Professional Documents
Culture Documents
This project has been read and approved as the requirement for the award of Higher National
Diploma (HND) in Computer Science, School of Technology. Kano State Polytechnic.
i
CERTIFICATION
This is to certify that this project was carried out by ZAINAB SALISU MUHAMMAD with
registration number HND/COM/21/0062 of the Department of COMPUTER SCIENCE
under the supervision of MALLAMA. AMINA IBRAHIM and has meets the requirement for
the award of Higher National Diploma in Computer Science.
I hereby declare that l carried out the work reported in this project in the department of
computer science, school of technology, Kano state polytechnic, under the supervisor Mal.
Sani ibrahim and also solemnly declare that to the best of my knowledge no part of this report
has been submitted here or elsewhere in no previous application for the award of any
certification.
………………………… …..…………………
ii
DEDICATION
This work is dedicated to the Almighty Allah for making me able to start up and finish in the
sound of health. Also, to our parents as well for being supportive in the cause of this project
Work both financially and spiritually, and to my brothers and sisters and close friend for
being supporting and kind to me during the cause of this project work thank you all.
iii
ACKNOWLEDGMENT
My profound gratitude to Almighty Allah for the knowledge, wisdom and understanding that
he bestowed on me to carry out this project.
I appreciate my supervisor MALLAMA AMINA IBRAHIM for the supervision and support
that he gave, which helped the progression and smoothness of the project. The co-operation is
much indeed appreciated.
My grateful thanks also go to the Entire Computer science department of the Kano State
Polytechnic, the H.O.D DR. HASSAN BELLO and all lecturers who prepared me from the
base of computer science.
Special thanks also to my parents my father Alhj. Aminu Abdullahi, and my mother Haj.
Binta Usman, and I will like to greet on whose too special in my heart who I hold too dearly a
special thanks to him Mujahid Abubakar Yusuf. They encouraged supported and helped me
financially, prayerfully and morally throughout this project. May the Almighty Allah bless
you all and keep you all to enjoy the fruit of your labor Insha’Allah.
iv
ABSTRACT
Libraries have been an important part of educational and information sector of any school.
The success of any library largely depends on proper management. Several libraries have
suffered failure as a result of inadequate management and incapacitations in handling
sensitive information as regards members of the library. This research therefore, aimed at
developing a digital library system, which will help direct and position library to meets its
ever-increasing demands. In the course of the development of this new system, the current
system was analytically and critically studied or assessed and thus the identified strengths
and weaknesses were highlighted and a new system was designed for the weakness.
v
TABLE OF CONTENTS
APPROVAL PAGE....................................................................................................................1
CERTIFICATION......................................................................................................................2
DEDICATION............................................................................................................................3
ACKNOWLEDGMENT............................................................................................................4
CHAPTER ONE........................................................................................................................5
INTRODUCTION......................................................................................................................5
1.1 BACKGROUND OF THE STUDY....................................................................................5
1.2 STATEMENT OF THE PROBLEM....................................................................................6
1.3 AIM......................................................................................................................................6
1.3.1 OBJECTIVES...................................................................................................................6
1.4 SIGNIFICANCE OF THE STUDY.....................................................................................6
1.5 SCOPE AND LIMITATIONS..............................................................................................7
CHAPTER TWO........................................................................................................................8
2.0 INTRODUCTION................................................................................................................8
2.1 REVIEW OF RELATED LITERATURE............................................................................8
2.2 CHALLENGES IN MAINTAINING LOCAL CONTENT LIBRARIES...........................9
2.3 IMPACT OF LOCAL CONTENT LIBRARY ON EDUCATION....................................10
2.3.1 CULTURAL PRESERVATION AND PROMOTION....................................................10
2.3.2 COMMUNITY DEVELOPMENT.................................................................................10
2.4 ADVANTAGES OF LOCAL CONTENT LIBRARY.......................................................10
2.5 DISADVANTAGES OF LOCAL CONTENT LIBRARY.................................................11
2.6 BUILDING OF OPEN ACCESS INSTITUTIONAL REPOSITORIES IN NIGERIA....11
CHAPTER THREE..................................................................................................................13
SYSTEM ANALYSIS AND DESIGN.....................................................................................13
3.0 INTRODUCTION..............................................................................................................13
3.2 FEASIBILITY STUDY.....................................................................................................13
