Uploaded by NaziR

20103257 tushar practicum-report

advertisement
Development of
House Renting System
...............................................A Practicum Report Submitted by
MD. Tahmidur Rahman Tushar
ID-20103257
In the Partial Fulfillment of the Requirements
for the Award of Bachelor of Computer Science and Engineering (BCSE)
Department of Computer Science and Engineering
College of Engineering and Technology
IUBAT – International University of Business Agriculture and Technology
Fall 2023
Development of House Renting System
MD. Tahmidur Rahman Tushar
A Practicum report submitted in the Partial Fulfillment of the Requirements for the Award of
Bachelor of Computer Science and Engineering (BCSE)
The report has been examined and approved,
___________________________
Prof Dr. Utpal Kanti Das
Chairman
Dept. of Computer Science and Engineering
IUBAT – International University of Business Agriculture and Technology
___________________________
Rashedul Islam
Assistant Professor & Coordinator
Dept. of Computer Science and Engineering
IUBAT – International University of Business Agriculture and Technology
___________________________
Md. Nazir Ahmed
Lecturer
Dept. of Computer Science and Engineering
IUBAT – International University of Business Agriculture and Technology
Fall - 2023
iii
LETTER OF TRANSMITTAL
15th December, 2023
The Chairman
Practicum and Placement Board
College of Engineering and Technology - CEAT
IUBAT- International University of Business Agriculture and Technology 4
Embankment Drive Road, Sector- 10, Uttara Model Town
Dhaka-1230, Bangladesh
Subject: Letter of Transmittal.
Sir,
With due respect, I would like to inform you that it is a great pleasure and a great pleasure for
me to submit this report entitled “Development of House Renting System” to complete my
Practicum course.
It was a great opportunity for me to work on this project to make my theoretical knowledge
more realistic and I gained a lot of exposure to the business culture of a famous company. I
now look forward to your kind commentary on this performance report.
I will always be very grateful to you if you kindly go through this report and check my
performance.
Thanking you,
____________
MD. Tahmidur Rahman Tushar
ID-20103257
iv
STUDENT’S DECLARATION
I am MD. Tahmidur Rahman Tushar, a student of the BCSE-Bachelor of Computer Science
and Engineering program, under the College of Engineering and Technology (CEAT) of the
International University of Business Agriculture and Technology (IUBAT) announcing, this
report entitled ‘Development of House Renting System' has been prepared for the completion
of the CSC 490 job training course, which is part of the Bachelor of Computer Science and
engineering degree.
The report and the project "Development of House Renting System" was edited by me. All
modules and procedures for this project are done after proper testing and online information.
It is not designed for other purposes, awards or presentations.
_____________
MD. Tahmidur Rahman Tushar
ID-20103257
v
SUPERVISOR’S CERTIFICATION
This is to ensure that the Practicum report on the “Development of House Renting System”
is compiled by MD. Tahmidur Rahman Tushar, with ID-20103257, of IUBAT– International
University of Business Agriculture and Technology, as part of the fulfillment of the required
part of an effective defense course. The report has been prepared under my supervision and is
a record of the work accomplished, successfully completed. To the best of my knowledge and
as per his declaration, no portions of this report have been posted anywhere by any degree,
diploma or certificate.
You are now allowed to submit a report. I wish his every success in his future endeavors.
Practicum Supervisor
_______________________________
Md. Nazir Ahmed
Lecturer
Department of Computer Science and Engineering
IUBAT–International University of Business Agriculture and Technology
vi
DEPARTMENT’S CERTIFICATION
On behalf of the Department of Computer Science and Engineering, IUBAT-International
University of Business Agriculture and Technology, I undersigned, confirm the performance
report ‘Development of House Renting System for Bachelor of Computer Science and
Engineering (BCSE) degrees was duly presented by MD. Tahmidur Rahman Tushar (ID20103257) and approved by the department.
___________________________
Md. Nazir Ahmed
Supervisor, Lecturer
Department of Computer Science and Engineering
IUBAT- International University of Business Agriculture and Technology
___________________________
Rashedul Islam
Assistant Professor & Coordinator
Department of Computer Science and Engineering
IUBAT- International University of Business Agriculture and Technology
___________________________
Prof. Dr. Utpal Kanti Das
Chairman
Department of Computer Science and Engineering
IUBAT- International University of Business Agriculture and Technology
vii
ABSTRACT
House renting system, developed using PHP, introduces a user-friendly interface allowing
users to search for rental homes based on locations such as districts and local areas.
Acknowledging the transformative impact of technology, the housing sector seeks innovative
strategies for seamless rental house management. While distance vector routing protocols have
proven efficient in current internet and wireless networks, their vulnerability to network
routing-based attacks necessitates a new approach. We propose a rental house renting system
that simplifies tasks for managers, enhancing efficiency and effectiveness. User input values
are sent to the server for processing, where comprehensive management of rental house
information takes place, addressing the challenges posed by the dynamic landscape of rental
property management. The House Renting system is an online platform that will help to find
the perfect house which process is easy, convenient, and affordable.
viii
ACKNOWLEDGMENTS
I would like appreciate and acknowledge all the people who has encouraged and supported me
through the entire journey and has played a great role the completion of my Practicum and the
report on “Development of House Renting System”. First of all I would like to thank
Almighty for uncountable and beyond to words reasons and for giving me the power to stay
motivated all the time for completing any task.
I would like to thank our Vice Chancellor, Chairman, Coordinator, Academic supervisor, Md.
Nazir Ahmed, Lecturer of the Department of Computer Science and Engineering of IUBATInternational University of Business Agriculture and Technology, who has encouraged me
throughout the entire time and has provided me with all the necessary guidelines and support
that I needed. He was always there whenever I needed any help. He is a very humble and kind
person and is always happy to be a helpful and supportive.
I would also like to convey my special regards to my family. It was for them who encouraged
and stayed beside me throughout my entire life. I wouldn’t have come this far if they were not
there for me.
I convey my thanks to my friends and ask for apologies from anyone and everyone whose
name has not been mentioned.
