[go: up one dir, main page]

0% found this document useful (0 votes)
65 views39 pages

MP 3rd FILE

The document provides details about a mini project report on developing a Library Management System. It includes an abstract, introduction, objectives of the project, hardware and software requirements, and outlines the overall structure with chapters on requirements analysis, system design, implementation, testing, results, and conclusions. The project aims to computerize the daily operations of the library to make it more efficient and reduce human efforts.

Uploaded by

Amit Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views39 pages

MP 3rd FILE

The document provides details about a mini project report on developing a Library Management System. It includes an abstract, introduction, objectives of the project, hardware and software requirements, and outlines the overall structure with chapters on requirements analysis, system design, implementation, testing, results, and conclusions. The project aims to computerize the daily operations of the library to make it more efficient and reduce human efforts.

Uploaded by

Amit Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 39

Mini Project Report On

LIBRARY MANAGEMENT SYSTEM

COMPUTER SCIENCE & ENGINEERING


MANGALMAY INSTITUTE OF ENGINEERING &
TECHNOLOGY
KNOWLEDGE PARK 2 GREATER NOIDA
MARCH 2022

Submitted By:
GAUTUM TYAGI
HIMANSHU SINGH
JANMEJAY KUMAR SINGH

TABLE OF CONTENTS
Abstract

Acknowledgment
Table of Contents
Table of Figures

CHAPTER 1: INTRODUCTION

1.1 Background
1.2 Objectives
1.3 Purpose, Scope and Applicability
1.3.1 Purpose
1.3.2 Scope
1.3.3 Applicability
1.4 Achievements
1.5 Organization of Report

CHAPTER 2: SURVEY OF TECHNOLOGIES

CHAPTER 3: REQIREMENTS AND ANALYSIS

3.1 Problem Definition


3.2 Requirement Specification
3.3Planning and Scheduling
3.4 Hardware and Software Requirement
3.5 Preliminary Product Description
3.6 Conceptual Models

CHAPTER 4: SYSTEM DESIGN


4.1 Basic Modules
4.2 Data Design
4.2.1 Schema Design
4.2.2 Data Integrity and Constraints
4.3 Procedural Design
4.3.1 Logic Diagram
4.3.2 Data Structures
4.3.3 Algorithm Design
4.4 User interface design
4.5 Security issues
4.6 Test Cases Design

CHAPTER 5: IMPLEMENTATION AND TESTING

5.1 Implementation Approaches


5.2. Coding Details and Code Efficiency
5.2.1 Coding Efficiency
5.3 Testing Approach
5.3.1 Unit Testing
5.3.2 Integrated Testing
5.4 Modification and improvements
CHAPTER 6: RESULTS AND DISCUSSION
6.1 Test Reports
6.2 User Documentation

CHAPTER 7: CONCLUSIONS

7.1 Conclusion
7.2 Limitation of the system
7.3 Future Scope of the Project
REFENCES
GLOSSARY
APPENDEX A
APPENDEX B

ABSTRACT
Library management system is a project which aims in
developing a computerized system to maintain all
the daily work of library. This project has many features which
are generally not available in normal library management
systems like facility of user login and a facility of teachers
login .It also has a facility of admin login through which the
admin can monitor the whole system .It also has facility of an
online notice board where teachers can student can put up
information about workshops or seminars being held in
our colleges or nearby colleges and librarian after proper
verification from the concerned institution organizing the
seminar can add it to the notice board . It has also a facility
where student after logging in their accounts can see list of
books issued and its issue date and return date and also the
students can request the librarian to add new books by filling the
book request form. The librarian after logging into his account
i.e, admin account can generate various reports such as
student report, issue report, teacher report and book report
Overall this project of ours is being developed to help the
students as well as staff of library to maintain the library in the
best way possible and also reduce the human efforts.
ACKNOWLEDGEMENT

We take this occasion to thank God, almighty for blessing us


with his grace and taking our endeavor to a successful
culmination. We extend our sincere and heartfelt thanks to our
esteemed guide, Mr. ARUNANGSHU PAL, for providing us
with the right guidance and advice at the crucial junctures
and for showing me the right way. We extend our sincere thanks
to our respected Head of the division Mr. BHUPENDRA
BHADANA, for allowing us to use the facilities available.
We would like to thank the other faculty members also, at this
occasion. Last but not the least, we would like to thank our
friends and family for the support and encouragement they have
given us during the course of our work.
1.1 BACKGROUND OF PROJECT

