SE Project Library Management System
SE Project Library Management System
PROJECT REPORT
Submitted to
Submitted by
Peshal KC[21788/075]
Kartik 2079
Mr. RidipKhanal
i
Tribhuvan University
Supervisor’s Recommendation
I hereby recommend that this project report prepared under my supervision by Peshal KC entitled
“Library Management System” in partial fulfillment of the requirements for the degree of Bachelor
of Science in Computer Science and Information Technology is recommended for the final
evaluation.
…………………
SIGNATURE
Mr. RidipKhanal
SUPERVISOR
Msc. CSIT, TU
Mechi Multiple Campus, Jhapa
2
Tribhuvan University
LETTER OF APPROVAL
This is to certify that this report prepared by PESHAL KC entitled “Library Management System”
in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer
Science and Information Technology has been evaluated. In our opinion it is satisfactory in the
scope and quality as a project for the required degree.
……………………………………… ………………………………………
3
Mr. RidipKhanal, MSc. CSIT, TU
……………………………………… ………………………………………
4
ABSTSRACT
Hence in the existing system for LIBRARY MANAGEMENT SYSTEM, the performance
evaluation system and the maintenance are done manually. The proposed system will maintain
all the information in a standard database and will be able to generate reports when necessary.
5
Table of Contents
1. Problem Statement..................................................................................................
2. Process Model
3. Project Scheduling
4. Timeline Chart
6. DFD Level 1
7. DFD Level 2
8. Data Dictionary
1. Introduction......................................................................................................................
1.1 Purpose...............................................................................................................
1.2 Scope................................................................................................................
1.3 Definitions................................................................................................
1.4 Overview............................................................................................
2. Project Description
2.1.5 Operations
6
2.1.6 Site Adaption Requirements
2.4 Constraints
3. Specific Requirements
3.2 Functions
3.6.1 Reliability
3.6.2 Availability
3.6.2 Security
3.6.3 Maintainability
3.6.4 Portability
13. ER Diagram
7
14. Data Design
18. Testing
1. PROBLEM STATEMENT
A college library management is a project that manages and stores books information
electronically according to student’s needs. The system helps both students and library manager
to keep a constant track of all the books available in the library. It allows both the admin and the
student to search for the desired book. It becomes necessary for colleges to keep a continuous
check on the books issued and returned and even calculate fine. This task if carried out manually
will be tedious and includes chances of mistakes. These errors are avoided by allowing the system
to keep track of information such as issue date, last date to return the book and even fine
information and thus there is no need to keep manual track of this information which thereby
avoids chances of mistakes.
Thus, this system reduces manual work to a great extent allows smooth flow of library activities
by removing chances of errors in the details.
2. Process Model
A process model for software engineering is chosen based upon: -
8
The process model, we have chosen to develop this software is a Linear Sequential Model
(Waterfall Model). Linear Sequential Model suggests a systematic, sequential approach to
software development that begins at the system level and progresses through analysis, design,
coding, testing and support.
Design: -
It has four distinct attributes of a program: data structure, software architecture, interface
representations and procedural detail. It is documented and becomes part of the software.
Code generation: -
Design must be translated into a machine-readable form which is done by code generation.
Testing: -
It focuses on the logical internals of the software, ensuring that all the statements have been tested,
and on the functional externals; that is conducting test to uncover errors and ensure that defined
input will produce actual results.
LINEAR SEQUENTIAL MODEL has been used because of the following reasons: -
It is relatively simple and easier to understand approach as compared to other models. The
requirements are well stated and understood before in hand. In this model we have to complete
one stage before proceeding to next. So, we have clearly defined stages and well understood
milestones. The advancement in program does not need to be checked upon by the customer during
the process. So, this model does not create problem. The requirements are fixed and work can
proceed to completion in a linear manner. The model provides a structural approach.
