Ethio - Italy Library Management System
Ethio - Italy Library Management System
PROJECT TITLE
WEB BASED LIBRARY MANAGEMENT SYSTEM FOR ETHIO_ITALY
POLY TECHNIC COLLEGE
Name ID
Degife Seifu ETUSR/031/2013
Fate Abdi ETUSR/037/2013
Motuma Abera ETUSR/044/2013
Alemayehu Mulat ETUSR/027/2013
Dire-Dawa, Ethiopia
April, 2024
This is to clarify that the project prepared by, Degife Seifu, Fate Abdi, Motuma
Abera, Alemayehu Mulat, titled: LIBRARY MANAGEMENT SYSTEM and
submitted in partial fulfillments for Bachelor of Science Degree in Information
Communication Technology complies with the regulations of the Institute and
meets theaccepted standards with respect to originality and quality.
Advisor Approval:
Examiner:
Examiner:
Examiner:
ii
Contents
Acknowledgment ....................................................................................................................... vi
Abstract ....................................................................................................................................... x
1. INTRODUCTION ................................................................................................................ 11
iii
1.9. Project Plan .................................................................................................................... 19
iv
4. System Design ...................................................................................................................... 59
CHAPTER FIVE........................................................................................................................... 72
References ..................................................................................................................................... 74
v
Acknowledgment
First of all , we would like to express our heartfelt gratitude to "The Almighty God" for providing
us with this opportunity and providing us with the physical strength and a pleasant mind to
complete this proposal work, as well as to those who encourage and satisfy our needs to complete
this project work. We are grateful to our lab helpers for allowing us to create our proposal in a
well-equipped lab. We would also like to express our heartfelt gratitude to our advisor, MR.
Eyasu D. for his input on everything from planning our proposal to the completion of all of our
operations. We would also like to outspread our salutation to the Department of ICT for their
logistic support for proper working conditions and smooth running of the study.
vi
Abbreviation and Acronyms
vii
List of Tables
Table 1: Project Time Scheduling ................................................................................................. 19
Table 2: Budget plan estimation ................................................................................................... 20
Table 3:CRC Card for Users ......................................................................................................... 23
Table 4:CRC Card for Librarians .................................................................................................. 24
Table 5:Use case description for Generate report ......................................................................... 25
Table 6:Use case description for Add Books. ............................................................................... 26
Table 7:Use case description for Delete books ............................................................................. 27
Table 8:Use case description for Remove books .......................................................................... 28
Table 9:Use case description for Borrow book ............................................................................. 29
Table 10:Use case description for Return book ............................................................................ 30
Table 11:Use case description to validate admin login ................................................................. 36
Table 12:Use case description for add librarian (member) ........................................................... 47
Table 13:Use case description for creating an account. ................................................................ 47
Table 14:Use case description for removing the account. ............................................................ 48
Table 15:Use case description for removing librarian. ................................................................. 49
Table 16:Use case description for adding a new book. ................................................................. 50
Table 17:Use case description for removing outdated books. ...................................................... 50
Table 18:Use case description for changing password. ................................................................ 51
Table 19:Use case description for Borrow books ......................................................................... 52
Table 20:Use case description for return books ............................................................................ 53
Table 21:Activity diagram description.......................................................................................... 55
Table 22:persistent data management for Admin ........................................................................ 67
Table 23:persistent data management for labrarian ...................................................................... 67
Table 24:persistent data management for user .............................................................................. 67
Table 25:Access control and security ........................................................................................... 70
viii
List of Figures
Figure 1:Essential use case diagram ............................................................................................. 24
Figure 2:Essential user interface prototype ................................................................................... 31
Figure 3:Use case diagram ............................................................................................................ 35
Figure 4 Sequence diagram for login......................................................................................... 54
Figure 5 Sequence diagram for adding book ............................................................................ 54
Figure 6 Sequence diagram for removing librarian ................................................................ 55
Figure 7 Activity diagram for admin login ............................................................................... 56
Figure 8 Activity diagram for adding librarian ....................................................................... 56
Figure 9 Activity diagram for removing librarian ................................................................... 57
Figure 10 Activity diagram for removing the book ................................................................. 57
Figure 11 Activity diagram for changing password................................................................. 57
Figure 12 class diagram .............................................................................................................. 58
Figure 13 Architectural design of system ..................................................................................... 60
Figure 14 Subsystem decomposition diagram .......................................................................... 61
Figure 15 Create account state diagram ................................................................................... 64
Figure 16 Login state diagram ................................................................................................... 64
Figure 17 Collaboration diagram for admin login ................................................................... 65
Figure 18 Collaboration diagram for registration ................................................................... 65
Figure 19 Deployment Diagram................................................................................................. 66
Figure 20 Entity-relationship diagram/database design ......................................................... 68
Figure 21 User interface prototyping for login page................................................................ 71
ix
Abstract
A web based library system is used to handle book information and students who borrows books.
