Documente Academic
Documente Profesional
Documente Cultură
ON
LIBRARY MANAGEMENT SYESTEM
BY
Amit Kumar
Roll no.-130
Prn no.-1714110442
Bharati Vidyapeeth
(Deemed To Be University)
College Of Engineering,Pune
1
ACKNOWLEDGEMENT
Name of student
Amit Kumar
PRN NO. 1714110442
ROLL NO.-130
BTECH SEM-IV
2
CERTIFICATE
This is to certify that the project titled LIBRARY MANAGEMENT SYSTEM
submitted by AMIT KUMAR (Roll number 130 of Computer Department Sem-iv)
has been prepared under my/our supervision for the partial fulfillment of the
requirements for B.TECH degree in Bharati Vidyapeeth (deemed to be
university)College of Engineering pune .
3
CONTENTS :-
12. REFRENCES 85
4
1. INFORMATION GATHERING
A library is organized for use and maintained by a public body, an institution, a corporation, or a
private individual. Public and institutional collections and services may be intended for use by
people who choose not to—or cannot afford to—purchase an extensive collection themselves, who
need material no individual can reasonably be expected to have, or who require professional
assistance with their research. In addition to providing materials, libraries also provide the
services of librarians who are experts at finding and organizing information and at interpreting
information needs. Libraries often provide quiet areas for studying, and they also often offer
common areas to facilitate group study and collaboration. Libraries often provide public facilities
for access to their electronic resources and the Internet.
This software project is a library management software system with all the basic as well as some
innovative features for managing a library. It consists of a large database of various books available
in the library. It also lists various books issued to respective readers. The system keeps track of all
the books readily available and also the books that have been issued to various readers for the
time period for which the books have been issued. The system also handles books database. If the
reader needs a book, he can order the book request for home delivery by just submitting an online
form. Readers usually tend to forget the date to return their library books, so this system even
calculates fine depending on the expiry date. Thus this innovative library management system
provides enhanced library functionality for this modern world.
a) To build a system that can receive input and generate automatically output in easy way and
short time.
b) To build a monitoring system that is able to monitor and manage all library operations
efficiently.
c) Give an opportunity to librarians to reduce mistakes that always happen during manual method.
5
d) To store properly the library items in order to maintain their security.
e) To enter and preserve details of the various issues and keep a track on their returns.
This system basically has four types of modules that handle daily activities for the library :
By using library management system, the operation of borrowing and managing inventories is
paperless. This system provides a user-friendly data entry with dropdown button menu, list box
and checkbox in purpose to make the input entry easier to understand and use. It is also created
to ensure that the library items are stored properly in order to maintain their security.
This system will store all the books and members information that consist book numbers, book
titles, author names and racks to the system database. It also provides search function to help
students find the book by number of book. Search function will search through the books database
to look for the book and view where the book is situated.
For the administrator user, only librarians have access to view or edit data from the system
databases. Administrator user will handle administrative functions such as create new LMS user
account and decide the number of days allowed for the borrowed books. Users need to enter
correct password and user id before they can access to this function. From here, they can add,
delete or update the book and borrower database
Admin login: The system will be under sole control of the admin. Admin can add
or remove books from the system and also maintains records of the book available
and issued in the library. The admin can even update the books details if required.
6
User login: User has to first create an account in the system to gain access. User
can explore and search for the books he wants. He can place order for the books.
Tracking the user record: The system can track the period for which the book has
been issued to user and calculates fine if the book is not returned on time.
Quantity Update- The quantity is updated by the system depending on the
quantity ordered.
Fine calculation: If the user is unable to return the book, the system automatically
calculates the fine that the user has to pay for subsequent days.
View date info- The user can view the date when he has issued the book as well
as the expiry date of the book and can view fine to be paid that is calculated by
the system.
Online search and order form: The user may order the book online. The system
provides a search option where user can order online.
Credit card payment: User can make payment via credit card.
Advantages:
The system excludes the use of paper work by managing all the records
electronically.
Administrator doesn't have to keep a manual track of the users
Also the system calculates the fine levied on user so admin just have to create bill
and not manually calculate.
Admin can keep updating the system by providing the new books arrival in library
and their availability thus user need not to go to library for issuing purpose. He
may order it online through this system.
Thus, it saves human efforts and resources.
