Debremarkos University Burie Campus Department of Computer Science
Debremarkos University Burie Campus Department of Computer Science
Debremarkos University Burie Campus Department of Computer Science
Android Documentation
Submitted by
NAME ID
1 .Mamen Melese -------------------------------157/10
2.Yaschlal Eyasu---------------------------------171/10
3.Birhan Mantie----------------------------------134/10
4.Habtamu Akoye--------------------------------150/10
5.Tadesse Sisay------------------------------------167/10
6.Beletu Bimrew-----------------------------------129/10
7.Kidist Yared--------------------------------------100/10
8.Gizachew Worku--------------------------------149/10
CHAPTER ONE
1. Introduction
1.1. Introduction:
E-Learning system is a form of electronically learning and teaching methodology. It is the use of
computer and internet technologies to deliver necessary material to the students or learners are
enable to learn using internet service.
The learning process needs techniques and tools to present the knowledge (from different
resources) interact with it and share it with others. In this context, E-Learning is becoming an
important tool to support the learning system to achieve its goal.
E-learning is not intended to replace conventional methods of training such as classroom Teaching.
Its aim is to create an augmented learning environment where technology is used to deliver a
combined range of teaching techniques aimed at maximizing the individual's participation in the
learning process.
1
To implement the proposed e-learning system.
To test the proposed e-learning system.
To deploy the proposed e-learning system.
Modeling software
EDRAW Max.
Used to draw diagrams like use case diagram and activity diagram.
Designing Software
My SQL server
This software will used for designing Database.
Implementation Software
Operating System: Windows 7
To have good speed of operations or execution time of tasks.
Notepad and Notepad++.
2
To write PHP scripts.
Observation: we used in order to analyze the conditions to which the current system is acting. It is
useful to observe how jobs are done, how information flows.
Document analysis.
This technique provides information on how the existing system works .There for documents
related to the existing system of the organization will be assessed.
1.7. Feasibility Study
Operational Feasibility:-this project is operationally feasible, since it operate all
operations what we are expect.
Technical Feasibility:-our project is technically feasible, since there is resource
availability and our team members are technical each individual.
Economic Feasibility:-this project is economically feasible since our project is
completed with estimated cost.
Political Feasibility:-this project is free from any political aspect.
Schedule Feasibility:-our project has probability to be completed in one month with its
implementation.
Allowing students to receive and submit their assignment with short period of time.
3
CHAPTER TWO
2. System Analysis
2.1. Over view of the existing system
The existing system of DEBRE MARKOS UNIVERSITY BURIE campus learning teaching process is
manually operated, this means Different activities are performed as like distributing modules,
allocating assignments and showing course results are performed by instructor and registration
process is performed by registrar office. The overall teaching learning process is controlled by the
academic dean. The current system that we have observed is faced a lot of problems, due to this
reason we try to provide some alternative solutions.
Upload :
course material
assignment
course result
add exam
notice
Download:
course material
assignment
course result
student list
notice
Take exam:
The student can take exam based on the course.
Manage account:
The administrator can create, activate and deactivate the user account.
4
Registration:
Enables registrar office to register student, department, Instructor and course who
fulfill required criteria.
.
Assign instructor:
The department head can assign instructor to the student based on the course.
Performances: the performances of the system are fast response time System can
withstand even though many number of users request the desired service.
AvailabilityThis system can be available for each site. The users can access the system for
24 hours for a day.
Security: The system provides security in such a way that unauthorized users are notaccess
the required information. We can use the user password by encryption method in the
database.
Portability: The system must be designed for plate form independent and the system
supports every operating system.
Maintainability: The system should be easily modifiable and extensible to add new
functionality without affecting the general frame work of the system.
Backup and Recovery: Every day the data should be backup even when the operation of
user is not successful this because of performing the operation power failure occurs then
data should be backup.
Error handling: The system should handle invalid inputs and display informative error
messages to user.
