Select Currency
Translate this page

DESIGN & IMPLEMENTATION OF A COMPUTERISED LIBRARY STOCK MATCHING SYSTEM

Format: MS WORD  |  Chapter: 1-5  |  Pages: 82  |  781 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

DESIGN AND IMPLEMENTATION OF A COMPUTERISED LIBRARY STOCK MATCHING SYSTEM

 

CHAPTER ONE

1.0   INTRODUCTION

Data matching process enables an analyst to reduce data duplication and improve data source. Matching analyses the degree of duplication in all records of a single data sources, returning weighted probabilities of a match between each set of records compared. You can then decide which records are matched and take the appropriate action in the source data. De Andes (1993). Matching a data comes with several benefits which includes the following: it enables elimination of differences between data values that should be equal determining the correct values and reducing the errors that data differences can cause. For example names and addresses are often the identifying data for overtime. Performing matching to identify and correct these errors can make use and maintenance easier (Winkler 1993). Data matching also enables the names of books in the library that are equivalent but were entered in a different style of format will be rendered uniform. It is also necessary to know that data matching and merging records that correspond to the same entities from several databases. Most times the entities under consideration are commonly people, such as patients, customers, tax payers or travelers but for now this research will be considering data matching in the a library scene. This research involves the full or partial integration of two or more data sets on the basis of information held in common. It enables data obtained from separate sources to be used more effectively thereby enhancing the value of the original sources. Data matching can also reduce the potential burden on data provided by reducing the need for further data collection. However, where data matching involves the integration of records for the same units. The product of the research will raise important issues about confidentiality and security. Copas J.R; & F.J Hilton (1990).

1.1   AIM OF RESEARCH

This project aims at creating and developing a computerized matching record for the university library. In developing a data match for the school library attempts will be made to achieve absolute confidence in the accuracy, completeness, robustness and consistency overtime of these identifiers, because any error in such an identifier will result in wrongly matched records.

1.2   OBJECTIVES OF RESEARCH

1.Common entity identifier will be used in the database to be matched and in order to achieve these attributes that contain partially identified information, such as name of publisher, location of publication and dates of publication will be used. The name and brief details of the writer could also be used Winkler (1986, 1987).

2.  Rather than develop a special survey to collect data for policy decisions, data from available books sources will be matched which have potential advantages because it contains greater amount of data and their data might be more accurate due to improvement over some period of years Swain et al (1992).    

1.3   SCOPE OF RESEARCH

The research sets out how all those involved in the production of data matching for uncial library will meet their commitment to protect the confidentiality of data within their care whilst also, and where appropraite, maximizing the value of those data through data matching.Coper, W.S & M.E Maron (1987).

1.4   LIMITATIONS OF RESEARCH

There are several limitations that would be encountered during these research work and    thereafter. Some of these challenges are: 
1.   Lack of unique entity identifier and data quality. 
2.   Computation complexity. 
3.   Lack of training data containing the true match status. 
4.   Privacy

LACK OF UNIQUE IDENTIFIER          

Generally, the databases to be matched/de-duplicated does not contain unique entry identifiers or keys.Even when entity identifier are available in the databases to be matched, one must be absolutely confident in the accuracy, completeness, robustness and consistency over time of these identifiers, because any error in such as identifiers will result in wrongly matched record.   Finally, if no entity identifiers are available in the databases to be matched then the matching needs to rely upon the attribute that are common across the databases. Decurre.Y(1998).

COMPUTATION COMPLEXITY          

When matching the databases potentially each record from one database needs to be compared with all the records in the other database in order to determine if a pair of records correspond to the same entity or not. The computation complexity of data matching therefore grows quadratically as the databases to be matched gets large.

LACK OF TRAINING DATA CONTAINING THE TRUE MATCH STATUS

any data matching applications, the true status of two records that are matched across the two databases is not known, that is to say that there is no ground truth or gold in the standard data available that specifies if two records correspond to the same entity or not. Without extra information one  cannot be sure that the outcomes of a data matching project are correct. Deming, W.E & G.J Glesser(1959).

PRIVACY AND CONFIDENTIALITY          

As previously mentioned, with data matching commonly relying on personal information such as names, addresses, dates, privacy and confidentiality need to be carefully considered. The analysis of matched data has the potential to uncover aspects of individuals or group of entities that are not obvious when a single database is analysed seperately. (Harberman,S.J ()1975).  

