Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
net/publication/330840289
CITATIONS READS
0 2,365
1 author:
A K M Bahalul Haque
North South University
37 PUBLICATIONS 7 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
A Research Project on Design, Develop and Implementation of Electronic Learning Management System (eLMS) in a Secure Environment View project
All content following this page was uploaded by A K M Bahalul Haque on 11 July 2020.
Master Project
INFORMATION CLASSIFICATION
Final report
By
Khaled Mosharraf (923542)
AKM Bahalul Haque (926413)
Submitted to
Prof. Dr. Stephan Schneider
Date
16,05,2017
Our focus here is going to be towards the current students, graduates and research personnel as the
number is rapidly increasing over time. Students who finish their studies want to get involved in jobs in
this country as they hope to get some extra facilities here, but reaching that level is a daunting task.
A shade of light in the darkness is that the recent the demand for international students who are
eventually termed as skilled professionals is increasing day by day. Especially in a case of Information
technology the demand is much higher, but not only for the Information technology, also for other fields
like medical, business, entrepreneurship, etc. the scenario is the same.
During the recent web research, statistics have shown intriguing results for the international students in
Germany and also the problem they face whilst in study and after studying there. While in the recent
past more than 300,000 international students have come here to study, most of them have a little
knowledge of the language here. It is also a very difficult task to study a new language whilst completing
other studies.
Moreover, the students and prospective job holders do not have enough information about the
companies here. It’s also time-consuming to find this information. Even after finding the company, the
next step becomes more challenging which involves creating curriculum vitae, cover letter and applying
to the respective company. These kinds of problems occur as the total system is different from the
students’ concerned countries.
Our objective is to improve the overall system design of the job portals. Based on our research and
customer feedback, if our model can correctly be implemented, we can control more than 65 percent of
the total student's traffic through our portal and additional activities mentioned as lacking above. The
tweaks and upgrades to the system will help the system to grow more efficiently, and a customized
version of existing job portals can be implemented. This new version of the scheme will take the
industry to a whole new level.
Our primary goal is to solve all those problems and make the life easier to fresh graduate or graduate to
get suitable jobs.
2.4 Benefits
Training History
Recall training if needed
Audit Facility’s
Training reminder
Documents Request
LMS is anytime anywhere 3rd ERA
Improve learner performance.
Cost reduction
Expected knowledge from candidate alignment.
2.5 Consultancy
Within the job market, there is always potential to have a lot of suitable candidates with prior job
experience. This service specially assists the user to prepare them for the Job market. After analyzing
requirements, the vast number of seekers do not know where to go, how to apply, how to create their
CV and how to focus their skills. On this project perspective, this service reduces time, preparing, and
applying on behalf of user/seeker that is looking for jobs.
One of the biggest problems of requirement elicitation is asking the right question to the stakeholder.
They might not know everything or perhaps cannot express their demand and expectations clearly. They
might not even know what they want for the system. So, in that case, it is important for them to get a
clearer idea about the project. The uncertainty of the project requirements may lead to a significant
problem. Conducting the elicitation techniques in an efficient way is a good way to reduce the risk as
this is an important procedure that can be done. Uncertainty cannot be removed rather reduced.
While collecting requirements, several things should be considered. The elements of requirements can
be categorised into various steps. As mentioned earlier, some things are known about the project
already. These specifications are called Facts. This distinctive note is imperative as it is the baseline of
next requirement gathering. The second type of elements is known as the Unknown. In this case, the
team should ask questions to the people who are responsible and have the authority and expertise to
answer. If someone provides concise information about the project if requested, that information later
becomes a Fact considering the above characteristics of the person. Next in line is an experience. This
category represents the fact that there are some projects which have been completed in the past and it
might help for better understanding of the requirements needed for this project. In this category, the
team should study documentations and come up with some conditions like the current project. There is
something else which also falls into this category, and that is Assumption. It is realistic that people
associated with this project will not be available always when needed. They might be unavailable for
some reasons, or the project might be a new one where proper stakeholders cannot be found as it has
not been done before. In this case, it is unwise to skip that part and move on to the next step. Here, the
expertise and assumptions come into play. The previous project documents assumptions are the
options. So, studying past projects and report will be a good source of requirements gathering.
There are no projects where all the requirements can be collected as facts or assumptions. Even the
best projects also have these scenarios where the team had to depend on something called Fate. There
After documenting the requirements, it is necessary to check it according to different criterion [5]. The
quality standards must be matched with the documented requirement. Stakeholders of a system have
different wishes and demands. After conducting the elicitation technique, the project team has to
gather and record all types of needs. These documents must be cross-checked with the stakeholder's
demand. All these processes are called requirement validation and negotiation.
