0% found this document useful (1 vote)
1K views124 pages

Final Project Online Broker Management Systemfull Documentation

This document is the project proposal for a "Web Based Application for Tarekegn Guadie and Their Friends Broker Service Management System" submitted by four students. It includes an introduction describing the background, objectives, scope and methodology of the project. It also covers requirements analysis, system design considerations, implementation details, and plans for testing. The application aims to help manage broker services and properties online.

Uploaded by

Amanuel Nigussu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
1K views124 pages

Final Project Online Broker Management Systemfull Documentation

This document is the project proposal for a "Web Based Application for Tarekegn Guadie and Their Friends Broker Service Management System" submitted by four students. It includes an introduction describing the background, objectives, scope and methodology of the project. It also covers requirements analysis, system design considerations, implementation details, and plans for testing. The application aims to help manage broker services and properties online.

Uploaded by

Amanuel Nigussu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Wollo University

Kombolcha Institute of Technology


College of Informatics
Department of Computer Science

Project Title: - Web Based Application for Tarekegn Guadie


and Their Friends Broker Service Management System:-
Submitted by:-
1. Hailemariam Moges…………………1564/04
2. Hiwot Hailay…………………………1566/04
3. Tsega Teferi…………………………1587/04
4. Yedamu Yohannes…………………1589/04

Advisor:[Link] Shumye.([Link])

Submitted Date:15/10/2007 E.C


Table of Contents
1. Introduction............................................................................................................2
1.1 Background .......................................................................................................2
1.2. Problem Statement...........................................................................................3
1.3. Objective ..........................................................................................................4
1.3.1 General Objective .......................................................................................4
1.3.2 Specific Objective.......................................................................................4
1.4. Scope of the project .........................................................................................4
1.5 Limitation of the project ...................................................................................6
1.6 Methodology of the project ..............................................................................6
1.6.1 Data Gathering Methodology .....................................................................6
1.6.2 System Analysis and Design Methodology................................................7
1.7 Implementation Development Environment Tools ..........................................8
1.8 Feasibility of the Project .................................................................................12
1.8.1 Economic feasibility .................................................................................12
1.8.2 Technical feasibility: ................................................................................14
1.8.3 Operational feasibility ..............................................................................14
1.8.4 Schedule feasibility...................................................................................15
1.8.5 Political feasibility....................................................................................15
1.9 Significance of the project ............................................................................15
1.10 Team Structure..............................................................................................16
1.11. Work Break down Structure ........................................................................16
Chapter Two.............................................................................................................18
2. Requirement Analysis ..........................................................................................18
2.1. Introduction....................................................................................................18
2.2 Existing System ..............................................................................................18
2.2.1 Existing System Description ....................................................................18

i
2.3 Supplementary Requirements.........................................................................23
2.3.1Business Rules ...........................................................................................23
2.3.2Constraints .................................................................................................25
2.3.3 Alternative Course of Action to constrains ..............................................25
2.4 New System ....................................................................................................25
2.4.2Functional Requirements...........................................................................25
2.4.3 Non-functional Requirement ....................................................................26
2.4.4 Scope/boundary of the System .................................................................26
2.4.6 Interactions of the system with external users..........................................28
2.4.7common language......................................................................................28
2.4.8 Essential Use Case Diagram.....................................................................28
2.5. System Use case.............................................................................................30
2.6 Use case Documentation.................................................................................30
2.7 Key abstraction with Class responsibility collaboration (CRC) analysis.......38
2.8 Sequence Diagram ..........................................................................................40
2.9 Activity Diagram ...........................................................................................43
2.10 Conceptual Modeling Class Diagram...........................................................51
Chapter Three...........................................................................................................53
3. System Design......................................................................................................54
3.1 Introduction.....................................................................................................54
3.1.1 Purpose and Goals of Design....................................................................54
3.2 Class Modeling Diagram ................................................................................55
3.3 Current Software Architecture........................................................................56
3.4.1 Sub System Decomposition......................................................................56
3.4.2 Component Diagram.................................................................................57
3.4.3 Deployment Diagram ...............................................................................58
3.4.4 MODULE HIERARCHY DIAGRAM.....................................................60

ii
3.4.5 Persistence Modeling for Object Oriented Data Base ..........................62
3.4.6 Access control and security...................................................................62
3.4.7 Boundary conditions and Exception Handling .....................................63
3.5 User Interface Design..................................................................................65
Chapter Four ............................................................................................................71
[Link] and Testing .................................................................................71
4.1 Implementation ..................................................................................................71
4.1.1Sample codes ................................................................................................71
4.2Functional Test Specifications.......................................................................101
Chapter Five: Conclusion and Recommendation ..................................................104
5.1 Conclusion .......................................................................................................104
5.2 Recommendation .............................................................................................104
1.12 References......................................................................................................105
Annex 1 ..................................................................................................................105

PROJECT SCHEDULE ...................................................................................................17

FIGURE 2. 1. 2ESSENTIAL USE CASE FOR BROKER MANAGEMENT SYSTEM..................29


FIGURE 2. 3 SYSTEM USE CASE FOR BROKER MANAGEMENT SYSTEM .........................30
FIGURE 2. 5 SEQUENCE DIAGRAM FOR LOGIN..........................................................40
FIGURE 2. 6 SEQUENCE DIAGRAM FOR VIEW PROPERTIES ..........................................41
FIGURE 2. 7 SEQUENCE DIAGRAM FOR REGISTER USERSERROR! BOOKMARK NOT
DEFINED.
FIGURE 2. 8SEQUENCE DIAGRAM FOR REMOVE PROPERTYERROR! BOOKMARK
NOT DEFINED.
FIGURE 2. 9 SEQUENCE DIAGRAM FOR GENERATE NEWSLETTER ...............................42
FIGURE 2. 11 SEQUENCE DIAGRAMS FOR SEND FEEDBACK ..................................43

iii
FIGURE 2. 12ACTIVITY DIAGRAM FOR LOGIN..........................................................44
FIGURE 2. 13 ACTIVITY DIAGRAM FOR SEND REQUIREMENTS ...................................45
FIGURE 2. 14 ACTIVITY DIAGRAM FOR PROPERTY REGISTRATION ..............................46
FIGURE 2. 15 ACTIVITY DIAGRAM FOR USER REGISTRATION .............................47
FIGURE 2. 16 ACTIVITY DIAGRAM FOR SEND FEEDBACK.....................................48
FIGURE 2. 17 ACTIVITY DIAGRAM FOR SEND REQUIREMENT ............................49
FIGURE 2. 18 ACTIVITY DIAGRAM FOR PROPERTY REGISTRATION .............................50
FIGURE 2. 19 CONCEPTUAL CLASS DIAGRAM ..............................................................52
FIGURE 2. 20 CONCEPTUAL CLASS MODEL.....................................................53
FIGURE 2. 21 MODULE HIERARCHY DIAGRAM ..............................................62

TABLE 1. 1 SPECIFICATIONS AND PURPOSE OF HARDWARE TOOLS ...............................8


TABLE 1. 2 RECURRING COST ...................................................................................13
TABLE 1. 3 TEAM STRUCTURE....................................................................................16

TABLE 2. 1 USE CASE DESCRIPTION FOR LOGIN ..........................................................30


TABLE 2. 2 USE CASE DESCRIPTION FOR USER REGISTRATION ....................................31
TABLE 2. 3 USE CASE DESCRIPTION FOR PROPERTY REGISTRATION ............................32
TABLE 2. 4 USE CASE DESCRIPTION FOR MANAGE PROPERTY .....................................33
TABLE 2. 5 USE CASE DESCRIPTION FOR VIEW PROPERTY...........................................33
TABLE 2. 6 USE CASE DESCRIPTION FOR VIEW PROPERTY INFORMATION ....................34
TABLE 2. 7 USE CASE DESCRIPTION FOR VIEW REQUIREMENT ....................................35
TABLE 2. 8 USE CASE DESCRIPTION FOR NEWSLETTER GENERATION ..........................35
TABLE 2. 9 USE CASE DESCRIPTION FOR CREATE ACCOUNT .......................................36
TABLE 2. 10 USE CASE DESCRIPTION FOR SEND FEEDBACK ........................................37
TABLE 2. 11 USE CASE DESCRIPTION FOR GENERATE REPORT ....................................37
TABLE 2. 12 USE CASE DESCRIPTION FOR LOGOUT .....................................................38

TABLE 4. 2 TEST FOR PROPERTY REGISTRATION .....................................................103

TABLE 3. 1ACCESS CONTROL AND SECURITY ............................................................63

iv
TABLE 4. 1 TEST FOR LOGIN CUSTOMER....................................................................102

v
Acknowledgment
First of all I would like to thanks my God he helps us in different ways either I Know or I did not
know to complete my task. Secondly all I wish to express my deep sense of gratitude and honor
toward my advisor Instructor Demeke Shumye (Msc); he plays a great role by giving a powerful
comments and different advices that helps for my project and I appreciate his inspiring guidance
and constant encouragement help me for completion of my project. Thirdly, I would like to thank
my father having a great role in all aspect of needs. Lastly I also would like thank peoples in the
broker service organization who project development time to time.

Department Of Computer Science Page 1


1. Introduction

1.1 Background
Now a days in Ethiopia there are different market exchanges. Those markets may be
difficult and complicated to get the service on the required time, so the selling and buying of
materials, properties and products may require an agent that makes the market easy and timely
available [1]. Those agents or groups that make the market easy and available are “Brokers”. In
Ethiopia specially, in cities and towns all the selling and buying as well as rental activities of
materials and properties are done by brokers. Activities like vehicles (for example car for sale,
motor cycle for sale), property (property for sale, property for rent, rental plots-land), jobs
(vacancies, job seekers) and market (for sale, want to buy) are accomplished by the brokers. In
order to give fast and accurate broker service the brokers make an organization and get a license
from the government. They have their own rights and responsibilities that they should do. But all
the brokers in Ethiopia give services in a traditional way.

Kombolcha is one of the cities found in Ethiopia under the Amharic region. It is
located in the north western parts of Addis Ababa distance from 375 kilometer. And it has
markets done by brokers and the broker gives service for the society individually i.e. they are not
organized. But the individual broker service raises a number of problems for the societies as well
as for the government. It leads untrustabililty between brokers and sellers/buyers or
tenants/renters, and the government will lose the income or tax from the broker because the
service is given by individually and is difficult to manage and control.

But in Kombolcha there are broker service groups that have a legal recognition
and objectively organized to give broker services for the society. For example “Kombolcha
Broker service organization” and “Tarekegn Gaudie and their friends broker service
organization”. This organization provides a service for the society. For our project we choose
Tarekegn Gaudie and their friends broker service organization but finally the developed system
will use for the two organizations. “Tarekegn Gaudie and their friend’s broker service
organization were established in 2006E.C. it is located at the back of Amharic Regional Saving
Organization at the place of Beriberi river distance from 50m.” They give a service to the society
manually and traditionally so this type of service will have drawbacks since it takes long time to
process, information for the availability of market is difficult because it is not online which
means the buyers, renters should ask the brokers physically or through phones it also results in
loss of time, money and others. And the brokers also should search the town where the vehicles,
materials, properties or jobs are found and open for marketing.

The other difficulties is that the sellers/buyers or tenants/renters are not willing to
pay the exact commissioning for the brokers. The brokers also does not pay the exact tax value

Department Of Computer Science Page 2


for the government .The broker may also ask the sellers/buyers or tenants/renters very huge
amount of money out of their value. All the information of property or client/customers proceeds
manually. Property registration process involves a lot of paper work, since every property details
are registered/ stored in a separate file. Searching the available property on the city was done by
the person own self and also the broker. Even if after searching there is a limitation of matching
choice of their property need. If any person wants to buy /sell /rent /tenant then he has to come to
the office for registration of his property.

In fact the broker organization is very necessary for countries .Our concern will be on
automating and a web based application of the system to be functional. So, the team is motivated
to develop an automated broker service for the organizations in order avoid the above mentioned
problems.

1.2. Problem Statement


There are different problems in property buying/renting and selling/renting process that we
have observed so far. So the problems are stated below.

 Lack of communication between customers and agents:-


 Expensive cost for agencies
 Lack of Reliance
 Lack of Description
 Lack of accessibility
 Loss of Organized information
 Lack of multiple choices:-it is difficult to make a choice from a number of properties
because to get more information’s and details about properties there is no more supply.
 Wastage of time:-it requires a lot of times to perform individual activities. It is very
tedious job to find a proper property as per your choice and for the other. It very slow and
needs more time to search and maintain each and every detail.
 It is very costly:-There are a large number of employees that are involved to maintain the
system, so it is very expensive.
 Low customer satisfaction: it is difficult to serve customers within a short period of time,
so customer becomes tired, boride.
 It is not user friendly.
 There is redundancy of data storage.

