Final Documentation
Final Documentation
GROUP MEMBERS ID No
SELAMAWIT HAILE AKU0906380
ABADIT KASAHUN AKU0906345
ASKALE WELEAREGAY AKU0906351
i
Axum, Tigray, Ethiopia
September, 2023
ACKNOWLEDGMENT
First of all, we would like to thank the GOD for helping us from the beginning to the end of the
project. The team would like to give deepest thanks to those who helped us for the
accomplishment of this project. Firstly, we would like to say thanks with great respect to our
advisors TEKLAY MURUTS (MSC.) For his constructive comments, for the successful
completion of the first phase of the project and we would like to thank our friends and classmate
for their suggestion and support
ii
ABSTRACT
The AIT store in Aksum University uses manual process system. When customer needs any
materials they must go to the office and record what they want manually, that’s way it is
making the process too late. Which requires the employee to use paper based recording files
to know the status of each customer and to perform the process in the system. Which leads
the system to be inefficient. As part of the effort to bring efficient and modern store
management system in AIT, The new system should be designed and implemented that
enables properties to be controlled and managed properly. The implemented of the system
will be user friendly and built in php programming language and the database. The approach
we are going to implement will be structured query language (MY-SQL) server which will be
more appropriate to store database and queries.
iii
Contents
ACKNOWLEDGMENT...............................................................................................................................ii
ABSTRACT.................................................................................................................................................iii
CHAPTER ONE............................................................................................................................................1
1.1. Introduction................................................................................................................................1
1.6. Methodology..............................................................................................................................3
iv
1.10. Cost Analysis.............................................................................................................................6
CHAPTER TWO...........................................................................................................................................8
2.1. Introduction................................................................................................................................8
2.7. Constraints...............................................................................................................................12
2.8. Assumptions.............................................................................................................................12
CHAPTER THREE.....................................................................................................................................13
System Modeling.........................................................................................................................................13
CHAPTER FOUR........................................................................................................................................37
System design..............................................................................................................................................37
4.1. Introduction.......................................................................................................................................37
v
4.4. Deployment Diagram...............................................................................................................39
References....................................................................................................................................................42
List of tables
vi
Table 13: Delete User....................................................................................................................25
Table 14: Register User.................................................................................................................26
Table 15: View Report...................................................................................................................27
Table 16: Manage User..................................................................................................................28
Table 17: Access Control and security..........................................................................................40
vii
List of figures
viii
CHAPTER ONE
1.1. Introduction
Aksum University is a public higher education institution located in the historical town of
Aksum. It was launched in the year of 1999 E.C in Tigray regional state at Aksum town. Now a
day it is one of the governmental higher institutions found in our country and renders quality
education to students of the university.
Even though Aksum University is one of the competent higher institutions in Ethiopia, there are
a number of constraints in its service delivering. One of those problems is Aksum institute of
technology’s (AIT) store management system. The current store management system gives vast
service however it uses manual management system which leads the system to be inefficient. As
part of the effort to bring efficient and modern store management system in AIT, the new system
should be designed and implemented that enables properties to be controlled and managed
properly.
When customer needs any material they must go to the office and record what they want
manually tthat’s why it makes the process too tedious and time consuming and which requires
the employee to use paper based recording files. The implementation of the new system is user
friendly and built in php programming language and the database. The approach it is going to be
implemented is structured query language (MY-SQL) server which is more appropriate to store
database and queries.
The manual system is much time consuming to work with. Searching and getting available
items requested for use by staff takes long time and it is tedious.
The extra energy and time required to be with the manual system creates a gap in other
sectors of professions.
1
Employees couldn’t get clearance on time because of the store manual record checking
systems.
General objective of the proposed system that we are going to develop is to automate the current
manual based system and to put web based store management system for AIT.
2
1.6. Methodology
Interview
An interview was conducted with the entire store worker to get detail information about
the store.
Observation
We have tried to observe the recommended methods and to really understand the manual system
and We have tried to observe how AIT store workers do their work.
We have used object-oriented methodology in this project to model the functionality of the
system, to organize the objects, classes, to identify the relationship between each object and
classes and the behavior of the objects. Because object-oriented methodology enables us to
reuse, maintain, modify design and code of the system and it increases consistency among
analyzer, designer, and test.
