Project Guidelines Final Submission
Project Guidelines Final Submission
All undergraduate students studying the various degree programmes of SICT at CBU should
complete independent projects as part of their studies. Except the BIT students, other students
(Computer Engineering, Computer Science and Information Systems) will do their projects in
Year3 and Year4. In year3 the students will do a Group project and in the Final year the students
will do a Major project. Based on the complexity of the final year project students are allowed to
do in groups not exceeding more than two students.
Note that CS301 is the course code for the Group Project and CS400 is the course code for Major
Project Both are 4 credit courses. Generally, a 4-credit lecture course typically requires you to
spend 4 hours in lecture and an average of 8 hours each week completing specific assignments
outside of class. Therefore, for a project, you will use all 12 hours of each week working
independently on your project. You will meet with your supervisor each week, so if there are 11
hours left, this adds up to 275 hours of work over the course of 25 weeks spread across the three
terms.
The BIT students will do their projects in levels 5 and 10. If you are an IT student, the level 5 and
level 10 projects are your only academic responsibility for a whole semester, and we expect you
to devote yourselves entirely to your projects during that time.
All these projects require a significant amount of time and effort from both students and
supervisors and replace other material that could be learned during that time. The students can’t
accomplish a project in only a week or even a month, while they are also attending to your other
courses. They need to set small, frequent goals throughout the project and to make weekly progress
attaining those goals.
As the curriculum of the various degree programmes under SICT requires two such projects to be
carried out, the student’s ability to do projects will grow with each project. To demonstrate that
Note: The students are expected to submit their proposed project topics at the end Term III of the
previous academic year. For example, CS400 topics should be submitted at the end of Term III
during the third year of study. CS301 topics have to be submitted at the end of Second year.
Timeline
Milestones CS400/IS400 CS301 BIT590 (level DIT
(common to CS, (common to CS, 10) 500/BIT300
CE, IS students) CE students) (level5)
Allocation of 1st week of Term1 1st week of Term1 1st week of 1st week of
Supervisors Semester Semester
Written Project 4th week of Term1 4 week of Term1 4th week of
th
4th week of
Proposal of the Academic of the Academic Semester Semester
submission to the year year
department
Proposal oral 5th week of Term1 N/A N/A N/A
presentation in
front of SICT panel
of Staff members
Student meeting Weekly once as Weekly once as Weekly once Weekly once as
with supervisors agreed with the agreed with the as agreed with agreed with the
Supervisor Supervisor the Supervisor Supervisor
throughout the throughout the throughout the throughout the
year year Semester Semester
Project Progress 6th week of Term2 N/A N/A N/A
Report submission
to the department
Project progress 8th week of Term2 N/A N/A N/A
Seminar (oral (in front of
presentation and
Note: The student-supervisor meeting Register has to be signed for every meeting. Find the
template in the Appendices III & IV.
Project Proposal
A written proposal that gives the topic you have chosen, the objectives for completing the project
(in other words, the reasons why completing this project is important), and a project plan including
resources you require, specific written sources you will consult to complete the project, the risks
you face, and a project timeline listing the basic activities you will complete and how long you
expect each to take. (Refer sample Project proposal template in Appendix 1)
At the end of Term 3 the Final project report and presentation will provide evidence of the
communication skills as well as the content of the work and the applications of the principles of
research methodology. Levels of understanding will also be assessed through the oral
examination. The Final Project report will be expected to contain details of the investigations
CS301
Milestones Achieved Percentage of Presentation panel Who Assesses the
Marks allocated Performance
Project proposal 10% Supervisor Supervisor
Supervisor CA marks 30% Weekly meetings Supervisor
based on weekly progress with Supervisor
Final Project Report 30% Supervisor Supervisor
Final defence 30% Department Department panel
While your report must contain all the required details, you will not gain extra points by “padding”
your document with extra words or by rambling.
The font shall be Times New Roman or some other serif font with a size of 12 points. Line spacing
will be 1.5 in the body, and single spacing in the Abstract, in indented long quotations, and in
footnotes and within bibliographic entries. All margins will be 1 inch on each side. Abbreviations
Binding
A4 paper shall be used and should be of good quality and sufficient quality for normal reading.
