Web-Based Auction System
Web-Based Auction System
A group project
Submitted to the department of computer science, college of Engineering and
Technology, Bonga University, in meeting the preliminary project requirement
for partial fulfillment of the award of Bachelor of Science Degree in Computer
Science.
Bonga, Ethiopia
2023
I
Approval Sheet
This group project entitled “Web-based auction system” has been read and approved as
meeting the preliminary project requirements of the department of Computer Science in
partial fulfillment for the award of Bachelor of Science degree in Computer Science,
Bonga University, Bonga, Ethiopia
Approved By
II
Acknowledgment
Goes here….
III
Table of Content
Acknowledgment................................................................................................................................III
List Of Figures....................................................................................................................................VI
List Of Tables......................................................................................................................................VII
Acronyms............................................................................................................................................IX
Abstract................................................................................................................................................X
CHAPTER ONE..................................................................................................................................1
INTRODUCTION...............................................................................................................................1
1.1 Background of the project......................................................................................................1
1.2 Problem Statement.................................................................................................................2
1.3 Justification............................................................................................................................2
1.4 Objective of Project.....................................................................................................................2
1.4.1 General Objective.................................................................................................................2
1.4.2 Specific Objective.................................................................................................................2
1.5 Scope and Limitation of the Project.............................................................................................3
1.5.1 Scope of the Project..............................................................................................................3
1.5.2 Limitation of the Project.......................................................................................................3
1.6 System Development Methodology.............................................................................................3
1.6.1 System Development Process Model....................................................................................3
1.6.2 System Development Approach............................................................................................3
1.7 System Development Tools.........................................................................................................4
1.8 Beneficiary of the Project............................................................................................................4
1.9 Feasibility Study..........................................................................................................................4
1.9.1 Economic Feasibility............................................................................................................4
1.9.2 Technical Feasibility.............................................................................................................5
1.9.3 Operational Feasibility..........................................................................................................5
1.9.4 Legal Feasibility...................................................................................................................5
1.9.5 Schedule Feasibility..............................................................................................................5
1.10.1 Work Breakdown Structure................................................................................................6
1.10.2 Gantt Chart Representation // Not done yet........................................................................6
1.11 Project Budget.......................................................................................................................6
CHAPTER TWO.................................................................................................................................8
REQUIREMENT ENGINEERING...................................................................................................8
2.1 Requirement Elicitation...............................................................................................................8
2.1.1 Overview of Current System.................................................................................................8
IV
2.1.2 Problem of Current System...................................................................................................8
2.2 Requirement Gathering................................................................................................................9
2.2.1 Data Gathering Methodology................................................................................................9
2.3 Overview of the Proposed System...............................................................................................9
2.4 Requirement of the Proposed System..........................................................................................9
2.4.1 Functional Requirements......................................................................................................9
2.4.2 Non-Functional Requirements............................................................................................10
CHAPTER THREE...........................................................................................................................11
SYSTEM MODELLING...................................................................................................................11
3.1 Scenario.....................................................................................................................................11
3.1.1 Use Case Model..................................................................................................................11
3.1.2 Use Case Diagram..................................................................................................................11
3.2.4 Identifying Relationships among Actors and Use Cases.....................................................12
3.2.5 System Use Case Diagram..................................................................................................14
3.2.6 Description Of Use Case Model.........................................................................................15
3.2.6 Interaction Diagram................................................................................................................30
3.2.6.1 Sequence Diagram...........................................................................................................30
3.2.6.2 State Chart Diagram (State Machine Diagram)................................................................31
CHAPTER FOUR.............................................................................................................................32
SYSTEM DESIGN............................................................................................................................32
4.1 System Design Overview of The System...................................................................................32
4.2 Current Software Architecture...................................................................................................32
4.3 Proposed Software Architecture................................................................................................32
4.4 System Decomposition..............................................................................................................32
4.4.1 Component Diagram...........................................................................................................32
4.5 Package Diagram...................................................................................................................33
4.6 Hardware/Software Mapping.....................................................................................................34
4.6.1 Deployment Diagram..........................................................................................................34
4.7 Persistent Data Modelling..........................................................................................................35
4.7.1 Persistent Data Management Diagram................................................................................35
4.8 Access Control and Security......................................................................................................36
4.9 Detailed Class Diagram.............................................................................................................37
Conclusion and Recommendation.......................................................................................................38
Conclusion.......................................................................................................................................38
Recommendation.............................................................................................................................38
References.......................................................................................................................................39
V
List Of Figures
Figure 1.1 Work break down.........................................................................................................6
VI
List Of Tables
Table1.1 Project Budget Estimates................................................................................................7
Table 3.12 System use case description for Report fraud product...............................................25
Table 3.15 System use case description for View bid information..............................................28
VII
Acronyms
Here it goes….
