Library Offence Documentation Systemwiu11jtcrm
Library Offence Documentation Systemwiu11jtcrm
documentation system
ABSTRACT
offenders.
In the course of the development of this new system, the current system
was analytically and critically studied or assessed and thus the identified
pre-processor) was used to code the program modules developed for the
1
CHAPTER ONE
1.1 INTRODUCTION
2007).
2
document, microform, CDs, cassettes, videotapes, DVDs,Blu- ray Discs,
intended for use by people who choose not to –or cannot afford to
for libraries by providing quiets areas for studying, and they also often
often provide public facilities for access to their electronic resources and
library, reference library which does not lend books or any other
3
help with citations; effectives search techniques journal database, and
designed to preserve the material and the activities in the library both for
the librarians and the user to have accessed to the information needs. The
(Sadanandanshamin, 2008).
peripheral media such as magnetic tapes, disks, optical media and utilization of
computer based products and service in the performance of all typesof library
4
automation in operations function since they are electronic, programmable and are
communication technology in the process control of library will move the library
operation economically feasible (Roberts & John marres, 1997). The capabilities of
computer associated peripheral media & its application in library activities and
from one another by Selectors ordered materials with ordering slips, indexed them
with the card catalog and documentation of library offences is usually a by task
The aim of this project is to design and developed a computerized system for
5
4. To computerize the description of offence.
field study and research rather than classroom study. Therefore, library
has to play vital role in the higher education to meet user requirement.
3. This also eases the automation of the library offences to ease the
6
1.6 DEFINITION OF TERMS
1.6.1 LIBRARY
information for use by the public, it is usual but not a defining features of
1.6.2. COMPUTERIZED
the library.
1.6.3. OFFENCE
that provide services to the people, laws are established to regulate the
established moral rules, users that violate these rules are said to have
1.6.4. PENALTY
procedures.
7
1.6.5. LIBRARY STAFF
This is the general term used for individual attending to the daily
This is also the general term used for the database that runs the library
systems.
8
CHAPTER TWO
word derives from the Latin liberi “look” where as a Latin red Greek
and Romans language from their historical, beginning as place to keep the
access over the internet cable television or some other types of remote
9
2.2 FEASIBILITY STUDY
This explains how viable it is to carry out the design and development of
Economically:
The existing system compared with the features and functionality of the
for the development of the proposed system is available and it does not
Technically
like operating system and it is available and can be seen viable. Therefore
it is technically feasible to carry out this project since all that is required
Operationally:
From the study of the existing system compare to the proposed system we
required for smooth operation of the proposed system are CPU with
10
RAM, HardDisk, DVD/CD ROM to enable proper functionality of the
system. The use of this component will be more appreciated and this
makes it feasible.
The analysis of the existing system and the proposed system is described
from the research known as fact finding. The process and methods use in
This process entirely entails the ways and how records and data are
if wrong data is collected or a kind of bias has been show during the data.
Data that are collected for conclusion purpose and used for that purpose is
known as primary data that is collected from the source the merit of it is
that the information is obtained directly from the original sources. Data
gotten from other aspect from source are called secondary, data, there are
11
Methods of data collection
The method use in collecting of data for the development of the proposed
system is from the primary sources of data collection and they are
explained as follows.
closely to discover the true nature of the problem that lead to the request
for an investigation, at the same times. The analysis can again be a better
that a recommendation from someone who know the system well find
Documentation
from already kept record. This method was used in the previous data
library offenders.
This section explains the analysis of the old system, it elaborate on how
the existing system works. The old system embarks on manual system of
library offences. From the analysis it shows that the existing system for
12
detection of library offences will not be as efficient as the proposed
system.
EXISTING SYSTEM
The existing method deals a lot with paper work which can be easily
All that has been listed above are the problems found using the existing
system, therefore it lead to a proposal for a new system that will solve all
the library.
13
CHAPTER THREE
This section discussed the design of the new system, the design of the
Figure 3.1
Home Page
Menu item
About
Registration Profile Admin
Login
Database
Fig 3.1 Architectural Design of computerized system for detection of library offences
14
3.2 ABSTRACT SPECIFICATION
Contacts, interface.
show below:
Duration Numeric
Department Alphannumeric
Course Alphannumeric
Part/Class Alphannumeric
Date Numeric
Gender Alphannumeric
Mat. No Alphannumeric
15
2. REGISTRATION OF STAFF DATA TYPE
Mat. No Alphannumeric
Date Alphannumeric
Mat. No Alphannumeric
Department Alphannumeric
Level Alphannumeric
16
3.2.2 OUTPUT SPECIFICATION
derived or displayed from the system and the manner in which such
should appear and the type of data. This usually depends on the input
supply.
