DESIGN AND IMPLEMENTATION OF A DIGITAL DIARY

5,000.00

 

ABSTRACT

The act of record-keeping is as old as man and its role cannot be over emphasis, as the human at times needs a form of reminder in performing a task or remembering a schedule or an event. Likewise, in emphasizing or buttressing on the truth or falsity of a particular subject in a given condition. A digital diary is an automated diary with enables one as a tool to write diaries (periodical events) without writing those stuff on paper. Its strength includes time organization, effort minimization and memories remembrance. This research work DESIGNED AND IMPLEMENTED OF A DIGITAL DIARY is a window-based system with its front end designed using MS Visual Studio 2008 and MS SQL Management Studio 2005 for its back-end design. This system (the proposed model) fully automates the manual personal diarywith additional, advance and advantageous features.

 

TABLE OF CONTENTS

TITLE PAGES                                                                        i & ii

CERTIFICATION                                                                            iii

DEDICATION                                                                        iv

ACKNOWLEDGEMENT                                                       v

ABSTRACT                                                                            vi

TABLE OF CONTENTS                                                                  vii-ix

LIST OF FIGURES                                                                 x

LIST OF TABLES                                                                            x

CHAPTER ONE – Introduction                                                       1

1.1     Background of study                                                     2

1.2     Objectives of study                                                        4

1.3     Scope of the study                                                                   5

1.4     Motivation                                                                     6

1.5     Statement of Problem

1.6     Limitation of study

1.7     Methodology                                                                           6

CHAPTER TWO – Literature Review                                                        11

2.1     Introduction                                                                                      11

2.2     Review of verification systems                                                         11

CHAPTER THREE – System Analysis and Design                                   29

3.1     Introduction                                                                                      29

3.2     System analysis of the system                                                 29

3.3     Constraints of the existing system                                          31

3.4     Proposed system design                                                          33

3.4.1  System algorithm design                                                                   33

3.4.2  Input design                                                                                      39

3.4.3  Interface design                                                                       41

3.4.4  Output design                                                                          42

3.4.5  System database design                                                           43

3.5     Technology, tools and programming language used                         45

CHAPTER FOUR – Design and Implementation                             48

4.0     Introduction                                                                                      48

4.1     System design                                                                         48

4.2     System description                                                                           49

4.3     System implementation                                                           52

4.4     Hardware requirement                                                             53

4.5     Software requirement                                                              53

4.6     System testing                                                                         54

4.7     System review and maintenance                                              54

4.8     Installation procedure                                                             55

4.9     User guide                                                                               55

CHAPTER FIVE – Summary and Conclusion                                 57

5.1     Summary                                                                                 57

5.2     Recommendation                                                                     58

5.3     Conclusion                                                                              58

REFERENCE                                                                                   60

APPENDIX (SOURCE CODES)                                                      62

LIST OF FIGURES

1.1     The SSADM Approach.                                                                   8

1.2     The RAD Model.                                                                     9

2.1     Credit/Debit Card – front and back view                                28

3.1     Input form to add Administrator                                            40

3.2     The main interface form                                                          41

3.3a   Verification Form                                                                    42

3.3b   The Verification Result form                                                   43

3.4     System’s database table for Admin                                         45

4.1     Use Case diagram for SVS                                                      51

 

LIST OF TABLES

2.1     Address Verification Service – the types                                 13

2.2     Address Verification Service – detail description                    17

3.1     Company Table                                                                       44

 

CHAPTER ONE

INTRODUCTION

A system, with numerous definitions can be literally seen in a computer way as a collection of the hardware and software components of a computer.

According to Stella C. Chiemeke and Franca A. Egbokdara (2006), a system is set of components that interact to achieve a common goal. In another sense, a system is a group of interrelated or intersecting elements forming a unified whole.

In this modern age, computers have verified the cause of their existence.The advent of computers in our society caused a lot of criticism on the danger it poses on the society. Critics of computer and new techniques express their fear on how computers will displace and replace all human skills thus resulting to mass unemployment but the presence of computer on virtually every field of today’s fast life has proved the critic wrong as the invention of computers and new technologies continues to create additional jobs for those who identify themselves with computers and new technologies. This make computes partner to human beings in any fields of human endeavor.

“Decisions are largely based on principles and experience. In recent times, efforts are being made to build intelligence into computer system, whereby the computer can be used to process large volume of structured and unstructured information for decision making.”Said Uzoka in Hampo, J.A. (2011).

This system, DIGITAL DIARY is a window based system. It is an electronic and computerized means of periodic record keeping, scheduling, and reminder and so on. More than one person can use this personal digital diary, with full privacy and data security. This is in contrast with the manual personal diary that only one person uses it and it is without privacy and data security. Access to this system is simply by password and username.

  • BACKGROUND OF THE STUDY

In this modern age, computers have verified the cause of their existence. From sleeping and eating to exercise and travelling, technologies now allow us to track and analyze every detail of our lives. Due to the presence of advance computing technology and developed minds in the technological of life, almost everything has been digitalized or automated. Notably, the social life of many today has been automated via social network like Facebook, Twitter and TalkDeyGo.

