Professional Documents
Culture Documents
INFORMATION SYSTEM
BY
SUPERVISED BY,
MALAM BASHIR SALISU
AUGUST, 2023
CHAPTER ONE
INTRODUCTION
1.1 Introduction
In today's fast-paced academic environment, the misplacement of personal belongings
has emerged as a pressing concern for both students and staff at Aliko Dangote
University of Science and Technology (ADUST) in Wudil. Valuable items like
laptops, school IDs, and textbooks are frequently lost, often resulting in a frustrating
lack of recovery options. This escalating issue has prompted the implementation of a
comprehensive Lost and Found Information System within ADUST's Security
Division.
The core objective of this system is to revolutionize the process of reclaiming lost
items by introducing a user-friendly web platform. This innovative approach
empowers students and staff to swiftly recover their belongings by leveraging the
platform's capabilities. Through seamless integration and digitalization, individuals
who have lost items can now report them online, complete with detailed descriptions.
Simultaneously, the system enables administrators to efficiently manage and facilitate
the recovery process.
The operational flow of the Lost and Found Information System is designed to be
intuitive and effective. When a person discovers a lost item, they can utilize the web
platform to upload essential information about the item, including its description and
relevant identification details. The platform's administrators, upon receiving the
submission, review and verify the details provided. Subsequently, if the information is
deemed accurate and genuine, the administrator approves the listing, and the item is
then displayed on the platform's notification page.
For individuals seeking to recover their lost items, the platform serves as a convenient
hub for searching and identifying belongings. Through easy-to-navigate search
features, claimants can quickly identify items that match their descriptions. Once a
match is identified, the claimant can initiate contact with the administrator to verify
ownership and coordinate the return of the lost item.
The implementation of this Lost and Found Information System signifies a
transformative step in enhancing the overall experience of the ADUST community.
By embracing digitalization and harnessing the capabilities of a web-based platform,
ADUST aims to mitigate the frustration and inconvenience associated with lost
belongings. This case study delves into the intricacies of the system's development,
implementation, and anticipated impact, offering insights into how ADUST's Security
Division is leveraging technology to address a pertinent issue and contribute to an
enhanced campus environment.
i. To analyze the existing process of handling lost and found items within
ADUST's security division.
ii. To design a user-friendly web-based system that allows users to report lost or
found items and enables security personnel to manage and track these items.
iii. To implement the designed system, integrating features such as user
registration, item categorization, search functionality, and notification
mechanisms.
2.0 Introduction
A lost and found system refers to a structured and systematic approach or platform
established to manage items that have been unintentionally misplaced, lost, or found
within a particular setting or location. These systems play a crucial role in facilitating
the identification, documentation, secure storage, efficient retrieval, and eventual
return of lost items to their rightful owners and are integral to various environments,
such as transportation hubs, educational institutions, workplaces, and public venues.
They aim to streamline the process of item recovery, reduce instances of unclaimed
property, and enhance overall user satisfaction by providing a centralized mechanism
for reporting and resolving lost item incidents.
For example, in an educational setting like a university campus, a lost and found
system enables students and staff to report items they have lost, providing detailed
descriptions and potential locations where the items were last seen. Similarly,
individuals who discover lost items can contribute to the system by recording
information about the found items, including their physical characteristics and the date
and location of discovery. These reports are then processed and cataloged within the
system, allowing users to search for and identify lost items based on various attributes
[1]. One notable example is the implementation of digital lost and found platforms in
airports. Such systems utilize technology to create databases of lost items, enabling
travelers to report missing belongings online. This digital approach expedites the
process of matching lost items with their owners, often leading to quicker
reunifications [2]. Its encompass both physical storage facilities for recovered items
and digital interfaces that allow users to interact with the system remotely. The digital
aspect can include web-based applications and mobile apps, providing users with
convenient tools for reporting and tracking lost items from their device. [3].