ix
INTERNSHIP CERTIFICATE
x
TABLE OF CONTENTS
Letter of Transmittal ....................................................................................................... iv
Student’s Declaration ...................................................................................................... iv
Supervisor’s Certification ............................................................................................... vi
Department’s Certification ............................................................................................ vii
Abstract .......................................................................................................................... viiii
Acknowledgments ............................................................................................................ ix
Internship Certificate ........................................................................................................x
List of Figures .....................................................................................................................1
List of Tables ......................................................................................................................2
Chapter 1. Introduction ....................................................................................................4
1.1 Introduction ............................................................................................5
1.2 Project Overview ...................................................................................5
1.3 Background Study ..................................................................................6
1.4 Objectives ..............................................................................................6
1.4.1 Specific Objective ...................................................................6
1.5 Scope of the project ...............................................................................7
1.6 Methodology ..........................................................................................7
1.7 Limitation of the Project ........................................................................7
1.8 Process Model ........................................................................................8
1.8.1 Why Incremental Process Model ............................................8
1.9 Feasibility study .....................................................................................9
1.9.1 Technical Feasibility ...............................................................9
1.9.2 Economic Feasibility ............................................................10
1.9.3 Operational Feasibility ..........................................................10
Chapter 2. Organizational Overview ................................................................................11
2.1 Organization Introduction ....................................................................12
2.2 Organization Services ..........................................................................12
2.2.1 Web Development ................................................................12
2.2.2 Mobile Application ...............................................................12
2.2.3Digital Marketing ...................................................................13
xi
2.3 Organization Vision .............................................................................13
2.4 Organization Mission ...........................................................................13
2.5 Organization Location .........................................................................13
Chapter 3. Requirement Engineering ............................................................................14
3.1 Requiement Analysis ...........................................................................15
3.2 Requirement Engineering ....................................................................15
3.2.1 User and system Requirements .............................................15
3.2.2 Functional Requirements ......................................................16
3.2.3 Non Functional Requirements. .............................................17
3.3 Use Case Diagram................................................................................17
Chapter 4. System Planning ............................................................................................18
4.1 Function Description ............................................................................19
4.2 System Project Planning ......................................................................20
4.2.1 System Project Estimation. ...................................................21
4.2.2 Function Oriented Matrix. ....................................................21
4.2.3 Function Poin Estimation......................................................22
4.2.4 Task Scheduling. ...................................................................27
4.2.5 Project Schedule Chart. .........................................................28
4.2.6 Cost Estimation. ....................................................................28
Chapter 5. Risk Management .........................................................................................32
5.1 Risk Analysis .......................................................................................33
5.2 The RMMM Plan .................................................................................34
5.3 Project Risks ........................................................................................35
5.4 Technical Risk .....................................................................................36
5.5 Tool Risk..............................................................................................37
5.6 Requirement Risk.................................................................................38
Chapter 6. Analysis Modeling.........................................................................................39
6.1 Analysis Modeling ...............................................................................40
6.1.1 Objectives of Analysis Model. ..............................................40
6.2 Activity Diagram .................................................................................40
6.2.1 Activity Diagram For Admin. ..............................................41
xii
6.2.2 Activity Diagram For House Owner. . ..................................42
6.2.3 Activity Diagram For Tenant ................................................43
6.4 Entity Relationship Diagram (ERD) ....................................................43
6.5 Data Flow Diagram (DFD) ..................................................................44
6.5.1 Constext Level DFD. ............................................................45
6.5.2 Level 1 DFD. ........................................................................46
6.5.3 Level 2 DFD of Process 1. ....................................................47
6.5.4 Level 2 DFD of Process 2. ....................................................47
6.5.5 Level 2 DFD of Process 3. ....................................................48
6.5.6 Level 2 DFD of Process 4. ....................................................48
6.5.7 Level 2 DFD of Process 5. ....................................................49
6.5.8 Level 2 DFD of Process 6. ....................................................49
6.5.9 Level 2 DFD of Process 7. ....................................................50
Chapter 7. Designing .......................................................................................................51
7.1 Database Field Design .........................................................................52
7.2 Interface Design ...................................................................................54
Chapter 8. Qaulity Assurance .........................................................................................57
8.1 System Testing .....................................................................................58
8.1.1 System Testing Strategy. ......................................................59
8.2 System Testing Methodology ..............................................................59
8.3 Testing Design .....................................................................................60
Chapter 9. Conclusion .....................................................................................................63
9.1 Preface..................................................................................................64
9.1.1 Practicum ang its value. ........................................................64
9.2 Conclusion ...........................................................................................65
9.3 Limitations ...........................................................................................65
9.4 Future Plan ...........................................................................................66
References .........................................................................................................................67
xiii
LIST OF FIGURES
Figure 1.1 Incremental Process Model ..................................................................................... 9
Figure 3.1 Use Case Diagram. ................................................................................................ 17
Figure 6.2.1 Activity diagram for Admin. .............................................................................. 41
Figure 6.2.2 Activity diagram for House Owner.. .................................................................. 42
Figure 6.2.3 Activity diagram for Tenant.. ............................................................................. 43
Figure 6.3 ERD of House Renting System. ............................................................................ 44
Figure 6.4 Context Level DFD. .............................................................................................. 45
Figure 6.5 Level 1 DFD. ......................................................................................................... 46
Figure 6.6 Level 2 DFD processs 1. ....................................................................................... 47
Figure 6.7 Level 2 DFD processs 2. ....................................................................................... 47
Figure 6.8 Level 2 DFD processs 3. ....................................................................................... 48
Figure 6.9 Level 2 DFD processs 4. ....................................................................................... 48
Figure 6.10 Level 2 DFD processs 5. .................................................................................... 49
Figure 6.11 Level 2 DFD processs 6. ..................................................................................... 49
Figure 6.12 Level 2 DFD processs 7. ..................................................................................... 50
Figure 7.1 List of Tables in Database. ................................................................................... 52
Figure 7.2 User Table Structure. ............................................................................................ 52
Figure 7.3 House Table Structure. ......................................................................................... 52
Figure 7.4 Booking List Table Structure. .............................................................................. 53
Figure 7.5 Saved Property Table Structure. ........................................................................... 53
Figure 7.6 Review Table Structure. ....................................................................................... 53
Figure 7.7 User Registration Interface. .................................................................................. 54
Figure 7.8 User Login Interface. ............................................................................................ 54
Figure 7.9 Homepage Interface.............................................................................................. 54
Figure 7.10 User Profile Interface. ......................................................................................... 55
Figure 7.11 Admin panel User List Interface. ....................................................................... 55
1
LIST OF TABLES
Table 4.1 Function Description DET and RET ...................................................................... 19
Table 4.2 Identifying Complexity (Transaction Function) ..................................................... 22
Table 4.3 Identifying Complexity (Data Function) ................................................................ 24
Table 4.4 Unadjusted Function Point Contribution (Transaction Function) .......................... 25
Table 4.5 Unadjusted Function Point Contribution (Data Function) ...................................... 25
Table 4.6 Total Degree of Influence ....................................................................................... 26
Table 4.7 Project Scheduling Chart ........................................................................................ 28
Table 4.8 Personal Cost .......................................................................................................... 29
Table 4.9 Hardware Cost ........................................................................................................ 30
Table 4.10 Software Cost ........................................................................................................ 31
Table 4.11 Other Cost ............................................................................................................. 31
Table 4.12 Total System Development Cost .......................................................................... 31
Table 5.1 Project Risk(PR1) ................................................................................................... 35
Table 5.2 Technical Risk ........................................................................................................ 36
Table 5.3 Technical Risk ........................................................................................................ 36
Table 5.4 Technical Risk ........................................................................................................ 37
Table 5.5 Tool Risk................................................................................................................. 37
Table 5.6 Requirement Risk ................................................................................................... 38
Table 5.7 Requirement Risk ................................................................................................... 38
Table 8.1 Testing Scenraio 1 .................................................................................................. 60
Table 8.2 Testing Scenraio 2 .................................................................................................. 61
Table 8.3 Testing Scenraio 3 .................................................................................................. 61
Table 8.4 Testing Scenraio 4 .................................................................................................. 62
Table 8.5 Testing Scenraio 5 .................................................................................................. 62
2
Chapter 1
Introduction
3
1.1 Introduction
An internship is a way to put theoretical knowledge into practice and can be seen as a first step
toward familiarizing oneself with a company and gaining the self-assurance necessary to
launch a career. IUBAT—International University of Business Agricultural and Technology
provides this opportunity by enabling us to complete an internship while we are enrolled
students to develop competence through the most appropriate options. After graduation, the
employment market is extremely competitive for everyone. The student is given the chance to
use the knowledge and abilities they have learned in the classroom and in the real world during
their undergraduate education. This report contains all the information and descriptions of the
project created during my 12 weeks Web Development internship at Kodeeo Limited
Bangladesh.
