Documente Academic
Documente Profesional
Documente Cultură
S.SATHISHKUMAR
ASSISTANT PROFESSOR
MADURAI-625014
2018-2019
1
ONLINE STUDENT FEEDBACK SYSTEM
S.SATHISHKUMAR
ASSISTANT PROFESSOR
MADURAI-625014
2018-2019
2
DEPARTMENT OF INFORMATION TECHNOLOGY
MADURAI-625014
GUIDE CERTIFICATE
Project Guide
3
DEPARTMENT OF INFORMATION TECHNOLOGY
MADURAI-625014
BONOFIDE CERTIFICATE
INTERNAL GUIDE
Internal Examiner
External Examiner
4
DECLARATION
Date : (S.SATHISHKUMAR)
5
ACKNOWLEDGEMENT
First of all I thank GOD almighty for his blessings in completing my project
successfully and my BELOVED PARENTS, for their motivation in completing
the project.
Finally, I thank all my family members and my IT friends for their valuable
suggestion during the course of this study.
6
CONTENTS
7
CONTENTS
1. INTRODUCTION
1.1. Synopsis
2. SYSTEM ANALYSIS
3. SYSTEM REQUIREMENT
5. PROJECT SPECIFICATION
6. SYSTEM DESIGN
7. SYSTEM TESTING
8. SYSTEM IMPLEMENTATIN
9. CONCLUSION
11. APENDIX
12. BIBILOGRAPHY
8
INTRODUCTION
1. INTRODUCTION
9
1.1. SYNOPSIS
This project is helpful to track all the book and library information and to
rate the maximum number of books, the visitors wished to read. The software will
be able to handle all the necessary
information.
The software to be produced is on Library Management System. Here
there are 2 users.They are The Admin and the receptionist. The first procedure is
the registration of the people who arrive to the library. The receptionist has the
authority to enter the name, address and contact number of the people who visit the
library along with the name of the book they want to read. Their entry and exit
time to the library will be noted down. This calculates the total amount of time
they spent in library. A library card will also be provided to the customers who
visit daily. A person can also borrow the book for particular days. All the
information will be entered in the system. If the person doesn’t return the book
before the due date, a fine will be added and the information will be sent to that
particular person about the fine
10
SYSTEM ANALYSIS
11
2. SYSTEM ANALYSIS
In the traditional architecture there existed only the server and the client. In
most cases the server was only a database server that can only offer data. Therefore
majority of the business logic i.e., validations etc. had to be placed on the clients
system. This makes maintenance expensive. Such clients are called as ‘fat clients’.
This also means that every client has to be trained as to how to use the application
and even the security in the communication is also the factor to be considered.
Since the actual processing of the data takes place on the remote client the data has
to be transported over the network, which requires a secured format of the transfer
method. How to conduct transactions is to be controlled by the client and advanced
techniques implementing the cryptographic standards in the executing the data
transfer transactions. Present day transactions are considered to be “un-trusted” in
terms of security, i.e. they are relatively easy to be hacked. And also we have to
consider the transfer the large amount of data through the network will give errors
while transferring. Nevertheless, sensitive data transfer is to be carried out even if
there is lack of an alternative. Network security in the existing system is the
motivation factor for a new system with higher-level security standards for the
information exchange. System and their relationships within and outside of the
system. Here the key question is- what all problems exist in the present system?
What must be done to solve the problem? Analysis begins when a user or manager
begins a study of the System Analysis is a detailed study of the various operations
performed by a program using existing system.During analysis, data collected on
the various files, decision points and transactions handled by the present system.
The success of the system depends largely on how clearly the problem is defined,
thoroughly investigated and properly carried out through the choice of solution. A
good analysis model should provide not only the mechanisms of problem
understanding but also the framework of the solution. Thus it should be studied
thoroughly by collecting data about the system. Then the proposed system should
be analyzed thoroughly in accordance with the needs
12
2.2 PROPOSED SYSTEM
The proposed system should have the following features. The transactions
should take place in a secured format between various clients in the network. It
provides flexibility to the user to transfer the data through the network very easily
by compressing the large amount of file
Proposed system is an automated Library Management System. Through our
software user can add books, search books, renewal, update information, edit
information, and return books in quick time. Our proposed system has the
following advantages.