3.1.2 MODEL FORMULATION.......................................................................................14
3.1.3 WORKFLOW DEVELOPMENT...................................................................................15
3.3.4 MODEL EVALUATION...........................................................................................15
3.3 SYSTEM ANALYSIS........................................................................................................15
3.3.1 SOFTWARE REQUIREMENTS....................................................................................16
3.3.2 HARDWARE REQUIREMENT...............................................................................16
3.4 DATA PROCESSING MODELLING...............................................................................16
3.5 ADMIN MODULE............................................................................................................16
vi
3.6 USER MODULE...............................................................................................................16
3.7 DATA FLOW DIAGRA.....................................................................................................17
3.8 FLOWCHART...................................................................................................................18
3.9 ENTITY DATA MODELLING..........................................................................................19
CHAPTER FOUR....................................................................................................................20
IMPLEMENTATION...............................................................................................................20
4.1 IMPLEMENTATION OF THE PROPOSED SYSTEM....................................................20
4.8 SYSTEM IMPLIMENTATION.........................................................................................20
LOCAL SERVER:...................................................................................................................21
CONFIGURING THE SERVER:............................................................................................22
LOCAL SERVER MANAGER:..............................................................................................23
DHCP:......................................................................................................................................24
DASHBOARD OF THE SERVER:.........................................................................................25
ETHERNET PROPERTIES:....................................................................................................26
THE TCP/IPV4:.......................................................................................................................27
DNS:.........................................................................................................................................28
4.8 DISCUSSION OF THE RESULT......................................................................................28
CHAPTER FIVE......................................................................................................................29
SUMMARY AND RECOMMENDATION.............................................................................29
5.1 SUMMARY OF FINDINGS..............................................................................................29
5.2 RECOMMENDATION......................................................................................................29
5.3 CONCLUSIONS................................................................................................................30
REFERENCES.........................................................................................................................31
vii
CHAPTER ONE
INTRODUCTION
1
1.2 STATEMENT OF THE PROBLEM
The problems found in the Library during Library operation was so much that there were
cases where books got missing, if it is not stolen by the student, it may be stolen by the staff,
part of some books were turn, manual issuing of books and cards, Un-identification of Books
in its shelf, time required to record as well as presenting an Information and also the cost of
purchasing books, Newspaper and Journals and Magazines, uneasy returning of books to the
library. Lack of effectiveness in their methods of record keeping, further compounds the
problem.
1.3 AIM
The project aims to create local content library management system for student of Kano State
Polytechnic Department of Computer Science to have an amazing interaction between
student in order to expand their insight on study for example NCC Fourth Semester Course
on a local server and they can be able to browse all the books the need without internet
connectivity
1.3.1 OBJECTIVES
To update new books
To resolve book issues
To Request a certain book from librarian to provide a new book
To allow student read and download books
No paper work requirement
Student will have strong impact on study to achieve many goals.
Eliminate manual operations in the library.
2
Librarian: The computerized library system would improve the monitoring capacities of
those who maintain the library. It would be easier to determine whether a particular book is
on-shelf or not. In addition, they can easily identify when will the borrowed material be
returned and if a borrower has failed to return the book on its due date. Furthermore, the
librarian would be much guided when it comes to recognizing new inventory books, letting
them arrange it promptly and accordingly.
3
CHAPTER TWO
2.0 INTRODUCTION
Local content libraries stand as vital institutions at the intersection of culture, education, and
community development. These repositories play a pivotal role in preserving and
disseminating cultural heritage, fostering community engagement, and supporting educational
initiatives. This literature review delves into the historical development, challenges, and the
far-reaching impact of local content libraries across various sectors, incorporating references
from scholarly works to provide a comprehensive overview.
