WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

The implementation of web based system for the improvment of good governance in the development of rwandan districts.

( Télécharger le fichier original )
par Herménégilde HUNDWITIRO
National University of Rwanda - Bachelor Degree 2009
  

Disponible en mode multipage

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

i
Dedication

To the God Almighty father
To my dad
To my dearest mom
To my beloved sisters and brothers
To my classmates, friends and relatives

I dedicate this final reeasearch.

HUNDWITIRO Herménégilde

ii
Declaration

I, HUNDWITIRO Herménégilde, hereby declare that this dissertation entitled «The implementation of web based system for the improvement of good governance in the development of Rwandan Districts» is my own work and has not been submitted anywhere for award of any degree.

HUNDWITIRO Herménégilde

Signature

iii
Acknowledgement

The District Invitation to Tender Management Information System (DITMIS) is a research, which was initiated as a final project to submit in the fulfillment of the requirements of the award of Bachelor's Degree in Information Technology Application in Management.

This work has been a result of joint effort from different persons, without whom the completion of this research would not be success. This is the time for me to acknowledge their incomparable help.

First of all, I thank the almighty God who always guide and protect me and make possible what seems to be impossible in my life.

My sincere thanks to Mr. KAGARAMA John Baptista my supervisor for his endless guidance and supervision in the achievement of this work.

A heartfelt to my parents Mr. NZABAHIMANA Jean Bosco and Mrs. MUKAMASABO Béatrice, for their great commitment and invaluable moral and material support, will always be remembered, to my beloved Teachers for their education with endless love and support during my studies.

I wish to extend my deep gratitude to my friends TWAHIRWA Jean Baptiste, KABERA Lambert and HAKIZIMANA Jean Claude for their help, advices, cooperation and encouragement, my sincere gratitude as well.

I am also grateful to my brothers, sisters, relatives and classmates for the cooperation and encouragement, my sincere gratitude as well.

The particular thanks to the Department of Management, the faculty of Economics and Management, the National University of Rwanda and the Rwandan Government. Their support made working on this project possible.

iv
Table of contents

DEDICATION I

DECLARATION II

ACKNOWLEDGEMENT III

TABLE OF CONTENTS IV

LIST OF ACRONYMS AND ABBREVIATIONS VI

LIST OF TABLES VIII

LIST OF FIGURES IX

ABSTRACT X

CHAPTER1. GENERAL INTRODUCTION 1

1.1. INTRODUCTION 1

1.2. THE PROBLEM STATEMENT 1

1.3. OBJECTIVES OF THE STUDY 2

General Objective 2

Specific Objective 2

1.4. MOTIVATION AND INTEREST OF THE PROJECT 3

1.5. THE PROJECT QUESTIONS 3

1.6. THE PROJECT HYPOTHESES 4

1.7. SCOPE OF THE PROJECT 4

1.8. METHODOLOGY 4

1.9. ORGANIZATION OF THE PROJECT 5

CHAPTER. 2. THEORETICAL CONCEPTS AND DEFINITIONS 6

2.1. INTRODUCTION 6

2.2. INFORMATION SYSTEM 6

2.2.1. DEFINITION 6

2.3. DATABASE CONCEPTS 8

2.3.1. Definition and terminology 8

2.3.2. Database design principles 10

2.3.3 Normalization 11

2.3.4. Database management system 12

2.3.5. Data processing architecture 13

2.4. WEB- BASED TECHNOLOGIES CONCEPTS 13

2.4.1. Computer network 13

2.4.2. Internet and World Wide Web 17

V

3.1 INTRODUCTION 19

3.2. SOFTWARE ENGINEERING APPROACH 19

3.2.1. Software life cycle 19

3.2.2. The waterfall model 20

CHAPTER IV. DEVELOPMENT AND IMPLEMENTATION OF THE WEB BASED SYSTEM. 24

4.1. INTRODUCTION 24

4.2. GENERAL DESCRIPTION OF NYAMAGABE DISTRICT 24

4.3. SOFTWARE DEVELOPMENT 24

4.3.1 Analysis of the existing Information System 24

4.3.2. The proposed system. 25

4.3.3. System Requirement Specification 25

4.3.4. General Description of DITMIS 25

4.3.5. Specific Requirements 26

4.3.6. Process Modeling 28

4.3.7 Tools Used 35

4.3.8 Data Dictionary 37

4.3.9 Implementation 41

CHAPTER 5: CONCLUSION AND RECOMMENDATIONS 49

5.1 CONCLUSION 49

5.2 RECOMMENDATIONS 50

5.3 FUTURE WORK 50

BIBLIOGRAPHY 51

A) BOOKS: 51

B) WEB REFERENCES: 51

vi
List of Acronyms and Abbreviations

1.BITAM : Bachelor of Information Technology Application in Management 2.BCFN:Boyce Codd Normal Form

3.CPU:Central Processing Unit 4.CAN:Campus Area Network

5.CSS:Cascading Style Sheets

6. DB: Database

7.DBMS:Database Management System 8.DFM:Data FlowModel

9.DFD:Data Flow Diagram

10.DITMIS:District Invitation to Tender Management Information System 11.DKNF: Domain Key normal form

12.DPP:Desktop Publishing Program

13.ECMA:Europian Computer Manufacturers Association

14.ERD:Entity Relationship Diagram 15.G C : Government Citizen

16.HTML:Hyper Text Mark_up Language 17.HTTP:Hyper Text Transfer Protocol

18.ICT: Information Technology and Technology

19.I S: Information System

20.IT :Information Technology

21.ITAA: Information Technology Association of America

22.IP:Internet Protocol

23.LAN:Local Area Network

24.MAN:Metropolitan Area Network 25.MIS:Management Information System 26.N F: Normal Form

27.PAN:Personnal Area Network

vii

28.PC: Personnal Computer

29.PHP:Hypertext Preprocessor

30.RDBMS:Relational Database Management System 31.SAN:Storage Area Network

32.SVG: Scalable Vector Graphics

33.TCI IP: Transmission Control Protocol Internet Protocol 34.VPN:Virtual Private Network