7
Disadvantages:
Applications:
8
2. SDLC Model :-
The software development life cycle (SDLC) is a framework defining tasks performed at each step
in the software development process. SDLC is a structure followed by a development team within
the software organization. It consists of a detailed plan describing how to develop, maintain and
replace specific software. The life cycle defines a methodology for improving the quality of
software and the overall development process.
The software development life cycle is also known as the software development process.
An effective System Development Life Cycle (SDLC) should result in a high quality system that
meets customer expectations, reaches completion within time and cost evaluations, and works
effectively and efficiently in the current and planned Information Technology infrastructure.
System Development Life Cycle (SDLC) is a conceptual model which includes policies and
procedures for developing or altering systems throughout their life cycles.
9
SDLC is used by analysts to develop an information system. SDLC includes the following activities
−
Requirements
Design
Implementation
Testing
Deployment
Operations
Maintenance
Phases of SDLC:-
Systems Development Life Cycle is a systematic approach which explicitly breaks down the work
into phases that are required to implement either new or modified Information System.
During this phase, threats, constraints, integration and security of system are also
considered.
A feasibility report for the entire project is created at the end of this phase.
Examine the information needs of end-user and enhances the system goal.
System Design:-
Includes the design of application, network, databases, user interfaces, and system
interfaces.
Transform the SRS document into logical structure, which contains detailed and complete
set of specifications that can be implemented in a programming language.
Review the proposed design. Ensure that the final design must meet the requirements
stated in SRS document.
Finally, prepare a design document which will be used during next phases.
Implementation:-
Implement the design into source code through coding.
Combine all the modules together into training environment that detects errors and
defects.
11
A test report which contains errors is prepared through test plan that includes test related
tasks such as test case generation, testing criteria, and resource allocation for testing.
Integrate the information system into its environment and install the new system.
Maintenance/Support:-
Include all the activities such as phone support or physical on-site support for users that is
required once the system is installing.
Implement the changes that software might undergo over a period of time, or implement
any new requirements after the software is deployed at the customer location.
It also includes handling the residual errors and resolve any issues that may exist in the
system even after the testing phase.
Maintenance and support may be needed for a longer time for large systems and for a short
time for smaller systems.=
OperatingEnvironment:-
• Operating System : Microsoft Windows
• Network connection that connects user’s computer to local intranet server
• Database: MS-Access
• Hardware: P4 processor, Mouse, Keyboard and Monitor.
Waterfall Model
The Waterfall Model was first Process Model to be introduced. It is also referred to as a linear-
sequential life cycle model. It is very simple to understand and use. In a waterfall model, each
phase must be completed fully before the next phase can begin. This type of software
development model is basically used for the project which is small and there are no uncertain
requirements.
At the end of each phase, a review takes place to determine if the project is on the right path and
whether or not to continue or discard the project.
12
In this model software testing starts only after the development is complete. In waterfall model
phases do not overlap.
In this, software engineer understand the nature of a program to be built, he must understand the
information domain for the software as well as required function, behaviour, performance and
interface. Requirements for both the system and the software are documented and reviewed with
the customer.
13
Design
It has four distinct attributes of a program: data structure, software architecture, interface
representations and procedural detail. It is documented and becomes part of the software.
Code generation
Design must be translated into a machine readable form which is done by code generation.
Testing
It focuses on the logical internals of the software, ensuring that all the statements have been tested,
and on the functional externals; that is conducting test to uncover errors and ensure that defined
input will produce actual results.
The Software model used is LINEAR SEQUENTIAL MODEL because of the following reasons:-
Project being small demands a systematic and sequential approach to software development
i.e. system engineering, software requirement analysis, design, code generation, testing and
support occur in sequence.
All requirements for the project have been explicitly stated at the beginning. There is very little
scope of customers’ deviation from current requirements, coding and testing after detailed
analysis is much easy.
Structure is less complex and less innovative with less need of iteration.
14
Support
This is a phase when software will undoubtedly undergo change after it is delivered to the
customer. Change will occur because errors have been encountered, because the software must be
adapted to accommodate changes in its external environment, or because the customer requires
functional or performance enhancements. Software support/maintenance reapplies each of the
preceding phases to an existing program rather than a new one.
15
3. Software Requirement Specification(SRS)
Product Description
Library Management System is a computerized system which can helps user (librarian) to
manage the library daily activity in electronic format. It reduces the risk of paper work
such as file lost, file damaged and time-consuming. It can help user to manage the
transaction or record more effectively and time-saving.