It helps to grant information on any book present in the library to the user as well as the staff
members. It keeps a track of book issued, returned and added to the library.
The administrators have the capability to open all sectors of the program and edit librarian’s
information while the librarian is limited to adding book and student records but is not allowed to
update or delete any recorded detail and transactions that had been recorded in the system. The
purpose of the library borrowing system is to provide quality services. It aims to provide a good
library borrowing system. The system provides a feature that can easily manage student’s
information, book details and manage borrowing transactions.
The project was designed with the use of PHP, CSS and Java script which is an integrated
development environment made by MYSQL database server. It can be used to develop web
based system and graphical user interface applications along with windows form application
websites.
x
CHAPTER ONE
1. INTRODUCTION
Ethio_Italy Poly Technic College is a governmental college found in Dire Dawa city, Ethiopia
country. EIPTC provide governmental higher education opportunities for students. It is one of
the growing new governmental colleges in the country. The EIPTC as a 'Center for Excellence'
was born out of the dynamic ideas and the desire to assist the national and regional endeavors to
provide an adequate number of total quality higher education institutions.
A library system is software that had been developed to handle basic housekeeping functions of a
library. It helps to grant information on any book present in the library to the user as well as the
staff members. It keeps a track of book issued, returned and added to the library.
Currently EIPTC is using a library system which operates manually. Forms are given to the
Librarian and they fill them of using pens. The manual library system is very time consuming
and a tiresome task. The primary complaint of some Librarians with this manual system is the
tiresome task of searching records. The fast changed of technology describe a lot to the
development of the library system. The computerized library system may help the academe.
11 | P a g e
1.1. Background of Project
Web base library management system is a software application that refers to small or medium-
sized library systems. Librarians manage the library using a computerized system, in which they
may record various transactions such as book issues, returns, new book additions, new student
additions, and so on, use it. This system also includes books and student maintenance modules,
which maintain track of the students who use the library as well as a complete description of the
books in the library. There will be no loss of book or member records with this computerized
method, which is common when a no computerized approach is employed. The Library
Management System also has a report module. If the user is an administrator, he or she can
generate several reports, such as a list of enrolled students, a list of books, an issue report, and a
return report. When compared to non-computerized library systems, all of these modules can
assist librarians in managing the library with greater ease and efficiency.
The current system is bulky, It is inefficient because it follows manual system service,
Documentation is not easy to retrieve and record,
Redundancy of books. In the documentation system,
Borrowing to instructors is allowed by preparing a form to accept some input from them
such as Name, code, signature, Telephone, department, ID, the title of book, date, charge
date, difference symbol, and signature by using a manual system.
It wastes much time searching the books
It makes the work bulky
When we went to borrow the book for the user it that done by using a name, ID,
department, telephone, book code data taking the book by using a manual system.
12 | P a g e
1.3. Objectives of the Project
There are two types of objectives the first one is general objective and the second is specific
objectives.
Our specific objective is to develop a user-friendly user interface for our system that:
Requirement gathering and analyzing that requirement of the system.
To Design friendly user interface for the proposed system.
