SlideShare a Scribd company logo
1 of 44
Download to read offline
WACHEMO UNIVERSITY
FACULTY OF ENGINEERING AND TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
TITLE:-DESKTOP APPLICATION FOR HOSSANA WATER
SUPPLY MANEGMENT SYSTEM
MEMBER……………………………………………………….ID NUMBER
1. Behredin sultan………………………………………….R/E-1248/05
2. Kedru sultan………………………….…………………R/E-1287/05
ADVISOR Ms.Hiwot
Jan 6/ 2008
Hosanna, Ethiopia
Contents
List of Table....................................................................................................................................................I
List of figure ..................................................................................................................................................II
Chapter two ..................................................................................................................................................1
2. System analysis .........................................................................................................................................1
2.1 INTRODUCTON................................................................................................................................1
2.2. Description of the existing system.....................................................................................................1
2.3. Description of the new system...........................................................................................................1
2.4. Requirement analysis.........................................................................................................................2
2.4. Functional Requirements ...................................................................................................................2
2.4.1. Functional requirements..............................................................................................................2
2.4.2. Non Functional Requirements ....................................................................................................2
2.5. Use case diagram ...............................................................................................................................3
2.5.1 Use case modeling .......................................................................................................................3
2.5.2. Activity diagram .......................................................................................................................11
2.5.3. Sequence diagram .....................................................................................................................19
CHAPTER 3 ..................................................................................................................................................29
3. SYSTEM DESIGN ......................................................................................................................................29
3.1 Over view..........................................................................................................................................29
3.2. Design Goals....................................................................................................................................29
3.3 user interface.....................................................................................................................................29
3.4. Proposed System architecture..........................................................................................................31
3.5. System decomposition .....................................................................................................................32
Figure 23 Decomposition diagram..............................................................................................................33
3.6. Package ............................................................................................................................................33
3.7. Deployment diagram........................................................................................................................33
3.8. Database design ...............................................................................................................................34
3.8.1 ER Diagram ................................................................................................................................37
3.9. System Security ...............................................................................................................................39
I
List of Table
Table 1 Login table.......................................................................................................................................5
Table 2 table for audit and analysis ..............................................................................................................6
Table 3 table Bill collector............................................................................................................................7
Table 4 Table for update customer information............................................................................................8
Table 5 table for delete customer information..............................................................................................9
Table 6 Table generate report .....................................................................................................................10
Table 7 View report table ...........................................................................................................................11
Table 8 Employee table ..............................................................................................................................35
Table 9 customer table................................................................................................................................36
Table 10 User account table........................................................................................................................36
Table 11 Bill collector table........................................................................................................................37
Table 12 Report table..................................................................................................................................37
Table 13 Report type table..........................................................................................................................37
II
List of figure
Figure 1 use case diagram.............................................................................................................................4
Figure 2 activity diagram login...................................................................................................................12
Figure 3 activity diagram audit and analysis ..............................................................................................13
Figure 4 activity diagram apply register .....................................................................................................14
Figure 5 activity diagram bill collector.......................................................................................................15
Figure 6 activity diagram update customer information.............................................................................16
Figure 7 activity diagram delete customer information.............................................................................17
Figure 8 activity diagram generate report...................................................................................................18
Figure 9 activity diagram view report........................................................................................................19
Figure 10 Sequence diagram for employee register....................................................................................20
Figure 11 Sequence diagram for update employee information .................................................................21
Figure 12 Sequence diagram for update customer information..................................................................22
Figure 13 Sequence diagram for delete customer information ...................................................................23
Figure 14 Sequence diagram for delete employee information ..................................................................24
Figure 15 Sequence diagram for generate report........................................................................................25
Figure 16 Bill payment form........................................................................................................................26
Figure 17 Sequence diagram for customer register.....................................................................................27
Figure 18 Class diagram .............................................................................................................................28
Figure 19 login interface.............................................................................................................................30
Figure 20 interface for customer registration form.....................................................................................30
Figure 21 Employee registration form........................................................................................................31
Figure 22 system proposed architecture....................................................................................................32
Figure 23 Decomposition diagram..............................................................................................................33
Figure 24 Entity relationship diagram.........................................................................................................38
1
Chapter two
2. System analysis
2.1 INTRODUCTON
System analysis is the way of studying a system with an eye on solving its problem using computers. It is
the most essential part of the development of a project of a system analysis. System analysis consists of
system element, process and technology. It is the detailed study of the various operations performed
by a system and their relationships within and outside of the system. A key question is: What must
be done to solve the problem? One aspect of analysis is defining the boundaries of the system and
determining whether or not candidate system should consider other related systems.
2.2. Description of the existing system