Problem Statement
The problem occurred before having computerized system includes:
File lost
When no computerizes system is implemented, the file always lost because of
human and environment. Sometimes librarian didn’t keep the record to its original
place because of a lot member queue up to borrow books. After that the file was
missing due to messy environment.
PRODUCT DESCRIPTION:
Library Management System is a computerized system which helps
user(librarian) to manage the library daily activity in electronic format. It
reduces the risk of paper work such as file lost, file damaged and time
consuming.
It can help user to manage the transaction or record more effectively and
time- saving.
PROBLEM STATEMENT:
The problem occurred before having computerized system includes:
File lost
When computerized system is not implemented file is always lost because of
16
human environment.Some times due to some human error there may be a loss
of records.
File damaged When a computerized system is not there file is always lost due
to some accdent like spilling of water by some member on file
accidentally.Besides some natural disaster like floods or fires may also
damage the files.
17
college as well as in nearby colleges
Lecture Notes
Teacher have a facility to upload lectures notes in a pdf file having size not more
than 10mb.
RELIABILITY REQUIREMENT
The system should accurately performs member registration ,member
validation , report generation, book transaction and search
USABILITY REQUIREMENT
The system is designed for a user friendly environment so that student and staff
of library can perform the various tasks easily and in an effective way.
ORGANIZATIONAL REQUIREMENT
IMPLEMENTATION REQUIREMNTS
In implementing whole system it uses html in front end with php as server side
scripting language which will be used for database connectivity and the backend
ie the database part is developed using mysql.
DELIVERY REQUIREMENTS
The whole system is expected to be delivered in six months of time with a
weekly evaluation by the project guide.
18
2.1.1.2 FUNCTIONAL REQUIREMENTS
1. NORMAL USER
Functional requirements
-user id is provided when they register
-The system must only allow user with valid id and password to enter the system
-The system performs authorization process which decides what user level can acess to.
-The user must be able to logout after they finished using system.
Functional requirements
-System must be able to verify information
-System must be able to delete information if information is wrong
19
- System must be able to not allow two books having same book id.
SEARCH BOOK
DESCRIPTION OF FEATURE
This feature is found in book maintenance part . we can search book based on book id
, book name , publication or by author name.
Functional requirements
- System must be able to search the database based on select search type
- System must be able to filter book based on keyword enterd
- System must be able to show the filtered book in table view
DESCRIPTION OF FEATURE
This feature allows to issue and return books and also view reports of book issued.
Functional requirements
-System must be able to enter issue information in database.
-System must be able to update number of books.
- System must be able to search if book is available or not before issuing books
-System should be able to enter issue and return date information
DESCRIPTION OF FEATURE
This feature allows teacher and student to add information about various workshops being
conducted in college and colleges nearby.
20
functional requirements
-System should be able to add detailed information about events .
-System should be able to display information on notice board available in the homepage
of site
i. Existing system does not have any facility of teachers login or student
login where as proposed system will have a facility of student login as
21
well as teacher’s login
ii. Existing system does not have a facility of online reservation of books
whereas proposed system has a facility of online reservation of books
iii. Existing system does not have any facility of online notice board where
description of workshops happening in our college as well as nearby
colleges is being provided.
iv. Existing system does not has any option of lectures notes uploaded by
teachers whereas proposed system will have this facility
v. Existing system does not have any facility to generate student reports as
well book issue reports whereas proposed system provides librarian with
a tool to generate reports
vi. Existing system does not has any facility for book request and
sugeestions where as in proposed system after logging in to their
accounts student can request books as well as provide suggestions to
improve library
22
2.3 EXISTING VS PROPOSED SYSTEM
vii. Existing system does not have any facility of teachers login or student
login where as proposed system will have a facility of student login as
well as teacher’s login
viii. Existing system does not have a facility of online reservation of books
whereas proposed system has a facility of online reservation of books
ix. Existing system does not have any facility of online notice board where
description of workshops happening in our college as well as nearby
colleges is being provided.