3. TIMELINE CHART
9
January February March April
WORK TASKS
W1 W2 W3 W4 W1 W2 W3 W4 W1 W2 W3 W4 W1 W2 W3 W4
Problem
Statement
Software
process model
Software
Requirement
Specifications
Context level
diagram
DFD level1
DFD level2
Software
Metrics
COCOMO
Model
Risk Analysis
ER diagram
Data Design
Use Case
Diagram
Use Case
Description
Testing
10
4. SOFTWARE REQUIREMENT SPECIFICATIONS
1. INTRODUCTION
Library Management System is a comprehensive library management solution that is suitable for
both large and small libraries. Its flexible design enables Library Management System to be
installed in a range of Library organizations, ranging from public libraries, through to academic,
joint use and special libraries. This Library Management System Software is capable of handling
Books with equal ease and efficiency. This is a Windows-based Library Management System,
utilizing the latest advancements in the Information Technology to provide and improve Library
Services.
1.1 Purpose
The purpose of this project is to develop an application that will automate the whole procedure of
a library. The software that would be developed should have facilities like Add / Delete Members,
Add / Delete Books, Issue & Return. The application should be secured, as well as with limited
access. The main requirement of the project will be the ease of use, besides being the most efficient
and effective tool for the purpose. The application should be user friendly. It should be robust and
scalable. An automated solution would be very beneficial to the organization, as it would bring
structure to the whole process so that it can be traced for any kind of query. Also, an automated
solution will lead to optimal utilization of the available resources, reducing duplication of effort,
increasing efficiency and minimizing time-delays. Following are the main purpose of
computerization:
• To provide services to all the employees for issue, return & search etc. at one place.
1.2 Scope
For Members: -
• Facility for search of Books based on Access Number, Title, Author, Subject, Keyword.
11
• Facility for RENEWAL of Books.
• Automatic installation.
• Facility to ADD / DELETE Members, Library Staff & Books and Maintain an easy record
of all these.
UI - User Interface
1.4 Overview
The rest of the document deals with all the main features of this software. It not only describes
various functions but also gives details about how these functions are related to each other. Apart
from the data flow diagrams, the document also contains cost estimates for developing this system.
Various risks associated with the system have also been mentioned along with the ways to mitigate
them.
The timeline chart describing how the entire project was scheduled has been attached. At the end
a pseudo code for the customer management module” has been provided. A flow graph has been
generated corresponding to this module and test cases that were used to test the system have also
been mentioned.
12
2. PROJECT DESCRIPTION
• The existing system involves a lot of paper work and manual calculation. This has led to
inconsistency and inaccuracy in the maintenance of data.
• The data, which is stored on the paper only, may be lost, stolen or destroyed due to natural
calamity like fire and water.
• The existing system is sluggish and time-consuming causing inconvenience to library staff.
• Since there are many books related to different scopes thus it would be very difficult to
find a specific book, or edit the data of some book.
Hence the library management system is proposed with the following Product perspective:
• The computerization of the library system will reduce a lot of paperwork and hence the
load on the library staff.
• The machine performs all calculations for fines and all. Hence chances of error are nil.
• The system provides for user-ID validation, hence unauthorized access is prevented.
Software will work on Windows OS. The database used will be an open source database like
MySQL and the system will work on JVM.
Software requirements
Operating System: we have chosen windows operating system for its best support and user
friendliness.
Database: to save the records of the applicants and their details, SQL database is used.
Hardware requirements
LMS uses standard java classes and databases. The database should have backup capabilities.
13
No additional specific communication interfaces are needed during the operation of LMS.
The system is expected to have a memory of 256 MB and disk space of 500 MB. But it is
recommended that the system has memory capacity of 1 GB and disk space of 1GB.
2.1.5 Operations
The basic operations of the ‘Library Management System’ are described as follows:
• The staff member first has to register him/herself before using the system.
• The staff member can then login into the system with his/her username and password.
• The staff member can then add, delete or update the book records within the system.
• The staff member can issue books when requesting by the members and then update the
book record too.
• The system will generate the fine slip according to the returned date when book is returned
by the member.
• The staff member will update the book issue and return records into the book management
system.
• The member can search for a specific book by entering book information.
• The staff member can update member records within the system.
The system will require an application server for the runtime components and a database for
storage. The system will run on select popular application servers and use select popular database
for data storage.
There are two different users who will be using this product:
• Librarian who will be acting as the administrator.
• Member who can also use product for search operations.
14
• Can check the report of the issued Books.
• Can access all the accounts of the students.