Developer: - the first and the most benefit of this project for the developer is satisfaction.
3
Staffs: - Administrative staffs, Instructors, Technical assistance of the institute.
Technical feasibility is the measure of practicality of the specific technical solution and the
availability of technical resources and skill. The proposed system can be easily maintained and
repaired without requiring high specialists or technical assistants.
The system which we have developed is economically feasible. It is financially affordable. And
have economic benefit. Since computer devices and different materials are available, there is no
more cost to develop our system. This system is targeted to be in accordance with the above-
mentioned issues.
The system is operationally feasible as it very easy for the end users to operate it. Operational
feasibility covers two aspects. One is the technical performance aspect and other is the
acceptance within the organization. The system that this project team will develop is user
friendly.
The proposed system has no any conflict with any government directives, because it gives
services for the people effectively and efficiently so the organization is profitable and the system
is legally feasible.
Software tools:
Tools/programs Activities
5
PhpMyAdmin: choose PHP scripting language which aims at providing the user with
an interface that is easy to learn and attractive.
Macromedia Dreamweaver and notepad++: to edit the PHP code.
6
1.11. Time schedule
Figure 1: Time Schedule
7
CHAPTER TWO
2.1. Introduction
This chapter deals with analyzing the general work flow of the existing system. It produces a
broad outline of the proposed system that identifies the function to be performed and the
technical aspect that the system must fulfill and briefly describes the existing system
functionality, problem of the existing system. It also deals the functional and non- functional
requirements of the proposed system. The system requirement specification is necessary
requirements that are required for the project development. To derive the requirements, we need
to have clear and thorough understanding of the products to be developed or being developed.
This is achieved and refined with detailed and continuous communications with the project team
and customer until the completion of the web page.
The system can record any new item issue requested items with appropriate
specification and category.
The system generates a unique ID for each new fixed asset which is added to the
database.
8
The system can enable to search items that are available in the store house and use.
It generates up to date report at any time for decision makers for budget allocation
and controlling.
The system has database security. Since each workers in the store house has its own
privilege to do their allowed operation on the database.
1. Strength: These are characteristics of project that give it an advantage over others.
a. Storage Area: No space is required to accommodate signed paper files but the
existed system needs large storage area.
b. Data Retrieval: Since the means of communication is web based is easily
accessible.
c. Time: Time required to communicate among different authorities is web based
and it takes less time compared to the manual system
d. Security: Files not vulnerable to manipulations and damage. But, in the existed
system paper files can be easily destructed or manipulated.
e. Accuracy: The existing system mostly characterized by prone to error. The
probability of making error in current system is high. Since there is no way of
validating inputs, data entry errors cannot be easily detected. Accuracy can be
attained in the new system by validating user inputs.
f. Sharing files: In the new system, by using computer networks, sharing files is
easy. File is identical on every computer across the network and only authorized
bodies are allowed to access and modify them.
9
g. Cost: Cost spent for stationary materials such as paper and printer toner is
minimized.
2. Weaknesses
These are characteristics that place the team at a disadvantage relative to others. Here It is
advantageous to use manual system when:
b. Offline inaccessible
3. Opportunities
These are elements that the project could exploit to its advantage. These includes
a. The project may improve the work quality and increase motivation of users to
work on the new system.
b. It will decrease user’s workloads.
c. Increase the efficiency of the system, as the result service delivered to the AIT
community will be fast.
d. It will improve safety. Since the outputs of the system will be accurate and data
stored in database is confidential.
4. Threats
These are elements in the environment that could cause trouble for the project. These include:
a. Power interruptions
b. Network problems(LAN, slow internet speed)
c. User’s computer skills.
d. Technological advancements – may need the software maintenance and update to
fit the new demands.
10
2.5.1. Functional Requirements
Log on: the system validates the store staff to use the system.
Receive Item: the system allows the store keeper to enter a new item which comes from
deliverer or donor at the acquisition time.
Approve Request: the system allows the store administrator to search the availability of
the items in the store before approving the requested item availability and relevance.
Cancel Request: the system allows the store administrator to cancel the approved request
before the items are issued by the store keeper using approval number.