x. Existing system does not has any option of lectures notes uploaded by
teachers whereas proposed system will have this facility
xi. Existing system does not have any facility to generate student reports as
well book issue reports whereas proposed system provides librarian with
a tool to generate reports
xii. Existing system does not has any facility for book request and
sugeestions where as in proposed system after logging in to their
accounts student can request books as well as provide suggestions to
improve library
23
represent empty elements and so are unpaired, for example <img>. The first tag
in a pair is the start tag, and the second tag is the end tag (they are also called
opening tags and closing tags). In between these tags web designers can add text,
further tags, comments and other types of text-based content. The purpose of a
web browser is to read HTML documents and compose them into visible or
audible web pages. The browser does not display the HTML tags, but uses the
tags to interpret the content of the page.HTML elements form the building blocks
of all websites. HTML allows images and objects to be embedded and can be used
to create interactive forms. It provides a means to create structured
documents by denoting structural semantics for text such as headings,
paragraphs, lists, links, quotes and other items. It can embed scripts written in
languages such as JavaScript which affect the behavior of HTML web pages.
CSS- Cascading Style Sheets (CSS) is a style sheet language used for
describing the look and formatting of a document written in a markup
language. While most often used to style web pages and interfaces written in
HTML and XHTML, the language can be applied to any kind
of XML document, including plain XML, SVG and XUL. CSS is a cornerstone
specification of the web and almost all web pages use CSS style sheets to describe
their presentation.CSS is designed primarily to enable the separation of
document content from document presentation, including elements such as the
layout, colors, and fonts. This separation can improve content accessibility,
provide more flexibility and control in the specification
24
apply if more than one rule matches against a particular element. In this so-called
cascade, priorities or weights are calculated and assigned to rules, so that the
results are predictable.
MYSQL- MySQL ("My S-Q-L", officially, but also called "My Sequel") is (as of July
2013) the world's second most widely used open-source relational database
management system (RDBMS). It is named after co-founder Michael Widenius
daughter, My. The SQL phrase stands for Structured Query Language. The MySQL
development project has made its source code available under the terms of the GNU
General Public License, as well as under a variety
of proprietary agreements. MySQL was owned and sponsored by a single for- profit
firm, the Swedish company MySQL AB, now owned by Oracle Corporation
.MySQL is a popular choice of database for use in web applications, and is a central
component of the widely used LAMP open source web application software stack (and
other 'AMP' stacks). LAMP is an acronym for "Linux, Apache,
MySQL, Perl/PHP/Python." Free-software-open source projects that require a full-
featured database management system often use MySQL. For commercial use,
several paid editions are available, and offer additional functionality.
26
4.RISK MANAGEMENT: IT’S IMPLICATIONS FOR
LIBRARY MANAGEMENT
Abstract
Collection management
Scholarly communication
Consortia
Preservation
INTRODUCTION
Libraries in general are experiencing unprecedented demands for change both
in the way they work and the information and materials they provide.
Librarians have tended to greet the need for change with feelings of insecurity
and visions of ongoing chaos. The vitality and relevance of academic libraries
are increasingly at risk. Faculty and students on / off campuses expect more
from the library due to the growth of information available through electronic
resources. As the changes in higher education are moving, librarians are
responding to these systematic changes in the academic environment. Changing
roles for librarians, as collaborators, integrators, instructional designers and
information consultants and models of information delivery necessitated not
only increased relation between faculty-librarian contacts, but also dramatic
changes in the nature of faculty-librarian relationships(5). The need for
understanding of different techniques in procuring content, management of
28
content, rights of access, collection development policies, etc with risk
associated with managing different activities in association with other
librarians, publishers, system specialists, students and faculty and others are
discussed in this article.
DEFINITION
Risk management is the process of measuring or assessing risk and then
developing strategies to manage the risk.
1. AREAS OF RISK MANAGEMENT
The different areas, where risk management can occur in library environment
are:
Assessing the institution / organizations requirement
Content development
Scholarly communication
Consortium arrangements
Preservation decisions
29
tasks:
(1) identification of concerns,.
(2) identification of risks.
(3) evaluation of the risks as to likelihood and consequences.
(4) assessment of options for accommodating the risks.
(5) prioritization of risk management efforts.
(6) development of risk management plans.
Librarians try to assure for information supply as per the user demand by
having collection development policy by allocating budgets in institutional
priorities. If the library collections does not meet user needs and expectations,
can lead to a spiral of loss of funding; resulting in a decrease in usefulness,
followed by further erosion of fiscal support and the decline in the quality of the
collection in the short run. Due to this, there is a risk for decline in budget
allotment or the budget allotted may be diverted to other departments (2).