The existing system most works made by manual. The information of the previous and new coming
customers is recording on the paper and placed on the shelf. . The existing system or this manual
system has many drawbacks like; it takes time to search customer, it needs high cost, the paper
based recording cannot be claimed as secure. Therefore developing an desktop application for
HWSSO is found to be important to address those problems.
2.3. Description of the new system
The system that we are going to develop can solve different problems that we have mentioned in
the existing system. In general this application will reduce the cost, time, and effort of the user
and also it will provide such an easy way to use it for the user.
 To reduce human errors by providing user-friendly input and output capabilities and record
keeping.
 To store data into his/her computer so, it can be easily accessed and used at any time.
 To provide security to data.
The advantages of the new system are:
 Performance: The performance of the proposed system provides fast response time because it is
easy to access data from the stored data. .
 Processing data with high speed and short hand form.
 Data redundancy problem will be avoided with the proposed system.
2
2.4. Requirement analysis
The following are Functional and Nonfunctional requirements of the proposed new system that a
project team have identified from requirement use cases associated with each actor and use case
interactions
2.4. Functional Requirements
2.4.1. Functional requirements
Functional requirements these are statements of services the system should provide, how the
system should react to particular inputs, and how the system should behave in particular situations.
It specifies the software functionality that the developers must build into the product to enable
users to accomplish their tasks.
The system must have a dynamic that provides successfully registration of customers which are
under the business rule of the office and generate report to interact with various users.
 The system should allow staff to login to the system using their username and password.
 The system should provide to modify record that is deleting, editing and inserting as well as
retrieving the required information.
 The system should display message when employees of the HWSS and customers do their task
successfully or not when they insert invalid username and password.
 The system should display full information for the employee from the database to the interface.
 The system should have well organized information storage and accessing mechanism.
 The system should allow generating report for the organization.
 The system must easy to enter meter read value to the database.
 The system must presents information of the customer and their monthly costs, and requests
service maintenance in secured manner.
 It is expected to solve the difficulty of managing overloaded customer registration, bill calculating
and other task successfully.
2.4.2. Non Functional Requirements
Non-functional requirements, as the name suggests, are requirements that are not directly
concerned with the specific services delivered by the system to its users. They may relate to
emergent system properties such as reliability, response time, and store occupancy
 Since everything in the office is financial, the system of DBMS should be highly secured and every
users of the system should have their own privilege which in turn maximize the system security.
3
 The system calculates the customer’s bill rent, so it should give accurate result; so should be
reliable.
 The system should have an easily understandable design in order for users (employee) to use it;
this means the system should be user friendly.
 The system provides quick and easy information analysis which in turn maximizes the overall
work efficiency.
 The system should be able to manage all the information incoming from the database and the
catalogue; Capacity Requirements.
2.5. Use case diagram
The Use case diagram is used to define the core elements and processes that make up a system.
The key elements are termed as "actors" and the processes are called "use cases." The Use case
diagram shows which actors interact with each use case. Actors and their general work description
are listed below:-
2.5.1 Use case modeling
Actor Definition
Actors are portrayed in a use case diagram as a stick figure and represent external factors that will
provide interaction with the system.
Administrator: an employee, who works on customer service office, which have the following
responsibilities.
 Approve new customer application.
 She/he makes a decision when a customer is deleted or updated.
Accountant: A professional person who performs accounting functions such as audits or financial
statement analysis, which responsible to takes the final value from the customer and she/he asks
the customer to pay their fee depend on the calculated value. After the payment the Accountant
must be transfer the overall deposit of the customer to the Bill collector.
Bill collector: The Bill collector takes the deposit from the Accountant and check if exception was
happened, if not he/she approve the customers. This employee also has a privilege to read the
generated report that is done by the Bill officer.
And it is an employee in the Billing system, who is responsible to check the monthly or ant time
when the organization want to check reading data,
4
2.5.1.1. Use case Detail description
System
accountanat
Bill colector
Administrator
Update customer
inforation
view report
Audit and analysis
Delete customer
information
login
«uses»
«uses»
«uses»
«uses»
«uses»
register customer
register employee
«uses»
«uses»
put penality
create account
«uses»
«uses»
bill collect
«uses»
Figure 1 use case diagram
5
Use case name: Login
Identifier: UC2
Actor: Administrator, Accountant, Bill collector.
Description: A member login to HWSSO uses their appropriate user name and
pasword.
Precondition: Must have valid username and password.
Basic course of
action:
The
employee:
 Open home page
 Click sign in from the right top of the screen
 Enter Username and password.
 System validates the address.
 User login to the system.
 If not try again
 End use case.
Post condition: The employees enter to the System
Table 1 Login table
6
Use case name: Audit and analysis
Identifier: UC3
Actor: Accountant
Description: The Accountant would receive the total cost from the customer that has
been b being used.
Precondition:
The bill officer transfer the final calculated value to the Accountant
Basic course of
action: The accountant:
 Open the homepage.
 login in
 Enter username and password.
 System validates the address.
 Click the customer payment page link.
 He/she receive payment from the customer’s
according to the data; if the customers had debit, add
the penalty value (10 birr per month).
 After the payment process was finished, transfer the
general data to the bill collector.
 End use case.
Post condition: The accountant take the payment from customers according to the calculated
bill value, audit and transfer to the bill collector.
Table 2 table for audit and analysis
7
Use case name: Bill collect
Identifier: UC4
Actor: Bill collector
Description: The Bill collector accumulates the overall financial value from the
accountant and takes the data of the customers from the bill officer to
approve it.
Precondition: The Accountant must be finished the payment value and the bill officer
must also be transfer the original data of the customers to this employee.
Basic course of
action: The Bill
collector:
 Open the homepage.
 login in
 Enter username and password.
 System validates the address.
Click the customer payment page link.
 Check The payment and the calculated data.
I Identifies the customers who have debit value.
 After the approving process was finished, transfer the data to
the accountant and bill officer.
 End use case.
Post condition: The accountant takes the payment from customers according to the
calculated bill value, audit and transfer to the bill collector.
Table 3 table Bill collector
8
Use case name: Update customer information
Identifier: UC5
Actor: Administrator.
Description: Allow to update previously recorded customer data.
Precondition: UC1, UC2.
Basic course of
action:
The
Administrator:
 Open the home page.
 login in
 Enter login address on the homepage.
 The system check is the correct address or not.
 Bill Officer enter customer ID of the intended customer.
 The system validates the customer ID.
 The system searches and display customer detail.
 Bill Officer enters new modification.
 System updates the information and displays it.
 End use case.
Post condition: Updated customer data.
Table 4 Table for update customer information
9
Use case name: : Delete customer.
Identifier: UC6
Actor: Administrator.
Description: Used to block customer from HWSSO system service.
Precondition: UC2.
Basic course of
action:
The Bill collector: Login to customer page.
 login in
 Enter user name and password
 System validates the address.
 Search the customer information in their database by
entering their appropriate ID.
 Block the customer.
 End use case.
Post condition: The customer will be blocked(Delete).
Table 5 table for delete customer information
10
Use case name: Generate report
Identifier: UC7
Actor: Bill collector
Description: Generate report that was done monthly in the form of printable data.
Precondition: UC1, UC3.
Basic course of
action:
The Bill
collector:
 Open the homepage
 login in
 Enter user name and password
 System validates the address.
 Click report link
 Select report type that wants to generate then click
preview.
 Click print button, logout, End use case.
Post condition: Generate report.
Table 6 Table generate report
11
Use case name: View Report
Identifier: UC8
Actor: Bill collector
Description: View report that was done monthly.
Precondition: UC1, UC3.
Basic course of
action:
The Bill
collector:
 Open the homepage
 Login
 Enter user name and password
 System validates the address.
 Click report link
 Select report type that wants to view.
 Back to main page.
 End use case.
Post condition: Generate report.
Table 7 View report table
Table 2.8
2.5.2. Activity diagram
Activity Diagram
Activity diagrams model is a high level business or processes or transitions between states of a
class. In this activity diagram tried to document the flow of logic for the major business processes.
12
Open home page
Click login button
Redirect to the page
Login:
Login
Enter username and password
[ invalid
]
valid
Figure 2 activity diagram login