35.WAN:Wide Area Network

36.WEBAPP:Web application

37.WWW:World Wide Web

38.XHTML:Extensible Hyper Text Markup Language 39.XML:Extensible Hyper Text Markup Language

viii
List of Tables

TABLE 4 .1: ACTOR GOAL LIST 26

TABLE: 4.2 .DITMIS _ LIST OF TABLES 33

TABLE 4.3. APPLICANT TABLE 38

TABLE 4.4 ANNOUNCEMENT 38

TABLE 4.5: CHAT 38

TABLE 4.6 : COMMENT 39

TABLE 4.7: PASSWORD 39

TABLE 4.8: RESULTS 40

TABLE 4.9 ATTACHFILE 40

TABLE 4.10: SCREEN GLOSSARY 42

ix
List of Figures

FIGURE 3.1: THE CLASSICAL SEQUENTIAL SOFTWARE LIFE-CYCLE MODEL 20

FIGURE 3.2. THE WATERFALL MODEL 21

FIGURE 4.1: SYSTEM OUTLINE FOR DITMIS 29

FIGURE 4. 2: DISTRICT INVITATION TO TENDER MANAGEMENT INFORMATION SYSTEM CONTEXT DIAGRAM / LEVEL 0 31

FIGURE4.3 LEVEL1 DATA FLOW DIAGRAM 32

FIGURE 4.4 E R DIAGRAM 34

TABLE 4.4 ANNOUNCEMENT 38

FIGURE 4.5: THE MAIN PAGE 43

FIGURE 4.6: ANNOUNCEMENT PAGE 43

FIGURE 4.7: END OF ANNOUNCEMENT PAGE 44

FIGURE 4.8: THE TENDER PAGE 44

FIGURE 4.9: THE DETAILS FOR TENDER PAGE 45

FIGURE 4.10: THE APPLICANT PAGE 45

FIGURE 4.11: THE PAGE FOR UPLOADING OTHER FILES. 46

FIGURE 4.12: THE ADMINISTRATOR PAGE. 46

FIGURE 4.13: THE VIEW ALL APPLICANTS PAGE 47

FIGURE 4.14: THE PAGE FOR ALL FILES UPLOADED. 47

FIGURE 4.15: THE PAGE FOR SUBMITTING A COMMENT. 48

FIGURE 4.16: THE PAGE FOR PRINTING AN ANNOUNCEMENT. 48

x

Abstract

The growth and development of information and technologies (ICT's) has led to their wide diffusion and application, thus increasing their economic and social impact. The internet undertakes a wide range of activities aimed at improving our understanding of how ICTs contribute to sustainable economic growth and social well being and their role in the shift toward knowledge based societies.

Trust among the users of ICT networks is increasing priority for business, industry and governments. Information and Communication and Technologies (ICTs) can help meet development objectives, in particular international development goals for poverty reduction, education, health and environment.

This research is conceived with the aim of providing an adequate solution that will help citizens to get information about the tenders available in the Districts, the details about those tenders and have the possibility to apply for any tender. The DITMIS uses the advantages of Information and Communication Technologies (ICTs) as mentioned above.

The objective of this study is to provide a web based application able to assist anyone to get information about the tenders available in the Districts, able to read the announcement for an tender and have the opportunity for the application. The web based application to develop will have a web interface where applicants can read the announcement for tender, the details about the tenders and make the application via internet.

To achieve the fixed objectives, we have used the waterfall model as a software development process model to develop the web based application. Interviews and documentation also are used as the major data collection techniques.

By the end of this document, interfaces for users are designed with PHP, and listed in the interfaces

Glossary subsection. Finally, conclusion and recommendations are made to facilitate the usage and further improvement of this application.

CHAPTER1. GENERAL INTRODUCTION

1.1. Introduction

The Information and Communication Technologies (ICT) are being increasingly used by the governments to deliver its services at the locations convenient to the citizens. The web based system attempt to offer the services of central agencies (like district administration, cooperative union, and state and central government departments) to the citizens at their village door steps.

Information Technologies is widely used and rapidly becoming a common asset of modern socio-economic life in this new world of globalization .These technologies are opening opportunities and new avenues for all.

Our country Rwanda has a long way to reach to successful in this area .Software development and the use of automated systems, network systems development and the needs to share information within the country and with outside world , is what among other things that hold largely the degree of measure of development in the Rwandan society.

These applications utilize the ICT in offering improved and affordable connectivity and processing solutions. Several Government-Citizen (G-C) e-Governments have attempted to adopt these technologies to improve the reach, enhance the base, minimize the processing costs, increase transparency, and reduce the cycle times.

A large number of web based system, aimed at offering easy access to citizen service and improved processing of government-to-citizen transactions. Some of these have drawn international attention and have won prestigious awards for their innovative approaches.

1.2. The problem statement

In Rwandan districts like other central departments in the country, the improvement of good-governance is a key feature for the development of the country.

Besides, Rwandan districts have recognized a big problem of lacking the system which may help the easy processing of the daily activities in order to easily achieve the delivery of better services to their people.

For instance using this system will help citizens to know the information about the tenders available in the district and they will have the possibility to apply for any tender on line. They will be able to give their comments on tenders' process in order to increase the transparency and the accountability for the invitation to tender process.

The existing tender system at Nyamagabe District is paper based , the used method are media where newspapers and radios are used to announce any tender and the interested people may apply using the papers. And Data recording and retrieving are done manually; which can result in some inconvenience such as ease loss of data, the lack of accessibility of information about tenders, all applicants and the lack of transparency in tender delivery process.

It is in this context that the researcher needs to develop a web based system to help in the achievement of districts objectives like providing the better services, improving the transparency and the accountability for the invitation to tender process to its citizens.

1.3. Objectives of the study

General Objective

Development of web based system for Nyamagabe District that can be used in the improvement of good governance.

Demonstration of the need the advantages and disadvantages of using a web based system as compared to their traditional system used in Nyamagabe District.

Specific Objective

Main objectives in this project will be to:

> Study the activities of Nyamagabe District identifying and specifying the

requirements of a new web based system to be implemented.

> Model and designing the solution to meet requirements of the system.

> Design and creation of the additional databases to store relevant data of the system.

> Ensuring Security, performance and reliability of the system.

1.4. Motivation and interest of the project

The implementation of these system rises for the following interests:

Applying the knowledge acquired during academic studies and in different training fields.

This research provides invaluable source of knowledge and information for NYAMAGABE DISTRICT as it provides better understanding of using a web based system application and the way it can be a source of increasing the delivery of better services to the people.

Moreover, web based system is going to help Districts. By helping in the delivery of better services and increasing the transparency for the invitation to tender process in the district. Through this research, attempt to show how web based system application could be an invaluable tool for improving good governance.

1.5. The project questions

This research attempted to respond to the following project questions:

1) Is a web based system to improve good governance very reliable at Nyamagabe district? 2)Will the use of web based system help NYAMAGABE DISTRICT to increase the delivery of better services to the people?

3) Will the use of web based system enable NYAMAGABE DISTRICT to increase the transparency for the invitation to tender process?

4) Will the use of web based system become an answer to leaders and people for their daily activities?

1.6. The project hypotheses

«A WEB BASED SYSTEM can be delivered from the existing system in use at Nyamagabe District and used efficiently and successfully in the improvement of good governance».

