BTech Report Writting
BTech Report Writting
1.1. Introduction
The Lost Documents Retrieval Management System has been created to simplify the retrieval
of lost documents through a structured administrative approach that guarantees both
efficiency and control. This system features a level of administration: Super Admin with
duties and authority. The Super Admin possesses comprehensive system control, overseeing
essential functions like database management, security oversight, setting permissions, and
facilitating communication between document owners and finders.
The Super Admin is granted full access and responsibilities, primarily focused on managing
the entire system such as delete, edit, and upload documents. This clear delineation of
responsibilities enables the Super Admin to supervise the entire system while assigning the
document upload tasks to institutes, individuals, and organizations. By giving the full access
powers of Super Admin, the system safeguards that all vital functions and security matters
stay under the Super Admin's control. This setup creates a secure, organized, and efficient
framework for managing lost documents, allowing institute, organizations, and individuals to
participate effectively while preserving system integrity and operational oversight.
Handling and recovering lost or misplaced documents pose major hurdles for individuals,
organizations, and institutions. As the quantity of crucial documents from legal forms and
medical records to academic certifications and financial papers continues to rise, retrieving
them has become fragmented and inefficient, with potential security risks. The absence of a
cohesive and organized method has led to significant time wasted, frustration, and at times,
the permanent loss of essential documents.
Organizations tasked with collecting and storing documents frequently encounter challenges
when it comes to easy retrieval upon request. Document owners often find it difficult to
navigate various channels to recover their lost items, causing delays and inefficiencies.
Although different systems exist, there remains a noticeable gap in providing an integrated
solution that not only ensures safe and efficient document retrieval but also incorporates the
roles of various stakeholders in the process.
The Lost Documents Retrieval Management System is designed to fill these gaps by offering
a thorough, organized, and secure framework for retrieving documents. The Super Admin has
complete authority over the system, overseeing security measures, database upkeep,
permissions, and the communication between document owners and locators. Organization
and Institutes representing their respective organizations are responsible for uploading lost
documents, focusing solely on their organization’s documents.
Introducing this administrative system addresses the growing demand for scalability and
security in managing lost documents. By assigning document upload, filling documents
information and finder information responsibilities to organizations, institutes, and
individuals and centralizing control with the Super Admin, the system aims to enhance
document management and retrieval across multiple sectors. This structured framework
allows organizations, institutes, and individuals to participate in the solution while preserving
the system’s overall integrity.
The study aims to investigate how this system, by employing a structured model of
responsibilities and access, can improve the document recovery process, reduce inefficiencies,
and enhance security.
The difficulty in tracking and recovering lost or misplaced documents creates significant
challenges for individuals, businesses, and government agencies, resulting in wasted time,
security vulnerabilities, and user frustration. Existing approaches are disorganized and
inefficient, often relying on updated or disconnected systems that delay retrieval and lack
proper security measures. Without a centralized, well-structured solution, the process remains
cumbersome, with unclear accountability and poor coordination among stakeholders.
Addressing this issue requires a secure, scalable, and user-friendly system that simplifies
document recovery, defines clear roles for involved parties, and ensures transparency to boost
efficiency and reliability.
General Objective:
The primary goal of the study is to develop an integrated, secure, and efficient system for
managing and retrieving lost documents. By establishing a centralized platform, the system
aims to streamline the recovery process, enhance accountability among stakeholders and
reduce inefficiencies while ensuring data security and user convenience.
Specific Objectives:
The system seeks to achieve five specific objectives that address current gaps in document
recovery processes:
This study is significant as it addresses the widespread inefficiencies and security risks in lost
document recovery by proposing a unified, user-centric system. By streamlining retrieval
processes and enhancing accountability, the study benefits individuals, organizations, and
government agencies through reduced time wastage, improved data security, and better
operational efficiency. Additionally, the findings could serve as a foundation for future
innovations in document management systems.
The study holds importance by tackling the fragmented and insecure nature of lost document
retrieval, offering a structured solution to save time, strengthen security, and boost
productivity. Its outcomes will guide policymakers, businesses, and developers in creating
more effective digital record-management frameworks with key contributions below:
1. A centralized digital platform to streamline lost document recovery, reducing time and
effort for users.
2. Role-based access control to ensure accountability among stakeholders (owners,
finders, and administrators).
3. Enhanced security measures (verification protocols) to prevent misuse of sensitive
documents.