Implementing and testing the new system
To develop an appropriate database that is easily manageable.
Test and Maintenance of the Proposed system
13 | P a g e
The software will be able to manage all of the required data.
In general, the system makes a significant contribution, such as:
Improve user satisfaction
Decrease loss of data
Increase time management
Decrease human power
To give timely and accurate reports (daily, weekly, monthly, etc.),
Make it simple for employees to communicate.
Enable workers to get all information easily and fully
Decrease the loss of necessary data
1.6. Beneficiaries of the Project
Following the development of the system, it provides a excess of functions for users, employees,
managers, college, and the country as a whole, among other things.
Users: -to access everything easily. This means that if someone wants to read in the library he/she knows
whether the book exists reading and for reading different books easily.
Administrators - The system will lighten the paper works of the school as requirement reports.
Librarian - The Librarian can monitor well the students who borrow books in the library
through reliable and correct reports.
Students - The students can easily borrow book without spending so much time.
Teachers - The students can be provided quick access for the library items so the teachers won’t
worry enough if the students can manage to make a library research task given by them.
Future Researchers - The future researchers can use the study as their guide of reference for
their future researches also that is related to database management system.
1.7. Methodology
1.7.1. Data Gathering Methodology
To gather data from the different users and managers of the existing system project team used the
following techniques.
Interview: Different users of the existing system along with workers were involved to
have an understanding of how the system works, what are its and different features,
14 | P a g e
factors, and advantages as well as advantages so we obtain detailed information from
them.
Direct Observation: We will observe some Library Management systems on the
internet. We will have also observed the existing Library Management systems to know
how the process is going and to understand the management features it provides.
Document Analysis: To get information about the background of the system project
team will review necessary documents and books that support this project.
1.7.2. Development Methodology
We decided to use the object-oriented system analysis and design (OOSAD) method for system
analysis and design because use object-oriented approach has the features like inheritance, which
enables the reuse of code, encapsulation, and polymorphism.
The object-oriented methodology is used because of the following reason:
It implements the concept of object orientation like inheritance, encapsulation, and
polymorphism.
The ability to challenge the problem domains.
To make simple communication among user analyses is Entity-relationship programmers.
Use case diagram, Activity diagram, sequence diagram, class diagram, data modeling,
and deployment diagram.
As a result, we selected to use Incremental Model. Because our project has need to the
following will be used to design the system.
A project has a lengthy development schedule.
When Software team are not very well skilled or trained.
When the customer demands a quick release of the product.
You can develop prioritized requirements first.
The LMS can be built incrementally, starting with basic features and gradually
adding more functionality.
It makes backward and forwards for error correction, it is suitable for developing a good
and efficient system.
1. Requirement Analysis
2. Analysis
3. Design
15 | P a g e
4. Implementation
5. Test
6. Maintenance
1.7.3. Development Tools
Hardware and software tools required for successful completion of the projects are listed below
with their respective significance. Hardware tools required are:-
Personal computer (PC): Almost all tasks of our project are performed on computer
Flash: Required for data movement
Disks (CD, DVD): Necessary for the movement of relevant data and for backup and recovery
mechanism.
Printer: To print documentations
Software development tools: are computer programs used by software development tools to
create, debug, manage and support applications, frameworks, systems, and other programs.
There are several tools that can be used for developing a Web-based Library Management
System. Here are some of the commonly used tools:
HTML: is used for creating the structure of the web pages in the system.
CSS: is used for styling the web pages in the system.
JavaScript: is used for adding interactivity to the web pages in the system.
JQuery: is a fast, small, and feature-rich JavaScript library that can be used for
simplifying the client-side scripting of HTML in the system.
16 | P a g e
XAMPP: stands for Cross-Platform (X), Apache (A), MySQL (M), PHP (P) and Perl
(P). It is a simple, lightweight Apache distribution that makes it extremely easy for
developers to create a local web server for testing purposes.