1.7. Scope of the project

Due to the complexity of operations and multiplicity of tasks done at NYAMAGABE DISTRICT, the project may be focusing only on GOOD GOVERNANCE for the following: Develop a web site allowing citizens to know all information about the invitation to tender process in the District and help easily to apply for those tenders online to the District without being obliged to go to the Districts' seat.

Help people to obtain accurate information on tenders available in the district, increase the transparency and the accountability during the whole process of delivering the tenders.

By using PHP/MYSQL, HTML and other tools the tasks mentioned above, will be accomplished.

1.8. Methodology

In order to meet objectives, the following methods and research techniques are used: 1. Research methodology

> Consult course materials.

> Consult books that elucidate basic concepts and terminologies that will be used in this project.

> Internet.

2. Software development process methodology

1.9. Organization of the project

This project is organized in five chapters

The chapter 1: General introduction, describes

The problem statement, states the scope of the project, its objectives, the hypothesis and the methodology to be used.

The chapter 2: Theoretical concepts and definitions.

The chapter 3: Methodology deals with the methodology used in this project.

The chapter4: Development and Implementation of the web based system deals with the design and implementation of the web based system for Rwandan District.

Finally, chapter 5: Conclusion and recommendations will give the general conclusion and recommendations of the research.

CHAPTER. 2. THEORETICAL CONCEPTS AND DEFINITIONS

2.1. Introduction

This Chapter focus the theoretical concepts on which this project is based. The aim of this part is to give the description of the terms and concepts that are used in the development. Briefly it provides the required knowledge that will help in understanding technologies related issues and concepts.

2.2. Information system

2.2.1. Definition

2.2.1.1. System

A system is a set of interacting or interdependent entities real or abstract, forming an integrated

whole. (Retrieved March 21. 2009. from http:// en .wikipedia.org/wiki/system)

The concept of an "integrated whole" (Retrieved March 21. 2009. from http:// en .wikipedia.org/wiki/system) can also be stated in terms of a system embodying a set of relationships which are differentiated from relationships of the set to other elements, and from relationships between an element of the set and elements not a part of the relational regime.

2.2.1.2. Computer system

A complete, working computer. The computer system includes not only the computer, but also

any software and peripheral devices that are necessary to make the computer function. Every computer system, for example, requires an operating system. (Retrieved March 21. 2009. from http:/ www .webopedia.com/ TERM/C/Computer system.html/).

2.2.1.3. Information system

In a general sense, the term information system (IS) refers to a system of people, data records

and activities that process the data and information in an organization, and it includes the
organization's manual and automated processes. In a narrow sense, the term information system
(or computer-based information system) refers to the specific application software that is used

to store data records in a computer system and automates some of the information-processing activities of the organization. Computer-based information systems are in the field of information technology. The discipline of business process modelling describes the business processes supported by information systems.

The related components which make up information systems are:

People, Procedures, Softwares, Hardwares, Data and Environment. (Retrieved March 21. 2009. from http; // www.wikipedia.org/wik/information system).

2.2.1.4. Management information system

Management Information System (MIS) is a computer system, usually based on mainframe or microcomputer designed to provide management personnel with up -to -date information on organization's performance ; ex: inventor and sales .These systems output information in a form that is useable by managers at all levels of the organization :strategic , tactical and operational.

2.2.1.5. Information technology (IT)

Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware. IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information. (Retrieved March 21.2009.from; http// www.wikipedia.org/wik/information technology).

Today, the term information technology has ballooned to encompass many aspects of computing and technology, and the term has become very recognizable. The information technology umbrella can be quite large, covering many fields.

IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases.

A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems.

2.3. Database concepts

2.3.1. Definition and terminology 2.3.1.1 Definition

A database is a collection of information related to a particular subject or purpose.( RIHARD, T. WATSON,» DATA MANAGEMENT : Databases and Organization « , 3rd edition .p25) .

Data refers to pieces of information or facts usually collected as the result of experience, observation or experiment, or processes within a computer system, or a set of premises.

( Retrieved March 21.2009.from; http// www.wikipedia.org/wik/data)

Information is data that has been processed in a way that it makes it meaningful. Databases are designed to provide meaningful information .This information can only be provided if appropriate data exists in the database and the database is structured in such a way to support that information(PRESCOTT,M,& ALL « Modern Database Management»,5 edition, Addison Wesley Lonman , Inc, May 1999.p 4.)

2.3.1.2. Terminology

A. Entities and Relationships

The very basics of what we are trying to model are entities and relationships. Entities are things in the real world that we will store information about in the database. Relationships are the links between these entities. Relationships come in different degrees. They can be one-to-one, one-tomany (or many to one depending on the direction you are looking at it from), or many to many. (GERAL V .POST «Database Management Systems, Designing and Bulding Business Applications 1st edition P34.)

Note that the entities, the relationships, and the degree of the relationships depend on your environment and the business you are trying to model. When you are coming up with a database design, you must take these rules into account for the system you are modeling .No two systems will be exactly the same.

B.Relations

In the relational model of databases, a set of tuples (also called rows), otherwise known as a table.

C. Columns or Attributes

An attribute represents the basic abstraction of a database table column. In database tables each column or attributes describes some piece of data that each record in the table has .The terms column and attributes are used fairly interchangeably, but column is really part of a table, whereas an attribute relates to the real - world entity that the table is modeling.

(RetrievedMarch21.2009.from; http://publib.Boulder./ bm.com/inforcenter/db2/MW/V8/index.jsp ?topic=/com./bm.db2.vdb.olap.doc/cmd attribute.htm.)

D. Rows, Records, Tuples

In the context of a relational database, a row also called a record or tuple represents a single, implicitly structured data item in a table. Each row in a table represents a set of related data, and every row in the table has the same structure. (Retrieved March 21.2009.from; http// www.wikipedia.org/wik/row).

E. Keys

i) Primary key:

A primary key is a field or combination of fields that uniquely identify a record in a table, so that an individual record can be located without confusion. (Retrieved March 21.2009.from; http:// databasev.co.uk/ primary- foreign-key-constraints.html ,).

ii) Foreign key

A foreign key (sometimes called a referencing key) is a key used to link two tables together. Typically you take the primary key field from one table and insert it into the other table where it becomes a foreign key (it remains a primary key in the original table).

(Retrieved from March 21.2009.from,http://databasev.co.uk/ primary- foreign-keyconstraints.html ,)

2.3.2. Database design principles 2.3.2.1 Redundancy

Data redundancy is a data organization issue that allows the unnecessary duplication of data within your database. (Retrieved March 21.2009.from http://databasev.co.uk/ primary- foreignkey-constraints.html).

A change or modification, to redundant data, requires that you make changes to multiple fields of a database.

