Escolar Documentos
Profissional Documentos
Cultura Documentos
Application of web based system for Amhara Credit and Saving Institution
(ACSI)
North Gondar Area
Date
GetachewGedamu
MelsewBelachew..
List of Tables
62
List of Figures
Contents
Approval sheet............................................................................................................ II
8
Introduction.......................................................................................................... 1
1.1.
Background.................................................................................................... 1
1.2.
Literature Review................................................................................................. 6
2.1.
2.2.
SECTION THREE........................................................................................................ 11
3. Project methodology............................................................................................. 11
3.1 Introduction..................................................................................................... 11
3.2. Data collection method..................................................................................11
3.2.1 Interview................................................................................................... 11
3.2.2 Observation............................................................................................... 12
3.2.3 Document Review..................................................................................... 12
3.3. System Analysis............................................................................................. 12
3.3.1 Proposed System....................................................................................... 14
3.3.2 Feasibility study........................................................................................ 17
3.4. Design............................................................................................................ 20
3.4.1 Design goals.............................................................................................. 21
9
Action Plan......................................................................................................... 96
11
SECTION ONE
1. Introduction
Credit and Savings institution refers to an array of financial services, including loans,
savings and insurance, available to poor entrepreneurs and small business owners who have no
collateral and wouldn't otherwise qualify for a standard bank loan. Most often, microloans are
given to those living in still-developing countries who are working in a variety of different
trades, including carpentry, fishing and transportation. [3]
Web based systems are the ultimate way to take advantage of today's technology to enhance your
organizations productivity and efficiency. Web based application gives you an opportunity to
access your business information from anywhere in the world at any time. Some of the core
benefits of web based system are, Cross platform compatibility, more manageable, highly
deployable, secure live data, and Reduced costs.
Supporting the credit and saving sector with the Information Communication Technology (ICT)
is a major strategy to provide quality service to the clients. Automated systems offer real time
information flow. One way in which automated systems reduce human error and repetition is by
automatically populating some fields with information.
1.1. Background
Amhara Credit and Savings Institution (ACSI) was initially established on October 1995 as a
department with the former Ethiopian Relief Organization (ERO), the current Organization for
Rehabilitation and Development in Amhara /ORDA/. It was licensed by the National Bank of
Ethiopia as a micro finance intermediary share company in April 1997. [1]
Amhara Credit and Saving Institution North Gondar area was established on November 9, 1997,
it is one of the branches of the organization several branches which officially began the work of
micro finance before 18 years ago at Gondar. However, when the organization first commence
1
So, this project will fill the gap through developing web based system to the institution.
The general objective of the project is to develop web based credit and saving system for Amhara
Credit and Saving Institution (ACSI) North Gondar area.
1.3.2. Specific objective
process to store all transactions and uses to make some desire decision.
To guarantee security of the system by bases on the user and clients privilege.
The study covers ACSI North Gondar area only, because the investigatorsare near to this
institution so it was easy to gather information and to observe the activities by presenting
physically.
1.5.1 Limitations
Lack of adequate and accurate data when the team gather it.
Complexity of the business rules of the institution.
1.5.2 Delimitations
When the project team starts this project the team has proposed a number of functionalities to be
included in this project. The team put list of this functionalities in the scope part of this project
document. But due to limitations some of these functionalities are excluded from
implementation. Such as:
Online registration of customers. Because of the business rule of the
institution, it requires customers must register by presenting physically.
Transfer of money from one institution to another, due to lack of
capability of the team members.
services.
For their better satisfaction with fast services provided by the employees.
security of
For the project developers: For the project developers help for the fulfillments
Bachelors degree in Information science and team member can get experience.
SECTION TWO
2. Literature Review
Introduction
Credit and saving institution is a source of financial services for entrepreneurs, self-employees
and small and micro enterprise lacking access to banking and related services.
The purpose of this chapter is to introduce the finance academic community to the discipline of
microfinance and microfinance institutions, to understand functionalities of credit and saving
institutions and financial operational procedures. The project team perform a comprehensive
review of a number of related articles and address the issues of CSIs sustainability, products and
services, management practices, clientele targeting, regulation and policy, and impact assessment
in particularly in Ethiopia and also in other world. [5]
has
benefited
performance in terms providing wide range of finical services including: extending credit,
saving mobilization, money transfer and providing other related services to lower income
section of the population.
The formal banking system in the country presents many restrictions to the lower income
section of the population to access economic resources to finance their productive activities.
This has led to give more attention to credit and saving as financial intermediary through which
the poor section of the population gets access to financial services.
Amhara Credit and Saving Institution (ACSI)
Amhara Credit and Savings Institution (ACSI) was initially established in October 1995 as a
department with the former Ethiopian Relief Organization (ERO), the current Organization for
Rehabilitation and Development in Amhara /ORDA/. It was licensed by the National Bank of
Ethiopia as a micro finance intermediary share company in April 1997.
Amhara Credit and Saving Institution North Gondar branch was established on November 9,
1997, it is one of the branches of the organization several branches which officially began the
work of micro finance before 18 years ago at Gondar. However, when the organization first
commence the work have only 6 employees, but now they have increased their number into 16
due to day to day increase number of clients that demand the companys services.