The current transition into a new information age presents a new set of concerns with the
proliferation of electronic local contents in academic institutions across the globe. Digital
preservation, or the archiving of electronic resources emanating in Nigerian Universities for
preservation and access, is an issue that must be resolved to ensure the retention of human
heritage in perpetuity
Digital preservation of local content requires active management and continuous vigilance to
retain digital objects and their meaning (Lynch, 2003; Poynder, 2003, Russell, 2002). Unlike
traditional preservation methods employed in libraries and archives, records for electronic
objects must be maintained continually due to rapid changes in the current digital
environment. Marcum and Friedlander (2003) assert that “archiving must be considered at the
time the material is created rather than at the end of the distribution chain,” which is opposite
of the traditional book and paper preservation practice in which preservation is considered
only after the material has been acquired for access. With the advent of the Internet and
desktop publishing phenomena, more material is being produced. And as individuals who
4
were once patrons of the library now create and publish their own material, libraries are faced
with another issue in archiving digital information not only from traditional publishers but
from individuals as well. In general, the creator of digital resources is neither concerned nor
invested in long-term preservation of their materials initially (Smith, 2003). Further, Lynch
(2003) goes on to describe libraries as a secondary market for digital information with little
control over the creation, proliferation, and accessibility of digital resources. As a result, the
onus falls on libraries, publishers, and other scholarly communication entities to resolve
tension and document humanity in a manner that serves both posterity and scholarship. Jeff
Rothenberg, a prominent researcher in digital preservation, outlines other guiding factors
involved in digital preservation activities: first, the resource should be able to be copied
perfectly; second, individuals should have access to materials without respect to geographic
location; third, information should be machine-readable; and fourth, the process should
preserve the unique functionality of the original item (Teper and Kraemer, 2002). With these
factors – a lack of knowledge of preservation issues and the resource-intensive, proactive
nature of digital preservation – libraries and information professionals face a difficult task.
Digitisation and preservation of priceless and valuable local content collection of an
institution can bring prestige the institution; it will create visibility not only to the
institutional content but also the scholar’s work within the institution and raise the profile of
the institution by showcasing its digital collections which can be useful for public relation
exercise (Mckay, 2003; Ezaeni and Ezema, 2009)
This comprehensive literature review underscores the multifaceted role of local content
libraries in preserving cultural heritage, supporting education, and fostering community
development. Challenges in resource allocation and technological advancements must be
addressed for these institutions to continue thriving in an ever-evolving digital landscape.
Drawing on insights from scholars across disciplines, future research should focus on
innovative strategies that ensure the sustained growth and relevance of local content libraries,
preserving and promoting the diverse narratives that enrich our global tapestry.
5
need for sustainable funding models to ensure the long-term viability of these essential
cultural repositories. Moreover, the absence of standardized metadata and cataloging
practices poses challenges in organizing and accessing diverse collections, as highlighted by
the works of (Anderson and Patel 2019).
6
Education Enhancement: They contribute to a diversified and inclusive curriculum,
providing authentic materials for students and researchers (Johnson & Brown, 2020).
Community Engagement: These libraries serve as hubs for community engagement,
fostering social cohesion and collaboration (Harris, 2021).
A clear proposal of the repository. There should be a clear and defined step-to-step
approach of how to go about the project. The necessary personnel, Open access
institutional repositories 479 equipment, materials to be included in the repository and
the policy that would guide the repository are to be articulated in the proposal stage.
7
Digitization of print materials. Most often IR begin with print materials for the
materials to be included are often in print format. This requires that these materials
which may include publications from staff and students, theses and dissertations,
technical reports, etc. must be converted to electronic formats in readiness for the
repository.
Copyright issues. One of the greatest challenge facing IR is the problem of copyright.
Some of the materials in the repositories have no copyright owner. The institution has
to take decisions on such materials. For theses and dissertations, the university claims
the copyright owner but this must be formalized by the legal unit of the university.