Department Of Computer Science Page 3


 The office is situated at the particular location; the number of client cannot able to come
from other side. Only the people which near to the office can register for sell, rent or buy

1.3. Objective
1.3.1 General Objective
The general objective of the project is automating of Tarekegn Gaudie and their friends’
broker service and commissioning management system.

1.3.2 Specific Objective


There are specific goals that we have to achieve in order to meet the general objective. Those
are:-

 We briefly described the organization to which the system is gone to be developed.


 We gathered information of the existing system and major functionalities of the new
system in more detail, the business rule and modeling the essential use case, the
domain and the user interface diagram using UML as a modeling tool and unified
process as a processing tool.
 We also analyzed all issues on the analysis phase of modeling the system use case,
sequence diagram, conceptual model, activity diagram and the user interface
prototype with all the necessary details for each.
 We used functions of all issues on the object design document of object design trade-
offs, interface documentation guidelines, packages, class attributes and functions.

 We implemented the implementation phase of the system introduction, algorithms


for basic functionalities, sample codes, Creating a data base to store items of
properties and service, information’s testing specification and report, test cases, test
result and user manuals.

 We set all the necessary recommendations and conclusions that will support the
developed project (system) are more powerful.

1.4. Scope of the project


The scope of the project is about tasks that will be performed throughout the
system. Our main goal in doing this system is making the existing manual based
broker service management system into an automated, more efficient, less time

Department Of Computer Science Page 4


consuming and overall a better working system and users can access the information
online. The proposed system maintains all the property information online. The
system identifies various sources of properties and accordingly provides information.
The various sources are land, apartments, row-house, etc. It provide information to
one and all who visit the site but to upload a property for sale and rent and to send a
request to buy a desire property only can be made who register with the side . The
system will perform the following activities:-

 Selling and buying homes


 Selling and buying cars
 Selling and buying electronic devices
 Renting houses, properties
 Through this project we have tried to automate the task of:
 Category of Property
 Details of Property
 Available property information
 Entering the detail contact information, and other information.
 Checking password and confirm password.
 Checking username available or not during the registration process.
 Add property images.
 Give a modification power to the broker. So, the broker can make any changes
such like can add a new property category and property type details on the
working windows.

Our system just only focuses on connecting the buyers/tenants and sellers/renters of the system it
doesn’t deal them but make a communication between users of the system. The system is not
responsible for any problems that will happen outside of the system. The system doesn’t perform
car rental because in order to rent a car it is one single project and also there shouldn’t need third
person since there is a car rental organization, so car renters can interact directly to the
organization. But to sell a car individuals can registered and participate on selling. Our system
also cannot perform renting and selling of plot-lands and other properties that require broker
service since there is lack of time.

Department Of Computer Science Page 5


1.5 Limitation of the project
 Limitation the system means the weakness or the inability of performing tasks
compared to other similar systems. Our system has limitations compared to others in
terms of online transactions since there is money transaction but it is difficult to
exchange online.
 Our system has also limitations on a place that has not internet accessibility because it
is depend on connection since it is online.
 The limitation of our system is that all users may not be participating directly to the
system since it is not done by a local language.
 Power availability is also scarce, with vast rural areas that are not connected to power
grids as well as frequent blackout in major urban areas such Kombolcha.

1.6 Methodology of the project


The methods that facilitate us to capture information about requested system is called
Methodology Starting from proposed system we gathered information and data through different
mechanisms.

1.6.1 Data Gathering Methodology


The major requirement gathering method we use is unstructured interviewing. We interview
the manger and the personnel organization head. And we observe all the broker working
procedures and worker.

[Link] Document analysis: -


This helps us to satisfy our data requirement. We refer to the policies and procedures for broker
services. Collecting information from different references, projects and web sites.

[Link] Observation: -
It is fact finding technique where the system analyst either participates in or watches a person
performs activities to learn about the system.
It gives us better measurement than the authorized personnel and we will be able to
see exactly what is being done, it is expensive and highly reliable. By Observing the
existing problem we are gathering the data. Also we have referred other senior
projects

[Link] Interview: -
It is fact finding technique where by the system analyst collects information from individual
face to face interaction.

Department Of Computer Science Page 6


It gives as an opportunity to motivate the interviewee to respond freely and openly and it allows
us to prove for more feedback from the interviewee. In addition we believe that we adapt reward
questions for each individual. Having an interview making questionnaires and observing in the
around problems. Also we will collect raw data or documents which are useful for the project
should be implemented.

1.6.2 System Analysis and Design Methodology


System analysis and design

The team plan to use the Object Oriented Software Development Methodology (OOSD) for the
development of the system among the different methodologies. Because it is better way to
construct, manage and assemble objects that are implemented in our system. We used OOSD
because of the following important features:.

 Increased extensibility: - when you need to add new feature to the system you only need to
make changes in one part of the applicable class.
 Financial benefits: - reusability, extensibility and improved quality are all the financial
benefits, because they led to the business benefits of the object- oriented from the point of
view of the users, the real benefits are we can built, system faster and cheaper. reduced
maintenance cost of Software organizations currently spend significant resources maintain
operating system so the object oriented development methods helps us to overcome this
problem
 Improved quality: - quality of our system is on time, on budget and meets our exceeded the
expectation of the users of our system, improved quality comes from increased participation
of users in the system development. So our system has improved quality since we are using
Object Oriented methodology. We, the project team selects Object oriented design
methodology to use Unified modeling language for analysis and design method.
 Object oriented design methodology has two phases:-
 Object Oriented Analysis (OOA): During this phase the team used to model the
function of the system (use case modeling), find and identify the business objects,
organize the objects and identify the relationship between them and finally model
the behavior of the objects.
 Object Oriented Design (OOD): During this phase the model interactions and
behaviors that support the use case scenario, and finally update object model to

Department Of Computer Science Page 7


reflect the implementation environment. And also transforms the conceptual
model produced in object-oriented analysis to take account of the constraints
imposed to our system format, so that we will use this phase to refine the use case
model to reflect the implementation environment.
 An object oriented system analysis and design methodology suitable for this
particular project because:-

 It reflects the reality more accurately.


 It highly reduces the semantic gap between the reality and models
 Object oriented system analysis and design methodology is more user friendly
 Supports reusability and encapsulation:-
 Increase reusability: - the object oriented provides opportunities for reuse through the
concepts of inheritance, polymorphism, encapsulation and modularity
 Users usually understand the objects easily.
 Reduce complexity[2]

1.7 Implementation Development Environment Tools


The following are the tools we used to develop the system:-.

Hardware tools

For successful completion of our system we use the following hardware tools. These are:-

Table 1. 1 Specifications and purpose of hardware tools


Resource name Quantity Specification Purpose
Computers 1 Dell, desk top Used for Designing the website, data
computer entering, manipulating data.
Printers 1 - For printing purpose
Scanners 1 Scanner Scanning images and some documents
External Hard disk 2 Above 500GB For document transferring

Software tools

Department Of Computer Science Page 8


The different kind of software we used for developing the project is:-

 Microsoft office word 2007 for documentation.

 Microsoft Visio 2010 – to design Gantt chart or planning and for scheduling
phase

 Draw Max-– to design Sequence Diagram, Class Diagram, Activity diagram and
Use case Diagram.

 Wamp server - for web server software

 Programming language- PHP

 Computer platform-Windows 7.

 Microsoft power point for presentation

 Adobe Photoshop CS4 – to read and write video and photo file

 U Lead - to edit photo and video

 MYSQL database server – for database application. The reason that we choose this
MYSQL server is:-
1. Scalability and Flexibility

The MySQL database server provides the ultimate in scalability, sporting the capacity to handle
deeply embedded applications with a footprint of only 1MB to running massive data warehouses
holding terabytes of information. Platform flexibility is a stalwart feature of MySQL with all
flavors of Linux, UNIX, and Windows being supported. And, of course, the open source nature
of MySQL allows complete customization for those wanting to add unique requirements to the
database server.

2. High Performance

A unique storage-engine architecture allows database professionals to configure the MySQL


database server specifically for particular applications, with the end result being amazing
performance results. Whether the intended application is a high-speed transactional processing
system or a high-volume web site that services a billion queries a day, MySQL can meet the
most demanding performance expectations of any system. With high-speed load utilities,
distinctive memory caches, full text indexes, and other performance-enhancing mechanisms,
MySQL offers all the right ammunition for today's critical business systems.
Department Of Computer Science Page 9
3. High Availability

Rock-solid reliability and constant availability are hallmarks of MySQL, with customers relying
on MySQL to guarantee around-the-clock uptime. MySQL offers a variety of high-availability
options from high-speed master/slave replication configurations, to specialized Cluster servers
offering instant failover, to third party vendors offering unique high-availability solutions for the
MySQL database server.

4. Robust Transactional Support

MySQL offers one of the most powerful transactional database engines on the market. Features
include complete ACID (atomic, consistent, isolated, durable) transaction support, unlimited
row-level locking, distributed transaction capability, and multi-version transaction support where
readers never block writers and vice-versa. Full data integrity is also assured through server-
enforced referential integrity, specialized transaction isolation levels, and instant deadlock
detection.

5. Web and Data Warehouse Strengths

MySQL is the de-facto standards for high-traffic web sites because of its high-performance
query engine, tremendously fast data insert capability, and strong support for specialized web
functions like fast full text searches. These same strengths also apply to data warehousing
environments where MySQL scales up into the terabyte range for either single servers or scale-
out architectures. Other features like main memory tables, B-tree and hash indexes, and
compressed archive tables that reduce storage requirements by up to eighty-percent make
MySQL a strong standout for both web and business intelligence applications.

6. Strong Data Protection

Because guarding the data assets of corporations is the number one job of database professionals,
MySQL offers exceptional security features that ensure absolute data protection. In terms of
database authentication, MySQL provides powerful mechanisms for ensuring only authorized
users have entry to the database server, with the ability to block users down to the client machine
level being possible. SSH and SSL support are also provided to ensure safe and secure
connections. A granular object privilege framework is present so that users only see the data they
should, and powerful data encryption and decryption functions ensure that sensitive data is
protected from unauthorized viewing. Finally, backup and recovery utilities provided through
MySQL and third party software vendors allow for complete logical and physical backup as well
as full and point-in-time recovery.

7. Comprehensive Application Development

One of the reasons MySQL is the world's most popular open source database is that it provides
comprehensive support for every application development need. Within the database, support

Department Of Computer Science Page 10


can be found for stored procedures, triggers, functions, views, cursors, ANSI-standard SQL, and
more. For embedded applications, plug-in libraries are available to embed MySQL database
support into nearly any application. MySQL also provides connectors and drivers (ODBC,
JDBC, etc.) that allow all forms of applications to make use of MySQL as a preferred data
management server. It doesn't matter if it's PHP, Perl, Java, Visual Basic, or .NET, MySQL
offers application developers everything they need to be successful in building database-driven
information systems.

8. Management Ease

MySQL offers exceptional quick-start capability with the average time from software download
to installation completion being less than fifteen minutes. This rule holds true whether the
platform is Microsoft Windows, Linux, Macintosh, or UNIX. Once installed, self-management
features like automatic space expansion, auto-restart, and dynamic configuration changes take
much of the burden off already overworked database administrators. MySQL also provides a
complete suite of graphical management and migration tools that allow a DBA to manage,
troubleshoot, and control the operation of many MySQL servers from a single workstation.
Many third party software vendor tools are also available for MySQL that handle tasks ranging
from data design and ETL, to complete database administration, job management, and
performance monitoring.

9. Open Source Freedom and 24 x 7 Supports

Many corporations are hesitant to fully commit to open source software because they believe
they can't get the type of support or professional service safety nets they currently rely on with
proprietary software to ensure the overall success of their key applications. The questions of
indemnification come up often as well. These worries can be put to rest with MySQL as
complete around-the-clock support as well as indemnification is available through MySQL
Enterprise. MySQL is not a typical open source project as all the software is owned and
supported by Oracle, and because of this, a unique cost and support model are available that
provides a unique combination of open source freedom and trusted software with support.

10. Lowest Total Cost of Ownership

By migrating current database-drive applications to MySQL, or using MySQL for new


development projects, corporations are realizing cost savings that many times stretch into seven
figures. Accomplished through the use of the MySQL database server and scale-out architectures
that utilize low-cost commodity hardware, corporations are finding that they can achieve
amazing levels of scalability and performance, all at a cost that is far less than those offered by
proprietary and scale-up software vendors. In addition, the reliability and easy maintainability of
MySQL means that database administrators don't waste time troubleshooting performance or
downtime issues, but instead can concentrate on making a positive impact on higher level tasks
that involve the business side of data [4].