User1: Staff- Staff will add, delete or update book records within the system. He/she will issue the
books as per requested by the member and will calculate the fine according to returned date of the
book. Staff needs to have complete understanding of functionalities and internal processing of the
system.
User2: Member- Member will request for book issue and then will return the book. They can search
for a specific book. The user does not need to have complete understanding of complex
functionalities and internal processing of the system.
Any update regarding the book from the library is to be recorded to have update and correct values
and any fine on a member should be notified as soon as possible and should be calculated correctly.
• On the basis of listing requirements and specifications the project will be developed.
• The end users should have proper understanding of the product.
• The information of all users must be stored in a database that is accessible by the LMS.
15
• Any update regarding the book from the library is to be recorded to the database and the
data entered should be correct .
This is an academic project and hence all the requirements will be completed before the end of the
semester. There will be no delay in the delivery of any of the requirements.
3. SPECIFIC REQUIREMENTS
User Interface
Various GUI elements like forms, images and standard buttons will be included in the User Interface.
• Issues book:
Description: The staff member checks the availability of book which the member want to
get issued.
Input: Enter book code.
16
Output: Confirmation for book issue or apology for failure in issue.
Processing: If selected book is available then the book will be issued and the record is
updated else error will be displayed.
• Return book:
Description: The member wants to return the book.
Input: return the book to the library.
Output: The record will be updated.
Processing: If book is not returned on the time then fine is calculated .
• Fine:
Description: If book is not returned on the time by member then fine is charged on per day
basis.
Input: check for the fines.
Output: Details about fines on the book issued by the staff.
Processing: The fine will be calculated, if it crossed the date of return.
Proposed database is intended to store, retrieve, update and manipulate information related to
college which include:
• Books availability
• Staff information
• Member details
• Calculation of fines
Software Constraints: The application shall meet the general standards of web applications.
Acceptance Constraints:
3. Provide sufficient test cases to show that the system is complete and correct.
The system must be designed to allow web usability. That is, the system must be designed in such
17
a way that will be easy to use and visible on most of the browsers.
Report Format: All the reports produced for this project are in compliance with the standard
templates provided in the class by the advisor.
Naming Conventions: All the documents will be named using the standard naming conventions.
Reliability:
The application would efficiently store all the information related to the various processes in the
system and output the relevant information.
Availability:
The application would be available to all the employees of the organizations with an authorized
access to the workstations and those who are subject to the authorization permissions.
Security:
The system would have adequate security checking through the authentication of the users. The reports
would only be available to the employees of the library as per their specific requirements.
Maintainability:
The software should not require any additional maintenance. If any errors occur, the user should
be able to login again with his credentials. The system shall be flexible enough to add new
modules and upgrade the existing modules.
18
4. CONTEXT LEVEL DIAGRAM
19
5. DFD LEVEL 1
2.0
Book stock
1.0 management Fetch
Authentication
Book record
Book details
Username and Invalid user Fetch
password 3.0
Update
message
Issue book
Fetch
STAFF Book details
Book
Member record
Book code
Fetch
MEMBER
Update
Book
4.0
Fetch
Borrower’s record
Update
Returned
book data
Update
Fetch
Return slip
details
Return record 5.0
Book
Generate
Fetch return slip
Search results
Fetch
6.0
Search
Update book
Staff record
Update
Update
Fetch
7.0
Member Member record
Member details
management
system
20 Fetch
6.DFD LEVEL-2
21
DFD LEVEL ‘2’ : ISSUE A BOOK
22
DFD LEVEL ‘2’ : RETURN A BOOK
23
24
25
7. DATA DICTIONARY
Legal_character = [a-z|A-Z]
Special_character = [@|$|#]
Member_details = name+member_id
login=username +password
26
SCREENS
1. LOGIN
27
2. Insert book
28
3. Remove member
29
4. Remove book
30
5. Search books
31
6. Return book
32
7. Create new user
33
8. Add book or update
34
9.Issue book
35
8.SOFTWARE METRICS
This metrics describe the project characteristics and execution. Examples include the number of
software developers, the staffing pattern over the life cycle of the software, cost, schedule, and
productivity.