It serves as essential tools for efficiently managing lost and found items within diverse
environments. By offering a structured framework for reporting, documenting, and
retrieving lost belongings, these systems contribute to enhancing user experiences and
maintaining a more organized environment.
In 2014, Zipato introduced a web application aimed at revolutionizing lost and found
practices within communities. This innovative initiative yielded creative solutions to
address the challenge of reuniting individuals with their misplaced belongings. By
capitalizing on the widespread use of social media, Zipato's web application harnessed
the power of digital connectivity to enhance information sharing and community
engagement.
One of the central strategies employed by Zipato was the integration of their web
application with the expansive reach of Facebook. This strategic move facilitated
seamless sharing of details about lost or found items among users. The integration
sought to expedite the dissemination of crucial information, thereby expediting the
process of reuniting rightful owners with their possessions. This approach tapped into
the potential of digital platforms to bridge the gap between lost and found items and
their owners.
This innovative approach encountered several limitations and challenges, shedding
light on the intricacies of managing lost and found items within a digitally
interconnected community. Notably, a key limitation of Zipato's application was the
absence of a structured mechanism for item claiming. While reporting lost or found
items was made simple, the lack of a well-defined procedure for rightful owners to
claim their belongings introduced potential inefficiencies, hampering the application's
overall effectiveness [4].
The integration of the application with Facebook brought both advantages and
disadvantages, particularly with regard to user privacy. While this integration
facilitated transparent identification of those reporting items and bolstered the
credibility of postings, it also raised concerns about user privacy. Individuals might be
hesitant to divulge personal information on a publicly accessible platform like
Facebook. Perhaps the most significant gap in Zipato's application was the absence of
robust validation mechanisms to verify the authenticity and accuracy of posted data.
This deficiency in validation mechanisms created the possibility of misinformation or
falsified reports, which in turn undermined the platform's reliability and eroded trust
among users.
Zipato's innovative lost and found application demonstrated the potential of digital
solutions to transform community engagement. By leveraging the ubiquity of social
media, the application aimed to streamline the process of reuniting individuals with
their misplaced belongings. However, the study also highlighted certain limitations,
such as the lack of a structured claiming mechanism and potential privacy concerns.
These findings contribute to a deeper understanding of the complex dynamics inherent
in managing lost and found items within a digitally connected community.
The research conducted by Agboola and Shaibu (2019) centered on investigating the
impact of Information and Communication Technology (ICT) on the information
retrieval system within educational archives. This literature review aims to delve into
the study's findings, which illuminated the affirmative effects of ICT integration on
the retrieval of crucial materials from educational archives.
Within the dynamic landscape of modern education and archival practices, the
integration of ICT has emerged as a transformative force. Agboola and Shaibu's study
was situated within this context, with the primary goal of exploring the symbiotic
relationship between ICT and information retrieval systems in educational archives.
The central premise revolved around assessing how the incorporation of ICT tools and
techniques enhances the efficiency and effectiveness of retrieving vital information.
By surveying existing literature, the researchers recognized the pressing need for
optimized information retrieval mechanisms, particularly within educational archives.
Building upon this foundation, the study designed an information retrieval system
tailored to the needs of diverse communities. This system was strategically developed
to recover essential credentials of materials that held significant relevance for these
communities. The ultimate aim was to ensure the availability of accurate and pertinent
information to the appropriate individuals.
Agboola and Shaibu's research methodology encompassed a meticulous examination
of the developed information retrieval system. Through comprehensive analysis and
empirical investigation, the study substantiated its initial hypothesis: the integration of
ICT indeed yields affirmative effects on the information retrieval system within
educational archives [5]. The implications of this research are far-reaching,
highlighting the potential of ICT in revolutionizing information accessibility and
retrieval. By offering a technological framework designed to facilitate the recovery of
crucial materials, Agboola and Shaibu's findings underscore the role of ICT in
bridging the gap between archived knowledge and the contemporary information
needs of diverse communities. The positive outcomes of this integration contribute to
a more streamlined and accurate dissemination of information, aligning with the
overarching objectives of education and archival practices.