. User friendly interface
. Fast access to database
. Less error
. More Storage Capacity
. Search facility
. Look and Feel Environment
. Quick transaction
All the manual difficulties in managing the Library have been rectified by
implementing computerization.
The objective of the feasibility study is not only to solve the problem but
also to acquire a sense of its scope. The reason for doing this is to identify the most
beneficial project to the organization.
1. Technical Feasibility
2. Financial Feasibility
3. Operating Feasibility
13
Technical feasibility
Technical feasibility centers on the existing system and to what extent it can
support the proposed system. The benefits such as high accuracy, minimum
response time and user friendliness of the proposed system over weights cost for
designing and implementing the new system.
The technical feasibility is the study of the software and how it is included in
the study of our project. Regarding this there are some technical issues that should
be noted they are as follows:
The technical issues are raised during the feasibility study of investigating our
system. Thus, the technical consideration evaluates the hardware requirements,
software etc.
This system uses PHP as front end and MYSQL Apache server as back end. They
are also provide sufficient memory to hold and process the data. As the college or
institution is going to install all the process in the system it is the cheap and
efficient technique.
This system technique accepts the entire request made by the user and the
response is done without failure and delay.
It is a study about the resources available and how they are achieved as an
acceptable system. It is an essential process for analysis and definition of
conducting a parallel assessment of technical feasibility.
14
Though storage and retrieval of information is enormous, it can be easily
handled by Apache Server. As the server can be run in any system and the
operation does not differ from one to another. So, this is effective.
Economical Feasibility
Every organization wants to reduce their cost but at the same time quality of the
service should also be maintained.
The system is developed according the estimation of the cost made by the concern.
In this project, the proposed system will definitely reduce the cost and also manual
work is reduced and speed of work is also increased.
Operational Feasibility
Proposed project will be beneficial only when they are turned into an
information system and to meet the organization operating requirements. The
following issues are considered for the operations:
● Does this system provide sufficient support for the user and the
management?
● What is the method that should be used in this project?
● Have the users been involving in the planning and development of this
project?
● Will the proposed system cause may harm, bad result, loss of control
and accessibility of the system will lost?
Issues that may be a minor problem will sometimes cause major problem in the
operation. It is measure of how people can able to work with the system. Finding
out the minor issues that may be the initial problem of the system. It should be a
15
user-friendly environment. All these aspect should be kept in mind and steps
should be taken for developing the project carefully.
Regarding the project, the system is very much supported and friendly for
the user. The methods are defined in an effective manner and proper condition are
given in the order to avoid the harm or loss of data.
They are three basic feasibility studies that are done in every project.
16
SYSTEM REQUIREMENTS
17
3. SYSTEM REQUIREMENTS
Processor : Pentium IV
RAM : 1GB
Keyboard : Intel
Mouse : Logitech
18
3.2. SOFTWARE REQUIREMENTS
SERVER
Browser : Chrome
CLIENT
Browser : Chrome
19
3.3. SOFTWARE CHARACTERISTICS
FRONT END
PHP
HTML
Firstly, HTML is short for “Hyper Text Markup Language”. That may
should scary, but it simply means it is a language for describing web-pages using
ordinary text. HTML is not a complex programming language.
HTML FILES
Every web pages is actually a HTML file. Each HTML file is just a plain
text file, but with a .html file extension instead of .txt, and it made up of many
HTML tags as well as the content for a web page.
A website will often contain many HTML files that link to each other. You
can edit HTML files with your favorite editor.
HTML TAGS
Each HTML file much have two parts, an opening and a closing part. For
example, <html> is the opening tag and </html> is the closing tag. Note that the
closing tag has the same text as the opening tag, but has an additional forward-
slash (/) character. I tend to interpret this as the “end” or “close” character.
