif($record['role']=='judge') //&& $record['password']==$pwd)


{
//if($record['password']==$pwd)){
$_SESSION['login']='yes';
include("judge.php");
}

elseif($record['role']=='lawofficer') //&& $record['password']==$pwd)


{
//if($record['password']==$pwd)){
$_SESSION['login']='yes';
include("officer.php");
}
elseif($record['role']=='customer') //&& $record['password']==$pwd)
{
//if($record['password']==$pwd)){
$_SESSION['login']='yes';
include("customer.php");
}
}

College of computing
Department of computer science
MaddaWalabu University
79
else
{
echo"<script language=\"javascript\" type=\"text/javascript\">
alert(' please check your User name and password ');window.location='login.php'</script>";
}

?>
<form action="login.php" method="post" onsubmit='return formValidation()'>

<table bgcolor="white"style="border:0px black; border-radius:20px;margin-top:50px;box-shadow:2px 2px 2px2px white;"


width="400px" height="300px" align="center">

<tr>

<td colspan=2 align='center'>

<!--End of PHP script-->


<font color='black' size="5px">Logins </td>
</tr>
<tr>
<td><font color='red'> * </font><font color='black'>first name</td><td><input type="text" name="fname" required x-moz-
errormessage="Please Enter your user name" title="Enter your user name" value="" size="20%" id="txt_username"
placeholder="username"></input></td></tr>
<tr>
<td><font color='red'> * </font><font color='black'>Password</td><td><input type="password" name="password" required
x-moz-errormessage="Please enter the Password" title="Enter the Password" value="" size="20%" id="txt_password"
placeholder="Password"></input></td></tr>

College of computing
Department of computer science
MaddaWalabu University
80
<tr>
<td><font color='red'> * </font><font color='black'>role:</td>
<td><select name='role' required x-moz-errormessage="Please select your user type" title="Please select your user type ">
<option>select role</option>
<option value='Administrator'>Administrator</option>
<option value='Judge'>judge</option>
<option>customer</option>
<option>lawofficer</option>
</td></tr>

<tr>
<td colspan=2 align='center'><input type='submit' value='login' name='submitMain' Onclick="return check(this.form);"/>
<input type='reset' value='Reset'/></td></tr>
<tr>
<td colspan=2 align='center'><a href="forget.php"><font color='red'>Forget Password?</a></td></tr>

</form>

</table>
</table>
</body>
</html>

5.3. Testing

We have tried to test individual pages as well as the whole system. This process involves any activity aimed at evaluating an attribute
of pages or capacity of application and determines that it meets its intended objectives. In short, it is the execution of the system to see
its capability and effectiveness. Hence, our main goal is finding errors (if any) and correcting them. The overall test plan is not just a
College of computing
Department of computer science
MaddaWalabu University
81
single document but a collection of documents. Each of the component documents represents a complete test plan for part of the
system or for particular type of test.

Unit testing
Modules are test
Sample data to be test the modules, variables and sample outcome of testing
Unit Testing

We have tested each subsystem individually in detail. If any error happens we try to solve it until the system meets the required
target. We have profoundly and careful test each and every unit of the system. In an attempt to discovery any error that may
exists. Each of individual form accepts the valid input and gives the expected output. Each and every procedure on thesystem is
tested to be flexible and produce exact answer or output to achieve the exact objective of the proposed system.

A. User Login page with wrong input data:

When we are conducting the unit testing process of our system for the users login page, we have got that if he/she enters wrong
password; it checks and display a message “wrong password!!

Figure 18: User login with wrong invalid data

B. User Login page with null input data:

We have also tested the user login page to check whether it allows the user to login with a null field value or not. As we have seen that
if the user tries to login without filling the necessary data in the appropriate field, it does not allow him/her to login and displays a
message “please fill out this field”

Integration testing

The objective of system testing are

 To verify that the system components perform effectively.


 To demonstrate that the system perform functionally.
College of computing
Department of computer science
MaddaWalabu University
82
 To perform appropriate types of tests relating to record management system.

For example, while registering a criminal we have to make sure that the new criminal that the database manager is trying to register
uses the same criminal id as the old one. The criminal must be reviewed first.

The system can be tested in the following manners;


Testing made How to test
Input Expected output
Enter the necessary data and click on register register successfully
button
Update/modified data Update successfully

Table 3 Testing

Functionality testing
During this phase we have tested the system by using users and administrator privilege to minimize the system failure and errors
means ensure form and basic validation for the system. for instance, some user may enter number instead of text or input text instead
of number also some user perform submit button without entering full data so when this type of problem happen the system display
error message to enter right and to perform appropriate action on the form.
5.3.1. Hardware and software Requirements

Software requirement are:-

 Php, html and JavaScript application.