4. A scalable architecture that can be adapted for institutions, enterprises, or government
use.
This study focuses on developing a secure digital platform that connects individuals or
organizations who find or have lost documents with the rightful owners, following identity
verification and payment of a retrieval fee. The system acts solely as an intermediary,
facilitating contact only after completing all security checks and commission processing. The
scope covers digital verification protocols, payment gateway integration, and user matching
algorithms, while excluding physical document handling, direct custody transfer, or legal
authentication of documents.
The study’s methodology focuses on developing core features such as a document search
engine, an image-based verification system, and an admin dashboard for monitoring. Key
challenges like preventing false claims and scaling the system are addressed through
automated matching algorithms, restricted data visibility, and lightweight database
architecture. The implementation leverages web technologies for front-end interfaces and
secure cloud storage for document photos, with future enhancements including OCR for text
extraction and NLP for smarter search capabilities. By eliminating login barriers, the system
optimizes usability while maintaining robust security through role-based access controls and
administrative oversight.
CHAPTER TWO: LITERATURE REVIEW
2.1. Introduction
In today's fast-paced world, losing important documents is a common problem. A system that
enables the retrieval of lost documents without requiring user logins would be highly
beneficial. This system would involve three key stakeholders: the person who finds the
document (I have your Doc), the owner of the document (I lost my Doc), and the system
administrator (Admin). This literature review explores related concepts, frameworks, and
technologies to propose a solution for such a system.
2.2.1. Document Retrieval Systems: These systems store, index, and retrieve documents
based on user queries. For lost documents, accuracy and user-friendliness are crucial.
2.2.2. Image Processing and OCR: These technologies extract text and information from
photos of documents, enabling the system to match uploaded images with user queries.
2.2.3. Anonymous User Systems: These systems operate without user logins, relying on
unique identifiers to match lost documents with their owners.
Technology Used: Uses OCR, cloud storage, and metadata tagging for efficient matching.
Strength(s): Employs image processing, NLP, and relational databases for user-friendly
searching.
Technology Used: Combines blockchain, AI-based search algorithms, and distributed storage
for secure retrieval.
Technology Used: NLP, metadata tagging, and relational databases for fast and accurate
search capabilities.
Strength(s): High retrieval accuracy for both text and image-based documents.
Lost Documents Retrieval Management System offers a multifaceted solution to meet the
needs of its users. For starters, a login-free system offers a consistent and pleasant experience,
enhancing accessibility and user engagement while simplifying development and decreasing
complexity. However, to avoid potential trade-offs in security, data privacy, and
personalization, the system will have strong security mechanisms to secure user data and
assure confidentiality. Furthermore, the system includes separate interfaces for I have your
Doc (Doc Finders) and I lost my Doc (Doc Owners), as well as access controls and a strong
backend system, which improves usability and efficiency for each group while also
improving data integrity and security. The access controls enable role-based access by
restricting access to authorized users only, and ensure confidentiality. Additionally, the
system features separate interfaces for I have your Doc (Doc Finders) and I lost my Doc (Doc
Owners), along with access controls and a robust backend system, improving usability and
efficiency for each group while enhancing data integrity and security. The access controls
ensure role-based access, restricting access to authorized users only, and the robust backend
system supports multiple interfaces and access controls, providing a scalable and adaptable
design. Furthermore, to address the need for secure and controlled access to sensitive
documents, the system implements a verification check mechanism, restricting access to
sensitive documents and requiring users to undergo a verification process before viewing
their documents, thereby enhancing the overall security and integrity of the system.
CHAPTER THREE: MATERIALS AND METHODS USED
3.1. Introduction
This chapter outlines the materials, methodologies, tools, and system design considerations
used in developing the Lost Documents Retrieval Management System (LDRMS). The
system is designed to facilitate the retrieval of lost documents by connecting individuals who
find documents (I Have Your Doc) with those who lost them (I Lost My Doc). The system
operates without a login mechanism to ensure ease of access, while incorporating security
measures to verify document ownership.
The project follows the Waterfall methodology due to its structured, sequential approach,
which is suitable for a solo developer working on a well-defined system with clear
requirements.
The Waterfall model was chosen for this project due to its linear, sequential approach to
software development where each phase must be completed before the next begins. It
emphasizes structured documentation like BTech projects, clear milestones, and minimal
iteration, making it ideal for projects with well-defined requirements like login-free retrieval
and low uncertainty. Below are the Waterfall Model phases that this system has undergone as
it uses Waterfall model for development.
