Get the complete project »
- The Complete Research Material is averagely 72 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
1.1 Background to the Study
For many years, records management and the physical filing and retrieval of information were what companies did until the 80’s when word processing sprung into life. Suddenly, documents were appearing in hardcopy and on computer. Over the next decade, document and document image management tried to find a footing in corporate and government offices but even though they worked to a degree, they were complex, extremely expensive, hard to manage and require a lot of effort for the users to index documents (Knowledgeone, 2005). In common language the word document usually means an information carrier containing written or drawn information for a particular purpose. Central to the idea of a document is usually that it can be easily transferred, stored and handled as a unit (Bjork, 2002). Organizing large volumes of physical records are difficult and there are instances where it is difficult to extract a record/document from the large volume of them, it is almost certain that management of document is prone to human error (Akashah, Syamsul, Jusoff & Christon, 2011).
Nowadays, storage systems are increasingly subject to attacks. So, the security system is quickly becoming mandatory feature of the data storage systems. For the security purpose we are always dependent on the cryptography techniques (Kahanwal, Dua & Singh, 2012).
Encryption is the most effective way of computer science concerned with developing schemes and formula to achieve data and information security through the use of codes (Das, Lanjewar & Sharma, 2013). Today the privacy is the main issue to sending information from one point to another in data transmission. Encryption is the procedure that allows messages or information to be encoded in such a way that it is extremely difficult to read or understand where decryption is the procedure to transforming encoded text into the original message and information (Das et al., 2013). Why encryption? It is obvious there are developments in the field of information technology likewise have malware (a software that gives partial or full control of your computer to do whatever the malware creator wants) and Sniffer (a program or a piece of hardware that can intercept and log traffic passing over a digital network or part of a network) technology improved giving rise to unauthorized access and control of information, records and data. Security is a critical issue any organization can’t joke about.
1.2 Statement of the Problem
In an interview organized by Chinua Achebe Foundation: the Buhari/Idiagbon administration reported that Nigeria had already paid 27 billion of its external debt; why did Nigeria pay another 12 billion without the approval of the legislature (Umunnah, 2012). It is evident that improper documentation of files (records and documents) is the basis of unaccountability, embezzlement and fraud in any organization.
The continuing existence of paper documents, and their use alongside electronic documents, raises some key set of problems as they have paved ways for corruption, misappropriation, mismanagement, embezzlements and fraud as document concerning how money are being spent, how project are being carried out and how expenses used on project are either not properly stored or are easily tampered with without any trace of whom or when such change on such document were made. Therefore, a cloud-based system is needed to end the dreadful life span of the virus called mismanagement, fraud and embezzlement that has sucked in deep into all our organizations.
1.3 Research Motivation
PUNCH Metro newspaper showed that many youths had developed into syndicates, using court premises as centers for issuing fake driver’s licenses, number plate, Certificates of Occupancy, survey plans and Tax Identification Numbers, among others. It was learnt that these documents could be used to secure bail term, get loans from banks and to process documents for visas at embassies. Investigations also showed that it takes electronic verifications to discover that these documents were cloned (Hanafi, 2015).
There are few document management systems available but this project has its own unique features which are online document storage, ordering document retrieval, sorting of document, secure document processing (encryption and decryption) and document space management (compression, decompression and archiving) features which are not presently available in the existing EDMS. This work will expose PHP compression and encryption capacity in EDMS as this is needed in organizations to secure and maximize the available space of storage. In essence, the work will enhance document accountability and traceability, documents security, document storage and retrieval and ensure consistent business processes (workflows) for how documents are handled. It should be noted that the EDMS will also allow different stakeholders in the organization to view and access file from their convenience.