The project titled “House Renting System” is assigned to me by my university supervisor for
the fulfillment of the requirement of the Practicum course. The entire project was developed
during the 12 weeks internship period at Kodeeo Limited. The project is solely developed for
the sake of completion of the Practicum and it is not being used anywhere else.
This report is generated to describe all the processes and works that have been done during the
development of this project. This report contains all the details of the development phase of
the project with proper illustration.
1.2 Project Overview
Everyone is familiar with the concept of house renting websites in this modern day. Finding a
house physically how much hassle we have to face everyone knows about that. It's messy and
time-consuming to find a house by wandering the streets. This website helps you to find a
perfect house. Finding your dream rental is as easy as a click with our state-of-the-art house
renting system. With our site, renting becomes easy for both landlords and tenants. We've
simplified the process, making it efficient and straightforward. For landlords, managing
4
property listings and connecting with potential tenants is a breeze. Tenants can easily find their
ideal home, access detailed property information, and navigate a transparent leasing process.
Our platform is designed to bring convenience to both parties, ensuring a smooth and hasslefree rental experience. Say goodbye to the complexities – our site is here to empower house
owners and tenants alike, making the entire rental journey simple and accessible for everyone
involved.
1.3 Background Study
To create our user-friendly house renting system, we dug into the challenges faced by landlords
and tenants in traditional renting time-consuming searches, opaque processes, and complex
negotiations. These frustrations have driven us to a flowline the rental experience. Our system
simplifies property management for house owners and enhances search for tenants, meeting
the need for efficiency, transparency and convenience. Considering the trend of reliance on
online services, we have adopted technology to make renting accessible and easy. In essence,
our system is built on a solid background study, ensuring it caters to the real needs in today's
ever-evolving rental landscape.
The emphasis on security and transparency within our platform is a direct response to common
concerns in the rental market, fostering trust between house owners and tenants. Features such
as advanced search options and detailed property information are thoughtfully crafted based
on a thorough analysis of user preferences and expectations. Ultimately, this website serves as
the solid foundation for the development of the house renting system, ensuring that it not only
acknowledges but effectively addresses the real needs of both house owners and tenants in the
ever-evolving landscape of property rentals. It's our commitment to making the rental journey
smoother, more transparent, and ultimately more satisfying for everyone involved.
1.4 Objectives
Board Objective: The board objective of this project is to develop a software to maintain the
track records of tenant, owner, monthly rent, maintenances and other related issues. Also is to
use our educational experience in the real life working environment.
5
1.4.1 Specific Objective
The specific objective of this project are listed below:
➢ Store and manage tenants and owners details.
➢ Build a web based Online House Renting System to fulfill requirements such as tenant
management, owner management and user management.
➢ Well-designed database to store information.
1.5 Scope of the project
Simplifying property listings and tenant interactions for house owners, making the rental
management process more efficient. Enhancing the tenant experience with an easy-to-use
platform, streamlined searches, and transparent leasing processes. Aligning with the growing
trend of online service reliance, leveraging technology for accessibility in the competitive
housing market. Emphasizing security and transparency features to establish trust between
house owners and tenants, addressing common concerns in the rental market. Catering to the
increasing demand for efficiency, transparency, and convenience in the rental market. Building
a project adaptable to the evolving landscape of property rentals, ensuring responsiveness to
emerging market needs and user expectations.
1.6 Methodology
The development of House Renting System has been done with an incremental model. The
system has been developed according to the structure described in Software Analysis and
Design below. This study on ‘Development of House Renting System’ preliminary in nature.
1.7 Limitation of the Project
This project has some limitations those we have planned to develop in future. The limitations
are:
❖ Renters (tenants) cannot pay monthly rent separately.
❖ Embedded account management and some other module is needed to be implemented.
❖ Here renters (tenants) will not get any mobile SMS notifications.
6
1.8 Process Model
I chose incremental process model for the development of the system. The incremental model
is a developed version of the waterfall model. This product is designed, implemented,
integrated and tested as a series of incremental builds.
The reasons for which I have selected the Incremental Process model are as follows,
•
The incremental model prioritizes requirements of the system and then implements
them in groups.
•
Develop high-risk or major functions first
•
Each release delivers an operational product
•
Customer can respond to each build
•
Lowers initial delivery cost
•
Initial product delivery is faster
•
Customers get important functionality early
1.8.1 Why Incremental Process Model
•
This model can be used when the requirements of the complete system are clearly
defined and understood.
•
Major requirements must be defined; however, some details can evolve with time.
•
There is a need to get a product to the market early.
•
A new technology is being used
•
There are some high risk features and goals.
•
Construct a partial implementation of a total system.
•
Then slowly add increased functionality.
•
The incremental model prioritizes requirements of the system and then implements
them in group.
7
•
Each subsequent release of the system adds functions to the previous release, until all
designed functionality has been implemented.
Figure 1.1 Incremental Process Model
1.9 Feasibility study
A feasibility study is an analysis of how successfully a project can be completed; accounting
for factors that affect it such as economic, technological, legal and scheduling factors.
Feasibility study determines whether that solution is feasible or achievable for the organization.
There are three major areas of feasibility study:
•
Technical feasibility
•
Economic feasibility
•
Operational feasibility
1.9.1 Technical Feasibility
A technical feasibility study is a complete study of a project regarding inputs, processes,
outputs, areas, programs and procedures. This is a very effective tool for long term planning
and troubleshooting. Basically, the technical feasibility study should support the financial
information of the organization. A technical feasibility assessment focuses on understanding
the current technical resources of the organization and the applicability of the proposed system
to the anticipated requirements. This is an evaluation of the hardware and software and how
they meet the needs of the proposed system.
8
Hardware Requirements
•
Computer (Desktop/Laptop/Equivalent)
•
Proper electricity Support
•
Adequate system memory and secondary memory
Software Requirements
•
Operating System (Windows 8.1 or equivalent) with any web browser
•
PHP
•
XAMPP Server (MySQL)
1.9.2 Economic Feasibility
The purpose of an economic feasibility assessment is to determine the positive economic
benefits that a proposed system will have for an organization. Our system is economically
viable because using the proposed system, many jobs can be done in a short time that cannot
be done simultaneously by humans. The system also reduces the personnel required to maintain
products, order details, customer information and payment details. So, if the current system
requires many employees, they have to pay less, and they pay more. It can be said that it is
economically profitable.
1.9.3 Operational Feasibility
Operational feasibility addresses concerns about user acceptance, management support, and the
requirements of entities and factors in the organizations external environment. It’s easy to insert
inventory products and easy to create stocks. If the stuff of the organization has the basic to
computer knowledge they could operate the software easily. Every features and the activity that
are combined within the system is designed and developed belongs to previous format they had
used with a more attractive user interface.
The proposed system is designed from a client‘s point of view. So, all of the features are included
only to benefit the portal‘s users. And this system supports them all.