13
Open home page
Take the payment and debit value
Check the payment and debit
Login
Enter user name and password
Click login
[ invalid
]
Successfully inserted
valid
invalid
valid
auditing and analysis:
Figure 3 activity diagram audit and analysis
14
open home page
login
Enter usermane and password
click login
employee registration page
register employee:
register successfull
register
adminstrator
Figure 4 activity diagram apply register
15
Open home page
check the monthly payment and debit
Login
Enter user name and password
Click login
[ invalid
]
check Duplicate files
bill collector:
[Valid
]
[Invalid]
[Approv
e ]
succesfully inserted
Figure 5 activity diagram bill collector
16
Open home page
Enter the data to update
Login
[ invalid]
Enter user name and password
[ incorrect ID]
[ correct ID]
update customer information:
Insert customer identification number
Successfully update
customer registration page
Figure 6 activity diagram update customer information
17
Figure 7 activity diagram
delete customer information
Open home page
Login
[ invalid]
Enter user name and password
Insert data to be delete
Delete
Delete custemet information:
18
Enter Username and password
[ Correct address]
The Bill officer open the homepage
Click print button
Signin
[ Incorrect Address]
Click report link
Select report type that want to generate
Generate Report
Figure 8 activity diagram generate report
19
Enter Username and password
[ Correct address]
The Bill collector open the homepage
Click view button
[ Incorrect Address]
Click report link
Select report type that want to view
View Report
Login
Figure 9 activity diagram view report
2.5.3. Sequence diagram
A sequence diagram shows an interaction arranged in time sequence. In particular, it shows the
instances participating in the interaction by their “lifelines” and the stimuli that they arranged in
time sequence. It does not show the associations among the objects.
20
Figure 10 Sequence diagram for employee register
21
Figure 11 Sequence diagram for update employee information
22
Figure 12 Sequence diagram for update customer information
23
Figure 13 Sequence diagram for delete customer information
24
Figure 14 Sequence diagram for delete employee information
25
Figure 15 Sequence diagram for generate report
26
Figure 16 Bill payment form
27
Figure 17 Sequence diagram for customer register
28
2.5.4. Class diagram
Class diagrams show the static structure of the model, in particular, the things that exist
(such as classes and types), their internal structure, and their relationships to other things
Figure 18 Class diagram
Employee
-ID: int
-Fname: string
-Lname: string
-Role: string
-Age: int
-Phone No: int
-Sex: char
-Emp_ID: string
-create ()
-delete ()
-update
User account
-Account_ID: int
-username: string
-password: string
-Role: string
-Emp_ID: int
-Create ()
-delete ()
Customer
-ID: int
-customer ID: string
-cus_Fname: string
-cus_Lname: string
-Age: int
-Sex: char
-keble: int
-home_no: int
-phone_no: int
-get service ()
Bill collector
-ID: int
-collect_ID: string
-collect ()
Report
-ID: int
-type ID
-generate ()
Report type
-ID: INT
-type: string
-report: string
-identify ()
29
CHAPTER 3
3. SYSTEM DESIGN
3.1 Over view
The purpose of design is to determine how we are going to build our system and to obtain the
information needed to drive the actual implementation of our system. This is different from
analysis, which focuses on understanding what will be built.
3.2. Design Goals
The goal of the design phase is to transform the requirements into complete and detailed system
design specifications.
 It also improves the performance.
 Establish a baseline for requirements change control, design, and testing
 Provide users with detailed information to fully utilize the system
 Increases reliability and speed
 Once the design is approved, the development team begins the development phase.
3.3 user interface
This layer is used to join to the system through which the system user can communicate with the
system.
The users intended to face login form on the first page to enter the user based on their account
level. If the entered user is administrator or he/ she can meet with the main form which contains
menus and submenus like sign up for new users delete user, update account for system user. But,
if the logged user is not administrator he can’t access all things. If entered user is acquisition officer
he/she can use forms to registering new employee information, updating existing files, searching,
report, etc.
Login page
30
Figure 19 login interface
Customer registration page
Figure 20 interface for customer registration form
Employee registration form
31
Figure 21 Employee registration form
3.4. Proposed System architecture
The general architecture of the system looks like the following picture. At the top of layer is put
the user interface of the system and water management system application logic. Finally, at the
back end, the organization data is placed. We can show as follows
32
3.5. System decomposition
To reduce the complexity of the solution domain, we decompose a system into simpler parts, called
subsystems, which are made of a number of solution domain classes. In the case of complex
subsystems, we recursively apply this principle and decompose a sub- system into simpler
subsystems. Decomposition Results large systems in to a set of loosely dependent parts which
make up the system. The main need of this portion is to design the external part of the system.
Sub-System Decomposition is the way that helps us to distinguish the part of the operations that
takes place under the organization.
System Layer
Data Source
Data Layer
(Persistence layer)
Interface Layer
(User interface layer)
Process layer
(Application & control
Layer)
Business Layer
(Domain layer)
Users
System Architecture
Figure 22 system proposed architecture
33
HWSSMS
ADMINSTRATOR ACCOUNTANT
BILL COLLECTOR
Figure 23 Decomposition diagram
3.6. Package
Package is UML structure diagram which shows packages and dependencies between the
packages. Package diagram enables us to gain a high level understanding of the collaboration
among model elements through analyzing the relationships among their user package.
Package diagrams depict the various packages of the software system and the relationships among
them. Advantages of using packages to model the constituents of a software system are enable
visualizing the functional groups and the relationships among them. Facilitates easy management
of the large software systems. Persistence layers encapsulate the capability to store, retrieve, and delete
objects/data permanently without revealing details of the underlying storage technology. Often
implement between your object schema and your database schema and there are various available to you.
3.7. Deployment diagram
Deployment diagram show how the system is deployed on computers. In other words, it shows
which component of the software is installed on which machine and how they communicate with
each other if they are on different machines. It also depicts a static view of the run-time
configuration of processing nodes and the components that run on those nodes. In other
words, deployment diagrams show the hardware for your system, the software installed on
that hardware, and the middleware used to connect the disparate machines to one another.
34
The purpose of deployment diagrams can be described as:
 Visualize hardware topology of a system.
 Describe the hardware components used to deploy software components.
 Describe runtime processing nodes.
Application server layer
Dtatabase Server
layer
Registor customer
Registor employee
Update cus_inform
Update Emp_inform
Delate Emp_info
audit & analise
Database
Bill collect
View Report
Adminstrator
: Bill database layer
Adminstrator
Bill collector
Accountant
put penality
create account
Fig 3.5.2. Deployment Diagram
3.8. Database design
Database design is transforming an E-R model and their data specifications design into a
normalized relation. A relation is a named, two dimensional tables of data, having set of named
columns and an arbitrary number of unnamed rows, Each column in a relation corresponds to an
attribute of that relation and each row of a relation corresponds to a records that contains data
35
values for an entity. Well-structured relation corresponds to records that contain a minimum
amount of redundancy and allows users to insert, modify and delete the rows without errors or
inconsistencies. It is the process of converting complex data structures into simple, stable data
structures using a process called normalization.
Table 8 Employee table
36
Table 9 customer table
Table 10 User account table
37
Table 11 Bill collector table
Table 12 Report table
Table 13 Report type table
3.8.1 ER Diagram
Entity-relationship diagrams were first proposed as a means of quickly obtaining, with minimum
effort, a good sense of the structure of a database. They are used to plan and design a database and
to model a system’s data.
Due to lack of space it’s difficult to place all attributes to their corresponding entities so they are
listed below and assumed to be drawn to their respective entities.
38
Figure 24 Entity relationship diagram
EmployeeAccount Bill collector
Customer
Report
generate
Create
Register
Collect
Lname
Enamel
Name
ID
TypeID
ID
Age
ID Cstomer_ID
Collect ID
Fname
Name
emp_ID
Lname
Password
Age
Phone no
Home no
Keble
Role
Username
Monthly
Wea
kly
Annually
39
3.9. System Security
Hossan water supply Management System needs authentication mechanism to control the data
access by different users, as it is information has to be protected from using by unauthorized users.
So that the software have a particular server, which manage the data access by users and gives
permission to each users according to their priority given by system administrator, to modify
(manipulate) the data. The other important thing in software development is security. The software
system first asks every user to be login to the system, before performing certain operation.
When the administrator creates account for the user, the user gets a username and Password.
When the user used the system in first time it can be change the user name and it answer
two questions in terms of used to reset the username and password when it forget the username or
password.
3.10. Reference
1. Valacich /George/ Hoffer (2012), Essentials of System Analysis and Design, Fifth edition.
2. ScottW.Ambler, the Application Developer’s Guide to Object Orientation and UML, second
edition.
3. System analysis and Design methods (in analysis and design phase).