Library Management System is an application which refers to


library systems which are generally small or medium in size. It
is used by librarian to manage the library using a computerized
system where he/she can record various transactions like issue
of books, return of books, addition of new books, addition of
new students etc. Books and student maintenance modules are
also included in this system which would keep track of the
students using the library and also a detailed description about
the books a library contains. With this computerized system
there will be no loss of book record or member record which
generally happens when a non-computerized system is used.
In addition, report module is also included in Library
Management System. If user’s position is admin, the user is able
to generate different kinds of reports like lists of students
registered, list of books, issue and return reports. All these
modules are able to help librarian to manage the library with
more convenience and in a more efficient way as compared to
library systems which are not computerized.
1.2 OBJECTIVES

The project aims and objectives that will be achieved after


completion of this project are discussed in this subchapter. The
aims and objectives are as follows:

 Online book issue.

 Request column for librarian for providing new books.

 A separate column for digital library.

 Student login page where student can find books issued by


him/her and date of return.

 A search column to search availability of books.

 A teacher login page where teacher can add any events


being organized in the college
and important suggestions regarding books.

Online notice board about the workshop.

1.3 Purpose, Scope and Applicability


1.3.1 PURPOSE
The main purpose of this project is to develop a
computerized system that will manage the activities
in the library there by providing easy access of
library usage for librarian and users of the library, it will
also help librarians keep track of library information etc.
This system w i l l a l s o p r o v i d e e l e c t r o n i c   m e a n s
of storage and help librarians keep track
o f   l i b r a r y information.

1.3.2 SCOPE

The project product to be produced is a Library Management


System which will automate the major library operations. The
first subsystem is the registration of the users to the
system to keep track of authorized users to the system. The
second subsystem is the registration of new books into the
library management system to know when new books are
brought into the library. The third subsystem is a borrower
and return of books which is the major area needed by the
user. There are three end users for the Library Management
System. The end users are the admin, users and members.
1.3.3 Applicability

1.4 Achievements

1.5 Organization of Report


CHAPTER 2: SURVEY OF TECHNOLOGIES

CHAPTER 3: REQUIREMENTS AND ANALYSIS


3.1 Problem definition
Manual process of keeping student records, book
r e c o r d a c c o u n t   d e t a i l s , managing employee is very
difficult. There are various problems also faced by the student in
library such as finding any particular book, information whether
book is available or not, for what time this book will be
available, searching of books using ISBN number etc. To
eliminate this manual system, library management system has
been developed. It will handle all the current issues faced by the
students and by its admin personnel.
Presently, transaction of books in the institut ional
libraries have been done man ually in most cases,
thereby taking more time for transaction like borrowing of
books or return of books and also searching of member
and books. Series of problems occur as a result of this
thereby resulting to inefficient library management. In
most cases as a re sult of human error there may be
loss and damages of records due to not using a
computerized system in the library. Never the less, the
difficulty in the searching of books which could be termed
to be inadequacy in book Management is a problem in the
manual library thereby causing inefficiency and time
consuming in the library. Also the problem of space
consuming erupts after the number of records become large
the space for physical storage of file and records also increases
if no computerized system is implemented as well as the issue of
cost. Due to problem of lack of prompt information retrieval and
time wastage in using the library. In addition due to the
cumbersome, in this project computer approach will be used to
solve these problems. Each of the manual procedure will be
analyzed.

3.2 Requirement Specification

 PROCESSOR  INTEL CORE PROCESSOR 
OR BETTER PERFORMANCE

 OPERATING SYSTEM  WINDOWS VISTA, 
WINDOWS7, UBUNTU

 MEMORY  1GB RAM OR MORE

 HARD DISK SPACE  MINIMUM 3 GB FOR DATA
BASE USAGE FOR FUTURE
 DATABASE  MY SQL 
3.3 Planning and Scheduling

3.4 Hardware and Software Requirements

Hardware:
An x64-capable processor
o 2 gigabytes (GB) of available hard disk space.
o 2 GB or more of RAM A monitor with a resolution of
1024 × 768 .
o A CD-ROM or DVD-ROM drive.