Requirement validation[5] is defined by the incident how the documented requirements are similar and
dissimilar to the stakeholder's demand. If it has dissimilarities, what the quantity is etc. there should be
a prefixed measure of getting an idea about the validity of the requirements. They will be checked
according to the standard. There is a tiny room for error in this case. These collected data will be used
3.8 Activities
There are several types of events in requirement analysis. These are elicitation techniques, analyzing the
collected requirements and recording the same. Gathering requirements from the customer are the first
step of element analysis. For this reason, the team has to depend on various elicitation techniques like
an interview, questionnaire, brainstorming, etc. After collecting the requirements, they have to carefully
examine if there is any ambiguity, contradiction or incompleteness existing. If any issues exist, they also
3.9 Topics
Stakeholder identification is one of the most important issues of element analysis. Stakeholders are
distinct entities which are directly related to and have a direct interest in the system. One of the most
efficient ways to collect information from the stakeholder is through the interview process. The
stakeholders can be interviewed by the team who will gather the necessary requirements. During the
interview process, the stakeholders will have options to share their ideas with the team if they have any.
The users of a system can be interviewed, and their requirements can be documented in this way.
Brainstorming is also another way to collect the requirements from the stakeholders in a short time. It is
more effective considering that the users related to the system will be able to hear the explanation
about the system from the team and they will also have opportunities to discuss their opinions and
provide feedback. This elicitation can be very productive and motivating way of requirement analysis.
The requirement can also be collected through document analysis. Some existing document can be
studied and also other related documents can be taken into account for this elicitation type. Various
business plans, models, graphs statistics can be included in relevant text study.
Focus groups are also another method of the elicitation techniques. In these techniques, different focus
groups are selected, and the moderator asks an open question about the system. In this way, there is a
question-answer session, and some essential requirements can be collected from this discussion.
Surveys and questionnaires are another type of requirement elicitation. Using this method, essential
information can be gathered in a short time frame, from potentially a large group. The users are given a
questionnaire which includes different questions related to the system. It can be online or offline. The
target people are sent these questions, and from these replies, a huge number of requirements are
collected. There are several other elicitation techniques which are used according to the system and its
stakeholders.
Requirements can be recorded in various ways. The requirements are documented in the form of
documentation or use cases and in the event of the interviews, there are user stories. The user stories
are written in a natural language format and the stakeholder requirements are collected. There are lots
of repetitions and misinformation which have to omit. Moreover, later the stakeholder requirements
are divided into two parts named as functional requirements and nonfunctional requirements.
Use case diagram is a graphical representation of requirements that has been collected. It explains the
relation among the elements of the system. It does the following work for system requirements-
• Clarification
• Identification
• organization
The system boundary, the actors, roles of the actors in the system and the relations among them are the
main components of the use case diagram [8].
An activity diagram, which is similar to a flow chart, depicts the control flow of a proposed or existing
system. While in the use case, the relation between actors and their roles are drawn, in an activity
diagram the functionality of the steps used in use case are pictured[9].
In every system there is logic, upon which the system runs on. These logics are represented in a pictorial
manner which is called sequence diagram. A sequence diagram allows to properly document the logics
and also to validate the same needed for our system. These diagrams can be used for analysis of the
system and also to design the system as it focuses on the total characteristics and behavior of the
system [10].
3.10 Goals
From the recorded requirements the developer team should extract the purpose of the system. The
developer has to discover some clues by asking and repeatedly asking about the reason behind the
requirements. After finding the proper goal of the proposed system and its primary features, the
prototyping starts for further elicitation of the scheme. This prototype is then tested under different
circumstances and test cases set by the developer team according to the stakeholder requirements.
Define
Stakeholder Analysis
Identification
Select Implementation
Method
Information collection
Stakeholder Matrix
Analysis Stakeholder
Improve
Figure 2Stakeholder Analysis Steps
11.2.3 Plan
Planning phase it is essential for requirement analysis to find out every individual stakeholders interest.
According to this project seeker, employer played the most important role. Therefore, every single
element could be impacted or affected this system. In planning phase the underlying goal is to identify
primary stakeholder and secondary stakeholders which are directly and indirectly involved with this
system has interest in the system and or involvement with a system
11.3.3 Define
• After analyzing stakeholder list shown below
• According to the SDLC, process and software life, stakeholders are identified.