More Related Content

What's hot

Exports Brazil - Export Legal Information Guide
Exports Brazil - Export Legal Information GuideExports Brazil - Export Legal Information Guide
Exports Brazil - Export Legal Information GuideExport Hub
 
Plano de estudos - intercâmbio na Universidade do Algarve
Plano de estudos - intercâmbio na Universidade do AlgarvePlano de estudos - intercâmbio na Universidade do Algarve
Plano de estudos - intercâmbio na Universidade do Algarvelauravieira
 
Web Hosting Website Templates
Web Hosting Website TemplatesWeb Hosting Website Templates
Web Hosting Website TemplatesIngenyes
 
Art and Gallery Website Templates
Art and Gallery Website TemplatesArt and Gallery Website Templates
Art and Gallery Website TemplatesIngenyes
 
Thesis on barriers to e commerce in jamaica - Patrick Thompson
Thesis on barriers to e commerce in jamaica - Patrick Thompson Thesis on barriers to e commerce in jamaica - Patrick Thompson
Thesis on barriers to e commerce in jamaica - Patrick Thompson Patrick Thompson
 
White Paper Oracle Subledger Accounting
White Paper Oracle Subledger AccountingWhite Paper Oracle Subledger Accounting
White Paper Oracle Subledger AccountingSandeep Vantmuriswami
 
Industrial Website Template
Industrial Website TemplateIndustrial Website Template
Industrial Website TemplateIngenyes
 
ROC (Taiwan) Yearbook 2011 Indices
ROC (Taiwan) Yearbook 2011 IndicesROC (Taiwan) Yearbook 2011 Indices
ROC (Taiwan) Yearbook 2011 IndicesKlaus Bardenhagen
 
Doing agribusiness in Ukraine
Doing agribusiness in UkraineDoing agribusiness in Ukraine
Doing agribusiness in UkraineArtur Boiko
 
AMR 2007 Proxy Statement
AMR 	2007 Proxy StatementAMR 	2007 Proxy Statement
AMR 2007 Proxy Statementfinance11
 
Master cc&r's 2002-482548-082902
Master cc&r's 2002-482548-082902Master cc&r's 2002-482548-082902
Master cc&r's 2002-482548-082902Steve Alexander
 
Anthony Correale Phase I ESA - Graham's Night Club - Bryan, Texas
Anthony Correale Phase I ESA - Graham's Night Club - Bryan, TexasAnthony Correale Phase I ESA - Graham's Night Club - Bryan, Texas
Anthony Correale Phase I ESA - Graham's Night Club - Bryan, TexasAnthony Correale
 
California Baptist University Graduate catalog 1617_web
California Baptist University Graduate catalog 1617_webCalifornia Baptist University Graduate catalog 1617_web
California Baptist University Graduate catalog 1617_webAbhishek Bajaj
 
Hotels Website Templates
Hotels Website TemplatesHotels Website Templates
Hotels Website TemplatesIngenyes
 
Lewis Clark State College broucher
Lewis Clark State College broucherLewis Clark State College broucher
Lewis Clark State College broucherAbhishek Bajaj
 
Android based crime manage system industrial project i
Android based crime manage system industrial project iAndroid based crime manage system industrial project i
Android based crime manage system industrial project iBeresa Abebe
 
Android based crime manage system industrial project i
Android based crime manage system industrial project iAndroid based crime manage system industrial project i
Android based crime manage system industrial project iBeresa Abebe
 

What's hot (20)

Fed lib 2011 competencies
Fed lib 2011 competenciesFed lib 2011 competencies
Fed lib 2011 competencies
 
Exports Brazil - Export Legal Information Guide
Exports Brazil - Export Legal Information GuideExports Brazil - Export Legal Information Guide
Exports Brazil - Export Legal Information Guide
 
Plano de estudos - intercâmbio na Universidade do Algarve
Plano de estudos - intercâmbio na Universidade do AlgarvePlano de estudos - intercâmbio na Universidade do Algarve
Plano de estudos - intercâmbio na Universidade do Algarve
 
Web Hosting Website Templates
Web Hosting Website TemplatesWeb Hosting Website Templates
Web Hosting Website Templates
 
Art and Gallery Website Templates
Art and Gallery Website TemplatesArt and Gallery Website Templates
Art and Gallery Website Templates
 
Thesis on barriers to e commerce in jamaica - Patrick Thompson
Thesis on barriers to e commerce in jamaica - Patrick Thompson Thesis on barriers to e commerce in jamaica - Patrick Thompson
Thesis on barriers to e commerce in jamaica - Patrick Thompson
 
White Paper Oracle Subledger Accounting
White Paper Oracle Subledger AccountingWhite Paper Oracle Subledger Accounting
White Paper Oracle Subledger Accounting
 
Industrial Website Template
Industrial Website TemplateIndustrial Website Template
Industrial Website Template
 
ROC (Taiwan) Yearbook 2011 Indices
ROC (Taiwan) Yearbook 2011 IndicesROC (Taiwan) Yearbook 2011 Indices
ROC (Taiwan) Yearbook 2011 Indices
 
Doing agribusiness in Ukraine
Doing agribusiness in UkraineDoing agribusiness in Ukraine
Doing agribusiness in Ukraine
 
City colleges fy2014-approvedbudgetbook
City colleges fy2014-approvedbudgetbookCity colleges fy2014-approvedbudgetbook
City colleges fy2014-approvedbudgetbook
 
AMR 2007 Proxy Statement
AMR 	2007 Proxy StatementAMR 	2007 Proxy Statement
AMR 2007 Proxy Statement
 
Master cc&r's 2002-482548-082902
Master cc&r's 2002-482548-082902Master cc&r's 2002-482548-082902
Master cc&r's 2002-482548-082902
 
Anthony Correale Phase I ESA - Graham's Night Club - Bryan, Texas
Anthony Correale Phase I ESA - Graham's Night Club - Bryan, TexasAnthony Correale Phase I ESA - Graham's Night Club - Bryan, Texas
Anthony Correale Phase I ESA - Graham's Night Club - Bryan, Texas
 
California Baptist University Graduate catalog 1617_web
California Baptist University Graduate catalog 1617_webCalifornia Baptist University Graduate catalog 1617_web
California Baptist University Graduate catalog 1617_web
 
Ise syllabus 2010 2013
Ise syllabus 2010 2013Ise syllabus 2010 2013
Ise syllabus 2010 2013
 
Hotels Website Templates
Hotels Website TemplatesHotels Website Templates
Hotels Website Templates
 
Lewis Clark State College broucher
Lewis Clark State College broucherLewis Clark State College broucher
Lewis Clark State College broucher
 
Android based crime manage system industrial project i
Android based crime manage system industrial project iAndroid based crime manage system industrial project i
Android based crime manage system industrial project i
 
Android based crime manage system industrial project i
Android based crime manage system industrial project iAndroid based crime manage system industrial project i
Android based crime manage system industrial project i
 

Viewers also liked

JCBL Group : Best Bus Body Builders in India
JCBL Group : Best Bus Body Builders in IndiaJCBL Group : Best Bus Body Builders in India
JCBL Group : Best Bus Body Builders in IndiaRiya Sharma
 
Nós e Nossas Reencarnações
Nós e Nossas ReencarnaçõesNós e Nossas Reencarnações
Nós e Nossas ReencarnaçõesCEENA_SS
 
Ei3 a manrique flores wendy guadalupe produc02
Ei3 a manrique flores wendy guadalupe  produc02Ei3 a manrique flores wendy guadalupe  produc02
Ei3 a manrique flores wendy guadalupe produc02wmwnriquef
 
Suicídio - Uma Epidemia Silenciosa
Suicídio - Uma Epidemia SilenciosaSuicídio - Uma Epidemia Silenciosa
Suicídio - Uma Epidemia SilenciosaCEENA_SS
 
FinalPoster
FinalPosterFinalPoster
FinalPosterZhen Lu
 
Tuas dores
Tuas doresTuas dores
Tuas doresCEENA_SS
 
Bem aventurados os aflitos
Bem aventurados os aflitosBem aventurados os aflitos
Bem aventurados os aflitosCEENA_SS
 