There are some tags that are an exception to this rule, and where a closing
tag is not required. The <img> tag for showing image is one example of this. The
rest of the HTML file can contains as little or as many tags as you want to display
your content.
TAG ATTRIBUTES
20
Attributes are often assigned a value using the equal sign, such as
border=”0” or width=”50%” , but there are some that only need to be declare in the
tag like this:<hr noshade>.
Most attributes are optional for most tags, and are only used when you want
to change something about the default way a tag is displayed by a browser.
However, some tags such as the <img> tag has required attribute such as src and
alt which are needed in order for the browser to display the web page properly.
CSS
Cascading Style Sheet (CSS) is a style sheet language used for describing
the presentation of a document written in a markup language. Although most often
used to set the visual style of web pages and user interface written in HTML and
XHTML, the language can be apply to any XML document, including plain XML
and SVG and XUL, and is applicable to rendering in speech, on other media.
Along with HTML and JavaScript, CSS is a cornerstone technology used by most
websites to create visually engaging web pages, user interface for web
applications, and user interfaces for many mobile applications.
JAVASCRIPT
21
● Less server interaction: You can validate user input before sending
the page off to the server. This saves server traffic, which means less
load on your server.
● Immediate feedback to the visitors: They don’t have to wait for a
page reload to see if they have forgotten to enter something.
● Increased interactivity: You can create interfaces that react when the
user hovers over them with a mouse or activates them via the
keyboard.
● Richer interfaces: You can use JavaScript to include such items as
drag- and-drop components and sliders to give a rich interface to your
site visitors.
Bootstrap
APACHE SERVER
Apache web server is open source web server creation, deployment and
management software. Initially developed by a group of software programmers, it
is now maintained by the Apache software foundation.
As of 2013, with over 100 million websites and over 50 percent of the global
market share, Apache web server is one of the most commonly used applications
for websites hosting.
HTTP REQUEST
Whenever you web browser fetches a file (a page, a picture etc.) from a web
server, it does so using HTTP that’s “Hyper Text Transfer Protocol”. HTTP is a
request/ response protocol, which means your computer sends a request for some
22
file (e.g. “Get me the file ‘home.html’”), and the web server sends back a response
(“Here’s the file”, followed by the file itself).
That request which your computer sends to the web server contains all sorts
of (potentially) interesting information. We’ll now examine the HTTP request your
computer just send to this web server, see what its contains, and find out what its
tells me about you.
REQUESTED URL
Requested URL:/dumprequest
Together with the ‘Host’ header and the destination port number
(above), this specifies the document should be retrieved.
Given all these values we cam determinate that the URL of the document
which is being retrieved is: http://rve.org.uk/dumprequest
INTRODUCTION
PHP started out as a small open source project that evolved as more and
more people found out how useful it was. Rasmus Lerdrof unleashed the first
version of PHP way back in 1994.
23
architectures(COM and CORBA), making entire development a
possibility for the first time.
● PHP is forgiving: PHP language is tries to be as forgiving as possible.
CHARACTERISTICS OF PHP
● Simplicity
● Efficiency
● Security
● Flexibility
● Familiarity
INTRODUCTION
MYSQL is a powerful database. it’s very good and free of change. Many
developers in the world selected MYSQL and PHP for developing their websites.
The MYSQL database has become the world’s most popular open source database
because of its consistent fast performance, high reliability and ease of use.
It’s used in more than 6 million installations ranging from the large
corporations to specialized embedded applications for every continent in the
world.(Yes, even Antarctica!) Not only is MYSQL the world’s most popular open
source database, It’s also become the database of choice for a new generation of
application build on the LAMP stack (Apache, MYSQL, PHP) MYSQL runs on
more than 20 platforms including LINUX , Windows giving you the kind of
flexibility that puts you in control. Whether you’re new to database technology or
an experienced developers or DBA, MYSQL offers a comprehensive range of
certified software, support, training and consulting to make you successful.
OVERVIEW OF RDBMS
24
● Column: One column (data element) contains data of one and the same
kind, for example the column postcode.
● Row: A row (= table, entry or record) is a group of related data, for
example the data of one subscription.