Mozilla Firefox: is a vast and powerful tool. Over the course of a few decades, the
internet has changed the way we work, the way we play and the way we interact with
one another. Depending on how it’s used, it bridges nations, drives commerce,
nurtures relationships, drives the innovation engine of the future and is responsible
for more memes than we know what to do with.
MS word: allows you to create professional-quality documents, reports, letters, and
resumes. Unlike a plain text editor, Microsoft Word has features including spell
check, grammar Check, text and font formatting, HTML support, image support,
advanced page layout, and more.
StarUML: to draw diagrams such as use cases diagrams, class diagrams, sequence
diagrams, collaboration diagrams, activity diagrams and state charts
Adobe Photoshop and Picasso: to edit images and texts:
Internet Connection: Since our system is web based, it is very necessary requirement. It
is also help us to extract relevant information about our project from internet.
Stationeries (pen, paper): For writing all necessary documentations associated with the
project
Note book: To take notes during data collection and for other documentations
17 | P a g e
1.8.1. Economic Feasibility
Our systems to be developed are economically feasible and the benefit is outweighing the cost.
Since this project computerizes the existing Manual system, by now the reduction of cost for
materials used in manual operation becomes beneficiary to the organization. Generally the
system that we will develop, Web based Library Management System brought a number of
tangible and intangible benefits.
Tangible benefit In the project going to be computerized there will be reduction of cost
for materials used for manual operation.
The intangible benefit that the system will give is listed as following: -
Reduce Resource Consumption
Increase security
Increase speed of activity.
Window 10
Sublime
18 | P a g e
1.8.3. Operational Feasibility
Operation feasibility is used to check whether the project is operationally feasible or not. Our
system requires very less human power. It provides simple user interface in which the employee
of office can access easily, and more accurately. Maintenance is less and easy. The system will
have GUI interface and very less user-training is required to learn it. The system is so simple to
use, so no any special skills will be required to use the system.
So the system is operationally feasible
1.9. Project Plan
1.9.1. Project Time Scheduling
We will arrange activities because completing the project is not a one-person job, according to
the department's timeline, the project will be submitted. The following table contains the project
timetable.
The table below represents the main activities of the project together with their respective start
and end date.
6 Submission and
defense
20 | P a g e
CHAPTER TWO
1. REQUIREMENT ELICITATION
2.1. Overview of Existing System
In this chapter, we identified major functions of the existing system and its advantages and
drawbacks, provide alternative proposed solutions for the problem identified, and some
supplementary specifications about the system like, domain modeling with CRC cards, essential
use case diagram and essential use case documentation and finally the essential user interface
prototype.
Currently Ethio_Italy Polly Technical College library provide service for different users like
students, instructors and other Member of the community but Library management system is
manual system for managing the various activities and services provided. Its main features of the
current system are support large amount of books and members data can maintain in manual
way. The basic operations on the system are like adding new books and members, searching and
updating information’s, deleting books and members in traditional way (i.e. paper based). It take
a lot of time to get particular books and members (i.e. searching is difficult and time consuming),
no proper record of data, replication of records occur and retrieve of particular data is very slow
and time consuming.
Wastage of resource like time, human power, equipment during issuing and returning books.
The information transaction is very late with other class of the library like store and
classification.
Since its manual method no additional knowledge about technology is required to use it.
It’s inclusive and doesn’t require internet.
21 | P a g e
2.2. Proposed Solutions
As described above in the above section (2.1 overview of existing system) manual system has
many drawbacks, which can be easily solved by providing:
Our Proposed system is a web based system. Through our system user can add books, search
books, update information, borrow and return books in quick time. System has User friendly
interface, Fast access to database, less error, Quick transaction.
1. Standards Application: This solution involves using a software application that is designed
to meet industry standards for library management. The software would be installed on a
computer and would allow librarians to manage the library’s collection, track circulation, and
generate reports.
2. Web-based Application: This solution involves using a web-based application that can be
accessed from any device with an internet connection. The application would allow librarians to
manage the library’s collection, which mainly focuses on basic operations in a library like
adding new books, updating new books, searching new books and deleting books facility to
borrow and return books.