Comunicacion digital
Comunicacion digitalComunicacion digital
Comunicacion digitalJorge Fonseca
 
Типы слогов в английском языке
Типы слогов в английском языкеТипы слогов в английском языке
Типы слогов в английском языкеLana Yatu
 
Nuevas tecnologías de procesadores
Nuevas tecnologías de procesadoresNuevas tecnologías de procesadores
Nuevas tecnologías de procesadoresBradley1102
 

Viewers also liked (20)

GTS FINAL
GTS FINALGTS FINAL
GTS FINAL
 
Sueño mi universidad
Sueño mi universidadSueño mi universidad
Sueño mi universidad
 
JCBL Group : Best Bus Body Builders in India
JCBL Group : Best Bus Body Builders in IndiaJCBL Group : Best Bus Body Builders in India
JCBL Group : Best Bus Body Builders in India
 
La reproducción de la imagen y su impacto en la historia
La reproducción de la imagen y su impacto en la historiaLa reproducción de la imagen y su impacto en la historia
La reproducción de la imagen y su impacto en la historia
 
Nós e Nossas Reencarnações
Nós e Nossas ReencarnaçõesNós e Nossas Reencarnações
Nós e Nossas Reencarnações
 
trilochanbhambra CV
trilochanbhambra CVtrilochanbhambra CV
trilochanbhambra CV
 
Ei3 a manrique flores wendy guadalupe produc02
Ei3 a manrique flores wendy guadalupe  produc02Ei3 a manrique flores wendy guadalupe  produc02
Ei3 a manrique flores wendy guadalupe produc02
 
Suicídio - Uma Epidemia Silenciosa
Suicídio - Uma Epidemia SilenciosaSuicídio - Uma Epidemia Silenciosa
Suicídio - Uma Epidemia Silenciosa
 
FinalPoster
FinalPosterFinalPoster
FinalPoster
 
Couponschori
CouponschoriCouponschori
Couponschori
 
Tuas dores
Tuas doresTuas dores
Tuas dores
 
sajith cv (1)
sajith cv (1)sajith cv (1)
sajith cv (1)
 
Venitul
VenitulVenitul
Venitul
 
Bem aventurados os aflitos
Bem aventurados os aflitosBem aventurados os aflitos
Bem aventurados os aflitos
 
Comunicacion digital
Comunicacion digitalComunicacion digital
Comunicacion digital
 
Proyecto de e learning
Proyecto de e learningProyecto de e learning
Proyecto de e learning
 
Типы слогов в английском языке
Типы слогов в английском языкеТипы слогов в английском языке
Типы слогов в английском языке
 
Koreano
KoreanoKoreano
Koreano
 
Nuevas tecnologías de procesadores
Nuevas tecnologías de procesadoresNuevas tecnologías de procesadores
Nuevas tecnologías de procesadores
 
sueño mi universidad
sueño mi universidadsueño mi universidad
sueño mi universidad
 

Similar to modify12

Computer and Technology Website Templates
Computer and Technology Website TemplatesComputer and Technology Website Templates
Computer and Technology Website TemplatesIngenyes
 
Report on flood hazard model
Report on flood hazard modelReport on flood hazard model
Report on flood hazard modelCIRM
 
pdfcoffee.com_final-project-insurance-management-system2-pdf-free.pdf
pdfcoffee.com_final-project-insurance-management-system2-pdf-free.pdfpdfcoffee.com_final-project-insurance-management-system2-pdf-free.pdf
pdfcoffee.com_final-project-insurance-management-system2-pdf-free.pdfyihunie2
 
final-project-insurance-management-system-2_compress.pdf
final-project-insurance-management-system-2_compress.pdffinal-project-insurance-management-system-2_compress.pdf
final-project-insurance-management-system-2_compress.pdfyihunie2
 
Eia addendum 1 for 3.00 km
Eia addendum 1 for 3.00 kmEia addendum 1 for 3.00 km
Eia addendum 1 for 3.00 kmzubeditufail
 
Strategic Technology Roadmap Houston Community College 2005
Strategic Technology Roadmap Houston Community College 2005Strategic Technology Roadmap Houston Community College 2005
Strategic Technology Roadmap Houston Community College 2005schetikos
 
Gis database
Gis databaseGis database
Gis databaseanandkc77
 
Primary Health Care Renewal In Bc
Primary Health Care Renewal In BcPrimary Health Care Renewal In Bc
Primary Health Care Renewal In Bcprimary
 
Pressure Vessel Selection Sizing and Troubleshooting
Pressure Vessel Selection Sizing and Troubleshooting Pressure Vessel Selection Sizing and Troubleshooting
Pressure Vessel Selection Sizing and Troubleshooting Karl Kolmetz
 
Ppdg Robust File Replication
Ppdg Robust File ReplicationPpdg Robust File Replication
Ppdg Robust File Replicationguest0dc8a2
 
Prediction of economical recession with the signal approach, and the turkey case
Prediction of economical recession with the signal approach, and the turkey casePrediction of economical recession with the signal approach, and the turkey case
Prediction of economical recession with the signal approach, and the turkey caseDeniz Özgür Tiryaki
 
Mnp3810e maintenance part3 board interface & strap
Mnp3810e maintenance part3 board interface & strapMnp3810e maintenance part3 board interface & strap
Mnp3810e maintenance part3 board interface & strapzeu1507
 
VDC Handbook_Final Version_Aug 14-milan
VDC Handbook_Final Version_Aug 14-milanVDC Handbook_Final Version_Aug 14-milan
VDC Handbook_Final Version_Aug 14-milanMilan K Dinda
 
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATIONE-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATIONPIYUSH Dubey
 
I teva software manual operators manual
I teva software manual operators manualI teva software manual operators manual
I teva software manual operators manualmaurogalvao
 
National Climate Change Response White Paper
National Climate Change Response White PaperNational Climate Change Response White Paper
National Climate Change Response White PaperDr Lendy Spires
 

Similar to modify12 (20)

Computer and Technology Website Templates
Computer and Technology Website TemplatesComputer and Technology Website Templates
Computer and Technology Website Templates
 
Report on flood hazard model
Report on flood hazard modelReport on flood hazard model
Report on flood hazard model
 
pdfcoffee.com_final-project-insurance-management-system2-pdf-free.pdf
pdfcoffee.com_final-project-insurance-management-system2-pdf-free.pdfpdfcoffee.com_final-project-insurance-management-system2-pdf-free.pdf
pdfcoffee.com_final-project-insurance-management-system2-pdf-free.pdf
 
final-project-insurance-management-system-2_compress.pdf
final-project-insurance-management-system-2_compress.pdffinal-project-insurance-management-system-2_compress.pdf
final-project-insurance-management-system-2_compress.pdf
 
Eia addendum 1 for 3.00 km
Eia addendum 1 for 3.00 kmEia addendum 1 for 3.00 km
Eia addendum 1 for 3.00 km
 
Strategic Technology Roadmap Houston Community College 2005
Strategic Technology Roadmap Houston Community College 2005Strategic Technology Roadmap Houston Community College 2005
Strategic Technology Roadmap Houston Community College 2005
 
Gis database
Gis databaseGis database
Gis database
 
Primary Health Care Renewal In Bc
Primary Health Care Renewal In BcPrimary Health Care Renewal In Bc
Primary Health Care Renewal In Bc
 
