E-Learning System
E-Learning System
1. INTRODUCTION
E-Learning has many meanings to many persons. Some of the meanings given over time are
electronic learning, enhanced learning and enabled learning From the perspective of E-
learning in the educational institutions, students, teachers and administrators want the
teaching learning process to be easy, exciting and effective. Moreover, they expect
Information and Communications Technologies to enable and enhance the teaching
learning system.
E-learning is not limited to ‘digital literacy’ but may encompass multiple formats and
hybrid methodologies. In particular the use of software, Internet, CD-ROM, online learning
or any other electronic or interactive media.
E-Learning is defined as all forms of electronic supported learning and teachingwhich are
procedural in character and aim to effect the construction of knowledge with reference to
individual experience, practice and knowledge of the learner. E-learning is essentially the
computer and network enabled transfer of skills and knowledge.
1.1 Background
1|Page
Sheba University College is located in the city of Mekelle capital city of Tigray
Regional state, which is 780kms north of Addis Ababa. The university college
started its operation in mekelle in 1993E.C and in Aksum in 1997E.C as a
private limited company called “Sheba InfoTech and Business College” in
accordance with the commercial law of Ethiopia in the study area of Accounting
and Computer science at level of diploma program. Initially the college
commenced its educational and training services in a rented building. The
college was established with the objectives of providing educational and
training service to the peoples of Tigray in particular and to the peoples of the
neighboring regions of afar and Amhara.
In February 2004, the college moved to its own G5 and G2 two blocks story
buildings built and located at the center of mekelle, which is conductive and
stable for further development.
Generally the main problems observed in this college are the following:
2|Page
Lack of data retrieval
Lack of data retrieval the student may need the early data or document. Example, some
sample of the assignment, tutorial when somebody wants that he or she should get these
documents easily but if the documents are with different instructor it is impossible to get
because searching the documents from every office or instructor is very difficult
Losing of time
On the submission of assignment, project and proposals student would be not punctual.
Due to this reason for instructor it is difficult to posted marks of assignments, quizzes even
if posting of grade students.
When the teacher is absent
A lot of teachers are absent by any means from the class at this time the
students lose their time by waiting the teachers.
When the student is absent
When the student miss the class, all the topics covered in the class will not be thought. A
lot of student are absent from the class by different means example due to health problem,
family problem so at that time the students may not get the source easily .
Submission of assignment of student
When students submit their assignment a financial problem is happen because student lose
huge amount of money for hardcopy. On the submission of assignment, project, and
proposals, student would be not punctual.
Wastage of stationary material
In the manual system of the college giveshandout to the students by its budget then it loses
a lot of budget for the handout. It gives even for the students who have a laptop.
3|Page
Now a day, the growing number of university collage widens the gap in interaction
between students and instructors. However, the communication between the students and
the instructors of these institutions is limited by the geographical locations of the
university collages. So that everybody is isolated and runs its own means to have access to
different academic knowledge and materials interaction and the quality of education. A
system can be developed to minimize the gap of communication between the instructors
and the students and also between the students themselves.
Present day, the internet becomes the first place where students can find out solutions for
certain problems and academic materials such as books, instructor manuals, research
papers etc. Having a system that creates a common platform for open discussions and
learning environment would be helpful to realize the vision of the college.
Since Sheba College has less budget due to other campus projects and limited to use the
international technology development like E-learning systems. Therefore, this project will
try to develop or to construct the E-learning technology for Sheba University College.
4|Page
To test the quality of the E-learning system include registering students, searching,
update, delete, discussion form, withdrawal, add and drop, posting information.
On the other hand, the student at time of taking the assignment they do not lose time. The
teacher also does not lose time to give assignment, result of quiz, result of the assignment
and other materials.
Finally, it is also very necessary for the college to improve the educational system and to
minimize the losing of money for hardcopy.
1.7 Methodology
To accomplish this project the system requirement will follow methods, tools, models and
development of software life cycle techniques. The phases we are used list below:
5|Page
1.7.1 Data Gathering Techniques
The methods used to gathering data in this project is by interview of students, employee
and by observing the day to day activity of the college.
Although there are a number of sources to collect data from students, instructors, from the
web it was considered reasonable to select confidential data from official persons. ICT and
workers in the ICT increase the reliability of the data collected.