The main vision of the organization is to see a reduced level of poverty through efficient,
sustainable and well developed institution that provide demand driven financial service for all in
sustainable way.
7
Conclusion
CSIs are decisive way outs from the vicious circle of poverty particularly for the rural and
urban poor segment of the society especially in a country like Ethiopia where many people
live barely below the absolute poverty line. The Credit and Saving industry of Ethiopia is
escalating in the face of the growing deep concerns for inflation and low interest rate in the
microfinance industry affecting the financial health and viability of CSIs.
SECTION THREE
3. Project methodology
3.1 Introduction
Methodology is the process used to collect information and data for the purpose of making
business decisions. The methodology includes publication research, interviews, surveys and
other research techniques, and could include both present and historical information.
10
This is one of the method used for the collection of data, and the reason why the researcher select
this method is that it gives informants the chance to challenge the agenda set by the researcher,
raising new issues, asking questions back,Collecting qualitative data, i.e. allowing the researcher
to probe the meanings interviewees give to their behavior, ascertaining their motives and
intentions, Giving informants the opportunity to check what is meant by a question; allowing for
long and complex responses,Flexibility - making possible changes in the order of questioning,
the questions asked and the topics discussed, Probing - follow-up questioning seeking
clarification or further explanation.
The researchers have the chance of asking different questions to the organization employee for
obtaining the required information and data. The project designers used this kind of collecting
data most of the time. We had the chance of talking to the manager of ACSI North Gondar
AreaAtoShiferawMekonen many times and we have collected enough information and we could
make another appointment if the team want additional information concerning the existing
system. Generally by using this method the team have gathered informations like, the date of the
institution was established, how they currently perform activities like saving and depositing of
money and business rule of the institution.
3.2.2 Observation
This is another type of method for collecting data and information in which could witness
the actual events which happen in the organization.It is very direct method for collecting data or
information, data collected is very accurate in nature and also very reliable, improves precision
of the research results, problem of depending on respondents is decreased, helps in
understanding the verbal response more efficiently, by using good and modern gadgets
observations can be made continuously and also for a larger duration of time period, observation
is less demanding in nature, which makes it less bias in working abilities, by observation, one
can identify a problem by making an in depth analysis of the problems.
In this method all team members have to do is observation and note down the events what the
team observed, so here the team members have seen some events like, employees are keeping
clients file manually, clients dissatisfaction by the service, calculation errors, takes time to search
clients file, takes large place for storing the files, and lack of data security are some of them.
11
Document Review
The project team uses this method as one means of data collection because it is relatively
inexpensive good source of background information, unobtrusive, provides a behind-the-scenes
look at a program that may not be directly observable, and may bring up issues not noted by
other means.
This method of collecting a data is analyzing the document prepared in the existing system. The
team analyzed different documents like forms and report samples in the existing system. In form
samples the researcher used information that the customers used to get services from the
institution like loan request forms, money deposit forms, withdraw forms and so on. And from
the report samples the team gathered information about the day to day activities of the institution.
The researchers used to identify the problems of the existing system and develop the new system.
The team has to follow sequential SDLC Phases to develop the system efficiently.
Systems Investigation: This is the first stage of the development of the system. In this stage the
analyst makes a survey by gathering all the available information needed for the system elements
and allocation of the requirements to the software. The team has identified problems to be
solved or operational functionalities that should be included in the system that the team proposes
to develop.
Planning: The designers have prepared detail development plan. During this first phase of the
development life cycle, security considerations are key to diligent and early integration, thereby
12
The team has listed functionalities or activities performed in the ACSI and identify by whom
each operations performed. Then the team has analyzed the relation between each operation, the
flow of operations and the relation between each operation and the actors in the system by using
different diagrams such as use case, class diagram, data flow, activity and sequence diagrams.
Systems Design: The system development team actually makes number of designs of the system
on paper or on the computer and sees to it that the rough image made of the system comprises of
all the requirements or not. Once this is done, the analysts have selected and finalized a best
suited design for the development of the system.
System Coding: The programmer translates the design into code. The coding step was very time
consuming and involves number of rooms for errors.
System testing: Once the programmers is through with the coding stage we tests the systems and
sees to it that it is working as per the expectations or not. The team corrects the flaws in the
system if any.
Systems Implementation: in this phase the team has to implement the system and receive
feedback from the users of the ACSI system.
Systems Maintenance and test: This is the last stage of the SDLC, in this stage the team has
understand the problems or errors phased when the team implement the system and feedbacks
received from users. Then the team has to maintain the system and see to it that it working within
13
To avoid all these limitations and make the working more accurately the system needs to
be computerized.
The aim of proposed system is to develop a system of improved facilities. The
proposed system can overcome all the limitations of the existing system. The system
provides proper security and reduces the manual work.
3.3.1.1 Purpose of the Proposed System
The
system
is
simple
to
design
and
to
implement.
It
requires
very
low
system resources and the system will work in almost all configurations. It has got the
following features
Security of data.
Ensure data accuracy.
Minimize manual work.
Minimum time needed for the various processing.
Greater efficiency.
Better service.
User friendliness and interactive.
Minimum time required.