Icp
IcpIcp
Icp
 
Gate brouchre
Gate brouchreGate brouchre
Gate brouchre
 
ComPrep User Guide_v1
ComPrep User Guide_v1ComPrep User Guide_v1
ComPrep User Guide_v1
 
Pressure Vessel Selection Sizing and Troubleshooting
Pressure Vessel Selection Sizing and Troubleshooting Pressure Vessel Selection Sizing and Troubleshooting
Pressure Vessel Selection Sizing and Troubleshooting
 
Ppdg Robust File Replication
Ppdg Robust File ReplicationPpdg Robust File Replication
Ppdg Robust File Replication
 
Prediction of economical recession with the signal approach, and the turkey case
Prediction of economical recession with the signal approach, and the turkey casePrediction of economical recession with the signal approach, and the turkey case
Prediction of economical recession with the signal approach, and the turkey case
 
Mnp3810e maintenance part3 board interface & strap
Mnp3810e maintenance part3 board interface & strapMnp3810e maintenance part3 board interface & strap
Mnp3810e maintenance part3 board interface & strap
 
VDC Handbook_Final Version_Aug 14-milan
VDC Handbook_Final Version_Aug 14-milanVDC Handbook_Final Version_Aug 14-milan
VDC Handbook_Final Version_Aug 14-milan
 
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATIONE-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
 
01
0101
01
 
I teva software manual operators manual
I teva software manual operators manualI teva software manual operators manual
I teva software manual operators manual
 
National Climate Change Response White Paper
National Climate Change Response White PaperNational Climate Change Response White Paper
National Climate Change Response White Paper
 