The technique used for sampling was positive sampling. By taking the limitations of time
and cost into consideration. It was decided to take a sample of five students and two
instructors for interview. Interview method was chosen for the following reasons:
Another method used for data gathering was observation. Totally we spent more than ten
hours for observation. The observation is made during the learning time of student.
In developing this system we follow an object oriented analysis and design method. Using
Object Oriented Analysis and Design methods to develop real-time systems has the
potential to produce safer, more reliable and maintainable code. Instead of using functional
decomposition of the system, the OOA approach focuses on identifying objects and their
activities. Using the object -oriented approach, system analysts model information systems
by identifying a set of objects, along with their attributes and operations that manipulate
the object data
To implementation this project we use PHP for front end and My SQL for back end.
6|Page
1.7.4 Testing methodology
After accomplish the project we used test method to evaluate the functionality of the
system.
1. Unit testing: this method used by selecting sample code and test that code if it fit
for use.
2. Integration testing: is performed to check whether the system perform all the
functional requirements or not.
3. Alpha testing: the system will be tested by giving the correct input.
4. Beta testing: the system will be tested for incorrect data input. If any failures will
occurred while testing the system in all the above testing methods, immediate
correction before moving to the next work so the system will achieve its goal
Chapter Two
2.1 Overview of the Existing System
The current learning system in Ethiopia is a traditional based where everyone should
communicate with the instructor face to face in order to ask even for a simple matter of
questions and difficulties. During regular classes teacher is restricted by time he/she has at
7|Page
his/her disposal. In addition, he/she cannot dedicate himself/herself entirely to
discussions with students.
The communication between the students and the instructors of these institutions is
limited by the geographical locations of the university collage. So that everybody is isolated
and runs its own means to have access to different academic knowledge and materials.
Although there are certain outstanding students and also instructors in the university
collage, their interaction is limited. With this, the university collage will not be able to
utilize the existing resource efficiently.
Having a system that creates a common platform for open discussions and learning
environment would be helpful to realize the vision of the university.
Developing and deploying effective E-learning programs may require products and
services supplied by a variety of vendors, leaving one to connect the dots. One way to start
is to define the goals of the desired learning solution. Definition of the goals of an E-
learning solution is driven by the following factors.
8|Page
following activity such us registering new users, registering students and
instructors, accessing files uploaded by the instructors and can be deleting,
searching, updating of users, instructors, students, program and courses are the
authority of administrator.
After registering students by using their own username and password they can
download materials in their provided class.
Instructors can add students from the student table to each class by checking their
department, courses and uploading materials to the student classes.
Students do not get information about: updated class scheduled Exam time,
tutorial class program, payment information and other. Because 50% of the
college students are coming from country side. Therefore, it was not more
standard.
They losses huge number of hard copy for storing files. So, this file is error prone, may be
exposed for natural disaster like fire, rain, dust etc. A lot of money would spend for paper.
The student must be physically come to register. This results the students to spent time
and money for transportation.
The communication between the students and the instructors is not smooth that means if
instructors need to inform students for meeting, for giving assignments, and to show their
results it is so hard to give information at the right time, accurately, and also for instructors
it is difficult for managing their time due to this reason, the students and instructors cannot
communicate easily to share their ideas.
Students cannot access or reads more information to capture to improve their knowledge
and skill, to create new things because materials that are given by the instructor are very
limited because of time, finance issues that means if students are the user of E-learning
9|Page
system you can get more information more than the hard copy due to this reason students
limit their knowledge in the short notes that are given by the instructor. Still now students
do not have access to pure information and additional soft copy like academic materials
such as books, tutorials etc, although there are certain outstanding students and also
instructors in the university, their interaction is limited. With this, the university collage
will not be able to utilize the existing resource efficiently.
II. Strength
It has file storage area in which different documents regarding on student information are
keep in a lot of hard copy in different places, put in a strong box, data of students are put in
hierarchy such as in instructor, registrar ,head departments .
10 | P a g e
2.1.4 Business Rule
The following rules are identified in the current system of Sheba University Collage.
Every student and Instructor must register in the system at beginning of each year.
Requirements for registering new student and Instructor: - A student and Instructor
must write full name, age, sex and address in the registration form fields exactly.
Instructors, student and user password and username are given by the
administrator of the E-learning system.
Students and instructors are if out of the member cannot be access the
E-learning system.
If students or instructors are forgot password and username you have to report for
the administrator.
If students cannot access materials you have to report for the teacher.