Software:
o FRONT END: HTML5, CSS and JavaScript
o OPERATING SYSTEM: Windows XP, Windows 7,
Windows 8
o LANGUAGE: ASP .NET and Visual Studio
o DATABASE: MS SQL Server (back end)

3.5 Preliminary Product Description


nRF24L01+ 2.4GHz transceiver (250 kbps, 1 Mbps and 2 Mbps
air data rates)
• Fast microcontroller (8051 compatible)
• 16 kbytes program memory (on-chip Flash)
• 1 kbyte data memory (on-chip RAM)
• 1 kbyte NV data memory
• 512 bytes NV data memory (extended endurance)
• AES encryption co-processor
• 16-32bit multiplication/division co-processor (MDU)
• 10 bit ADC
• High flexibility IOs
• Serves a set of power modes from ultra low power to a power
efficient active mode
• Several versions in various small QFN packages: X 4x4mm
QFN24 X 5x5mm QFN32 X 7x7mm QFN48
• Support for HW debugger
• HW support for firmware upgrade

3.6 Conceptual Models

The conceptual model of present library system.


The conceptual model of our future library system.
CHAPTER 4 SYSTEM DESIGN

4.1 Basic Modules


The online library is one of the most convenient inventions ever
made, they are extremely handy to keep all our books stocked
and saved in soft copies. ‍‍The generation which we are living in
is the one where technology has made a huge impact on our
lives. Everything is computerized, because of which manual
work is performed less.
So when we talk about the library, why bother yourself by
performing all the library related stuff manually when it can be
managed with the help of the Library Management System. This
is how e- library performs.

Creating an Account:
This is the first step towards opening the door of magic for all
the book lovers. Simply register your name over the library
application by filling the necessary details such as contact
details, name, e mail address etc. And you’re ready to move
towards the next module.
Getting Familiar:
Once you’ve registered yourself, start clicking on every given
option to get an idea of what it does. Start searching for all the
available e books. Get to know the app.
Placing Order:
This is where a student or any registered person can place an
order for the books they’re looking for. When this task is done
manually it consumes a lot of time and is also burdensome at
times to search for the books a person is asking for. But with the
help of library management system the work is done very easily.
Interact:
Many a time’s students find it difficult to understand a particular
concept from the particular chapter of the book. But with the
help of library management software, one can have a group
discussion with the student or people who have proper
knowledge regarding the concept.

4.2 DATA DESIGN


4.2.1 Schema Design
A schema is the structure behind data organization. It is a
visual representation of how different table relationships
enable the schema’s underlying mission business rules for
which the database is created. Database schema defines its
entities and the relationship among them.

FIGURE LAGANA HAI

4.2.2 Data integrity and constraints

4.3 Procedural Design

4.3.1 Login Diagrams


LOGIN DIAGRAM FOR ADMINISTRATOR LOGIN
After entering to the home page of the website, administrator
can choose the ADMIN LOGIN option where they are asked to
enter username & password, and if he/she is a valid user then a
teacher login page will be displayed.

