Download the complete computer science project topic and material (chapter 1-5) titled DESIGN AND IMPLEMENTATION OF A DIGITAL DIARY here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.
The Project File Details
The act of record-keeping is as old as man and its role cannot be over emphasis, as the human at times needs a form of reminder in performing a task or remembering a schedule or an event. Likewise, in emphasizing or buttressing on the truth or falsity of a particular subject in a given condition. A digital diary is an automated diary with enables one as a tool to write diaries (periodical events) without writing those stuff on paper. Its strength includes time organization, effort minimization and memories remembrance. This research work DESIGNED AND IMPLEMENTED OF A DIGITAL DIARY is a window-based system with its front end designed using MS Visual Studio 2008 and MS SQL Management Studio 2005 for its back-end design. This system (the proposed model) fully automates the manual personal diary with additional, advance and advantageous features.
TITLE PAGES i & ii
TABLE OF CONTENTS vii-ix
LIST OF FIGURES x
LIST OF TABLES x
CHAPTER ONE – Introduction 1
1.1 Background of study 2
1.2 Objectives of study 4
1.3 Scope of the study 5
1.4 Motivation 6
1.5 Statement of Problem
1.6 Limitation of study
1.7 Methodology 6
CHAPTER TWO – Literature Review 11
2.1 Introduction 11
2.2 Review of verification systems 11
CHAPTER THREE – System Analysis and Design 29
3.1 Introduction 29
3.2 System analysis of the system 29
3.3 Constraints of the existing system 31
3.4 Proposed system design 33
3.4.1 System algorithm design 33
3.4.2 Input design 39
3.4.3 Interface design 41
3.4.4 Output design 42
3.4.5 System database design 43
3.5 Technology, tools and programming language used 45
CHAPTER FOUR – Design and Implementation 48
4.0 Introduction 48
4.1 System design 48
4.2 System description 49
4.3 System implementation 52
4.4 Hardware requirement 53
4.5 Software requirement 53
4.6 System testing 54
4.7 System review and maintenance 54
4.8 Installation procedure 55
4.9 User guide 55
CHAPTER FIVE – Summary and Conclusion 57
5.1 Summary 57
5.2 Recommendation 58
5.3 Conclusion 58
APPENDIX (SOURCE CODES) 62
LIST OF FIGURES
1.1 The SSADM Approach. 8
1.2 The RAD Model. 9
2.1 Credit/Debit Card – front and back view 28
3.1 Input form to add Administrator 40
3.2 The main interface form 41
3.3a Verification Form 42
3.3b The Verification Result form 43
3.4 System’s database table for Admin 45
4.1 Use Case diagram for SVS 51
LIST OF TABLES
2.1 Address Verification Service – the types 13
2.2 Address Verification Service – detail description 17
3.1 Company Table 44
A system, with numerous definitions can be literally seen in a computer way as a collection of the hardware and software components of a computer.
According to Stella C. Chiemeke and Franca A. Egbokdara (2006), a system is set of components that interact to achieve a common goal. In another sense, a system is a group of interrelated or intersecting elements forming a unified whole.
In this modern age, computers have verified the cause of their existence.The advent of computers in our society caused a lot of criticism on the danger it poses on the society. Critics of computer and new techniques express their fear on how computers will displace and replace all human skills thus resulting to mass unemployment but the presence of computer on virtually every field of today’s fast life has proved the critic wrong as the invention of computers and new technologies continues to create additional jobs for those who identify themselves with computers and new technologies. This make computes partner to human beings in any fields of human endeavor.
“Decisions are largely based on principles and experience. In recent times, efforts are being made to build intelligence into computer system, whereby the computer can be used to process large volume of structured and unstructured information for decision making.”Said Uzoka in Hampo, J.A. (2011).
This system, DIGITAL DIARY is a window based system. It is an electronic and computerized means of periodic record keeping, scheduling, and reminder and so on. More than one person can use this personal digital diary, with full privacy and data security. This is in contrast with the manual personal diary that only one person uses it and it is without privacy and data security. Access to this system is simply by password and username.
In this modern age, computers have verified the cause of their existence. From sleeping and eating to exercise and travelling, technologies now allow us to track and analyze every detail of our lives. Due to the presence of advance computing technology and developed minds in the technological of life, almost everything has been digitalized or automated. Notably, the social life of many today has been automated via social network like Facebook, Twitter and TalkDeyGo.