Final reports will be bound within boards, the binding being of a fixed kind of which leaves are
permanently secured in the manner of a hardback book. The boards shall have sufficient rigidity
to support the weight of the work when standing on a shelf.
The spine shall be labelled with the following information:
• The surname and initials for the candidate (or group number).
• The full or abbreviated title of the report.
• The name of the program for which the report is being submitted (BSCS, BSCE, DIT, or
BIT)
• The year of completion.
For example: Lengwe M. Voice Messenger BSCS 2007
Page Numbering
All pages before the Motivation section should be numbered in Roman numerals. The title page
will be counted, but not numbered. The numbering format for the rest of the document will be
1,2,3, … or page 1, page 2, page 3, … and at the bottom-right corner of the page.
Title not more than 15 Must be clear and understandable, a recent ICT area or
words field of Computer Science, Engineering and Information
Systems.
Background Half page It covers the historical background of the project
information subjected to research.
Introduction Up to One page This relates to the topic at hand and how it ties with
background information. An outline of the sections you
will cover should be presented here.
Problem statement Maximum One What is the real issue which the scholar is going to
page investigate? Use previous literature.
Objective & Specific Half page What objectives the proposed research wishes to
Objectives accomplish.
Hypothesis/hypotheses One page What are the unknown factors which the scholar is going
Or Assumption (where to probe?
applicable)
The Research 1 page Explain how you will undertake your study, the materials
Methodology you will use, the procedures you will undertake, the
analysis you will use. And clearly state which system
development methodology you will use were applicable
e.g. Agile, Waterfall methodology.
Significance of your Half page What is the significance of your study?
study
Expected contribution Half page How does your study contribute to the field of ICT at the
and implications of global level, regional or Zambian Context?
your study
Ethical Issues in Half page Explain how you will account for ethical issues raised by
Computer Science, your study.
Computer Engineering
and Information
Systems research
Project Timeline/Gant Half a Page Use a chart to show how you will accomplish your study
Chart during a specified period.
Financial Implications Half a Page Provide a budget based on your project requirements.
Title Page
This page has the title of the project, the name of the student (or names of the students if it is a
team project). CS students will include the statement “This project report is submitted in partial
fulfillment of the requirements for the award of a Bachelor of Science Degree in Computer
Science”. DIT students will include, “This project report is submitted in partial fulfillment of
the requirements for the award of a Diploma in Information Technology” and BIT students will
include “This project report is submitted in partial fulfillment of the requirements for the award
of a Bachelor Degree in Information Technology”.
Declaration
This section is used to show and authenticate the author of the report. It includes the statement
“I hereby declare that this submission is my own work and that, to the best of my knowledge and
belief, it contains no material previously published or written by another person nor material
which to a substantial extent has been accepted for the award of any other degree or diploma
of the university or other institute of higher learning, except where due acknowledgement has
been made in the text”.
(signature/name/date)
Dedications
This part is included if the author wishes to dedicate their work to a person or people who is/are
special in his/her life. It should not take more than one page.
Acknowledgements
In this part, the author thanks those who helped him or her in scientific matters related to his
or her project; also others who provided indirect help: physical, financial, social, emotional,
psychological etc.
Table of Contents
This section contains the headings (and one or more sub-heading(s)) of all the sections and
chapters in your project report, and their associated page numbers. Chapter 1 of your report
should start on page 1. The earlier pages, including the Table of Contents and Lists of
Figures and Tables, should be numbered using Roman numerals. Microsoft Word can generate
this table automatically (including inserting and updating the page numbers for you!) if you use
the Heading styles that are provided in the electronic sample document. In MS Word 2007 and
later, Heading Styles are found in the ribbon tool bar under Home. Just click on each of your
headings, and select the appropriate style (Heading 1, Heading 2, etc.). Then, to update the
headings andpage numbers in the Table of Contents, just click on the table and choose Update
Table.
List of Figures
This section contains the headings of all the figures (i.e. diagrams, pictures and graphs) in the
main body of your project report, and their associated page numbers. Again, Word can
keep these up to date for you. To insert figure captions that can be referenced in the List of
Figures, choose Insert Caption whenever you are going to write a caption, and choose the
Figure label option. Applying the Caption Figure style to each figure caption will give you
consistent spacing throughout your document.