3.3.1.2 Description of the proposed system
This project segregated into two sections and a number of modules or activities to be
accomplished. This will be described as follows:
14
15
System Architecture
16
system
is
built
on
the
three
tier
architecture
of
web
applications.
This part of the document is used to express the feasibility of the project in the organization as a
problem solver system.
Undergoing feasibility study to this project is used to understand and describe economic, legal
and political environment, the financial system, the area of the market segment and the
level of competition and unsatisfied demand of the products, the type of financial products to
be offered, the economic impact of the financial service to be offered and related issues. All
17
help to serve the project segment with specific risk profile before
The project have user-friendly interface to be operated by both employees and customers easily.
It is used to improve the current operations and to solve the major operational problems of the
organization. It will make the service delivery process efficient and effective.
The project is important for practicality of the specific technical solution and the availability of
technical resources and expertise. It is used to enhance the speed and accuracy of technical works
and to reduce technical errors in the Amhara Credit and Saving Institution North Gondar Area.
And it is easy to be utilized by any users of the organization.
Relevance of the technologies
18
The fulfillment of all the necessary requirements and budget makes our project to be completed
on time. If this so it will be completed on time without any delay as scheduled.
As depicted in the problem statement, currently the Amhara Credit and Saving Institution North
Gondar Area is exposed for unnecessary economical wastes in different ways such as man power
and time to calculate manually, documentation materials, calculation tools etc.
But after the project implementation these unnecessary wastes will be reduced. It will have the
required number of computers and infrastructure. But there will no more manual work and
unnecessary waste with manual materials. .
3.3.2.4.1 Cost and Benefit Analysis
Cost includes development costs, which are specifically shown in a table format, and ongoing
costs through the entire lifetime of the project, such as:
Operating staff salaries and overheads
Stationary and other consumable items
Maintenance of hardware, software and other equipment
Cost of backup arrangement.
Benefits
Benefits are shown as tangible and intangible benefits for the system.
19
Intangible Benefits:
Customer satisfaction
Improve employee morale and job satisfaction,
Better decision-making.
Work effectiveness
Competitiveness of the institution
3.4. Design
The project team have used Object Oriented method (approach) to develop our system, that is to
carefully represent complex relationship, as well as to represent data and process with consistent
notation throughout the system and to make our system efficient.
It is also used us for analyzing, designing and implementing the system by applying the objectoriented prototype and visual modeling throughout the development life cycles to foster better
stakeholder communication and product quality. Its additional advantages that make us to choose
it for our project are:
The ability to tackle more achieving problem domains.
Increased consistency among analysis, design and programming activities.
Common design and coding methodologies, including Object-Oriented Design (OOD),
Design Patterns, and the Unified Modeling Language (UML)
Explicit representation of unity among system components.
20
The design of our system considers or incorporates the following major goals.
Easy to implement: the design of the system is easy to change it in to implementation or
code for the project group. It is also easy to design and implement the database of the
system.
Flexibility: The team may have to change the way in which certain things work. The
design accommodates these changes with minimum effort.
Extensibility: The system design is be able to accommodate new functionality easily
when it is needed. Ideally when the institutional operations become enhanced, the team
must be able to add new stuff by adding code and not by modifying existing code,
because modifying existing code may break stuff that was already working.
Maintainability: The system is easy to maintain and improve at any time when the
organization needs.
Maintainability = Flexibility + Extensibility + Bug fixes + Refactoring.
Reliability: The system consists of all the major functionalities of ACSI.
Fault Tolerance: The system is fault tolerant to loss of connectivity with the routing
service or other faults.
Usability: the system is easy and user friendly users. It doesn`t require a high level of
expertise in computers. Any user can access it simply using user guide.
Response time:
21
The system is built from different operational activities accomplished in ACSI. These different
activities are performed by assigned actors that each activity concerned.
This part covers the detail analysis of activities included in the system by using different
diagrams (i.e. the relation between operational activities and actors, the relation between each
operational activity, the flow of operational activities, and the relation between states of the
system).
3.4.2.1 Use Case Diagram
The project team used Use case diagram to typically define interactions between a role (known
in Unified Modeling Language (UML) as an "actor") and a system, to achieve a goal. The actor
can be a human or an external system. The team used it as a blueprint for the system especially
for the interface design.
It is also used to describe what a system does and to reflect the view of the system from the Perspective of
a user outside of the system.
We used UML to design the use case model and derive systems object and their
interaction with each other with the users of the system.
Actors identification
The following actors are used in our system
Manager
Employee
Customer
Use Case Identification
The following use cases were identified
Manage customer
22
23
Details Button
6. The Manager can make changes on the desired data and clicks Update Button
7. The system displays Data Updated Successfully Database message
Name of use case: Delete Customer
Participating actor:Manager
Entry condition: The Manager logs in to the system using his account.
24
Flow of events:
1. The Manager logs to his account from the homepage of Web based system for Amhara
2.
3.
4.
5.
form.
6. The Manager enters the Loan details in the form and click Add button.
7. The system displays Added to the Database message
Name of use case: Update Loan Type
Participating actor:Manager
Entry condition: The Manager logs in to the system using his account.
