Professional Documents
Culture Documents
COLLEGE OF TECHNOLOGY
DEPARTMENT OF IT
Title
Advisor: Ahimed G.
June 2004
DEBRE MARKOS UNIVERSTY
ACKNOWLEDGEMENT
First and for most I would to thanks my advisor Ahimed Ghe help me by giving his advice and
correction until I finish the project. I thanks to friends whose supports are always with me. I
thanks to our department, staff, and its environment where they fulfilled my thoughts.
DMU
Chapter 1 ....................................................................................................................................................... 5
Introduction ................................................................................................................................................... 5
1.1 Background the organization .............................................................................................................. 5
1.1.1 Establishment ............................................................................................................................... 5
1.1.2 Vision ........................................................................................................................................... 5
1.1.3 Mission......................................................................................................................................... 5
1.1.4 Objective of the organization ....................................................................................................... 5
1.1.5 General objective of the organization .......................................................................................... 5
1.1.5 Specific objective of the organization .......................................................................................... 5
1.1.6 Organizational structure ............................................................................................................... 6
1.1.7 Tasks under taken by the organization ......................................................................................... 7
1.2 Statement of the problem .................................................................................................................... 7
1.3. Objective of the project ...................................................................................................................... 8
1.3.1 General objective ......................................................................................................................... 8
1.3.2 Specific objective ......................................................................................................................... 8
1.4. Significance of the new system .......................................................................................................... 8
1. 5. Scope and limitation of the project ................................................................................................... 9
1.5.1 Scope ............................................................................................................................................ 9
1.5.2 Limitation ..................................................................................................................................... 9
1.6. Methodology ...................................................................................................................................... 9
1.6.1 System Development Methodology ............................................................................................. 9
1.6.2 Programming and Database Tools ............................................................................................. 10
1.6.3 Data collection methodology ..................................................................................................... 11
DMU
DMU
DMU
Chapter 1
Introduction
1.1 Background the organization
1.1.1 Establishment
The court was established In 1987 E.C by two judges and four supportive officers. At that time
they perform 1738 cases. Due to the government policies and proclamations, to attain the justice
easy and to improve the service, increased the trained employees. The employee become thirteen
judges and thirty eight supportive officers totally fourty six employees. In 2003 E.C the court
perform 3921 cases and also it tries to achieve its vision and mission.
1.1.2 Vision
To see the rule of law is assured and justice is override in this woreda.
1.1.3Mission
IS to rehabilitate those who have violated the law. However, anyone who has experienced it from
the punitive side can attest that rehabilitative services available to offenders are minimal or
cursory at best.
1.1.5 Specific objective of the organization
DMU
Leader of judges
DMU
Supporter manager
Main manager
Supporter
professionals
Case worker
Judges
HRM
Finance
Record office
Law officer
Civil case
writing team
Civil case
technique
supportive
team
Civil case
document
team
DMU
Information
Desk
The system works manually and the data handling and processing system creates problem
on summarization and integration of data for decision making.
The system couldnt generate needed report
It is difficult to give appointment timely it asks refer huge manual documents
It takes time to accomplish one task
Wastage of resource example paper:-since the files are maintained manually, it consume
more paper
The general objective of this project is to develop automated system that is applicable in
improving the manual legal system for Debre Markos city woreda legal system.
1.3.2 Specific objective
DMU
As the project title indicates the scope of the system to make computerized system for Debre
Markos City woreda legal system.
They are stated below
1.5.2 Limitation
There is shortage of time to accomplish the project. If I have more time then I can
analyze, design, and implement the system more effectively.
Inadequate reference books and internet
Lack material such as computer
Poor cooperation of users to provide enough information
Lack of experience in solving real life problems
Absence of sample project done before
1.6. Methodology
1.6.1 System Development Methodology
In my project I used object oriented development methodologies because it has the following
advantages:
Encourages re-use ,not only of modules but also of entire designs
o In particular it allows the recognition of a class hierarchy form which
classes required in a new application can either be re-used (inheritance).
o This greater amount of re-use should lead to reduced development
maintenance costs.