CHAPTER 1: INTRODUCTION
1.1 Introduction
The introduction chapter should set the scene and give a high- level problem statement/
specification, so that after reading the introduction the reader understands roughly what the
problem is and what you intend to do about it. Is the idea to write software, or develop an
algorithm, or produce hardware, or something else? Finally, you must briefly introduce the
structure of report (what you will cover in which chapters and how these relate to each other).
This chapter can be presented in the following sub-sections: (1) introduction (2) background or
motivation and (3) Problem Statement (4) Objectives of the Research project (5) Purpose Scope
& Applicability (6) Organization of the Project Report (7) conclusion of the chapter
1.4 Objectives
Concise statement of the aims and objectives of the project. Define exactly what is going to be
done in the project; the objectives should be about 30 /40 words. Start by using the phrase “The
overall objective of this project is……”. Specific Objectives are:
1. “To research and investigate…..”
2. “To design…..”
You can break the overall objective in to three to four specific objectives.
2.1 Introduction
Every Chapter should start with an Introduction to the chapter and end with the Conclusion of
that chapter.
This chapter describes the research the author has done in order to prepare for the project. The
review can be presented in the following sub-sections: (1) introduction (2) related work and (3)
previous systems (4) lessons learnt from the review (5) a critique of the review (6) conclusion
of the chapter
Most important of all, ensure that in your review you have attempted to answer the following
questions: Where did the problem come from? What is already known about this problem? What
other methods have been tried to solve it?
2.4 Citations
Any figure, image, equation, number, or year that is taken from another source must be cited.
Content and terminology from other sources must also be cited. For more information about
citations and their use, refer the Section REFERENCES and Appendices.
When referring to previous work use names. References should be accurate and complete,
including things like page numbers, date accessed if it is an online document. Refer appendix
VI for APA style of referencing.
Again, Word can help keep the figure numbers correct, even when you add figures or move
them around. In your text, choose Cross-reference; in Word 2007+, this is under the
References menu. Choose Figure for the reference type, and only label and number where it
says “insert reference to”.
2.5 Plagiarism
Plagiarism is presenting somebody else's work as your own work. It includes: copying information
directly from the web or books without referencing the material; working with one or more other
If however you choose to make use of other people's code then in order to avoid an accusation of
plagiarism, you must annotate their listing identifying the lines of code which are not your own.
You must clearly state their source e.g. name of author, page in the book that they have taken the
code from, Web page address. Failing to reference work taken from other sources is a plagiarism
offence and will be dealt with as such.
2.7 Conclusion
Every chapter should have a conclusion explaining the activities achieved in that chapter.
3.1 Introduction
In this chapter the system development methodology is chosen and how you proceed with your
project based on the methodology have to be explained. Apart from that you have to explain the
methods used for Information gathering and analysis. If there are existing systems in place, system
analysis should be carried out too. Then based on the information gathered and analysis the
proposed system’s Requirements specification have to be specified. The proposed system can be
a pure software project or it can be a Hardware cum software embedded project. This is related to
the problem you have to tackle and the exact form of this will vary from project to project.
For example, any software project should include a discussion of the principles which underlie the
program that has been written: the significance of its data structures, the way that its procedures
and modules interact and the processes involved in discovering and documenting these
requirements has to be discussed.
Some of the above methodologies can be used not only for software development but for Hardware
project development as well. For example, as shown in Figure 1, Agile can be applied to hardware
development. With Agile, both hardware and software features are broken down into smaller
chunks – only the methodology is a bit different for each. Once software is working, it can be
deployed either on any available hardware “modules”, or in a test or simulation environment.
Requirements analysis encompasses those tasks that go into determining the needs or conditions
to meet for a new or altered product or project, taking account of the requirements of the various
stakeholders, objectives and other external requirements. Then analyse and develop requirements
specifications from the cconcept of ooperations and validate software or system requirements.
3.6 Conclusion
Every chapter should have a conclusion explaining the activities achieved in that chapter.