2.3.2.2 Anomalies

Anomalies present a slightly more complex concept. Anomalies are problems that arise in the data due to a flaw in the database design. There are three types of anomalies that may arise:

A. Insertion Anomalies

It is a failure to place information about a new database entry into all the places in the database where information about the new entry needs to be stored.

(Retrieved March 21.2009.from , http://www.dbnormalization.com /database-anomalies,)

In a properly normalized database, information about a new entry needs to be inserted into only one place in the database, in an inadequately normalized database, information about a new entry may need to be inserted into more than one place, and human fallibility being what it is, some of the needed additional insertions may be missed.

B. Deletion anomalies

needs to be deleted from only one place in the database, in an inadequately normalized database, information about that old entry may need to be deleted from more than one place.

(Retrieved March 21.2009.from , http://www.dbnormalization.com /database-anomalies,)

C .Update Anomalies

An update of a database involves modifications that may be additions, deletions, or both. Thus «update anomalies» can be either of the kinds discussed above.

All three kinds of anomalies are highly undesirable, since their occurrence constitutes corruption of the database. Properly normalized database are much less susceptible to corruption than are un-normalized databases. (Retrieved March 21.2009.from , http://www.dbnormalization.com /database-anomalies,)

2.3.2.3 Null Values

A final rule for good database design is that we should avoid schema designs that have large numbers of empty attributes.

2.3.3 Normalization

Normalization is a method of organizing your data to prevent redundancy. Normalization involves establishing and maintaining the integrity of your data tables as well as eliminating inconsistent data dependencies. (Retrieved March 21.2009.from , http://www.databasev.co.uk/ data-redundancy.html,)

Normalization requires that you adhere to rules, established by the database community, to ensure that data is organized efficiently. These rules are called normal form rules.

The rules are defined as follows:

(Retrieved March 21.2009.from , http://en. wikipedia.org/wiki/Normal forms ,)

2.3.3.1. First normal form (1 NF)

Table faithfully represents a relation and has no "repeating groups".

2.3.3.2. Second normal form (2NF)

No non-prime attribute in the table is functionally dependent on a part (proper subset) of a

candidate key.

2.3.3.3 .3rd normal form (3NF)

Every non-prime attribute is non-transitively dependent on every key of the table.

2.3.3.4. Boyce-Codd normal form (BCNF)

Every non-trivial functional dependency in the table is a dependency on a superkey.

2.3.3.5. Fourth normal form (4NF)

Every non-trivial multivalued dependency in the table is a dependency on a superkey.

2.3.3.6. Fifth normal form (5NF)

Every non-trivial join dependency in the table is implied by the superkeys of the table.

2.3.3.7. Domain/key normal form (DKNF)

Every constraint on the table is a logical consequence of the table's domain constraints and key

constraints.

2.3.3.8. Sixth normal form (6NF)

Table features no non-trivial join dependencies at all (with reference to generalized join

operator).

2.3.4. Database management system

A database management system (DBMS) is computer software that manages databases. DBMS's may use any of a variety of database models, such as the network model or relational model. In large systems, a DBMS allows users and other software to store and retrieve data in a structured way.

(Retrieved March 22.2009. from, http://wikipedia.org/wiki/Database-management-system,)

2.3.5. Data processing architecture

Data architecture describes the data structures used by a business and/or its applications. There are descriptions of data in storage and data in motion; descriptions of data stores, data groups and data items; and mappings of those data artifacts to data qualities, applications, locations etc. (Retrieved March 22.2009. from , http://wikipedia.org/wiki/Data-architecture).

Essential to realizing the target state, Data Architecture describes how data is processed, stored, and utilized in a given system. It provides criteria for data processing operations that make it possible to design data flows and also control the flow of data in the system.

2.4. Web- based technologies concepts

2.4.1. Computer network

A computer network is a group of interconnected computers. Networks may be classified according to a wide variety of characteristics.

(Retrieved March 22.2009. from , http://en.wikipedia.org/wiki/Computer-Network/).

Based on their scale, networks can be classified as Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Personal Area Network (PAN), Virtual Private Network (VPN), Campus Area Network (CAN), Storage Area Network (SAN).

2.4.1.1. LAN (Local Area Network)

A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines).

2.4.1.2. WAN (Wide Area Network)

A wide area network (WAN) is a computer network that covers a broad area (i.e. any network whose communications links cross metropolitan, regional, or national boundaries. Less formally, a WAN is a network that uses routers and public communications links. Contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs), which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively.

The largest and most well-known example of a WAN is the Internet. A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.

2.4.1.3. MAN (Metropolitan area network)

A metropolitan area network (MAN) is a network that connects two or more local area networks or campus area networks together but does not extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are connected to create a metropolitan area network.

2.4.1.4. PAN (Personal area network)

A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that are used in a PAN are printers, fax machines, telephones, PDAs and scanners. The reach of a PAN is typically about 20-30 feet (approximately 6-9 meters), but this is expected to increase with technology improvements.

2.4.1.5. VPN (Virtual private network)

A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption.

VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.

A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.

A VPN allows computer users to appear to be editing from an IP address location other than the one which connects the actual computer to the Internet.

2.4.1.6. Campus area network

A campus area network (CAN) is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. It can be considered one form of a metropolitan area network, specific to an academic setting.

In the case of a university campus-based campus area network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. A campus area network is larger than a local area network but smaller than a wide area network (WAN) (in some cases).

The main aim of a campus area network is to facilitate students accessing internet and university
resources. This is a network that connects two or more LANs but that is limited to a specific
and contiguous geographical area such as a college campus, industrial complex, office building,

or a military base. A CAN may be considered as of MAN (metropolitan area network), but is generally limited to a smaller area than a typical MAN.

This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network. A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.

2.4.1.5. Network Topology

Computer networks may be classified according to the network topology upon which the network is based, such as bus network, star network, ring network, mesh network, star-bus network, tree or hierarchical topology network. Network topology signifies the way in which devices in the network see their logical relations to one another. The use of the term "logical" here is significant.

That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout. Networks may be classified based on the method of data used to convey the data; these include digital and analog networks.

2.4.2. Internet and World Wide Web

(Retrieved March 24.2009.from; http// en.wikipedia.org/wiki/Internet). 2.4.2.1 Internet

The Internet is a global network of interconnected computers, enabling users to share information along multiple channels. Typically, a computer that connects to the Internet can access information from a vast array of available servers and other computers by moving information from them to the computer's local memory.

The same connection allows that computer to send information to servers on the network; that information is in turn accessed and potentially modified by a variety of other interconnected computers. A majority of widely accessible information on the Internet consists of inter-linked hypertext documents and other resources of the World Wide Web (WWW). Computer users typically manage sent and received information with web browsers; other software for users' interface with computer networks includes specialized programs for electronic mail, online chat, file transfer and file sharing.