LOGIN DIAGRAM FOR STUDENT LOGIN


After entering to the home page of the website, student can
choose the STUDENT LOGIN option where they are asked to
enter username & password, and if he/she is a valid user then a
student login page will be displayed.
DIAGRAM OF THE PROPOSED SYSTEM
4.3.2 Data Structures
4.3.3 Algorithm Design
4.4 User interface design
User Interface
This user interface presented in the library management system
assignment shows the monthly summary report of book loan by
student.
For instance: in the given screen there are few attributes taken
from STUDENT and LOAN entities.
STUDENT attributes are as follows:
 Student_ID – Unique identifier of the student.
ISSUES attributes provided in the library management system
assignment are as follows;
 Loan – It is the unique identifier of BOOK.
 LOAN_date – It is the date on which book has been taken
on loan.
 Request ID – It is the unique identifier of the REQUEST
entity which stores the data of all requests made by the
students for borrowing the book
The amount represents the total fine on the book incurred by the
respective student.
Data entry screen
The screen provided in following section of library management
system assignment represents the registration / profile of new /
old student. The screen asks users to enter data in following
fields:
 First Name – It depicts the first name of the student.
 Last Name – It depicts the last name of the student.
 Address – It depicts the complete address of the student.
 Email – It depicts the contact email address of the student.
 Phone – It depicts the contact phone number of the student.
Along with these fields mentioned above within this library
management system assignment, two buttons are present –
“Save” and “Reset”. “Save” button shall submit the form and
sends details to the business logic layer. “Reset” button shall
erase all the entered data in the fields and do not any information
to the database.
Book loan input screen
The book loan screen attached in the next section of library
management system assignment shows the details of the student
and book to be loan. The screen has following fields:
 Book ID – Unique identifier of the book to be loaned.
 Loan date – It is the date on which book is sent for loan.
 Stock – It represents the total number of copies of book
available for loan.
 Request – It represents the total number of requests
received for the book to be loaned.
 Last booked by – It shows the details of student who last
took the book on loan.
 Student ID – Unique identifier of the student who is about
to loan the book.
 Name – Full name of the student who is about to loan the
book
4.5 Security Issues
Libraries around the world are quickly adopting technology to
better manage their inventory and staff. The problem for
libraries is that they can’t afford I.T. departments to help secure
data and the like, so there are always common risks that libraries
face. 
Inexperienced Staff
The problem most libraries have is that staff members delete
information on the system by accident (or on purpose) and, if
it’s not carefully backed up at regular intervals, such information
is lost forever. This can pose a significant risk to important
library information and data, so certain practices need to be
implemented in terms of good backup software to ensure this
doesn’t happen.

Unsecured Data Transfer


Libraries now send and retrieve data from databases to help
better manage inventory and the like, but some libraries don’t
have the right data encryption practices in place. This can often
lead to lost data and sometimes, the data easily obtainable by
criminals.
Staff Authentication
While inexperienced staff pose security risks in terms of loss of
information, it’s not just staff that have access to certain library
management systems. Because library management doesn’t
believe their library is a target, they’ll often not have the right
staff authentication procedures. This means that anyone can
come in off the streets and secure access to library management
systems to undertake certain criminal activities.
Invalid Content
Staff members will often need to look through emails from other
library professionals, and that means there is a risk when it
comes to downloading content onto the library system. Emails
can come from anywhere and, if staff members aren’t careful,
certain files can pose a risk to data and information on
databases. Libraries forget to implement practices so staff
members can’t download invalid content.
Lack of Tech Savvy Staff Members
Another security issue that many libraries are faced with is that
their staff members aren’t that savvy when it comes to
technology. Some members don’t understand how backups
work, and that means they’ll never know whether the
information is securely backed up at regular intervals. It’s
important that staff members know how data and security work
so they can better serve the library management system that’s
already in place.
Phishing Scams
As stated above, opening emails and downloading unknown
files can be very risky to library management systems, but isn’t
just emails that play a role. Sometimes, the opening of
unsecured web pages and downloading files for research
purposes can often lead to third party data extraction. Phishing
scams are a big problem when it comes to replicating data, so
security procedures need to come into play to prevent these type
of security risks from happening.
The above are just some of the many security issues that
libraries are faced with every day.
4.6 Test Case Design
Testing shall be conducted at various stages. First of all unit
testing will be conducted after completion of each module or
iteration of software development lifecycle. Thereafter, system
testing shall be performed to test the application from different
perspective. It checks whether the features are working without
any break in the application flow. User acceptance testing shall
be carried out to test whether the developed system fulfils the
expectations of end users.
Bottom-up testing methodology shall be used to conduct the
testing of the application. As per this methodology, first of all
the lower level functionalities shall be tested which are followed
by directly above them. This methodology provided in the
library management system assignment has been selected so that
units are tested before combining functionalities in order to
validate and verify the performance.
Following are two test plans which will be conducted to test the
proposed library management system:
White box test plan