5
2.3.1. Use case diagram
6
7
diagram for Login Figure 2.Activity
Successful Display user page
System validate the login form
User press Login button
Reenter username, password, and Message display Users fill username and password
Login form Display
User open application
2.3.2. Activity Diagram
Figure 3.Activity diagram for create user account
33
Figure 4.Activity diagram for download course material
34
Figure 5.Activity diagram for upload course material
35
1 Manage *
Figure 6.Activity diagram for View course result
36
Figure 7.Activity diagram for upload course result
Chapter three
3.1 design class diagram
37
+Upload Exam ()
+Upload Course Material ()
+Download Course Material () +take Exam ()
- Id:int +Upload Assignment () +Upload Notice ()
-Exam Id :int
38
-Course Code: String +Download Assignment () +view Notice ()
-Course Code: String
-Material Name: String -Question No:int
-Material Type: String -Question: String -Assignment No:int
Assignment Name
CHAPTER FOUR
-Choose: String -Notice id:int
-Mark:int -Assignment
-Notice Type: String
-Answer: String -Type: String
-Notice Date: Date
-Time: time Stamp -Course Code: String
-Dead Line: date
CourseMaterial
* 1 -Submission Date: date
Upload *
1
Exam
Assignment Notice
+Upload Course Material () 1
* 1
+Upload Assignment Ques() 1
Upload *
1
+Download Assignment Answer () Upload
Download
Works On
+Download student list () Take
+Upload Exam ()
+Upload course result () +Register Course () +Upload Course result
+View Notice () ()
* * * View
+View Course result ()
-Course code: String
-course name: String +Download Course Material ()
-Credit Hour: int -Result Id:int +Download Assignment ()
-Year: String -Student id: String +Upload Assignment ()
-Semester: String +Take Exam ()
*
-Course Code: String
-i id: String -Department ID: String -Assignment: int +View Course Result ()
-First name: String -Test: int +View Notice ()
-Last name: String * -Final: int
-Address: String -Total: int
-Sex: String -Grade: string - id: String
*1
View
-Department ID: String Course -First name: String
-Last name: String
*
-Address: String
1 -Sex:String
Course result -Age;int
-Dep't name: String
Student
Instructor
1
* * * Register
Download Manage
* Upload * * *
Manage
+upload Annual () Register 1 1 1
+Download Annual ()
+Download student list () 1 1
+Upload student list() +Assign Instructor ()
1
+Register Course ()
1 +Create user account () +Create user account ()
-Calendar id:int +Activate user account ()
Manage
+Upload Notice ()
1
-Date: date+Register Department () +Deactivate user account ()
-Activity: text+Register Instructor ()+Upload Annual Calendar()
- id: int
-First name: String
-id :Int - id: int
-Last name: String
Calendar -First name: String -First name: String
-Last name: String -Sex: String
-Address: String -Last name: String
* *
-Sex: String
-Address: String -Address: StringValid
1 Registrar Dep't head AdminInvalid
1 1
Upload 1*
Download
4. IMPLEMENTATION
Implementation refers to the Coding of the all documents gathered starting from requirement analysis to Design phase. So now the
team is in a position of converting all documents gathered and designed into the code so that the system will be implemented for the
user to be used for the purpose it developed. For the implementation of this system the user must have a server on which the system
will be hosted.
39
4.3. Sample codes
Coding is the process whereby the physical design specification created by the designers is turned in to working computer code by the
programmer. The code is made simple in such a way that another programmer can easily understand and work on that in future
CHAPTER FIVE
5. Testing
Testing the next phase from the implementation in which specified to check whether the function is correct or not for the developer
intended and user expected system can achieve. We can use different type of testing strategies.
The team used system testing for validating and verifying whether the system:
Meets the requirements that guided its design and development,
Works as expected,
Can be implemented with the same characteristics.
System Testing
Performance Testing: The system can perform with a short bandwidth response time and also theycan perform or accomplish
specific task within the user intended and they can store user expected resources.
Security Testing: The system has a security protection by using authentication. User of the systemwill be authorized by the system
administrator and get their user name and password to enter into the system. Unauthorized access will be detected when user wants to
access the system. This is done by authenticating user; user with user name and password can only enter into the system. They can
also use encryption techniques for secure use of system.
40
Unit testing
In unit testing each the data in the data base is tested through form with a specific data. This test helps to trap output errors occur in the
form or database value to be inserted and accessed. They can also generated alternative or exception flow of error. Like for the tested
case login form validate Username and password entry as an input from the users of the systems. They can enter correct username and
password display the home page otherwise display the username and password is incorrect try again message.
Integration Testing
The modules can be independent to each other cannot be contradict with the user accessed data. Modules are typically integrated a
top-down incremental fashion. In this testing mechanism each form is tested by a general data. Like login form Check the correctness
of the form to be displayed after login is succeeded that means user expected or intended application.
Validation Testing
When we say valid it is to mean that the software functions as it is intended. The group team can test by giving real data and get real
information from the software. Like all forms can be validate the functionality. The user can expected to provide the function required
by the form
CHAPTER SIX
This project which has different phases; the first phase concerned with the analysis phase of the life cycle, the design phase and the
next phase is about implementation. As the end of the first phase, we need to review that we have covered in accordance with what we
have planned at the beginning. We began our work by identifying the significance of automated system for the store and the overall
techniques to be used in the development process. This involved defining the system development methodology, identifying process.
This involved defining the system development methodology, identifying resource and cost requirements, and setting the deliverable
and scheduled for the project.
41
The analysis helps the team to well understand the major functional areas and processes of the system. Through this method we
evaluate the existing system weakness and strength.
After that, we performed requirements elicitation to discover user and system requirements. This phase consisted of drawing the
functional as well as non-functional requirements of the system. Then we have undertaken a major phase in system development
process: object oriented Analysis. Here, we tried to model the new system we proposed using UML diagrams such as Use case,
sequence, and class diagrams Also, we designed the new system user interface prototype.
6.2. Recommendation
According to scope of our project the team develops web based application. Because of the time and security problem constraint we
may have limitation which should be consideration in, but in the feature the team believes that this system should be fully
operationally by adding some functionality that are not included in the proposed system. We also want to recommend this project can
be expanded and more automated with additional functionalities by integrating with many new technologies. We recommend also to
the user use this system properly.
42