FUNCTION BASED METRICS: The function point metric can be used effectively as a means
for measuring the functionality delivered by the system. Using historical data FP metric can be
used to: 1. Estimate the cost or effort required to design, code and test the software.
3. Forecast the number of components and/or the number of projected source lines in the
implemented system.
Where count total is the sum of all FP entries obtained from the following table:
(EIs)
External outputs 10 4 5 7 40
(Eos)
External inquiries 3 3 4 6 9
(EQs)
Internal logical 9 7 10 15 63
files (ILFs)
External interface 0 5 7 10 0
files (EIFs)
36
COUNT TOTAL 229
In the table, Information domain values are defined in the following manner:
1. Number of external inputs (EIs): Each external input originates for a user or is
transmitted from another application and provide distinct application oriented data or
control information. Inputs are often used to update internal logical files (ILFs). Inputs
should be distinguished from inquiries, which are counted separately.
2. Number of external outputs (EOs): Each external output is derived data within the
application that provides information to the user. External output refers to reports,
screens, error messages etc.
3. Number of external inquiries (EQs): An external inquiry is defined as an online
input that results in the generation of some imediate software response in the form of
an online output.
4. Number of internal logical files (ILFs): Each ILF is a logical grouping of data that
resides within the application’s boundary and is maintained via external input.
5. Number of external interface files (EIFs): Each EIF is a logical grouping of data
that resides external to the application but provides information that maybe of used to
the application.
The fi (i= 1 to 14) are value adjustment factors (VAF) based on responses to the following
questions:
4. Is performance critical? 2
37
7. Does the online data entry require the input transaction to be built over 5
multiple screens or operations?
14. Is the application designed to facilitate change and ease of use by the 2
user?
Σfi=38
FP=235.87
9. COCOMO MODEL
COnstructive COst MOdel (COCOMO II) is a more comprehensive estimation model.
COCOMO II is actually a hierarchy of estimation models that address the following areas:
• Application composition model - Used during the early stages of software engineering,
when prototyping of user interfaces, consideration of software and system interaction,
assessment of performance, and evaluation of technology maturity are paramount.
• Early design stage model - Used once requirements have been stabilized and basic
software architecture has been established.
• Post-architecture-stage model - Used during the construction of the software.
The COCOMO II model require sizing information. Three different sizing options are available
as part of model hierarchy:
38
1. Object points
2. Function points
3. Lines of source code
Like function points the object point is an indirect software measure that is computed using
counts of the number of screens, reports and components likely to be required to build the
application. Each object instance is classified into one of the three complexity levels (simple,
medium or difficult) as shown in the following table:
Screen 1 2 3
Report 2 5 8
3GL Component 10
The object count is determined by multiplying the total number of object instances by weighing
factor in the figure and summing to obtain a total object point count. When component based
development or general software reuse is to be applied, the percent of reuse is estimated
(%reuse) and the object point count is adjusted.
To derive an estimate of effort based on the computed NOP value, a “productivity rate” must be
derived.
Productivity rate for different level of developer experience and development environment
maturity:
PROD 4 7 13 25 50
39
Once the productivity rate has been determined, an estimate of project effort is computed using –
( book stock report, fine report, issued books report, returned books report)
= Taking reusability to be 0
= NOP = OPC = 17
7.) Prod =4
• Uncertainty - The risk may or may not happen; that is, there are no 100 percent probable
risks.
• Loss - If the risk becomes a reality, unwanted consequences or losses will occur.
40
When risks are analysed, it is important to quantify the level of uncertainty and the degree of loss
associated with each risk.
• Project risks –The risks that threaten the project plan. That is, if project risks become real, it is
likely that the project schedule will slip and that costs will increase.
• Technical risks – The risks that threaten the quality and timeliness of the software to be
produced. If a technical risk becomes a reality, implementation may become difficult or
impossible.
• Business risks – The risks that threaten the viability of the software to be built and often
jeopardize the project or the product.
• Known Risks - Those risks that can be uncovered after careful evaluation of the project plan,
the business and technical environment in which the project is being developed, and other
reliable information sources.
• Predictable Risks - Risks that are extrapolated from past project experience.