Flow of events:
1. The Manager logs to his account from the homepage of Web based system for Amhara
Credit and Saving Institution North Gondar Area
2. The Manager clicks on the Manage Loan button
3. The system displays manage loan page and
4. The Manager clicks on the Loan Type link and the Update Loan Type page displayed.
25
select from loan types and select and click Fetch Details Button.
6. The system displayed the loan type details
7. The Manager selects the desired record from the loan types to Delete and click Delete
Loan Button.
8. The system displays Loan Type Deleted Successfullymessage
Name of use case: Check Loan Request
Participating actor:Manager
Entry condition: The Manager logs in to the system using his account.
Flow of events:
1. The Manager logs to his account from the homepage of Web based system for Amhara
Credit and Saving Institution North Gondar Area
2. The Manager clicks on the Manage Loan button
3. The system displays manage loan page
4. The Manager clicks on the Check Loan Request link and checks whether or not there are
loan requests from customers.
5. If there are loan requests from customers, the manager click either accept or reject the
loan requests based on the fulfillment of requirements.
6. If the Manager click the accept link, the system display the loan detail page.
26
27
28
Details Button
6. The Employee can make changes on the desired data and clicks Update Button
7. The system displays Data Updated Successfully Database message
Name of use case: Delete Customer
Participating actor:Employee
Entry condition: The Employee logs in to the system using his account.
Flow of events:
1. The Employee logs to his account from the homepage of Web based system for Amhara
Credit and Saving institution North Gondar Area
2. The Employee clicks on the Manage Customers Button
3. The system displays Delete user page
4. The Employee Selects from the lists of Customer ID from the combo boxand clicks on
the Delete Button
5. The system displays Customer Deleted Successfully message
Name of use case: View Financial Statement
Participating actor:Employee
Entry condition: The Manager and the Employee logs in to the system using their respective
accounts.
Flow of events:
1. The Manager and the Employee logs to their account from the homepage of Web based
system for Amhara Credit and Saving institution North Gondar Area
2. The Employee clicks on the View Financial Statement Button
3. The system displays View Financial Statement page
32
The project team used class diagram to describe the structure of a system by showing the
system's classes, their attributes, operations (or methods), and the relationships among objects.
For designing of Class diagram the team has usedUnified Modeling Language (UML). This
diagram is the main building block of our object oriented modeling. The team applies it for both
general conceptual modeling of the systematics of the application, and for detailed modeling
36
37
38
39
40
41
Methods
Request ()
Pseudo code: Do
The system allows the customer to request loan.
Accept ()
The system can accept the customer request.
Reject ()
42
Methods
Add ()
Pseudo code: Do
The system saves Account types and minimum balance into the data base.
Update ()
Pseudo code: Do
The system lets to edit Account types and minimum balance.
Delete ()
Pseudo code: Do
The system deletes Account types and minimum balance from the database.
F. Class name: loan _ accept
43
Methods
Accept ()
Pseudo code: Do
The system accepts the loan request and saves to the database.
G. Class name: Rejected _ information
Description:
A customer can have loan rejected information.
H. Class name : loan _ paid
Description:
A system lets the customer to pay their loan through manager.
A customer should pay at least the minimum amount of monthly
installment.
Methods
Pay ()
Pseudo code: Do
The system subtracts from the amount of loan he or she has received.
View ()
The system allows the customer to view his/her status.
I.
44
Description
The customer has an interest based on the loan amount.
Method
View ()
Pseudo code: Do
The system lets the customer to view his or her loan interest based on the amount they
have borrowed.
K. Class name: Loan _ type
Description:
There are a number of loan types to be selected when a customer wants to
request loan.
A customer should select one loan type for when he or she request loan to
the system.
The customer must have unique loan id to perform loan service.
45
As the name indicates the system used sequencediagram to show sequence of activities or how
processes operate with one another and in what order. It is a construct of a Message Sequence
Chart. It shows object interactions arranged in time sequence. It depicts the objects and classes
involved in the scenario and the sequence of messages exchanged between the objects needed to
carry out the functionality of the scenario. Sequence diagrams are typically associated with use
case realizations in the Logical View of the system under development.
With this diagram the project team show, as parallel vertical lines (lifelines), different processes
or objects that live simultaneously, and, as horizontal arrows, the messages exchanged between
them, in the order in which they occur. This allows the specification of simple runtime scenarios
in a graphical manner.
46
47
48
Fig.11 EMI
49
The project team used activity diagram to graphically represent the sequence flow of activities or
workflow of stepwise activities and actions with support for choice, iteration and concurrency. It
also used to model action that has been performed when an operation is executing as well as the
result of those actions. The activity diagram resembles the flow chart that shows the actions and
events as they occur and also the order in which the actions take place and identifies the
outcomes.
In the Unified Modeling Language, activity diagrams are intended to model both computational
and organizational processes (i.e. workflows). Activity diagrams show the overall flow of
control.
50
The project team used system design modelor system architectureto describe a system, or as a
detailed plan of the system at component level to make it easy for implementation. It is used us to
describe the structure of components, their interrelationships, and the principles and guidelines governing
their design and evolution over time.
Architctural design is used us for identifying the sub-systems making up the system and the
framework for sub-system control and communication. The key tasks of the web based ACSI are
to handle concurrent events from external users and maintain consistency between data resident
on the client, server, database and the data displayed to the end user.
