Library Management System
Library Management System
Library Management System
1. INTRODUCTION
2010-2011
2010-2011
2010-2011
2010-2011
Majority of libraries are dependent on paper-work which turns out to be very inefficient,
and data backup is very difficult and tedious
Users or members in such systems either become dependent on the librarian when they
enquire about the books existing in the library or find themselves helpless when they try
to search the library for their book of interest unknown of even its availability.
Present day systems involve the users very little in the entire process, and also do not
consider the user wants for newer books etc. This non-involvement of end users, also
mean that either they have to manually ask the librarian whether a particular book is
already issued by some other user or they have to browse through the library.
They are also unable to gather the information about user interests and books
that aremore popular than others
2010-2011
The purpose of Library Management Pro system is to provide a medium for the public
libraries to computerize their entire functioning and would contribute as a first step in
digitalizing their libraries.
As till now in India, public libraries (medium and small scale) had their entire records
on paper which again required maintenance and the problem of finding relevant information
proved to be a herculean task. Even if the required information was found it was usually at cost
of much valuable time.
Library Management Pro would not only simplify this process but also speedup the entire
functioning of the library. It will also contribute towards increasing the efficiency of the library
as a whole, right from the data entry to maintaining the historical records.
One major purpose is to provide user or the library members the opportunity to not only
search through the books but to reserve books that are issued by other users and also request
newer books.
From our past experiences we have seen that manual management is difficult and
moreover inefficient. Thus, we have designed a Computer based Library Management
System. This system helps us to carry out all the tasks related to library in an efficient manner. It
takes lesser time for solving our problems and is much easier and safer.
Through this system we can find a better management scheme. The system we have
designed gives correct solutions of our problems in less time. Need is the mother of invention, so
there was the need of designing such a system for the management of library tasks which was all
the more a very tedious task for a man to manage. Earlier it was very difficult for man to
maintain books and the records related to those books. But with the help of this system, we can
easily issue and return books, add members and books in our library as well as we can modify
the details of any book or the concerned member (if required). We can also display the records
2010-2011
2010-2011
2. Proposed System
2010-2011
2. Proposed System
Proposed system is an automated Library Management System. Through our software
user can add members, add books, search members, search books, update information, edit
information, borrow and return books in quick time. Our proposed system has the following
advantages.
All the manual difficulties in managing the Library have been rectified by implementing
Computerization.
2010-2011
Processor
(Recommended: Pentium IV-class processor, 866 MHz)
Windows 2000 Professional- 128 MB or more
2.
RAM
Windows 2000 Server- 128 MB or more
Available
Approx.600 MB or more on system drive,
Hard-disk space
5 GB installation drive
3.
S/W
50 MB on system drive
Hard-disk space
4.
Operating System
Windows XP
5.
Supporting S/W
CD-Rom or DVD
Optional(Recommended)
6.
Rom Drive
7.
Video
8.
Mouse
9.
2010-2011
Environment
1024X768, 32 bit
Ps/2 mouse
No Need
10
Printer
11.
Monitor
12.
Floppy disk
2010-2011
11
2010-2011
12
RETURN OF BOOKS:
Any person can return the issue of books.
The information is saved and the corresponding updating take place in database.
QUERY PROCESSING:
Availability of a particular book.
Check the books whom it to be issued.
Search the books also with the Book Code.
2010-2011
13
3. Analysis
2010-2011
14
Peeter Chen developed ERDs in 1976. Since then Charles Bachman and James Martin have
added some slight refinements to the basic ERD principles
Entity
An entity is an object or concept about which you want to store information.
Entity
Weak Entity
A weak entity is an entity that must defined by a foreign key relationship with another entity as it
cannot
be
uniquely
identified
by
its
own
attributes
alone.
Entity
2010-2011
15
Key attribute
A key attribute is the unique, distinguishing characteristic of the entity. For example, an
employee's social security number might be the employee's key attribute.
Attribute
Multivalued attribute
A multivalve attribute can have more than one value. For example, an employee entity can have
multiple skill values.
Attribute
Derived attribute
A derived attribute is based on another attribute. For example, an employee's monthly salary is
based on the employee's annual salary.