• Unpredictable Risks – Risks that are the joker in the deck. They can and do occur, but they are
extremely difficult to identify in advance.
• Performance Risk – The degree of uncertainty that the product will meet its requirements and
be fit for the intended use.
• Support Risk – The degree of uncertainty that the resultant software will be easy to correct,
adapt, and enhance.
• Schedule Risk – The degree of uncertainty that the project schedule will be maintained and
that the product will be delivered on time.
• Cost Risk – The degree of uncertainty that the product budget will be maintained.
RISK IDENTIFICATION
• Product size - Risks associated with the overall size of the software to be built or modified.
41
• Business impact - Risks associated with constraints imposed by management or the
marketplace.
• Stakeholder characteristics - Risks associated with the sophistication of the stakeholders and
the developer’s ability to communicate with stakeholders in a timely manner.
• Process definition - Risks associated with the degree to which the software process has been
defined and is followed by the development organization.
• Development environment - Risks associated with the availability and quality of the tools to be
used to build the product.
• Technology to be built - Risks associated with the complexity of the system to be built and the
“newness” of the technology that is packaged by the system.
• Staff size and experience - Risks associated with the overall technical and project experience of
the software engineers who will do the work.
YES
2. Are end users enthusiastically committed to the project and the system product to be built?
YES
3. Are requirements fully understood by the software engineering team and its customers? YES
YES
YES
YES
7. Does the software engineering team have the right mix of skills?
YES
42
8. Are project requirements stable?
YES
9. Does the project team have experience with the technology to be implemented?
YES
10. Is the number of people on the project team adequate to do the job?
YES
11. Do all customer/user constituencies agree on the importance of the project and on the
requirements for the system/product to be built?
YES
RISK TABLE
Risks identified Risk type Probability Impact
RMM Plan
The goal of the risk mitigation, monitoring and management plan is to identify as many potential
risks as possible. The project will then be analysed to determine any project-specific risks.
43
• When all risks have been identified, they will then be evaluated to determine their
probability of occurrence. Plans will then be made to avoid each risk, to track each risk to
determine if it is more or less likely to occur, and to plan for those risks should they
occur.
• It is the organization’s responsibility to perform risk mitigation, monitoring, and
management in order to produce a quality product.
• The quicker the risks can be identified and avoided, the smaller the chances of having to
face that particular risk’s consequence. The fewer consequences suffered as a result of
good RMMM plan, the better the product, and the smoother the development process.
RISK CONTROL
Risk identified Risk control Plan
44
11. USE CASE DIAGRAM
Login
Add/ Del
member
Issue book
Return book
Maintain
Library Staff member
record
Enquiry/
Search a
book
Member
Add/Delete
book
Maintain
book record
45
12. USECASE DESCRIPTION
LOGIN
1. Brief Description:
This use case describes how an actor login into the ‘Library Management System’.
2. Actors:
Library Staff
3. Flow of events:
a. Basic Flow:
This use case starts when the actor wishes to log into the ‘Library Management System’.
The system requests the actor to enter the username and password.
The system validates the username and password and then the actor is logged into the system.
b. Alternative flows:
If in the basic flow, the actor enters an invalid name or password, the system displays an error
message. The actor can use to either return to the beginning of the basic flow or cancel the login
at the point where use case ends.
4. Special requirements:
None
5. Pre-conditions:
The actor must have an account created in the system prior to executing the use cases.
6. Post conditions:
If the use case was successful, the actor is logged in to the system. If not, the system state is
unchanged.
7. Extension points:
None.
46
ADD/DELETE MEMBER
1. Brief Description:
This use case describes how an actor adds or deletes the user’s record in the system.
2. Actors:
Library Staff
3. Flow of events:
a. Basic Flow:
This use case starts when the actor has to add or delete users/members within the ‘Library
Management System’.
The member is then added to the system now the member got registered for further uses.
b. Alternative flows:
If in the basic flow the actor fills wrong details while deleting a member then the system displays
an error message. The actor can either return to the beginning of the basic flow or can cancel the
deletion of the member from the system.
4. Special requirements:
None.
5. Pre-conditions:
The member must added into the system before the actor deletes him/her.
6. Post conditions:
Record for a member has been added.