Testing types – Following testing types will be conducted to


carry out the activities of white box test plan:
 Code coverage – Source code of the developed library
management system will be run and al the code lines are
verified to ensure that there are not errors present in the
developed code.
 Segment coverage – Segments of code are executed in this
type of testing in order to ensure that code’s performance is
adequate.
 Branch coverage – Every branch of code is executed in this
type of testing.
 Compound condition coverage – Following coverage of
conditions shall be done:
o Display home screen of the proposed LMS only to the

authenticated users who enter valid login credentials


or else display an appropriate error message.
o Provide loan data of the student on entering correct

student ID or else display an appropriate error


message.
o Allows users to register in the system if the entered

details generate unique ID or else ask users to enter


new details.
o Mark student as excellent if there has been on late fees

on any of the book loan; good if there is only 5% late


fee fine and poor if there are more than 10% of late fee
fines.
 Data Flow Testing – In this testing, validation of all
possible values in all the fields of the system need to be
validated.
 Loop testing – All loops are tested i.e. single, concatenated
and nested.

Black Box Test Plan


Testing Types - Following testing types will be conducted to
carry out the activities of black box test plan:
 Security testing – This type of testing ensures that system
satisfies the integration of security tools and controls in the
proposed system.
 Integration testing – This type of testing integrates modules
and test the performance of these integrated modules as a
whole.
 System testing – This type of testing includes testing of
functional aspects of the proposed application. All the
modules and requirements of the system are required to be
tested.
 Regression testing – Testing team will log various types of
bugs in the tool. The development team shall resolve those
bugs.
Test coverage matrix
CHAPTER 5. IMPLEMENTATION AND TESTING
5.1 Implementation Approaches
5.2 Coding Details and Code Efficiency
5.2.1 Code Efficiency
5.3 Testing Approach
5.3.1 Unit Testing
5.3.2 Integrated Testing
5.4 Modification and Improvements
CHAPTER 6. RESULTS AND DISCUSSION
6.1 Test Reports
6.2 User Documentation
CHAPTER 7. CONCLUSIONS
7.1 Conclusions
After we have completed the project we are sure the problems in
the existing system would overcome. The LIBRARY
MANAGEMENT SYSTEM process made computerized to
reduce human errors and to increase the efficiency. The main
focus of this project is to lessen human efforts. The maintenance
of the records is made efficient, as all the records are stored in
the ACCESS database, through which data can be retrieved
easily. The navigation control is provided in all the forms to
navigate through the large amount of records. If the numbers of
records are very large then user has to just type in the search
string and user gets the results immediately. The editing is also
made simpler. The user has to just type in the required field and
press the update button to update the desired field.
 
The Books and Students are given a particular unique id no.  So
that they can be accessed correctly and without errors. Our main
aim of the project is to get the correct information about a
particular student and books available in the library.
 
The problems, which existed in the earlier system, have been
removed to a large extent. And it is expected that this project
will go a long way in satisfying users requirements. The
computerization of the Library Management will not only
improves the efficiency but will also reduce human stress
thereby indirectly improving human recourses.
7.2 Limitation of the System
Without computers, as some libraries are, all of them are
dependent on paper work. When compared to computerized
systems, data backup and data retrieval systems are inefficient
and labor intensive.

Users of a paper based system become almost wholly reliant on


the librarians, for all levels of service, whether they are enquiries
about existing books, inter-library loans, or the availability of
books. There is additionally no real involvement of a user in the
entire process.

Researching which new books are required by users becomes


very difficult, and again, labor intensive. Librarians must be
consulted directly to find out the availability of a book since it
may already be issued to some other library user.

Furthermore, acquiring hard data on user trends and interests


within the library again becomes very hard with a paper based
system. Forms will need to be designed, printed off and handed
out. This is the kind of work that an online, library based survey
would improve on hugely.
7.3 Future Scope of the project
The impact of technology has greatly expanded the scope and
capacity of the average library. This is an on-going and
developing relationship as the computer's full capabilities are
gradually explored and applied to the library.

Computers have radically changed the way people learn and


communicate with
each other, as well as the library itself.

The library differs little from other institutions and firms in the
impact of computing technology on them. Changes are in the
almost unlimited tracking of the availability of books: Whether a
book has been issued or not is the work of moments, where
before it would have entailed a long search through a card index.

The availability of learning resources has been massively


expanded through access to the Internet, again facilitated by the
use of computer technology.
REFENCES

Best Library Management Systems include:

 Polaris ILS 

 Follett Destiny Library Manager

 EBSCO Stacks

 EBSCONET Subscription Management

 Spring share

 Ex Libris Alma

You might also like