Department Of Computer Science Page 11


 PHP: - for server side scripting language
 Cascading Style Sheet and JavaScript: - for client side script language
 The project team has chosen this server side language because of:
 PHP supports many databases (My SQL, Informix, Oracle,
Sybase, Solid, access, Generic ODBC, etc.)
 PHP is an open source software(OSS)
 PHP is free to download and use.
 The project team has chosen this client side language because of:-
 Used to control the appearance of a Web site by creating style
sheets
 Used to specify the precise font, size, color and other properties of
displayed text
 All browsers support CSS today.
 This Cascading style sheets enable us to change the appearance and
layout of all the pages in a Web site, just by editing one single file!
 JavaScript is designed to add interactivity
 JavaScript is an interpreted language (means that scripts execute
without preliminary compilation)
 Everyone can use JavaScript without purchasing a license
 JavaScript is supported by all major browsers, like Netscape and
Internet Explorer
 JavaScript is used in millions of Web pages to improve the design,
validate forms, and much more
 JavaScript can react to events
 JavaScript can be used to validate data [3]

1.8 Feasibility of the Project


1.8.1 Economic feasibility
Is the process of identifying the financial benefits and associated with development of the
proposed system (project). This feasibility is the resource saving ability specially cost-benefit
analysis. The newly developed system provides many benefits to the society and the broker.

Department Of Computer Science Page 12


The newly being developed system improves the time gap, access of property and saves
resources.

 Cost Estimation
 One-time cost

 The cost to buy server computer.

 The cost to buy client computers and network connection devices.

 The cost paid for system designers and system analysts.

 The cost of Software to be acquired to build and run the system.

 Recurring cost

 The cost to train sellers and buyers how to use the system.

 The cost to maintain computers if there is problem with computers.

 Salary of system administrator to be hired to administer and maintain


the system.

Table 1. 2 Recurring Cost


Item Unit price Total
For Transportation 120 120
Paper 1 dozen 100
Total - 220
Total cost is 220

 Benefit estimation
A. Tangible benefit: - are those our project benefit that can convert into monetary
values.
 E.g. reduced stationary cost

Department Of Computer Science Page 13


B. Intangible benefits: are those our project benefit that cannot convert into monetary
values.

E.g. knowledge gain by project developer, increasing the competitiveness of the


individual, timelier, updated, and accurate information, better appointment
management

 The organization will be happy because there are no difficulties while


announcing properties and manual documented, and also, delivered from
wastage of money.
 The buyers/sellers will be happy because their time is saved by the system.

 Renters/tenants get satisfaction and freely working space from the system.
 Knowledge gain by project developer.
 Increasing the competitiveness of the individual
 Improved productivity
 Improving the morale of our team.
 Facilitating information processing of our team
 Faster decision making on the team member.
All the above points are the benefits of our system. So we conclude that the estimation of benefit
is greater than cost estimation. Therefore our system is economically feasible.

1.8.2 Technical feasibility:


It is the process of evaluating the organization ability to construct a proposed system. Our
project is technically feasible. Because it can generate outputs in a given time, response time is
minimum, easy to communicate and generally it satisfies the end-user’s requirement.

1.8.3 Operational feasibility


The purpose of Operational feasibility can ask, is the system solving the problem after the
proposed system is implemented for the user? YES, Because it is simple to access and all
operations will be performed easily. Our project is operationally feasible since it automates the
manual system and satisfies the objectives of the project. The new system solves the problems in
the area of communication among the societies and brokers. All the peoples at this level might

Department Of Computer Science Page 14


not be able to implement the whole system, but the system can be fully implemented by peoples
which have some knowledge on English language and computer also.

1.8.4 Schedule feasibility


The proposed system is developed totally and begins to give services according to the time
given. Our project is completed in scheduled date. So that, the project is feasible in time
completion Therefore, it is feasible in schedule.

1.8.5 Political feasibility


Our project has user or management support and has no resistance while developing. The
brokerage system is work under the rule and regulations of the government. So our project is
politically feasible.

1.9 Significance of the project


The existing broker system gives its services in a traditional way. For this reason it has a
different problem that faces with different target groups. Then our project has a significance
from the beginning of time saving up to resource saving since it is a web based and online
application. So, there are three target groups which are benefited from our computerized and web
based application. The target beneficiary groups are:-

Societies:-

 The users become beneficiary and save them from extra expense for finding properties

 They maximizes property choices

 Gets satisfactions the needs of information for property

 They save time and money at the same time

 They increases the loyalty and truthfulness on brokers

 Cost effectiveness-resource saving.


 Reliability of the client on the system.
 Having information about the Kombolcha town any time.

Government:-

 Gets the correct tax values from the brokers

Department Of Computer Science Page 15


 Get satisfactions since the government is the society

Brokers:-

 Be profitable since they gets the correct commissioning and the system is available for
every one

 Decreasing workload

 Save time and energy loose by searching

 Known by others since it is an online application

 Avoids redundancy of documents

 They got loyalty and truthfulness

 They promote properties easily

1.10 Team Structure


The project development team is organized by four members. Each of the members has his/her
own responsibility on the development system for timely and quality development. In case of
workload there is high cooperation overcomes the workload.

Table 1. 3 team structure


ID Name Responsibility
1564/04 Hailemariam ALL
Moges
1566/04 Hiwot Hailay ALL
1586/04 Tsega Teferi ALL
1589/04 Yedamu ALL
Yohannes

1.11. Work Break down Structure


Work break down contains task titles, number of days required to accomplish a task
with its start and end date, deliverables of each phase. The figure below describes work
break down structure of this project.

Department Of Computer Science Page 16


Figure 1. 1 project schedule

Department Of Computer Science Page 17


Chapter Two

2. Requirement Analysis
2.1. Introduction
Requirements definition is a careful assessment of the need that a system is to fulfill. In
this RAD (Requirement Analysis Document) we are discussed the detail of Broker service
organizational system in the professional perspective. The document has sections that are
separated based on their content .this section also discuss how problems will be solved by
designing and analyzing the system. We also identify the scope of Broker service with the
system user’s point of view and from system designer point of view. The reason for this is to
help us to understand clearly what we will be doing in the future and also setting clear and
achievable objectives for the project take place in this document.
In this section we, the project development team, are expressed what the current system
looks like, what players/participants are involved in the system, modeling of the current system
and describing the functionalities of the system and boundaries of the system using Use-case
diagram, showing the behavior of the system and the communication among objects using
sequence diagram, describing the structure of the system using class diagram ,Basic course of
action and alternative course of actions, practices that are preserved from the current system i.e.
their weakness and strength, what are the Business rule of the system, our constraints and the
Alternative solution to the whole system, the functional and non functional requirements of the
new system in order to save resources.

2.2 Existing System


2.2.1 Existing System Description
Our targeted system,”Tarekegn Guadie and their friend’s broker service” performs their
activities in different ways. The organization has participants like manger, secretary, casher,
auditor, and members. They all have a great role on giving broker service to the societies and to
their organization. They have their own responsibilities and effects on the system.

The broker has a license and rules and regulations (What they should do and not to do and
how much they should cost from the clients and to the government) from the government in
order to give a legal and good service to the societies, to control illegal brokers as well as to pay
the correct tax to the government. The first and the most expected work from the broker are
“Checking the property to be sold/bought/rented is legal!!”

Department Of Computer Science Page 18


The broker announces their services to the owners of the property, searches the properties
that are available for selling/buying/renting/and also tenants, registering the type of properties on
behalf of their usages (for sell, for rent, to buy, to tent), make the properties available to
customers if match conduct the owners of the property to the buyer/renter, seller/tenant and vice
versa. In reverse and must be preserved to the new proposed system is that the customers
(sellers/buyers/tenants/renters) goes to the broker organization and registers their available
properties then the broker give services accordingly.
 Customer Registration
The existing system registers the customer properties in a boring manner. They searches the
available resources or properties in the town by asking the owners that they needs to get a broker
service, through reading announcements i.e. the seller/tenant announces its available properties
on his building or on the public announcement boards and then the brokers see the information
and trying to find the customer wants to buy or rent.
 Conducting customers
After resources availability and customers need satisfaction the two parties should be
conducted to make an agreement. So, through different mechanisms (like phone number, house
number) the broker meets the two clients/customers.
 make an agreement
After conducting, they agree based on their specifications including the payment. On agreement
the broker may or may not be participate.

Department Of Computer Science Page 19


Department Of Computer Science Page 20
 Checking legality

Department Of Computer Science Page 21


When the customers agree on their needs and on the available resources or properties, there
should be a legal checking whether the available properties are produced and manufactured
legally or not, should be checked whether the property is stolen or not and also the
sellers/buyers/renters and tenants are free from any an illegal act during brokerage activities
 Made a contract
All the checking mechanisms are done then based on the agreement to pay all the specified
costs the customer makes a contract for a specific period of time.

 Approved the agreement


The customers agree based on the previous issues but if one of them violates the agreement they
are obligated to be penalized as well as the agreement is acted as it.
Drawbacks of the system:-
The existing system has many drawbacks. Among those:-
• All the property and customer registration is done by manually
• It takes time, loses resource and energy during searching the available properties as well
as customers
• The customers are not willing/informed about the broker service since there are illegal
brokers make the customers feel sad
• Due to lack of fast availability, the customers did not get a good and efficient service that
they want(they cannot have a choice)
• To handle the available properties or the required customers, the brokers become in
effective since the process take long time so they lose their customer.
• In the existing system all the information of a property or client precede manually and it
has to maintain the record of the entire activity involved in manual system.
• Property registration process also involves lot of paper work. For every property separate
file has be maintained according to name of seller property detail.
• If any person wants to sell or buy a property then he has to come to the office for
registration of his property.
• A large number of manpower is involved to maintain the whole system, which is very
expensive.
• Redundant data storage.
• The office is situated at the particular location; the number of client cannot able to come
from other side. Only the people which near to the office can register for sell, rent or buy.
• The existing system is very slow and needs more time to search and maintain each and
every detail.
• Retrieval of required information is become difficult and time consuming
• Report generation is very tedious job. The in-charge of preparing report has to refer more
than one file.
• Security of data is very critical issue which has to consider in the current system there is
no data security

Department Of Computer Science Page 22


2.3 Supplementary Requirements
2.3.1Business Rules

The organization currently has rules and regulations that should be performed when they give a
service for the societies as well as themselves. Some of them are:

For brokers:-

 They should have a license from the government


 They should make a fee /get benefit based on the restricted percent given by
government (2%from 100birr).
 They should pay the correct and expected tax to the government(10% from 100birr)
 If the organization manager works for their benefit and harms the third party he
should be outdated and penalized
 They should only did the licensed activities
 They should validate the available properties are really available and a legal property
 They have to act the rules that are formulated after an agreement

For customers:-

 They should present their full information for legality


 They have to pay the required fee before and after after an agreement
 They should not lie when they register their required information

Statements made by licensee or owner of property–If you are concerned about statements made
to you by the property owner or the licensee, what should you do? Ask them to put it in writing.

Department Of Computer Science Page 23


Department Of Computer Science Page 24
2.3.2Constraints
 There is a different constraint that limits us to perform required activities. Due to limited
development time we cannot perform activities with related organizations (from
municipality for example), because of environmental constraints we cannot did an online
transaction in our system.

2.3.3 Alternative Course of Action to constrains


 Asking more information about broker service activities having an experience.

2.4 New System


Software requirement specification (SRS)

2.4.2Functional Requirements
Functional requirement is a description of activities and services that a system must provide. It
is clear that the new system have to perform all the tasks done by the current system without
changing the rules and in cost effective way. The following are the functional requirements that
must be fulfilled by our system. Describe the processing (i.e. function to be supported) by the
new system.