Object oriented system tend to be based upon stable forms which are easy to change
o This means that object oriented system are more likely to be allowed to evolve
time, rather than have to be abandoned or completely re-designed in response to
major changes in the customers/users requirements.
DMU
1. The graphical interface (front end) of the application is prepared by the usage of visual
basic.net.
Because visual basic.net has the following advantage:
VB.NET provides managed code execution that runs under the Common Language
Runtime (CLR), resulting in robust, stable and secure applications
The .NET framework comes with ADO.NET, which follows the disconnected paradigm,
i.e. once the required records are fetched the connection no longer exists.
It also retrieves the records that are expected to be accessed in the immediate future. This
enhances Scalability of the application to a great extent.
Another great feature added to VB.NET is free threading against the VB single-threaded
apartment feature. In many situations developers need spawning of a new thread to run as
a background process and increase the usability of the application. VB.NET allows
developers to spawn threads wherever they feel like, hence giving freedom and better
control on the application.
Security has become more robust in VB.NET. In addition to the role-based security in
VB6, VB.NET comes with a new security model, Code Access security.
The CLR takes care of garbage collection i.e. the CLR releases resources as soon as an
object is no more in use.
[http://dev.fyicenter.com/Interview-Questions/dotNet-1/Advantages_of_VB_NET.html]
2. The back end of the application is maintained in MySQL database.
o Ease of use and maintenance.
o Many SQL servers are intended for use with large data sets and to handle many
users. When you are dealing with multiple users and huge amounts of data, you
need a system that is reliable (meaning it doesn't crash much) and safe (meaning it
is difficult for unauthorized access). In the 2008 release of SQL, a new feature is
Performance Studio. This collection of tools, writes Schlichting, can be used
together to troubleshoot, monitor and tune your system to prevent problems that
lead to system crashes. Also, in SQL Server, you have tools such as Policy-Based
Management that allows database administrators to define policies for the data
and to receive alerts when the policies are violated. You can also encrypt the
entire database, including your data and log files, making your server safer from
attacks. There are External Key Management features that allow you to support
third-party certificates and encryption information in a separate section, so you
10
DMU
can handle credit-card processing and remain compliant with current laws for the
credit card industry.
o Support Amharic.
[httphttp://www.ehow.com/list_5993393_advantages-sql-server-2008.html]
3 Microsoft Office Visio
3. Power Geez
4. Microsoft word 2010 for documentation
1.6.3 Data collection methodology
Data sources: - To understand the internal working of the legal system I have used the
following sources:
Various users
Employees
Data Gathering tools:
Interview technique: During interview I got the necessary information from the
employees.
Document analysis: I tried to discover all the written documents about the
organization areas relevant to the system such as
Organizational structure
Different forms used on the current system
1.7 Feasibility Analyses
They are four key consideration involved in this feasibility analysis each consideration has
reviewed to depict how it relates to the system effort.
They are as follows:Economic feasibility
Technical feasibility
Operational feasibility
Schedule feasibility
1.7.1 Economic feasibility
Analysis in this procedure I determine the benefits that are expected from the proposed system
and compare the cost, I take a decision and implement the new proposed system.
11
DMU
1.7.1.1 Costs
1.7.1.1.1 Tangible cost
These costs are those that can be estimated in money terms. The table shows tangible costs.
No
Material name
Type
Quantity
Total
1
1
Price/birr
Each
12,000
100
1
2
Computer
Software
Toshiba
Vb.net
SQL server
100
100
Power Geez
50
50
Microsoft word
50
50
50
50
Microsoft Visio
3
4
5
6
7
8
9
Paper
Pen
Printer
Flash
CD
Transport
Bic
Cruzer blade 8GB
DVD
Taxi
1 packet
1 packet
1
1
7
6 round
90
36
400
1
12,000
100
90
36
2500
400
140
6
Total 15922
12
DMU
1.7.1.2 Benefits
1.7.1.2.1Tangible benefit
These benefits can be estimated in terms of money which means the benefit is real or actual
rather than imaginary or visionary .For instance improving response time ,producing error free
out put such as report are all tangible benefit.