In order to secure the E-learning system all members of the e-learning system must
be needed username and password.
Instructors and students cannot delete, update their profile it can only be deleted or
updated by administrator.
The proposed system will provide a learning model where a community of learners is
created and students learn with and from one another, collaboratively, and the instructor
structures the lecture topics, provides expertise, and participates in the discussion and
group interaction.
11 | P a g e
Discussion forum
Posting notices
Search
Delete
Class schedule
Automatic email
Grade report
Exam scheduling
This project will do online student registration and searching name of the student
from the database is in the scope. Registering username and password for
administrator for database. Data recovery in case of data lost. The registration
report finally prints to the student.
Economic
12 | P a g e
This E-learning system reduces cost and increase profit of the university collage. For Sheba
University Collage this is useful in order to minimize financial problem budget like
reducing the hard copy of materials.
Security
Our E-learning system has a user account and password to login into the system for
administrating where student and instructors cannot access another user.
Efficiency
The E-learning system is very fast and has capability of high data.
Usability
The E-learning system will be easy to learn, operate and navigate using clear word, and
drop down list and the same for registration. The user interface kept as simple as possible.
So that the E-learning system is easy to understand.
Reliability
Students learning system must be available that every user can be registered by the
administrator at a given time. This E-learning notifies the user if there an incorrect input to
the system. Every user should fill by having there correct information mean that the user
name and password unless they cannot access the system.
Performance
The E-learning system must have a short response time that triggers on a press of a single
button. example to register new students, to registerinstructors, programs, class, courses,
to update instructors, departments and students ,to uploading, downloading files records
and to search students departments and classes instructor profile it perform in single
button.
13 | P a g e
Server Computer: For best performance, the system needs Server Computer with
IntelPentium4 CPU 3.20 GHZ, 200 GB of available RAM and 80GB of hard disk that
runs on any operating system (platform independent).
Client computer: The client computer should have the following specification. The
hard disk should be 400 GB, 4GB RAM
Switch: To enable local connection.
Router: To be connected with service provider.
Flash: A flash drive is a small storage device that can be used to transport files from
one computer to another.
Computer: Computer is an electronic device that is designed to work with
Information.
CD-RW, CD-R: these are used as storage devices that can be used to transport files
from one computer to another.
Software Requirements
14 | P a g e
Wamp server: WAMP (Windows, Apache, Mysql, and PHP/Perl/Python) WAMP is a
form of mini-server that can run on almost any Windows Operating System.
Adobe Photoshop CS3 : Photoshop is also image creation software as
well as an editor. .
Technology constraint:The platform used in this project window operating system such
as window xp, window 7, window vista. If we faced lack those operating systems we cannot
do well this project. in Unix/Linux are not worked
Resource constraint: There is lack of time and human skill power during the
development this project. And we have not sufficient equipment like CD and FLASH and
so on
Time constraints: There was mismatch of the project plan with the completion of the
project. There was shortage of time in doing the project due to lack of resources listed in
the resource constraints and since we are student and as such we learn, so time could
not use properly as the reason of quizzes and assignments.
Behavioral constraints: This software develops as text based. However for new user it
was not easier to use graphical user interface for well understanding and a person who
2.2.4.2 Assumptions
15 | P a g e
The people who access the E-learning system should have enough knowledge how to
use a computer, should know about the E-learning and should be in the university level,
the university collage should also networked area and fast. At this time the university
collage has a website so we are going to link the E-learning system to the main webpage
of the university collage and anybody can access it in the intranet environment.
Chapter Three
System Modeling
16 | P a g e
System modeling E-learning system helps we understand the functionality of the E-learning
system and model us how can we communicate with customer? In this E –learning system
project we use the iterative incremental development model. Particularly in e-learning a main
issue is student modeling, that is the analysis of student behavior and prediction of his/her
future behavior and learning performance. In fact, nowadays, the most prevailing issue in
the e-learning environment is that it is not easy to monitor students' learning behaviors.
17 | P a g e
Figure 3.1 Use case diagram of the system
18 | P a g e
Use case description for View resource
Use case Name View Resource
Participating Actors: Authenticated Student, instructor
Pre-condition The user of the system has already activated authenticate
user functionality and the user is on her/his department
official page
Entry condition The user clicks the resource button from hisdepartment
official page.
Web displayed student’s the course list page ofthe
department.
The user clicks on the course of his preference.
Webdisplays the course page.