Describe the inputs to system. Describe the output of the system. Describe the data that must be
managed by the system. The main functional requirements of the system are:-

 Property Registration: Customers as well as brokers can register the available


properties that can be sold or rented. There are links for house for selling and renting
purpose, properties for selling and renting, vehicles for selling and land for renting.
 View Properties: Users or customers (buyers and tenants) can view all the available
resources online. They have an opportunity to choose what they need. There are links
which tells the available properties houses, cars and land for brokerage service.
 Writing Feedback: users can give suggestions, recommendations about the system, the
broker and as well as to the administrator.
 Create Account: creating an account is the system administrators’ activity. He can add
users to the system, update their information when it is needed and remove users from the
system if they have no longer advantages to the system. The system administrator
changes the user’s password if it is users need.
 View Feedback: the system administrator and Broker looks the feedback suggested from
the users. And can take it as an advice and will perform it as well.
 View Report: the system administrator views the report generated by the broker. Those
reports are information’s which are performed by the broker and the system within week
or month.
 View Registered Property Information’s: the broker sees all the recent and needed as
well as approved property information’s from the system which is helpful for auditing

Department Of Computer Science Page 25


and generating a report. This information’s contains the sold, rented and other
information’s.
 View Requirements: the broker views the user’s requirement and he will announce the
users which have the required property. There is an email communication between them.
 Generate a Report: the broker generates report to the administrator about the sold,
rented and other information’s.
 Generate Newsletters: the broker generates recent news which is available on that day.
The users will see when they visit the site immediately.

2.4.3 Non-functional Requirement


Non-functional requirement describes invisible aspects of the system that are not directly
related to the system. Unlike functional requirement the non-functional requirement deals with
additional quality of the system such as:

 Reliability: The system consistently performs its intended function .e.g. the important
functions are validated. So the system is reliable.
 Efficiency: The system is efficient based on the concept of resource consumption. E.g. it
only needs a computer that has a browser to access the system.
 Integrity/security: only webmaster/broker and administrator has a privilege to access the
database but every user cannot perform any change on the database. Only known users
and valid properties are accepted to the system.
 Easy to use: our system is user friendly and also the frame work uses modern browser.
 Service: The service that the website provides is easily understandable by customers who
know how to use the internet. And customers can be located anywhere having internet
access. The system lets the users give the developers a feedback and comments.
 Availability: The system is available 24/7 to everyone

2.4.4 Scope/boundary of the System


Broker service is a system that helps to coordinate properties buyers/tenants and
sellers/renters using the wide network (The Internet). The scope of our system will just only
focuses on connecting the buyers/tenants and sellers/renters of the system it will not dealing
them. Broker service will not be responsible for any problems that will happen outside of the
system.

Broker service is involved in exchange of address in the sites and also a check for the
truthfulness and loyalty of the information’s uploaded in the site. After the exchange of the
buyer/tenant and seller/renter addresses the parties can make their deal by any way they want.

Department Of Computer Science Page 26


The system is highly flexible one and is well efficient to make easy interactions with the client.
The speed and accuracy will be maintained in a proper way. The proposed system maintains all
the property information online. The system identifies various sources of properties and
accordingly provides information. The various sources are land, apartments, row-house, etc. It
provide information to one and all who visit the site but to upload a property for sale and rent
and to send a request to buy a desire property only can be made who register with the side. The
system performs and will be automated.

 Available property information(Price Details, Details of Property)


 Entering the detail contact information, and other information.
 Checking password and confirm password.
 Checking username available or not during the registration process
 Entering the details like primary information, professional information,

Department Of Computer Science Page 27


 Contact information and other .it saves time to view. And give a modification power to
system owner. So, the broker can make any changes such like can add a new property
category and property type details on the working windows.
2.4.5 Users of the system
 Administrator: - manages the accounts of all the investors using the system, maintains
the database like system recovery.
 Seller: - Sellers own a value that can be transferred to a potential buyer under certain
conditions. A seller can be an individual customer, a company or organization, a virtual
enterprise
 Buyer: - Buyers are interested in the “value” of a potential seller and
are willing to accept the conditions associated with the value.
 Tenant: - a person occupying rented land house or property.

 Renter: - a person who rents a house, a land, car, etc.

 Broker: - potential seller and are willing to accept the conditions associated with the
value. Business intermediaries alter the value of any business transactions between
buyers and sellers.

2.4.6 Interactions of the system with external users

Since our system is a broker service which concerns with properties, so it should check whether
the product or available properties are legal or not(the house ,the land) and also it should check
that the customers are registered on their town(in this context Kombolcha) .so our system has a
relation with municipality (mezegaja bet).

2.4.7common language

24/7……………………………………………………available for 24 hours, 7 days (a week)

Renter………………………………………………… a person who rents a house, car, etc

Tenant…………………………………………………. a person occupying rented land, property

Commission………………………………………. A payment to a broker for services rendered,


such as in the sale or purchase of real property; usually a percentage of the selling price of the
property.

Listing Agreement–A contract between an owner and a licensed broker by which the broker is
employed to sell on the owner’s terms within a given time and the owner agrees to pay a
commission to the broker for his services.

2.4.8 Essential Use Case Diagram

Department Of Computer Science Page 28


The use case represents system goals or system functions. A uses case is an abstraction of a
system response to external inputs, and accomplishes a task that is important from user’s point
of view. Essential Use Case Model is one of the Unified Modeling Language artifacts which is
intended to capture the essence of problems through technology-free, idealized and abstract
descriptions. It also highlights what its users are trying to accomplish. The purposes of use case
diagrams can be as follows:

 Used to gather requirements of a system.

 Used to get an outside view of a system.

 Identify external and internal factors influencing the system.

 Show the interacting among the requirements are actors.

Figure 2. 1. 2essential use case for broker management system

Department Of Computer Science Page 29


2.5. System Use case
System
ViewProperties

ChangePassword

e
RegisterProperty

ud
cl
Inc lude

In
d
ViewRequirement

ten
Ex
Login Resonse
ManageProperty

Inc
ViewFeedback
Broker

lud

Ex
Seller/R

ten
enter

Include

d
RequireUsernam ResponseFee GenerateReport
SendFeedback
eandPassword dback

GenerateNewsLett
er
ViewProperty
CreateAccount
Extend

Ex
te Ex
nd
Ex

ten
d
ten

Buyer/T
d

enant

SendRequirement
View
Create Remove

ViewReport

Administ
rator

Figure 2. 3 system use case for broker management system

2.6 Use case Documentation

Table 2. 1 use case description for login


login
Use case name
Description Once registered with the system, users (Broker,
administrator has to login each time he/she
wants to use the service. So to login into the
system they should first register.

Primary actor admin, broker


Pre-condition They must have already registered.

Department Of Computer Science Page 30


Flow of events 1. System prompts the Broker, Administrator
to enter login name and password.
2. Broker and administrator enter his/her
login name and password, and then click the
login button.
3. System checks for a match in the database.
4. If there exists a match, they successfully
logged in.
[Link] of use case

Abnormal flow 1. If the broker/admin login and password are


not correct, system prompts the user to re-enter
the data with a proper message.
2. If the admin/broker has forgot his password,
“forgot password” option is provided to them

Post-condition Admin/broker account is displayed.

Table 2. 2 use case description for user registration


Use case name new user registration
Description Seller buyer, tenant, renter registers
with the brokerage system to use its
services.

Primary Actor seller, buyer, tenant, renter


Pre-condition interest something
Flow of Events 1. Seller, buyer, tenant, and renter
select the “register” option.
2. Seller, buyer, tenant, and renter fill
in the new user registration form.
3. After filling the form, seller, buyer,
tenant, renter submits the form.
4. System checks if the information
provided by the investor is correct.
5. A new account is created for the
seller, buyer, tenant, and renter.
6. System acknowledges the customers
with the login/password.

Department Of Computer Science Page 31


Abnormal flow 1. If the seller, buyer, tenant, renter
did not provide the required
information, system responds with an
error message to give that
information.
2. If the information provided by the
seller, buyer, tenant, renter is wrong
then also system gives the error
message.
3. If at the end users selects the “abort
“option to cancel his registration,
seller buyer, tenant, and renter
receives an acknowledgement that his
registration was not completed.

Post-condition Seller buyer, tenant, renter gets


his/her login id and password, which
can be used to use the services of the
brokerage system.

Table 2. 3 use case description for property registration

Use Case 4 name Register Property

Participating actors seller, renter, broker of the site

Entry Condition the seller, renter has to log in

Description Enable the seller, renter to upload their


property to their profile.

Flow of action: The user presses Register property


button.
The system will provide a form to the
user.
The user fills the form and press submit
button.
A dialog box will appear showing that
the input is acceptable and verified.
A dialog box will appear confirming
the registration.
.

Extension: If submitted information is not completed. Tell


the user that it is not allowed to submit without

Department Of Computer Science Page 32


completing the form.

Post condition A new property is uploaded/registered


Exit condition Dialog box will confirm the upload
Table 2. 4 use case description for manage property

Use Case name Manage Property

Use case Name: Manage property

Participating actors: seller, renter, Broker

Entry Condition the user has to be authenticated

Description: Managing a property remove (that is no longer


available for rent /sell), updating if something
shall be modified and add if some features
were not included during firs filling process.

Flow of action: The user opens to see the detail of the


property.
The user presses manage property
button.
A dialog box having add, update, delete
button will appear.
The user selects what they want to do.
A confirm dialog box appears.
The user presses yes button.
The system asks the user to remove,
update.
The user selects one.
A confirmation dialog box appears.

Extension: 1. Database connection is down.


I. Notify the user there is a system error and
tell the user to try later again the unsubscribing
Post condition: The property extension has been removed, or
updated.

Exit condition Dialog box appears to confirm the


removing/updating.

Table 2. 5 use case description for view property

Use case View Property

Department Of Computer Science Page 33


Participating actors buyer, tenant, broker
Participating actors:
buyer, tenant, broker

Entry Condition the user should be on the home page

Description: to view for properties based on the user criteria

Flow of action: The user chooses his criteria. The choice may
be based on property type. Click on the chosen
link The system will return the list of
properties based on the criteria in the form of
table. The user can view its detail and browse
for the properties.

Extensions: If there is no property for the given criteria


I. The system will ask the user
to send a newsletter when it finds a match.

Post condition: Properties by the given criteria will be


displayed.

Exit Condition. When the user click on other links.


Table 2. 6 use case description for view property information

Use case Name: Send Requirement

Participating actors: buyer, tenant

Entry Condition:
the user should be on the home page

Description to send his requirement based on the requirement criteria

Flow of action The user views the available information. He clicks


onsendRequirement link. Fill his required data information Click on
the SEND button The system
[Link]
will be done using Email.

Extensions: If there is no property match to his requirement nothing will be done

Post condition The system give confirmation as the user is on the process.

Exit Condition: when the user click on other links/logout

Department Of Computer Science Page 34


Table 2. 7 use case description for view requirement

Use case Name: View Requirement

Participating actors broker


the broker should be on the his page
Entry Condition:
to view requirements of the user
Description: .

Flow of action: The broker clicks the view


Requirement link.
The information will be displayed in
the form of table.
He clicks on the email link and they
will communicate out of the system.

Extensions: If there is no property requirement he will


check the available property information’s are
posted.

Post condition Required properties will be displayed.

Exit Condition: When the he click on other links.

Table 2. 8 use case description for newsletter generation

Use case Name: Newsletter Generation

Participating actors Broker (who subscribes for the


newsletter)

Entry Condition When a new property is uploaded.

Description: To traverse through the property


requested fields and match with the
uploaded property fields, and if match is
found e-mail will be sent to the
subscriber.

Flow of action: The System checks the listed property


requested fields. The System also checks
for the fields of the currently uploaded
property. If there is a match between
fields of requested property and uploaded
property then the system will send an e-
mail for the subscriber.

Department Of Computer Science Page 35


Extensions: If there is no match for the subscribed
user. The system will wait for a new
property to be uploaded.

Post condition An email will be sent for the subscriber.

Exit Condition: After the system finishes checking all the


property requests.

Table 2. 9 use case description for create account

Use case name


Create Account

Participating Actors System Administrator

Entry Condition: go to create account page

Description: to add, remove, update users to the system

Flow of actions: Administrator opens his page and clicks


create account link
The system will provide the form to the
administrator.
The administrator will choose the add,
update or delete button.
The administrator will fill out the form
and press submit button if he clicks add
button.
The update form will be displayed if
he clicks Update button
A dialog box will appear showing that
he wants to delete if he clicks the
Delete button.
A dialog box will appear confirming
the activities.

Extension: The new user already registered for updating


and removing purpose and new users may be
Department Of Computer Science Page 36
registered.

Post condition: users are added updated or deleted,

Exit condition: Dialog box will confirm the actions.

Special requirement The user must be new.

Table 2. 10 use case description for send feedback

Use case Name:


Send a feedback
(buyer, tenant)
Entry Condition: The users should be authenticated
Participating actors: The users (tenant, seller, renter

Description: To enable the users to send the feedback, to


comment the brokers.

Flow of action: The user clicks on send feedback.


The system displays text area that the
user writes their comments.
The users write their comments and
click the send button.
The comments will be sent to the
system.
.

Post condition Comments will be grasped by the broker.