51
The system design is decomposed from general to subsystems. The responsibilities or roles of
each subsystem are described clearly to be easily implemented. The project team can describe the
decomposition of the system in to main subsystems as follows:
52
When the project team say hardware/software mapping for the system, it describes how
subsystems are assigned to hardware and off-the-shelf components. It also lists the issues
introduced by multiple nodes and software reuse.
In this system design mainly there are three hardware components. The client side, server side
and database side. When the team applies the system, necessary software will be loaded to each
side hardware components. Network should be installed between each side. Then each sub
system software will be assigned and configured to the mapped hardware. Then the local area
network will be connected to the internet and the system will be functional.
But now it is a design phase. The hardware software mapping of the system is described below
with a simple diagram.
53
Internet
Client
Server
Database
The project team used deployment diagram to model the physical deployment of objects on
nodes. To describe the system, a deployment diagram would show what hardware components
("nodes") exist (e.g., a web server, an application server, and a database server), what software
components ("artifacts") run on each node (e.g., web application, database), and how the
different pieces are connected. The deployment diagram for the system is drawn below.
54
Browser: online viewers will be able to communicate with the web server using
browser.
Web Server: The project team using apache as the web server, and it will be
responsible for accepting from and responding request sent by the browsers.
Applications: This component will be a web application, made by using PHP i.e.
deposit, withdraw and transfer which will interact with the database.
Synchronize Service: This component will also be a web application, which will be
responsible for sending and receiving data.
Database: This will be responsible for storing information on the computer.
55
The project team use database tables to organize and group the data by common characteristics
or principles. The database contains eleven tables to organize our data. The team has described
database tables of the system as follows.
The project team used description of the data objects or items in a data model for the benefit of
programmers and others who need to refer to them.
Table
1
Accounts
Attributes
Data Types
Contraints
Description
acc_type
varchar(50)
NOT NULL
Account type
Primary key
minbalance`
varchar(20)
NOT NULL
Minimum
Balance
Complaint
Attributes
Data Types
Contraints
Description
Slno
int(250)
NOT NULL
comp_to
varchar(50)
NOT NULL
Complaint To
comp_from
varchar(50)
NOT NULL
Complaint from
Subject
varchar(150)
NOT NULL
complaint
varchar(750)
NOT NULL
Complaint
comp_date
Datetime
NOT NULL
Complaint date
Entity
3
Customer
Attributes
Data Types
Contraints
Description
Custid
varchar (20)
NOT NULL
Customer identification
Primary Key
56
varchar(50)
NOT NULL
First Name
last_name
varchar(50)
NOT NULL
Last Name
Age
int(3)
NOT NULL
Age
Address
varchar(200)
NOT NULL
Address
Kebele
varchar(35)
NOT NULL
Kebele
varchar(40)
NOT NULL
Electronic mail
Sex
varchar(15)
NOT NULL
Sex
phone_number
varchar(25)
NOT NULL
Phone Number
acc_number
varchar(25)
NOT NULL
Account number
Primary Key
Balance
Float
NOT NULL
Balance
acc_type
varchar(25)
NOT NULL
Account Type
Opendate
Datetime
NOT NULL
Open date
Table
4
Interest
Attributes
Data Types
Contraints
Description
acc_num
int(20)
NOT NULL
Account number
Primary Key
Date
Datetime
NOT NULL
Date
old_bal
Float
NOT NULL
Old Balance
Interest
Float
NOT NULL
Interest
tot_bal
Float
NOT NULL
Total balance
Table.4.interest Table
57
Loan
Attributes
Data Types
Contraints
Description
Custid
int(20)
NOT NULL
Customer Identification
Primary key
loan_type
varchar(50)
NOT NULL
Loan Type
loan_amount
int(20)
NOT NULL
Loan Amount
Duration
int(4)
NOT NULL
Duration
Name
varchar(25)
NOT NULL
Name
Address
varchar(150)
NOT NULL
Address
Profession
varchar(20)
NOT NULL
Profession
Income
int(20)
NOT NULL
Income
Tele
int(25)
NOT NULL
Telephone Number
varchar(30)
NOT NULL
Electronic Mail
Requestdate
Date
NOT NULL
Request Date
Status
varchar(20)
NOT NULL
Status
Attributes
Data Types
Contraints
Description
cust_id
int(20)
NOT NULL
Customer Identification
loan_id
int(20)
NOT NULL
Loan Identification
Table.5.loan Table
Table
6
loan_accept
Primary Key
Type
varchar(100)
NOT NULL
Type
Amount
int(50)
NOT NULL
Amount
Duration
int(20)
NOT NULL
Duration
start_date
Datetime
NOT NULL
Start Date
monthly_inst
int(20)
NOT NULL
Monthly Installment
Contraints
Description
Table.6.loan_accept Table
Entity
Attributes
Data Types
58
cust_id
int(20)
NOT NULL
Customer Identification
loan_id
int(20)
NOT NULL
Loan Identification
insta_date
Datetime
NOT NULL
Installment Date
pay_date
Datetime
NOT NULL
Payment Date
due_amount
int(20)
NOT NULL
Due Amount
inst_amount
int(20)
NOT NULL
Installment Amount
Balance
int(50)
NOT NULL
Balance
Status
Int(11)
NOT NULL
Status
Primary key
Table.7.loan_paid Table
Table
8
loan_type
Attributes
Data Types
Contraints
Description
loan_type
varchar(100)
NOT NULL
Loan Type
Primary key
Duration
