Final Project MIS 3rd
Final Project MIS 3rd
Final Project MIS 3rd
Chapter One
1.1 Introduction
Now we are in technological century. With new day, new generation with new idea and creativity in the existed
world is born daily. The advancement of computer is enabling us to speak about technology. The evolution of
computer comes up with intelligent technology. One of the remarkable and much known products of technology
advancement is the Conversion of manually system into automated system. Automation produces a great impact in
the lives of man, particularly in the field of industry, business, medicine, and Education.
It is a fact that arranging schedules, instructor’s load and room utilization for the Students and faculty in every
department is one of the many activities that each department scheduler must prepare before classes start. But the
college use the manual way of preparing the schedule. With the manual system, more time and labour force is
required to plot, arrange, and revise the class schedules, room utilization and instructors’ load provided by the
department staff. Scheduling system allow managers to monitor and maximize labour resources. With all of the tasks
managers are required to perform, any tools which expedite and ease those duties are welcome. It also provides
adverse range of functions which attempt to do precisely. It produces reports to show student time tables and teacher
time tables. It also stores schedule information for department, batch, semester, year, teachers, classrooms, day, and
time.
1.2 Background of the college of computing and informatics
It is known that Haramaya University works around three main goals- teaching, research and community
engagement. Research, although categorized one of the separate objectives of the university, is found also integrated
both in the teaching and community engagement. No research is meaningful without the application of Statistics and
that is why all departments give at least one common course in statistics for their students. As the level of the
research done get complex statistical knowledge gained through common course only fails to be sufficient. With the
advancement of information age and computer technology, it was also found important to have all the students of all
the departments to be computer literate. That is also why computer application is given as a common course in all
departments of Haramaya University. Still as the level of complexity of information processing increases, the
knowledge gained through computer applications fails to be sufficient.
Besides its objectives of teaching, research and community engagement Haramaya University needed statistical and
information technology (or Computer Sciences) for its own business. It was the time that the Business Process Re-
engineering (BPR) was started to be studied and being implemented both in the country and the university. The
university thus needed a unit that helps the university research system and administration both in terms of statistical
analysis and information technology solutions.
The foundation of the College of Computing and Informatics was thus based on the above premises. In its original
intention “computing” refers to statistics while “informatics” is for computer sciences fields. The college was
established in April 2008 by bringing together the three departments- Computer Science, Management Information
Final project by MIS 3rdyear
Page 1
Scheduling system for CCI of HU
Soon after the establishment of the college, the curricula for the departments of Information Systems and Statistics
were prepared and got approved by the university senate. Hearing the approval of the curriculum of the Bachelor of
Science in Statistics, all the students who were already admitted to the Department of Applied Mathematics and
Statistics under the then Faculty of Education requested the university management and transferred to the
Department of Statistics that was newly established under CCI. The first batch of the B. Sc in Information Systems
was, however, admitted in the next academic year. The college then opened further B. Sc programs in Information
Technology and Software Engineering based on the need assessments made at national level.
Time consuming: - wasting time occurs when scheduler arrange timetable using manual system. They be careful in
arrange the time table to decrease the mistake probability so they need a lot of time to arrange the time table.
Lack of Information distribution method: - The information distribution method is very slow. Since information
transformation is paper based. The prepared schedule didn’t reach at right time to the student as well as to the
Instructor, also they didn’t gate everywhere they want. Also the distributed information is inefficient.
It is difficult to update:-to update only one entry of the table you must change schedule that you print before. This
needs to replace the original paper by the new updated one this consume additional resource and assign additional
work for the person who post the schedule on the board and give for the instructors.
There are clash of class schedule: - there are class overlapping problem.
Observation: This is also another data collecting method. In fact we have also used this observation method to
gather data. This method enables us observing and understanding how the schedule is done.
1.6 Scope of the project
Haramaya University has more than nine colleges and under these colleges there are many departments. All
departments have their own class schedule based on the resource they have like classrooms and human power. Due
to time and other constraints we are limited the scope of our project to automate the scheduling system for college of
computing and informatics of Haramaya University. Our project scope is further limited to:
Accept courses information (course name, credit hours, instructor name, etc.)
Record all available resources like buildings, rooms, labs, instructors, sections, etc.
Update the prepared schedule without overlapping.
Easily search and print the information.
operational since it solves their problem. And to make the workers familiar with the technology, we will give the
training for about the system to the working place. So that, the system users can themselves run and operate with the
system then after.
1.8.4 Schedule feasibility
The schedule feasibility involves how much time is available to build the new system, when it can be built
interference with normal business operation etc. The schedule for this project is feasible due to rich information
exchange between the college and the developing team.
In addition to the time set to develop the system is enough to complete the project on time.
Scheduling feasibility using Gant chart:
The table below shows the way of work break down structure of our project and how we manage our time and cost.
But, all of our members have a responsibility to participate and do any task. Then task assigned to individual will not
do by him/her.