Lost and found information systems play a pivotal role in modern society by offering
a structured approach to managing lost items and reuniting them with their owners.
This literature review aims to comprehensively explore the myriad advantages
associated with the implementation of such systems, shedding light on their impact on
efficiency, user experience, and responsible item management.
One of the primary advantages of lost and found information systems is the
remarkable enhancement of operational efficiency. By providing a seamless platform
for reporting lost items, these systems expedite the process, reducing the time and
effort required from both users and administrators. Digital systems, in particular, offer
instant reporting capabilities, automating notifications and expediting the
communication between users and the lost and found facility [7]. This streamlined
approach ensures that lost items are swiftly reported, increasing the likelihood of their
successful retrieval.
Lost and found systems contribute significantly to user convenience and accessibility.
Through intuitive interfaces, often available via websites or mobile applications,
individuals can readily report their lost items with ease [8]. This user-centric design
empowers users to take control of the reporting process, thereby enhancing their
overall experience. Such accessibility minimizes the frustration associated with lost
belongings and encourages a proactive approach to item recovery.
The implementation of lost and found information systems results in the creation of a
centralized database, a critical advantage that aids administrators in effectively
managing and categorizing lost items [9]. This organized repository improves the
efficiency of item tracking and retrieval, optimizing the chances of reuniting items
with their rightful owners. Moreover, the integration of tracking technologies, such as
QR codes, RFID, and GPS, offers precise item location capabilities, further
streamlining the recovery process [10]. The utilization of these technologies
contributes to the overall effectiveness of the system.
Lost and found systems facilitate the integration of automated notifications and alerts,
a pivotal feature that amplifies proactive communication channels between
administrators and users. This swift dissemination of information serves as a catalyst,
ensuring that users are promptly apprised upon the discovery of their lost items,
thereby mitigating the possibility of items languishing unclaimed [11].The symphony
of real-time communication woven through this feature engenders a palpable sense of
trust and reliability, serving as a conduit that not only motivates users to report their
losses but also augments the prospect of successful reunions.
2.5 The Challenges Faced By Founders In The Context Of Lost And Found
Information Systems
Navigating the landscape of lost and found systems presents a formidable array of
challenges for both founders and individuals who have lost items. These challenges
underscore the intricate dynamics of the domain and evoke the need for innovative
solutions to bridge the gaps between lost and found. For founders, the challenge of
verification looms large. Ensuring the rightful return of items to their owners while
guarding against false claims requires the establishment of robust mechanisms [12].
This demands a delicate balance between efficiency and accuracy, compelling
founders to design authentication processes that inspire trust and mitigate potential
abuses.
On the other side of the equation, individuals who have lost items grapple with the
uncertainty of recovery. The process of reporting a lost item and subsequently
navigating the intricacies of the system can be daunting, requiring clear and user-
friendly interfaces [13]. Additionally, the emotional toll of losing an item of personal
significance can exacerbate the challenge, necessitating a support structure that
extends beyond the technological framework. The challenges faced by founders and
individuals who have lost items converge to form a tapestry woven with complexities.
As technology continues to reshape the landscape, addressing these challenges
becomes an imperative, calling for a harmonious blend of innovation, empathy, and
practicality.
Amidst the realm of lost and found systems, a pivotal challenge that founders grapple
with pertains to the verification of lost items and the looming specter of false claims.
This intricate dance necessitates administrators to craft mechanisms that authenticate
ownership, thereby ensuring the rightful return of retrieved belongings [14]. A
symphony of meticulous attention to detail and the orchestration of rigorous validation
processes are prerequisites, serving as bulwarks against potential abuse that could
compromise the integrity of the system.
The user interface design poses a significant hurdle for founders aiming to foster
widespread adoption of lost and found systems. Creating an interface that strikes a
balance between simplicity and comprehensive functionality is a delicate task [15].
Navigating the intricate dance of information input, search functionality, and real-time
notifications demands a deep understanding of user behavior and preferences.