The user clicks on the chapter with the media of his
Preference
Web displays the respected request.
Exit condition The user views the resource and closes thebrowser.
Post-condition The user has viewed the resource.
19 | P a g e
Pre-condition The user initiates the browser.
Entry condition The user activate web from his terminal using his
browser
Web responds by presenting the home page
The user view the information and click on his
preference link
Web presents the clicked link
Exit condition The user views the information and close the browser
Post-condition The user has accessed the home page and get access to none
restricted sites.
20 | P a g e
Pre-condition The user of the system has already activated authenticate
user functionality and the user is on her/his department
official page.
Entry condition The user clicks on grade-report button form the
official page of his department.
Web displays the grade report page.
User click on the Report button.(Alternate A)
web displays the pop-up for a user to enter
his password . (Alternate B )
The user enters the password and click on ok.
Web displays the grade report.
Exit condition The user views the report and closes the browser.
Post-condition The grade is displayed for the user.
21 | P a g e
official page.
Entry condition The user clicks on the chat button from his official
page of the department.
Web displays a chat-login page.
The user enters a chatting name and click ok
button.[Alternate A]
web presents the chat room labeled using the
user name..
Exit condition The user chats and closed the browser.
Post-condition The message is transmitted among chat makers.
22 | P a g e
official page.
Entry condition The user clicks on the download-resource button.
Web displays the course list page.
The user selects the course that he/she want.
Web display the download page.
The user selects the course and click ok.
Web download the file
Exit condition The user download and closes the page
Post-condition The resource is downloaded.
23 | P a g e
Entry condition User clicks on the create user button.
Web displays account creator form page with
the username, password, and id fields.
User adds an account and click ok.
Web displays the acknowledgement message.
Exit condition The user views the message and closes the
page.
E-learning system Sequence diagram describes interaction among classes of the E-learning
system such as student, Instructor, administrator and Classes in terms of an exchange of message
overtime. It models the behavior of these classes within a use case.
24 | P a g e
Figure 3.2 Sequence Diagram for login
25 | P a g e
Figure 3.4 Sequence Diagram for view information
26 | P a g e
Figure 3.5 Sequence Diagram for view resource
27 | P a g e
Figure 3.8 Sequence Diagram for view grade
28 | P a g e
3.3 Class Diagram
Class diagram is backbone of almost every object-oriented method including UML. They
describe the static structure of the E-learning system, describe responsibilities of a system. It
used to illustrate the relationship between object modeled in this E-learning system.
DESCRIPTION:
The class diagrams show the interactions between classes in the system. It is a basis for
designing the database for the system. The database will consist of the objects depicted by an
entity lifeline in the sequence diagram.
The classes are the foundation of object oriented programming which makes it easier to proceed
with the implementation.
29 | P a g e
Chapter four
System Design
4.1 Design Goal
Introduction
System design is the process and focuses on decomposing the E-learning system into
manageable parts. During requirements elicitation and analysis, we concentrated on the
purpose and the functionality of the system. During system design, we focus on the
processes, data structures, and software and hardware components necessary to
implement it. The challenge of system design is that many conflicting criteria and
constraints need to be met when decomposing the system.
The first step in designing a process is to map the essential model of user requirements
onto a configuration of process. Then, within each process, the designer must decide how
to allocate processes and data to different tasks. Finally, we must organize the processes
within each task into a hierarchy of modules, using modeling tool.
The goal of system design is to manage complexity by dividing the system into smaller,
manageable pieces.
30 | P a g e
Design goals
Maintenance criteria
When we say the system is maintainable, we mean it can be maintained easily when changes
arise from the user and designer/developers.
Cost
When we talk about cost we mean the cost required for maintenance, installation and develop the
system and to make the net worked computer to use the system effectively.
31 | P a g e
End user criteria
This is to mean the users of the system after the completion of the e-learning system, how the
system E-learning is used in friendly manner for both the experienced and inexperienced users
using the user interface and this is clearly stated in the users’ documentation.
Example the member of the system e-learning can use easily by using username and password
that gives the permission to access by the system administrator and this is pure for end user by
observing and reading the give icons.
Systems are classified in to roles. The “user” subsystem authenticates a user to grant access
based on the role of the user.
The “Student Registration” subsystem registers a student offline. It allows recording the detail
information of the student. “Student” subsystems are used to access the system that courses are
provide by the instructor.