Another copyright-related problem is that some authors find it difficult to self archive
the published works because of the fear of litigation from the journal publishers.
Fortunately, enough Harnad (2014) has reported that many journal publishers are
comfortable with self-archiving of scholars’ publications.
Choice of OAI-compliant software. For any IR to be interoperable there must be
software that is compatible with OAI-MPH, which will provide a seamless search of
materials with other repositories. Two most popular softwares, which are OAI-
compliant are DSpace developed by Massachusetts Institute of Technology and
Eprint, which was developed by University of Southampton, Southampton. Jadhav
and Bamane (2016) argue that many institutions prefer DSpace for it has a well-
documented planning and implementation stages with strong flexible technical and
administrative features such as e-mail/password-based authentication, persistent
identifiers.
8
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.0 INTRODUCTION
This chapter outlines the comprehensive methodology employed in establishing and
managing a Local Content Library. The purpose is to ensure effective curation, accessibility,
and utilization of locally relevant digital content.
establishing the policies, procedures and programs necessary for achieving them. It involves
planning, cost or budget development, project administration, leadership styles and conflict
objectives etc. To carry out the local content library managemntn system, three main methods
evaluation.
Model
Formulation
Workflow Model
Development Evaluation
9
3.1.2 MODEL FORMULATION
This is where to review different models and one to be adopted for the formation of an
improved local content library management system. The proposed model to be adopted is
Iterative Model that will lead to the formulation of local content library management system
Planning & Requirements: As with most any development project, the first step is go
through an initial planning stage to map out the specification documents, establish software
or hardware requirements, and generally prepare for the upcoming stages of the cycle.
Analysis & Design: Once planning is complete, an analysis is performed to nail down the
appropriate business logic, database models, and the like that will be required at this stage in
the project. The design stage also occurs here, establishing any technical requirements
(languages, data layers, services, etc) that will be utilized in order to meet the needs of
Testing: Once this current build iteration has been coded and implemented, the next step is to
go through a series of testing procedures to identify and locate any potential bugs or issues
Evaluation: Once all prior stages have been completed, it is time for a thorough evaluation of
development up to this stage. This allows the entire team, as well as clients or other outside
parties, to examine where the project is at, where it needs to be, what can or should change,
and so on.
Some working functionality can be developed quickly and early in the life cycle.
Risks are identified and resolved during iteration; and each iteration is an easily
managed milestone.
Issues, challenges and risks identified from each increment can be utilized/applied to
system using a workflow diagram. It involves the various software and hardware components
of the system and the various interactions between those components within the system. It
Staff and Student access the pages and interact with the system interface.
11
3.3.1 SOFTWARE REQUIREMENTS
i. Working Operating System (Windows 7/8/8.1/10, MacOS, Ubuntu)
ii. Network
the minute details and analyzed. The detailed study of the operation performed by the system
and the relationship within and outside the system is done. The system is viewed as a whole
and the inputs of the system are identified. The system design shows the blueprint of any
system that is to be developed. It gives the detail about every component of the system that is
to be built.
information to be requested from admin page in the phase of registration are defined, users
can be separated into grades within its permitted roles granted by the system administrator.
users in the phase of registration are defined, users can be separated into grades within its
12
3.7 DATA FLOW DIAGRAM
BOOKS
STUDENT
FINE SYSTEM
LOCAL CONTENT
LIBRARY
MANAGEMENT
SYSTEM DISPLAY
LIBRARY STAFF
REPORTS
13
3.8 FLOWCHART
DOWNLO
AD BOOK
REQUEST
BOOK
READ BOOK
14
3.9 ENTITY DATA MODELLING
An entity relationship model (ER model) is a systematic way of describing and defining a
business process. The process is modeled as components (entities) that are linked with each
other by relationships that express the dependencies and requirements between them. Entities
may have various properties (attributes) that characterize them. Diagrams created to represent
these entities, attributes, and relationships graphically are called entity data diagrams.