modify12

  • 1. WACHEMO UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY TITLE:-DESKTOP APPLICATION FOR HOSSANA WATER SUPPLY MANEGMENT SYSTEM MEMBER……………………………………………………….ID NUMBER 1. Behredin sultan………………………………………….R/E-1248/05 2. Kedru sultan………………………….…………………R/E-1287/05 ADVISOR Ms.Hiwot Jan 6/ 2008 Hosanna, Ethiopia
  • 2. Contents List of Table....................................................................................................................................................I List of figure ..................................................................................................................................................II Chapter two ..................................................................................................................................................1 2. System analysis .........................................................................................................................................1 2.1 INTRODUCTON................................................................................................................................1 2.2. Description of the existing system.....................................................................................................1 2.3. Description of the new system...........................................................................................................1 2.4. Requirement analysis.........................................................................................................................2 2.4. Functional Requirements ...................................................................................................................2 2.4.1. Functional requirements..............................................................................................................2 2.4.2. Non Functional Requirements ....................................................................................................2 2.5. Use case diagram ...............................................................................................................................3 2.5.1 Use case modeling .......................................................................................................................3 2.5.2. Activity diagram .......................................................................................................................11 2.5.3. Sequence diagram .....................................................................................................................19 CHAPTER 3 ..................................................................................................................................................29 3. SYSTEM DESIGN ......................................................................................................................................29 3.1 Over view..........................................................................................................................................29 3.2. Design Goals....................................................................................................................................29 3.3 user interface.....................................................................................................................................29 3.4. Proposed System architecture..........................................................................................................31 3.5. System decomposition .....................................................................................................................32 Figure 23 Decomposition diagram..............................................................................................................33 3.6. Package ............................................................................................................................................33 3.7. Deployment diagram........................................................................................................................33 3.8. Database design ...............................................................................................................................34 3.8.1 ER Diagram ................................................................................................................................37
  • 3. 3.9. System Security ...............................................................................................................................39
  • 4. I List of Table Table 1 Login table.......................................................................................................................................5 Table 2 table for audit and analysis ..............................................................................................................6 Table 3 table Bill collector............................................................................................................................7 Table 4 Table for update customer information............................................................................................8 Table 5 table for delete customer information..............................................................................................9 Table 6 Table generate report .....................................................................................................................10 Table 7 View report table ...........................................................................................................................11 Table 8 Employee table ..............................................................................................................................35 Table 9 customer table................................................................................................................................36 Table 10 User account table........................................................................................................................36 Table 11 Bill collector table........................................................................................................................37 Table 12 Report table..................................................................................................................................37 Table 13 Report type table..........................................................................................................................37
  • 5. II List of figure Figure 1 use case diagram.............................................................................................................................4 Figure 2 activity diagram login...................................................................................................................12 Figure 3 activity diagram audit and analysis ..............................................................................................13 Figure 4 activity diagram apply register .....................................................................................................14 Figure 5 activity diagram bill collector.......................................................................................................15 Figure 6 activity diagram update customer information.............................................................................16 Figure 7 activity diagram delete customer information.............................................................................17 Figure 8 activity diagram generate report...................................................................................................18 Figure 9 activity diagram view report........................................................................................................19 Figure 10 Sequence diagram for employee register....................................................................................20 Figure 11 Sequence diagram for update employee information .................................................................21 Figure 12 Sequence diagram for update customer information..................................................................22 Figure 13 Sequence diagram for delete customer information ...................................................................23 Figure 14 Sequence diagram for delete employee information ..................................................................24 Figure 15 Sequence diagram for generate report........................................................................................25 Figure 16 Bill payment form........................................................................................................................26 Figure 17 Sequence diagram for customer register.....................................................................................27 Figure 18 Class diagram .............................................................................................................................28 Figure 19 login interface.............................................................................................................................30 Figure 20 interface for customer registration form.....................................................................................30 Figure 21 Employee registration form........................................................................................................31 Figure 22 system proposed architecture....................................................................................................32 Figure 23 Decomposition diagram..............................................................................................................33 Figure 24 Entity relationship diagram.........................................................................................................38
  • 6. 1 Chapter two 2. System analysis 2.1 INTRODUCTON System analysis is the way of studying a system with an eye on solving its problem using computers. It is the most essential part of the development of a project of a system analysis. System analysis consists of system element, process and technology. It is the detailed study of the various operations performed by a system and their relationships within and outside of the system. A key question is: What must be done to solve the problem? One aspect of analysis is defining the boundaries of the system and determining whether or not candidate system should consider other related systems. 2.2. Description of the existing system The existing system most works made by manual. The information of the previous and new coming customers is recording on the paper and placed on the shelf. . The existing system or this manual system has many drawbacks like; it takes time to search customer, it needs high cost, the paper based recording cannot be claimed as secure. Therefore developing an desktop application for HWSSO is found to be important to address those problems. 2.3. Description of the new system The system that we are going to develop can solve different problems that we have mentioned in the existing system. In general this application will reduce the cost, time, and effort of the user and also it will provide such an easy way to use it for the user.  To reduce human errors by providing user-friendly input and output capabilities and record keeping.  To store data into his/her computer so, it can be easily accessed and used at any time.  To provide security to data. The advantages of the new system are:  Performance: The performance of the proposed system provides fast response time because it is easy to access data from the stored data. .  Processing data with high speed and short hand form.  Data redundancy problem will be avoided with the proposed system.
  • 7. 2 2.4. Requirement analysis The following are Functional and Nonfunctional requirements of the proposed new system that a project team have identified from requirement use cases associated with each actor and use case interactions 2.4. Functional Requirements 2.4.1. Functional requirements Functional requirements these are statements of services the system should provide, how the system should react to particular inputs, and how the system should behave in particular situations. It specifies the software functionality that the developers must build into the product to enable users to accomplish their tasks. The system must have a dynamic that provides successfully registration of customers which are under the business rule of the office and generate report to interact with various users.  The system should allow staff to login to the system using their username and password.  The system should provide to modify record that is deleting, editing and inserting as well as retrieving the required information.  The system should display message when employees of the HWSS and customers do their task successfully or not when they insert invalid username and password.  The system should display full information for the employee from the database to the interface.  The system should have well organized information storage and accessing mechanism.  The system should allow generating report for the organization.  The system must easy to enter meter read value to the database.  The system must presents information of the customer and their monthly costs, and requests service maintenance in secured manner.  It is expected to solve the difficulty of managing overloaded customer registration, bill calculating and other task successfully. 2.4.2. Non Functional Requirements Non-functional requirements, as the name suggests, are requirements that are not directly concerned with the specific services delivered by the system to its users. They may relate to emergent system properties such as reliability, response time, and store occupancy  Since everything in the office is financial, the system of DBMS should be highly secured and every users of the system should have their own privilege which in turn maximize the system security.
  • 8. 3  The system calculates the customer’s bill rent, so it should give accurate result; so should be reliable.  The system should have an easily understandable design in order for users (employee) to use it; this means the system should be user friendly.  The system provides quick and easy information analysis which in turn maximizes the overall work efficiency.  The system should be able to manage all the information incoming from the database and the catalogue; Capacity Requirements. 2.5. Use case diagram The Use case diagram is used to define the core elements and processes that make up a system. The key elements are termed as "actors" and the processes are called "use cases." The Use case diagram shows which actors interact with each use case. Actors and their general work description are listed below:- 2.5.1 Use case modeling Actor Definition Actors are portrayed in a use case diagram as a stick figure and represent external factors that will provide interaction with the system. Administrator: an employee, who works on customer service office, which have the following responsibilities.  Approve new customer application.  She/he makes a decision when a customer is deleted or updated. Accountant: A professional person who performs accounting functions such as audits or financial statement analysis, which responsible to takes the final value from the customer and she/he asks the customer to pay their fee depend on the calculated value. After the payment the Accountant must be transfer the overall deposit of the customer to the Bill collector. Bill collector: The Bill collector takes the deposit from the Accountant and check if exception was happened, if not he/she approve the customers. This employee also has a privilege to read the generated report that is done by the Bill officer. And it is an employee in the Billing system, who is responsible to check the monthly or ant time when the organization want to check reading data,