varchar(20)
NOT NULL
Duration
loan_amount
varchar(50)
NOT NULL
Loan Amount
Table.8.loan_type Table
Table
9
login
Attributes
Data Types
Contraints
Description
user_id
varchar(200)
NOT
User id
NULL
DEFAULT '0',
user_password
varchar(200)
NOT
NULL
Primary Key
User Password
DEFAULT '0
user_type
varchar(200)
59
NOT
NULL
User Type
varchar(200)
NOT NULL
Question
Ans
varchar(50)
NOT NULL
Answer
Table.9.login Table
Table
10 rejected_information
Attributes
Data Types
Contraints
Description
cust_id
varchar(20)
NOT NULL
Customer Identification
Primary Key
Information
varchar(500)
NOT NULL
Information
Primary Key
Table.10.rejected_information Table
Table
11 transactions
Attributes
Data Types
Contraints
Description
Tranid
varchar(200)
NOT NULL
Transaction Identification
Trantype
varchar(200)
NOT NULL
Transaction Type
Tranmethod
varchar(200)
NOT NULL
Transaction Method
Date
Datetime
NOT NULL
Date
cheque_num
varchar(25)
NOT NULL
Cheque Number
acc_num
varchar(200)
NOT NULL
Account Number
Amount
varchar(200)
NOT NULL
Amount
current_balance
Float
NOT NULL
Current balance
Remarks
varchar(200)
NOT NULL
Remark
Custid
varchar(20)
NOT NULL
Customer identification
Table.11.transactions Table
60
3.5 Specification
3.5.1 Hardware specification
Hardware and software are components of any system. For the web based system hardware
describes the physical aspects of computers and related devices. Some of the hardware
requirements used to develop this project includes the following:
CD,CD-R,CD-RW
Flash disk, memory reader.
Personal computer
Table: 12 hardware specification
Item no
Hardware
Specification/use
RAM
Process data
Desktop computer
To do overall activities
Flash disk
CD-RAW Raw
Note book
As described earlier to develop web based system hardware and software materials are vital
components.
To develop web based system for ACSI North Gondar branch, the researcher uses the following
necessary software tools:
Xampp server
PHP
Micro media Dreamweaver 6/8
Adobe reader
Notepad
Microsoft office
61
Software
Specification/use
Microsoft
To draw diagrams
Adobe reader
XAMPP Server
micromediadreamweavercs6
Not pad
MY SQL database
PHP
To create codes
3.6Requirements Specifications
The following sections will introduce the numerous requirements of the system from the point of
view of different users and will introduce a number of decisions that have been made regarding
implementation.
3.6.1 Functional requirements
The system the team develops has different functions or features which are actions of the system
to satisfy the system needed and be acceptable to the user.
62
In the system which the team develops, these are requirements which are not the functionalities of
a system but features, characteristics and constraints of a system. These include:
Reducing the response time
Providing a system with user friendly interfaces
Provides a menu based functions
Secure access of confidential information.
flexible service based architecture will be highly desirable for future extensions
3.7 Implementation
This phase consists of implementing the requirements and design into code, data and
documentation and following coding methods and standards. Unit testing is also usually a part of
software implementation. Implementation includes the following points:
i.
63
Ensure that software coding methods, standards, and/or criteria are adhered to and
iii.
iv.
v.
verified.
Ensure that the software code is unit tested per the plans for software testing.
Provide a software version description document for each software release.
Provide and maintain traceability from software design to the software code.
The role of this chapter of the document is to describe the issuesraised during the implementation
phase of the project. The chapter incorporates:
3.7.1 Techniques of implementation
The project team used latest and simple technologies to implement this project such as PHP and
HTML to implement the interfaces and MySQL server for the database. First the project team
implements the interfaces based on the use cases. Then the team implements the database based
on the class diagram they have designed. Finally connect the two by calling one to the other and
the team link pages to go forward and back by using java script and sessions. When the team
writes codes they test each code to save time and effort.
Coding: - with this phase all the works during analysis and design will be turned on to a
functional system prototype which is divided into three parts.
Interface implementation
Database implementation
Logical implementation (implements the server side functionality of the system).
Interface Implementation
The project team implements basic pages/interfaces of the system based on the use case diagram
they have been designed. Mainly there are three interfaces for the three actors such as manager
login page, employees login page and customers login and accessing page. Under these pages
there are subpages through which subtasks are performed by the actors based on the use case
modeled. These pages were included as parts of the system in order to increase its
dynamicity.The project team used PHP and HTML to implement interfaces of the system.
Database implementation
64
65
66
67
Login Page for ACSI North Gondar Area Web Based system if you forgotten your Password.