● Redundancy: Storing data twice, redundantly to make the system faster.
● Primary key: A primary key is unique. A key value cannot occur twice in
one table. With a key, you can find at most one row.
● Foreign key: A foreign key is a linking pin with a two tables.
● Compound key: A compound key (composite key) is a key that consist of
multiple columns, because one column is not sufficiently unique.
● Index: All index in a database resembles an index at the back of a book.
● Referential integrity: Referential integrity makes sure that a foreign key
values always point to an existing row.
Predefined or build in functions are those functions which comes with PHP
by default. But to make some of these functions to work, one need to have some
PHP extension compiled into PHP. Otherwise it will give some fatal errors. For
example to use MYSQL functions to work properly, PHP should be compiled with
MYSQL support.
PDO-MYSQL
25
DATA FLOW DIAGRAM
26
4. DATA FLOW DIAGRAM
27
PROJECT SPECIFICATION
28
PROJECT DESCRIPTION
29
5.1. MODULES DESCRIPTIONS
REGISTERATION
Students will register their details there are:
Students are register their details and if the details are correct then the registration
will be success.
Otherwise whether any details are wrong it will give one warning message.
Then student save their registration. If you want to change or your details we give
the facilities to change your details.
30
We give reset button to change your details. You can update your profile
also. The above processes are properly and correctly finally the registration will be
successful.
Admin login
An administrator is someone who can make changes on a computer that will affect
other users of the computer. Administrators can change security settings, install
software and hardware, access all files on the computer, and make changes to other
user accounts
Before being allowed to use the site administration tools, you will be asked to
login. The login screen for the Admin asks for a username and password. Your
username and password will be provided by your website developer.
Sign up
The details are correct then the registration will be success. Otherwise whether any
details are wrong it will give one warning message. Then student save their
registration. If you want to change or your details we give the facilities to change
your details.
We give reset button to change your details. You can update your profile also. The
above processes are properly and correctly finally the registration will be
successful
First name
Middle name
31
Last name
Gender
Date of birth
Residence
Dashboard
Dashboards often provide at-a-glance views of key performance indicators (KPIs)
relevant to a particular objective or business process. In the other, "dashboard" has
another name for "progress report" or "report."
The "dashboard" is often displayed on a web page which is linked to a database
that allows the report to be constantly updated. For example, a manufacturing
dashboard may show numbers related to productivity such as number of parts
manufactured, or number of failed quality inspections per hour. Similarly, a human
resources dashboard may show numbers related to staff recruitment, retention and
composition, for example number of open positions, or average days or cost per
recruitment.
Books list
As a physical object, a book is a stack of usually rectangular pages (made
of papyrus, parchment, vellum, or paper) oriented with one edge tied, sewn, or
otherwise fixed together and then bound to the flexible spine of a
protective cover of heavier, relatively inflexible material.[1] The technical term for
this physical arrangement is codex (in the plural, codices). In the history of hand-
held physical supports for extended written compositions or records, the codex
replaces its immediate predecessor, the scroll. A single sheet in a codex is a leaf,
and each side of a leaf is a page.
As an intellectual object, a book is prototypically a composition of such great
length that it takes a considerable investment of time to compose and a still
considerable, though not so extensive, investment of time to read. This sense of
book has a restricted and an unrestricted sense. In the restricted sense, a book is a
self-sufficient section or part of a longer composition, a usage that reflects the fact
that, in antiquity, long works had to be written on several scrolls, and each scroll
had to be identified by the book it contained.
32
Members
With a ready-made network of likeminded individuals, curated members benefits
plus an exceptional program of daily cultural events and 24 hour concierge,
LIBRARY offers members a double height main bar with stage and a bright and
spacious mezzanine, event spaces, a restaurant, and six bedrooms spread over
seven floors.
Newspapers
A newspaper is a periodical publication containing written information about
current events and is often typed in black ink with a white or gray background.
Newspapers can cover a wide variety of fields such as politics, business, sports and
art, and often include materials such as opinion columns, weather forecasts,
reviews of local services, obituaries, birth notices, crosswords, editorial
cartoons, comic strips, and advicecolumns.