Attribute
Relationships
Relationships illustrate how two entities share information in the database structure.
Learn
how
to
draw
relationships:
First, connect the two entities, and then drop the relationship notation on the line.
2010-2011
16
Relationships
2. Arrows representing the data flows, which can either, be electronic data or physical
items.
=Data flow
3. Circle or Rounded rectangles representing processes, which take data as input, do
something to it, and output it.
2010-2011
17
Or
2010-2011
= Data Source
18
A system flowchart is a diagram that describes the overall flow of control between
computer programs in a system
It is observed that programs and sub systems have complex interdependencies including
flow of data, flow of control and interaction with data stores.
For convenience of design, it is a good idea to segregate the inputs, processes, output and
files involved in the system into a tabular form before proceeding with a flowchart.
==
Progress Or Program.
= File or Database.
=
2010-2011
Document or Report.
19
= Connection between
component, an Arrow indicates flow.
2010-2011
20
2010-2011
21
2010-2011
22
Entity Relationship diagram constitute a technique for representing the logical structure
of database in a pictorial manner. In this the entities are isolated and the relationships between
them are defined. The data is the focal point of an Entity Relationship diagram.
Guidelines for drawing Entity Relationship diagram:
o Determine the entities.
o Generate a list of all potential entities.
o Determine the relationships between the entities.
o Develop individual Entity Relationship diagrams
o Develop an integrated Entity Relationship diagram.
o Define the attributes for each entity.
The attributes are shown within ovals. Attributes which represent primary keys are underlined.
2010-2011
23
24
A DFD is also known as a Bubble Chart. Its purpose is to classify system requirement and
identifying major transformation that will becomes programs in system design. The Data Flow
Diagram is a graphical model showing the inputs, processes, storage & outputs of a system
procedure in structure analysis.
Advantages of DFD:-
o Hence it requires the large number of iterations that often are required to arrive at the
most accurate & complete solution.
0 level Diagram
2010-2011
25
26
2010-2011
27
2010-2011
28
4. System Design
2010-2011
29
Input Design
Input design is the process of converting user-oriented input to a computer based format.
Input design is a part of overall system design, which requires very careful attention .Often the
collection of input data is the most expensive part of the system. The main objectives of the input
design are
Input Data:
The goal of designing input data is to make enter easy, logical and free from errors as
possible. The entering data entry operators need to know the allocated space for each field; field
sequence and which must match with that in the source document. The format in which the data
fields are entered should be given in the input form .Here data entry is online; it makes use of
processor that accepts commands and data from the operator through a key board. The input
required is analyzed by the processor. It is then accepted or rejected. Input stages include the
following processes.
Data Recording
Data Transcription
Data Conversion
Data Verification
Data Control
Data Transmission
Data Correction
2010-2011
30
External
Internal
Operational
Computerized
Interactive
Input files can exist in document form before being input to the computer. Input design is
rather complex since it involves procedures for capturing data as well as inputting it to the
computer.
OUTPUT DESIGN:-
Outputs from computer systems are required primarily to communicate the results of
processing to users. They are also used to provide a permanent copy of these result for latter
consultation .Computer output is the most important and direct source of information to the
users. Designing computer output should proceed in an organized well through out the manner.
The right output must be available for the people who find the system easy o use. The outputs
have been defined during the logical design stage. If not, they should defined at the beginning of
the output designing terms of types of output connect, format, response etc,
2010-2011
31
DATABASE DESIGN:The general theme behind a database is to handle information as an integrated whole. A
database is a collection of interrelated data stored with minimum redundancy to serve many users
quickly and effectively. After designing input and output, the analyst must concentrate on
database design or how data should be organized around user requirements. The general
objective is to make information access, easy quick, inexpensive and flexible for other users.