4.1 Introduction
The examiners are interested in the engineering process you went through in performing your
project work as the results you finally produced. So, make sure your report identifies what design
choices have to be made, what were the possibilities, and why you made the particular choices and
decisions that you did. They are looking for principled rational arguments and for critical
assessment. The reasons for a design decision may be various, and may in some cases be out of
your control. Explicit understanding of this, and the ability to communicate it, is important.
Describe the architecture, the system modules, the interfaces, the database schema, important
algorithms, system maintenance recommendations/requirements, etc.
Modelling Tools used are Data Flow Diagram Modelling Tools used are Class diagram design,
(DFD) & E-R diagram model the data. Sequence diagram, State Chart diagram, and Use
Case diagram all contribute.
Note: Students are therefore expected to model the requirements elicited in CHAPTER 3 and
produce models using the various design tools.
4.5 Conclusion
Every chapter should have a conclusion explaining the activities achieved in that chapter.
CHAPTER 5: IMPLEMENTATION
5.1 Introduction
This chapter shows the implementation details of the Project. It will also show the steps required
to achieve the complete project. In this section all the implementation details are presented
including the software and hardware used.
Describe the system set-up that is required for developing your solution, the components of your
deliverables, the system set-up that is required to deploy the solution, installation procedure, user
training requirements and status, testing of the system, trouble-shooting guidelines, guidelines for
further work.
5.3 Coding
Codes included should illustrate algorithmic flow, or highlight an interesting optimisation,
demonstrate interactions with a data-structure, or give an example of input for a tool that has been
designed. You should be able to explain what message or point a line of code in the fragment is
conveying, and if you cannot justify it shouldn’t be in the code fragment.
Note: Complete listings of code may be included as appendices of your report.
5.4 Results
Results are shown as screenshots. Screen-shots are sometimes used instead of drawing a picture
or in order to capture the results of running a tool. They are also sometimes used as page filler, or
as “proof” that a tool was launched and something compiled, which is not necessary. Use a screen-
shot only if it is demonstrating a particular point, such as a particular interaction that is
difficult/impossible to highlight, but make sure you edit and annotate the figure to show and
highlight the important parts of results.
5.5 Conclusion
Every chapter should have a conclusion explaining the activities achieved in that chapter.
6.1 Introduction
The purpose of this chapter is to assess the functionality (functional and non-functional
requirements) of the system and evaluate the approach taken. This section is normally useful
for software or hardware deliverables and less relevant in analytical projects.
Sometimes non-working designs are described in project reports as though they work, when in
reality they don’t, or only partially work. Therefore, a precise description of what works and how
this has been established is important. Examiners may try to compile, use, or test deliverables
themselves (even after your report is submitted), and your report should accurately reflect the state
of the project.
6.3 Evaluation
It must contain your critical evaluation of your work as compared to previous analysis, algorithms,
products, and when related to your original objectives.
To write an evaluation you must provide answers to the following:
Ø To what extent have your original objectives been fulfilled?
Ø What are the advantages, disadvantages of your approach compared with related work?
Ø How does the scope of your work differ from related work?
Ø What was the most difficult and/or clever part of the project?
Ø Was the development process model used appropriate (if not, why not and what else
should have been used)?
Ø Was the programming language (if used) suitable?
Ø What difficulties did you face and how did you overcome them?
Ø What have you learnt and experienced from doing the project?
Ø How do you recommend the project should be taken forward in the future?
6.4 Conclusion
Every chapter should have a conclusion explaining the activities achieved in that chapter.
This chapter should include an assessment of the success of the finished product. Have you
achieved your objectives? If not, why not? It should also contain suggestions for future
extensions, or alternative methodologies that, with hindsight, might have led to a better
system.
7.1 Conclusion
This section summarizes the project work carried out and lists the resulting advantages.
Remind the reader what the original problem to be solved was. Restate the specific objectives
of the project and undertake a critical analysis of how well these objectives have been met.
1. Conclusion is written to relate directly to the main objective /specific objectives of the
project stated in the introduction chapter.