View Report: the system allows the store administrator and store keeper to overview and
report from the system database monthly.
Search Item: the store man search the item whether it found or not in the store. The
system generate error message that says the number of certain item become zero
Reliability: - The store Management System service should not access without
authenticate user.
Usability: - The graphical user interface of the system shall have easily understood
to the user (have consistent look and feel graphical user interface).
Performance: -Acceptable response times for system functionality.
Security: - Access to the various subsystems will be protected by a user log in
screen that requires a user name and password.
11
2.6. User Requirement
The user interface shall be menu driven, it shall provide dialog boxes; help screens,
drop down lists, radio buttons, check boxes and text boxes for user input.
The navigation from one screen to the other must be easy.
Necessary material for using the system will be easy to the customer.
Customers must fullfil the business rule to apply registration.
The store keeper can check the items that are taken by the users
2.7. Constraints
Time: this project has to be finished according to the planned time stated in the schedule
of the project section.
Cost: the system has to be in the range of the budget stated above in the budget of the
project section.
Resources: the resources needed for this project other than the designing team this
system are computers, web designing software, and database.
Quality: quality comes with cost. When thinking of a particular quality specification
related to our system, the cost must be considered with it.
Risk: any risk arose in the project should be addressed immediately before causing any
trouble like if a slip in schedule happens, it should be handled.
2.8. Assumptions
The methodologies being used in this project will help us get the information we need
The project will go according to the planned schedule
The scope of the project will cover what needs to be cover to address the problems
The project’s cost will stay the same with initially planned budget
After the completion of this project, it will be available to anyone who want to use this
system.
12
CHAPTER THREE
3. System Modeling
Store Manager
Store Keeper
Users
Register user
Delete user
View report
13
2. Store Keeper A person who keep the Login
store.
Update item
information
View item
Add item
Search item
View request
Approve request
View item
Request online
Cancel request
14
Figure 2: Use Case Diagram
15
3.1.3. Use Case Description
Use case description includes descriptions of the use case name, use case ID, preconditions, post
conditions, basic course of action and whatever which is important in modeling the user goal.
Description This use case is used to insure security for login in to the system.
Pre-condition The actors must have at least correct username and password.
Step2: The system displays the login interface and allows the user for the
username and password.
post-condition The login page will be displayed then user gets access to its privilege and after
16
finishing his/her work he can logout
Alternative course of action If the actors are not authorized, the system gives a confirmation message that
is wrong username and password and go to step 3.
Description This use case is used to allow add new item from received item
Pre-condition The store keeper should have username and password and login into the
system.
Basic course of action Step1: The store keeper click on received item link
Step2:The system displays received item form to the store keeper
Step3: The store keeper enters details of new item.
Step4: The system will check the validity and display successful massage
Alternative course of action If there is any invalid entry then the system displays error message and allows
the store keeper to re-enter the correct data.
17
Table6: View Request
Description It allows the store keeper to see the requested from the user
Pre-condition The store keeper must have a full Privilege to view the request
Basic course of action Step1:The store keeper click on view request link
Step2: The system displays view request form.
Step3: The Store keeper click the view button.
Step4: The system displays the requested data.
Step5: use case end.
post-condition The Store keeper view the list of requested from the system.
Alternative course of action The system displays empty box when there is no request
18
Table7: Approve Request
Basic course of action Step1: The Store keeper click on request approval form link
Step2: The system display request approval form
Step3: The user inserts their user username and password
Step4: The system displays the requested data that request by the user
Step5: The Store keeper will check the request form data
Alternative course of action If the requested item is not exist the system displays not found message
19
Table8: Update Item Information
Basic course of action Step1: The store keeper click on form of update link
Step2:The system displays the form
Step3: The store keeper inserts item name to search the updating item.
Step4: The system display the update information
Step5: The store keeper fills the updating information.
Step6: The store keeper click update button.
Alternative course of action If there is any invalid entry then the system displays error message and allows
the store keeper to re-enter the correct item name.
20
Use case name Request online
Basic course of action Step1: The user click on the form of request link.
Step2: The system displays the request form.
Step3: The user fill the form to send request
Step4: The system validates request form.