 Wamps server - for web server software
 MySQL– to develop database application
 Note pad++ and microwave dream waver
 Microsoft Office Word 2013.
 Microsoft Office PowerPoint 2013.

College of computing
Department of computer science
MaddaWalabu University
83
 Operating System: Windows 7 or further versions
 Edraw max 7.0, Micro soft Visio 2007

Hardware requirements:-
 Computer/laptop with more than 250GB hard disk, more than 4GB RAM.
 Pencil
 Pen
 CD/DVD
 Paper

College of computing
Department of computer science
MaddaWalabu University
84
CHAPTER SIX
USER MANUAL
6. Introduction
The system is web based everything important for the user will be explained and implemented while giving short training when the
system is deployed.

6.1. Getting started


During the deployment of the system Training will give for system user to aware how it works. The project group members will give
short time training for the system administrators and workers explaining how the system works and in what way they can manage the
system developed

6.2. Start-up strategy


One which needs password and username that is for administration, administrator, to access those parts one has to have password and
user name so that he/she can enter into it and use it.
6.3. Installation
This project is now completed and ready for use .It can’t be installed to the desired destination and it provides all the functionalities it
is intended for because it is web-based .This is done by creating all the data bases and tables that helps to store the purpose of reuse
the data and to validate the new data with the old data.

College of computing
Department of computer science
MaddaWalabu University
85
6.4. System flow
The system flows smoothly and promptly to those who have been trained since; they can easily be adapted with system and perform
the required operation.

CHAPTER SEVEN
CONCLUSION AND FUTURE WORK
7.1. Conclusion
Court is the place where legal trial takes place and where crimes, etc. are judged. The very common problems in the Office of
the Bale zone high court can be attributed using of manual/file based recording system. Since then using of manual/file based
system has the following drawback:

 It is impossible to get the desired record at the desired time.


 Most of the time the Officials spent their time by searching of records.
 Finding of records is most probably needs weeks and months.
 Also there might be a fraud inside the office intentionally or by mistake.
 The client need to go to the court in person to have any contact with thecourt and this is so difficult for persons with
disabilities.
College of computing
Department of computer science
MaddaWalabu University
86
 The client must go at least three or four times to finish one case this willcause unnecessary waste of money, time and
energy.
 Increase bribery, in order to get priority and get quick response the clientwill prefer to bribe.
 They need a large space to store files.
 Peoples will be discouraged to take their case to the court and thisincreases illegal acts.
 The way of putting files is unsecured.
 We need a lot of human resources in courts.

We conclude from this that the systems need to be corrected.

7.2. Recommendation
Through the insight observation we have made in process of designing thissoftware we have come across many
recommendations we would like to make.

Eventually, we as the system developer recommend the following points:

 This system will give a solution for some of the problems in high court office of Oromia region related to case process.
 There should be a healthy working environment, specifically in regard to thedatabase administrators whom the Office of
the court going to assign the totalauthority to view the security database and handle problems that may arise in
theapplication of the process that takes place in the Office of the supreme court .

Court Management System for Bale zone high Court management system (BZHCMS)

A Senior Project in Partial Fulfillment of the Requirement for the Bachelor of Science Degree in Computer Science.

Department of Computing Maddawalabu University

 The office has to fulfill all the infrastructures needed for the system’simplementations. In addition, all the specifications
mentioned for the hardwareand software is mandatory.
College of computing
Department of computer science
MaddaWalabu University
87
References
 www.w3 school.com
College of computing
Department of computer science
MaddaWalabu University
88
 Project management institute(2004), “guide to the project management body of knowledge”, third edition, PMI press.
 Scott w. Ambler, 2003. Elements of UML-Ambler.
 www.amazon.com>BOOKS>computers $Technology>programming>Language Tools>java
 www.a1vbcode.com
 Office of the Judiciary, 2007, “Annual Judicial Statistics, Thailand 2007”.
 Leeuwenburg, J. and Wallace, A., 1999, Technology for Justice Report, AJJA.
 Oskamp, A., Arno R.L. and Apistola, M., 2002, “IT Support of the JudiciaryAustralia, Singapore,
 Venezuela, Norway, Netherlands and Italy”, Information Technology & Law Series,
 T.M.C.ASSER PRESS, pp. 20-27.
 www.bzhc.com

College of computing
Department of computer science
MaddaWalabu University
89

You might also like