The “Instructor” subsystem facilitates ads what subject teaches, in what class add students into
their class immediately from the database and Post course materials
Upload and download sub system instructor upload the course material to the students and
student are
32 | P a g e
Figure 3.11Layer representation of the E-learning system
33 | P a g e
4.3 System Architecture
The proposed system is expected to replace the existing manual system by an automated system
in all facets.
The architecture used for the system is a 3 tier those are database server, personal desktop and
web server. Client/Server Architecture where a client can use Internet browsers to access the
resource provided by the system within the local area network of the university. Figure 16 shows
the architecture of the proposed system.
The data tier maintains the applications data such as student data and employee data (teacher,
administrator). It stores these data in a relational database management system (RDBMS).
The middle tier (web/application server) implements the business logic, controller logic and
presentation logic to control the interaction between the application’s clients and data. The
controller logic processes client requests such as requests to view class, to retrieve data from the
database. Business rules enforced by the business logic dictate how clients can and cannot access
application data and how applications process data.
A web server is a program that runs on a network server (computer) to respond to HTTP
requests. The most commonly used web servers are WAMP and Apache. The web server used in
this system is WAMP. HTTP is used to transfer data across an Intranet or the Internet. It is the
standard protocol for moving data across the internet.
The client tier is the applications user interface containing data entry forms and client side
applications. It displays data to the user. Users interact directly with the application through user
interface. The client tier interacts with the web server to make requests and to retrieve data from
the database. It then displays to the user the data retrieved from the server.
34 | P a g e
Figure 3.13systemArchitecture
Database server is used store the data of student’s instructors departments uploading and
downloading materials .personal computer is used for the client to access the e-learning system.
The term web server can refer to either the hardware (the computer) or the software (the
computer application) that helps to deliver web content that can be accessed through the Internet
The most common use of web servers is to host websites, but there are other uses such as
gaming, data storage or running enterprise applications. A personal computer (PC) is a general-
purpose computer, whose size, capabilities, and original sale price makes it useful for
individuals, and which is intended to be operated directly by an end-user with no intervening
computer operator.
35 | P a g e
4.4 Deployment Diagram
Deployment diagram describes the physical architecture of e-learning system. They depict the
software components, processors, and devices that make up the e-learning system architecture.
A deployment modeling depicts a static view of the run-time configuration of processing nodes
and components that run on given below architecture and it shows: -
The hard ware for e-learning system
The software that is installed on the hardware
Depict the hardware/network infrastructure of an organization.
36 | P a g e
site. The server hosting the web site responsible for allocating all resources the web application
requires. In this project we dealing with web application.
Persistent modeling is used to depict the design of e-learning system database. The team is going
to use the relational database since it is the most used data base system recently. The persistent
classes are used to store most important and permanent information of the system. In persistent
modeling we will perform the following activities.
Identifying keys those keys are username and password to accesses the e-learning
system.
Primary key: is a key that uniquely defines the characteristics of each row. The
primary key has to consist of characteristics that cannot collectively be
duplicated by any other row.
Foreign: This will help us to show the relationship between two tables or classes.
Identifying entities: Entities which are the persistent classes will be stated with their
attributes.
37 | P a g e
Figure3.16 Persistent Diagram of E-learning System
38 | P a g e
4.6Access Control and Security
Participant Inflow goods Out flow goods User record Data base
actor record record record
Student
Search() Search()
View() View()
Download()
Teacher Search()
View()
Download()
Administrator
Delete() Update() Update() Backup()
Search() Search() Search()
View() Delete() Delete()
Update() View() View()
Register() Register() Register()
As you enter the system as administrator, student you should have a user name and password.
The system provides a login account form. Only user’s registers as administrators, student can
access the system. The system protected by password an it is protected by mechanism called
encryption. The other mechanism for protected the system is by session variable. When a user
leave or logout from the page the session variable is destroyed and then only entered again by
login form.
Security mechanisms are ways to protect e-learning data and resources against something bad
and attacks. Access controls are ways used to prevent unauthorized access of resources and used
to achieve security goals .We use the following access control mechanisms in particular:
39 | P a g e
Username: It is a name we use in order to be able to use a computer program or system. The
user identification is that which is required to access the system.
This command will normally be the first command given by the user.
Password: is a secret word or string of characters used for user authentication to prove
identity or access approval to gain access to a resource (example: an access code is a type
of password), which should be kept secret from those not allowed access.