Step5: The user send request by clicking send button.
Step6: The request form is now registered.
Step7: Use case end
Alternative course of action 1. If the entered password and user name is incorrect go to step 2
[alternative course of action 1]
2. If the entered information are incorrect go to step 5 [alternative course
of action 2]
21
Description It allows the store keeper and user to View Item
Basic course of action Step1: The actors click on view item form link.
Step2: The system displays the form.
Step3: The actors click the view button
Step4: The system displays the items that are stored in the system.
Step5: Then the actors see the list item and decide what they want
Alternative course of action If the entered user name and password is incorrect, go to step 2[alternative
course of action 1].
22
Pre-condition The user should login to the system
Basic course of action Step1: The user click on request form link
Step2: The system displays request form.
Step3: The user search the request form by their id
Step4: The user sees and checks the previous request form.
Step5: When they are not available, cancel the request.
Pre-condition The Store keeper and users should log in to the system.
Basic course of action Step1: The actors click on the search item form.
23
Step2: The system display the form
Step3: The actors insert the item name.
Step4: The actors click search button
Step5: The system displays the information of search item
post-condition The Store keeper and users search the item by click search button.
Basic course of action Step1: The actor click on form of delete users link
24
Step2: The system displays the form
Step3: The actor enters user ID.
Step4: The system Search the user information from the database
Step5: The system display confirmation (yes or no)
Step6: The actor Delete the user successfully.
Basic course of action Step1: The actor click on the form of register user link.
Step2: The system display the registration form
Step3: The actor fills the attributes of the beneficiary
25
Step4: The actor clicks register button
Step5: The beneficiary is registered to the Database
Basic course of action Step1: The actor click on the form of view report link
Step2: The system displays the view report form
26
Step3: The actor clicks the view report button
Step4: The system displays the reports.
post-condition view the reports
27
Step2: The system displays manage user form.
Step3: The Store manager search user by entering user id .
Step4: The system displays the user information page.
Step5: Store manager can enable/disable the user
28
Figure 3: Sequence diagram for Login use case
29
Figure 5: Sequence diagram for search item
30
Figure 7: Sequence diagram for view item
31
Figure 9: Sequence diagram for manage user
32
Figure 11: Sequence diagram for view report
33
Figure 13: Sequence diagram for request online
34
Figure 15: Sequence diagram for view request
35
3.3. Class Diagram
Class diagrams are refined by adding relationships between classes, attributes, and methods.
Representing how objects of the static view are used to realize use cases in sequence diagrams.
36
CHAPTER FOUR
System design
4.1. Introduction
System design is a process of delivering the analysis model into design. It also a process of
describing, organizing and structuring system components at architectural design . This chapter
mainly concerning with the design part of the system. In order to make the implementation easy
the design is very important.
Minimize error: the proposed system minimizes errors occurred during performing of the
tasks.
Availability: the proposed system is available to employers every time in the week.
Performance: -the proposed system has high performance compared to the existing
system.
Security: the proposed system should authenticate users to reject unauthorized users.
Easy to use: the project has a well-defined and easily understood interface
Storage capability: -the system has ability to store information in the database.
Usability: - the system is easily access and used everywhere in which internet connection
is available
37
4.3. System Decomposition
manage user
delete user
register user
view report
Add item
View item
Search item
Approve request
View request
View item
Search item
Request online
Cancel request
38
4.4. Deployment Diagram
The deployment diagram shows how the software components, processes, and objects are
deployed into the physical architecture of the system. It shows the configuration of the hardware
units (e.g. Computers, communication devices, etc.) and how the software components are
distributed across the units.
39
Actor
Delete user
Registration user
Manage user
View report
Add item
View item
Search item
Approve request
View request
Request online
Cancel request
40
41
References
[1] Introduction to object oriented analysis and design with UML and the unified process by
Stephen R.schach
[2] System analysis and design 5 th Edition. By Julice E. and Kondall Price H. Software
Requirements 3rd Edition all 2002
[3] Modern Systems Analysis and Design Seventh Edition Jeffrey A., Hoffer Joey F., George,
Joseph S., and Valacich.
[5] http://www.tutorialspoint.com
42