2.4.2.2 Web browser

A Web browser is a software application which enables a user to display and interact with text, images, videos, music, games and other information typically located on a Web page at a Web site on the World Wide Web or a local area network. Text and images on a Web page can contain hyperlinks to other Web pages at the same or different Web site. Web browsers allow a user to quickly and easily access information provided on many Web pages at many Web sites by traversing these links. Web browsers format HTML information for display, so the appearance of a Web page may differ between browsers.

2.4.2.3. Web application

application that is coded in a browser-supported language (such as HTML, JavaScript, Java, etc.) and reliant on a common web browser to render the application executable.

2.4.2.4 .WWW (World Wide Web)

The World Wide Web (commonly abbreviated as "the Web") is a very large set of interlinked hypertext documents accessed via the Internet. With a Web browser, one can view Web pages that may contain text, images, videos, and other multimedia and navigate between them using hyperlinks.

CHAPTER 3. METHODOLOGIES USED

3.1 Introduction

This chapter puts in relief the different approaches that were used to optimally get the best solution to the users' needs .This part describes in details the Software Engineering methodology used and finally the tools used to implement the chosen approaches.

3.2. Software engineering approach

3.2.1. Software life cycle

A software life cycle model depicts the significant phases or activities of a software project from conception until the product is retired.

(Retrieved April 18.2009.from;http// softpanorama.org/SE/tware_life_cycle_models.shtml,).

It specifies the relationships between project phases, including transition criteria, feedback mechanisms, milestones, baselines, reviews, and deliverables.

Typically, a life cycle model addresses the phases of a software project: requirements phase, design phase, implementation, integration, testing, operations and maintenance. Much of the motivation behind utilizing a life cycle model is to provide structure to avoid the problems of the "undisciplined hacker" or corporate IT bureaucrat (which is probably ten times dangerous then undisciplined hacker). As always, it is a matter of picking the right tool for the job, rather than picking up your hammer and treating everything as a nail.

Software life cycle models describe the interrelationships between software development phases.

Figure 3.1: The classical sequential software life-cycle model

 

Problem

 
 

System Specification

System and Component Design

Operation and Maintenance

System Test

Implementation and Component Test

 

Requirement Analysis

Source: Own drawing

3.2.2. The waterfall model 3.2.3.1 General Description

The waterfall model was developed in the 1970 by Royce. The waterfall model is a sequential software development process, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of Conception, Initiation, Analysis, Design (validation), Construction, Testing and maintenance.

(Retrieved April18.2009.from; http://en.wikipedia.org/wiki/Waterfall_model,).

It should be readily apparent that the waterfall development model has its origins in the manufacturing and construction industries; highly structured physical environments in which after-the-fact changes are prohibitively costly, if not impossible. Since no formal software development methodologies existed at the time, this hardware-oriented model was simply adapted for software development. Ironically, the use of the waterfall model for software development essentially ignores the 'soft' in 'software'.

It provides for varidation of the phase outputs in the software life cycle. This approach modifies the strictly sequential approach prescribed by classical life-cycle model and advances an incremental development strategy. Incorporating a stepwise development strategy for the system specifications and the system architecture as well as phase - wise validation helps to better manage the effects of poor decisions and to make the software development process more controllable.

Requirement

Design

Implementation

Verfication

Maintenance

Figure 3.2. The waterfall model Source: (Retrieved April.18 .2009

from http://en.wikipedia.org/wiki/File:Waterfall_model.svg )

3.2.3.2. Limitation of Waterfall model (RetrievedJune11.2009.from; www.site.uottawa.ca/school/research/lloseng/supportMaterial/slide s-edition1/htmlSlides/Chapter11/tsld009.htm).

The model implies that you should attempt to complete a given stage before moving on to the next stage

? Does not account for the fact that requirements constantly change.

· It also means that customers can not use anything until the entire system is complete.

· The model makes no allowances for prototyping.

· It implies that you can get the requirements right by simply writing them down and reviewing them.

· The model implies that once the product is finished, everything else is maintenance.

3.2.3.3. The strength of Waterfall model

The waterfall model provides the following strengths:

+ Enabling tracking of project progress more accurately and uncovering possible slippages early.

+ Focusing the organization that develops the software system to be more structured and manageable.

+ Well defined user

+ Development and design standards

+ Tolerates changes in MIS

3.2.3.4. The model consist of six distinct stages, namely

1) In the requirements analysis phase

a) The problem is specified along with the desired service objectives (goals)

b) The constraints are identified

2) In the specification phase the system specification is produced from the detailed definitions of (a) and (b) above. This document should clearly define the product function.

Note that in some text, the requirements analysis and specifications phases are combined and represented as a single phase.

3) In the system and software design phase, the system specifications are translated into a software representation.

The software engineer at this stage is concerned with:

· Data structure

· Software architecture


· Algorithmic detail and

· Interface representations

(Retrieved June 18.2009 http://www.softpanorama.org/SE/software_life_cycle_models.shtml )

The hardware requirements are also determined at this stage along with a picture of the overall system architecture. By the end of this stage the software engineer should be able to identify the relationship between the hardware, software and the associated interfaces. Any faults in the specification should ideally not be passed `down stream'

4) In the implementation and testing phase stage the designs are translated into the software domain

· Detailed documentation from the design phase can significantly reduce the coding effort.

· Testing at this stage focuses on making sure that any errors are identified and that the software meets its required specification.

5) In the integration and system testing phase all the program units are integrated and tested to ensure that the complete system meets the software requirements. After this stage the software is delivered to the customer. Deliverable - The software product is delivered to the client for acceptance testing.

6) The maintenance phase the usually the longest stage of the software. In this phase the software is updated to:

· ?Meet the changing customer needs

· ?Adapted to accommodate changes in the external environment

· ?Correct errors and oversights previously undetected in the testing phases

· ?Enhancing the efficiency of the software

Observe that feed back loops allow for corrections to be incorporated into the model. For example a problem/update in the design phase requires a `revisit' to the specifications phase. When changes are made at any phase, the relevant documentation should be updated to reflect that change.

CHAPTER IV. DEVELOPMENT AND IMPLEMENTATION OF THE WEB BASED
SYSTEM.

4.1. Introduction

This chapter follows the methodology phases previously described and gives the details and results of the research. The chapter has two sections; the general description of Nyamagabe District and the software development.