VIII
Abstract
Goes here…..
IX
CHAPTER ONE
INTRODUCTION
1.1 Background of the project
The usage of the online auction system makes use of the decision-making aid tool, which
increases the buyer's confidence in their selection of the seller and goods. Specifically, the
product information signals, seller rating scores, and seller shilling actions make up the three
components of the decision-assistance tool. Through the use of language and images, third-
party product certifications, descriptions of the product's attributes, the product's usage, and
its book value, the product information signals aim to completely define the product. By
using the feedback scores, the decision-making aid tool also offers seller ratings. These
evaluations of the online auction goods sellers are provided by prior successful bidders.
These bidders provide in-depth seller reviews of every element of the seller, scoring factors
such as how accurate the item description was, how happy they were with the seller's
communication, and how promptly the seller delivered the goods to them. The other
important aspect of the decision-making tool involves the process of coming up with seller’s
shill ratings. Shilling is the act of introducing fake bids into an auction on the behalf of the
seller to artificially inflate the price of an item (Weinberg, 2003). To come up with shill
rating the system monitors the shill activity characteristics which include those bidders who
make a lot of repeated failed bids on the same seller. This information is used to come up
with a shill score. Detailed evaluation of the product and seller and the use of the decision-
making assistance tool ensures consumer’s certainty on the choice of the sellers and the
products that they make.
1
1.2 Problem Statement
People are always on the go to their renown product supplier, or nearby market center or at
times a local hawker, who goes on to supply items and at times when he cannot get the item
the buyer wants, mostly they give their hands to get them items and at times they mess and
bring fake and quarks deliver stolen and bad items. This is because unqualified people offer
delivery of items to customers. Due to the disparity of the buyers, cone-men have always
taken the advantage to offer item delivery to the customers. On the other hand, we have
suppliers and business people who are qualified to supply and sell the items yet they have
very few people who can come to them, more so in the same locality.
1.3 Justification
The use of online public sale structures that don't permit for complete powerful product
description and failure to offer choice making help equipment to online bidders’
consequences in improved product and dealers’ uncertainty. The buyer’s uncertainty in the
direction of product and vendor makes it hard for the shoppers to distinguish among the
coolest and awful dealers, the dearth of differentiation might also additionally pressure better
first-class dealers to go away the marketplace in view that their first-class merchandise does
now no longer sign and praise with truthful fees as a result lowering transaction activity
(Dimoka, 2008). A hit implementation of this mission consequences in an internet public sale
machine that permits assessment of the product this is a way plenty powerful and that come
near or identical the bodily assessment of the product.
2
Analysis: We will examine our requirements and decide in what technologies
and in what things the system should be done.
Propose design: We will describe every subsystem that exists in the system, it’s
persistent data management, detailed class description and others
Implement the proposed project: We implement the e-commerce system based
on the proposed system design
Test and evaluate the developed system: We will release the trial version of it
and the users can give our contact address so the users give us feedbacks and
release better versions of it.
