To-Let Management System Overview
To-Let Management System Overview
PROJECT REPORT
TO-LET FIND YOUR HOUSE
Team member
TABLE OF CONTENTS
Chapter 1: Planning 1
Chapter 2: Analysis 5
1. Requirements determination of the project 2
1.1 Introduction 3
1.2 Interview Outline 3
1.3 Observation Table 3
2. Related Work 2
3. Contemporary Methods 2
3.1 Prototype 3
4. Risk Analysis 2
5. Risk Probability & Impact 2
6. Discussion & Conclusion 2
7. References 4
Chapter 3: Design 5
1. Introduction 2
2. Related Work 2
3. Methodology 2
4. Detailed Working Plan 2
5. Components of UML Use Case Diagram 2
6. Use Case Diagram 4
7. Data flow Diagram 4
7.1 Level 0 4
7.2 Level 1 4
8. ER Diagram 4
9. Prototype 4
Chapter 4: Implementation 5
1. Introduction 3
2. Logical Database 2
2.1 Renter/ Owner 3
2.2 Admin Panel 3
3. Physical Database 2
3.1 User 3
3.2 Admin Panel 3
4. Sequence Diagram 2
5. Discussion & Conclusion 2
6. References 4
CHAPTER 1: PLANNING
1. PROJECT SCOPE STATEMENT
1.1. Introduction:
House Rental is a house/Apartment/home that can be used temporarily for a fee during a
specified period. The individual who needs a house must contact a rental car company and
contract out for a room/home/apartment. This system increases customer retention and simplifies
House and staff management.
1.2. Motivation:
1.3. Objective:
To develop a system to make an easy approach for To-Let management.
To develop Mobile applications to maintain and monitor the whole system and
security. To make a better analysis report for future uses.
To save valuable time searching for houses.
To reduce the work in pen and paper and to use the time properly.
An easy interface where users can easily interact and show their relevant
information.
To develop a combined environment for better and quality full services.
To maintain client details, contact details, house details, Rental type, etc.
4. RELATED WORK
Firstly, we studied some websites for this kind of rented flat, apartment, etc. Here are some of
them.
Name of Website Contribution Limitation
[Link]: Buying and selling More Complex to use
flat, Apartments and Backdated
office. information.
The location is not High maintenance and
that correct. costly.
Rental home [Link]: Works for sale and Commonly Fraud
rent activity
Do not show the
rating.
Backdated updates
Buy and sell products. Management System
[Link]: Flats, Apartments and is not good
office area Take a lot of time to
execute any feature
5. FEASIBILITY ANALYSIS
6. PROTOTYPE
The prototype of the project is shown below: prototypes are build using Figma[1]
Identify the problem & define its scope & perform 2 Zeneya Sharmin &
analysis(feasibility, requirement). Proposed model for the weeks Bishozit Chandra das
development.
Finalize the development model & prepare the Gantt chart 2 Bishoizit Chandra das
for overall development weeks
Create DFD, E-R diagram, flowchart, Decision tree & 2 Zeneya Sharmin
decision table for project weeks
Plan the overall sequence (final) to perform all the tasks 2 Zeneya Sharmin &
and tie limits of each module. weeks Bishoizit Chandra das
We must gather information on the present information systems in use, as well as how users
would like to improve current systems and organizational processes with new or replacement
information systems. That is why traditional methods for determining the system requirements
are useful. We have successfully found out the requirements after lots of planning and analysis
now we will design our system through several process of interview, risk analysis and other
evaluations.
CHAPTER 2: ANALYSIS
1. REQUIREMENT DETERMINATION OF THE PROJECT
1.1. Introduction:
The process of observing systems for troubleshooting or development purposes is known as
systems analysis. It is used in information technology, where computer-based systems require
specific analysis based on their structure and design. System analysis is a methodical approach to
technical decision- making. It is used for trade-off analysis and includes modeling and
simulation, cost analysis, technical risk analysis, and effectiveness analysis.
Requirements determination involves studying the existing system and gathering details to find
out what are the requirements, how it works, and where improvements should be made. There
are four types of Requirement Determination steps:
Interview Outline
Objectives: Reminder:
To find out the key functionalities Team Mate
To find out unique feature
Questions Notes
Question 1: Answer:
Have you used a location / Yes. I used a GPS tracking system.
GPS Tracking System? If Observation:
so, how often?
they Seemed anxious, and may be overestimating the area of
knowledge.