1 Owner
2. Admin
3. Employer
4. Developer Team
5.Advertising Agencies
6. Project Manger
7. Seeker
8. Technical support
team/webmaster
9.Application Engineer
14. Business Partner
12.Customer manager
13.Financial Manager
Table 1-IStakeholder Matrix
11.7.3 Brainstorming
It has used on this project to identify innovative, excellent creative ideas to determine the interest of
stakeholder in a short time. To identify openly know without any sound logic. Stakeholders wanted
different future like the easy way to get jobs, learn easily from LMS, and prepare themselves for the job
market. The team has received a lot of innovative ideas from the sessions such as a filer, salary
calculation, LMS system, and Knowledge Improvement.
11.8.3 Interview
This Elicitation technique is one of most important and modern technology. In this way, it is a flexible
way to ask a relevant question and responds to critical stakeholders. Regarding this project, we have
11.9.3 Survey/Questionnaire
Several different surveys have been completed using different methods. Below there is a basic template
which is used on survey.
Age:
Sex:
Level Of Study:
Field Of study:
Institution:
Nationality:
Have you ever applied for any job? (Part time/Full time)
Have you used any job recruitment system before?
Which job portals you visit frequently?
What was the frequency of our use?
What do you think about those websites? For example, what is missing in those sites?
What type of problem do you face while applying to jobs in typical job portals?(If the person
doesn’t have any experience before then we will start from here)
If we want to build a job recruitment system, what type of information, do you want from our
portal?
What type of filtering to search jobs, you want from our project?
Which type of job info do you expect from our project?
Which info you do not want to share with anyone?
If you have to pay for the service. Which payment gateway you would like to pay for the
service? (You can choose one or more)
12. Which features you prefer to have in the job search engine?
13. Would you like to use your Smartphone to use our service?
Would it be helpful for you if your online registration would ask your permission (require-ment)
to use one of your social networks(e.g Facebook, Twitter, Gmail, LinkedIn, Pinterest etc.) to get
your personal data so that you wouldn’t to type in hands all your data and your data would be
automatically retrieved from there.
Do you want automatic application of jobs for your desired category jobs?
What kind of Instruction you want to use our service?
Do you want access overwriting of your user account?
Do you prefer a map where you can find jobs near your location and see direction from your
place of stay?
What rather support you would like from the system?
What do you think the office hour of the support section should be?
Would you like to have a salary calculator to compare salaries by job title or location or to plot
your current salary against local and national average?
Would you like to have blog in our system where you can get advices Resume advices and
interviews tips?
Do you like an anonymous company, salary, and interview and benefit review in our system as a
current or former employee with which future job seekers can accelerate their carrier?
11.15.3 Prototyping
After collecting requirements and analysis prototype is designed. Several test cases were run with the
random users. It has changed on multiple occasions after test case. The Very basic prototype is designed
next part of the report.
11.17.3 Improve
Regarding this process, it is to understand stakeholder’s requirements and aggregated. The team sought
to avoid stakeholder’s conflicts to improve the system, separated important stakeholder group to the
planning team and simplified planning to design.
11.19.3 PASSMADE
In a short from it is called PASSMADE [14], which is below abrogation
Performance
Regarding this project, we consider it as Server response time, Bandwidth management, and Network
capacity on this system, Server traffic and Application processing time. As it is a prototype, we consider
it for implementation.
Arability
It's dependents for backing up and scheduling down or restarting server and maintenance working time
which could be pre- scheduling or short notice. This is dependents on time which cost money on the
maintenance.
Requirements
• Should be Skill engineer,
• Strong Time scheduling.
• Amiable resources
• Testing Facility
• Code strangeness
• Hardware failed
• Human error
Security
Followed CIA principle with
• Authorization
• Authentication
• Data security
• Encryption
• Data policy
• Auditing to prevent data altering
• Authentication factor
N.P: expected service to the customer for every certain amount of user need to increase ram and HDD
capacity for personal data and backup storage.
Maintainability
Factors
Business Requirement Complexity
Application Complexity
Data Structures Complexity
Code Complexity
History Documentation
Automated Documentation
Business Overview Documentation
Code Annotation
Code Size
Release Frequency
Not to Heavy code
Should be easy program
Defect free application preferable
Accessibility
A proposed system designed by user type with different access right and facilities. On the project
World Wide Web Consortium followed, consider with the integrity user can access and their rights and
strictly followed security protocols.