During database design the following objectives are concerned:
Controlled Redundancy
Data independence
Accurate and integrating
More information at low cost
Recovery from failure
Privacy and security
Performance
Ease of learning and use
2010-2011
32
Field Name
Data Type
BookCode
Text
BookName
Text
BookAuthor
Text
BookPrice
Text
IssuedTo
Text
Size
Primary Key
255
Yes
255
No
255
No
255
No
255
No
Registration
Sr.No
1
2
3
4
5
6
7
Field Name
Data Type
MemberNo
Text
FName
Text
LName
Text
Address
Text
MobileNo
Text
Gender
Text
Age
Text
Size
Primary Key
255
Yes
255
No
255
No
255
No
255
No
255
No
255
No
User1
Sr.No
1
2010-2011
Field Name
UserName
Data Type
Text
Size
255
Primary Key
Yes
33
2
3
4
5
6
7
8
Password
Text
Address
Text
PhoneNo
Text
Fname
Text
Lname
Text
IsAdmin
Text
Gender
Text
255
No
255
No
255
No
255
No
255
No
No
255
No
BookTrack
Sr.No
1
2
3
2010-2011
Field Name
Data Type
BookCode
Text
MemberNo
Text
IssueDate
Date/Time
Size
Primary Key
255
Yes
255
Yes
---
No
34
Type
BookCode
Text
Description
This Fields Store the Unique
Code of Book.
This Field Store the Name of
BookName
Text
Book.
This Field Store the Name of
BookAuthor
Text
Author of the Book.
This Field Store the price of
BookPrice
Text
Book.
This Field used to store Whether
IssuedTo
Text
this Issued or Not.
Type
MemberNo
Text
Description
This Fields Store the Unique
Member or Student ID Number.
This Field Store the First Name
FName
Text
of Member or Student.
This Field Store the Last Name
LName
Text
of Member or Student.
2010-2011
35
Text
Member or Student.
This Field Store the Contact
MobileNo
Text
Number of Member or Student.
This Field Store the Gender of
Gender
Text
Age
Text
Member or Student.
This Field Store the Age of
Member or Student.
Type
UserName
Text
Description
This fields store the user name of
Staff or Admin.
This fields store the password of
Password
Text
Staff or Admin.
This fields store the address of
Address
Text
Staff or Admin.
This fields store the contact
PhoneNo
Text
number of Staff or Admin.
This fields store the first name of
Fname
Text
Staff or Admin.
This fields store the last name of
Lname
Text
Staff or Admin.
This fields store the whether the
IsAdmin
Text
user is Admin or not
2010-2011
36
Text
Staff or Admin.
Type
BookCode
Text
Description
This Fields Store the Unique
Code of Book.
This Fields Store the Unique
MemberNo
Text
Member or Student ID Number.
This fields store the Date of book
IssueDate
Date/Time
issued.
2010-2011
37
Program Specification
Form No.
Form Name
Form Purpose
Input Table
Output Table
Validations
Form No.
Form Name
Form Purpose
2010-2011
Input Table
Output Table
Validations
38
2010-2011
Form No.
Form Name
Form Purpose
Input Table
Output Table
Validations
Form No.
Form Name
Form Purpose
Input Table
Output Table
Validations
39
2010-2011
Form No.
Form Name
Form Purpose
Input Table
Output Table
Validations
Form No.
Form Name
Form Purpose
Input Table
Output Table
Validations
40
2010-2011
Form No.
Form Name
Form Purpose
Input Table
Output Table
Validations
Form No.
Form Name
Form Purpose
Input Table
Output Table
Validations
41
2010-2011
Form No.
Form Name
Form Purpose
Input Table
Output Table
Validations
Form No.
10
Form Name
Form Purpose
Input Table
Output Table
Validations
42
2010-2011
Form No.
11
Form Name
Form Purpose
Input Table
Output Table
Validations
43
Add Book
Add
Member
Issue Book
Sea
Bo
Return Book
Save
Check
Is
Available
Return
Clear All
Add
Issue
Clear All
Close
Update
Clear All
Close
Clear All
Close
Remove
Close
2010-2011
44
Help
Exit
Help
Exit
2010-2011
45
Login Screen
2010-2011
46
Add User
2010-2011
47
Add Member
2010-2011
48
2010-2011
49
Issue Book
2010-2011
50
Return Book
2010-2011
51
Search Book
2010-2011
52
Remove Book
2010-2011
53
Remove Member
2010-2011
54
Help Counter
2010-2011
55
5. Testing Procedure
2010-2011
56
Is the menu bar displayed in the appropriate contested some system related features
included either in menus or tools Do pull -Down menu operation and Tool-bars work properly
Are all menu function and pull down sub function properly listed ; Is it possible to invoke each
menu function using a logical assumptions that if all parts of the system are correct, the goal will
be successfully achieved . In adequate testing or non-testing will leads to errors that may appear
few months later.