40 | P a g e
Chapter Five
Implementation
5. Implementation
41 | P a g e
MYSQOL:
MySQL is currently the world’s most popular and widely used open source database technology
and data storage system. MySQL offers great reliability and ease of use. Reasons to choose these
MySQL is because of these Scalability and Flexibility. It is free, and comes with free
documentation as well as thousands of programmers that share their code that relates to
communicating with a MySQL database. In our project of e-learning system we use simply to
store the following lists:
Table -
Tables get created inside of your Database. Your database can hold multiple tables. One table
holds all of the data that you put into the join form here(name, email, location, password,
etc...).Another table holds and updates information about how many times tutorials here have
been viewed, by whom, and from where.
Field -
Fields are the slots where information is delivered. The field labeled "first name" in a table
would no doubt receive the user's first name when you write your script. So you create your table
and fields, then write forms and scripts to have people place their data into the database. Or write
scripts that update your database automatically on certain events.
Row -
A Row is each information set sent to the database. For instance, when you joined this site you
became a new row in our database table. That row consists of the fields: name, username,
location, password, sign up date, and a few other things.
Operating system; an operating system or OS is a software program that enables the computer
hardware to communicate and operate with the computer software. This operating system used to
well function this system when we want to run programs. This operating system helps to install
software’s that are needed to this project such as installWamp server, Dreamweaver.
Internet Explorer:It is web browser for display registrar information. The online registration
system web application will operate with the following Web Browsers: Microsoft Internet
Explorer version 9.0.
42 | P a g e
Firefox:It is web browser for display registrar information. The e-learning system application
will operate with the following Web Browsers: Microsoft fire fox.
Wamp server:WAMP (Windows, Apache, MySQL, and PHP/Perl/Python)WAMP is a form of
mini-server that can run on almost any Windows Operating System.
Environment
System environment The E-learning management system will be operated from the server.
Students, teacher and users will register their information details to the Web Server, the Web
Server will pass the overall information to the Server. The Server will then interact with the e-
learning management database, which allows the Windows type program to transfer data to and
from a database. At the last the server will forward the output to the client and then the user can
access it. Our E-learning system works in networked area.
Description: This code enables the user to check whether he/she is Authorized user and then it
redirects him/her.
<?php
$username=$_POST['user'];
$password=$_POST['pass'];
$con=mysql_connect('localhost','root','');
$db=mysql_select_db('registrar',$con);
$result=mysql_query("select * from user where username = '".$username."' and password = '".
$password."'") or die("error in selecting").mysql_error();
$num_results=mysql_num_rows($result);
if($num_results == 1)
{
for($i=0;$i<$num_results;$i++)
{
43 | P a g e
$row=mysql_fetch_array($result);
$Emp_id=$row['Emp_id'];
}
session_start();
$_SESSION['user']=$username;
include('empinfo.php');
}
if($username=0 && $password=0){
echo "<center><font color='red'><b>username and password empty. Please fill these
fields></font></center>";
}
else{
echo "<center><font color='red'><b>Access Denied</b></font></center>";
}
mysql_close($con);
?>
Registration module
To the student instructor and administrator we use the same fields and formats example to
register a student
44 | P a g e
Module 1 registering to the system
<div class="control-group">
<div class="control
<button type="submit" name="save" class="btnbtn-info"><i class="icon-save icon-
large"></i> Save User</button>
</div>
</div>
</form>
45 | P a g e
Second to insert/ registered data to the database we use the following code
<?php
Include(“connect.php”)//calling the data base connection
if (isset($_POST['submit'])) {
$un = $_POST ['un'];
$p = $_POST ['p'];
$p1=md5 ('p');
$fn = $_POST ['fn'];
$ln = $_POST ['ln'];
$mn = $_POST ['mn'];
$image = addslashes(file_get_contents($_FILES['image']['tmp_name']));
$image_name = addslashes($_FILES['image']['name']);
$image_size = getimagesize($_FILES['image']['tmp_name']);
move_uploaded_file($_FILES["image"]["tmp_name"], "uploads/" . $_FILES["image"]
["name"]);
$location = "uploads/" . $_FILES["image"]["name"];
// insert the student information to the database
mysql_query("insert into student(username,password,firstname,lastname,middle_name,location)
values ('$un','$p1','$fn','$ln','$mn','$location')
") or die(mysql_error());
header('location:student.php');
46 | P a g e
}
Sample output of student registration
Second to insert/ registered data to the database we use the following code
<?php
Include(“connect.php”)//calling the data base connection
<?php
if (isset($_POST['save']));
$un = $_POST['un'];
$p = $_POST['p'];
$fn = $_POST['fn'];
$ln = $_POST['ln'];
//// inserts the Administrator information to the database
mysql_query("insert into user (username,password,firstname,lastname) values
('$un','".md5($p)."','$fn','$ln')")or die(mysql_error());
header('location:user.php');
}
?>") or die(mysql_error());
header('location:student.php');}
47 | P a g e
Sample out put
5.1.1Testing
The team will perform different testing methodologies for its functionality and meeting user
need. First the team tests each unit during development. So, if a problem is encountered it will
immediately fixed. Second the team will perform an integration testing to check whether the
system meets all the functional requirements. The System will be tested using the following
system testing procedures.