1.4 Objectives of the Study
The aim of this work is to design a Cloud-Based Document management system which will curb the above stated problem by storing documents in an online storage server (Cloud) while the specific objectives are to:
i. Design a computerized system which limits the use of pen and paper in document development to prevent easy damage of documents
ii. design a robust database to facilitate the document insertion and retrieval
iii. study existing works on Document Management System, encryption, decryption and compression algorithm.
iv. design an Improved cloud-based document management system using the PHP version of AES encryption and decryption algorithm code and adding a compression module using PHP ZIP compression function.
1.5 Purpose of the Study
The purpose of this work is to bridge the gap between documentation and the security, integrity and tampering issues. This work also saves space, money and time in the processing of documents compared to the current traditional paper documentation which requires large storage space and requires labour.
1.6 Scope of the Study
For this work, Oyo State Housing Corporation was used as a case study as a large number of documents needed proper documentation and secure safe for a long period of time.
1.7 Significance of the Study
This project software gives you all the features you need to effectively manage your documents and that of your clients. It saves time, energy and expense on documentation to vastly improve the overall productivity of the organization and include multiple levels of security and version control to allow access to sensitive documents only with the proper permissions.
1.8 Limitations of the Study
Most constraint experienced during the course of writing this project is during the actual software development. Implementing cloud-based storage is difficult.
Secondly, finance was not at my side. Online storage spaces are a little costly, so I implemented my project using local storage with local server (XAMPP).
Due to the limitations above, program developed covers some aspect of login in; upload and download, delete/update documents. Whatever is left out is as a result of the stated limitations.
1.9 Organization of the Work
· Chapter one introduces the research work; it presents the historical background of the study, the aim and objectives of the work.
· Chapter two shows a review of the literature about EDMS, advantages of using an EDMS, followed by discussion of research that focused on identifying problems and challenges in implementing an EDMS likewise researching into literature of cryptography, its classification, encryption, decryption and compression, while it also introduces the waterfall model, it advantages, disadvantages and the modified waterfall model.
· Chapter three describes the methodology applied, tools used, design consideration and design architecture.
· Chapter four shows how the work is being implemented. It highlighted the System Hardware Requirement, System Software Requirement and the procedure used in implementing the work while algorithms use and sample snapshots were also presented and its evaluation and discussion were also made.
· Chapter five gives a summary, conclusion and recommendation based on the results and findings of the work. Suggestion was also made for future research
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONE INTRODUCTION 1.1 Background of the Study Attendance management of students in institution can be rigorous using the conventional method of...Continue Reading »
» ANTIMICROCOBIA ACTIVITIES OF GARLIC AND GINGER EXTRACTSTable of ContentCover Page iTitle Page iiAcknowledgement iiiTable of Contents ivCHAPTER ONE– ...Continue Reading »
» DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CAREER GUIDANCE INFORMATION SYSTEMABSTRACTComputers are known for their wide range of uses especially in s...Continue Reading »
» CHAPTER 1 INTRODUCTION TO LASER BASED INTRUDER ALARM SYSTEM. 1.0INTRODUCTION A laser based intruder alarm system as in this project work is a security...Continue Reading »
» CHAPTER ONE 1.1 BACKGROUND OF THE STUDY Digital museums appeared in the Internet many years ago. First digital museums have emerged since 1991. Howeve...Continue Reading »
» CHAPTER ONE1.0 INTRODUCTION:This chapter gives an overview about the aim, objectives, background and operation environment of the system.1.1 BACKGROUN...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY RFID, Radio Frequency Identification is a fundamental and inexpensive technology that enables wir...Continue Reading »
8. DESIGN AND IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM (A CASE STUDY OF IBOM E-LIBRARY,OFF IBB WAY, UYO)» ABSTRACT As we adapt to the trend in information and communication technology which is affecting every sector of our economic life, our educational sy...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY The term ‘Portal’ projected the vision that the web site is an entry point to selected and releva...Continue Reading »
» CHAPTER ONE INTRODUCTION Scientists and engineers traditionally kept paper logbooks of their experiments and inventions. The need for the logbook is c...Continue Reading »