“A diary is a record (originally in the handwritten format) with discrete entries arranged by date, reporting what has happed over the course of a day or a given period”, says Wikipedia, the free encyclopedia. From the aforesaid, a diary is a periodic or a daily with discrete entries. Diary is of diverse form/type ranging from personal diary (a diary which may include a person’s experience and/or thoughts or feeling, including daily comment on current events outside the writer’s direct experience) to travel diary, diet diary, dream diary and so on. A diarist is someone with the responsibility of safe keeping a diary. Or simply “someone who keeps a diary”, according to Wikipedia. Samuel Pepy (1633-1703) is the earliest diarist that is well-know today and his diary preserved in Magdalene College, Cambridge were first transcribed and published in 1825.

Diary played a major role in many aspect of human civilization as they are means of record and when review generates a feedback(s) for advance and immediate implementation, notably institutional diaries, government records and business ledgers likewise military records. Diaries have also helped by providing information for a memory, autobiography or biography. According to Wikipedia, “by extension, the term diary is also used to mean a printed publication of a written diary; and may also refer to other terms of journal including electronic formats example blogs, forum and internet diary”

According toMerriam-webster in Wikipedia, “The word diary comes from the Latin word ‘diarium’ which means ‘daily allowances’ from ‘dies’ which means ‘day’, likewise journal from the same root word ‘diurnus’ meaning ‘of the day’.” The work of Marcus Aurelus, a Roman emperior titled ‘To Myself’, written in Greek in the second half of yhe 2nd century AD displays many character of a diary, but the oldest extant diary came from the Middle East and Asian culture. In the 9th century AD, a Chinese scholar Li Ao kept a diary of his journey through Southern China.

Digitalizing diary has changed the meaning of the term ‘diary’ all together. The advent of computers in our society caused a lot of criticism on the danger it poses on the society. Digital diaries have today had more functions than just storing of data as against the conception of most individuals. The continuous availability of internet services and electronic/technological gadgets has made many people adopt it as a medium to chronicle their lives with the added dimension of an audience.

Below are examples/forms of diaries;

  • Personal diary – which may include a person’s experiences and/or thoughts or feelings, including other current comments.
  • Sleep diary – a tool used in the diagnosis and treatment of sleep disorder. It is also called sleep log.
  • Travel diary/diary – is the documentation of a journey or series of journey. At times it is called road journal/diary
  • War diary
  • Dream diary
  • Fiction diary
    • OBJECTIVES OF THE STUDY

The objective of this research is as follows:

  1. To design an automated diary (a digital diary) that is window based system using vb.net as its front end design and SQL server as its back end design. This diary will:
  2. Eradicate and/or limit paper work
  3. Provide privacy, since your digital diary can only be stolen by the ignorance of the diarist through password and username publicity
  4. Maintain and promote history as digital diaries cannot get lost, old or decay
  5. To explain digital diary, its forms and importance to human
  6. To itemize the advantages of digital diary over hand written diary
  7. To show the new features of digital diary that made the term ‘diary’ to revolutionize
    • SCOPE OF THE STUDY

There are diverse forms of digital diary with various features like audio, video, graphics, text and encryption/decryption but this research is streamlined to a personal digital diary with features liketext, graphics and/or audio/video.

  • MOTIVATION OF THE STUDY

The ease of privacy intrusion caused handwritten diary and the frequent lost/theft of manual for the purpose of blacking mailing the diary owner or diarist is a serious threat to individuals and organization.

The advance and tremendous features coupled with data/information security has prompted or motivated this research.

  • STATEMENT OF PROBLEM

Diaries often contain both good and bad content. The ease at which

Data/information is leaked out from a manual diary resulting to blackmailing of person(s) with the bad/negative content(s) in the diary. This is a big and mind disturbing issue as an individual’s good reputation can be dented with a negative content from his/her diary, denying him/her the good of tomorrow. Hence privacy and confidentiality has become a problem to handwritten or manual diaries. Thanks to technology, as the negative issues of manual diary has been addressed by digital diary.

  • LIMITATION OF THE STUDY

This research is limited by the availability of time to access resource/materials, the materials reviewed as well as the scope of the study. Though, the available resources and materials are optimized.

The proposed system is designed on .NET frame work. Restricted access to some vital and important data and information is also a limitation to this study.

  • METHODOLOGY

Relevant literature and authorities were reviewed and a critical study of digital diaries and their features was done.

Software methodology is the set of rules and practices used to create computer software. It is composed of any one of the software development models used together with at least a techniques thus,

METHODOLOGY = SOFTWARE MODEL + TECHNIQUES(S)

An in-depth literature review is done using document review and the internet.

The proposed design will be implemented using MS Visual Studio 2008 tools and Visual Basic (VB.net) as the programming language and MS SQL server 2005 for the database.

The methodology to be adopted for this project is the SSADM (Structured System Analysis and Design Methodology). The SSADM emphasizes on the completing a phase of the software development before proceeding to the next phase and also being able to go back to the other phases in a purely sequential manner. The model used for this project is the RAD (Rapid Application Development model proposed by IBM (International Business Machine) in 1980 and introduced to software community by James Martins through his book Rapid Application Development).

 

 

 

 

 

 

 

 

 

Fig. 1.1 THE SSADM APPROACH

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Fig. 1.2 THE RAD MODEL

SSADM and RAD takes a modular approach to this student’s verification system using a best practice guide to ensure the successful implementation of the parts of this project sequentially. The design and testing of the system’s relational database management system (RDBMS) is to confirm the design specification. Therefore the window based graphical user face (GUI) will be integrated to input data into the system’s database. This project starts small and break down the implementation process into modules that are attainable based on the adopted requirement and analysis methodology.