2. Indicate the extent to which the aims have been achieved.
3. Summarise the key findings, outcomes or information in your report.
4. Acknowledge limitations and make recommendations for future work (where
applicable)
REFERENCES
A reference list is a complete list of references used in a piece of writing including the author
name, date of publication, title and more. This list is provided after the last chapter of the
report.
As you write sections of your report, it is a requirement to provide in-text references using
APA referencing. In-text references must be included following the use of a quote or
paraphrase taken from another piece of work. In-text citations are citations within the main
body of the text and refer to a direct quote or paraphrase. They correspond to a reference in
the main reference list. These citations include the surname of the author and date of
publication only.
You encouraged to cite literature that has been published in the last five years from books
and journal articles. If you cite a journal article or book, the reader can go to a library and
check the cited document to confirm whether or not it says what you say it did. Therefore,
ensure that your references are correct and specific.
Should you reference websites? If so, how should it be done? A website may disappear, or it
may have its content updated or changed completely. Nevertheless, websites are very useful
sources of information. You should give the URL and the date you accessed it. If there is a
date on the site itself (last updated on …), you should include that as well.
APPENDICES
If there is material that should be in the report but which would break up the flow or bore the
reader unbearably, include it as an appendix. Make references in the body of the report to
appended material. Some items that should be included in the Appendices are:
• The original project proposal – you may just copy and paste it here without
modification.
• Installation manual – include the steps to guide the operator in installing the program.
Screen dumps of confusing steps are helpful.
• User manual – include how to start the system, how to run it (for example, adding
records to a database, running queries, and setting up security for the database
administrator). Also include screen dumps of important components of the working
program, for example, data entry, queries, and reports.
• Sample code – include important code. You must include code that solves the key
problem, server code, and input validation. You may include any other code that you
In addition to writing the report, you will be assessed on your ability to present your
project.The presentation procedure will apply to all the groups i.e. Computer Science,
Computer Engineering and Information Systems.
Your final year project would be presented through three main items, namely, (i)
Hardware/Software demonstrations, (ii) Power point presentation, and (iii) Project Report.
Project report is a key document that shows how you have accomplished your project. It
presents your understanding on the project, explains the project plan, provides the results of
each stage on your project, describes the outcome, and presents the evaluation and your
conclusion on your final year project.
In fact, the project report is one of the main deliverable items based on which your project
would be evaluated and marketed. Refer Appendix II for the Template of Project Report.
However, a general outline of a typical project report was presented in the previous chapters.
It is crucial to pay attention to all the details that you have to present.
Test Documents
Ø Provide your test cases, test data, and test results as evidence of your testing process.
Ø Categorize test documents based on the guidelines, which were provided in previous
chapters.
Ø Do not forget to provide this document as a supplementary document to show what
has happened during your long journey through your final year project.
Electronic Documents
Obviously, in almost the entire computing projects your documents and products are mainly
in electronic format. Your final year project is exceptional in this regard. According to your
If you are asked to prepare a physical medium on which you should provide your final year
project, make sure that you have paid utmost attention in preparing this item. Sometime,
because of the procedures, your physical medium could not operate properly it would be
considered as incomplete project. This may cause you a severe penalty in your project
evaluation.
Presentation
Presentation is the way that you are going to sell your products. You might face with different
situations. All departments ask students to present the outcome of their projects in front of a
panel of academic staff in a way that is expected. Presentation is an activity, which takes place
in a short period, usually between 10 to 20 minutes. Therefore, its structure, preparation,
contents, and delivery should be very well designed and implemented. Presentation, provides
you with a unique opportunity within which you are able to introduce your capabilities on the
subject, understanding of the chosen topics, and presenting the results and outcomes of your
project. This is an important event. Do not forget that this activity must have been planned
and scheduled in your project plan and you should be very careful on the timing of the event.
CONCLUSION
We hope that this document will help you to create an excellent project and report. For
questions related to the project that are not specified in this document, please consult your
advisor. Good luck!
2. Literature review
2.1.
2.2.
3. Research Methodology
3.1.
3.2.