3. Integrated Application: This solution involves using an integrated library system that
combines multiple library functions into a single software package. The software would be
installed on a computer and would allow librarians to manage the library’s collection, track
circulation, generate reports, and perform other library functions.
4. Mobile Applications: This solution involves using a mobile application that can be installed
on a smartphone or tablet. The application would allow librarians to manage the library’s
collection, track circulation, and generate reports.
22 | P a g e
So we preferred to develop web based library management system for Ethio-Italy
Polytechnic College for the advantages of:-
Accessibility across devices for users: can be accessed by using laptops, computers and
mobile devices with internet access.
Increased flexibility and scalability. Just as upgrades are simple to implement, it is also
simple to increase the application's capacity to grow with your library management
system. As you require more processes to happen simultaneously, your web-based
software can facilitate it.
It is easy to implement: we find web-based system easier to implement than others.
Doesn’t require any additional hardware devices than the college already has.
Protecting your data: Web-based applications offer a good way of accessing centralized
data securely.
A class responsibility collaborator (CRC) model is a collection of standard index cards that have
been divided into three sections, class, responsibility and collaborator. A class represents a
collection of similar objects, a responsibility is something that a class knows and a collaborator is
another class that a class interacts with to fulfill its responsibilities.
Class Users
Responsibility Collaborator
Borrow books Librarians
Return books
23 | P a g e
Class Librarians
Responsibility Collaborator
Add book Users
Drop books
Search books
Update books
24 | P a g e
Figure 1: Essential use case diagram
25 | P a g e
2.6. Essential use case documentation
Use case number 1
Use case name Generate report
Actors Librarian
Description Allow librarians to generate report
Pre-condition the librarian must be an authorized to perform this activity
Flow of action Librarian want to generate report
26 | P a g e
Flow of action Authorized librarian want to add item in to database
Librarian enter username and password to the system
The system verifies the librarian is legal or not to enter
to this operation
27 | P a g e
Use case number 3
Use case name Delete books
Actor librarian
Description Allow librarians to delete items from the database
Pre-condition the librarian must be an authorized to perform this activity
The alternative flow of action If the librarian username and password is incorrect
system displays incorrect username or password and
Post-condition the item will be deleted from the database
28 | P a g e
.
29 | P a g e
Use case number 5
Use case name Borrow book
Actors user
Description Allow users to borrow book
The librarian enter both the details of the book and the borrower in to
the system
Alternative Flow of If the user ID is not valid the librarian rejects the user
Action If the requested book is not available the system displays book not
found
30 | P a g e
Use case number 6
Use case name return book
Actors user
Description Allow users to return book
The librarian enter both the detail of the borrower and the book in to
the system
The use case ends The librarian inform the system to generate a
report
Alternative Flow of If the detail of that book is not the same as the recorded
Action detail the librarian cannot accept it.
31 | P a g e
2.7. Essential user interface prototype
32 | P a g e
Chapter Three
3. System Analysis
3.1. Overview of the new system
The analysis is the process of studying a procedure to identify its goal and purposes and create
systems and procedures that will achieve efficiently. To achieve them this chapter will see, the
analysis phase of the project that contains a detailed description of the operation of the existing
system, an overview of the new system, requirement analysis of the new system, and system
analysis to simplify the design and implementation of complex programs. The project with
Ethio_Italy Polly Technic College Library Management System is a web based system for
monitoring, controlling transactions, and reading or uploading the books, pdf, and ppt for us
online. Library Management System is a collection of information that is stored and accessed
electronically. This digital Library system is available for two tasks. The first is Management
System: which mainl y focuses on basic operations in the library like adding members, adding
new books, updating new information, and searching for books. The second is online access to
reference books. The library manager and the librarians are high-level users of’ the EIPTC
Library Management System. The purpose of the system is as follows:-
To make the services fast and easy to use.
To save time and cost wad to searching available books all over book shelves.
To search resources easily.