9
Chapter 2
Organizational Overview
10
2.1 Organization Introduction
Kodeeo Company Limited is a Bangladeshi company providing complete web solutions,
software development, mobile applications, graphics and multimedia services, domain hosting
and digital marketing. Its core consists of highly skilled designers and developers with over 5
years of experience in a variety of complex designs and developments. With services including
website design and development, mobile application design and development, software
development, SEO and social media design and development, Kodeeo Ltd. satisfy your
customers. In all areas of our operations, we work hard to understand customer requirements
and provide solutions Kodeeo Ltd. We strongly believe in the philosophy “Our vision is to
help every young person become competent and employable”. We pride ourselves on our team
of highly qualified, knowledgeable and motivated professionals who are encouraged for
leadership, innovation and excellence. Our team is comprised of leading experts who share a
common vision and passion, providing clients with the information and guidance needed to
succeed in today's competitive environment. We believe in providing expert and excellent
services through our experience and providing the best possible service utilization to our
customers. (Kodeeo Company Limited).
2.2 Organization Services
Kodeeo Company Limited is a leading provider of IT services, including all types of creative
and professional software, enterprise software integration, management information systems,
e-commerce, game development Play and develop Web and mobile application solutions.
2.2.1 Web Development
At Kodeeo Ltd, we focus on creating interactive, search engine friendly website designs. It is
a known fact that to build a strong web presence and ensure the countless marketing
opportunities available on the Internet, it is mandatory to have a good website, thereby
triggering a race in web design . While designing and developing your website, our experts
keep in mind key factors such as ease of navigation, overall consistency and quality of content,
stipulated deadlines and budgets as well as auxiliary support.
2.2.2 Mobile Application
We have a strong mobile application developer team of professional engineers who are
experienced in creating versatile mobile applications for various industries. All our expert
engineers work on Android and iOS platforms for more than 5 years. We work on stock
Android, delivering faster app response and quality assurance. We can design, build, prototype
and execute your ideas through planning, construction, testing and deployment.
1
2.2.3 Digital Marketing
Kodeeo Ltd offers different types of packages to help your business perform at its best in the
internet world. Digital marketing involves promoting products or brands that are essential to
the success of a business. It increases your web visibility among your potential customers. The
more exposure you get, the closer you get to your business goals. This is the most important
strategy to grow your business. Kodeeo Ltd is a full-service digital agency with clients ranging
from well-known businesses to innovative startups. (Kodeeo Company Limited).
2.3 Organization Vision
Kodeeo Ltd's vision. is to empower youth and build successful IT businesses in digital
Bangladesh. Their mission is to become one of the leading IT companies in Bangladesh.
Through the innovative use of technology, Kodeeo Ltd. gain competitive advantage and
increase operational effectiveness and efficiency.
2.4 Organization Mission
Kodeeo Ltd. was established as a one-stop shop for a skills development platform. Client needs
are satisfied in respect to their attributes thanks to their services and the excellent staff behind
them.
My position in this organization I am a development intern in this organization. I am guided
by a supervisor in this organization. It was very helpful and informative. I really learned a lot
from him. I completed my project on time. This was only possible thanks to the advice of my
supervisor. It was also a great experience for me to maintain working time at the office. I also
followed other organizing instructions. I am happy to be a part of this office. It definitely helped
prepare me for the start of my career.
2.5 Organization Location
House 15 Road-10 A, Sector 11, Dhaka 1230
Phone: 01854969657
Email: info@kodeeo.com
Web: www.kodeeo.com
12
Chapter 3
Requirement Engineering
13
3.1 Requirement Analysis
The software designer can use requirement analysis to translate data, architectural, interface,
and component level designs into information, function, and behavior. During the task phases,
which are listed below in this chapter, the requirement analysis was finished.
3.2 Requirement Engineering
Requirements engineering, as its name suggests, is a subfield of engineering that is concerned
with developing software systems and recognizing user requirements. There are several
definitions of requirements engineering, but they all agree that it involves understanding what
users anticipate from a computer system and what their requirements mean for the design.
Requirements engineering is closely related to software engineering, which is primarily
focused on the method of building the system that customers want.
The following are the results of the requirement engineering for this project:
•
User requirements
•
System requirements
•
Functional requirements
•
Non-Functional requirements
3.2.1 User and System Requirements
The House Renting System has 3 types of users,
1. Admin
2. Tenant
3. House Owner
The user and system requirements of the project House Renting System are as follows,
1. Every role needs to registration.
1.1 System needs related information like phone number or email, password for
registration.
14
2. User (property owner or manager) should be able to easily list their available
properties for rent, including details such as property type, location, rent amount.
2.1 System should have user friendly interface.
2.2 System should have property details form.
2.3 Allow users to upload high quality photos images of the property.
3. Tenants should be able to submit rental applications online, providing their personal
information, rental history, and references.
3.1 Develop a user-friendly tenants can easily book houses.
3.2 Allow tenants to enter their employment details, including employer names,
income, and references if applicable.
3.3 Ensure that tenant data is collected and stored securely.
3.4 Provide tenants with a confirmation message or notify after successfully
submitting their rental application.
4. User, as tenant, can see the details of houses, other owners, tenants and book houses.
4.1 System needs information of houses, owner id, owner name, email, occupation for
the see the details of houses and owners.
4.2 System needs owner id, house id, booking date, period, price, and agreement to
book the houses.
5. Tenants should be able to make p..ayments online through various payment methods.
5.1 Provide tenants with the option to make payments using various payment
methods, including credit/debit cards, bank transfers, and mobile payment
services (Bkash, Rocket, DBBL, Nagad).
3.2.2 Functional Requirements
1. Here any user can sign up as owner or tenant and can give their details.
2. After registration user can sign in as owner or tenant on their own platform.
3. User can see the information of houses as view house and can see the list of rating.
4. Owner can add the detail of houses and can see the tenants list.
5. Tenant can see the information of houses and can book the houses.
6. Tenant can see the information of owners and other tenant’s information.
7. Owners and tenants can log out from their own platform.
15
3.2.3 Non-Functional Requirements
•
Security Requirements: Transaction Record, General Users and Admin must be
Authorized
•
Reliability Requirements: The System should be consistent and should give the
desired results.
•
Efficiency Requirements: The Software should be efficient enough to take less
memory of the computer System; there should not be any performance degradation.
•
Usability Requirements: The System should be easily usable by the Actors.
3.3 Use Case Diagram
Figure 3.1 Use Case Diagram
16
Chapter 4. System Planning
17
4.1 Function Description
Function description descriptive the function in details. It concerns on three factors: what is the
possible input, possible output for a particular function and which table of the database uses by
that function.
Table 4.1 Function Description : DET and RET
Functionality
Input
Output
User can register as tenant or Click sign in
Name, Email, Password, Mobile No,
owner by clicking on the sign
Role
up.
Owner
can
sign
in
fore Click sign in
Email, Password, sign in as owner.
entering in their own platform.
Owner can see the details of Click see details below House ID, Owner ID, No. of
houses.
the houses & then they bedrooms, no of bathroom, Address,
can add houses.
City, State, Description, flat and
floor number, Photos of the houses.
Owner can see the details of all Click see details below Owner ID, Name, Email, Mobile No,
Owners.
the owners.
Occupation, No. of houses owned,
Address, City, State, Country.
Owner can see the details of all Click see details below Tenant ID, First Name, Last Name,
bookings.
the booking and they
Email, Mobile No, Occupation.
can book houses also.
Tenant can sign in for entering Click sign in
Email, Password, sign in as tenant.
in their own platform.
Tenant can see the details of Click see details below House ID, Owner ID, No. of
houses.
the houses.
bedrooms,
No.
of
bathroom,
Address, City, State, Flat and floor
18
number, Description, Rate for rent,
Photos of the houses.
Tenant can see the details of Click see details below Owner ID, Name, Email, Mobile No,
Owners.
the owners.