7. Financial Implications/Budget
REFERENCES
(APA format)
REFERENCES
(APA format)
APPENDICES
Appendix 1: The original project proposal,
Appendix 2: Installation Manual
Appendix 3: User Manual
Appendix 4: Sections of Program Code
Appendix 5: Questionnaires – if you used them
Appendix 6: Data Files if any
Appendix 7: Component Specifications if any
COPPERBELT UNIVERSITY
SCHOOL OF INFORMATION AND COMMUNICATIONS
TECHNOLOGY
CS 400, IS 400, DIT 590
FINAL PROJECT ATTENDANCE REGISTER
NAME:
STUDENT NO:
DEPARTMENT:
SUPERVISOR:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
COPPERBELT UNIVERSITY
SCHOOL OF INFORMATION AND COMMUNICATIONS
TECHNOLOGY
CS, CE AND IS THIRD YEAR
GROUP PROJECT ATTENDANCE REGISTER
DEPARTMENT:
SUPERVISOR:
NAME OF GROUP:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
In APA Style Using an example author James Mitchell, this takes the form given for a
single author.
Single Mitchell (2017) states… Or …(Mitchell, 2017).
author
Two Mitchell and Smith (2017) state… Or …(Mitchell & Smith, 2017).
Authors
Three to five For the first cite, all names should be listed:
authors Mitchell, Smith, and Thomson (2017) state… Or …(Mitchell, Smith, &
Thomson, 2017).
Further cites can be shorted to the first author’s name followed by et al:
Mitchell et al (2017) state… Or …(Mitchell et al, 2017).
Six or more Only the first author’s surname should be stated followed by et al,
authors Mitchell et al (2017) state… Or …(Mitchell et al, 2017).
No Author If the author is unknown, the first few words of the reference should be
used. This is usually the title of the source.
Articles/Chapters in Book
Website
Mitchell, J.A. (2017, May 21). How and when to reference. Retrieved from
https://www.howandwhentoreference.com.
System Requirements Specification may have the following sections and subsections.
Functional Requirements
These are statements of services the system should provide, how the system should react to
particular inputs, and how the system should behave in particular situations. In some cases,
the functional requirements may also explicitly state what the system should not do.
Functional system requirements vary from general requirements covering what the system
should do to very specific requirements reflecting local ways of working or an organization’s
existing systems.
• Describe each functionality of the system one at a time;
• A functionality can be an information processing functionality involving some
mathematical functions;
• A data input/output/transfer functionality;
• Special processing functionality for system maintenance, etc.
• A data storage requirement can be expressed in terms of appropriate input and output
functions.
Non-functional requirements
These are constraints on the services or functions offered by the system. They include timing
constraints, constraints on the development process, and constraints imposed by standards.
Non-functional requirements often apply to the system as a whole, rather than individual
system features or services.
Performance Requirements
These requirements specify or constrain the behaviour of the software. Examples include
performance requirements on how fast the system must execute and how much memory it
External requirements: This broad heading covers all requirements that are derived from
factors external to the system and its development process. These may include regulatory
requirements that set out what must be done for the system to be approved for use by a
regulator, such as a central bank; legislative requirements that must be followed to ensure that
the system operates within the law; and ethical requirements that ensure that the system will
be acceptable to its users and the general public.
Figure 3.3 shows examples of product, organizational, and external requirements taken from
the MHC-PMS whose user requirements were introduced in Section 3.3.
Context Model
The operational boundaries of the Radio Frequency Identification (RFID) student attendance
system for Binary University will encompass the finance management system, the student
management system, lecturer management system and class scheduling management system.
The finance management system will provide student financial details that will be used to
prevent the student who have not settled their school fees from accessing the Radio Frequency
Identification (RFID) student attendance system. The student management system will
provide the existing student details while the lecturer management system will provide the
lecturer information such as staff identification, lecturer names, subjects take by distinct
lecturer and any other relevant information patterning to attendance. The class scheduling
management system on the other hand will provide the exact location and time a particular
class will be taking place. The system context for the Radio Frequency Identification (RFID)
student attendance system is as shown in figure below.
ACTORS Student
DATA The RFID reader read the presented RFID tag and sends the Tag details for authentication
against the details in the attendance database and the authenticated attendance details are then
saved in the attendance database.