68
69
70
71
72
Customers View Financial Statement Page of ACSI North Gondar Area Web Based system
href="admin_data.php"><FONT
face="Verdana,
Arial,
Helvetica,
sans-serif"
TYPE="button"
value="Print
Transaction
Details"
onClick="window.print()"
style="font-weight: bold"></p>20342096</FORM></p><p> </p><p>
<input
name="Submit2"
type="button"
class="admin_add_items"
id="Submit2"
Else {
echo "Please click here to login " . "<a href=index.php>Login Page</a>"; }
?>
3.8 Testing
Testing is one validation technique of the system with acceptable standard inputs from the
different testing types. Such as:
Unit testing: by which the team tested components individually.
Integration and system testing: the project team has tried to test the system for its integration
that justifies that major components of the system are working as per the requirements gathered.
77
This sub topic describes the plan for testing the system against its requirements. The purpose of
these system test plan is to make sure that the system complies with the definition of the software
requirements.
The test plan focuses on how the testing for the project will proceed, which units will be tested
and what approaches (and tools) are to be used during the various stages of testing. The test Plan
is a collection of all test specifications for a given area of the system. The Test Plan contains a
high-level overview of what is tested for the given feature area. Test case specification has to be
done separately for each unit.
The team considered the following major tasks to prepare system test plan and performing the
system tests:
The major features to be put in the test check list and performed through the system test process
depending on the system testing requirements include:
-
Withdrawal form
Complaints Form
Add loan type
Create password
For the test plan the team used both the two popular approaches of system testing. Because both
of them have different roles for the effectiveness of the system. The properties tested by one
approach are not covered by the other. That is why use two approaches.
Static vs. dynamic testing approach
Static testing: this method is used us for review, inspection and verification of the
system. In this method the team can check source code structure by using programming
tools/text editors or the team can check syntax and data flow as static program analysis
by using compilers (pre-compilers).
Dynamic testing: the team used this approach for actually executing programmed code
with a given set of test cases and to validation it. Typical techniques for this are either
using stubs or drivers or execution from a debugger environment.
No special resources are required for testing the system beyond those already needed for
development.
The following are list of materials such as hardware requirements, software requirements and
people or focus groups used for testing each features.
Laptops
Software the team used for development such as xampp Server, browsers, operating
systems, application softwares(Office, UML),Dreamweaver
Web Server machine(pc with web server software as web server)
Database server (pc with database server software)
People like project team, focus groups, organizational person: for crowd test
79
The team has to develop test case specifications from the test plan and are the second phase of
the test development life cycle. It should explain "how" to implement the test cases described in
the test plan.
With test Case Specification the team describes the purpose of a specific test, identify the
required inputs and expected results, provide step-by-step procedures for executing the test, and
outline the pass/fail criteria for determining acceptance.
3.8.5.1 Test case specification identifier
The project should use unique identifier to identify this test case specification, its level and the
level of software that it is related to. Preferably the case specification level will be the same as
the related software level. Ideally the case naming convention should follow the same general
rules as the software it is related to. This is to assist in coordinating software and test ware
versions within configuration management. Such as:
Test procedure
Precondition
ExpectedOutpu
result
Output
Customer
Registration form
database,
Employee
added to the
home page
database
o
1
Login form
Fills
User
Name, HOME
80
Display
Not
login Success
successfully,
Pleas enter the
correct user id
or password
Manager
Fills
Type,
Duration,
Add
to
the Success
database
Amount.
or
Create Password
Manager
Add
to
the Success
Password,
confirm
database
or
password,
secrete
Record
is
question,
Answer,
already exist
Authentication type
Table.14. Input data and expected results of the system after testing.
Test
name
Deposit
Precondition
ExpectedOutpu
result
Transaction
type
method, Page
Completed
Amount,
Successfully
Account
,Transaction
number,
Remark
2
Withdrawal
Transaction
type
Completed
,Transaction
method,
81
Output
number,
Amount, Page
Successfully
Remark
Table.15. Input data and expected results of the systemnot yet tested.
The scope of the system testing encompasses the systems based features, computer software,
hardware, and their interfaces. The software to be tested is the web based system. Information on
what the system must do can be found in the Software Requirements Document. Information on
how the system works is listed in the Architectural Design Document and the Detailed Design
Document.
Each test specification should contain the following items:
Case No.: The test case number should be signed with its identifier
Title: the title of the test.
ProgName: the program name containing the test.
Author: the person who wrote the test specification.
Date: the date of the last revision to the test case.
Background: (Objectives, Assumptions, References, Success Criteria): Describes in
words how to conduct the test.
Expected Error(s): Describes any errors expected
Reference(s): Lists of reference documentation used to design the specification.
Script: (Pseudo Code for Coding Tests): Pseudo code (or real code) used to conduct the
test.
82
The team has to identify all inputs required to execute the test case. Again these may vary based
on the level the case is written for. The team has to be sure to identify all required inputs not just
data elements and values. Input specifications include:
Identify all outputs required to verify the test case. Again these may vary based on the
Level the case is written for. Again the team have to be sure to identify all required outputs not
just data elements and values.