47
ISSUE BOOK
1. Brief Description:
This use case describes how the staff issues book when requested by the member.
2. Actors:
Library Staff
Members
3. Flow of events:
a. Basic Flow:
If a member wants to borrow a book it is important that the staff should login to the system.
If the member search is successful the staff should enter the book id.
b. Alternative flows:
If the login fails then the staff should re- register themselves.
If the member search is unsuccessful then the staff should re-register the student.
If the book search is unsuccessful and book data is not found then the staff must
enter the book in requisition report.
4. Special requirements:
None.
5. Pre-conditions:
To borrow any books it is important that the member is registered and the book to be borrowed is
available.
6. Post conditions:
Book is reserved for the member.
48
7. Extension points:
None.
RETURN BOOK
1. Brief Description:
This use case describes how the return book procedure carried out when requested by the member.
2. Actors:
Library Staff
Members
3. Flow of events:
a. Basic Flow:
Member gives the book to be returned to the staff member.
b. Alternative flows:
In the basic flow the staff member checks if the book is returned on time if it is not
on the time then he/she generates slip of calculated fine.
4. Special requirements:
None.
5. Pre-conditions:
Book/s must have been issued to the member.
6. Post conditions:
Report on fine is updated.
7. Extension points:
49
None.
1. Brief Description:
This use case describes how the actor maintains the record of members which includes edit or
view the member’s data.
2. Actors:
Library Staff
3. Flow of events:
a. Basic Flow:
Staff member login to the system and selects the menu option to change the data of specific
member.
The system save the change in membership record and update previous record.
To view the record of a member the actor selects from the menu option.
b. Alternative Flows
If the password is incorrect then a message is printed on the screen and staff member is returned
to the beginning.
If the name of changed to be category is not among the existing categories a message is printed
on the screen and the actor is returned to the menu screen.
4. Special requirements:
None.
5. Pre-conditions:
Password or username must have registered.
6. Post conditions:
Member record is updated in database.
50
7. Extension points:
None.
SEARCH A BOOK
1. Brief Description:
This use case describes how the actor can search for a particular book.
2. Actors:
Member
Library staff
3. Flow of events:
a. Basic Flow:
Member or staff enters the book name or ISBN or author name and presses search
4. Special requirements:
None.
5. Pre-conditions:
The book to be searched should be registered into the database of the ‘Library Management
System’.
6. Post conditions:
List of books according to search data is appeared on the screen.
7. Extension points:
None.
ADD/DELETE BOOK
51
1. Brief Description:
This use case describes how the actor adds or removes the books.
2. Actors:
Library staff
3. Flow of events:
a. Basic flow:
The staff login to the system.
If login is successful then to add a book the staff must search for the book.
If the book is not currently available and is part of the requisition list it can be added
to the book database.
4. Special requirements:
None.
5. Pre-conditions:
To add any book that should be part of requisition list and to delete the book must
be part of library.
6. Post conditions:
List of books is updated according to added or removed books.
7. Extension points:
None.
1. Brief Description:
52
This use case describes how the actor maintains the book record in the database of the system
which includes added, issued or returned books record
2. Actors:
Library staff
3. Flow of events:
a. Basic flow:
1. The staff selects the menu option to add record of different books. He/ She enters the name ,
Author’s name, edition etc. or he/she can use a barcode.
2. To enter the record of issued book the staff member goes to menu option.
LMS presents the menu for maintaining the issued books record which contains two options a.
Add issued books record b. Edit issued books record.
3. Staff selects the menu option to enter in the returned books record.
LMS presents the menu for maintaining the issued books record which contains two options a.
Add returned books record b. Edit returned books record.
b. Alternative Flows
5. Pre-conditions:
Password or username must have registered.
6. Post conditions:
Books records are updated in the database
7. Extension points:
None.
13.ER DIAGRAM
53
D.O.B
Colg.ID
Yr. of
Name Colg.ID admission
Yr.ofof join
Yr. F.name
Ph.
join No. Sex
Fine till
date
No. of
books MEMBERS Member’s
issued ID
Returns
Add
Dt. Of
Search
return
del
Dt. Of
issue
Issue
Password Author
Ph. Name
Add. No. Acc. No.