With the digital landscape comes the critical challenge of safeguarding user privacy
and data security. Founders must ensure that personal information remains
confidential and protected from potential breaches [16]. The delicate act of balancing
transparency about data usage with stringent security measures calls for a deft touch,
especially in an era of heightened awareness around data privacy.
The effective management of found items within a lost and found system is a
challenge that founders must address diligently. Without meticulous inventory control
and categorization, items risk becoming misplaced or overlooked, defeating the very
purpose of the system [17]. Striking a harmonious equilibrium between technology-
driven automation and manual oversight proves to be a constant balancing act.
Nestled within the intricate framework of lost and found systems, the pivotal
interplay of user interaction and effective communication emerges as an indispensable
lynchpin [19]. The scholarly contributions of Chen, Garcia, and Lee (2018)
reverberate with profound insights as they embark on a meticulous expedition into the
nuanced dynamics that underlie user interaction within these systems. Within their
scholarly discourse, a resounding crescendo underscore the paramount significance of
establishing seamless channels of communication, serving as the
Lost and found systems are getting better because of new technology like the Internet
of Things (IoT). Lee and Park (2020) did a study that helps us understand how IoT
can be used in these systems. They talk about using special devices that can track lost
things and tell us where they are. This makes it easier to find lost items [21]. The way
these devices work is like magic and can show us new ways to use lost and found
systems.
As technology gets better, lost and found systems are changing. The study by Lee and
Park tells us how these changes can make things better. It's like a new song that brings
more life and energy to lost and found systems. This change is not just about making
things work faster, but also about helping us understand how lost things happen and
what we can do to fix them.
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.0 Introduction
This chapter provides an overview of the research project's methodology and delves
into the fundamental components of system design approaches. The central emphasis
of this chapter lies in the enhancement of the current Lost and Found Information
System via refined procedures and techniques. It encompasses an exhaustive
investigation of the method employed to identify system prerequisites, followed by the
utilization of design methodologies and the tactics for executing the suggested system
enhancements.
3.1 Methodology
In this project, we have opted for an agile software development approach as our
chosen methodology. The primary rationale behind adopting the agile approach is its
inherent flexibility, which not only encourages continuous stakeholder input
throughout all stages but also enables developers to focus on key functionalities and
essential features.
The lost and found information system constitutes a sophisticated software solution
primarily intended for student use, encompassing a wide array of functionalities.
Given the intricate nature of the system, there exists a necessity to incorporate
numerous functionalities. This, along with other pertinent factors, renders the agile
approach the most suitable strategy for effectively bringing this system to fruition.
The agile methodology represents a structured and iterative framework for both
project management and product development. Its defining characteristic lies in the
gradual construction of projects, wherein they are deconstructed into smaller, more
manageable components. A prominent advantage of this methodology is its
adaptability, affording the seamless incorporation of adjustments and modifications at
any juncture of the process.
The proposed system aims to address the challenges faced by the manual Lost and
Found Information System. It aims to streamline the process of reporting lost items,
searching for found items, and reuniting owners with their belongings in a more
efficient and user-friendly manner.
2) Users should be able to report lost or found items through the system,
providing relevant details for documentation.
3) The system must enable users to search for lost or found items based on various
criteria, such as keywords, categories, or locations.
4) When claiming a lost item, the owner should be able to provide necessary
identification to verify their ownership.
5) Users should have a means of communicating with administrators regarding
lost and found items, and administrators should be able to respond and manage
these interactions.
These functional requirements outline the essential features that the system should
possess to effectively manage lost and found items, ensuring smooth user interactions
and efficient
administration.
This proposed system seeks to overcome the limitations of the current manual
approach by providing a user-friendly and efficient solution. By automating the
process and implementing a secure verification mechanism, the Lost and Found
Information System intends to enhance the overall experience of reporting, searching
for, and claiming lost or found items within the university community.