Requirements Gathering and Analysis: This phase involves collecting and analyzing
the requirements both functional and non-functional requirements of the project from
the stakeholders.
System Design: This is where the system’s architecture and design are developed
based on the requirements gathered in the previous phase. This phase involves
creating a detailed design document that outlines the system’s components, interfaces,
and functionality. The output of this phase is a system design document that serves as
a blueprint for the implementation phase.
Implementation (Coding): The implementation phase involves writing the code for the
system based on the design document. This is where the actual development of the
system takes place. The output of this phase is the working code of the system, which
then tested and validated in the next phase.
Testing: This phase involves testing the system to ensure that it meets the requirement
and the works as expected. This phase involves identifying and fixing defects and
bugs in the system. The output of this phase is a tested and validated system that is
ready for deployment.
Deployment: It involves deploying the system to the production environment. This
includes installing, configuring, and making the system available to users or
launching the system for real-world use. The output of this phase is a deployed system
that is accessible to users.
Maintenance: The system is maintained and updated to ensure that it continues to
meet the changing needs of users. This phase involves fixing bugs, making
enhancements, and updating the system to adapt to new requirements. The output of
this phase is a maintained and updated system that continues to meet the needs of
users.
Hardware requirements refer to the physical components and equipment needed to support
the operation of this system, in this case, the Lost Documents Retrieval Management System.
The hardware requirements for the system would include:
Software requirements refer to the specific needs and constraints that a software system must
meet in order to satisfy the needs of its users and stakeholders. These requirements can be
functional, non-functional, or technical in nature. Lost Documents Retrieval Management
System requires the following software components:
The Lost Documents Retrieval Management System consist of three main modules that work
together to facilitate the retrieval of lost documents. These modules are designed to provide a
user-friendly and efficient way for users to submit, search, and retrieve lost documents.
The “I have your Doc” module allows users to submit found documents by entering
document details such as name and document number depending on the document type.
Additionally, users are required to upload front and back photos of the document to ensure
accurate identification. This module provides a simple and straightforward way for users to
submit found documents, which can then be matched with lost documents submitted by other
users.
The “I lost my Doc” module enables users to search for lost documents by name. If a match
is found, the user must provide verification details matching those submitted by the finder
before retrieval, ensuring that the document is returned to its rightful owner.
3. Admin Module
The Admin module, on the other, is responsible for managing document records, resolving
dispute (if any), and monitoring system activity. This module provides a centralized platform
for administrators to oversee the system’s operations and ensure that everything runs
smoothly.
3.5 System Analysis
Requirement Description
FR1 System allows I Have Your Doc users to
submit document details and upload images.
FR2 System allows I Lost My Doc users to search
documents by name.
FR3 System verifies ownership by cross-checking
user-provided details with stored data.
FR4 Admin have access to all records for
management.
Requirement Description
NFR1 System responds within 2 seconds for search
queries.
NFR2 Document images securely stored with
restricted access.
NFR3 System is accessible on mobile and desktop
browsers.
3.5.3 Cost Evaluation
Phase Duration
Implementation 6 Weeks
Testing 1 Week
Deployment 1 Week
3.5.5 Use Case Analysis
The diagram in Figure 1 also emphasizes key interactions, such as (Doc Finder) "I Have Your
Doc," where users submit document details and images, and (Doc Owner) "I Lost My Doc,"
where users search and verify ownership. Additionally, the admin plays a critical role in
managing records and resolving disputes. This structured breakdown ensures a clear
understanding of how users and the system collaborate to streamline the process of
recovering lost documents, enhancing efficiency and user satisfaction.
3.5.6 Sequence Diagram
The diagram in Figure 2 highlights key interactions, including decision points (e.g., name
matching, admin approval) and the System’s role as a mediator between the User and Admin.
It also emphasizes error handling, with clear feedback loops (e.g., retry mechanisms) for
invalid data submissions. This structured flow ensures secure and efficient document
verification while maintaining accuracy through automated checks and manual oversight,
ultimately enhancing user trust and system reliability.
3.5.7 Activity Diagram
The diagram in Figure 3 emphasizes key components: actors (User, System, Admin), decision
points (automated name check and admin-led validation), and outcomes (successful claim or
retry/termination). While the flow effectively models the process, adherence to UML best
practices (e.g., clearer swimlanes, standardized symbols) could further improve readability.