These benefits can be:Cost reduction (less use of paper)
Increase the speed of activities
1.7.1.2.2 Intangible benefit
This is concerned with specifying equipment and software that will successfully satisfy the user
requirement. The technical needs of the system may vary considerably, but might include:
The facility to produce outputs in a given time
Response time under certain conditions.
Facility to generate report
The system will be compatible in all types of operating systems especially current version
operating systems i.e windows.
1.7.3Operational feasibility
The employees were happy and generous to give information about everything I
asked them about the organization I did not get any negative things while collecting
information in the organization. This indicates that the project is operationally
feasible.
1.7.4Schedule feasibility
Tasks may not be accomplished during the stated schedule dueto many obstacles. I
will try to resist problems as much as I can or amend the schedule if possible and
finish our project as scheduled. The scheduled as follows
Tasks
Month
Mar
13
Apr
May
Jun
DMU
Topic selection
20
23
Proposal writing
24
Analysis
8
24
Design
15
24
Implementation
1
Presentation
11
12
14
DMU
Chapter 2
2 Business Area Analysis and Requirement Definition
2.1 Business Area Analysis
Business area analysis evaluates how well business process, business rules, business data,
organizational structure, and people skills match the mission of the organization unit. It develops
recommended process improvement actions which can include quick fixes for serious problems,
modification of existing automated system or the initiation of a business process reengineering
project.
Citation:[http://www.requirementssolutions.com/BusinessAreaAnalysis_JAD.html]
2.1.1 Study of the activities
The system works manually and the data handling and processing system creates problem on
summarization, updating and integration of data for decision making. The problems of the
existing manual based system are described using the PIECES from work. Where
P is performance
I is information
E is economics
C is control,
E is efficiency and
S is service
Performance
Throughput
The current working system has a low level of throughput because it can only handle
limited number of customer at a time.
Response time
15
DMU
The response time to a given task in the current working system is significantly low due to
The time taken to get the accurate information of customers and prepare different
reports
Outputs
It is difficult to produce needed information form the manual documentation
Inputs
Data is not accurately captured, contain errors
Data is captured redundantly, example appointment date
Stored data
Since the file handling system is manual there is no any security
Data is not organized
Economics
Costs
The current system takes more costs to perform its tasks
Profit
The current system does not design at producing profit when it compares with the
cost it expense.
Control and security
Data is not adequately edited
Data privacy regulations or guidelines can be violated
Efficiency
Information is redundantly generated
o There is no way of knowing if customers repeatedly come for
insured purpose
Service
16
DMU
There are different forms and reports used by the court for various purposes. All the forms are
used Amharic form
Number
Forms
1
2
3
4
5
6
Manager
The Manager gets reports from the case workers manually. The reports help the manager to see
how services are given to the customer and manage the organization.
Criminal Case Judges
They interact with customers and record office. They judge the case concerned with criminal
cases and give decision.
Civil Case Judges
They interact with customers and record office. They judge the case concerned with civil cases
and give decision.
Record office
17
DMU
This record officer only interacts with some services at one computer. Particularly the file that
received from information desk the form manual document. They generate report to case
workers.
Information Desk
This record officer only interacts with customers by any types of case. Particularly new case
arrived from the customer. Here the record officer asks the customer every information needed,
gather the information and fill manually on a paper then finally send the file to record office.
Customer
The customer does not interact with the computerized system rather he/she requests a service
from the information desk. The customer then gives necessary information based the case. The
customer gets his/her requested service from the information desk.