STIMULUS The student presents their RFID tag to invoke the attendance recording process.
RESPONSE The RFID reader reads the presented RFID tag and sends the Tag details for authentication
against the details in the attendance database and the attendance is recorded against the
DATA The user enters their username and corresponding password in the user interface which is
then sent for authentication and authorisation with the predefined user rights embedded
according to the accessibility levels.
STIMULUS The user enters their login credential in the user interface.
RESPONSE The system authenticates and authorises the user according the predefined user rights and
provide a login success or login failure feedback.
DATA The user enters their search details either by subject, name or keyword which is then validated
by the user interface and the validated details queried from the attendance database.
STIMULUS The user enters their preferred search details either by name, keyword or subject in the user
interface.
RESPONSE The system returns the search details and displays the search results on the user interface.
DATA The user selects the particular attendance report and the system displays the selected
attendance report on the user interface. The user then request for printing by invoking the
print option displayed in the user interface.
STIMULUS The user invokes the print option in the user interface.
RESPONSE The system provides a print feedback displayed on the user interface.
STIMULUS The user enters their desired new password in the provided change password form displayed
in the user interface.
RESPONSE The system validates the entered new password and the validated password saved in the
attendance database. The system then provides a password change feedback which is
displayed on the user interface.
ACTORS Administrator
DATA The administrator enter the new user details in the new user form displayed on the user
interface depending on the new user accessibility rights whether student, lecturer or
administrator which is then saved in the database.
STIMULUS The administrator enters the new user details in the new user form displayed in the user
interface.
RESPONSE The system validates the entered new user details and the validated details are then saved in
the attendance database.
ACTORS Administrator
DATA The administrator requests for the manage attendance form which is then displayed on the
user interface. The administrator then edits or deletes the attendance data and the managed
data changes are then saved on the attendance database.
STIMULUS The administrator requests the manage attendance form and fills the form.
RESPONSE The system displays the manage attendance form and validates the entered attendance data
and the changes are then saved in the attendance database. The system then displays a manage
attendance success feedback on the user interface.
DATA The user invokes the logout process by selecting the logout option in the user interface and
the session is ended.
STIMULUS The user invokes the logout process through the logout option in the user interface.
Sequence Diagrams
The interactions between the actors of the Radio Frequency Identification (RFID) attendance
system, the Radio Frequency Identification (RFID) attendance system and the Radio
Frequency Identification (RFID) attendance system components are as illustrated in the
subsequent sequence diagrams.
ACTIVITY DIAGRAMS
PRESENTATION
LAYERED ARCHITECTURE
The functionality of the RFID system is organized into layers with related functionality
associated with each layer. The lowest layer will encompass the system support software
mainly the attendance database. The next layer will be the application layer encompassing
the search functionality, the view functionality, print functionality, the report manager and
the security management.
The third layer will include user interface management notably login functionality
(authentication and authorization), form management, query management and attendance
SEARCH
PRINT VIEW REPORT SECURITY
FUNCTIONALITY
FUNCTIONALITY FUNCTIONALIT MANAGER MANAGEMENT
Y
ATTENDANCE DATABASE
REPOSITORY ARCHITECTURE
The repository architecture will encompass the shared repository (attendance database) that
will be accessed by the RFID detection subsystem that will include the RFID reader and
processes to read the presented RFID tag and send the read details for authentication against
those defined in the database. Other subsystems will include the report generator subsystem
to generate the various attendance reports (daily, weekly, monthly, semester, yearly etc.) and
the attendance recording subsystem for recording attendance for the authenticated RFID tag
and saving the attendance in the attendance database. Other subsystems will also include the
attendance administration subsystem and online RFID attendance subsystem that will allow
users to login, search for attendance, view attendance, print attendance reports as illustrated
in figure below.
ONLINE RFID
ATTENDANCE
SYSTEM
ADMINISTRATION
RFID DETECTION ATTENDANCE DATABASE MANAGEMENT
SUB-SYSTEM SUB- SYSTEM
ATTENDANCE
REPORT
RECORDING
GENERATOR
SUB-SYSTEM
Note: The students are expected to adopt one of the four architectural styles.