Online service on the users.
3.2. System Requirements
3.2.1. Functional Requirements
Login
Admin
Add Librarians
Create account
33 | P a g e
Add books
Remove Librarians
Get book list
Remove books
Change password
Search books
Logout
Liberians
Add Books
Remove Books
Get book list
Search books
Logout
User
Search books
Get book list
Borrow books
Return Books
Logout
A non-functional requirement is a requirement that specifies criteria that can be used to judge
the operation of a system, rather than specific behaviors. The following are non-functional
requirements.
Reliability: - the system should not fail more than once a month.
Usability: - the system that have we developed should be easy to learn and operate. It
will need only two days of training to use the system.
Availability: - this system is available everywhere and at all times for those who have
access to use the system.
Performance: - the system will have good performance i.e. fast response time and
34 | P a g e
optimal workload.
Adaptability: - this software is adaptable by any organization.
Correctness: - the results of the function are pure and accurate.
Flexibility: - the operation may be flexible and reports can be presented in many
ways.
Maintainability: - after the deployment of the project if any occurs then it can be
easily maintained by the software developer.
Portability: - the software can be deployed on any machine.
Reusability: - the data that are saved in the database can be reused if needed.
Robustness: - if there is an error in any window or module then it does not affect the
remaining part of the software.
35 | P a g e
Use case modeling
In its simplest form, a use case can be described as a specific way of using the system from a
user’s (actor’s) perspective and describes what the system does from that point of view. Use
cases provide a means to capture system requirements, communicate with the end users’ domain
experts, and test the system. Use cases are best discovered by examining the actors and defining
what the actor will be able to do with the system. The actors in the system are the following:
User
Librarian
Administrator
3.3.1. System use case diagram
36 | P a g e
3.3.2. System Use Case Diagram Documentation
A use case is a methodology used in system analysis to identify, clarify, and organize system
requirements. A use case is a collection of conceivable sequences of interactions between
systems and users in a specific environment, all of which are tied to a specific purpose. The use
cases of the system are the following:
37 | P a g e
Table 12: Use case description for add librarian (member)
47 | P a g e
Table 15: Use case description for removing librarian.
48 | P a g e
Table 16:Use case description for adding a new book.
Alternative flow of If the entered values are incorrect, the system asks the user to
Action enter valid information.
Post-condition The books have been added.
49 | P a g e
Post-condition The book information has been removed.
50 | P a g e
Table 19:Use case description for Borrow books
The librarian enter both the details of the book and the borrower in to
the system
Alternative Flow of If the user ID is not valid the librarian rejects the user
Action If the requested book is not available the system displays book not
found
51 | P a g e
Table 20:Use case description for return books
The librarian enter both the detail of the borrower and the book in to
the system
The use case ends The librarian inform the system to generate a
report
Alternative Flow of If the detail of that book is not the same as the recorded
Action detail the librarian cannot accept it.
52 | P a g e
3.3.3. Sequence Diagram
The sequence diagram of our proposed system is used primarily to show the interactions
between objects in the sequential order. The main purpose of a sequence diagram our system
is to define event sequences that result in some desired outcome.
53 | P a g e
Figure 6 Sequence diagram for removing librarian
3.3.4. Activities Diagram
Active diagrams are used to model the flow of an object as it moves from state to state at
different points in the flow of control. It is essentially a flow chart that emphasizes the
activity that takes place over time. Activity diagrams can be used to model higher-level
business process at the business unit level, or to model low-level internal class actions. It is
"Less technical" in appearance, compared to sequence diagrams, and business-minded people
tend them more quickly.
Table 21:Activity diagram description
54 | P a g e
5. Activity Set of activities that the user and system
performing.
55 | P a g e
Figure 9 Activity diagram for removing librarian
56 | P a g e
3.3.5. Class Diagram
A class diagram describes the types of objects in the system and the various kinds of static
relationships that exist among them. The class diagram of our project can show the classes
and the relationships among classes. The class diagram of our project can store and manages
information in the system. In the phase of conceptual class modeling, we just create classes
and their relation.