Exit Condition When the administrator click on other links


Table 2. 11 use case description for generate report

Use case Name


generate reports

Participating actors The broker

Entry Condition The broker should be authenticated

Description: To enable the broker to generate all the


activities done before.

Department Of Computer Science Page 37


Flow of action: The broker clicks on generate
report links.
The system displays the reports
that the users were done.
The broker clicks generate report
information.

Post condition: The reported properties will be


seen by the users.

Exit Condition When the broker click on other link.

Table 2. 12 use case description for logout

Use case name Logout

Participating actors: System administrator, broker, tenant, renter,


seller, buyer,

Entry Condition: Administrator, tenant, renter, seller, broker


and buyer should be authenticated

Description: To out from services.

Flow of action: The administrator, tenant, renter,


seller, broker and buyer clicks on
logout button.

2.7 Key abstraction with Class responsibility collaboration (CRC) analysis


A collection of CRC cards that model all or part of a system. A CRC card is a standard index
card that has been divided into three sections, one indicating the name of the class the card
represents, one listing the responsibilities of the class, and the third listing the names of the other
classes that this one collaborates with to fulfill its responsibilities.

Department Of Computer Science Page 38


Class name

Collaborator
Responsibility

User Account

User name All users(broker,


buyer, seller,
Password
renter, tenant)

Broker

Username Sellers, Renters


password should upload
Registerproperty their properties.
GenerateNewsLetter Buyers and
GenerateReport tenants should
ViewFeedBack request
ViewPropertyInformation something.

Seller/Renter
Register The Admin will create their account or should
Username authenticate them .The Broker should interact to
Password them.
Register Property
send Feedback

Buyer/Tenant
Register Sellers, Renters should upload their
Username properties. The Admin should

Department Of Computer Science Page 39


Password authenticate them. The Broker will
ViewProperty see all the requests
SendFeedback
SendRequirement

Administrator
Register All the customers
Create Account
Remove User

2.8 Sequence Diagram

Figure 2. 4 sequence diagram for LOGIN

Users visit the website (open the homepage) and clicks on the login link and the user interface
(UI) will be displayed. The users select their user type and fill the username and password. If
they are new to the system the system will alert they have no authentication to login, then

Department Of Computer Science Page 40


requests the user to register as an authenticated user. They will click “NEW USER” link and the
form will be displayed. Now they will fill it and they will be announced their username’s and

Password’s.

Figure 2. 5 sequence diagram for view Properties

Department Of Computer Science Page 41


Users visit the website (open the homepage) and clicks on the view Properties link and the
properties information will be displayed in the form of table. The users select their need from the
available properties and send their requirement type if they are interested. Now the
communication between the broker and the customer (buyer/tenant) will be through an Email.
broker send a response using email [Link] 2. 6 sequence diagram for Generate Newsletter

Department Of Computer Science Page 42


Figure 2. 7 sequence diagrams for SEND FEEDBACK

The users open the Homepage and clicks “SEND FEEDBACK LINK” and the user interface
will be displayed. And now the user fills all the information and will click send button. The
system will confirm as he/she sends the feedback correctly or not. If the user fills correct
information the system gives confirmation message.

2.9 Activity Diagram


Activity diagrams are graphical representations of workflows of stepwise activities and
actions with support for choice, iteration and concurrency. In the unified modeling language,
activity diagrams can be used to describe the business and operational step-by-step workflows of
components in a system. An activity diagram shows in overall flow of control. In its basic form
an activity diagram is a simple and intuitive illustration of what happens in a workflow, what
activities can be done in parallel, and whether there are alternative paths through the workflow.
Activity diagram is basically a flow chart to represent the flow form one activity to another
activity. The activity can be described as an operation of the system Fig 3.3Activity Diagream For
View property

Users visit the site and clicks on “VIEWPROPERTYINFO” and value or details of the property will
be displayed. After selecting the required property the user will send its requirement by clicking
“SENDREQUIREMENT”link. If there is no property informations the user will wait until new and

Department Of Computer Science Page 43


required propeperties and potsted.

Select Role

Enter UserName and Password

Invalid
Message
Details
valid? No

Yes

Welcome Screen

Welcome
Message

Figure 2. 8Activity diagram for LOGIN

Department Of Computer Science Page 44


Open the Browser

Click View Property

YES
if Properties are Available DisplayNoPropertiesAvailable
YES

DisplayDetailsInTheFormOfTable

SendRequirements

Figure 2. 9 Activity diagram for send Requirements

Department Of Computer Science Page 45


Figure 2. 10 activity diagram for property registration

Department Of Computer Science Page 46


Select Role

Enter username and Password

Detalis valid?

Yes

Click User Registration

Fill The Form

NO
Is Filled Correctly?
Yes

Display confirm message

Figure 2. 11 Activity diagram for USER REGISTRATION

Department Of Computer Science Page 47


Click FeedBack Link

Enter the Requested details

NO
Detalis valid?

Yes

Write The Comment

Click send Button

Display confirm message

Figure 2. 12 Activity diagram for SEND FEEDBACK

Department Of Computer Science Page 48


Click Buying link

Login

Enter the username and password

Detalis valid? NO

Yes

Select search Option

Is Found?
NO

Yes

View Details Send Requirement

Figure 2. 13 Activity diagram for SEND REQUIREMENT

Department Of Computer Science Page 49


Click the Register Property

Fill the The fields

Details Valid NO

YES

Click the link

Send to db

Figure 2. 14 Activity diagram for property registration

Department Of Computer Science Page 50


2.10 Conceptual Modeling Class Diagram
Class diagram is the building block of the system that we develop. It shows all
the objects and tells us how they are interrelated. Class diagrams are the most
popular UML diagrams used by the object oriented community. It describes the
objects in a system and their relationships. Class diagram consists of attributes and
functions.

A single class diagram describes a specific aspect of the system and the collection
of class diagrams represents the whole system. Basically the class diagram
represents the static view of a system.

Class diagrams are the only UML diagrams which can be mapped directly with
object oriented languages. So it is widely used by the developer community.

Department Of Computer Science Page 51


Figure 2. 15 Conceptual Class Diagram

Department Of Computer Science Page 52


Figure 2. 16 CONCEPTUAL CLASS MODEL

Department Of Computer Science Page 53


Chapter Three System Design

3.1 Introduction
Design is a human activity (called ‘Designers’) which operates in a variety of domains,
including computer information systems. Designs vary from creations which almost purely
aesthetic in their aims to very practical systems in the disciplines of applied science and
engineering. The design of computer information system is a process of inventing a solution
which fulfils users’ requirements for an information processing systems. It involves an
understanding of how information systems are structured as well as how these structures can be
actualized through hardware and software to meet users’ need. All of them need to transform
users’ requirements into a specification of a buildable solution. They must capture the
requirements, state the design problem, develop a method for solving the problem, describe a
solution which can be made real, and evaluate alternative solutions.

The purpose of designing is to show the direction how the system is built and to obtain clear
and enough information needed to drive the actual implementation of the system. It is based on
understanding of the model the software built on. The objectives of design are to model the
system with high quality. Implementing of high quality system depend on the nature of design
created by the designer. If one want to changes to the system after it has been put in to operation
depends on the quality of the system design. So if the system is design effectively, it will be easy
to make changes to it.

3.1.1 Purpose and Goals of Design


This part of the document mostly is driven from the non-functional requirement of the
Requirement Analysis Document. The design goals represent the desired qualities the system
should have and provide a consistent set of criteria that would be taken into consideration when
making design decisions. The aim of the design is improving the following non-functional
requirements.
 Availability

Since the system is online the availability of the system has to be considered as one of the system
goals. One of the advantages of using this broker service is its availability whenever and
wherever the users need it. The system is available every time the user needs to access it.

 Understandability

The users of the site are with different level of knowledge and environment .Because of
this reason the system has to be user friendly and easy to understand. To meet this goal our
system includes the Ethiopian National working language Amharic for description. Also the user

Department Of Computer Science Page 54


interfaces will be prepared in order of they are expected .Different forms those ask user
information also order in understandable manner.

 High-Performance

The performance of the system is very important .The main performance measure for a
project is time, so the system should give fast responses for user requests. This can be view in
different point of views .One is from the users side of view, When users are using this system it
has to be fast and not waste time by sending every activities to server instead it process data and
do some validations in the client side .The other is from server side view this means that the
system has not to add load extra and unnecessary jobs to the server and the algorithms that will
be used in the serve side has to be optimized.

 Portability

Since our system is online it consists of different scripts and flashes, those things have to
be portable and work with different Internet browsing software’s. This also includes the video
player and the interface arrangements in different platforms have to be identical and the users
have not to be bothered in those things.

 Extensibility:

The system should allow any additional services easily if needed, in other words it should not
be difficult to extend the system if additions are necessary.

 Security: the system should be secure to maintain data confidentiality. The system
should authenticate it’s users by prompting them to enter user name and password in
order to get access to the system.

3.2 Class Modeling Diagram


The class diagram describes the attributes and operations of a class and also the constraints
imposed on the system. The class diagrams are widely used in the modeling of object oriented
systems because they are the only UML diagrams which can be mapped directly with object
oriented languages.

Department Of Computer Science Page 55


The class diagram shows a collection of classes, interfaces, associations, collaborations and
constraints. It is also known as a structural diagram.

So the purpose of the class diagram can be summarized as:

 Analysis and design of the static view of an application.

 Describe responsibilities of a system.

 Base for component and deployment diagrams

3.3 Current Software Architecture


As we described in the RAD document, the system is working in manually. Proposed
Software Architecture

Figure 3. 1 Architectural view of Online Broker management system

3.4.1 Sub System Decomposition


 Property Registration Subsystem
 View Properties Subsystem
 Properties Requirement subsystem

Department Of Computer Science Page 56


 Generate Report subsystem
 View Report subsystem

3.4.2 Component Diagram


A component diagram provides a physical view of the system. Its purpose is to how the
dependencies that the software has on the other software components (e.g., software libraries) in
the system. Component diagrams are used to describe the components.

Department Of Computer Science Page 57


Figure 3. 2 Component Diagram

Request to
Client Web Browser

Web Server

Application Progrm

Database

Figure 3. 3 Conceptual component diagram

3.4.3 Deployment Diagram


The deployment diagram shows how a system will be physically deployed in the hardware
environment. Its purpose is to show where the different components of the system will

Department Of Computer Science Page 58


physically run and how they will communicate with each other. deployment diagrams shows
how they are deployed in hardware.

Since the diagram models the physical runtime, a system's production staff will make
considerable use of this diagram. The notation in a deployment diagram includes the notation
elements used in a component diagram, with a couple of additions, including the concept of a
node. A node represents either a physical machine or a virtual machine node (e.g., a mainframe
node). To model a node, simply draw a three-dimensional cube with the name of the node at the
top of the cube. Use the naming convention used in sequence diagrams: [instance name]:
[instance type].

The purpose of deployment diagrams can be described as:

 Visualize hardware topology of a [Link] the hardware components used to


deploy software components. Describe runtime processing nodes.