2.1.5 Business Rule Identification
The claim person must have real evidence to loan money to him/her
The claim person must came the file that contains the agreement of between them about
the loan of money
Husband and wife came their profile that describes the marry of contract
Duration of time they live together
Amount of capital they have
18
DMU
They should come person that knows the child of the died person
Successor/s should signed
Husband and wife came their profile that describes the marry of contract
Duration of time they live together
Amount of capital they have
Attach their divorce by agreement document
Both of them should be signed
A use case diagram (B. Meyer 1997) illustrates a set of use cases for a system, the actors of these
use cases, the relations between the actors and these use cases, and the relations among the use
cases. The UML notation for a use case diagram is shown on figure 2.1, in which
An oval represents a use case,
A stick figure represents an actor,
19
DMU
A line between an actor and a use case represents that the actor initiates and/or
participates in the process.
Use cases
Informally speaking, a use case is a story or a case of using a system by some users to carry out a
process. A bit more precisely speaking, a use case describes the sequence of events of some
types of users, called Actors, using some part of the system functionality to complete a process.
Actors
An actor represents a coherent set of roles that are entities external to the system can play in
using the system, rather than representing a particular individual. An actor represents a type of
users of the system or external systems that the system interacts with.
2.1.7 Essential use case diagrams
An essential use case (Constantine and Lockwood 1999), sometimes called a business use case,
is a simplified, abstract, generalized use case that captures the intentions of a user in a
technology and implementation independent manner. A fully documented essential use case is a
structured narrative, expressed in the language of the application domain and of users,
comprising a simplified, abstract, technology-free and implementation-independent description
of one task or interaction.
20
DMU
Customer
Civil Judge
Generate Report
Manager
21
DMU
Name:
ID
UC1
Actors
Description
Precondition
Post
condition
Basic Course
of Action
22
The customer who have case can register into the file
The customer provide the necessary data to information desk
The customer is registered
1.
2.
3.
4.
DMU
Alternate
Course of
Action
The Information desk asks the customer to fill the appropriate information.
The Resident fills the appropriate information on the form.
The use case continues from step 4
Name:
ID
UC2
Actors
Description
Precondition
The customer who have case can register into the file
The customer provide the necessary data to information desk
Post
condition
Basic Course
of Action
Alternate
23
1.
2.
3.
4.
5.
DMU
The Information desk asks the customer to fill the appropriate information.
The Resident fills the appropriate information on the form.
Course of
Action
Name:
Generate Report
ID
Actors
UC3
Record officer
Description
The Record Officer generates different types of reports for the top manager.
Pre condition
Post
condition
Basic Course
of Action
Generated report
24
1.the record office collects information about the services given within some
period of time(daily, monthly, yearly)
DMU
It provides feedback to the customer. An SRS is the customer's assurance that we have
understood the issues or problems to be solved and the software behavior necessary to
address those problems.
It decomposes the problem into component parts. The simple act of writing down
software requirements in a well-designed format organizes information, places borders
around the problem, solidifies ideas, and helps break down the problem into its
component parts in an orderly fashion.
It serves as an input to the design specification. The SRS serves as the parent document
to subsequent documents, such as the software design specification and statement of
work. Therefore, the SRS must contain sufficient detail in the functional system
requirements so that a design solution can be devised.
It serves as a product validation check. The SRS also serves as the parent document for
testing and validation strategies that will be applied to the requirements for verification.
Citation:
[http://www.techwr-l.com/techwhirl/magazine/writing/softwarerequirementspecs.html]
2.2.1 Functional Requirements
Functional requirements are capture intended behavior of the system. This behavior may be
expressed as services, tasks or functions the system is required to perform.
25
DMU
Citation: [http://www.bredemeyer.com/pdf_files/functreq.pdf]
Since I am going to develop an automating services that are given to the users , the system will
be used to manage and process data according to the rule & regulations of the organization. It
will also provide report generation facilities. The database of the system provides the following
functionality.
Data entry:
This is the functionality that data is entered to the systems. The system serves
different interface that can manage data entry mechanisms in the Debre markos city
woreda legal system.
The main data entries are the following:
Civil Case Registration
Criminal Case Registration
Data update
Login
Search information
Data processing
The system on input data will provide the following data processing:
Report generation
Validate user
Search user request
Report generation
Generate report
Total number of cases in each bench i.e Civil case and Criminal
case
2.2.2 Non-Functional Requirements
Non-functional requirement is a requirement that specifies criteria that can be used to judge the
operation of a system, rather than specific behaviors. This should be contrasted with functional
requirements that define specific behavior or functions.