57 | P a g e
Chapter Four
4. System Design
Introduction
In the case of online job portal system our system design modeling, will fill the gap between
the system specification produced during requirement elicitation and analysis which is
concentrated on the purpose and the functionality of the job portal system.
Library Management System design is the process of defining its components, its modules its
interfaces, and data for a system to satisfy specified requirements. It is intermediate language
between requirements and code and also it is the first step in moving from problem domain to
solution domain proceeding from abstract to more concrete representations. It is a
creative activity. It determines the major characteristics of a system. In this chapter we will
use different type of diagrams that are useful to design the proposed system.
4.1. Design Goals
The goal of design is to model the system with high quality. The design goals are derived
from non-functional requirements which means the non-functional requirement is the
description of the feature characteristics and attributes of the system as well as any
constraints that may limit the boundary of the solution. Design goals describe the qualities of
the system that the developers should consider.
Reliability:- Wed based Library Management system should be reliable.
Security: - Wed based library Management system should be secured, i.e., not allow
other users or unauthorized users to access data that has no the right to access it.
Performance: - The system should respond fast with high throughput, i.e. it should
perform the task quickly.
58 | P a g e
4.2. System Architectural
The current system doesn’t use any computerized system to provide service. Hence there is
no system architecture, so we are going to develop the proposed system architecture to
determine the type of interactions that the components are going to have.
59 | P a g e
4.3. Sub-System Decomposition
System decomposition means a high-level function, process, and organization broken down
into lower-level components that are more detailed. It provides a logical hierarchical
decomposition of a system. In addition, is breaking a complex problem or system into parts
that are easier to conceive, understand, program, and maintain. The Library system has its
system function for these functions decompose into a sub-function of the system. That
contains the admin page, user page, the admin page is used for the administrator, and any
users use the user page in that system. Library management system decomposition diagram
put as follows:-
60 | P a g e
4.4. Hardware/Software Mapping
1. Client Machine
Desktop computers
laptops
Smartphones or tablets.
Software: The client machines should have a web browser installed,
such as Google Chrome, Mozilla Firefox, Microsoft Edge, or Safari,
to access and interact with the web-based application. The client
machines also need an operating system (e.g., Windows, macOS,
Linux, iOS, Android) to run the web browser and communicate with
the server-side components.
2. Web Server
Hardware: Dell PowerEdge R-Series: a rack-mounted servers
designed for data center environments. They offer a balance of
performance, storage capacity, and scalability.
Software: Apache HTTP Server
3. Database Server
Hardware: Oracle Exadata Database Machine. Designed to deliver
optimal performance, reliability, and manageability for MySQL
61 | P a g e
deployments
62 | P a g e
4.5. State Chart Diagram
State chart diagram describes the flow of control from one state to another state
Create account state diagram
63 | P a g e
4.6. Collaboration diagram
64 | P a g e
4.7. Deployment Diagram
Deployment diagrams of Library Management system are used for describing the hardware components
where software components are deployed.
The software going to be developed is allowed by the UML model. UML deployment diagram shows a
physical view of the system, taking software into the real world by showing how software is assigned to
hardware and how communicates. Deployment diagrams show the configuration of run-time processing
elements and the software components, processes, and objects that live on them. Software component
instances represent run-time manifestations of code units. The purpose of deployment diagrams can be
described as:
Visualize the hardware topology of a system.
Describe the hardware components used to deploy software components.
Describe runtime processing node
65 | P a g e
4.8. Persistent Data Storage and Management
Persistent data storage refers to the long-term storage and retrieval of data in a computer
system or application. It involves storing data in a way that allows it to persist even after the
system or application is shut down or restarted.
Persistent data storage is essential in various domains, including web applications, databases,
file systems, and cloud storage. It enables the preservation of critical information, facilitates
data sharing, supports data analysis and reporting, and ensures the integrity and availability of
important data over time.