Communicate

Database Web Server

Mysql

Client Machine

Web
Browser

Figure 3. 4 sample deployment diagram

Department Of Computer Science Page 59


PropertyRegistrati
on

WEB BROWSER
NetWork ViewProperties
WAMP
SERVER
REQUEST

SendRequirement
Response
WEB SERVER

ViewRequirement

Google Chrome

Application
GenerateReport DB SERVER

GenerateNewslett
er

CreateAccount

ChangePassword

ViewFeedback

Figure 3. 5 Overall Deployment Diagram

3.4.4 MODULE HIERARCHY DIAGRAM

Department Of Computer Science Page 60


Department Of Computer Science Page 61
Figure 2. 17 MODULE HIERARCHY DIAGRAM

3.4.5 Persistence Modeling for Object Oriented Data Base

Customer Customer
<<table>> SellingProp SellingProper RentingLand
user_id:int user_id:int<<pk>> RentingLand
user_type:string erty ty<<table>> <<table>>
user_type:string user_id:int id:int
Fullname:string Fullname:string user_type:string user_id:int<<pk>> user_type:string id:int<<pk>>
Email:string Email:string Fullname:string user_type:string LandlordName:string user_type:string
phoneNumber:int phoneNumber:int Email:string Fullname:string Email:string LandlordName:string
phoneNumber:int Email:string phoneNumber:int Email:string
Register() phoneNumber:int phoneNumber:int
Register() property_type:string TenantName:string
purpose:string property_type:string LandDescription:string TenantName:string
production_year:int purpose:string LandStreet:string LandDescription:string
additional_purpose: production_year:int price:int LandStreet:string
string additional_purpose:stri date:date price:int
price:int ng image:blob date:date
date:date price:int image:blob
date:date
SellingHou SellingHouse image:blob
image:blob
sell()
se <<table>> rent()
sell() tenant() rent()
user_id:int tenent()
user_type:string user_id:int<<pk>>
Fullname:string user_type:string
Email:string Fullname:string
phoneNumber:int Email:string
property_type:string phoneNumber:int SellingCar
purpose:string property_type:string SellingCar
production_year:int purpose:string <<table>>
additional_purpose: production_year:int user_id:int
additional_purpose:stri user_type:string user_id:int<<pk>>
string
ng Fullname:string user_type:string
price:int
price:int Email:string Fullname:string
date:date
image:blob date:date phoneNumber:int Email:string
sell() image:blob property_type:string phoneNumber:int
sell() purpose:string property_type:string
production_year:int purpose:string
additional_purpose: production_year:int
string additional_purpose:stri
price:int ng
date:date price:int
image:blob date:date
sell() image:blob
Register()

Figure 3. 6 Persistence Modeling

3.4.6 Access control and security


The Customer: - represents an authenticated user. They used the system simply visiting
the website and register their property details as they want and other customers also view
the properties and send their requirements to the broker.
The Broker: - represents an authenticated user. It uses Login subsystems to check the
password and user name and associate with the user. The Broker actor is also responsible
to generate Newsletter and generate report, view requirement and feedback.
The Administrator: - represents an authenticated user. It uses Login subsystems to check
the password and user name and associate with the broker and the user. The administrator
actor is also responsible to create an account, update and remove users. He can also view
broker’s report and user’s feedback.

Department Of Computer Science Page 62


Account Create()
Update()
Administrator Remove()
View()
View Update()
Report

Register Register()

Customer View View()


Property Send()

Send feed()
Feedback

Register Register()
View Requirement View()
Broker SendResponse()
GenearateNewsletter GenerateNews()

Generate Report Generate()

viewFeedback viewfeed()
Responsefeed()
Table 3. 1Access control and security

3.4.7 Boundary conditions and Exception Handling


3.4.7.1Boundary Condition
The System Administrator initiates the web server using the appropriate administrator account
that enables him/her to add, modify and/or remove users available in the system such as, the
customer account (Seller, Buyer, Renter, and Tenant).

The Broker initiates the web server using the appropriate account and views the available
registered properties, the customer requirements, and set communication between customers
using email. He also accepts user’s feedback and tries to respond to them in order to improve
their performance.

Any customer/user initiates the system to get a connection with the web server using his/her web
browser available on the client side. As a result, the home page will be displayed as a boundary
object to provide different services and access the pages available there. Based on the
functionality the customer is interested, there are a number of boundary objects found there so as

Department Of Computer Science Page 63


to facilitate the connection between the customer, the administrator and the system broker tasks.
In addition to the Home page, the following are some of the boundary objects found in this
specific system. Property Registration Page, View properties Page and send Requirement link,
Feedback page, Login page and about Page and contact us page.

The system is client-server architecture and allows a remote [Link] following requirements
is mandatory on both client and server.

Client slide
 Internet connection should be available on the client side
 Web browser is demanding to connect with the web server of the system
 The customer should have an legitimate and having an account provided by the
system
 It should give the URL (Uniform Resource Locator) address of the web site.
 The customer communicates the different hyperlinks/pages using the homepage.
 The Customer can get different service from viewing the available properties up
to broker communication using emails as well as face to face.

Server Side
 The system administrator/Web Master initiates and updates the system using
his/her preferred privileges
 The server side should be registered on the local or any other service provider.
 It should have Internet connection and database driven-website for remote access.
 It automatically save the changes and take backups (using two hard disk).

[Link] Exception Handling


 The system will display messages if it is tried to access using wrong/invalid account
by checking against the account table.
 The Customer can’t send property requirements that are not available in the system.
 It uses two hard disks in order to prevent data lose in case of system crashes.

Department Of Computer Science Page 64


3.5 User Interface Design

Department Of Computer Science Page 65


Department Of Computer Science Page 66
Department Of Computer Science Page 67
Department Of Computer Science Page 68
Department Of Computer Science Page 69
Department Of Computer Science Page 70
Chapter Four: Implementation and Testing

4.1 Implementation

4.1.1Sample codes
We are using php programming language for our programming purpose.

An HTML form for registering properties by property owners

<html>

<head>

<link rel="stylesheet" type="text/css" href="css/[Link]">

<style type="text/css">

form{

-webkit-gradient(linear, bottom, left 175px, from(#CCCCCC), to(#EEEEEE));

background: -moz-linear-gradient(bottom, #CCCCCC, #EEEEEE 175px);

margin:auto;

position:relative;

width:850px;

height:730px;

font-family: ;

font-size: 14px;

font-style: italic;

line-height: 24px;

font-weight: ;

color: #09C;

text-decoration: none;

-webkit-border-radius: 10px;

Department Of Computer Science Page 71


-moz-border-radius: 10px;

border-radius: 10px;

padding:10px;

border: 1px solid #99779;

border: inset 0px solid #333;

-webkit-box-shadow: 0px 0px 8px rgba(0, 0, 0, 0.3);

-moz-box-shadow: 0px 0px 8px rgba(0, 0, 0, 0.3);

box-shadow: 0px 0px 8px rgba(0, 0, 0, 0.3);"

/* CSS Document */

div {

font-size: 25px;

text-align:center;

width: 100%;

height: 20%;

font-family:"Times New Roman", Times, serif;

color:#bgbgbg;

-webkit-font-smoothing: antialiased;

#container{

position: relative;

Department Of Computer Science Page 72


height:400x;

width:300px;

top:;

left:;

margin-left:5px;

margin-top:30px;

background: #BACAAA;

border-radius:1px;

border:px solid #333333;

box-shadow:px :px:px rgba(0,1,0,1);

#lower {

background: #ebgff7;

width: 95%;

height:30px;

margin-top:10px;

input[type=submit] {

float:right;

margin-right:10px;

margin-top:;

Department Of Computer Science Page 73


input[type=file] {

float:right;

margin-right:10px;

margin-top:;

input[type=radio] {

float:right;

margin-right:10px;

margin-top:;

input[type=text] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 12px;

margin-left:;

width: 250px;

height: 25px;

border: 1px solid #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;}

Department Of Computer Science Page 74


input[type=date] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 12px;

margin-left:;

width: 250px;

height: 25px;

border: 1px solid #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;}

input[type=textarea] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size:20px;

padding-left: 20px;

margin: 20px;

margin-top: 18px;

margin-left:;

width: 350px;

height: 75px;

border: 1px solid #c7d0d2;

border-radius: 2px;

Department Of Computer Science Page 75


box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;}

select[name=house_category] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=subject] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

Department Of Computer Science Page 76


border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=construction_age] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=type_to_be_rented] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

Department Of Computer Science Page 77


margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=propertytype] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=purpose] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

Department Of Computer Science Page 78


padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=bathroom] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=user_type] {

Department Of Computer Science Page 79


color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=agreement_between] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

Department Of Computer Science Page 80


box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=total_property] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=date_interval] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

Department Of Computer Science Page 81


height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=total_tenant_date] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=model] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

Department Of Computer Science Page 82


margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=production_year] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size:20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=about] {

color: #777;

font-family:"Times New Roman", Times, serif;

Department Of Computer Science Page 83


font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=gender] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

Department Of Computer Science Page 84


select[name=construction_year] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=about] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

Department Of Computer Science Page 85


border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=house_type] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=kebele] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

Department Of Computer Science Page 86


width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=occupation] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=vehicle_type] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

Department Of Computer Science Page 87


margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=city] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=property_type] {

color: #777;

Department Of Computer Science Page 88


font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=property_category] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

Department Of Computer Science Page 89


}

select[name=total_floor] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=facing] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

Department Of Computer Science Page 90


border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=bathroom] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=construction_year] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

Department Of Computer Science Page 91


margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

select[name=usertype] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size: 20px;

padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: hidden, #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;

input[type=password] {

color: #777;

font-family:"Times New Roman", Times, serif;

font-size:20px;

Department Of Computer Science Page 92


padding-left: 10px;

margin: 10px;

margin-top: 10px;

margin-left:;

width: 250px;

height: 25px;

border: 1px solid #c7d0d2;

border-radius: 2px;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #f5f7f8;}

input[type=submit] {

float:left;

margin-right:1px;

margin-top:;

width:120px;

height:50px;

font-family:"Times New Roman", Times, serif;

font-size:20px;

font-weight:normal;

color: #fff000BBB;

background-color: #acd6ef;

background-image: -webkit-gradient(linear, left top, left bottom, from(#acd6ef), to(#6ec2e8));

background-image: -moz-linear-gradient(top left 90deg, #acd6ef 0%, #6ec2e8 100%);

background-image: linear-gradient(top left 90deg, #acd6ef 0%, #6ec2e8 100%);

Department Of Computer Science Page 93


border-radius: 30px;

border: 1px solid #66add6;

box-shadow: 0 1px 2px rgba(0, 0, 0, .3), inset 0 1px 0 rgba(255, 255, 255, .5);

cursor: pointer;

input[type=reset] {

float:left;

margin-right:1px;

margin-top:;

width:120px;

height:50px;

font-family:"Times New Roman", Times, serif;

font-size:20px;

font-weight:normal;

color: #fff000BBB;

background-color: #acd6ef; /*IE fallback*/

background-image: -webkit-gradient(linear, left top, left bottom, from(#acd6ef), to(#6ec2e8));

background-image: -moz-linear-gradient(top left 90deg, #acd6ef 0%, #6ec2e8 100%);

background-image: linear-gradient(top left 90deg, #acd6ef 0%, #6ec2e8 100%);

border-radius: 30px;

border: 1px solid #66add6;

box-shadow: 0 1px 2px rgba(0, 0, 0, .3), inset 0 1px 0 rgba(255, 255, 255, .5);

cursor: pointer;

Department Of Computer Science Page 94


input[type=text]:hover,

input[type=password]:hover {

border: 1px solid #b6bfc0;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .7), 0 0 0 5px #f5f7f8;

input[type=text]:focus,

input[type=password]:focus {

border: 1px solid #a8c9e4;

box-shadow: inset 0 1.5px 3px rgba(190, 190, 190, .4), 0 0 0 5px #e6f2f9;

input[type=submit]:hover {

background-image: -webkit-gradient(linear, left top, left bottom, from(#b6e2ff), to(#6ec2e8));

background-image: -moz-linear-gradient(top left 90deg, #b6e2ff 0%, #6ec2e8 100%);

background-image: linear-gradient(top left 90deg, #b6e2ff 0%, #6ec2e8 100%);

input[type=submit]:active {

background-image: -webkit-gradient(linear, left top, left bottom, from(#6ec2e8), to(#b6e2ff));

background-image: -moz-linear-gradient(top left 90deg, #6ec2e8 0%, #b6e2ff 100%);

background-image: linear-gradient(top left 90deg, #6ec2e8 0%, #b6e2ff 100%);

</style>

</head>

Department Of Computer Science Page 95


<body bgcolor="#bbccaa">

<!--<body bgcolor="#ccffcc">-->

<legend>Property Registration Page!</legend>

<form action="[Link]" method="POST" enctype="multipart/form-data">

<fieldset style="width:900px;"><table border="3">

<tr>

<td colspan="2">Property Registration Form </td>

</tr>

<tr><td width="179">user_id:<em>*</em></td><td><label><input type="text"


name="user_id"/></label></td></tr>

<tr><td width="179">User_Type:<em>*</em></td><td><label><select name="user_type">

<option value="SELLER"selected>[SELLER]</option>

<option value="BROKER">Broker</option></select></label></td></tr>

<tr><td width="179">Full Name:<em>*</em></td><td><label><input type="text"


name="fname"/></label></td></tr>

<tr><td width="179">Email:<em>*</em></td><td><label><input type="text"


name="email"></label></td></tr>

<tr><td width="179">Phone:<em>*</em></td><td><label><input type="text" name="phone"


/></label></td></tr>

<tr><td width="179">Kebele:<em>*</em></td><td><label><select name="kebele">

<option value="-1"selected>[chooseyours]</option>

<option value="01">01</option><br>

<option value="02">02</option><br>

<option value="03">03</option><br>

<option value="04">04</option><br>

<option value="05">05</option><br>

<option value="06">06</option></select></label></td></tr>

Department Of Computer Science Page 96


<tr><td width="179">Property Type:<em>*</em></td><td><label><select name="property_type">