Name Responsibility
SileshiNegese Project manager
Programmer
Bali Kebede Analyst
Assistance programmer
BrtukanMoges Secretary
Coordinator
SimagnNegash Designer
Assistance coordinator
Table 1.2 team configuration table
Chapter Two
2. System Requirement Specifications and Analysis Modeling (SRS)
2.1 Introduction
Requirement Specification is a document that is clearly describes each of the essential requirements the software and
the external interfaces such as functions, performance, design constraints, quality attributes. Each requirement is
defined in such a way that its achievement is capable of being objectively verified by a prescribed method.
Requirement analysis is the process of studying and analyzing the customer and the user needs to arrive at a
definition of software requirements.
The College of Computing and Informatics in Haramaya University runs various programs that use scheduling. This
system is handled in a manual system thus creating a lot of problems for the office that made it function
ineffectively.
technology. Essential models of usage highlight purpose, what it is that users are trying to accomplish, and why they
are doing it. In short, essential models are ideal artifacts to capture the requirements for your system.
Attend class
Identifier:EUC1
Actor Response
Student Verifies the legality through BR10 to attend the class. Table 2.1 essential
use case description
Instructor Instruct class according to BR1, 2, 3.
attends class
Administrator Arrange classes according to BR4, 5, 6, 7,8
Teach student
Identifier: EUC2
Actors Responsibility
Instructor Instruct the classes through BR1,3
Student The student should be attending the class through BR2, 4, 5, 10.
Table 2.2 essential use case descriptions for teach student.
View schedule
Identifier: EUC3
Actors Responsibility
Instructor View schedule to verify whether it fulfill BR5, 6, 8, 9 and use it.
Student Identify whether the schedule verifies BR5, 7.
Arrange schedule
Identifier: EUC4
Actors Responsibility
Administrator Arrange schedule through BR1-BR10.
System use case is use case that brings technological concerns into account. System use cases are the primary
requirements artifact for the rational unified process (RUP) (Kruchten 2000), although they are arguably analysis and
perhaps even design artifacts. A system use case model is similar to an essential use case model. A system use case
model is composed of a use case diagram and the accompanying documentation describing the use cases, actors, and
associations. The following diagram shows system use case for scheduling system of the college of computing and
informatics.
Figure 2.3 System use case diagram of class and exam schedule for college of computing and
informatics
Identifier: UC1
Actors: Administrator, instructor and student
Precondition: The users must be an authorized user who has username and password.
Description: When user enters username and password, it checks the input from the database.
If it is valid, it allows the user to access and if not it display unauthorized
message.
Basic course of action: 1. The use case is initiated when the user click on the login link.
2. The systems display the login forms.
3. The user enter the Username and password
4. The user click login button.
5. The systems verify whether the user is authorized or not.
5. The system display appropriate page.
Alternative course of action: 4.1 If the user does not fill the appropriate username and password, Then the
systems display error message.
4.2 Goes to step 3.
Alternative course of A4.1 f the user does not an authorised user the system display error
action: messages.
A4.2 Return to step 3.
B10.1 If the user does not fill the form the system display error
message.
B10.2 Return to step 9.
B10.3 The use case ends.
Post condition: The system creates the schedule.
Table2.6 System use case documentation for generate schedule use case
Table2.7 System use case documentation for update schedule use case.
Table2.8 System use case documentation for view schedule use case.
Alternative course of 4.1 If the user does not an authorised user the system display error
action: messages.
4.2 Return to step 3.
4.3 If the user does not fill the form the system display error message.
4.4 The use case ends.
Post condition: The system deletes the schedule or user account.
Table2.9 System use case documentation for delete schedule use case.
Table2.10 System use case documentation for write comment use case.
User interface (UI) prototyping is an iterative analysis technique in which users are actively involved in the mocking-
up of the UI for a system. UI prototypes have several purposes:
As an analysis artifact that enables you to explore the problem space with your stakeholders. As a design artifact that
enable us to explore the solution space of our system. A vehicle for us to communicate the possible UI design(s) of
our system.
A potential foundation from which to continue developing the system (if you intend to throw the prototype away
and start over from scratch then you don't need to invest the time writing quality code for your prototype).
It describes the logical characteristics of each interface between the system and the users. This may include
graphical user interface standards or product family style guides, screen layout constraints and standard. The user
interface consists of a set of menus through which the user can interact with data on the scheduling system database
server. These menus include home, schedule, contact us, about us, administrator login, help menu will be linked to
some page to perform a specified task. The user will interact with these menus through the pressing menus.
Figure 2.4 Main user interfaces of college of computing and informatics of exam and class scheduling system
Figure 2.8 Data flow diagram for scheduling system of CCI of Haramaya University
Ten common rules and constraints of the college associated with different resources:
BR1. Instructor cannot teach more than one class at the same time.
BR2. Classes can meet more than once in a day as long as their time is not
overlapped.
BR3. A class is taught by one and only one instructor.
BR4. A class may use more than one classroom, but only one classroom at
a time.
BR5. No classes share a classroom at the same time.
BR6. Exclusive classes must not be scheduled with overlapping time.