Content Management
For many reasons libraries do not have the same degree of control over the
content in digital resources. Providers of digital information resources are able to
add content or more often, delete content from their products without their
30
customers’ consent. Libraries are frequently notified after the fact or given very
little advance notice of these actions. On occasion, no notification is issued;
libraries and their users simply discover the content change. Unplanned content
changes affect the collection’s reliability and integrity and content removal may
pose risks to the library profession’s commitment. (1)
Legal risks can arise in relation to the access to, use and dissemination of data
and information. These risks increase with on-line material. Proprietary rights
apply to software, databases, written works and other original materials.
Information used, updated and circulated should be accurate, both in order to
avoid the risks of liability for defamation or for illegal content and for any data
protection compliance. Also the risk related to CD-ROM network, like maximum
access, full text download, network licence, etc. are to be considered.
Migration
Risks associated with the general collection. These risks include the
presence or absence of institutional support, funding, system hardware
and software, and the staff to manage the archive. These are essential
components of a digital archive. The collection, and the users who use the
collection, will be affected to some degree by a migration of data. Legal and
policy issues associated with digital information will introduce additional
risks.
Risks associated with the data file format. These include the internal
structural elements of the file that are subject to modification.
31
software may or may not produce the intended result; conversion errors
may be gross or subtle.
4. SCHOLARLY COMMUNICATION
a) Publishing
produced content.
b) E-Journals
32
of the risks to the libraries by not providing the content without any
interruption. Publishers do not have the rights to republish electronically the
content they originally published in paper. Less frequently, publishers remove
content in response to research errors, plagiarism, and fraud. This practice is
contrary to traditional scholarly communication practice and it violates the
library’s commitment to preserve the historical record with all its flaws.
Disaggregation, or the removal of content from an aggregated database by its
creator or owner, occurs for a variety of reasons—often economic but
sometimes philosophical in nature. This can transform an aggregated database
from a key, to a marginal, resource and, since libraries are rarely compensated
for content removal, it can also pose financial challenges. If the lost content is
an important resource for its users the library may have to resubscribe to it
from another, generally from more expensive source (2).
5. CONSORTIA
a) Big Deals
Libraries pursue ‘‘Big Deals’’ i.e., license agreements in which access is gained
to all of a publisher’s output for a price based on current subscriptions—they
acquire more content for less money in the short run, but they risk weakening
‘‘the power of librarians and consumers to influence scholarly communication
systems in the future’’ It is worth noting that the pursuit of more information or
more publications for less money takes place in most consortia purchases,
many of which would not necessarily be considered ‘‘Big Deals.’’
33
b) License Agreements
Publishers and content providers often require libraries to sign agreements that
restrict the libraries’ ability to use their products for interlibrary loan, as well as
the libraries’ rights to preserve and archive parts of them. Further, by using
digital rights management systems, they enforce use restrictions, such as on
copying and downloading, which are more stringent than those that copyright
law would impose. Also they create digital fences that enclose not only their
works but also large portions of the public domain.
c) Co-ordination
The librarian is serious and concern about the ownership of content. Publishers
suddenly raise prices due to inflation and thereby threaten one of the
profession’s core values, equal access to information. They can also affect the
usability of digital content due to changes in the interface through which
acquired content is accessed and/or the way acquired and existing content are
merged or juxtaposed(2).
7. PRESERVATION
34
Preservation of information in all formats is increasingly an emphasis of libraries
and allow for ongoing use. It should evolve as a distributed system by interacting
with large national coordinating organizations; preservation guidelines should
follow the data processing and filtering at all levels. The lack of any long- term
technical solution to the problem of digital preservation limits to the efficacy of
critical problems with substantial new investments, with allocating new
responsibilities and assessing costs for a nonexistent process is one of the risks
to the librarians (7).
The staffs who are already working are to be retrained to update their
knowledge and may have to recruit new entrants with better / higher
qualifications. The risk involved here is the willingness to attend the training
and risk of taking new staff, by thinking that they will be better than the existing
ones.
Use of Technology
For accessing the organization, the proper use of website, by having sufficient
connectivity and systems is one of the risks. People may have different type of
system, and if there is a change in software and formats for access, download
there is a risk. The type of users also suddenly changes, in case the organization
introduces new courses, the need for updating or modifying the content on the
website is one of the risks.