<option value="-1"selected>[chooseyours]</option>

<option value="laptop">laptop</option><br>

<option value="tv">tv</option><br>

<option value="frige">frige</option><br>

<option value="dish">dish</option><br>

<option value="machine">machine</option><br>

<option value="radio">radio</option><br>

<option value="tape">tape</option></select></label></td></tr>

<tr><td width="179">Model:<em>*</em></td><td><label><input type="text" name="model"


/></label></td></tr>

<tr><td width="179">Purpose:<em>*</em></td><td><label><select name="purpose">

<option value="-1"selected>[chooseyours]</option>

<option value="For Sell">forSell</option>

<option value="For Rent">For Rent</option></select></label></td></tr>

<tr><td width="179">Production Year:<em>*</em></td><td></label><select


name="production_year">

<option value="-1"selected>[chooseyours]</option>

<option value="2000">2000</option><br>

<option value="2001>2001</option><br>

<option value="2002>2002</option><br>

<option value="2003">2003</option><br>

<option value="2004">2004</option></br>

<option value="2005">2005</option></select></label></td></tr>

<tr><td width="179">Additional Features:<em>*</em></td><td><label><textarea cols="30" rows="2"


name="additional_feature"></textarea></label></td></tr>

Department Of Computer Science Page 97


<tr><td width="179">Price:<em>*</em></td><td><label><input type="text"
name="price"/></label></td></tr>

<tr><td width="179">Image:<em>*</em></td><td><label><input type="file"


name="image"></label></td></tr>

<tr align="center">

<td colspan="2"><label>

<input type="submit" name="Submit" value="Register" />

<input type="reset" value="Reset" />

<a href="[Link]"/>Update</a></label></td></tr></table></fieldset>

</form>

</body>

</html>

The php code or server side scripting source codes

<?php

if(isset($_POST['submit'])){

if(getimagesize($_FILES['image']['tmp_name'])==FALSE)

echo"please select an image";

else

$d=date('y-m-d');

$image=addslashes($_FILES['image']['tmp_name']);

$name=addslashes($_FILES['image']['name']);

$user_id=addslashes($_POST['user_id']);

$user_type=addslashes($_POST['user_type']);

Department Of Computer Science Page 98


$fname=addslashes($_POST['fname']);

$email=addslashes($_POST['email']);

$phone=addslashes($_POST['phone']);

$kebele=addslashes($_POST['kebele']);

$property_type=addslashes($_POST['property_type']);

$model=addslashes($_POST['model']);

$purpose=addslashes($_POST['purpose']);

$production_year=addslashes($_POST['production_year']);

$additional_feature=addslashes($_POST['additional_feature']);

$price=addslashes($_POST['price']);

$image=file_get_contents($image);

$image=base64_encode($image);

saveimage($user_id,$user_type,$fname,$email,$phone,$kebele,$property_type,$model,$purpose,$pro
duction_year,$additional_feature,$price,$d,$name,$image);

displayimage();

function
saveimage($user_id,$user_type,$fname,$email,$phone,$kebele,$property_type,$model,$purpose,$pro
duction_year,$additional_feature,$price,$d,$name,$image)

$con=mysql_connect("localhost","root","");

mysql_select_db("db_broker",$con);

Department Of Computer Science Page 99


$str="INSERT INTO
sellingProperties(user_id,user_type,fullname,email,phone,kebele,property_type,purpose,production_ye
ar,additional_feature,price,posting_date,name,image)

values('$user_id','$user_type','$fname','$email','$phone','$kebele','$property_type',

'$purpose','$production_year','$additional_feature','$price','$d','$name','$image')";

$result=mysql_query($str,$con);

if($result)

//echo '<script type="text/javascript">alert(" successfully property


Registered!!");[Link]=\'[Link]\';</script>';

echo 'successfully';

else

header("location:[Link]");

function displayimage()

$con=mysql_connect("localhost","root","");

mysql_select_db("db_broker",$con);

$qry="select * from sellingProperties";

$result=mysql_query($qry,$con);

while($row=mysql_fetch_array($result))

echo'<img height="100" width="100" src="data:image;base64,'.$row[13].' " align="center">';

Department Of Computer Science Page 100


mysql_close($con);

}}

?>

4.2Functional Test Specifications


The specification will be described according to the test types that will be done on the system.
The tests that are done are as follow:
 Test Owner Property Registrations
 Test Login
 Test view Registered Properties
 Test send feedback
 Test view Feedback
 Test view Requirement
 Test Report generate
 Test Generate newsletter

Test Login Customer

Test name: Login Customer


Test Description: The login test is used to check whether any one access the system or only
Those registered customers have an access to the system.
Actions Test Procedure Input Expected test Pass /fail
result
The customer(broker and Customer’s The page that Pass-the customer
Test administrator) should click appropriate enables the can view, create
login login link username and customer to view and send.
system Log-in Page screen is password by registered
displayed selecting its properties and
Customer enters his/her appropriate role requirements as
user name and password. well as feedbacks,
generate
newsletter and
report and the
admin manages the
user.
Incorrect username “Please Enter Pass- Customer
and password correct username can’t access the
and password “ pages.
message display,

Department Of Computer Science Page 101


Testing objects: Login checking
Test focus: correct user type, user name and password validation
Test Process
1. Starting condition
o The customer should click login button
o The login Page screen is shown.
2. Input
o Customer select their role and enters his/her personal user name and password
o Then clicks sign-in/login.
3. Expected result
o At the time of sign-in/login, if the username, usertype and password are valid
the page will be displayed and accessible to the customer.
Table 4. 1 Test for Login Customer

Test owner Property registration

Actions Test Procedure Input Expected test Pass /fail


result
The customer(seller, Customer’s The page that Pass-the customer
Test owner renter and broker) should appropriate enables the can communicate
property visit the property customer to view to the broker
registration website/homepage information registered using email
system Property registration link successfully communication.
will be displayed confirmations.
Customers fill the entire
required field.

Incorrect field “Please Enter Fail- Customer


insertion correct field can’t access the
information pages.
message will be
displayed.
Test name: property Registration

Department Of Computer Science Page 102


Test Description: The property registration test is used to check whether any customers fill the
appropriate property information and check the successful confirmation.
Testing objects: property registration checking
Test focus: correct property information validation
Test Process
1. Starting condition
o The customer should click property registration link
o The property registration Page screen is shown.
2. Input
o Customer fills all the required information
o Then clicks submit button.
3. Expected result
o At the time of submit, if the property information are valid the confirmation message
will be displayed and the communication will be handled.

Table 4. 2 Test for Property Registration

4. Failure Condition
o If customer enters incorrect property information, unsuccessful message will
be displayed.

4. Failure Condition
o If customer select and enters random user name and password, write the
correct once. If password is not enters, please enter your password message
will be displayed.

Department Of Computer Science Page 103


Chapter Five: Conclusion and Recommendation

5.1 Conclusion
 The Broker management system made computerized system to reduce resource lose and

to increase the efficiency. The main focus of this project is to satisfy users need for easy
finding property, to maximize property choice, to save time and money .The maintenance
of the records is made efficient, as all the records are stored in the database, and also data
can be retrieved easily. The editing is also made simpler. The user has to just type in the
required field and press the update button to update the information.

Our main aim of the project is:


 Increase property availabilities
 Minimize the time required to perform task
 Minimize the work load of employees/Brokers
 Provide sufficient security
 Increase customer satisfaction

5.2 Recommendation
We recommended that the major problem of the existing system that should be intended is:-

 There should be an online transaction to save time and for security purpose.
 The system should have interaction to other systems like the Municipality, car license
company property producers and other industrial organizations to check the validity of
the houses, properties as well as electronic materials.
 There should be Online Agreement in order to save time and resource.
 Up grading the existing system through the accusation of computers by for in putting
data, processing data, storing data and dissemination of data.

Department Of Computer Science Page 104


1.12 References
[1].[Link]

[2].[Link]

[3] [Link]

[4].Daniel R. Clark, Beginning Object-Oriented Programming with VB 2005: From Novice to


Professional, ISBN (pub): 1-59059-576-9

Department Of Computer Science Page 105


Annex 1

Department Of Computer Science Page 106


Annex2

Department Of Computer Science Page 107


Department Of Computer Science Page 108
Department Of Computer Science Page 109
Annex 3

Sample code for Selling Property Registration


<?php
if(isset($_POST['submit'])){
if(getimagesize($_FILES['image']['tmp_name'])==FALSE)
{
echo"please select an image";
}
else
{
$d=date('y-m-d');
$image=addslashes($_FILES['image']['tmp_name']);
$name=addslashes($_FILES['image']['name']);
$user_id=addslashes($_POST['user_id']);
$user_type=addslashes($_POST['user_type']);
$fname=addslashes($_POST['fname']);
$email=addslashes($_POST['email']);
$phone=addslashes($_POST['phone']);
$kebele=addslashes($_POST['kebele']);
$property_type=addslashes($_POST['property_type']);
$model=addslashes($_POST['model']);
$purpose=addslashes($_POST['purpose']);
$production_year=addslashes($_POST['production_year']);
$additional_feature=addslashes($_POST['additional_feature']);
$price=addslashes($_POST['price']);

$image=file_get_contents($image);
$image=base64_encode($image);
saveimage($user_id,$user_type,$fname,$email,$phone,$kebele,$property_type,$model,$purpose,$pro
duction_year,$additional_feature,$price,$d,$name,$image);
displayimage();
}
}

function
saveimage($user_id,$user_type,$fname,$email,$phone,$kebele,$property_type,$model,$purpose,$pro
duction_year,$additional_feature,$price,$d,$name,$image)
{
$con=mysql_connect("localhost","root","");
mysql_select_db("db_broker",$con);
$str="INSERT INTO
sellingProperties(user_id,user_type,fullname,email,phone,kebele,property_type,purpose,production_y
ear,additional_feature,price,posting_date,name,image)
values('$user_id','$user_type','$fname','$email','$phone','$kebele','$property_type',
'$purpose','$production_year','$additional_feature','$price','$d','$name','$image')";

Department Of Computer Science Page 110


$result=mysql_query($str,$con);
if($result)
{
//echo '<script type="text/javascript">alert(" successfully property
Registered!!");[Link]=\'[Link]\';</script>';
echo 'successfully';
}
else
{
header("location:[Link]");
}

function displayimage()
{
$con=mysql_connect("localhost","root","");
mysql_select_db("db_broker",$con);
$qry="select * from sellingProperties";
$result=mysql_query($qry,$con);
while($row=mysql_fetch_array($result))
{
echo'<img height="100" width="100" src="data:image;base64,'.$row[13].' " align="center">';
}
mysql_close($con);
}}
?>

Sample code for selling houses Property Registration


<?php
/* include("[Link]"); */
if(isset($_POST['submit'])){
if(getimagesize($_FILES['image']['tmp_name'])==FALSE)
{
echo"please select an image";
}
else
{
$d=date('y-m-d');
$image=addslashes($_FILES['image']['tmp_name']);
$name=addslashes($_FILES['image']['name']);
/* $requirement_id=$_POST["requirement_id"]; */
$id=addslashes($_POST['id']);
$user_type=addslashes($_POST['user_type']);
$fname=addslashes($_POST['fname']);
$property_type=addslashes($_POST['property_type']);
$purpose=addslashes($_POST['purpose']);
$email_address=addslashes($_POST['email_address']);

Department Of Computer Science Page 111


$phone=addslashes($_POST['phone']);
$kebele=addslashes($_POST['kebele']);
$total_floor=addslashes($_POST['total_floor']);
$facing=addslashes($_POST['facing']);
$bathroom=addslashes($_POST['bathroom']);
$covered_area=addslashes($_POST['covered_area']);
$construction_year=addslashes($_POST['construction_year']);
$house_price=addslashes($_POST['house_price']);
$additional_feature=addslashes($_POST['additional_feature']);
$image=file_get_contents($image);
$image=base64_encode($image);
saveimage($id,$user_type,$fname,$property_type,$purpose,
$email_address,$phone,$kebele,$total_floor,$facing,$bathroom,
$covered_area,$construction_year,$house_price,$additional_feature,$d,$name,$image);
displayimage();
}
}
function saveimage($id,$user_type,$fname,$property_type,$purpose,
$email_address,$phone,$kebele,$total_floor,$facing,$bathroom,$covered_area,$construction_year,
$house_price,$additional_feature,$d,$name,$image)
{
$con=mysql_connect("localhost","root","");
mysql_select_db("db_broker",$con);
$str="INSERT INTO
SellingHouse(id,user_type,fname,property_type,purpose,email_address,phone,kebele,
total_floor,facing,bathroom,covered_area,construction_year,house_price,
additional_feature,posting_date,name,image)values('$id','$user_type',
'$fname','$property_type','$purpose','$email_address','$phone','$kebele',
'$total_floor','$facing','$bathroom','$covered_area',
'$construction_year','$house_price','$additional_feature','$d',
'$name','$image')";
$result=mysql_query($str,$con);
if($result)
{
//echo '<script type="text/javascript">alert(" successfully property
Registered!!");[Link]=\'[Link]\';</script>';
echo 'successfully';
}
else
{
header("location:[Link]");
}

function displayimage()
{
$con=mysql_connect("localhost","root","");

