Secure land title transfer system/
Wambi, Ivan.
- Busitema University: Busitema University; 2018
TABLE OF CONTENTS..................................................................................................................viii CHAPTER ONE: INTRODUCTION ................................................................................................11 1.0 Introduction. .................................................................................................................................11 1.1 Background study.........................................................................................................................11 1.2 Problem statement........................................................................................................................12 1.3 Objectives.....................................................................................................................................12 1.3.1 Main objectives. ........................................................................................................................12 1.3.2 Specific objectives. ...................................................................................................................12 1.4 Justification. .................................................................................................................................13 1.5 Scope ............................................................................................................................................14 1.5.1 Technical scope.........................................................................................................................14 1.5.2 Subject scope.............................................................................................................................14 CHAPTER TWO: LITERATURE REVIEW ....................................................................................15 2.0 Introduction. .................................................................................................................................15 2.1 Land ownership in Uganda. .........................................................................................................15 2.1.1 Customary land ownership........................................................................................................15 2.1.2 Mailo land ownership................................................................................................................15 2.1.3 Leasehold land ownership.........................................................................................................16 2.1.4 Freehold land ownership. ..........................................................................................................16 2.2 Land transfer services. .................................................................................................................16 2.2.1 Land title registration. ...............................................................................................................16 2.2.2 Carrying out a title search. ........................................................................................................16 2.2.3 Land title transfer. .....................................................................................................................16 2.3 Existing land title transfer systems ..............................................................................................17 2.3.1 Recordation System. .................................................................................................................17 2.3.2 Torrens System..........................................................................................................................17 2.4 Analysis of the current system used.............................................................................................18 2.5 Current System Vulnerabilities. ...................................................................................................18 2.6 Comparison of land title transfer systems....................................................................................19 2.7 How the security vulnerabilities will be mitigated in the proposed system.................................19 ix 2.8 Biometric Authentication. ............................................................................................................19 2.9 Fingerprint features......................................................................................................................20 2.9.1 Pattern matching........................................................................................................................20 2.9.2 Why biometric authentication? .................................................................................................21 2.9.3 Using biometric authentication. ................................................................................................21 CHAPTER THREE: METHODOLOGY ..........................................................................................22 3.0 Introduction. .................................................................................................................................22 3.1 Data collection methods...............................................................................................................22 3.1.1 Questionnaire ............................................................................................................................22 3.1.2 Document review. .....................................................................................................................22 3.1.3 Consultations.............................................................................................................................22 3.2 Data analysis. ...............................................................................................................................23 3.3 System Operation. ........................................................................................................................23 3.3.1 Web server ................................................................................................................................23 3.3.2 Database Server.........................................................................................................................24 3.3.3 Authentication. ..........................................................................................................................24 3.3.4 Powers of an Attorney...............................................................................................................24 3.4 System Requirements...................................................................................................................25 3.5 Tools for the system .....................................................................................................................25 3.5.1 Hardware Components.............................................................................................................25 3.5.2 Software Components. .............................................................................................................25 3.6 System implementation ................................................................................................................25 3.6.1 Hardware implementation........................................................................................................25 CHAPTER FOUR: SYSTEM ANALYSIS AND DESIGN..............................................................26 4.0 Introduction ..................................................................................................................................26 4.1 Functional analysis.......................................................................................................................26 4.1.1 Requirement Analysis...............................................................................................................26 4.1.2 Functional requirements............................................................................................................26 4.1.3 Non-functional requirements ....................................................................................................27 4.2 System Design..............................................................................................................................27 4.2.1 Logical design of the system.....................................................................................................27 4.2.2 Physical design..........................................................................................................................28 4.3 Tools used. ...................................................................................................................................29 4.4 Hardware Design components. ....................................................................................................30 4.4.1 Fingerprint Scanner...................................................................................................................31 4.4.2. Avr Microcontroller .................................................................................................................31 4.4.3 Ethernet Shield. .........................................................................................................................32 4.4.4 Liquid Crystal Display (LCD). .................................................................................................32 x 4.4.5 Crystal oscillator. ......................................................................................................................33 4.4.6 Wire connectors. .......................................................................................................................33 CHAPTER FIVE: IMPLEMENTATION AND TESTING ..............................................................34 5.0 Introduction ..................................................................................................................................34 5.1 Development Platforms................................................................................................................34 5.1.1 Arduino platform.......................................................................................................................34 5.1.2 Bootstrap platform. ...................................................................................................................34 5.2 Code Design. ................................................................................................................................34 5.2.1 LCD 4 Bit mode interfacing with AVR Microcontroller code. ................................................34 5.2.2 PHP code...................................................................................................................................36 5.3 Testing..........................................................................................................................................36 5.3.1 Unit Testing...............................................................................................................................36 5.3.2 Integration testing......................................................................................................................37 5.3.3 System Testing ..........................................................................................................................37 5.4 System Validation. .......................................................................................................................37 5.5 System Verification......................................................................................................................37 5.6 System evaluation. .......................................................................................................................37 5.7 Current land title transfer system as compared to my system......................................................38 CHAPTER SIX: RECOMMENDATIONS AND DISCUSSION .....................................................39 6.0 Introduction ..................................................................................................................................39 6.1 Summary of Work Done. .............................................................................................................39 6.2 Critical Analysis /Appraisal of The Work ...................................................................................39 6.3 Recommendations. .......................................................................................................................39 6.4 Conclusion....................................................................................................................................40 References. .........................................................................................................................................41 APPENDICIES: .................................................................................................................................43 Appendix 1:........................................................................................................................................43 Appendix 2:........................................................................................................................................44