The strategies for managing the risks are explained for the following:
35
By having discussions, group meetings, etc, the information requirements
of users, faculty and students can be found;
For collecting the resources from external sources, resource sharing and
access to the databases along with Internet;
Hiring staff with competitive skills and also develop skills for the existing
staff, by providing in- house training; and
36
CONCLUSION
All risk analysis activities presented to this point have a single goal-to assist the project team in developing
a strategy for dealing with risk.
Issues:
Risk avoidance
Risk monitoring
Risk management and contingency planning
A Reactive Strategy monitors the risk project for likely risk and set aside resources to deal with them,
should they become actual problems. Software team does nothing about risks until something goes wrong.
Proactive
A Proactive strategy begins long before technical work is initiated. Potential risks are identified, their
probability impact is assessed, and they are ranked by importance.
38
5. System Analysis
Current problems
A number of problems have been identified with the current system, including:
• The catalogue is often out-of-date; updating is tedious and only takes place when the staff have
time.
• The processes for recording loans, returns and recalls are time consuming.
• Searching through the catalogue, borrower and loan records is often long and laborious. Both
borrowers and library staff find this very annoying.
• Fines have to be calculated manually. This takes time and is error prone, resulting in arguments
between borrowers and staff.
• Finding out whether a book is actually available for loan is tedious, and often only possible by
looking for it on the shelve.
• A feature Of group chat where students can discuss various issues of engineering can be added
to this project.
39
• Data encryption can be added
According to the current situation of small and medium-sized library carried out feasibility
analysis and the actual demand. The library's basic business processes are described. Combining
with the knowledge of library and database technology to design each module. The system using
the Windows XP/Windows 6.0 as system platform, using Visual basic 6.0 as a front-end application
development tools, Microsoft SQL Server 2000 as the background database. Through to the small
and medium-sized books management system management system requirements analysis,
functional module division, database model analysis, designed the database structure and
application. Due to the use of computer management, improved the traditional manual
management way, improve the management level.
ANALYSIS MODEL
Software analysis and design includes all activities, which help the transformation of requirement
specification into implementation. Requirement specifications specify all functional and non-
functional expectations from the software. These requirement specifications come in the shape
of human readable and understandable documents, to which a computer has nothing to do.
Software analysis and design is the intermediate stage, which helps human-readable
requirements to be transformed into actual code.
Let us see few analysis and design tools used by software designers:
Logical DFD - This type of DFD concentrates on the system process, and flow of data in
the system.For example in a Banking software system, how data is moved between
different entities.
40
Physical DFD - This type of DFD shows how the data flow is actually implemented in the
system. It is more specific and close to the implementation.
DFD Components
DFD can represent Source, destination, storage and flow of data using the following set of
components -
Entities - Entities are source and destination of information data. Entities are represented
by a rectangles with their respective names.
Process - Activities and action taken on the data are represented by Circle or Round-
edged rectangles.
Data Storage - There are two variants of data storage - it can either be represented as a
rectangle with absence of both smaller sides or as an open-sided rectangle with only one
side missing.
Data Flow - Movement of data is shown by pointed arrows. Data movement is shown
from the base of arrow as its source towards head of the arrow as destination.
41
6. System Design
TABLE DESIGN
42
Issue table to keep track of books issued
43
returndate DATE NULL
44
Email VARCHAR(255) NULL
TEACHER
DATABASE
45
ENTER
CHECK
TEACHER
URL
IF VALID
PAGE
After entering to the home page of the website , teacher can choose the TEACHER LOGIN
option where they are asked to enter username & password , and if he/she is a valid user
then a teacher login page will be displayed.
STUDENT DATABSE
ENTER
CHECK
STUDENT
URL
IF VALID
PAGE
After entering to the home page of the website , student can choose the STUDENT LOGIN option
where they are asked To enter username & password , and if he/sheis a valid user then a student
login page will be displayed.
46
DATA FLOW DIAGRAM FOR BOOK ISSUE
LOGIN
DATABASE
IF NO.
ENTER IF UPDATE MESSAGE
OF
LOGIN AVBL BOOK
NO. “BOOK
OF
ISSUED
It is a 2nd level Data Flow Diagram where after entering STUDENT LOGIN page he/she can
select a book issue option where after entering the book detail, he/she can select the book
issue option and if the maximum no of books issued limit is not crossed then a request
will be sent to the librarian who will approve the book issue.