Department Of Computer Science Page 112


mysql_select_db("db_broker",$con);
$qry="select * from sellingHouse";
$result=mysql_query($qry,$con);
while($row=mysql_fetch_array($result))
{
echo'<img height="100" width="100" src="data:image;base64,'.$row[17].' " align="center">';
}
mysql_close($con);
}}
?>

Sample code for login users to the system


<?php
$con=mysql_connect("localhost","root","");
/*if(!$con)
{
die('connection not established'. mysql_error());
}
else
{
echo"connection established";
}*/
if(mysql_select_db("db_broker",$con))
//echo"db_broker database is selected";
//session_start();
/* include("[Link]"); */
if(isset($_POST['submit']))
{
/* $user_id=$_POST["user_id"]; */
$usertype=$_POST["usertype"];
$username=$_POST["username"];
$password=$_POST["password"];

/* $_SESSION["name"]=$_POST["name"]; */
$str="insert into
logins(usertype,username,password)values('$_POST[usertype]','$_POST[username]','$_POST[passwo
rd]')";
if(!mysql_query($str,$con))
{
echo" not inserted" . mysql_error();
}
else{
echo"one record is added";
}

Department Of Computer Science Page 113


mysql_close($con);
}
?>

<html>
<head>
<title>certification Page!</title>
<link rel="stylesheet" type="text/css" href="css/[Link]">
</head>

<body bgcolor="#FGFGGF">
<!--<tr><td align="center"><p><font color="orange"><b><h1>seller Registration
Page!</h1></font></p>-->
<fieldset>
<legend> Oh users Fill the fields!</legend>
<!--<script language="javascript" type="text/javascript">
function validate()
{
if([Link]("text_name").value=="")
{
alert("Please Enter Your Name");
[Link]("text_name").focus();
return false;
}

if(!(isNaN([Link].text_name.value)))
{
alert("Name has character only!");
return false;
}

if([Link]("text_address").value=="")
{
alert("Please Enter Your Address");
[Link]("text_address").focus();
return false;
}

if(!(isNaN([Link].text_address.value)))
{
alert("Address has character only!");
return false;
}

/* if([Link]("text_area").value=="")
{

Department Of Computer Science Page 114


alert("Please Enter Your Area");
[Link]("text_area").focus();
return false;
}

if(!(isNaN([Link].text_area.value)))
{
alert("Area has character only!");
return false;
}

if([Link]("text_city").value=="")
{
alert("Please Enter Your City");
[Link]("text_city").focus();
return false;
}

if(!(isNaN([Link].text_city.value)))
{
alert("City has character only!");
return false;
}

if([Link]("text_pin").value=="")
{
alert("Please Enter Your Pin");
[Link]("text_pin").focus();
return false;
}

if((isNaN([Link].text_pin.value)))
{
alert("Pin has numeric only!");
return false;
}

/* if([Link]("text_state").value=="")
{
alert("Please Enter Your State");
[Link]("text_state").focus();
return false;
}

if(!(isNaN([Link].text_state.value)))
{

Department Of Computer Science Page 115


alert("State has character only!");
return false;
}

if([Link]("text_country").value=="")
{
alert("Please Enter Your Country");
[Link]("text_country").focus();
return false;
}

if(!(isNaN([Link].text_country.value)))
{
alert("Country has character only!");
return false;
}

if([Link]("text_mobile").value=="")
{
alert("Please Enter Your Mobile Number");
[Link]("text_mobile").focus();
return false;
}

if((isNaN([Link].text_mobile.value)))
{
alert("Mobile has numeric only!");
return false;
}

var emailPat=/^([\w-]+(?:\.[\w-]+)*)@((?:[\w-]+\.)*\w[\w-]{0,66})\.([a-z]{2,6}(?:\.[a-z]{2})?)$/i
var emailid=[Link]("text_email").value;
var matchArray = [Link](emailPat);
if (matchArray == null)
{
alert("Your email address seems incorrect. Please try again.");
[Link]("text_email").focus();
return false;
}
if([Link]("text_type").value=="")
alert("Please select User Type");
{
[Link]("text_type").SELECT();
return false;

Department Of Computer Science Page 116


}
if([Link]("text_user").value=="")
{
alert("Please Enter User Name");
[Link]("text_user").focus();
return false;
}
if([Link]("text_pass").value=="")
{
alert("Please Enter Your Password");
[Link]("text_pass").focus();
return false;
}
if([Link]("text_repass").value=="")
{
alert("Please ReEnter Your Password");
[Link]("text_repass").focus();
return false;
}
if([Link]("text_repass").value!="")
{
if([Link]("text_repass").value !=
[Link]("text_pass").value)
{
alert("Confirm Password doesnot match!");
[Link]("text_repass").focus();
return false;
}
}
return true;
}
</script>-->
<form name="users" action="[Link]" method="post" onsubmit="return validate();">
<center><fieldset style="width:100px;">
User Type:<select name="usertype">
<option value="Administrator">Administrator</option>
<option value="Broker">Broker</option></select>
<p>UserName:<input type="text" name="username" />
<p>Password:<input type="password" name="password" /><br>
<input type="submit" name="submit" value="Submit" />
<input type="submit" name="reset" value="reset">
</form>
</fieldset>
</body>
</html>
Annex 4

Department Of Computer Science Page 117


//we will do it

Department Of Computer Science Page 118

Common questions

Powered by AI

Modeling current system functions with diagrams such as class, sequence, and use-case is crucial in developing a new broker service system. Use-case diagrams gather system requirements, provide an external view, and identify interactions between actors and the system, ensuring that user goals are captured effectively . Sequence diagrams illustrate the behavior and communication among objects, crucial for visualizing interactions . Class diagrams describe static structures, showing relationships and constraints of system components, aiding in both analysis and design . Collectively, these diagrams provide a comprehensive understanding of the system, facilitating better communication among stakeholders and creating a solid foundation for design and development . Ensuring system functionalities are thoroughly mapped aids in addressing potential issues early, optimizing resources, and aligning with project objectives ."}

To address issues in the existing broker service system, several methodologies can be applied: 1. Automation and Web Application: Transitioning from a manual to an automated, web-based system can significantly improve efficiency and accessibility. This allows property information to be maintained online, making it easier for users to register and view properties, reducing time and resource consumption during searches . 2. System Design Improvements: High-quality system design is crucial, involving the modeling of the system using class diagrams, deployment diagrams, and sequence diagrams. This helps in understanding the structure and behavior of the system, facilitating easier updates and changes in the future . 3. Use of Diagrams for System Analysis: Employing use-case diagrams, class diagrams, and deployment diagrams aids in visualizing and analyzing system requirements and interactions, which can help in the systematic identification and resolution of existing issues . 4. Security Enhancements: To ensure data integrity and confidentiality, the system should incorporate secure authentication mechanisms, allowing only authorized users to access sensitive data . 5. Feedback and Reporting Mechanisms: Implementing systems that allow users to provide feedback and report system performance can help in making informed improvements. This involves generating reports and newsletters to maintain transparency and keep users informed about system updates and properties . By applying these methodologies, organizations can ensure that the broker service system becomes more reliable, efficient, and user-friendly, meeting both functional and non-functional requirements effectively .

System users and system designers have distinct perspectives on the broker service system. Users typically focus on the system's functionality, seeking an automated and web-based application to streamline tasks like property registration, communication, and information access to save time and costs . They are concerned with reliability, efficiency, and accessibility, especially in areas with limited internet and power resources . Conversely, system designers concentrate on creating a robust and adaptable system architecture, prioritizing the system's design quality, security, and performance . This understanding is important because aligning these perspectives can enhance user satisfaction and system effectiveness, ensuring the system meets user needs while maintaining design and implementation quality ."}

Enhancing the existing Broker service system for better user engagement and efficiency requires several key components: 1. **Automation and Web-Based Application**: Transitioning from a manual-based system to an automated one allows for easier management and access to property information online, which is crucial for efficiency and user engagement . 2. **User-Friendly Design**: The system should be intuitive and accessible to users with varying levels of technical proficiency. This includes providing interfaces in local languages and ensuring the system is understandable to different demographics . 3. **Functional Requirements**: Improving property registration and user account management are essential functionalities. Users should be able to register properties, view them online, and interact with the system with minimal friction . 4. **High Availability and Performance**: Ensuring the system is available 24/7 and can handle user requests rapidly is fundamental to maintaining engagement . 5. **Feedback Mechanism**: Allowing users to provide feedback can inform system improvements and increase user satisfaction . 6. **Enhanced Communication Tools**: Developing features that improve communication between buyers, sellers, and brokers, such as email notifications or integrated messaging systems . 7. **Security and Integrity**: Implement robust security protocols to protect user data and ensure that only authorized personnel can modify sensitive information . 8. **Support for Diverse Transactions**: Extending functionalities to manage diverse property types and transactions while ensuring compliance with legal and tax requirements . Implementing these components can address existing challenges such as inefficiencies, high costs, and low user satisfaction, thus enhancing overall system performance and user engagement.

The system's functionality for generating reports can improve decision-making for administrators by providing comprehensive and timely information that includes data on sold, rented properties, and other relevant metrics processed by brokers. Administrators can view user feedback and suggestions, which are pivotal in adapting strategies to enhance services. The system's automated report generation ensures fast and efficient retrieval of necessary data, reducing the manual workload and potential errors associated with traditional reporting methods . Additionally, the ability to manage inputs, outputs, and crucial data effectively allows for accurate auditing and informed decision-making . The system's security and user-friendly interface also ensure that administrators can safely access data needed for critical decisions without technical barriers ."}

The use-case diagram for the broker service system highlights the interactions between external users and the system by defining specific roles and their tasks. Users such as sellers, renters, brokers, and administrators interact with the system to perform actions like registering properties, managing property listings, and generating reports . The diagram serves to illustrate system goals, identify user requirements, and show interactions among system actors . It aids in capturing the broader system functionalities from an outside perspective, ensuring that all external and internal factors influencing the system are addressed . Furthermore, the use case diagram is a part of the object-oriented design methodology, which improves system quality by enhancing user participation and reusability . It documents the architecture of the broker service, offering a tool to analyze and refine system requirements and design .

To ensure security and integrity while maintaining ease of use, the broker service system restricts database access to only the webmaster, broker, and administrator, preventing users from altering data themselves . The system accepts only known users and valid properties, enhancing security by ensuring that the information entered is legitimate . To enhance usability, the system is designed to be user-friendly by supporting modern browsers and providing customer interactions in a straightforward manner . It also supports multiple languages to accommodate users with different backgrounds . The system's design incorporates efficient data processing, minimizing server load, which ensures high performance and quick response times for users . Additionally, by being available online 24/7, the system allows ease of access and interaction anywhere with an internet connection .

The proposed system's non-functional requirements significantly impact performance and user satisfaction. Reliability is ensured as the system consistently performs its intended function, increasing user trust and satisfaction . The system is designed to be efficient, operating effectively with minimal resources, which improves performance by reducing load times, thereby enhancing user satisfaction . Security measures, such as access restrictions to sensitive data, bolster integrity and protect user data, contributing positively to both system performance and user trust . The system's availability 24/7 allows users to access information any time, improving satisfaction by meeting users' varied schedules . The ease of use and user-friendly design cater to different user proficiency levels, reducing learning curves and improving the overall user experience . High performance is also targeted through fast user response times and optimized server operations, ensuring that user requests are handled swiftly, thus directly impacting user satisfaction . These non-functional aspects are essential for maintaining system performance and maximizing user satisfaction.

The system administrator in a broker service system is responsible for creating and managing user accounts, including adding and updating user information, and removing users who no longer need access . They have the privilege to access and maintain the database, ensure data integrity and security, and manage system recovery processes . Additionally, the administrator reviews feedback from users and brokers, utilizes it to make improvements, and views reports on system activities, such as property transactions . They also ensure system reliability by validating important functions and safeguarding that only known users and valid properties interact with the system . Overall, the system administrator plays a crucial role in maintaining the integrity, security, and functionality of the broker service system.

You might also like