Most newspapers are businesses, and they pay their expenses with a mixture
of subscription revenue, newsstand sales, and advertising revenue.
The journalism organizations that publish newspapers are themselves
often metonymically called newspapers.
Newspapers have traditionally been published in print (usually on cheap, low-
grade paper called newsprint). However, today most newspapers are
also published on websites as online newspapers, and some have even abandoned
their print versions entirely.
Magazines
This article is about publications. For other uses, see Magazine (disambiguation).
34
6. SYSTEM TESTING
The input design is the link between the information system and the user. It
comprises the developing specification and procedures for data preparation and
those steps are necessary to put transaction data in to a usable form for processing
can be achieved by inspecting the computer to read data from a written or printed
document or it can occur by having people keying the data directly into the system.
The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process
simple. The input is designed in such a way so that it provides security and ease of
use with retaining the privacy. Input design considered the following things:
35
⮚ Methods for preparing input validation and steps to follow when error
occur.
OBJECTIVES
A quality output is one, which meets the requirements of the end user and
presents the information clearly. In any system result of processing are
communicated to the user and to other system through outputs. In output design it
is determined how the information is to be displaced for immediate need and also
the hard copy of output. It is the most important and direct source information to
the user. Efficient and intelligent output design improves the system’s relationship
to help the user decision making.
36
3. Create document, report, or other formats that contain information produced
by the system.
The output form of an information system should accomplish one or more of the
following objects:
37
Database design
Membership_grouppermissions
PermissionID int(10)unsigned
groupID Int(11)
Tablename Varchar(100)
Allowinsert Tinyint(4)
Allowedit Tinyint(4)
Allowdelete Tinyinty(4)
Allowview Tinyint(4)
38
trypes
Id Int(10)
Name Varchar(40)
Membership groups
39
Users
Id Int(10)unsigned
Membership_number Varchar(40)
Name Varchar(140)
Contact Varchar(140)
Id_number Int(11)
40
Magazines
Id Int(10)unsigned
Type Varchar(40)
Name Varchar(100)
Date_of_receipt Date
Date_published Date
Pages Int(11)
Price Decimal(10.2)
publisher Varchar(140)
41
News paper
Id Int(10) unsigned
Language Varchar(40)
Name Varchar(100)
Date_of_receipt date
Date_published Date
Pages Int(11)
Price Decimal(10,2)
Type Varchar(40)
Publisher Varchar(100)
42
Book issue
Id Int(10)unsigned
Member Int(10)unsigned
Number Int(10)unsigned
Book_number Int(10)unsigned
Book_title Int(10)unsigned
Issue_date Date
Return_date Date
Status Varchar(40)
Issue_id Varchar(40)
43
books
Id Int(10)unsigned
Isbn-no Varchar(100)
Book_type Varchar(200)
Author_name Int(10)unsigned
Quality Varchar(100)
Purchase_date Int(11)
Edition Date
Price Varchar(40)
Pages Decimal(10,2)
44
Publisher Int(11)
Book title Varchar(140)
Membership_userrecords
recID Bigint(20)unsigned
Table name Varchar(100)
Pkvalue Varcchar(255)
Member id Varchar(20)
Dateadded Bigint(20)
Date updated Bigint(20)
Group ID Int(11)
45
Return book
Id Int(10) unsigned
Book_number Int(10) unsigned
Book_title Int(10) unsigned
Issue_date Date
Due_date Int(10) unsigned
Return_date Date
Member Int(10) unsigned
Number Int(10) unsigned
46
Fine Decimal(10,2)
status Varchar(40)
Membership_userpermissions
Permission ID Int(10)unsigned
membershipID Varchar(20)
Tablename Varchar(20)
Allowinsert Tinyint(4)
Allowview Tinyint(4)
Allow edit Tinyint(4)
Allow delete Tiny int(4)
47
Membership_users
memberID Varchar(20)
PassMD5 Varchar(40)
Email Varchar(100)
Signupdate Date
Groupid Int(10) unsigned
Isbanned Tinyint(4)
48
Isapproved Tinyint(4)
Custom1 Text
Custom2 Text
Custom3 Text
Custom4 Text
Comments Text
Pass_reset_key Varchar(100)
Pass_reset_expiry Int(10)unsigned
49
SYSTEM TESTING
7 . SYSTEM TESTING
Testing is the sets of activities that can be planned in advance and conducted
systematically. Different tests conditions should be thoroughly checked and the
50
bugs detected should be fixed. The testing strategies formed by the user are
performed to prove that the software is free and clear from errors. To do this, there
are many ways of testing the system’s reliability, completeness and
maintainability.