Create an online forum where bidder auction for items posted by the seller through the online
system
Create a panel where by a seller receives requests from a buyer and sends back feedback, an
answer to a question or requests to meet the bidder
3
1.7 System Development Tools
Hardware Tools:
Computer- To do different tasks
RAM: 8GB
Flash disk (32GB)- To move the documentation easily and to store the project in
another medium since the data in the computer can be lost by different reasons
Mobile- To reach to the team members and to search for items from the internet
Software Tools:
Window OS (Window 11 is used for the documentation of this project)
Microsoft Office Word 2021- To write the document
EdrawMax and Wondershare EdrawMax- To design and model different diagrams
Adobe Photoshop cc 2017- To crop exported tiff image formats
Special resource
No special resource is used for this documentation
Sellers:
Their products will not be specific to one location rather to nation wide
They will save different
……
Bidders:
They will see a wide variety of products in the country from their places
They will save transportation and other costs
They will
Government:
4
1.9.1.2 Intangible
Once the schedule activities are defined, they are sequenced in the order in which they must
be performed. The resource requirements and the activity durations are then estimated for
these activities. Finally, the project schedule is created which shows when each activity is
scheduled to begin and end. The project schedule also shows the planned start date and
planned finish date for the overall project.
5
Scheduling is used to perform the works in appropriate time that helps to reach the goal
effectively and efficiently.
6
Types of Tool name Quantity Unit price (in Birr) Total
costs price (in
Birr)
Desktop 1 Free Free
Personal 1 25,000 25,000
Hardware Computer
costs Flash (32 GB) 2 1 350
Pen 1 15 15
Mobile phone 3 7000 21,000
Paper 60 0.25 15
Printing - - -
Notebook 2 50 100
EdrawMax
and 1 Free Free
Wondershare
EdrawMax
Microsoft 1 Free Free
Office 2021
Software Adobe
cost
photoshop cc 1 Free Free
2017
Window 10 1 Free Free
Pro
Window 11 1 free Free
Pro
Total cost == 46,480
Table1.1 Project Budget Estimates
7
CHAPTER TWO
REQUIREMENT ENGINEERING
2.1 Requirement Elicitation
2.1.1 Overview of Current System
Prior to every public sale, the day of public sale, the venue and the objects on public sale are
introduced via a few multimedia platforms both newspaper, social media or different
methods. Those who want to participate within side the public sale must arrive on the venue
on that day on time. This traditional technique maximum of the instances save you involved
bidders from collaborating within side the bidding manner. Another method of the
contemporary machine is to tune every bidding manner and to make it terminate in monetary
settlement. The manner may be very cumbersome and time consuming. There is likewise
machine this is on-line like Ubid.com, Quibids.com many extra however their most important
flaws are they can’t manipulate shilling sports. Shill bidding is the act of introducing faux
bids into a public sale on behalf of the bidder to artificially inflate the fee of an item.
Ease of access
The current system is very hard to understand as the price is increasing and to keep track
of that information is not
Accountability
The current system is open to corruption especially if the auction type is first-price
sealed-bid or closed auction system since the seller and may be some third-party body
knows the bidder price.
Environmental
The current system uses lots of paper just for one product in the auction process and this
led our world to global warming.
Availability
As I have stated it in the overview because the system is manual reaching to multiple
users is the main drawback of the system. For example, if the seller lives in Bonga there
is no way that the bidder knows there is an auction if he lives in Aksum.
The major problem of the current online system is that there is no checking for shilling
activities and also product and description checking mechanism and also user validation
8
2.2 Requirement Gathering
2.2.1 Data Gathering Methodology
We used the following data gathering methodologies to document this project. This are:
Observing: Using this methodology, we have seen some documents on online auction
system sand also we have seen some online auction systems how they work and what
their flaws are.
Discussing and analyzing problems with team members
1. Product registration module: under this module the seller posts the product with their
price tag and date for the auction to expire. The proposed system will accept the
product description and photo of the product if the product description doesn’t match
the photo the product will be remove
2. Bidding module: under this module the bidder bid for a specific product and can view
the description of the product
3. Web administration module: under this module the administrator manages the
database and the user can add categories etc.
4. Photo verifier module: under this module someone or the system used to identify the
user photo and ID card photo and also the product photo with the description
5. This is not a user view module rather system module that removes the products that
the date submitted passed or the bidding process is completed
Functional requirements capture the intended behaviors of the system. These behaviors may
be expressed as services, tasks or functions. It is a requirement that will allow users to
perform some kind of functions and enable them to interact with the system.