47
DATA FLOW DIAGRAM FOR BOOK SEARCH
HOME
BOOK
DATABASE
After the home page login there will be an option of the book search where after entering book
detail like author name, publication, book name ,etc book details will be displayed.
ADMIN
ADMIN STUDENT
DATABASE DATABASE
48
7. Software Architecture Document
Introduction
This document provides a comprehensive architectural overview of the system, using a
number of different architectural views to depict different aspects of the system. It is
intended to capture and convey the significant architectural decisions which have been made
on the system.
Scope
Architectural Representation
This section describes what software architecture is for the current system, and how it is represented.
49
AddNewStudent
(from csi518team) UpdateDeleteStudent
(from csi518team)
AddBook
(from csi518team)
UpdateDeleteBook
(from csi518team)
SearchBook
(from csi518team)
Librarian
(from csi518team)
CheckInBook
(from csi518team)
CheckOutBook
(from csi518team)
PayLateFee
(from csi518team)
ViewStudentDetails ViewBookDetail
(from csi518team) (from csi518team)
50
Architectural Goals and Constraints
This section describes the software requirements and objectives that have some significant
impact on the architecture.
- Usability
- Stability
- Platform independence
Use-Case View
This section lists use cases or scenarios from the use-case model which depict significant,
central functionality of the final system, or if they have a large architectural coverage.
Use-Case Realizations
Add New Student:
InsertStudentRecord
ViewStudentDetails VerifyStudent
Librarian
Failure
Failure
ViewStudentDetails VerifyStudent
Librarian
UpdateDeleteStudentRecord
51
Add a Book
Failure
ViewBookDetail
Librarian
AddBookRecord
Failure
ViewBookDetail
Librarian
UpdateDeleteBookRecord
Search Book
ViewBookDetail
Success
EnterSearchParameters DispalySearchResult
Librarian
AddToMyList
<<extends>> Failure
ShowMyList CheckInBook
<<extends>>
CheckOutBook
52
Check-In Book
<<extends>>
Success PayLateFee
EnterStudentID
Librarian
Failure
Check-out Book
Success
EnterBookCallNo EnterStudentID
Librarian
Failure
53
8. UML Design for Library Management System
Use-Case Diagrams for Library Management System
Member
Administrator
Librarian
Guest
Login
54
Use Case diagram for Library Management System
Login
View Books
Reserve Books
Member
Librarian
Search Books
Issue Books
Return Books
Guest Add/Remove
Books
Add/Remove
Members
55
Use Case Scenarios
56
Use Case: View User Details
Introduction: To see the details of the registered user
& the books currently borrowed from
the library.
Actors: Member
Special Requirements:
Relationships: The base case includes checking the
database case.
The base case includes retrieve data case.
57
Use Case: View Books
Introduction: To display the details, when a member,
guest or administrator wants to see the
details on the available books.
Actors: Administrator
guest Member
Special Requirements:
Relationships: The base case includes checking the
database case.
The base case includes retrieve data
case.
58
Use Case: Reserve Books
Introduction: User can reserve a book by inputting the
relevant details & the librarian can also
reserve a book for a member.
Actors: Librarian
Member
59
Relationships: The base case includes checking the
database case.
The base case includesvalidating
reservation case.
The base case includes update database
case.
60
Use Case: Search Books
Introduction: Member or guest can search for a
particular book in the book library by
book name or category.
Actors: Member
Guest
61
Use Case: Issue Books
Introduction: This use case describes the process of
issuing a certain book for a member by
the librarian.
Actors: Librarian
Member
62
Use Case: Return Books
Introduction: This use case describes the process of
issuing a certain book for a member by
the librarian.
Actors: Librarian
Member
63
Use Case: View Members
Actors: Administrator
guest Member
Special Requirements:
Relationships: The base case includes checking the
database case.
The base case includes retrieve data case.
64
Activity Diagrams for Library Management System
Case : Login
View details
Check whether to print details
If needs, then proceed to print step
Else exit the window.
67
Display the member details
Check whether to print details
If needs, proceed to print step
Else exit the window.