Occupation, No. of houses owned,
Address, City, State.
Tenant can see the details of Click see details below Tenant ID, First Name, Last Name,
alternates.
the tenants then they Email, Mobile No, Occupation.
can add members and
rating to houses.
Tenant can see the details of Click see the details Tenant ID, House ID, Booking Date,
all booking.
below the Booking, Period, Price, House type.
Then they can book
house.
4.2 System Project Planning
Before starting any project, it is compulsory to estimate the work to be done, the
resources that will be required, the time that will elapse from start to finish and to
analyze the project to determine whether it is feasible or not.
The following activities of software project planning that have followed in this
project are:
➢ System Project Estimation
➢ Function Oriented Metrics
➢ Process Based Estimation
➢ Effort Distribution
19
➢ Task Scheduling
➢ Project Schedule Chart
➢ Cost Estimation
4.2.1 System Project Estimation
The accuracy of a software project estimate predicated based on a number of things:
• Properly estimated the size of the product to build.
• The ability to translate the size estimation into human effort, calendar time and
money.
• The degree to which the project plan reflects the abilities of the software team or
engineer.
• The stability of the product requirements and the environment that supports the
software engineering effort.
Software size estimation is the most important matter that I had to consider during the software
project. If the software size not calculated properly, then various problems such as scheduling
problems, budget problem etc may arise. As the project goes on before estimating the software
size, I had to confirm that software scope is bounded.
4.2.2 Function Oriented Metrics
Function point-based estimation focuses on information domain values rather that software
values. Function points are computed by comparing five information domain characteristics.
The information domain values are as follows
Data Functions
•
Internal Logical File
•
External Interface File
Transaction Functions
•
External Inputs
•
External Outputs
•
External Inquires
20
Number of external outputs – Each user output that provides application-oriented
information to the user is counted.
Number of external inquires – An inquiry defined as an on-line input those results in the
generation of some immediate software response in the form of an on-line output. Each
distinct inquiry counted.
Number of Internal Logical files – Each logical internal file is a logical grouping of data
that resides within the application‘s boundary and is maintained via external inputs.
Numbers of external interfaces – All machine-readable interfaces that used to transmit
information to another system counted.
4.2.3 Function Point Estimation
Identifying Complexity (Transaction Function)
Table 4.2 Identifying Complexity (Transaction Function)
Transaction Functions
Fields/File involvement
FTRS
sign up (EI)
Fields-Name, Email, Password, Mobile No, 1
DETS
6
Role, Address.
File- house-rental
Houses (EI)
Fields-Owner ID, No of bedrooms, No of 1
13
washrooms, Flat number, Floor number,
House type, Rent amount, Upload Pictures,
Country, state, city, Address, Description
File- house-rental
Display houses (EQ)
Fields-House ID, Owner ID, No of rooms, 1
10
Address, City, state, Country, Description,
Rent amount, Pics of the house
File -house-rental
Owners (EI)
Fields-Owner ID, Name, Email, Mobile No, 1
occupation, No. of houses owned, Address,
City, State, Country
file- house rental
21
10
Display Owners (EQ)
Fields-Owner ID, Name, Email, Mobile No, 1
9
Occupation, No of houses owned, Address,
City, State, Country.
File- house rental
Tenants (EI)
Fields-t-id, phone no, name, email, gender, 1
6
dob
File house rental
Display Tenants (EQ)
Fields-Tenant ID, Name, Image, Email, 1
6
Mobile No, Dob
File-house rental
Booking (EI)
Fields-Booking ID, House ID, Booking Date, 1
6
House Name, Price, House Owner Name
File-house rental.
Rating (EI)
Fields-Name,
Profession/role,
Rating, 1
4
profession/role,
Rating, 1
4
Content
File- house rental
Display Rating (EQ)
Fields-Name,
Content
File- house rental
Identifying Complexity (Data Function)
Table 4.3 Identifying Complexity (Data Function)
Transaction Functions
Fields/File involvement
RETS
Favorite (ILF)
Favorite id, house id, house name, 1
house owner name, rent amount,
house
type,
house
description
22
address,
DETS
8
house-rental (ILF)
Fields-booking,
houses,
Logs, 1
7
member, owner, rating, tenant
Payment (ILF)
Payment id, status, date, amount, 1
5
name
Unadjusted Function Point Contribution (Transaction Function)
Table 4.4 Unadjusted Function Point Contributions (Transaction Function)
Transaction functions
FTRS
DTES
Complexity
UFP
Sign Up (EI)
1
6
Low
3
Houses (EI)
1
13
Low
3
Display houses (EQ)
1
10
Low
3
Owners (EI)
1
10
Low
3
Display Owners (EQ)
1
9
Low
3
Tenants (EI)
1
6
Low
3
Display Tenants (EQ)
1
6
Low
3
Booking (EI)
1
6
Low
3
Review and rating (EI)
1
4
Low
3
Display Rating (EQ)
1
4
Low
3
Total
30
23
Unadjusted Function Point Contribution (Data Function)
Table 4.5 Unadjusted Function Point Contribution (Data Function)
Data Functions
DETS
Complexity
UFP
rental 1
7
Low
7
Favorite
1
8
Low
7
Payment
1
5
Low
7
house
RETS
(ILF)
Total
21
Total Degree of Influence
Table 4.6 Total Degree of Influence
GSC
DI
1: Data Communications
2
2: Distributed Data Processing
3
3: Performance
4
4: Heavily used Configuration
2
5: Transaction Pate
0
6: Online Data Entry
4
7: End User Efficiency
2
8: Online Update
4
9: Complex Processing
2
10: Reusability
4
24
11: Installation fare
0
12: Operational fare
1
13: Multiple Sites.
3
14: facilitate Change
3
Total Degree of Influence (TDI) (Range 0 to 70 - influence size by ±35%)
34
Final Calculation
Total UFP = UFP (TF) + UFP (DF)
= 30 + 21
=51
Value adjustment factor (VAF) = (0.65+ (0.01* TDI))
= (0.65+ (0.01* 34))
= 0.99
Adjusted Function Point (AFP) = Total UFP * VAF
=51*0.99 = 50.49
Effort for PHP = 53.33 * 50.49
= 2692.63 Person Hours
= 2692.63 / 8 Person Days (Working 8 Hours in a day)
= 336.57 Person Days
= 336.57 / 25 Man Months (25 working days in a month)
= 13.46 Man Months
=13.46 / 4 = 3.36
Approximately 3.4 months required for 4 persons to finish the project.
4.2.4 Task Scheduling
Project scheduling is an activity of distributing the estimated efforts within the planned project
duration. There are some basic rules for project scheduling. They are as follows,
Compartmentalization – The project must compartmentalize into a number of manageable
activities and tasks.
25
Interdependency – The interdependency of each compartmentalized activity or task must be
determined. Some tasks must occur in sequence while others can occur in parallel.
Time allocation – Each task to be scheduled must allocated some number of work units.
Effort validation – Every project has a defined number of staff members. It should ensure that
no more than the allocated number of people has scheduled at any given time.
Defined responsibilities – Every task that is scheduled should assign to a specific team
member.
Defined outcomes – Every task that is scheduled should have a defined outcome. The outcome
is normally a work product or a part of a work product.