Here it goes….
9
2.4.2 Non-Functional Requirements
Non-functional requirement explains and describes the user visible aspects of the system.
Constraints on the services or functions offered by the system are constraints of timing, the
development process; standards, etc. are things we have to focus on developing new systems
to achieve its functionality.
Non-functional requirement are requirements which specify criteria that can be used to judge
the operation of the system.
2.4.2.1 Maintainability
Due to the development approach used and the process model used the system allow even the
slenderest alteration.
2.4.2.2 Reliability
The system can give its service as long as there is electricity, computer and the user
2.4.3.3 Environment
The system does not harm the environment hence it is environmentally friendly
2.4.3.4 Security
All users have their own user’s name and password which is required to log into the system
and each user has privilege on what they can perform using the system.
2.4.3.5 Interoperability
2.4.3.6 Scalability
It can cope the increasing number of users without reducing the quality it offers
2.4.3.7 Availability
2.4.3.8 Usability
2.4.3.9 Performance
Here it goes….
10
CHAPTER THREE
SYSTEM MODELLING
3.1 Scenario
A scenario is a formal description of flow of events that occur during the execution of a use
case instance. It defines the specific sequence of events between the system and the external
actors. It is normally described in text and corresponds to the textual representation of the
sequence diagram.[1] =wwwsparxsystems.com/resources/tutorials/uml2/use-case-diagram
Each use case represents a discrete task that involves external interaction with a system. In its
simplest form, a use case is shown as an ellipse with the actors involved in the use case
represented as stick figures.
It models the task, services and functions required by a system/ subsystem of an application.
It depicts the high-level functionality of a system and also tells how the user handles the
system [1]
A use case diagram is usually simple. It does not show the detail of the use cases:[2]
It only summarizes some of the relationships between use cases, actors and systems.
It does not show the order in which steps are performed to achieve the goals of each
use case
11
An actor represents a type of users of the system or external system that plays a role in one or
more interactions with our system. Our system comprises the following actors
Seller
Bidder
System Administrator
Validator
A use case is a written description of how users will perform tasks on your website. It
outlines, from a user’s point of view, a system’s behavior as it responds to the request. Each
use case is represented as a sequence of simple steps, beginning with a user’s goal and ending
when that goal is fulfilled.[3]
12
Numbe Actors Use cases
r
13
Figure 3.1 Use case diagram
14
3.1.3 Description of Use Case Model
Use case name Add categories
Description Allows the system admin to enter the categories in which the
product belongs
Alternative flow of events The entered filled is not correct please enter correct value
alert will show up and reload to the same page
15
Use case number UC 02
Actor Bidders
Alternative flow of events Invalid character is inserted or less amount of bid is inserted
pop-up will be displayed
16
Actor Seller, Bidder and System administrator
Alternative flow of events The profile is not edited pop up will display and return to the
page
17
Use case number UC 04
18
Use case name ID verification
Actor Validator
Description The actor will validate the ID card submitted from sellers and
bidders
19
Use case name Login
Alternative flow of events Either not registered or wrong password is inserted pop-up
will display and reload to the page
20
Use case number UC 07
Alternative flow of events You are not connected error will be displayed
21
Use case number UC 08
Actor Bidder
Description The actor gets the detail that the he selected which is
uploaded by the seller
22
Use case name Product verification
Actor Validator
23
Use case name Request categories
Actor Seller
24
Use case name Report fraud products
Actor Bidder
Description The actor reports products that are either mismatched with
their photo and description or not in category product
Table 3.12 System use case description for Report fraud product
25
Use case name Report generation
Description When the actor clicks that link the report is generated in
either graphical or in words
26
Use case name Upload product
Actor Seller
Description The actor uploads the product that is going to be bided by the
bidders.