68
Activity diagrams for the Use Cases
Login
Member Id Password
[Both filled]
[Incorrect inputs]
Display User
interface
69
Activity Diagram for Case : View User Details
[Don’t Print]
70
Activity Diagram for Case : View Books
User Type
Display Results
[Don’t Print]
71
Activity Diagram for Case : Reserve Books
Reserve Books
Member Id Book Id
[Both filled]
[Incorrect inputs]
[Correct inputs]
Prompt
error
Reserve book
Confirm reservation
Update
Database
72
User Type
Guest Membe
r
Search Type
By Name By Category
Search Data
73
Activity Diagram for Case : Return Books
Return Books
Member Id Book Id
[Both filled]
[Incorrect inputs]
[Correct inputs]
Prompt
error
Return book
Confirm return
Update
Database
74
Activity Diagram for Case : View Members
User Type
Display Results
[Don’t Print]
75
Preferred Action
[Invalid Id]
Update Modification
76
Class Diagram for Library Management System
* * Administrator
1 1
Verifylogin()
ViewBooks()
ViewMembers()
Return() NewBook()
Issue() RemBook()
Log
NewUser()
RemUser()
RemBook() Verifylogin
1
()
*
Member
Books
Guest Verifylogin()
ViewBooks()
Return() MyDetails()
Issue() Search()
Reserve()
Search()
77
9. Software design Model
. MODULE DESCRIPTION
Admin Module
78
The following module contains various facilities like student validation, teacher
registration, book addition, and report generation.
Student Module
The following module contains various facilities like student registration, student
login, online book reservation, and event addition. Any student if at any moment
forgets his password he can retrieve it from forgot password option.
Teacher Module
79
The following module contains various facilities like teacher login, suggestions, and
event addition. Further any teacher if at any moment forgets his/her password
he/she can retrieve it from ‘forgot password’ option.
Book Module
The following module contains various facilities like add new book and search book. In the ‘add
new book’ section if any new book comes in the library then the librarian can add its specifications.
Similarly if the user wants to search for a specific book then he/she can use search book option to
do it.
80
Book Transaction Module
The following module contains various facilities like issue book, return book and check
reservation.
Report Module
The following module contains various facilities like student report, teacher report, book
report, and transaction report.
81
10.SYSTEM TESTING
The aim of the system testing process was to determine all defects in our project .The
program was subjected to a set of test inputs and various observations were made and based
on these observations it will be decided whether the program behaves as expected or not.
Our Project went through two levels of testing
1.Unit testing
2.integration testing
UNIT TESTING
Unit testing is undertaken when a module has been created and succesfully reviewed .In
order to test a single module we need to provide a complete environment ie besides the
module we would require
The procedures belonging to other modules that the module under test calls
Testing admin login form-This form is used for log in of administrator of the
system.In this we enter the username and password if both are correct
administration page will open other wise if any of data is wrong it will get
redirected back to the login page and again ask for username and password
Student account addition- In this section the admin can verify student
details from student academinc info and then only add student details to
main library database it contains add and delete buttons if user click add
button data will be added to student database and if he clicks delete button
82
the student data will be deleted
Book Addition- Admin can enter details of book and can add the details to
the main book table also he can view the books requests .
2. Test for Student login module
Test for Student login Form-This form is used for log in of Student .In this
we enter thelibraryid, username and password if all these are correct
student login page will open other wise if any of data is wrong it will get
redirected back to the login page and again ask for libraryid, username
and password.
Test for account creation- This form is used for new account creation
when student does not fill the form completely it asks again to fill the
whole form when he fill the form fully it gets redirected to page which
show waiting for conformation message as his data will be only added
by administrator after verification.
3. Test for teacher login module-
Test for teacher login form- This form is used for logg in of teacher .In this
we enter the username and password if all these are correct teacher login
page will open other wise if any of data is wrong it will get redirected back
to the login page and again ask for username and password.
INTEGRATION TESTING
In this type of testing we test various integration of the project module by providing the input
.The primary objective is to test the module interfaces in order to ensure that no errors are
occurring when one module invokes the other module.
83
11. CONCLUSION & FUTURE SCOPE
84
12. REFERENCS
https://www.academia.edu/10240564/Library_Management_System_I_LIBRA
RY_MANAGEMENT_SYSTEM
http://soft-project.blogspot.com/2009/01/library-management-system.html
https://www.scribd.com/document/53130051/library-management-system-
final
https://www.scribd.com/doc/13850152/Library-Management-System
https://ieeexplore.ieee.org/document/6405716
85