4.2. General description of Nyamagabe District

Located southwest of Southern Province, the new District Nyamagabe is one of 8 districts of Southern Province. It is bordered by the Karongi District and Ruhango in North Nyanza and Huye in the east south , Nyaruguru, Rusizi and Nyamasheke in the West. The District Nyamagabe is composed of former Districts Kaduha, Mushubi, Mudasomwa, City of Gikongoro and 11 sectors of the former District of Karaba and Nyamagabe .The District is divided into 17 administrative sectors, 92 cells(utugari) and 536 villages (imidugudu).

4.3. Software Development

The software development undergoes through a series of steps process from investigation of initial requirement to the last phase of maintenance. The investigation carried at Nyamagabe District provided us the useful information not only about the previous system under replacement but also the one to be constructed. Thus we undertook the activities of procurement office and specifically for the invitation to tender process.

As a result, a system for the application for a tender has been produced.

4.3.1 Analysis of the existing Information System.

The initial step while developing an application program consists exactly to find out what to be solved and what should be done. All those features help the developer to find out what are the requirements specifications that the system will use, what are the users, what is the benefit of the application, and so forth.

During the data collection, the researcher compared the existing tender system process used at Nyamagabe District, with the new proposed system, in order to better analyze the operational system.

It is noted that the existing tender system at Nyamagabe District is paper-based. Data recording and retrieving are done manually; which can result in some inconvenience such as ease loss of data, the lack of accessibility of information about tenders, the applicants, and the lack of transparency, accountability in tender delivery process.

4.3.2. The proposed system.

While analyzing the existing system, a simple, integrated tool which will provide both web based for the application to any available tender and the information such as the announcement and the details about all tenders are available online has been proposed. Access to information and all functionality will be from basically any computer with a web browser and an internet connection.

4.3.3. System Requirement Specification

On their work Programmers have to meet the users' requirements specification. It is at the phase when SRS agree both parties that the Requirement analysis is finished. During the requirements analysis, a graphical representation of an application system called Data Flow Model (DFM) is established. It shows the movement of data between external entities, data stores and processs, within a system .However, changes in requirements may occur during the program design phase and continue to change for the improvement of the system.

4.3.4. General Description of DITMIS

For security reasons and proper operation, the DITMIS will be used by different users with different privileges as it is summarized in the table below.

System Users Goals

Applicant -Read announcement

-Read the details about the tender available -Apply for a tender

Guests -Can consult the reports about the results

for the selected applicant

System Administrator - Print the announcement

-View all users

-View all comments -View all applicants -Print the results for the selected applicant

-Make reports

-Update the system and maintains security

of the system

-Create and deletes users

Table 4 .1: Actor goal list

4.3.5. Specific Requirements

In specific requirements, a net difference is established between the Functional requirements and non Functional ones.


· Functional requirements:

It is all about what the system does. Statements of services that the system should provide, how the system should react to particular inputs and how the system should behave in particular situations.

Setting to part the priorities granted to the system users, the system will operate under normal operation and consider consequences and responses due to software failure or invalid input to the system. To use the system , an applicant have to fill or submit the applicant form and the administrator must enter a login and password .In case of invalid login and /or password, an error message is displayed.

· The system shall allow the applicant to apply for a tender available.

· The system shall bring any incomplete application message to the applicant in a way that encourages them to complete missing details.

· The system shall allow retrieving all details about all applicants.

The system shall be able to store and allow maintenance of the following details for all currently and previously applicants and the following are the fields that must be filled using a form:


· Applicant_Id

· Names

· Telephone

· Occupation

· Address

· Quantity

· Price

· Duration

· Account_no

· Bank

· Date

? Non functional Requirements:

It is about how the system does in terms of performance, security, availability, user friendliness etc. Constraints on the services or functions offered by the system such as timing constraints, constraints on the development process, standards, etc.

The system must be consistent, efficient, self explanatory and flexible; to provide the basic characteristics:

· Rapid retrieval

· Availability of 24/7(24 hours over 7 days of the week)

· Availability at convenient places

· Easy data input

· Easy applicant access

· Safeguards and confidentiality

· Easily customized output interface

· The system shall be capable of being used simultaneously from several screens.

4.3.6. Process Modeling

The most common model used to present functions or processes that capture, manipulate store and distribute data between a system and its environment is the Data Flow Diagram.DFDs are the corn stones of structured analysis and design because they show the flow of data or information around the system.

4.3.6.1. System outline

The role of a system outline is to show how input data are moving into process in order to get output data. Those outputs generate, files, and files generate outputs. The input are listed at the top left, Processes at the top right, And Files at the bottom left.

INPUT

PROCESSES PR

1: Read the announcement

2: Application for a tender

Applicant reports

Applicant_Id

Names

Telephone Occupation

Address Quantity Price

Duration Account_no

Bank

OUTPUT

Date

FILES

Applicant file

Not analysed applicants file Analysed applicant file

Users file

Announcement file

Selected applicant file

Comments file

Figure 4.1: System outline for DITMIS Source: Own drawing

4.3.6.2. Context Diagram / Level 0

The context diagram represents the entire system under investigation. It is used to clarify and agree to scope of the investigation The system under investigation is represented as a single process, connected to external entities by data flows and resource flows.On the following pages detailed higher level DFDs are elaborated in DITMIS logical system.

Level 0 district invitation to tender management information system (DITMIS)

Figure 4. 2: District invitation to tender management information system context Diagram / Level 0

Source: own drawing

4.3.6.3.Level1DataflowDiagram

Admin

File downloaded

Print announcement

Successfully printed

Admin page displayed

Account created

Details printed

Print details for tender

Create

Download file

Login

administrator's
account

DITMIS

2

Print
announcement

Login 4 DITMIS

Print details for tender

6 DITMIS

Upload files

D1

files

1

DITMIS

Tender file

3

DITMIS

Administrator's account

D2

D4

Announcement file

Files uploaded

Upload files

Announcement result

Read announcement

D9

Applicant

Display applications

View applications

8

D7

 
 

Application accepted

Comments file

 
 
 
 

Apply for atender

DITMIS

10

Admin

Applicant

Application file

Display selected appliants

View selected applicants

Session closed

Session_close request

D3 Administrator's account

file

5 DITMIS

View appications

D5

7

DITMIS

View comments

DITMIS

Logout

Application for tender file

9

DITMIS

 

Apply for a tender

View selected applicant

D10 selected applicant file

Figure4.3 Level1 Data flow diagram Source Own drawing

4.3.6.4 DITMIS List of Tables

Announcement

Announcement_id Announcement_Name Announcement Announcement_Date

Tender

Tender_id Tender_Name Tender Tender_date

Comment

Comment_id Name

E_mail

Address Comment

Password

User_id First_name Last_name Password Access_level Level_number E_mail

 
 

Users

Results

 
 

User_id First_name Last_name Password Re_enter pas sword

E_mail

Id

Names Address Quantity Price

Details Date

District

 
 
 

Applicant2

Applicant_id Announcement_id Names

Telephone Occupation\ Address

Quantity

Price

Duration Account_no Bank

Date

Table: 4.2 .DITMIS _ List of Tables Source: Own drawing

4.3.6.5 ER-Diagram

Figure 4.4 E R Diagram Source: Own drawing

4.3.7 Tools Used

+ HTML (Hypertext Mark-up Language)

HTML, an initialism for Hypertext Mark-up Language, is the predominant markup language for web pages. It provides a means to describe the structure of text-based information in a document by denoting certain text as links, headings, paragraphs, lists, etc. and to supplement that text with interactive forms, embedded images, and other objects. HTML is written in the form of "tags" that are surrounded by angle brackets. HTML can also describe, to some degree, the appearance and semantics of a document, and can include embedded scripting language code (such as JavaScript) that can affect the behavior of Web browsers and other HTML processors.