In general, functional requirements define what a system is supposed to do whereas nonfunctional requirements define how a system is supposed to be. Non-functional requirements are
often called qualities of a system. Other terms for non-functional requirements are "constraints",
26
DMU
"quality attributes", "quality goals" and "quality of service requirements". Qualities, that is, nonfunctional requirements, can be divided into two main categories:
1. Execution qualities, such as security and usability, which are observable at run time.
2. Evolution qualities, such as testability, maintainability, extensibility and scalability, which are
embodied in the static structure of the software system.
Security
In order to make the system safe from an authorized access and modification, the system uses a
log in account to differentiate among the different users of the system on the organization side.
This enables the system to verify who has logged in using the correct logging account provided
and display the right form associated with that user.
Access is controlled through proper password and username verification facilities which the
database and the server require. The security service provided by the system will maintain the
security, confidentiality and integrity of the system. Users will have their own password and
username through which they could gain access to. The password with which user are provide
will protect them from potential threats, who could jeopardizing their responsibility in an
organization. Generally this system is confidentially secured.
Citation: [www.duke.edu/../authvauth.html]
The proposed system provides authorization facilities by determining whether a user is
authorized to access a resource, a user is authorized to perform an operation and a user is
authorized to perform operation on a resource.
Usability
Usability is a term used to denote the ease with which people can employ a particular tool or
other human-made object in order to achieve a particular goal. Usability can also refer to the
methods of measuring usability and the study of the principles behind an object's perceived
efficiency or elegance.
In human-computer interaction and computer science, usability often refers to the elegance and
clarity with which the interaction with a computer program or a web site is designed. The term is
also used often in the context of products like consumer electronics, or in the areas of
communication, and knowledge transfer objects (such as a cookbook, a document or online
help). It can also refer to the efficient design of mechanical objects such as a door handle or a
hammer. Usability differs from user satisfaction insofar as the former also embraces usefulness
27
DMU
The primary notion of usability is that an object designed with a generalized users' psychology
and physiology in mind is, for example:
Backup
A backup or the process of backing up refer to making copies of data so that these additional
copies may be used to restore the original after a data loss event. These additional copies are
typically called "backups."
Backups are useful primarily for two purposes. The first is to restore a state following a disaster
(called disaster recovery). The second is to restore small numbers of files after they have been
accidentally deleted or corrupted. Data loss is also very common. 66% of internet users have
suffered from serious data loss.
2.2.3 Essential user interface prototyping
The user interface (UI) is the portion of software with which a user directly interacts. An
essential user interface prototype (Constantine and Lockwood 1999), also known as an abstract
prototype or paper prototype, is a low-fidelity model, or prototype, of the UI for your system. It
represents the general ideas behind the UI, but not the exact details. Essential UI prototypes
represent user interface requirements in a technology independent manner, just as essential use
case models do for behavioral requirements. An essential user interface prototype is effectively
the initial state the beginning point of the user interface prototype for your system. It models user
interface requirements, requirements that are evolved through analysis and design to result in the
final user interface for your system, enabling you to explore usability aspects of your system.