Unit testing
We implement unit testing during development. So, if the error occurred it is immediately fixed.
The software is a collection of modules so that each module should test first. For example in the
project student registration and such are different modules. Therefore these modules should test
separately and maintainability could be easy.
48 | P a g e
Test Case1:
Test Case Name: Login
Valid user name & The system successfully The system successfully
password combination accept the user accept the user &
& display the display the profile page
profile page
Valid username & The system displays The system displays
invalid password “invalid username “invalid username
combination and/or password” and/or password”
Incorrect username & The system displays The system displays
Valid password “incorrect username “incorrect username
and/or password” and/or password”
Incorrect username & The system displays The system displays
incorrect password “incorrect username “incorrect username
and/or password” and/or password”
Null username & The system displays The system displays
password “please fill username” “please fill username”
Username & password The system displays The system displays
“please fill password” “please fill password”
Error analysis:
From the above table it shows the sample input values to the system. Five test suits are prepared
and tested. Form this first test displays he/she registers successfully. On the other hand as you
see from the validity we entered a repeated full name displays error or the student is exist, the
same for full name we entered the first name only it displays an error and the same for the other;
since they are clearly putted in the table.
Performance
49 | P a g e
So that based on the above testing suits the e- learning system has 80% performances that the
system works correctly since it detects many invalid inputs. Then we try with valid input then the
e-learning system accepts and we entered an invalid input that the system rejects. As an
administrator we apply performance testing, because when the administrator enters an invalid
input the E- Learning system responds him/her to enter the correct input. As an end user we
apply an alpha beta testing, because if he enter inputs that does not match with his record to see
materials for example the e- learning system respond him/her to enter the valid identifier. Finally
we apply recovery testing method, here this method works, for example he/she may click the link
“I didn’t access my account” so the system provides security questions to access it.
Integration Testing
In big bang approach most or all of the developed modules are coupled together to form a
complete e-learning system and then used for integration testing. Used to test individual software
components or units of code to verify interaction between various software components and
detect interface defects. Components are tested as a single group or organized in an iterative
manner. After the integration testing has been performed on the components, they are readily
available for e-learning system testing. In integration testing the individual tested units are
grouped as one and the interface between them is tested. Integration testing identifies the
problems that occur when the individual units are combined i.e. it detects the problem in
interface of the two units. Integration testing is done after unit testing.
Example the registration of students and instructors in the e-learning system is validated in the
php form and this is integrated with the database name by giving the same database name and
php name by checking the character of the name of database and validation name. The same as
the uploading and downloading files are integrated to the exact in put by links and action in the
php and database name.
Generally the e-learning system is success integrated by using links of database name and php
names by creating forms and actions. If the error happened easily possible to face the problem by
determining the link relational of the e-learning system.
Chapter six
50 | P a g e
Conclusions and Recommendations
6.1 Conclusion
Sheba University Collage has been used manual learning system and this leads to insufficient
managing and servicing process of users. For example in posting assignment, meeting if the
teacher absent, clashing of classes and takes time to deliver on individual students’, on the other
word it takes much amount of time to perform any activities. In this project we tried to automate
the e-learning system that was manual learning system such as registering students, department,
classes and course.
Uploading and downloading of materials deleting of those all record and retrieving of students’
records. This project also enhances and speeds up the working process of the registration system
by saving time, money and labor force of the university. We start by analyzing the problem and
then we make a design for the system. The testing we use testing by requirement for the purpose
of reliability and security. Finally we give a test inputs like testing such assystem testing,
integration testing, unit testing, alpha testing, beta testing and we observe that the system
performance becomes 80%. But the success of the software project is inspected in work
environment after implementation.