1.5.0    JUSTIFICATION OF THE RESEARCH   

One of the important reasons why the research is necessary and reasonable is it enables users to eliminate differences between data values that should be the same, determining the  correct values and reducing the errors that data differences can cause. Another reason while these topic is justified is that it ensures that values that are equivalent, but were entered in a different format or style, are rendered uniform . Hill,T.(1991). Futhermore, there will be avoidance of duplicate records in a database where different identifiers are used for the same entity(Fellegi 1999). Finally, data matching identifies exact and approximate matches, enabling the user or administrator to remove duplicate data as it is being defined.

1.6.0    TERMS ASSOCIATED TO DATA MATCHING

1.   Key : the combination of data fields which are the basis of comparison in a data matching application.

2.   Matched Results:  the set of matched records produced by a data matching application.

3.   Matched Records:  Two or more records brought together as a match.

4.   Name Inconsistencies:  When the same individual is recorded with varied identity detail by different agencies.

5.   Name Tokens :  A component of the full or raw name such as family name, first given name or title.

6.   Name Type:  Describes the nature of a name used currently or previously by an individual such as legal, maiden name or an alais.

7.    Non matched records : Records for which data matching application failed to find a matching record in one or more other data files  N/B:  This is not to say that a record for the individual does not exists elsewhere, only that the application failed to find one.

8.   Profile groups: In the interpretation of identity data matching results, the allocation of matched records to particular groups depending on the ways in which matching records was obtained. Used to better allocate resource to subsequent processing of results.

9.   Unicode standard :  A character code 1-4 bytes that defines every character. In most of the speaking languages in the world .

10.   Data matching :  The bringing together of data from different sources and comparing it.

11.   Data topology:  The order relationship of specific items of data to other items of data.

12.   Address elements : The individual component elements/fields of an address string e.g street number, street name, street type, town/suburb.

13.   Algorithm : A set of logic rules determined during the design phase of a data matching application. The ‘blueprint’ used to turn logic rules into computer instructions that detail what step to perform in what order.

14.   Application:  The final combination of software and hardware which performs the data matching.

15.   Control group : In data matching context, a set of records of a known type (e.g previous identified fraudulent identities, decreased individuals) which are used to better interpret data matching results.

16.   Cross Agency :  The matching of data from one agency with those of one or more other agencies.

17.   Data matching database: A structured collection of records or data that is stored in a computer system.

18.   Data cleansing: The proactive identification and correction of data quality issues which affect an agency’s ability to effectively use its data.

19.   Data integrity : The quality of correctness, completeness and complain with the intention of the creators of the data i.e ‘fit for purpose’

20.   Enrollment :  The process of an individual to enroll an agency. Involves the initial collection of identifying details.

  DOWNLOAD THE COMPLETE PROJECT

DESIGN & IMPLEMENTATION OF A COMPUTERISED LIBRARY STOCK MATCHING SYSTEM

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON DESIGN & IMPLEMENTATION OF A COMPUTERISED LIBRARY STOCK MATCHING SYSTEM INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

MATTHEW NGBEDE
Ahmadu Bello University
I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!
Excellent
Abdul Mateen Iddrisu
UDS
At first I taught is a site full of fraudsters until I saw my project in my Gmail after my payment.. THANK YOU IPROJECTMASTER and May God the almighty bless u guys abundantly
Excellent
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
JONNAH EHIS
Ajayi Crowther University, Oyo
I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!
Excellent
Abraham Ogbanje
NATIONAL OPEN UNIVERSITY OF NIGERIA
At first I was afraid.. But I discovered they are legit. I will bring more patronize
Very Good
Abdulrazak Bello Marsha
Usman Dan fodio University
It was quite a better guide for project and paper presentation purpoting. Many thanks.
Average
Musa From Ahmadu Bello University
Thank you iprojectmaster for saving my life, please keep it up and may God continue to bless you people.
Excellent
Abubakar Iliyasu Hashim
Federal college of education pankshin affiliated to university of jos
I am highly impressed with your unquantifiable efforts for the leaners, more grace to your elbow.I will inform my colleagues about your website.
Very Good
Stancy M
Abia State University, Uturu
I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much iprojectmaster, infact, I owe my graduating well today to you guys...
Excellent

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on DESIGN & IMPLEMENTATION OF A COMPUTERISED LIBRARY STOCK MATCHING SYSTEM?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on DESIGN & IMPLEMENTATION OF A COMPUTERISED LIBRARY STOCK MATCHING SYSTEM?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for DESIGN & IMPLEMENTATION OF A COMPUTERISED LIBRARY STOCK MATCHING SYSTEM, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!