Citation:[http://www.agilemodeling.com/artifacts/essentialUI.htm]
Defendant_full_Name
Date
date
File_number:
28
DMU
Input field
Plaintiff_full_name
Defendant_address
Input field
Defendant_sex
Date
Defendant_address
date
File_number:
Input
Prepared by Abatneh Shiferaw
29field
Input field
Defendant_sex
Input field
Defendant_age
Plaintiff_full_name
Input field
DMU
File_number
Input field
Eid
Input field
30 Prepared by Abatneh Shiferaw
Appointment_date
Input field
Input field
DMU
Fig.2.4Appointment registration
Password
Input field
User name
Input field
Eid
Input field
Fig.2.5Account registration
Chapter 3
3 OBJECT ORIENTED DESIGN
31
DMU
User Interface
Used by
UI1
UI2
UI3
UI4
UI5
UI6
UI7
Information desk
Information desk
Record officer
Judges
Record officer
Record officer
Record officer
32
DMU
Id: - BR1
Description:
The claim person must have real evidence to loan money to him/her
The claim person must came the file that contains the agreement of between them about
the loan of money
Husband and wife came their profile that describes the marry of contract
Duration of time they live together
Amount of capital they have
33
DMU
Description:
Husband and wife came their profile that describes the marry of contract
Duration of time they live together
Amount of capital they have
Attach their divorce by agreement document
Both of them should be signed
34
Include/use
UC1
DMU
UC2
UC3
UC1
UC3
UC4
UC4
UC5
Generate report
UC5
Customer
Civil Judge
Generate Report
Manager
Login
35
DMU
36
DMU
Name:
Login
ID
UC4
Basic Course
of Action
Alternate
Course of
Action
37
DMU
Name:
ID
Actors
UC1
Information desk, Customer
Description
The customer who have case can register into the file
Precondition
Post
condition
Basic Course
of Action
Alternate
Course of
Action
Table 3.4 Register criminal and civil case use case description
38
DMU
Name:
Generate Report
ID
Actors
UC3
Record officer
Description
The Record Officer generates different types of reports for the top manager.
Pre condition
Post
condition
Generated report
Basic Course
of Action
1.the record office collects information about the services given within some
period of time(daily, monthly, yearly)
2. the record officer generates the report
Citation:[http://www.sequencediagrameditor.com/uml/sequence-diagram.htm]
39
DMU
Validator
Fill_infprmation
Open
validator
Submit
Criminal case details
OpenAdminpage
Alternative action:
Informatin desk,customer
<Actor>
Validator
Fiil_information
validator
submit
Open
Error
ErrorMessage
40
DMU
Validator
Fill_infprmation
validator
Open
Submit
displaysuccessMessage
Alternative action:
Validator
Fiil_information
validator
Submit
Open
Error
ErrorMessage
41
DMU
Store man
<Actor>
Login Page
<UI>
Admin_Page
<UI>
Validator
validator
Open
Login
Admin_Page
OpenAdminpage
Alternative action:
Store man
<Actor>
Login Page
<UI>
Admin_Page
<UI>
Validator
validator
Open
Login
Error
ErrorMessage
42
DMU
Invalid
Valid
System display
main page
Valid
43
DMU
Invalid
Valid
Valid
44
DMU
Criminal_case
-+date
-+file_number
-+Plentiff_full_name
-+plentiff_address
-+pelntiff_sex
-+plentiff_age
-+Defendant_full_name
-+Defendant_addres
-+Defendant_sex
-+Defendant_age
-+Fact_of_cliam
-+Relief_sout
+Add()
+Update()
+Search()
+Delete()
m:m
m:m
1:1
Appointment
m:m
-+File_number
-+Employee_id
-+Appoinment_date
-+Summery_of_the_decision
-+New_id
+Add()
+Search()
+Delete()
+Update()
1:1
m:m
-+FIle_number
-+Plentiff_full_name
-+Plentiff_address
-+Plentiff_sex
-+plentiff_age
-+defendant_full_name
-+defendant_address
-+defendent_age
-+fact_of_cliam
-+Relief_sout
-+date
-+defendant_sex
+Add()
+Search()
+Delete()
+Upate()
1:m
1:1
Judge
-+Employee_id
-+Full_name
-+Age
-+Sex
+Add()
+Search()
+update()
+Delete()
Account
-+User_name
-+Passord
-Employee_id
+Add()
+Search()
+Delete()
+Update()
45
DMU
User-name
- It uniquely identifies the user name of users.
- It has string data type.
- Max-size 20.
Password
-
Method:
Create ()
- It is used to create password and user name of user.
- Parameter: username and password.