The feasibility analysis assesses the technical and operational viability of the proposed
system. Based on the analysis, the web-based Lost and Found Information System is
deemed feasible due to its compatibility with existing resources and potential to
address user needs.
a. Technical Feasibility: Technical feasibility means the proposed solution can
be implemented with the available hardware, software and technical resource.
The existing resources are: System software which are XAMPP (Cross-
Platform(X) Apache(A) MySQL(M) PHP(P) and Perl(P)) Server and any Web
Browser. Therefore, the system is said to be technically feasible because the
solution of the problem can be easily implemented in the present hardware and
software environment.
3.3.8.1 Primary Data Source: The primary source came mainly from direct
observation of events, thus carrying out personal or online interviews and through
questionnaire.
a) Interview
We made use of interview method of data collection. This is a physical
conversation between us and the hostel management staff in the university
student affairs division.
b) Questionnaire
I made use of structured questionnaire method of data collection which was
shared with some students the university. A Structured Questionnaire is the
type of questionnaire which restricts the respondent from the answers provided
for him for the questions. They are normally “yes or no”, “true or false”
answers.
System design is the process of designing the elements of a system such as the
architecture, modules and components, the different interfaces of those components
and the data that goes through that system. This system is designed to allow input,
processing, and output of hostel allocation system to be carried out by a computer
system. However, the information and result obtained from system analysis stage are
to be used in designing and developing an effective and efficient system that is
expected to solve the problems being faced by the existing system. The design or
architecture of the system can be described using four major sections. The web server
(Apache) is the core of the system it is the section where all services of the system are
carried out. The relational database (MySQL) serves as the store of the system where
all the records of the system are stored as it is created in the server of the system and
can be accessed by using the MySQL queries. The middleware (PHP) is a set of
programs that takes users requests from the browser. The middle is between the
browsers to the system database process it and returns the result to the user through
the browser. The middle is between the browser and the server. The browser (internet)
provides the user where to type the URL of the system in order to access the user
interface to interact with the system. The System
This refers to a model developed to learn all aspects of a problem domain to determine
the best way to solve a specific set of user needs. In this section we describe the
system design of
Lost and found information system that show the Use case diagrams, class diagram,
sequence diagrams, and the program structure chart.
A use case diagram is a graphic depiction of the interactions among the elements of a
system. A use case is a methodology used in system analysis to identify, clarify, and
organize system requirements.
A use case defines a goal-oriented set of interactions between external actors and the
system under consideration. Actors are parties outside the system that interact with the
system []
Login
Update Item
Admin user
Manage user account
Generate Report
Logout
Figure 3.3: Use-case of the Proposed System
Class diagram describe the attributes and operations of a class and also the constraints
imposed on the system. The class diagrams are widely used in the modeling of object-
oriented system because they are only UML diagrams, which can be mapped directly
with object-oriented languages. (Summerville I. 2007)
Start
Input: username
Input: username
Invalid
password
Is password and
username correct
NO
YES
Dashboard Categories Items Page Message User Contact System
information information
End
The data in the system are stored and retrieved from the database. Designing the
database is part of the system design. Data elements to be stored have been identified
at analysis stage. They are put together to design the data storage and retrieval system.
A database is a collection of interrelated data stored with minimum redundancy to
serve many users quickly and efficiently. The general objective is to make data
processing easy, quick, inexpensive and flexible for the user. MySQL has been chosen
for developing the relevant databases in this project.
The system requirement has to do with the two basic components of the computer
system.
Mouse and Keyboard AVF waterproof key & Logitech MK200 key& This device will be used
mouse. mouse in designing the system
keyboard for typing
code and mouse for
selecting and clicking
functions.
Printer L11D inkjet. Epson Tx121 3 in one. This device will be used
to print, scan and copy
any documents when
designing the system
Microsoft Office Microsoft office 2003 Microsoft Office Software Package for
2013/2016. Documentation.
Programming language PHP, HTML, JAVA PHP, HTML, JAVA They are the language
Script Script that will be used for
writing the codes of