DOWNLOAD
BY
15
CHAPTER FOUR
IMPLEMENTATION
16
LOCAL SERVER:
A local server is a computer that is used to store and share data and resources within a local
network. Unlike a cloud server, which is accessible over the internet, a local server is
typically only accessible to users within the same physical location. This makes it ideal for
organizations that need to keep their data and resources secure and accessible only to
authorized users. In addition to storing and sharing data, local servers can also be used for
tasks such as printing, file sharing, and application hosting. Some common examples of local
servers include file servers, database servers, and application servers.
17
CONFIGURING THE SERVER:
Configuring a local server in a computer is an important process that allows users to set up
and use the computer as a server. This can be useful for sharing files and resources among
users on a local network, or for hosting a website or other services. To configure the local
server, users will need to install and configure the appropriate server software, such as
Windows Server, Linux, or Apache. Once the server software is installed, users will need to
configure the server's network settings, such as IP address, DNS server, and firewall settings.
After the server is configured, users can then begin setting up and using the server's services.
18
LOCAL SERVER MANAGER:
he Local Server Manager is a tool that allows users to manage the local server on their
computer. It provides a graphical interface that makes it easy to configure and manage the
server, including setting up user accounts, managing permissions, and monitoring system
performance. The Local Server Manager also allows users to install and configure server
roles and features, such as Active Directory, DNS, and IIS. In addition, the Local Server
Manager provides easy access to troubleshooting tools and logs. Overall, the Local Server
Manager is a useful tool for administrators who need to manage and configure a local server.
19
DHCP:
The DHCP (Dynamic Host Configuration Protocol) service is an important part of the server
manager, as it is responsible for assigning IP addresses and other network settings to
computers and devices on the network. When the DHCP service is enabled, the server will
automatically assign IP addresses and other settings to devices when they connect to the
network. This helps to ensure that devices have the correct network settings and can
communicate with other devices on the network. In addition, the server manager can be used
to configure and manage DHCP options, such as lease times, reservation settings, and
security settings.
20
DASHBOARD OF THE SERVER:
The local server dashboard is a tool that allows users to quickly and easily view and manage
important server information. It provides a high-level overview of the server's performance,
including CPU and memory usage, storage capacity, and system uptime. The dashboard also
provides quick access to server logs, event notifications, and system settings. In addition,
users can customize the dashboard to display the information that is most relevant to them.
Overall, the local server dashboard is a useful tool for monitoring and managing the server's
performance and health.
21
ETHERNET PROPERTIES:
Ethernet properties refer to the various settings that can be configured for an Ethernet
connection. These settings include the IP address, subnet mask, default gateway, and DNS
server. Each of these settings plays an important role in determining how a computer connects
to a network and how it communicates with other devices on the network. By configuring the
Ethernet properties correctly, users can ensure that their computers are able to connect to the
network and access the internet. In addition, users can configure advanced settings such as
QoS (Quality of Service) and VLAN (Virtual Local Area Network).
22
THE TCP/IPV4:
The TCP/IPv4 protocol is used to assign IP addresses to devices on a network. TCP/IPv4 is a
suite of communication protocols that allow devices to communicate with each other over a
network. The IPv4 protocol is used to assign unique IP addresses to devices, which allows
them to send and receive data over the network. Each IPv4 address is a 32-bit number that is
divided into four octets. The first three octets are used to identify the network, and the last
octet is used to identify the device on the network. This allows for millions of unique IP
addresses to be assigned to devices.
23
DNS:
DNS, or the Domain Name System, is a distributed database system that translates domain
names into IP addresses. For example, when a user types in a website's domain name (e.g. ),
the DNS system will look up the IP address associated with that domain name and direct the
user's web browser to the correct server. This allows users to access websites by using simple
and easy-to-remember domain names instead of having to remember the IP addresses of
every website they visit. The DNS system is hierarchical, meaning that DNS servers are
organized into a tree-like structure with a single root server at the top.