  • 9. 4 2.5.1.1. Use case Detail description System accountanat Bill colector Administrator Update customer inforation view report Audit and analysis Delete customer information login «uses» «uses» «uses» «uses» «uses» register customer register employee «uses» «uses» put penality create account «uses» «uses» bill collect «uses» Figure 1 use case diagram
  • 10. 5 Use case name: Login Identifier: UC2 Actor: Administrator, Accountant, Bill collector. Description: A member login to HWSSO uses their appropriate user name and pasword. Precondition: Must have valid username and password. Basic course of action: The employee:  Open home page  Click sign in from the right top of the screen  Enter Username and password.  System validates the address.  User login to the system.  If not try again  End use case. Post condition: The employees enter to the System Table 1 Login table
  • 11. 6 Use case name: Audit and analysis Identifier: UC3 Actor: Accountant Description: The Accountant would receive the total cost from the customer that has been b being used. Precondition: The bill officer transfer the final calculated value to the Accountant Basic course of action: The accountant:  Open the homepage.  login in  Enter username and password.  System validates the address.  Click the customer payment page link.  He/she receive payment from the customer’s according to the data; if the customers had debit, add the penalty value (10 birr per month).  After the payment process was finished, transfer the general data to the bill collector.  End use case. Post condition: The accountant take the payment from customers according to the calculated bill value, audit and transfer to the bill collector. Table 2 table for audit and analysis
  • 12. 7 Use case name: Bill collect Identifier: UC4 Actor: Bill collector Description: The Bill collector accumulates the overall financial value from the accountant and takes the data of the customers from the bill officer to approve it. Precondition: The Accountant must be finished the payment value and the bill officer must also be transfer the original data of the customers to this employee. Basic course of action: The Bill collector:  Open the homepage.  login in  Enter username and password.  System validates the address. Click the customer payment page link.  Check The payment and the calculated data. I Identifies the customers who have debit value.  After the approving process was finished, transfer the data to the accountant and bill officer.  End use case. Post condition: The accountant takes the payment from customers according to the calculated bill value, audit and transfer to the bill collector. Table 3 table Bill collector
  • 13. 8 Use case name: Update customer information Identifier: UC5 Actor: Administrator. Description: Allow to update previously recorded customer data. Precondition: UC1, UC2. Basic course of action: The Administrator:  Open the home page.  login in  Enter login address on the homepage.  The system check is the correct address or not.  Bill Officer enter customer ID of the intended customer.  The system validates the customer ID.  The system searches and display customer detail.  Bill Officer enters new modification.  System updates the information and displays it.  End use case. Post condition: Updated customer data. Table 4 Table for update customer information
  • 14. 9 Use case name: : Delete customer. Identifier: UC6 Actor: Administrator. Description: Used to block customer from HWSSO system service. Precondition: UC2. Basic course of action: The Bill collector: Login to customer page.  login in  Enter user name and password  System validates the address.  Search the customer information in their database by entering their appropriate ID.  Block the customer.  End use case. Post condition: The customer will be blocked(Delete). Table 5 table for delete customer information
  • 15. 10 Use case name: Generate report Identifier: UC7 Actor: Bill collector Description: Generate report that was done monthly in the form of printable data. Precondition: UC1, UC3. Basic course of action: The Bill collector:  Open the homepage  login in  Enter user name and password  System validates the address.  Click report link  Select report type that wants to generate then click preview.  Click print button, logout, End use case. Post condition: Generate report. Table 6 Table generate report
  • 16. 11 Use case name: View Report Identifier: UC8 Actor: Bill collector Description: View report that was done monthly. Precondition: UC1, UC3. Basic course of action: The Bill collector:  Open the homepage  Login  Enter user name and password  System validates the address.  Click report link  Select report type that wants to view.  Back to main page.  End use case. Post condition: Generate report. Table 7 View report table Table 2.8 2.5.2. Activity diagram Activity Diagram Activity diagrams model is a high level business or processes or transitions between states of a class. In this activity diagram tried to document the flow of logic for the major business processes.
  • 17. 12 Open home page Click login button Redirect to the page Login: Login Enter username and password [ invalid ] valid Figure 2 activity diagram login
  • 18. 13 Open home page Take the payment and debit value Check the payment and debit Login Enter user name and password Click login [ invalid ] Successfully inserted valid invalid valid auditing and analysis: Figure 3 activity diagram audit and analysis
  • 19. 14 open home page login Enter usermane and password click login employee registration page register employee: register successfull register adminstrator Figure 4 activity diagram apply register
  • 20. 15 Open home page check the monthly payment and debit Login Enter user name and password Click login [ invalid ] check Duplicate files bill collector: [Valid ] [Invalid] [Approv e ] succesfully inserted Figure 5 activity diagram bill collector
  • 21. 16 Open home page Enter the data to update Login [ invalid] Enter user name and password [ incorrect ID] [ correct ID] update customer information: Insert customer identification number Successfully update customer registration page Figure 6 activity diagram update customer information
  • 22. 17 Figure 7 activity diagram delete customer information Open home page Login [ invalid] Enter user name and password Insert data to be delete Delete Delete custemet information:
  • 23. 18 Enter Username and password [ Correct address] The Bill officer open the homepage Click print button Signin [ Incorrect Address] Click report link Select report type that want to generate Generate Report Figure 8 activity diagram generate report
  • 24. 19 Enter Username and password [ Correct address] The Bill collector open the homepage Click view button [ Incorrect Address] Click report link Select report type that want to view View Report Login Figure 9 activity diagram view report 2.5.3. Sequence diagram A sequence diagram shows an interaction arranged in time sequence. In particular, it shows the instances participating in the interaction by their “lifelines” and the stimuli that they arranged in time sequence. It does not show the associations among the objects.
  • 25. 20 Figure 10 Sequence diagram for employee register
  • 26. 21 Figure 11 Sequence diagram for update employee information
  • 27. 22 Figure 12 Sequence diagram for update customer information
  • 28. 23 Figure 13 Sequence diagram for delete customer information
  • 29. 24 Figure 14 Sequence diagram for delete employee information
  • 30. 25 Figure 15 Sequence diagram for generate report
  • 31. 26 Figure 16 Bill payment form
  • 32. 27 Figure 17 Sequence diagram for customer register
  • 33. 28 2.5.4. Class diagram Class diagrams show the static structure of the model, in particular, the things that exist (such as classes and types), their internal structure, and their relationships to other things Figure 18 Class diagram Employee -ID: int -Fname: string -Lname: string -Role: string -Age: int -Phone No: int -Sex: char -Emp_ID: string -create () -delete () -update User account -Account_ID: int -username: string -password: string -Role: string -Emp_ID: int -Create () -delete () Customer -ID: int -customer ID: string -cus_Fname: string -cus_Lname: string -Age: int -Sex: char -keble: int -home_no: int -phone_no: int -get service () Bill collector -ID: int -collect_ID: string -collect () Report -ID: int -type ID -generate () Report type -ID: INT -type: string -report: string -identify ()
  • 34. 29 CHAPTER 3 3. SYSTEM DESIGN 3.1 Over view The purpose of design is to determine how we are going to build our system and to obtain the information needed to drive the actual implementation of our system. This is different from analysis, which focuses on understanding what will be built. 3.2. Design Goals The goal of the design phase is to transform the requirements into complete and detailed system design specifications.  It also improves the performance.  Establish a baseline for requirements change control, design, and testing  Provide users with detailed information to fully utilize the system  Increases reliability and speed  Once the design is approved, the development team begins the development phase. 3.3 user interface This layer is used to join to the system through which the system user can communicate with the system. The users intended to face login form on the first page to enter the user based on their account level. If the entered user is administrator or he/ she can meet with the main form which contains menus and submenus like sign up for new users delete user, update account for system user. But, if the logged user is not administrator he can’t access all things. If entered user is acquisition officer he/she can use forms to registering new employee information, updating existing files, searching, report, etc. Login page
  • 35. 30 Figure 19 login interface Customer registration page Figure 20 interface for customer registration form Employee registration form
  • 36. 31 Figure 21 Employee registration form 3.4. Proposed System architecture The general architecture of the system looks like the following picture. At the top of layer is put the user interface of the system and water management system application logic. Finally, at the back end, the organization data is placed. We can show as follows
  • 37. 32 3.5. System decomposition To reduce the complexity of the solution domain, we decompose a system into simpler parts, called subsystems, which are made of a number of solution domain classes. In the case of complex subsystems, we recursively apply this principle and decompose a sub- system into simpler subsystems. Decomposition Results large systems in to a set of loosely dependent parts which make up the system. The main need of this portion is to design the external part of the system. Sub-System Decomposition is the way that helps us to distinguish the part of the operations that takes place under the organization. System Layer Data Source Data Layer (Persistence layer) Interface Layer (User interface layer) Process layer (Application & control Layer) Business Layer (Domain layer) Users System Architecture Figure 22 system proposed architecture
  • 38. 33 HWSSMS ADMINSTRATOR ACCOUNTANT BILL COLLECTOR Figure 23 Decomposition diagram 3.6. Package Package is UML structure diagram which shows packages and dependencies between the packages. Package diagram enables us to gain a high level understanding of the collaboration among model elements through analyzing the relationships among their user package. Package diagrams depict the various packages of the software system and the relationships among them. Advantages of using packages to model the constituents of a software system are enable visualizing the functional groups and the relationships among them. Facilitates easy management of the large software systems. Persistence layers encapsulate the capability to store, retrieve, and delete objects/data permanently without revealing details of the underlying storage technology. Often implement between your object schema and your database schema and there are various available to you. 3.7. Deployment diagram Deployment diagram show how the system is deployed on computers. In other words, it shows which component of the software is installed on which machine and how they communicate with each other if they are on different machines. It also depicts a static view of the run-time configuration of processing nodes and the components that run on those nodes. In other words, deployment diagrams show the hardware for your system, the software installed on that hardware, and the middleware used to connect the disparate machines to one another.
  • 39. 34 The purpose of deployment diagrams can be described as:  Visualize hardware topology of a system.  Describe the hardware components used to deploy software components.  Describe runtime processing nodes. Application server layer Dtatabase Server layer Registor customer Registor employee Update cus_inform Update Emp_inform Delate Emp_info audit & analise Database Bill collect View Report Adminstrator : Bill database layer Adminstrator Bill collector Accountant put penality create account Fig 3.5.2. Deployment Diagram 3.8. Database design Database design is transforming an E-R model and their data specifications design into a normalized relation. A relation is a named, two dimensional tables of data, having set of named columns and an arbitrary number of unnamed rows, Each column in a relation corresponds to an attribute of that relation and each row of a relation corresponds to a records that contains data
  • 40. 35 values for an entity. Well-structured relation corresponds to records that contain a minimum amount of redundancy and allows users to insert, modify and delete the rows without errors or inconsistencies. It is the process of converting complex data structures into simple, stable data structures using a process called normalization. Table 8 Employee table
  • 41. 36 Table 9 customer table Table 10 User account table
  • 42. 37 Table 11 Bill collector table Table 12 Report table Table 13 Report type table 3.8.1 ER Diagram Entity-relationship diagrams were first proposed as a means of quickly obtaining, with minimum effort, a good sense of the structure of a database. They are used to plan and design a database and to model a system’s data. Due to lack of space it’s difficult to place all attributes to their corresponding entities so they are listed below and assumed to be drawn to their respective entities.
  • 43. 38 Figure 24 Entity relationship diagram EmployeeAccount Bill collector Customer Report generate Create Register Collect Lname Enamel Name ID TypeID ID Age ID Cstomer_ID Collect ID Fname Name emp_ID Lname Password Age Phone no Home no Keble Role Username Monthly Wea kly Annually
  • 44. 39 3.9. System Security Hossan water supply Management System needs authentication mechanism to control the data access by different users, as it is information has to be protected from using by unauthorized users. So that the software have a particular server, which manage the data access by users and gives permission to each users according to their priority given by system administrator, to modify (manipulate) the data. The other important thing in software development is security. The software system first asks every user to be login to the system, before performing certain operation. When the administrator creates account for the user, the user gets a username and Password. When the user used the system in first time it can be change the user name and it answer two questions in terms of used to reset the username and password when it forget the username or password. 3.10. Reference 1. Valacich /George/ Hoffer (2012), Essentials of System Analysis and Design, Fifth edition. 2. ScottW.Ambler, the Application Developer’s Guide to Object Orientation and UML, second edition. 3. System analysis and Design methods (in analysis and design phase).