Admin
Attribute Data type Null Key Relationship
Id Int Not Null Primary
Username Varchar(70) Not Null
Password Varchar(70) Not Null
Table 22: persistent data management for Admin
Librarian
Attribute Data type Null Key Relationship
ID Int Not Null Primary
Username Varchar(70) Not Null Foreign Authentication
Password Varchar(70) Not Null
Table 23:persistent data management for librarian
User
Attribute Data type Null Key Relationship
ID Int Not Null Primary
Username Varchar(70) Not Null Foreign Authentication
Password Varchar(70) Not Null
Table 24:persistent data management for user
66 | P a g e
Figure 20 Entity-relationship diagram/database design
67 | P a g e
Access control and Security
Access control refers to security features that control who can access resources in the operating
system. Applications call access control functions to set who can access specific resources. This
overview describes the security model for controlling access to Windows objects, such as files,
and for controlling access to administrative functions, such as setting the system time or auditing
user actions. The Access Control Model topic provides a high-level description of the parts of
access control and how they interact with each other. Access Control is any mechanism by which
a system grants or revokes the right to access some data or perform some action. Normally, a
user must first log in to a system, using some Authentication system. Next, the Access Control
mechanism controls what operations the user may or may not make by comparing the User ID to
an Access Control database.
68 | P a g e
Table 25:Access control and security
Function Actors
Login
Add librarians
Upload books
Remove books
Get booklist
Change password
Download books
Search Books
Comment
Logout
69 | P a g e
4.9. Graphical User Interface Design
Home page
Login page
70 | P a g e
Admin page
User page
71 | P a g e
CHAPTER FIVE
5. CONCLUSIONS AND RECOMMENDATION
5.1. Conclusions
The Project culminated in the design and implementation of a library management system
application, meant to ease the processing of library . It is capable of storing and processing book
information with high speed and accuracy, and presenting output in certain required forms. It has
some qualities such as reduction in the cost of processing; reduction in time spent in computing
book’s information and elimination of duplication of effort which makes it overshadow the
manual system of book’s record keeping. The new system is flexible and can be modified to
suite any kind of record keeping and data processing. It uses graphical user interface (GUI)
rather than commandline approach, hence is easy to use, reasonably secure, and enforces data
integrity resulting from the use of a relational database management system. With this
application, the processing of Trainee’s’ results can be system to a large extent, thereby reducing
processing time and increasing accuracy.
72 | P a g e
5.2. Recommendations
According to the scope of our project the team develops web application. Because of the time
constraint we could not do beyond to our scopes, but in the future others developed included the
application futures like Attendance control system, seclude or timetable, able to download books
and reference, online payment, grad report. Also:-
Used for additional library system to select core literature in other disciplines.
Examine the expectations of academic libraries’ service to the broad public: what are the
roles of municipal, state, and federally supported institutions for public access and those
of private institutions?
Conduct analysis of how digitized collections, both special and general, are used and by
whom.
Foster the development of a registry of digitized collections that includes capture
information, metadata standards, and disposition of original source materials.
Foster the development of service bureaus that would offer scanning and archiving
services.
Foster the development of shared print repositories.
73 | P a g e
References
[3] ". M. Mukherjee, "Feasibility studies and important aspect of project management.,"
International Journal of Advanced, , Vols. no. 4,, pp. 98-100, , 2017.
[5] ". D. &. S. Rosenberg, "Use case driven object modeling with UML," Addison-Wesley," Use
case driven object modeling with UML," Addison-Wesley .
[6] ". ,. v. i. .. D. Bell, "UML basics:," The sequence diagram, pp. pp. 89-103,, 2015.
[8] J. R. 0. 1. JEFFERY A.HOFFER, " Modern system analysis and design," in (2004).(third
edition ed.)., 2022, pp. 137-150.
[11] ". J. Heumann, "Introduction to business modeling using the Unified Modeling Language,"
vol. 2.
[12] ". ,. D. Bell, "Uml basics:," The component diagram," IBM Global Services., , pp. 50-61,
2004..
74 | P a g e