Alternative flow of events The filled form has flaw please check it error will appear and
reload to the page
Post condition The product is saved in the database and shown to different
bidders
27
Use case name View bid information
Description For the seller it shows the history of bidding for the product
that he has posted
For the bidder it shows the bidding step for the product that
they have been participated
Table 3.15 System use case description for View bid information
28
Use case name View feedback
29
3.1.4 Activity Diagram
Activity Diagrams are used to Document the logic of a single operation /methods, a single
use case, or the flow of logic of a business operation. In many ways, Activity Diagrams are
the object_ oriented Equivalent of flow charts and Data-flow Diagrams (DFD) from structure
development [1].
30
3.1.5 Object Model
Here it goes….
31
describes the meaning and purposes of data elements within the context of a project, and
provides guidance on interpretation, accepted meanings and representation. A Data
Dictionary also provides a metadata about data elements. The metadata included in a Data
Dictionary can assist in defining the scope and characteristics of data elements, as well the
rules of their usage and application [6] = https://www.library.ucmerced.edu.
5 Gender varchar 6 Not Null Checks whether the user is male or female
32
8 Address Varchar 100 Not Null Stores users address
6 Minimum_bid_price Numeric (10,2) Not Null Stores minimum bid price for products
33
or closed
5 Bid_Price Numeric (10,2) Not Null Stores the bid price of a product
4 Description Varchar 100 Not Null Stores the description of the type of
report
34
Table 3.22 Feedback entity data dictionary
3 Description Varchar 100 Not Null Stores the feedback sent from users
It is also used primarily to design, document and validate the architecture and interfaces of
the system by describing the sequence of actions that need to be performed to complete a task
or scenario.
35
Figure 3.2 Create account sequence diagram
36
Figure 3.3 Bidding sequence diagram
37
Figure 3.3 State chat diagram
38
Library Management System
CHAPTER FOUR
SYSTEM DESIGN
4.1 Introduction
System design is the transformation of the analysis model into a system design model. The
purpose of designing is to show the direction on to how the system is built and to obtain clear
and enough information needed to drive the actual implementation of the system. The
objectives of design are to model the system with high quality. Implementation of high-
quality systems depend on the nature of design created by the designer. If someone wants to
change or update the system after it has been put into operation depends on the quality of the
system design. So, if the system is designed effectively, it will be easy to make changes to it.
Once the software requirements have been analysed and specified, the software design
involves three technical activities: design, coding, and testing that are required to build and
verify the software.
The design activities are of main importance in this phase, because in this activity, decisions
ultimately affecting the success of the software implementation and its ease of maintenance
are made. These decisions have the final bearing upon reliability and maintainability of the
system. Design is the only way to accurately translate the customer’s requirements into
finished software or a system.
39
Library Management System
4.3.4 Access Control and Security
Here it goes….
4.3.7 Deployment
Here it goes….
40
Library Management System
41
Library Management System
It describes the relationship between users to keep track of data flow by drawing out the
entity along with its attributes. Each entity uniquely identified by the primary key. Below is
an illustration of the system logical design as generated by the entity relationship diagram.
42
Library Management System
Access control matrix shows which functions are performed by which system users.
43
Library Management System
Comment
Maintain
Generate
Reserve
Manage
account
Review
request
Accept
Search
Return
Actors
Login
report
View
View
View
Send
Edit
Check
Membe
r
Guest
Libraria
n
Library
Manage
r
Admin
Depart
ment
Heads
AVP
44
Library Management System
4.9 Detailed Class Diagram
A class diagram is an illustration of the relationships and source code dependencies among
classes in the UML. In this context, a class defines the methods and variables in an object,
which is a specific entity in a program or the unit of code representing that entity.
45
Library Management System
Conclusion and Recommendation
Conclusion
The library management system is a wide project title that it cannot be finished in this
short time but we try to show the major functions and caviars that the library has and
tries to solve the existing problem by transforming it to digital and well-organized
data base approach.
If the library uses the idea that we imposed they would make their work so much easy
and free from error.
Recommendation
We recommend the library management bord to use our RAD documentation and to
use it to develop the software
46
Library Management System
References
1. www.javatpoint.com/uml-use-case-diagram
2. www.visual-paradigm.com
3. www.usability.gov/how-to-and-tools/methods/use-cases
47