Question 2: Answer:
What problems did you face Rapid technology advancement, constantly increasing
while developing? demands, time limitations, limited infrastructure/resources,
and conflicts with software testing teams.
Observation:
Confident enough, Needs to introduced app.
2. RELATED WORK:
Now, we are going to discuss existing mobile banking and their contribution and limitation.
Name of Website Contribution Limitation
[Link]: Buying and selling More Complex to use
flat, Apartments and Backdated
office. information.
The location is not High maintenance and
that correct. costly.
Rental home [Link]: Works for sale and Commonly Fraud
rent activity
Do not show the
3. CONTEMPORARY METHOD
Joint Application Development in short JAD is the process which is used to design and develop
computer based system/solutions. It collects requirements side by side as per business needs
while developing new information systems for a company that means JAD involves the client or
end-users in designing and development process. Since client is involved throughout the
development process it leads to faster development times and greater client satisfaction.
3.1 Prototype
4. RISK ANALYSIS
Project Risk identification is the most important process in the Risk Management Planning. Risk
Identification determines which risks might affect the project and documents their
characteristics. We have identified some major risk to develop our system
1 0 - 0.3 Low
This is not the standard, we developed it for our own project. So, the result with others may not
be same as above that are showed in the implementation part. After analyzing these with our
project we found that more than 90% results.
6. DISCUSSION AND CONCLUSION
The development of a system called To-Let Find Your House is the main goal of our project. In
our project, we aim to create a system that is strong enough to address security issues. There are
more hazards, but we have identified all of the critical ones. We assessed each of them through
an interview and, following analysis, discovered the risk probabilities and impact. Other
restrictions that are not included in the risk probability finding and impact are still in place. Due
to how difficult it is to create an interview outline, there were certain difficulties encountered
when establishing requirements through an interview. It takes a lot of time and requires a lot of
critical thinking. The stated problem's objective and aim were successfully accomplished using
objective mapping.
[Link]
[Link]
[Link]
Figma Online Available: [Link]
node-id=220%3A2&scaling=scale-down&page-id=0%3A1&starting-point-node-id=11%3A6
The architecture is established during the design phase. This phase takes the requirement
document delivered by the requirement phase and maps it into an architecture. The architecture
specifies the components, as well as their interfaces and behavior. The architecture is the
deliverable design document. The design document outlines a strategy for putting the
requirements into action.
Details are established for computer programming languages and environments, machines,
packages, application architecture, distributed architecture layering, memory size, platform,
algorithms, data structures, global type definitions, interfaces, and many other engineering
details.
Phases of designing are:
Use Case Diagram
Data Flow Diagram
ER Diagram
Creating Prototype
2. RELATED WORK
Now, we studied some websites for this kind of rented flat, apartment, etc. Here are some of
there limitation and Contribution:
Identify the problem & define its scope & perform 2 Zeneya Sharmin &
analysis (feasibility, requirement). Proposed model for the weeks Bishozit Chandra das
development.
Finalize the development model & prepare the Gantt chart 2 Bishoizit Chandra das
for overall development weeks
Create DFD, E-R diagram, flowchart, Decision tree & 2 Zeneya Sharmin
decision table for project weeks
Describe UML diagrams, draw all as per the system 1.5 Bishoizit Chandra das
weeks
Use Case:
Log in
Set profile
See post
Add post
b) Actors: Stick figures that represent the people actually employing the use cases.
Actor:
User
House owner
House Finder
Admin
c) Communication Links: A line between actors and use cases. In complex diagrams, it is
important to know which actors are associated with which use cases.
Include: Include Relationship between a base use case and an inclusion use case,
specifying how the behavior of the inclusion use case can be inserted into the behavior
defined for the base use case.
Include:
Registration
Select valid post
Block User
Unblock User
Extend: Relationship between the extension use case and the base use case. Specify how
the behavior of the extension use case can be inserted into the behavior defined for the
base use case.
Extend:
Invalid username or pass
d) System boundary boxes: A box that sets a system scope to use cases. All use cases outside the
box would be considered outside the scope of that system. For example, Psycho Killer is outside
the scope of occupations in the chainsaw example found below.
e) Packages: A UML shape that allows you to put different elements into groups. Just as with
component diagrams, these groupings are represented as file folders.