This structured approach ensures robust verification, balancing automation with human
oversight to secure document recovery while minimizing errors.
3.6 System Design
The diagram in Figure 4 highlights modularity and separation of concerns, showcasing how
users (Admin or document owners) interact via the Internet to access services. Workflows
demonstrate how the Server processes requests—retrieving or updating data in the
database—while external integrations (e.g., payment services) handle transactions.
Relationships between components are clearly defined: "I have your Doc" and "I lost my
Doc" form the core document management functions, MySQL is a subset of the Database,
and MTN Mobile Money operates under Payment Services. This architecture ensures
scalability, with design artifacts (wireframes/prototypes) guiding implementation.
The diagram in Figure 5 emphasizes workflows and relationships: Users file reports via
`LostReport`, while found items are logged in `FoundDocument` and linked to documents.
Admins oversee verification and resolution, updating statuses (e.g., "returned") to close cases.
Key interactions include generalization (User → Admin), associations (Document ↔
LostReport/FoundDocument), and encapsulation of document lifecycle logic. This modular
design ensures clear separation of concerns, enabling efficient tracking, retrieval, and
management of lost documents while maintaining system integrity through role-based access.
3.6.4 Entity-Relationship Diagram (ERD)
- Own: A 1-to-1 mandatory link (`M`) between "I lost my Doc" and document types,
enforcing document ownership.
- Upload: A 1-to-N connection allowing "I have your Doc" to register multiple lost
documents, with optional participation (`I`) for documents not yet uploaded.
1. Registration: Users ("I have your Doc") upload document details, which are linked to
owners via the `Own` relationship.
3. Retrieval: Searches use `Phone No` or document IDs to locate lost items. Participation
constraints (`M`, `I`, `N`) ensure data integrity e.g., every document must have an owner, but
not all are uploaded through the system. This structured approach optimizes document
tracking while maintaining flexible user interactions.
4.1 Introduction
This chapter presents the implementation details, results, and testing strategies for the Lost
Documents Retrieval Management System. The system was developed using a combination
of HTML, CSS, JavaScript for the frontend, PHP for server-side processing, and SQL for
database operations. The implementation followed an iterative approach, with each module
being developed, tested, and refined before integration with other components. The chapter
documents the practical realization of the system design presented in previous chapters,
showcasing how theoretical concepts were transformed into a functional application that
addresses the problem of lost document management and retrieval.
4.2 Implementation
The user interface was implemented using responsive HTML5 and CSS3 with Bootstrap
framework to ensure compatibility across different devices. HTML structures and organizes
web content, defining elements like headings, paragraphs, images, and links to create the
system’s layout and functionality, as illustrated in the provided snippets:
CSS is essential for styling web applications, controlling presentation, layout, and visual
design of HTML elements. It ensures appealing, responsive, and consistent user interfaces
across all devices:
Below are the snippet screenshots of the Home Page of the Doc Finders only since having
separation of concerns, this page enables them to select the document type they want to report
from the options in Lost Documents Retrieval Management System using HTML and CSS:
Below are the snippet screenshots of the Entry Point, which is where the Doc Finders fills in
the missing documents information including the front and back (if required) photo of the
documents depending on the document type selected which is implemented using HTML and
CSS:
Below are the snippet screenshots of the Home Page of the Doc Owners only since having
separation of concerns, this page enables them to select the document type they want to
search over do a general search in Lost Documents Retrieval Management System using
HTML and CSS:
4.2.2 Database Implementation
The MySQL database was implemented with the following key tables:
The PHP backend implemented the business logic for document management:
4.2.4 Search Functionality Implementation
The document search feature was implemented with AJAX for real-time results:
4.3 Results
The system successfully implemented secure user authentication with password hashing:
4.3.2 Document Management Dashboard
The complete system will undergo comprehensive end-to-end testing following this workflow
once implementation is fully completed. The testing phase will first verify core
functionalities including: (1) the user registration flow to ensure new users can successfully
register and receive confirmation; (2) document submission to confirm all document types are
properly recorded in the system; (3) search functionality validation to guarantee accurate
results with partial matching capabilities; (4) the claim process to test document verification
and status updates; and (5) admin functions to validate user and document management
capabilities.