BR7. Combined class always have identical schedule (i.e., room,
day/time, and Instructor.)
BR8. A class can only be scheduled with a length of 1hr -3hr
BR9. Timeslots can be scheduled for classes only if they are already
allocated to department.
BR10. Only legal student attend the class.
I. Design Constraints
The system shall be prepared related to user can uses the systems standards.
II. Performance requirement
To satisfy the interesting we have built the College Scheduling System at Haramaya University. It has been used by
six departments within one college schools of the university to support about classes per semester using 6 rooms in
one building. The system is modelled in the Unified modelling Language and implemented using Visual basic
language. Although Particular algorithms were adopted in its current version to automate the timetable generation
delivers many advantages to the user.
High availability: It provides on-line access via user friendly forms and reports.
Sharable information: Schools and departments and all faculty members can concurrently access the same
scheduling information from their own computers.
Transparent updates: Every schedule change, no matter who, when, and what is made is immediately visible
to all online users.
Error-proof output: Illegal scheduling process and data are always rejected because of the embedded
scheduling rules. No single piece of data, except the login name and password, needs to be typed by the user
only clicking on the desired data value.
III. Security requirement
Obviously today’s project requires security, for the sake of free from the attack, also we use security system for our
project. The security system that we use is session to return null when the request is empty and also check whether
the user is authenticated or not.
Based on different scheduling roles and responsibilities, users are granted with different permissions. For example,
an instructor cannot update change his time table the only chance is writing comment to the system and also the
students and other end user cannot modify or change the schedule created but the permission of deleting and
updating given to the scheduler.
2.5.3 Constraints
We can consider constraints in two ways. These are hard constraint and soft constraint.
A. Hard constraint
During system requirements the hard constraints encountered us are the following.
meeting pattern specification;
prohibited or required times for classes;
class requires room with sufficient seating capacity;
class requires or prohibits some building(s) or room(s);
class requires or prohibits classroom of a specified generic type (computer, computer projection,
audio recording, document camera, . . . );
The following diagram is the overall activity diagram for CCI scheduling system.
Chapter Three
3 Design Document
The analysis and design are highly interrelated and iterative. The transformation system from model analyses is
designing the system. The main purpose of designing document is to determine how we are going to build our
system. In this chapter we focused on designing the scheduling system for college of computing and informatics. A
well designed document makes our implementation simple and easy. In this chapter we are going to see different
modeling like class modeling, sequence diagram, collaboration diagram, user interface design, state chart diagram,
persistent modeling, component diagram and deployment diagram.
We use class diagrams to model the static design view of a system. For the most part, this involves modeling the
vocabulary of the system, modeling collaborations, or modeling schemas. Class diagrams are also the foundation for
a couple of related diagrams: component diagrams and deployment diagrams.
A class is a template from which objects are created. An object is any person, place, thing, concept, event, screen, or
report applicable to our system. Therefore, a class is a collection of objects that share common structure and behavior
like inheritance, association, aggregation, composition, dependency relationship, attributes, methods and
municipality of the class. Classes are represented by a rectangle with three sections. The top level is the name of the
class, the middle level contains attributes of the classes and the bottom level represents the method of the class.
Data modelling isthe act of exploring data-oriented structures. Like other modelling artefacts, data models are
used for a variety of purposes, from conceptual models to physical design models .Logical data models are used to
explore domain concepts and their relationships. This could be done for the scope of a single project or for your
entire enterprise. From the point of view of an object-oriented developer, data modelling is conceptually similar to
class modelling. With data modelling, you identify data entities and assign data attributes to them, whereas with class
modelling you identify classes and assign responsibilities to them. There are associations between entities; similar to
the associations between class’s relationships, inheritance, and composition are all applicable concepts in data
modelling.
The followings are sequence diagrams for activities takes place in scheduling system.
A collaboration diagram describes interactions among objects in terms of sequenced messages. Collaboration
diagrams represent a combination of information taken from class, sequence, and use case diagrams describing both
the static structure and dynamic behavior of a system. Collaboration diagrams show interaction without the time
dimension, but do include object links. It captures more directly the interactions between actors and objects.
Below are state chart diagram for view added schedule which is occurred during using our system.
The relational model is a model that describes how to organize data into tables and how to define relationships
between these tables. The following are relational database models for class and exam schedule of college of
computing and informatics of Haramaya University.
Figure 3.16Persistent database diagrams for class schedule and exam schedule.
Entities are the "things" for which we want to store information. An entity is a person, place, thing or event.
Attributes are the data we want to collect for an entity.
Relationships describe the relations between the entities.
By using the above symbols we made the ER diagram for both class and exam schedule.
We have six entities and eleven key attributes and different derived attributes.
Figure 3.17 Entity relationship diagrams for both class schedule and exam schedule.
The following diagram shows component diagram for scheduling system of college of computing and informatics.
Figure 3.18Component diagram for scheduling system for CCI of Haramaya University
Figure 3.19deployment diagram of class and exam schedule for CCI of Haramaya University
Reference