(Retrieved June 19.2009 from t http://en.wikipedia.org/wiki/HTML) + CSS (Cascading Style Sheets)

Cascading Style Sheets (CSS) is a style sheet language used to describe the presentation (that is, the look and formatting) of a document written in a markup language. Its most common application is to style web pages written in HTML and XHTML, but the language can be applied to any kind of XML document, including SVG and XUL.

(Retrieved June 19.2009 from http://en.wikipedia.org/wiki/Cascading_Style_Sheets ) + Php

PHP is a scripting language originally designed for producing dynamic web pages. It has evolved to include a command line interface capability and can be used in standalone graphical applications.

(Retrieved June 19.2009 from http://www.php.net/ ) + Java Script

JavaScript is a scripting language used to enable programmatic access to objects within other
applications. It is primarily used in the form of client-side JavaScript for the development of
dynamic websites. JavaScript is a dialect of the ECMAScript standard and is characterized as a

dynamic, weakly typed, prototype-based language with first-class functions. JavaScript was influenced by many languages and was designed to look like Java, but to be easier for non-programmers to work with.

(Retrieved June 19.2009 from http://en.wikipedia.org/wiki/JavaScript) + Mysql

MySQL is a relational database management system (RDBMS) which has more than 6 million installations. The program runs as a server providing multi-user access to a number of databases.(Retrieved June 19.2009 from http://en.wikipedia.org/wiki/MySQL)

+ Adobe Flash

Adobe Flash (previously called Macromedia Flash) is a multimedia platform originally acquired by Macromedia and currently developed and distributed by Adobe Systems. Since its introduction in 1996, Flash has become a popular method for adding animation and interactivity to web pages. Flash is commonly used to create animation, advertisements, and various web page components, to integrate video into web pages, and more recently, to develop rich Internet applications.(Retrieved June 19.2009 from http://en.wikipedia.org/wiki/Adobe_Flash)

+ Adobe Photoshop

Adobe Photoshop, or simply Photoshop, is a powerful graphics editing program (also known as a DPP, Desktop Publishing Program) developed and published by Adobe Systems. It is the current and primary market leader for commercial bitmap and image manipulation software, and is the flagship product of Adobe Systems. It has been described as "an industry standard for graphics professionals and was one of the early "killer applications" on the PC.

(Retrieved June 19.2009 from http://en.wikipedia.org/wiki/Adobe_Photoshop )

+ Adobe Dreamweaver

Adobe Dreamweaver (formerly Macromedia Dreamweaver) is a web development application originally created by Macromedia, and is now developed by Adobe Systems, which acquired Macromedia in 2005.

(Retrieved June 19.2009 from http://en.wikipedia.org/wiki/Adobe_Dreamweaver/)

+ Apache

The Apache HTTP Server commonly referred to as Apache, is a web server notable for playing a key role in the initial growth of the World Wide Web. In 2009 it became the first web server to surpass the 100 million web site milestone.

(Retrieved August 7.2009 from http://en.wikipedia.org/wiki/Apache)

4.3.8 Data Dictionary

Data dictionary is that part of database management system that defines the structure of user data and how they are to be used.

Data dictionary of our system is represented in the following tables. 1) Applicant2

Field Type Collation Attributes Null Default Extra

Applicant_Id Int(2) - No - Auto_increment

Tender_id Announcement_Id Names

Telephone Occupation Address

Quantity

Price

Int(11)

Int(2) Varchar(50 Varchar(50 Varchar(50 Varchar(50 Varchar(50 Varchar(50

 
 

No

-

-

 

-

No

 
 

Lattin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ci

 

No No No No No No

 
 

Duration Varchar(50) Latin1_general_ci No

Accoumt_no Varchar(50) Latin1_general_ci No

Bank Varchar(50) Latin1_general_ci No

Date Date Latin general ci No

Table 4.3. Applicant table Source Own drawing

2) Announcement

Field Type Collation Attribute Nul Defaul Extra

s l t

Announcement_id Int(2) No Auto_increme

nt

Announcement_Na Varchar(5 Latin1_general_ No

me 0) ci

No

Announcement Varchar(5 Latin1_general_

0) ci No

Announcement_Dat

e Varchar(5 Latin1_general_

0) ci

Table 4.4 Announcement
Source: Own drawing

3) Chat

Field Type Collation Attributes Null Default Extra

User_id Int(2) No Auto_increment

Name Varchar(50) Latin1_general_ci No

Message Varchar(50) Latin1_general_ci No

4) Comment

Field Type Collation Attributes Null Default Extra

Comment_id User_id

Name

E_mail Address Comment

Int(2)

Int(11) Varchar(20) Varchar(20) Varchar(20) Varchar(20)

Latin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ci

No No No No No

Auto_increment

 

Table 4.6 : Comment Source: Own drawing

5) Password

Field Type Collation Attributes Null Default Extra

User_id First_name Last_name Password Access_level Level_number E_mail

Int(2) Varchar(20) Varchar(20) Varchar(20) Varchar(20) Varchar(20) Varchar(20)

Latin1_swedish_ciLatin1_swedish_ciLatin1_swedishl_ciLatin1_swedishl_ciLatin1_swedishl_ciLatin1_swedishl_ci

No No No No No No No

Auto_increment

Table 4.7: Password Source: Own drawing

6) Results

Field Type Collation Attributes Null Default Extra

Id

Names Address Quantity Price Details Date District

Int(2) Varchar(20) Varchar(20) Varchar(20) Varchar(20) Longtext Date

Varchar(20)

Latin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ci

Auto_increment

 

Table 4.8: Results Source: Own drawing

7) Attachfile

Field Type Collation Attributes Null Default Extra

Attach_id

Applicant_id Bordereau

Lettre

Photocopie

Le_delaiAttestation

Icyemezo_ko_nta_mwenda Icyemezo_ko_yaguze Icyemezo_cy'_ingwate Date

Int(11) Int(11) Text Text Text Text Text Text Text Text date

Latin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ciLatin1_general_ci

No No No No No No No No No No No

None None None None None None None None None None None

Auto_increment

4.3.9 Implementation 4.3.9.1 Screen Glossary

Screen number Screen name Purpose

MAIN PAGE

1.1 Login area This area, allow to login in account as

administrator.