“A diary is a record (originally in the handwritten format) with discrete entries arranged by date, reporting what has happened over the course of a day or a given period”, says Wikipedia, the free encyclopedia. From the aforesaid, a diary is a periodic or a daily with discrete entries. Diary is of diverse form/type ranging from personal diary (a diary which may include a person’s experience and/or thoughts or feeling, including daily comment on current events outside the writer’s direct experience) to travel diary, diet diary, dream diary and so on. A diarist is someone with the responsibility of safe keeping a diary. Or simply “someone who keeps a diary”, according to Wikipedia. Samuel Pepy (1633-1703) is the earliest diarist that is well-know today and his diary preserved in Magdalene College, Cambridge were first transcribed and published in 1825.
Diary played a major role in many aspect of human civilization as they are means of record and when review generates a feedback(s) for advance and immediate implementation, notably institutional diaries, government records and business ledgers likewise military records. Diaries have also helped by providing information for a memory, autobiography or biography. According to Wikipedia, “by extension, the term diary is also used to mean a printed publication of a written diary; and may also refer to other terms of journal including electronic formats example blogs, forum and internet diary”
According to Merriam-webster in Wikipedia, “The word diary comes from the Latin word ‘diarium’ which means ‘daily allowances’ from ‘dies’ which means ‘day’, likewise journal from the same root word ‘diurnus’ meaning ‘of the day’.” The work of Marcus Aurelus, a Roman emperior titled ‘To Myself’, written in Greek in the second half of yhe 2nd century AD displays many character of a diary, but the oldest extant diary came from the Middle East and Asian culture. In the 9th century AD, a Chinese scholar Li Ao kept a diary of his journey through Southern China.
Digitalizing diary has changed the meaning of the term ‘diary’ all together. The advent of computers in our society caused a lot of criticism on the danger it poses on the society. Digital diaries have today had more functions than just storing of data as against the conception of most individuals. The continuous availability of internet services and electronic/technological gadgets has made many people adopt it as a medium to chronicle their lives with the added dimension of an audience.
Below are examples/forms of diaries;
The objective of this research is as follows:
There are diverse forms of digital diary with various features like audio, video, graphics, text and encryption/decryption but this research is streamlined to a personal digital diary with features liketext, graphics and/or audio/video.
The ease of privacy intrusion caused handwritten diary and the frequent lost/theft of manual for the purpose of blacking mailing the diary owner or diarist is a serious threat to individuals and organization.
The advance and tremendous features coupled with data/information security has prompted or motivated this research.
Diaries often contain both good and bad content. The ease at which
Data/information is leaked out from a manual diary resulting to blackmailing of person(s) with the bad/negative content(s) in the diary. This is a big and mind disturbing issue as an individual’s good reputation can be dented with a negative content from his/her diary, denying him/her the good of tomorrow. Hence privacy and confidentiality has become a problem to handwritten or manual diaries. Thanks to technology, as the negative issues of manual diary has been addressed by digital diary.
This research is limited by the availability of time to access resource/materials, the materials reviewed as well as the scope of the study. Though, the available resources and materials are optimized.
The proposed system is designed on .NET frame work. Restricted access to some vital and important data and information is also a limitation to this study.
Relevant literature and authorities were reviewed and a critical study of digital diaries and their features was done.
Software methodology is the set of rules and practices used to create computer software. It is composed of any one of the software development models used together with at least a techniques thus,
METHODOLOGY = SOFTWARE MODEL + TECHNIQUES(S)
An in-depth literature review is done using document review and the internet.
The proposed design will be implemented using MS Visual Studio 2008 tools and Visual Basic (VB.net) as the programming language and MS SQL server 2005 for the database.
The methodology to be adopted for this project is the SSADM (Structured System Analysis and Design Methodology). The SSADM emphasizes on the completing a phase of the software development before proceeding to the next phase and also being able to go back to the other phases in a purely sequential manner. The model used for this project is the RAD (Rapid Application Development model proposed by IBM (International Business Machine) in 1980 and introduced to software community by James Martins through his book Rapid Application Development).
Fig. 1.1 THE SSADM APPROACH
Fig. 1.2 THE RAD MODEL
SSADM and RAD takes a modular approach to this student’s verification system using a best practice guide to ensure the successful implementation of the parts of this project sequentially. The design and testing of the system’s relational database management system (RDBMS) is to confirm the design specification. Therefore the window based graphical user face (GUI) will be integrated to input data into the system’s database. This project starts small and break down the implementation process into modules that are attainable based on the adopted requirement and analysis methodology.