4.2.5 Project Schedule Chart
Total system development is a combination of set of tasks. These set of tasks should done
sequentially and timely. Project schedule works as the guideline of the system developer. The
following is the schedule chart of this project:
Table 4.7 Project Scheduling Chart
Weeks
Category
1
2
3
4
5
6
7
CC
Planning
Analysis
Design
Coding
Testing
Implement
26
8
9
10
11
12
13
14
15
4.2.6. Cost Estimation
The approximation of the cost of a program is cost estimation. In this project, there are five
factors to analyze and calculate the cost. Given bellow,
•
Personnel cost
•
Software cost
•
Hardware cost
•
Other cost
Personnel cost:
•
Number of days in a year = 365
•
Number of government holidays in a year = 24
•
Number of weekly holidays in a year = 52
•
Total number of working days to develop the project =365-(52+24) =289 days
•
Total number of working days per months to develop the project = 289/12 =24.083
days
•
Organization working hours per day = 8 hours
•
Organization working hours per month= 24.083*8 = 192.66 hours
Type
No. of
Month
Salary
Members
s
(Taka)
System Analyst
1
2
30,000
System Designer and
2
2
50,000
1
2
30,000
Coder
System Tester
Total
1,10,000
Taka
Table 4.8 Personal Cost
27
Hardware Cost:
Machin
Quant
e
ity
Deskt
1
op
Parts
Quantit
Pric
y
Motherboa
e
1
Depreciation
Cost
Tot
al
(Tak
Cos
a)
t
5500
rd
Compu
Depreciation
(5500/12)*
1,833
4
Processor
1
4500
ter
(4500/12)*
1,500
4
Core i3
1
3500
2GB RAM
(3500/12)*
1,167
9,050
4
500GB
1
4000
1,333
4
HDD
Monitor
(4000/12)*
1
9000
(9000/12)*
3,000
4
Keyboard
1
400
(400/12)*4
1
3
3
Mouse
1
250
(250/12)*4
8
4
Printer
1
Printer
1
1050
0
(10500/12)
3,500
3,500
*4
Total=12,550 Taka
•
Computer life = 1 years
•
Computer usage= 16 weeks = 4 months
Table 4.9 Hardware cost
28
Software Cost:
Table 4.10 Software cost
Price
Name
MS Office 2010
1,566.40
Windows 10
1,333.00
Notepad++
0.00
Xampp Server
0.00
Total=2899.40
Other Cost:
Table 4.11 Other cost
Name
Price
Transport
1800
House rent
2500
Electric bill
700
Extra
1500
Total=6,500
Total System Development Cost:
Table 4.12 Total system Development Cost
Purpose
Amount
Salary
1,10,000
Software cost
2,899.40
Hardware cost
12,550
Other cost
6,500
Total=1,31,949.5 Taka
29
Chapter 5
Risk Management
30
5.1 Risk Analysis
A series of documents that assist a system development team in comprehending and managing
uncertainty is known as risk analysis and management. While developing a system, numerous
issues may arise. A risk is a problem that could happen or not. Analyzing and controlling risks
requires several steps. The identification of risks is the first step. After that, each risk is looked
at to see how likely it is to happen and how much damage it will cause if it does. Risks are
noted once this information is established. Finally, a strategy for dealing with high-impact risks
is developed.
There are different stages of risk. They are,
1. Risk identification: The process of gathering data to identify potential dangers or risks is
known as risk identification. There are a variety of tools and methods for collecting and
manipulating data. The team is beginning to identify potential threats to Web resources and is
collecting data using both automated and manual methods. One effective method for gathering
information about the state of Web pages and websites is web crawling.
2. Risk Classification: The process of creating a structured model to classify risk and
incorporating observable risk attributes and events into the model is known as risk
classification. To characterize, the team employs both quantitative and qualitative methods.
3. Risk Assessment: The process of determining the likelihood of specific risk scenarios—or
sequences of events—that could cause damage or loss—is known as risk assessment. Risk
assessment is the focus of many sources. "Transparent, coherent, consistent, complete,
comprehensive, impartial, uniform, balanced, defensible, sustainable, flexible, and
accompanied by suitable and sufficient guidance" are Rosenthal's descriptions of the
characteristics of a generic standard for risk assessment.
4. Risk Analysis: Risk analysis determines the potential impact of risk patterns or scenarios,
the possible extent of loss, and the direct and indirect costs of recovery. This step identifies
vulnerabilities, considers the willingness of the organization to accept risk given potential
consequences, and develops mitigation responses.
31
5. Risk Management Implementation: Policies, procedures, and mechanisms for managing
and responding to identified risks are defined in Risk Management Implementation. The
program's implementation should strike a balance between the direct and indirect costs of
preventing or recovering from damage or loss and the value of assets.
There are different categories of risk that should be considered during the development of any
project. They are,
1. Project risks: The project plan is in danger from these risks. It is likely that the project
schedule will be pushed back and costs will rise if these risks materialize. Potential issues with
the software project's budget, schedule, personnel, resources, customers, and requirements are
known as project risks.
2. Technical risks: The software that will be produced is in jeopardy because of these risks.
Implementation may become difficult or impossible if a technical risk is realized. Potential
issues with design, implementation, interface, verification, and maintenance are identified by
technical risks. Additionally, technical obsolescence, technical ambiguity, and specification
ambiguity are risk factors.
3. Business risks: The software that is going to be made is in jeopardy because of these
risks. Building a system that no one really wants is one of the business risks that can be
market risks. Building a system that no longer fits the company's overall business strategy are
strategic risks. Due to a shift in focus or personnel, management runs the risk of losing
support from senior management.
5.2 The RMMM Plan
The RMMM plan mainly implies project Mitigation, Project Monitoring, Project
Management along with the Impact and probability of any risk to occur. They are described
below,
•
Risk Mitigation: Proactive planning for risk avoidance.
32
•
Risk Monitoring: Assessing whether predicted risks occur or not, ensuring preventive
steps are being properly applied, collect information for future risk analysis, attempt to
determine which risks caused which problem.
•
Risk Management: Actions to be taken in the event that mitigation steps have failed
and the risk has become a live problem.
•
Type of Impact: Catastrophic (1), Marginal (2), Tolerable (3), Critical (4).
•
Type of Probability: very low (<10%), low (10–25%), moderate (25–50%), high (50–
75%), very high (>75%).
5. 3 Project Risks:
The Project Risks threaten the project plan. In my system, the bellow mentioned
projects risks Ineeded manage.
Table 5.1: Project Risk
Project Risk (PR1)
Name
Changes the requirements
Probability
Low (25%)
Impact
Marginal (2)
Description
Customer may change their requirements
Mitigation & Monitoring
Requirements are redefined by the company due to time or
business needs. Meeting will be held with the company
regularly. This ensures that the product we are producing solves
a problem.
Management
Emergency meeting between both parties to identify new
project requirements and goals.
Status
Not occur.
33
5.4 Technical Risk
Technical hazard: threaten the schedule's timeliness and product quality. Because this is my
practicum project, it is necessary to properly manage these kinds of risks.
Table 5.2: Technical Risk
Technical
Risk(1)
Name
Software reusability
Probability
Moderate (30%)
Impact
Critical (4)
Description
Reusable software components contain defects that mean they
cannot be reused as planned
Mitigation & Monitoring
Management
Status
Replace potential defected software
Managing reusable software
Solved
Table 5.3: Technical Risk
Technical Risk(2)
Name
Database performance.
Probability
Moderate (40%)
Impact
Critical (4)
Description
The database used in the system cannot process as many
transactions per second an expected.
