Computer Science Project Topics

Design and Implementation of a Computerized Library Offense Documentation System

Design and Implementation of a Computerized Library Offense Documentation System

Design and Implementation of a Computerized Library Offense Documentation System

Chapter One

AIM AND OBJECTIVES

The aim of this project is to design and developed a computerized system for detection of library offence.

The following are the objectives of the project

  1. To design a computerized system for detection of library offence.
  2. To developed algorithm that will be used in implementing the design computerized system for detection of library offence that will help in registers of offence and sanction against offensive users.
  3. To safely keep the list of offensive users.
  4. To computerize the description of offence.

CHAPTER TWO

LITERATURE REVIEW & SYSTEM ANALYSIS

LITERATURE REVIEW

Traditional collection of books use for reading or study, on building or room in which such a collection is kept (Casson&Lionel, 2002).  The word derives from the Latin liberi “look” where as a Latin red  Greek word, bibliotheca, is the origin of the word library in German, Russian, and Romans language from their historical, beginning as place to keep the business legal, historical, and  Religions record of a civilization, library have emerged since the middle of 20th Century as a far-reaching a body of information resources and service that do not even required a building, rapid developed in computer, telecommunication, and other technology have made it possible to store and retrieve information in many different forms any place with a computer and a telephones connection(Rany, 2013).The terms to digital library and virtual library have begun to be used to refer to the vast collection of information in which people gain access over the internet cable television or some other types of remote electronic connection (Nicos & John, 1978).

FEASIBILITY STUDY

This explains how viable it is to carry out the design and development of the proposed system. It explains economically, operationally and technically how feasible it is to carry out this project work.

Economically:

The existing system compared with the features and functionality of the proposed system, shows that it is viable to keep on with the development of the proposed system. The requirements (hardware and software) need for the development of the proposed system is available and it does not cost much to acquire it.

 Technically

It is technically feasible to develop systems that will detection of library offences in Niger Polytechnic as Institution and to time upgrade of the system. What is required for the system to operate technically is software like operating system and it is available and can be seen viable. Therefore it is technically feasible to carry out this project since all that is required can be available and when developed it won’t technically cost much.

Operationally:

From the study of the existing system compare to the proposed system we can therefore conclude that the development of the proposed system is a feasible idea. In view of the above study the hardware component required for smooth operation of the proposed system are CPU with RAM, HardDisk, DVD/CD ROM to enable proper functionality of the system. The use of this component will be more appreciated and this makes it feasible.

SYSTEM ANALYSIS

The analysis of the existing system and the proposed system is described from the research known as fact finding. The process and methods use in the fact finding procedure are as follows:

FACT FINDING

This process entirely entails the ways and how records and data are collected for the purpose of developing a new system. Data has to be collected in order to make meaningful analysis, collection work because, if wrong data is collected or a kind of bias has been show during the data.

Data that are collected for conclusion purpose and used for that purpose is known as primary data that is collected from the source the merit of it is that the information is obtained directly from the original sources. Data gotten from other aspect from source are called secondary, data, there are different method of data collection used in this project work which include document and personal interview method were used.

Methods of data collection

The method use in collecting of data for the development of the proposed system is from the primary sources of data collection and they are explained as follows.

INVESTIGATION: – In this phase, the existing system is studies closely to discover the true nature of the problem that lead to the request for an investigation, at the same times. The analysis can again be a better understanding of the way the system operates. There is a string possibility that a recommendation from someone who know the system well find favour with management

Documentation

This is a method of data collection where by secondary data is obtained from already kept record. This method was used in the previous data

Record available record in library was investigate which enable the researcher to be the problem of the lack of payment on changing of library offenders.

 

CHAPTER THREE

SYSTEM DESIGN

This section discussed the design of the new system, the design of the new system employed the architectural design at section 3.1

ARCHITECTURAL DESIGN

Architectural Design of automated library offences employed

ABSTRACT SPECIFICATION

The abstract specification of the computerized system for detection of library offences consists of the following, Registration, Profile, Admin and Contacts, interface.

INPUT SPECIFICATION  

One of important aspect of system design is the input specification as show below:

Date Borrowed

CHAPTER FOUR

SYSTEM IMPLEMENTATION AND DOCUMENTATION

The purpose of this section is to highlight on the implementation environment of the system. This covers the hardware software environments for the implementation phase of the system design and development. A top down design approach was used in structuring the program. The system consist of modules and sus-modules. Which are linked up to facilitate easy flow of data and control.

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

SUMMARY

The program developed is an automation of the library offence system, the program provide ultimate security and flexibility to the staff, users with just little experience. The program starts by requesting the user authentication password to secure the software from strange user. The program main menu has two link, the library offence where an offence is browse against any user to display possible sanction against the user at the register user window by taking library users possible information into database. The other link which is the offensive user displays list from the database of the registered library offensive users with other sub functionalities that allow viewing details, sorting from the list and searching data from the list. Deleting a registered student can only be done by an administrator user password staff user can be added and removed from the list under password in the menu bar.

CONCLUSION

This study reveals that Niger State Polytechnic Zungeru library has computerized though library offence and penalties are not computerized. The library office and penalties were successfully computerized using database system which registers and keep detailed record of offence and it respective penalty against any offensive user. The study show that collection and acquisition process of obtaining information about offensive user record maintaining and deleting records as wells as cleaning any record can be done with automated system which is far better than manual means of keeping record for offensive users by reducing the manual of the staff working in the library integrate the separate and independent task of keeping record of offensive user. This program provides flexibility and high security to the record of the registered library offensive user in the library.

RECOMMENDATION

It is recommend that the student who wishes to design this type of program can build on this project by putting the following library offensives user in the library.

  1. Further work should be done incorporate tile back up recovery system.
  2. More project work should be done in comprising other functional components of the library. 

 REFERENCE

  • Casson, Lionel (11 August 2002).Libraries in the Ancient World . Yale University Press. p. 3. Retrieved 7 March2012.
  • Krasner-Khait, Barbara (2010).”History Magazine” . history-magazine.com .Retrieved 5 March 2012.
  • Library – Definition and More from theFree Merriam-Webster Dictionary” merriam-webster.com .
  • Library … collection of books, public orprivate; room or building where these arekept; similar collection of films, records,computer routines, etc. or place wherethey are kept; series of books issued insimilar bindings as set.”–Allen, R. E., ed.(1984) The Pocket Oxford Dictionary ofCurrent English. Oxford: Clarendon Press; p.42
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!