Deployment
Regarding this project, deployment is possible from any users TAB, Phone or computer as the system
design is going to provide different interfaces for various devices.
Extensibility
It is designed for a smooth performance which can be run on any kind of system and low conf system as
well. Developer team tried to make error free code and no fault occur during in operation time.
•User ID
Something you know
•Password
Something you have
•Dont know
Something you are
Figure 3Three Factor Authentication
This application platform usually used for so-called common purpose like [18]
• Administration,
• Documentation,
• Tracking, reporting and
• Delivery of electronic educational technology
However, in the Project we design, LMS system not only designs for education purpose but also it is
special purpose with development of Skill for getting job.
In this Project, we followed SDLC and Agile process to design our system. We followed main
process from SDLC [19] [20], which is
o Planning
o Analysis
o Design
o Implantation
5.1 Planning
In this steps we planned before start
Planning is important to determine why a system has to be built and implemented
Roadmap of team work and how the project will be developed step by step
Two steps included in the planning phase are project initiation and project management
steps. Project initiation phase determines the business value of the project and project
management phase determines work plan, different techniques required for the
development and proper direction of the project through SDLC.
5.2 Analysis
In this phase, we did requirement analysis. At the beginning we (Explain bit more here)
• Investigates existing system.
• Market analysis regarding system
• Cost analysis (Reduced cost for developing and maintained)
• Targeted customer analysis (For expected system)
• Identification of improvement new proposed system regarding stakeholder demand.
• Identify primary and secondary stakeholder, which mention first part of this report.
• Identify involvement with system to stakeholder.
• Identify stakeholder interest. (Stakeholder Matrix)
• Gathering all of requirements
• Prioritize requirements
• Negotiation with stakeholders requirements
• Test requirements
• Proposal for new system on demand of stakeholder
• Develop high level design
5.3 Implantation
We develop different kind of UML and mockup to test and finally we develop prototype.
Implementation of different stakeholder’s different prototypes
System Requirements
Operating system: Window 7 and any upper OS (Windows and Linux)
Microprocessor: Pentium-4 class processor, 2.2 GHz
Hard disks : 2GB
RAM : 256 MB
SoftwareRequirements
Java language : JavaSCRIPT ,.JSP,Java Servlets
Package : java UPDATE
Database : MYSQL Server,5.6.17 : Database - sis
Client side scripting :HTML,CSS,JavaScript.
Web-Server :WAMP server Package.
Web Application server: Apache Tomcat Server 8.0.27
End-user characteristics
Career and
Application
Information
varchar 255
Objective int 255
Expected Salary : varchar 255
Looking For : varchar 255
Available For :
Preferred Areas
varchar 255
Job Category : varchar 255
Preferred Job
Category varchar 255
Job Location(s) varchar 255
Organization Type
Other Relevant
Information
varchar 255
Career Summary : varchar 255
Special
Qualification : varchar 255
Keyword
SQL is an umbrella term for various software categories.SQL allows schema-less data storage, which is
not promising with relational database storage. In the last two or three decades, SQL databases are
supporting explosively to increase business data, especially, in social networks, retail, e-commerce, etc.
This is why we have used SQL as our supportive database to access user / group and employee access,
as well as an admin panel to provide high scalability, simpler designs and higher availability with more
precise control. The capability to securely manage big data is another significant reason for the adoption
of SQL databases.
System admin:
Add delete modify users
Modify user access to the system
Remote access for system troubleshooting
Employer
Update profile
Edit company profile
Edit job posting within a specific time limit
Post advertisement, projects and review the results
Job Seeker
Update profile
Edit information in the curriculum vitae
Modify job application status
Modify project solution posting and update it
Project Reviewer
Update /modify profile
Upload new project
Modify old projects or delete them
Upload results
Add / modify solution
10.1 Limitations
Video chatting between the employee and job seeker will be included so that the employer can
have a quick short interview in case of emergency recruitment or distant interview
Different workshops, company visit information will be available to the users so that the
recruitment company can have their job seekers see the real life job situation and get advice
from the already established jobholders
A forum and/or blog has to be included so that the users can share their ideas and exchange
knowledge among themselves
Users have to be given more control over the system to properly interact with it.
Figures Reference:
Figure 5: "Software Requirements", www.tutorialspoint.com, 2017. [Online]. Available:
https://www.tutorialspoint.com/software_engineering/software_requirements.htm. [Accessed: 8- May- 2017].