Field
Test Item
Input Type
Output
Test case1.01
First Name
Character
/\@,
Test case1.02
Last Name
Character
/\@,
Test case1.03
Age
Number
83
valid
Character
a-z@a-z.com
Valid
otherwise
Invalid
Test case1.05
Phone Number
Number
0-9
Valid
otherwise
invalid
Table16. Test Case 1.Register Customer
Case Field
Test Item
Input Type
Output
Character
/\@,
Invalid
Identifier
Test case2.01
User Id
User
Id
otherwise Valid
Test case2.02
Password
Character
Empty
Invalid
Password
otherwise Valid
Table.17 Test Case2.Login
Case Field
Test Item
Input Type
Output
Character
/\@,
Identifier
Test case3.01
Loan Type
otherwise Valid
Test case3.02
Duration
Number
0-9
Valid
Duration
otherwise Invalid
Test case3.03
Amount
Number
0-9
Valid
Amount
otherwise Invalid
84
Case Field
Test Item
Input Type
Character
Empty
Output
Identifier
Test case4.01
Create
Password
Password
not
be
must
empty
otherwise Valid
Test case4.02
Confirm
Character
Empty
Password
Confirm Password
must not be empty
otherwise Valid
Test case4.03
Secret
Select
Select
question
Valid
Secret
question otherwise
Invalid
Test case4.04
Answer
Character
Correct
Valid
otherwise
Invalid
Table. 19. Test Case4.Create Password
3.8.5.2.3 Environmental needs
The system test includes Hardware configurations and limitations, system software (e.g.,
operating systems, compilers and tools), other software applications, facilities, training).
Definitely a setup of software and hardware on which the testing team performs testing is test
environment. It consists of the Test Server setup, Network setup, Test PC set up, Reporting
environment setup etc. Lets go in details now.
Setup of Test Server: Every test cannot be appropriate in local machine so the team need
to set up test server with xampp for php, java based applications with mail servers.
Network set up: network with internet or without internet, with in the same network or
private network for testing, so that the congestion that is occurred during testing doesnt
hamper
the
other
members
involved
85
in development
(developers,
designers,
The system Test Procedures describe the test preparations, test cases, and test procedures to
beused to perform qualification testing of the system or subsystems. These include:
Test preparations, including hardware and software.
Test descriptions, including: Test identifier, System requirements addressed by the test
case, Prerequisite conditions, Test input, Expected test results, including criteria for
evaluating results, and assumptions and constraints, Criteria for evaluating results.
Requirements traceability.
Identification of test configuration.
The project team has to identify any prerequisite test cases. It is also recommended that the
relationship of test cases be documented at both ends of the relationship.
3.9 Documentation
After the completion of the proposed system everything that the project team members
discussion and activities, process procedures will be documented. The documentation phase
explains how it operates or how to use it, or may mean different things to people in different
roles.
Technical: Manuals, instructions, tutorials, procedures, specifications, etc., that accompany a
piece of equipment or software, and provide guidance for its proper use and maintenance.
86
4.2 Dissemination
Dissemination is the process of making the results and deliverables of a project
available to the stakeholders and to the wider user. Dissemination is essential for takeup, and take-up is crucial for the success of the project and for the sustainability of
outputs in the long term. The project work is basically do the web based system of
ACSINGA in such easy way and it is disseminated to ACSINGA for managing its
asset properly and to the community.
All dissemination should have a purpose, and support or inform project development
in some way. The purpose of the activity may be to:
Raise awareness let others know what the team are doing
Inform educate the community
Engage get input/feedback from the community
Make sustainable ensure that the effects would be sustained after the project.
4.2.1. Dissemination method
Publications
The project team have planned to present the project and describing its results
through publication (like Credit and savings multimedia service, radio air time
program).
Conferences and workshops
and also the project team have planned to present the project when the organization
prepares conferences, workshops, or case studies based on the technology and related
issue.
Website
88
SECTION FIVE
5. Budgeting
5.1. Budget of the project
Table 20: Budget for Stationary
S/n
Items
Measurement
Quantity
Unit Price
Total
A4 Paper
Ream
90.00
180.00
Pen
PCS
10
5.00
50.00
DVD-RW
PCS
25.00
50.00
Flesh disk(8GB)
PCS
280.00
280.00
Grand Total
560.00
Description
Printing
Copy
Telephone
Binding
Miscellaneous expenses
Total expense
100.00
50
150.00
30.00
200.00
530.00
Description
Total expense
89
Remark
Stationary
560.00
Service
530.00
Grand total
1,090.00
90
91
92
7.2 Recommendation
Improved access to credit and saving services can enable the poor to smooth out their
consumption, manage their risks better, build their assets, develop their micro-enterprises,
enhance their income-earning capacity, and enjoy an improved quality of life.
94
References
1. YigremKassa (2010). Regulation & Supervision of Microfinance Business in
Ethiopia. Ethiopia press, National Bank Of Ethiopia
Appendixes
A. ACSI System Users manual/guide
System Manager
System manager has a highest power of the system.
He or she registers customers and employees, update customers details and employee
details, and deletes customers and employee details.
Set Password for customers and employees, update passwords for customers and
employees.
Perform Transactions (i.e Deposit and Withdrawal) for Customers and employees.
Manage loan(check loan request, processes loan)
Steps how manager processes customer loan request
96
Steps to go
1.
2.
3.
4.
5.
6.
Questions
Questions that the team used for interview to collect necessary information
1.
2.
3.
4.
5.
6.
97
C. Accomplished Forms
98