As we come to end of our E-learning system development, it is time to reiterate the work
previously have been done and check against our success indicators set at the beginning of the
project to determine whether the endeavor was a success.
The project began by laying out the foundation that dictates the development process. This
involved defining the system development methodology, identifying resource requirements, and
setting the project schedule.
We performed requirements analysis to discover the needs of the new solution to proposed
system. This phase consists of drawing out functional and non-function requirements of the
system. And then we performed object oriented analysis and object oriented design.
In analysis, we tried to model the new and proposed e-learning system using UML diagrams: use
case diagrams, sequence diagrams, Class diagrams, Activity diagrams.
51 | P a g e
In design phase, we extended our work in analysis with more models. The class type
architecture, Class diagrams in analysis were extended in design to step closer to
implementation, while deployment and component diagrams were also drawn. We also used
persistence modeling to have a feel of the database that would accompany the system.
Our development team believes that we have accomplished what we set out for in the beginning
of this project. We set to develop a working system prototype that would solve the problems in
the beginning of our project. But before winding up, we would like to give our final word on
how to go from here by recommending further improvement that could be made in the future.
Total Performance: The E-learning system project will be as we describe in the functionality
and scope of the project with using of different testing mechanism the E- learning system has
80% performances that the system works correctly.
6.2 Recommendations
Based on our experience in the process of this project undertaking we recommend:-
Because of the scope of the project we did not include online exam, discussion forum
functions. Hence, we recommend for the next developers to include these functionalities.
The E-learning system should be developed in such a way that Amharic characters are the
software characters. This is because students can use the software easily and friendly with
their own language.
The E-learning system should be developed to improve to accept video data types in
order to upload data from different social sites e.g. Face book.
We recommend that the programming language selection should be more appropriately to
the current technology for future use of this software.
Our current Performance is 80%, sothe next developers should work to improve the
performance.
52 | P a g e
Reference
Khan, B. H. (2005). Managing e-learning: Design, delivery, implementation, and
evaluation. Hershey, PA: Information SciencePublishing. (Website:
http://BooksToRead.com/elearning)
Khan, B. H. (2005). E-Learning QUICK Chuckle
St. Hershey, PA: Information Science Publishing. (Website:
http://BooksToRead.com/checklist)
Badrul H. Khanis Associate Professor, Educational Technology Leadership program, at
the George Washington University,
Washington, DC, and founder of the Books To Read.comWebsite (e-mail: khanb@
gwu.edu; bhk@BooksTo Read.com).
(Rossett, A. and Schafer, L. 2003.)
(Fletcher (1999), Kulik (1994), Willett, Yamashita & Anderson (1983))
(Stephen Walsh, Director, Kineo)
https://www.google.com.et/#q=sequence+diageram+for+automatic+email
http://www.e-learningconsulting.com/consulting/what/e-learning.html
[email protected]; [email protected]
53 | P a g e
Appendix
Annex 1
Login.php, logging in to the system,
$result=mysql_query ("select * from employee where username = '".$username."' and password = '".
$encrpass."'") or die("error in selecting").mysql_error();
session start(); ,the server provides a role for assigning session variables to be used throughout the whole page.
Include ('empinfo.php'); ;it enables the user to access the page with file name called admintask.php.
54 | P a g e
Annex 2: Interview questions
2. How do you see it the effective use of time considering in the attending of class?
4. Can you least some problem which can be solved by having E-learning system?
55 | P a g e
Reference
https://www.google.com.et/#q=sequence+diageram+for+automatic+email
http://www.e-learningconsulting.com/consulting/what/e-learning.html
[email protected]; [email protected]
Badrul H. Khanis Associate Professor, Educational Technology Leadership program, at
the George Washington University,
Washington, DC, and founder of the Books To Read.comWebsite (e-mail: khanb@
gwu.edu; bhk@BooksTo Read.com).
(Rossett, A. and Schafer, L. 2003.)
(Fletcher (1999), Kulik (1994), Willett, Yamashita & Anderson (1983))
(Stephen Walsh, Director, Kineo)
56 | P a g e
Appendix Interview questions
1. What is the problem in the present manual educational system?
2. How do you see it the effective use of time considering in the attending of class?
4. Can you least some problem which can be solved by having E-learning system?
57 | P a g e