2) The effect of the system errors on files and records within the system.
The purpose of the system testing is to consider all the likely variations to which it will
be suggested and push the systems to limits.
The testing process focuses on the logical intervals of the software ensuring that all
statements have been tested and on functional interval is conducting tests to uncover
errors and ensure that defined input will produce actual results that agree with the
required results. Program level testing, modules level testing integrated and carried out.
There are two major type of testing they are:1) WHITE BOX TESTING.
2) BLACK BOX TESTING.
2010-2011
57
White box some times called "Glass box testing" is a test case design uses the control
structure of the procedural design to drive test case.
This testing methodology looks under the covers and into the subsystem of an
application. Whereas black-box testing concerns itself exclusively with the inputs and
outputs of an application, white-box testing enables you to see what is happening inside the
application. White box testing provides a degree of sophistication that is not
available with black-box testing as the tester is able to refer to and interact with the objects
that comprise an application rather than only having access to the user interface. An
example of a white-box system would be in-circuit testing where someone is looking at the
interconnections between each component and verifying that each internal connection is
working properly. Another example from a different field might be an auto-mechanic who
looks at the inner-workings of a car to ensure that all of the individual parts are working
correctly to ensure the car drives properly.
Using white box testing methods, the following tests where made on the system
All independent paths within a module have been exercised once. In our system, ensuring
that case was selected and executed checked all case structures. The bugs that were
prevailing in some part of the code where fixed.
All logical decisions were checked for the truth and falsity of the values.
2010-2011
58
Black box testing focuses on the functional requirements of the software. This is black
box testing enables the software engineering to derive a set of input conditions that will fully
exercise all functional requirements for a program. Black box testing is not an alternative to
white box testing rather it is complementary approach that is likely to uncover a different class of
errors that white box methods like..
1)
Interface errors
2)
3)
Performance errors
4)
This testing methodology looks at what are the available inputs for an application and
what the expected outputs are that should result from each input. It is not concerned with the
inner workings of the application, the process that the application undertakes to achieve a
particular output or any other internal aspect of the application that may be involved in the
transformation of an input into an output. Most black-box testing tools employ either coordinate
based interaction with the applications graphical user interface (GUI) or image recognition. An
Example of a black-box system would be a search engine you enter text that you want to
search for in the search bar, press Search and results are returned to you. In such
a case, you do not know or see the specific process that is being employed to obtain your
search results, you simply see that you provide an input a search term and you receive an
output your search results.
2010-2011
59
6. Output Screens
2010-2011
60
Report
2010-2011
61
7. Implementation
Procedure
2010-2011
62
There are several activities involved while implementing a new project they are
y
y
y
y
y
y
2010-2011
63
2010-2011
64
2010-2011
65
8. User Manual
2010-2011
66
2010-2011
67
2010-2011
68
This will lead to an exclusive implemented of CRM. The only reason for this technology
not being implemented in the current system is the high cost of taking permission for the
interactive voice software. As a result, institute might not be willing to purchase
2010-2011
69
10. Conclusion
2010-2011
70
Conclusion
Our project is only a humble venture to satisfy the needs in a library. Several user
friendly coding have also adopted. This package shall prove to be a powerful package in
satisfying all the requirements of the organization.
The objective of software planning is to provide a frame work that enables the manger to
make reasonable estimates made within a limited time frame at the beginning of the software
project and should be updated regularly as the project progresses. Last but not least it is no the
work that played the ways to success but ALMIGHTY.
2010-2011
71
11. Bibliography
2010-2011
72
BIBLIOGRAPHY:-
http://www.vbdotnethaven.com
http://www.startvbdornet.com
http://www.msn.microsoft.com
The Complete Reference Visual Basic.Net Jefrey R. Shapiro
2010-2011
73