7.2 Level 1:
8. ER DIAGRAM:
10. PROTOTYPE
12. REFERENCES
[Link]
[Link]
CHAPTER 4: IMPLEMENTATION
[Link]
The architecture is established during the design phase. This phase takes the requirement
document delivered by the requirement phase and maps it into an architecture. The architecture
specifies the components, as well as their interfaces and behavior. The architecture is the
deliverable design document. The design document outlines a strategy for putting the
requirements into action.
Logical Database
Physical Database
Data access method
2. LOGICAL DATABASE
2.1 Renter/Owner:
Location String(20)
[Link] DATABASE
3.1 User:
2. FORM DESIGN
2.1 Registration:
II.2 Login:
2.4 Profile:
Want to edit?
3. CODING PART
3.1 For USSD
Language: Java
Admin Panel:
Step 1: Login Account
Step 2: If (See user all post) then,
Approve post
If Else: Rules Break
Delete Post
If Else: Again Rules Break
User Activity Block
If Else: Fee Time Later
User Activity Unblock
Step 3: Else: go to Step 1
Step 4: Exit
Create Post:
Step 1: Login Account,
Step 2: If (Attempts <1) then,
Create Post
Post successfully done
If Else: Again post
Else: Attempts ++ & go to Step 1
Step 3: Else: go to Step 2
Step 4: Exit
Delete Post:
Step 1: Login Account
Step 2: If (find the post) then,
Delete post
Step 3: Else: go to Step 1
Step 4: Exit
5. TESTING
NID:5624786325 Correct
6. INSTALLATION
It’s the organizational process of changing over from the current information system to a new
one. There are four typically methods for installation:
Direct Installation
Parallel Installation
Single-location Installation
Phased Installation
Among these four installation strategies, we will use for our system is Direct Installation.
Using Direct Installation:
a) Involves the Old system being completely dropped and the new system being completed
installed at the same time.
b) Need to make sure the new system is completely functional and operational.
c) This conversion method is only used when it is not feasible to operate separate systems at the
same time.
d) Any data and training must be done before the installation.
Along with these,
System admin will provide a generated apk file. Users need to download it from google play
store and install it directly.
8. TRAINING
In this phase we divide the training activity into these categories:
Potential training topics
Use of the system
General computer concepts
Information system concepts
No leakage of data
General computer concepts like c, java, and database coding
Information system concepts like encryption algorithms
Organizational concepts like managing the data, post, authenticity, and integrity.
Organizational concepts
System management
System installation
Important issue for this project and management
■ Malicious software (malware): includes Trojan horses, worms, viruses, and other kinds.
■ External sources of threats include laptop theft, system penetration, and denial of service.
Close down:
Evaluate the team.
Reassign members to other projects.
Notify all affected parties that the development project is ending and that you are
switching to operation and maintenance mode.
Conduct post-project reviews.
11. REFERENCES
[Link]
[Link]
[Link]
Figma Online Available: [Link]
id=220%3A2&scaling=scale-down&page-id=0%3A1&starting-point-node-id=11%3A6
We knew that our project is going to be tough as we must innovate an effective system. We will
have to give a lot of to complete this project. Planning helped us to decide what that contribution
should be and how to achieve it. Also helped us to be accountable for what we do and decide
how best to use our resources (people, time, money, information, equipment) so that they make
the most significant contribution to achieving our goal. Planning plays the basis for us to assess
and evaluate our achievements effectively. Our project focuses on developing a system which is
To-Let: Find your house. Through our project we are trying to design a system which is powerful
enough in the security concerns. There are other risks and we have successfully found out all the
necessary ones. Evaluated each one of them by the interview and after analyzing we found the
risk probabilities and impact. We have designed whole system using different diagrams like
DFD, Use Case, ER etc. [1][2][3]
After lot of hard work, we have achieved the lab objective throughout the whole project.
2. LIMITATIONS
It is not implemented yet that’s why limitations are not clear enough. Although we have done
analysis on some limitations that,
● If we cannot make it scalable then it will be not efficient for users.
● Security mechanism is theoretically developed and not implemented etc
.
3. FUTURE PLAN
● To utilize it for selling and other feature included.
● Artificial intelligence (AI) integrated with the system to provide security by detecting specially
the frauds who uses the this project to steal the renters.
● Mobile malware, insecure Wi-Fi networks, device ID vulnerability are the common
problems in this kind of website and android development. So, we can find out solution for these
problems.
4. REFERENCES
[Link]
[Link]
[Link]