24
Figure 4.8: NCC Courses
4.8 DISCUSSION OF THE RESULT
Local Content Library Management System software is designed to perform library
operations automatically and locally effectively. It is designed to be interactive with graphical
users’ interface (GUI). It does not acquire rigorous protocols, to be utilized it also operates
without network where a user could be able to browse all his books for each semester and got
an option whether to download them or read them as he likes.
25
CHAPTER FIVE
SUMMARY AND RECOMMENDATION
5.2 RECOMMENDATION
Having clearly tested and observed that the package provides a great improvement on the
existing library system. I therefore, confidently recommend it to any academic institutions,
organizations or establishments that need effective and efficient academic library system.
Due to lack of time, I was unable to use pictures of different textbooks in this design and
also content registration of books in the library. But this will be properly implemented if
attention is given to the following areas:
26
Evaluation This enable one to know how the system is working and how well it is
meeting the original budget, goals, specification, schedule and so on From such
evaluation comes adjustment that will prove the system.
Maintenance The system should always be maintained.
5.3 CONCLUSIONS
By Implementing the proposed system, we conclude that the gained results and aim is
achieved. The officer in charge can do updating on the Database, by deleting, adding, and
modifying m also any entry in the keyword field is acceptable even was a letter or more
than one letter as a word or a phrase. Increasing of the size of database didn’t effect on the
searching time and results retrieval time. To make the system to be secure, a password
technique had supported. We suggest to connect the system with the Internet and increasing
database of the E-Library by the number of books and theses, and add the database of the
system other kinds of publications such as magazines, papers, and articles, and generalize
the system database to contain all area of specializations.
27
REFERENCES
Paepcke, K., Cousins, S. B., Garcia-Molina, H., Hassan, S. W., Ketchpel, S.,
Roscheisen, M., & Winograd, T. (2001). Using Distributed Objects for
Online Library. U.S.A: John Wiley & Sons.
Bill, M. (2006). The Amazing Internet Challenge. Chicago: Adventure Works Press.h
Chen, J. P. (2001). An Overview of Modern Library Management. Chicago:
Posco Press.
Green, D. I. (2002). The Online Library. Boston: Prose Ware Press. John, J. (2003).
Promising Directions in virtual Library Development. New
York: Consto Press.
http://ai.eecs.umich.edu/people/wellman/pubs/Building- UMDL.html, (1999).
http://dli.grainger.uiuc.edu.
Frew, J., Freeston, M., & Kemp, et al. The Alexandria Digital Library Testbed. D-
Lib Magazine, Vol. 2, No. 8, August 1996.
28
Lancaster, K. (1974). Project, D-Lib Magazine, Vol. 2, No. 8, August 1996.
Lorraine, M. (1973). From the Editor: Metrics and the Digital Library,” D- Lib Magazine,
Vol 33.
Mike, A. B. (2001). Internet Public Library. New York: Gibson Press.
Kahn, R. & Wilensky, M. (1993). “A Framework for Distributed Digital Object Services,”
D-Lib Magazine, Vol. 1, No. 5, May 1995.
E.L. Morgan, "Possibilities for open source software in libraries", Information Technology
and Libraries, vol. 21, no.1, pp. 12-15, 2002.
M Krishnamurthy, "Open access, open source and digital libraries", Electronic library and
information systems, vol.42, no.1, pp.48-55, 2008.
P. Schlumpf, "Open source library systems", Library Computing, vol.18, no.4, pp.323-326,
1999.
D.H.L. Goh., A. Chua, D.A. Khoo, E.B.H.bKhoo, E.B.T. Mak, and M.W.M. Ng, "A
checklist for evaluating open source digital library software", Online Information
Review, vol. 30, no.4, pp.360-379, 2006.
29
Y. Fujiwara, and Y. Liu, "The homogenized bipartite model for self organization of
knowledge and information", IFID, vol.2 , no.1 , pp.13-17, 1998.
O. Hoeber and X. D. Yang. "Evaluating the effectiveness of term frequency histograms for
supporting interactive Web search tasks". In Proceedings of the ACM Conference
on Designing Interactive Systems, 2008.
30