Mitigation & Monitoring
Investigate the possibility of getting better performance
database
Management
Expected database is managed
Status
Solved
34
Table 5.4: Technical Risk
Technical Risk
(TR3)
Name
Poor Training Skill in Team Members.
Probability
Moderate (30%)
Impact
Catastrophic (1)
Description
Poor Training Skill in Team Members to Train
the Client.
Mitigation & Monitoring
The training team should have a clear knowledge
about the entire functionality of the software.
System analyst need to ensure and monitor it
while training session start.
Management
We should arrange a meeting with the train team
and come to a point to solve this problem.
We have not encountered such issue yet
Status
5.5 Tool Risk
Table 5.5 Tool Risk
Tool Risk
(TR1)
Name
Software tools coordination
Probability
Moderate (30%)
Impact
Tolerable (3)
Description
Software tools cannot work integrated together in an way
Mitigation & Monitoring
Management
Replace potential defected component
By replacing potential defected component tools coordination
managed.
Status
Solved
35
5.6 Requirement Risk
Table 5.6: Requirement Risk
Requirement Risk (1)
Name
Changes of Requirements
Probability
Moderate
Impact
serious
Description
Client may change the requirements
Mitigation & Monitoring We will call a meeting then will discuss about the problems
Management
Manage the requirement changes
Status
Solved
Table 5.7: Requirement Risk
Requirement Risk (2)
Name
After changes requirement fail to understand
Probability
Moderate
Impact
Tolerable
Description
Client may fail to understand after changes the requirements
Mitigation & Monitoring
We will call a meeting then will discuss about the problems
Management
If this problem occurs, we will able to make them understand
Status
Not occur
36
Chapter 6. Analysis Modeling
37
6.1 Analysis Modeling
Analysis modeling depicts requirements for data, function, and behavior in a manner that is
relatively simple to comprehend and, more importantly, simple to review for correctness,
completeness, and consistency using a combination of text and diagrammatic forms. Resources
for UML as well as those for conventional and object-oriented analysis (OOA) methods are
provided in this section.
6.1.1 Objectives of analysis model
The Objectives of analysis model are as follows,
•
Domain Analysis
•
Describe what the client requires
•
Establish a basis for the creation of a software design
•
Define a set of requirements that can be validated once the software is built.
6.2 Activity Diagram
With support for choice, iteration, and concurrency, activity diagrams are graphical
representations of workflows that consist of stepwise activities and actions. Activity diagrams
are used to model both organizational and computational processes in the Unified Modeling
Language. Activity diagrams depict the overall control flow.
38
6.2.1 Activity diagram for Admin
Figure 6.1 Activity diagram for Admin
6.2.2 Activity diagram House Owner
Figure 6.2 Activity diagram for House Owner
39
6.2.3 Activity diagram Tenant
Figure 6.3 Activity diagram for Tenant
6.4 Entity Relationship Diagram (ERD)
An entity relationship diagram (ERD), also known as an entity relationship model, is a
graphical representation of relationships between individuals, things, locations, concepts, or
events within an information technology (IT) system. An ERD makes use of data modeling
strategies in order to establish business procedures and lay the groundwork for a relational
database.
40
Figure 6.3 ERD of House Renting System
6.5 Data Flow Diagram (DFD)
By graphically depicting the "flow" of data through an information system, a data flow diagram
(DFD) models the process features of the system. A DFD is often used as a starting point to
create a system overview that can be further developed later. Data processing visualization is
another application for DFDs.
41
6.5.1 Context Level DFD
Figure 6.4 Context Level DFD
42
6.5.2 Level 1 DFD
Figure 6.5 Level 1 DFD
6.5.3 Level 2 DFD of Process 1
Figure 6.6 Level 2 DFD of Process 1
43
6.5.4 Level 2 DFD of Process 2
Figure 6.7 Level 2 DFD of Process 2
6.5.5 Level 2 DFD of Process 3
Figure 6.8 Level 2 DFD of Process 3
44
6.5.6 Level 2 DFD of Process 4
Figure 6.9 Level 2 DFD of Process 4
6.5.7 Level 2 DFD of Process 5
Figure 6.10 Level 2 DFD of Process 5
45
6.5.8 Level 1 DFD of Process 6
Figure 6.11 Level 2 DFD of Process 6
6.5.8 Level 2 DFD of Process 7
Figure 6.12 Level 2 DFD of Process 7
46
Chapter 7. Designing
47
7.1 Database Field Design
Table List
Figure 7.1 List of tables in Database
Users Table
Figure 7.2 Users table structure
House Table
Figure 7.3 House table structure
48
Booking Table
Figure 7.4 Booking table structure
Saved Property Table
Figure 7.5 Saved property table structure
Review Table
Figure 7.6 Review table structure
49
7.2 Interface Design
Figure 7.7 User Registration interface
Figure 7.8 User Login interface
Figure 7.9 Homepage
50
Figure 7.10 User Profile interface
Figure 7.11 Admin Panel User list
Figure 7.12 Admin House list interface
51
Chapter 8. Quality Assurance
52
8.1 System Testing
Software testing is the process of evaluation a software item to detect differences between
given input and expected output. Also, to assess the feature of A software item. Testing
assesses the quality of the product. Software testing is a process that should be done during the
development process. In other words, software testing is a verification and validation process.
Verification: Verification is the process to make sure the product satisfies the conditions
imposed at the start of the development phase. In other words, to make sure the product behaves
the way we want it to.
Validation: Validation is the process to make sure the product satisfies the specified
requirements at the end of the development phase. In other words, to make sure the product is
built as per customer requirements.
The objectives of software testing are:
• Testing is a process of executing a program with the intent of finding an error.
• A good test case is one that has a high probability of finding an as-yet-undiscovered
error.
• A successful test is one that uncovers an as-yet-undiscovered error.
The design of tests for software can be challenging as the initial design of the product itself.
Software can be tested in one of two ways:
• Knowing the specified function that the software has been designed to perform, tests
can be conducted that demonstrate each function fully while at the same time searching
for errors in each function. This approach is known as black-box testing.
• Knowing the internal workings of software, tests can be conducted to ensure that
internal operations are performed according to specifications and all internal
components have been adequately exercised. This approach is known as white-box
testing.
53
8.1.1 Software Testing Strategy
A strategy for software testing integrates software test case design methods into a well-planned
series of steps that result in the successful construction of a software. The strategy provides a
road map that describes the steps to be conducted as part of testing.
Testing strategy that will be followed in this software project –
• Unit testing
• Integration testing
• Validation testing
The first step in software testing is unit testing. Unit testing concentrates on each unit of the
software as implemented in source code. Unit testing focuses on each component individually.
The unit test is white-box oriented. Thus, unit testing of this library software will be done after
completion of every module or component.
The next step is integration testing. Integration testing is a systematic technique for
constructing the program structure while at the same time conducting tests to uncover errors
associated with interfacing. The objective of integration testing is to take unit tested
components and build a program structure that has been dictated by design.
The integration testing strategy that has been chosen for this project is top down testing. Blackbox testing method is the most prevalent for integration testing. Top down integration strategy
will be used to perform integration testing. Top down integration will be done by breadth-first
manner. Breadth-first integration incorporates all components directly subordinate at each
level, moving across the structure horizontally.
After the software has been integrated, a set of high order tests am conducted. Hence, the
validation criteria that have been mentioned in requirements engineering should be tested.
Validation testing provides final assurance that software meets all functional, behavioral and
performance requirements. The black-box testing method is exclusively used in validation.