Edition
Yr. of
STAFF BOOKS
join
M.name
Subject
Login Price per
ID Sex Publisher
F.name Copy
54
Name Add No. of
copies
Remove
14. Data Design
S.No. Data Item Type Length description
1 TEACHERS
1.1 Name String 30 contains name of the teacher
1.2 F.name String 30 contains father's name of the teacher
1.3 M.name String 30 contains mother's name of the teacher
1.4 D.O.B Integer 10 date of birth
1.5 Sex String 6 gender of thw
the teacher
teacher
1.6 Add. String 50 residential address
1.7 Ph. No. Integer 10 contact number
1.8 Subject String 10 subject taught by teacher
1.9 Coll. Id Integer 10 college id
1.1 Yr. of join Integer 4 year of joining
2 STUDENTS
2.1 Name String 30 contains name of the student
2.2 F.name String 30 contains father's name of the student
2.3 M.name String 30 contains mother's name of the student
2.4 D.O.B. String 10 date of birth
2.5 sex String 6 gender of the student
2.6 Add. String 50 residential address
2.7 Ph.no. String 10 contact number
2.8 Course String 10 course chosen by the student
2.9 Coll. CodeString 10 college code iof the student
2.1 yr.of adm.String 4 year of admission
3 ISSUE/
RETURN
3.1 dt.of Integer 10 date of issue
issue
3.2 dt.of Integer 10 date of return
return
3.3 actual dt. Integer 10 actual date of return
of return
55
4 MEMBER'S
RECORD
4.1 Member's Integer 10 Member's id no.
I.D.
4.2 no.of books
Integer 1 number of books issued on member's account
issued
4.3 Validity Integer 4 date of expiry of membership
4.4 fine till Integer 4 fine to paid till present date
date
5 BOOKS
5.1 Name String 30 Contains name of the book
5.2 Author String 30 Contains author's name of the book
5.3 Publisher String 30 Contains publisher's name of the book
5.4 Edition Integer 2 edition of the book
5.5 No.of Integer 3 No. of copies sold
copies
5.6 price/copyInteger 4 Price per copy of the book
5.7 Acc.no. Integer 10 Acc. No. of the book
5.8 Subject String 20 Subject related to the book
6 LIBRARY
STAFF
6.1 Name String 30 Contains the name of the satff member
6.2 F.name String 30 contains father's name of the staff member
6.3 M.name String 30 contains mother's name of the staff member
6.4 D.O.B. Integer 10 date of birth
6.5 Sex String 6 gender of the staff member
6.6 Add. String 50 Residential address
6.7 Ph. No. Integer 10 Contact number
6.8 yr. of join Integer 4 Year of joining
6.9 Login id. String 20 Login ID of the staff member
6.1 Password String 20 Password of the staff member
56
15.TESTING
White box testing:
White box testing, sometimes called glass box testing, is a test case design philosophy that uses
the control structure described as a part of component level design to derive test cases.
Using white box testing technique we can derive test cases that:
1. Guarantee that all the independent paths within a module have been exercised at least once.
3. Execute all loops at their boundaries and within their operational bounds and
It is a white-box testing technique which enables the test case designer to derive a logical
complexity measure as a guide for defining a basis set of execution paths. Test cases derived to
exercise the basis set are guaranteed to execute every statement in the program at least once
during testing.
57
Module
1)Issue_Book/
2)Enter choice
3)If (Choice=’a’)
4)then Enter the book name
5)If book name found and available
6)then issue the book
7)Else not issue the book
8)End if
9)Else
10)Enter the author name
11)If author’s name found and available
12)then issue the book
13)Else not issue the book
14)End if
15)End if
16)End Issue_Book
58
FLOW GRAPH
3 9
4 10
5 11 12
6 7
13
8 14
15
16
59
Cyclomatic Complexity:
1) Number of regions=4
2) V(G)=Number of edges-Number of nodes+2
18-16+2=4
=3+1=4
Independent Paths:
1→2→3→4→5→6→8→15→16
1→2→9→10→12→14→15→16
1→2→3→4→7→8→15→16
1→2→9→10→11→13→14→15→16
60
BIBLIOGRAPHY
61