1.2 Home area Informs about the district invitation to tender

management information system (DITMIS).

1.3 Announcement Informs about the announcement on tenders

area available in the district.

1.4 Tender area Informs about the details about the tenders

and it allows also to apply for any tender.

1.5 Contact us

1.6 Login here area

1.7 Register here

1.8 Chat area

1.9 Add comment area

Informs about the contact of the district.

Allows to login as an existing user.

Allows to register as a new user.

Allows members and users of the system to send each other message.

Allows sending any comment about the system and tenders.

SYSTEM ADMINISTRATOR INTERFACE

2.1 View all applicants

2.2 View all comments

2.3 View all users

2.4 Print announcement

2.5 Print tender

2.6 Create Account

2.7 View attached file

2.8 Logout Allows viewing all applicants.

Allows viewing all comments.

Allows viewing all users.

Allows printing announcement for any tender.

Allows printing the details about the tender available.

Allows to create accounts

Allows to view other additional files attached by applicants.

Allows to quit the administrator interface.

Table 4.10: Screen Glossary Source: Own drawing

4.3.9.2 Sample Interfaces

In this section, sample interfaces are displayed. And the main functionalities of the system are shown .We displayed the interfaces for the users in general and also the interface for an administrator to accomplish their activities.

43

Figure 4.5: The main Page

Figure 4.6: Announcement page

Figure 4.7: End of announcement page

Figure 4.8: The tender page

Figure 4.10: The applicant page

Figure 4.9: The Details for tender page

Figure 4.12: The administrator page.

Figure 4.11: the page for uploading other files.

47

Figure 4.13: The View all applicants page

Figure 4.14: The page for all files uploaded.

Figure 4.15: The page for submitting a comment.

Figure 4.16: The page for printing an announcement.

CHAPTER 5: CONCLUSION AND RECOMMENDATIONS

5.1 Conclusion

This research aimed at showing the importance of using the web based system in the improvement of good governance. Based on results of our research, the goals and the scope of the project it have deduced the conclusion below:

During the investigation it was found that even if there is use of ICT in Rwandan Districts, they do not maximize the benefits of ICTs for their daily activities .Some activities are still not automated because they have been made manually.

That is why the use of ICT need to be improved through a web based system that facilitates to keep people get informed on tenders processes in Rwandan Districts.

Beyond investigation research system development methodologies were used:

· Context diagram

· System outline

· Data flow diagram

· Entity relationship diagram and

· Data dictionary.

This method helped us to clarify how data are treated in the current system and how the new system would be .By implementing the application, it has been found that problems of getting information online on tenders available in Rwandan Districts and the opportunity for application have been attended via the use of system called District Invitation to Tender Management Information System.

DITMIS design has got the benefits as it facilitates citizens to get all information on tenders available in Rwandan Districts and the opportunity to apply for any tender.

5.2 Recommendations

Based on experiences, investigation carried out and some constraints accoutered, to finish this research the following recommendations are mentioned, for the great success of the present system:

.. The project ended with software product .The wisdom of software engineering teaches that software is never completed .Thus; we suggest this software to be considered as «prototype».

.. Some imperfections must be revised and corrected before the deployment and functionality of DITMIS.

.. The Districts must sensitize the citizens on the use of the new technology with the aim of improving this system.

.. The districts should provide adequate computer tool, including the internet to citizens in order to allow them to use the DITMIS.

5.3 Future work

Lastly, the further research should also be done on the selection of applicants in order to found out the selected applicant based on the requirements for the application and the contract signed between the District and the selected applicant.

Bibliography

a) Books:

1. GERAL V .POST «Database Management Systems, Designing and Building Business Applications «, 1st edition, P34.

2. PRESCOTT, M, & ALL» Modern Database Management», 5 edition, Addison Wesley Lonman, Inc, May 1999.p 4.

3. RIHARD, T. WATSON,» DATA MANAGEMENT: Databases and Organization «, 3rd edition .p25.

4. NSENGIYUMVA JEAN BAPTISTE, HABIYAREMYE ALOYS, «E-census Web Based Application case of National Institute of Statistics of Rwanda», February 2007.

b) Web references:

5. http: // en. Wikipedia.org/wiki/Data.

6 .http:/ en .wikipedia.org/wiki/system.

7. http:/ www .webopedia.com/ TERM/C/Computer system.html.

8. http;/ www.wikipedia.org/wik/information system .

6. http:/ www.wikipedia.org/wik/information technology.

7. http:// publib. Boulder./ bm.com / infocenter/db2/MW/V8/index.jsp? topic=/com./bm.db2.vdb. olap .doc/cmd attribute. htm.

8. http://en.wikipedia.org/wiki/Row .

9. http:// databasev.co.uk/ primary- foreign-key-constraints.html.

10. http://www.dbnormalization.com /database-anomalies.

11.http://www.databasev.co.uk/ data-redundancy.html.

12. http://en. wikipedia.org/wiki/Normal forms.

13. http://wikipedia.org/wiki/Database-management-system. 14. http://wikipedia.org/wiki/Data-architecture .

15. http://en.wikipedia.org/wiki/Computer-Network.

16. http://en.wikipedia.org/wiki/Internet. 18. http://www.softpanorama.org/SE/software_life_cycle_models.shtml .

20. http://en.wikipedia.org/wiki/Waterfall_model.

21.www.site.uottawa.ca/school/research/lloseng/supportMaterial/slidesedition1/htmlSlides/Chapter11/tsld009.htm 22. http://www.softpanorama.org/SE/software_life_cycle_models.shtml. 23. http://en.wikipedia.org/wiki/HTML. 24. http://en.wikipedia.org/wiki/Cascading_Style_Sheets . 25. http://www.php.net.

26. http://en.wikipedia.org/wiki/JavaScript. 27. http://en.wikipedia.org/wiki/MySQL.

28. http://en.wikipedia.org/wiki/Adobe_Dreamweaver. 29. http://en.wikipedia.org/wiki/Apache. 30. http://en.wikipedia.org/wiki/Adobe_Flash. 31. http://en.wikipedia.org/wiki/Adobe_Photoshop .






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Il existe une chose plus puissante que toutes les armées du monde, c'est une idée dont l'heure est venue"   Victor Hugo