8.2 System Testing Methodology
• Black-box Testing
54
Black-box testing which is also known as behavioral testing focuses on the functional
requirements of the software. It enables the software engineer to derive sets of input conditions
that will fully exercise all functional requirements for a program. Black-box testing method
will be applied to test the modules of LMS.
• White-box Testing
White-box testing, which also known as glass-box testing, is a test case design method that
uses the control structure of the procedural design to derived test cases. Using white-box
testing methods, software engineer can derive test cases that,
1. Guarantee that all independent paths within a module have been exercised at least
once
2. Exercise all logical decisions on their true and false sides
3. Execute all loops at their boundaries and within their operational bounds
4. Exercise internal data structures to ensure their validity.
The modules that contain some complex calculations or decision making code such as check
the availability of the library item will be tested using white-box method.
8.3 Testing Design
Table 8.1 Testing Scenario 1
Testing Scenario
No:1
Scenario
Owner and tenant log in testing scenario of our
system.
Input
Desired Output
Email, Password of owner or tenant for log in.
When enter E-mail, password then get access level
defines.
Actual Output’s
For login my system works correctly.
Verdict
Getting result from Desired Output’s and Actual
Output’s decided this system is successful for login.
55
Table 8.2 Testing Scenario 2
Testing Scenario
No:2
Scenario
Owner can add houses.
Input
Submit all the house’s information.
Desired Output
Save the information into the system.
Actual Output
For showing all records my system works
correctly.
Verdict
The process is worked correctly and
successfully.
Table 8.3 Testing Scenario 3
Testing Scenario
No:3
Scenario
Tenant can book houses, rate houses.
Input
Submit all the booking and rating information.
Desired Output
Save the information into the system.
Actual Output
For showing all records my system works
correctly.
Verdict
The process is worked correctly and
successfully.
56
Table 8.4 Testing Scenario 4
Testing Scenario No:4
Scenario
Payment testing scenario of the system
Input
User will insert Payment Details After
registration
Desired Output
User will be notified and will be sent to
pending list
Actual Output
After testing I got the desired output. So, this is
successful.
Verdict
The
system
is
worked
correctly
and
successfully.
Table 8.5 Testing Scenario 5
Testing Scenario No:5
Scenario
Report Generation testing scenario of the
system.
Input
Admin Will generate report by clicking “Site
Report”
Desired Output
Actual Output
Report generation with all data
The report was generated perfectly with all data
elements. So, this is successful.
Verdict
The
system
successfully.
57
is
worked
correctly
and
Chapter 9. Conclusion
58
9.1 Preface
Today is the age of modern science and information and online communication, which is
critical to development of more effective operational and management process. To provide
better and uninterrupted services to the employee of Kodeeo Limited Bangladesh a group of
Software specialist working together to keep the service all time. I was fortunate and blessed
to get this lucky break to work some of these efficient hard working friendly engineers. My
earnest thanks, gratitude and salutations to these wonderful people from the deep down inside
my heart.
9.1.1 Practicum and Its Value
In your career development as with most life issues there is direct relationship between effort
and reward. To me, practicum can be as a transition from engineering college study life to a
real world workplace through hands on experience of engineering practices.
The four years of undergraduate engineering studies gives a student theoretical and practical
knowledge. Using that knowledge and observing live operational system, the practicum
program clarifies those subject matters to another level blessed with practical working skills.
Considering this fact, it gives us an immense pleasure to say that my practicum was a
successful event.
Practical work experience doesn’t have any other alternatives. Before getting into the job
student should have a real world work experiences in a major field of study. Now-a-day’s
recruiter no longer considers just high grades, good communication skill, part time work
experiences. They highly consider the work experiences of an applicant. Students with better
work experiences are getting the better job opportunities.
Kodeeo Limited Bangladesh gives us the opportunity of working in a professional working
environment. During the internship period I have tried my level best to make my system
efficient. I followed the lessons, methods, tools and techniques that I have learned during my
study period at IUBAT. Successful software development is a blend of standard development
practices, proper theoretical knowledge and the developer’s creativity.
Student of College of Engineering and Technology (CEAT) at IUBAT go for this practicum
program carrying 6 credit hours weight, which goes for a semester long and usually after the
59
completion of the course work. A report submitted after the completion of the practicum
followed by a presentation and a comprehensive examination on the overall four years
education.
9.2 Conclusion
My internship period at Kodeeo Limited Bangladesh has been an amazing experience. I have
learnt so much within this 12 weeks which will impact greatly and positively in my future
career goals. During this 12 weeks internship time I was assigned to complete a project named
“House Renting System”. This report contains all the details of the project and also of the
development phases and strategies of the project.
Our project is only a humble venture to satisfy the needs in Development of House Rental
System. Here we have tried to show how user, tenant & owner uses a website for their house
rent purpose. Maybe there is some works or some other module we can add, but we tried our
best level for our project.
During the development of this project there many problems that I had to face. Time constraint
was the biggest issue that I had to face during the development of this project. Because of the
time constraint there are many limitations of this project. If I am given a chance to work further
with this system I have all the future plans to make the system a perfect house rental system.
9.3 Limitations
This project has some limitations those we have planned to develop in future.
The limitations are:
❖ Renters (tenants) cannot pay monthly rent separately.
❖ Embedded account management and some other module is needed to be implemented.
❖ Here renters (tenants) will not get any mobile SMS notifications
60
9.4 Future plan
If I am given a chance to work further with this project I have plans made to make the system
more efficient for the users. The followings are the future plan for the “House Renting System”.
1. A process to verify the identification of the user will be implemented by including a
NID verification method.
2. An option for chatting will be included so that the tenants can chat with owner.
3. A password recovery system through email will be implemented.
4. Mobile Banking options will be implemented.
61
References
Kendall, E. & Kendall. (1999). System Analysis and Design. 4th Ed. New Delhi: PrenticeHall.
Kushal. S, (2007, Mar 14). Calculating Function Points. (Accessed on 20 March, 2019)
Retrieve from https://www.codeproject.com/articles/18024/calculating-function-points
Longstreet, David. (2005). Fundamentals of Function Point Analysis.
(Accessed on 19 March, 2019)Retrieve from http://www.softwfaremetrics.com/fpafund.html.
Meyer, Bertrand. (1997), OOSC2: The Use Case Principle.
(Accessed on 18 March, 2019)Retrieve From http://www.elj.com/elj/v1/n2/bm/usecases.
Pressman, Roger S. (2004). Software Engineering: A Practitioner’s Approach. 5th ed.
Boston: McGraw Hill.
Silberschattz, Abraham, Korth, Henry F., &Sudrashan S. (2002). Database System
Concepts. 4th ed. Boston: McGraw Hill.
Function Point Overview. (Accessed on 20 November, 2022)
Retrieve from http://www.csee.umbc.edu/~mgrass2/cmsc645/function_point.html
How to calculate function points. (Accessed on 27 November, 2022)
Retrieve from http://stackoverflow.com/questions/34473698/how-to-calculate-functionpoints
The RMMM Plan. url: http://www.tutorialride.com/software-engineering/risk-managementinsoftware-engineering.html(Accessed on 2 December, 2022)
Methods of System quality testing. url: https://en.wikipedia.org/wiki/Software_testing
(Accessed on 5 December, 2022)
System quality assurance. url: https://en.wikipedia.org/wiki/Software_quality_assurance
(Accessed on 09 December, 2022)
1
Download