OUTPUT SPECIFICATION
r borrowe d
d
Zzzz Www Ssss Vvvv Xxxx Vvv 88888 Xxxx Yyy Xxxx
w v y
Due
Zzzz Wwww Ssss Vvvv Xxxx Vvvv 77777 Xxxx
17
The interface design is very important for any application. The interface
design describes how the software communicated with humans who use
User name
Password
quick, inexpensive and flexible for other users. The data structure design
18
for input specification is as shown in table 3.1. Table 3.2 is the data
Course Text
Part/Class Text
Date Numeric
Gender Text
Home Address Text
Matric Number Numeric
Phone Number Numeric
Staff Name Text
Staff Phone Number Numeric
is in appendix A.
Start
Enter password
Stop
19
(b) Student Module
Select Date of Registration
Start
Enter Student Name
Enter metric Number
Enter phone Number
Enter Department
Enter Home Address
Enter Part/Class
Enter Course
Enter Gender
Enter Duration
Enter Staff Name
Enter Staff Phone Number
Submit
Stop
CHAPTER FOUR
20
4.1 SYSTEM IMPLEMENTATION
through testing of data to ensure that the system works properly. At the
and designed to be explicate and less tedious so that any other users to the
system can perform the specified operations for which the application
was designed.
create, manipulate, maintain, extract and summarizes the data records and
and security.
(MYSQL) and Data Base. The reasons why php and Mysql are use for the
This part of this project deals with the different aspects that need to be
ensure that it achieves the aims of the project. This is done by carrying
pout the installation of the new system and testing it to see its viability and
512 AB Ram
20 GB hard disk
Standard mouse
CD Rom Drive.
22
4.5 SOFT WARE REQUIREMENT
wants.
This package can only be run and developed with the following minimum
software requirements.
Microsoft Access
Wampsever
installed in the users environment, there are installation activities that are
installation plan you prepare for the design specification report or system
works accurately and efficiently before actual operation starts. The major
designed for this project working perfectly well. This can be done in two
SYSTEM TESTING:- The parts are linked together and the test
through test running, then a changeover can be introduced, there are six
(6) well known conversion method which after a range of advantage and
disadvantages. The system self may well directly influence the final
decision. In many instances the faster conversion takes place the better in
order to gain the ultimate benefits that the new system offers. Change
over means to integrate the new system and the change over method may
24
Direct approach:- this approach entails selecting a particular date
when the old system is terminated any the new system is brought into
operation. It cost lesser than the parallel method but is prone to error.
to phase in the new system while gradually phasing out the old system
the new and the existing system are simultaneously operational until a
or part of the new system are implemented and evaluated using the
change over the existing system to the new system. Therefore, among all
the method above it is how ever recommended that the system of library
effectiveness security level and harmonizes the section of the library with
25
4.9 SYSTEM DOCUMENTATION
easier between the designer of the new system and the users of the
system. This process will make the development of the new system easier
and faster as the document will serve as a guide line for the developer to
communication.
CHAPTER FIVE
5.1 SUMMARY
the program provide ultimate security and flexibility to the staff, users
26
with just little experience. The program starts by requesting the user
program main menu has two link, the library offence where an offence is
browse against any user to display possible sanction against the user at
the register user window by taking library users possible information into
database. The other link which is the offensive user displays list from the
functionalities that allow viewing details, sorting from the list and
searching data from the list. Deleting a registered student can only be
5.2 CONCLUSION
This study reveals that Niger State Polytechnic Zungeru library has
database system which registers and keep detailed record of offence and
it respective penalty against any offensive user. The study show that
cleaning any record can be done with automated system which is far
reducing the manual of the staff working in the library integrate the
27
separate and independent task of keeping record of offensive user. This
5.3 RECOMMENDATION
system.
REFERENCE
28
Library - Definition and More from theFree Merriam-Webster
Dictionary" merriam-webster.com .
p.42
Start
Log in details
Appendix A (Flowchart)
If
log
in
corre
ct
1. Home item
2. Menu item
3. About us
29
Stop
No
Yes
No
Home
Start
1. Admin
2. Menu item
3. About us
If
Opt =
1
30
Admin
If
Menu item
Opt =
2
If
Opt = About us
3
Stop
Star
t
1. Registration
2. Menu
ProfileItem for student
If
Opt Register student
=
1
If
Opt 31 View student profile
=
2
Yes
NoStart
Yes
No
Sto
p
If Logout
Opt
=
1
If
Opt
=
2
If
Opt
=
3
If
Opt
=
4
1. Logout
2. New staff
3. offendersIf
Opt
4. offence/penalty
5. Borrowing=
6. Returning6 32
Sto
p
Yes
No
Yes
Add New Staff
No
Yes
Register
offenders
N0
Yes
Add New
offence/penalty
No
View
Yes
Borrowing
form
No
33