Delete ()
Update()
46
DMU
case
Attributes:
Date
-
47
DMU
File_No
- Unique identification of case.
- It has character data type.
- Max-size 8.
Plaintiff_Full_Name
- It identify first, middle and last name of plaintiff.
- It has string data type.
- Max-size 30.
Plaintiff_Address
- It identifies the address of the plaintiff
- It has character data type
- Max-size 20.
Plaintiff-Sex:
- It identifies the sex of judge.
- It has character data type.
- Max-size 6.
Plaintiff-age:
- It tells us the age of plaintiff.
- It has integer data type.
Defendant_Full_Name
- It identify first, middle and last name of defendant.
- It has string data type.
- Max-size 30.
defendant_Address
- It identifies the address of the defendant
- It has character data type
- Max-size 20.
defendant-Sex:
- It identifies the sex of defendant.
- It has character data type.
- Max-size 6.
defendant-age:
-
48
DMU
case
Attributes:
Date
File_No
49
DMU
Plaintiff-Sex:
- It identifies the sex of judge.
- It has character data type.
- Max-size 6.
Plaintiff-age:
- It tells us the age of plaintiff.
- It has integer data type.
Defendant_Full_Name
- It identify first, middle and last name of defendant.
- It has string data type.
- Max-size 25.
defendant_Address
- It identifies the address of the defendant
- It has character data type
- Max-size 20.
defendant-Sex:
- It identifies the sex of defendant.
- It has character data type.
- Max-size 6.
defendant-age:
- It tells us the age of defendant.
- It has integer data type.
Fact_of_the_claim
- It identifies clearly about the main point of the claim
- It is text-area
Relief_sout
- It identifies clearly about the main point of the claim
- It is text-area
Methods:
Add()
- Used to register the case
Delete()
- Used to delete the case
50
DMU
Update()
- Used to update the case
Search()
- Use to search cases
Class name: Appointment
Attributes:
File_No
- Unique identification of case.
- It has character data type.
- Max-size 8.
Employee-id
- Unique identification of judge.
- It has character data type.
- Max-size 8
Appointment Date
- Used to specify the appointment of the case
- Date/time
Summery_of_the_decision
- It describes the decision of the case
- It has string data type
- Max-size var(max)
51
DMU
D
A
C
Figure3.8 Login screen
Letter AIndicates selection of user type (record officer, manager, customer, Judge)
52
DMU
53
DMU
54
DMU
55
DMU
Chapter 4
4.1. Conclusion
In this project is aimed at developing automated system for Debre markos city woreda legal system where
ICTs intervention is required.
In chapter 1 I determined the title of the project to be Debre markos city woreda legal system. I described
the background of the organization, the problems of the existing system, the scope and limitation of the
project, feasibility and schedule of the project have been discussed including the methodology of the
project.
In Chapter 2 In business area analysis I identified the problems of the current system, the forms and
reports of the existing system. Then I used an essential use case to model the features of the existing
system by identifying actors and use cases. After business area analysis I determined the requirements of
the proposed system in terms of functional and non-functional requirements. Finally, I did a user interface
prototyping that describes the user interface requirements in a technology independent manner.
The third chapter of the project discussed about the object oriented analysis which tries to produce the
conceptual model of information for the problem domain that raised on the chapter one of the existing
system and solve that problem. To accomplished this, I used different types of object oriented analysis
tools like system use case, different diagram such as sequence diagram , class diagram and activity
diagram.
References
1.
2.
3.
4.
5.
6.
http://www.techwr-l.com/techwhirl/magazine/writing/softwarerequirementspecs.html
http://www.bredemeyer.com/pdf_files/functreq.pdf
www.duke.edu/../authvauth.html
http://www.agilemodeling.com/artifacts/essentialUI.htm
56
DMU
7. http://pjhobday.wordpress.com/2010/05/08/business-and-system-use-cases
8. http://www.sequencediagrameditor.com/uml/sequence-diagram.htm
9. http://www.sparxsystems.com.au/resources/uml2_tutorial/uml2_activitydiagram.html
57
DMU