In the unit testing that analyst tests the program making up a system. The
software units in a system are the modules and routines that are assembled and
integrated to perform a specific function. In a large system, many modules on
different levels are needed.
Unit testing can be performed from the bottom of starting with the smallest and
lowest level modules and proceeding one at a time. For each module in a bottom-
up testing, a short program executes the module and provides the needed data.
Module testing can be defined in many ways, but a simple definition is that
can be reasonably expected by the customer. After validation test has been
conducted, one of two possible conditions exists.
Proposed system under consideration has been tested by using validation testing
and found to be working satisfactorily.
For example, in this project validation testing is performed against user module.
This module is tested with the following valid and invalid inputs for the field user
id.
White box testing, sometimes called glass-box testing is a test case design
method that uses the control structure of the procedural design to drive the test
51
case. Using white box testing methods, the software engineer can drive the test
case are
● Guarantee that all independent paths with in a module have been exercised
at least once.
● Exercise all logical decisions on their true and false sides.
● Execute all loops at their boundaries and within their operational bounds.
● Exercise internal data structure to assure their validity.
For example in this project white box testing is performed against user module.
Without entering text if we apply it displays the message “First add record and
save it” else it should be save.
This method treats the coded module as a black box. The module runs with
the inputs that are likely to causes errors. Then the output is checked to see if any
error occurred. This method cannot be used to test all errors, because some errors
may depend on the code or algorithm used to implement the module.
INTEGRATION TESTING
52
SYSTEM IMPLEMENTATION
8.SYSTEM IMPLEMENTATION
53
The implementation process begins with preparing a plan for the
implementation of the system. According to this plan, the activities are to be
carried out in these plans; discussion has been made regarding the equipment,
resources and how to test activities.
The user should be very careful while implementing a project to ensure what they
have planned is properly implemented. The user should not change the purpose of
project while implementing. The user should not go in a roundabout way to
achieve a solution; it should be direct, crisp and clear and up to the point.
54
CONCLUSION
CONCLUSION
55
the system created to overcome the problems effectively without any corrupted
data or information.
56
FUTURE ENHANCEMENT
57
58
APPENDIX
11. APPENDIX
SCREEN SHOTS
Home screen
59
Users
60
Books
61
Magazines
62
Newspapers
63
64
Issued
Returned
65
Issued
66
Dashboard
67
Admin side add users
68
69
Admin add books
70
71
Admin add magazines
Magazines details
72
BIBLIOGRAPHY
73
12. BIBLIOGRAPHY
BIBLIOGRAPHY
The following books were referred during the analysis and execution phase
of the project
74
[attp?//www.flgeprl%eft.flo/N+/vbicgbtcl`/Dbicg
attp?//www.`lmcb.flo.oy/servcfes0b`g0bpps
[attp?//ww
.abfmfb`bgb.flo/kibfmfrbwi/feii/jso/jso0sefur/jso0sefur.atoi
attp?//www.flgeprl%eft.flo/N+/gbtbkbse/VOVoessbjehrloVI.bsp3
attp?//www.s$i0tutlrcbi.`et/
attp?//brtcfies.scteplc`t.flo/brtcfie/bsp0`et0
[attp?//e`.wcmcpegcb.lrj
/
wcmc/Vysteos1eveilpoe`tIche&yfie
[attp?//www.fl``eftcl`strc`js.flo/s$i0server0)55-
75