Sie sind auf Seite 1von 46

“LIBRARY MANAGEMENT SYSTEM”

SUBMITTED IN PARTIAL FULFILLMENT OF THE DEGREE


OF
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

B.Tech C.S.E, 5th semester

SUBMITTED BY :

NEERAJ KUMAR 1186149

PARDEEP GARG 1186152

1
CONTENTS AT A GLANCE

1. DECLARATION ……………………. 5

2. ACKNOWLEDGEMENT ……………….. 6

3. SUMMARY ……………………. 7

4. OBJECTIVES AND PURPOSE

4.1 Purpose …………………………………. 8

4.2 Objectives …………………………………… 8

4.3 Project Scope …………………………………. 9

4.4 Advanced Technology ……………………………. 9

5. INTRODUCTION

5.1 Add New Books ………………………………….. 10

5.2 List of All Books ………………………………….. 10

5.3 List of Available Books …………………………….. 10

5.4 List of Issued Books ………………………………….. 10

5.5 Update and Delete Book Info. ………………………… 10

5.6 Add new Member …………………………………….. 11

5.7 Update and Delete Member Info. ……………………….. 11

5.8 Issued And return Book Detail …………………………… 11

2
5.9 View Detail ……………………………………………. 11

5.10 Edit Detail ………………………………………….. 11

6. HARDWARE AND SOFTWARE

6.1 Minimum Hardware Required …………………………….. 12

6.2 Minimum Software Required …………………………….. 12

6.3 Operating System ………………………………………….. 12

6.4 Other Non Function Requirements ………………………… 12

7. PROGRAMMING LANGUAGE AND DEVELOPMENT TOOLS

7.1 Java ………………………………………………………. 13

7.2 Several New Features of Java ………………………………. 13

7.3 Several Disadvantages Removed of C and C++ …………….. 16

7.4 Advantages of Java ………………………………………….. 17

7.5 Disadvantages of Java ……………………………………….. 18

7.6 DATABASE : MY SQL QUERY BROWSER …………….. 19

7.7 Introduction to MySql query browser ……………………… 20

8. METHODOLOGY

8.1 Welcome Form ……………………………….. 21

8.2 Administrator Login ……………………………………. 22

8.3 Student Login …………………………………………………. 25

3
9. RESULTS AND DISCUSSION

9.1 Feasibility Study ………………………………………………… 27

9.2 Feasibility Study of Library Management System …………………. 27

9.3 Economic Feasibility ……………………………………………….. 27

9.4 Technical Feasibility ……………………………………………….. 27

9.5 Problem Statement ……………………………………………….. 27

9.6 Project Functionality ……………………………………………….. 29

10 DATA FLOW DIAGRAM ……………………………………… 32

11. BIBLIOGRAPHY …………………………………. 34

12. ANNEXURE …………………………………… 35 - 48

4
DECLARATION
We hereby certify that the the project entitled “LIBRARY MANAGEMENT SYSTEM”,by

NEERAJ KUMAR (1186149) and PARDEEP GARG (1186152) in partial fulfillment of

requirements for the award of degree of B.Tech. (Computer Science & Engineering ) submitted in

the Department of Computer Science & Engineering at RIMT – INSTITUTE OF

ENGINEERING AND TECHNOLOGY, MANDI GOBINDGARH under PUNJAB

TECHNICAL UNIVERSITY, JALANDHAR is an authentic record of our own work carried out

under the supervision of Mr. VINOD BAGGA , JAVA DEVELOPER. The matter presented has

not been submitted by me in any other University / Institute for the award of B.Tech. Degree.

Neeraj Kumar (1186149 )

Pardeep Garg (1186152 )

This is to certify that the above statement made by the candidate is correct to the best of my

knowledge.

Vinod Bagga ( Java Developer )

5
ACKNOWLEDGEMENT

It is a pleasure that we find ourselves penning down these lines to express our sincere thanks to

the people who helped us along the way in completing our project. We find inadequate words to

express our sincere gratitude towards them.

First and foremost we would like to express our gratitude towards our training guide Mr. Vinod

Bagga , for placing complete faith and confidence in our ability to carry out this project and for

providing her time, inspiration, encouragement, help, valuable guidance, constructive criticism

and constant interest. He took personal interest in spite of numerous commitments and busy

schedule to help us complete this project. Without the sincere and honest guidance of our project

guide we would have not been able to reach the present stage.

Neeraj Kumar

Pardeep Garg

6
SUMMARY
This is a project report on “LIBRARY MANAGEMENT SYSTEM”. During the making /

developing of this project we explored new ideas and functionalities behind the working of

notepad.

This project is the output of our planning, schedule, programming skill and the hard work. This

report reflects our steps taken at various levels of programming skill, planning and schedule.

We have learnt a lot during this project and liked the improvement in our testing skills and deep

concept related to these kinds of projects.

Our project is LIBRARY MANAGEMNT SYSTEM.

Library Management System can be used by education institutes to maintain the

records of Library easily. Achieving this objective is difficult using amanual system

as the information is scattered, can be redundant and collecting relevant information

may be very time consuming. All these problems are solved using this project

7
OBJECTIVE AND SCOPE

PURPOSE:

Library Management System is an application that will :

1 . Enable the Administrator to Add New Books into the Library Database.

2 . Enable the Admin to View List of All Books , All Available Book , All Issued Books.

3.. Enable the Admin to Update Student/Member Information , and Admin can also Delete Book

Record from database.

4. Admin can Add new Member/Student into database

5. Enable the Admin to Issue Books to Students/Members and Update their information and

Delete their Record from database.

6.. In Student login Section , Students Can View Their Detail , Update Their Information.

7. Students can also check the books which are issued by them.

OBJECTIVE:

Objectives of this project are :

1. Easy Handling of All the books.

2. Easy Handling of new registration of books.

3. Easily Searching of books and issue them to students/members.

4. Easily Updation and Deletion of Books.

5. Registration of new member in very effective manner.

6. Seaching of Member Detail , Updation of detail and Deletion of Member is also very easy.

7. Result Generation is also done in interesting manner .

8
PROJECT SCOPE:

The scope of the project is wide. The objective of this document is to analyze the managing

system and formulate the scope and objective of the proposed automated system. It also analyses

the some alternative solutions about different other queries. The document shall be alternative

solution about other queries. The document shall be guide to develop a prototype for the

proposed system.

ADVANCE TECHNOLOGY:

Before the automation all the work was managed manually. Because of the enormous amount of

paper work the chances of errors were more. The problems faced before this software was

introduced are:

1. Manual Registration – All the registrations were done manually and was very cumbersome
i.e. separate registers were maintained.

2. Difficult To Retrieve – Any kind of searching was time consuming.


3. Difficult To Update – Any kind of updation was time consuming.
4. Difficult to Verify – Any kind of verification such as account verification was time
consuming.
5. Insecure – Large books or registers were less secure.
6. Data Redundancy – Lot of data was duplicated and inconsistent.

1. INTRODUCTION
As mentioned earlier, the project is all about storing and managing the data related to books and

student . Also the project helps admin to view the details at any time and at any place. About the

9
working of our project, we plan to include the few basic options which deal with recording,

retrieving, registration or updating.

There are two sections ….

1 . Administrator Login

2. Student Login

In Administrator Section … theis are following functions available

1.1. ADD NEW BOOK

Administrator can add new books to the database at any time.When new book is added into the

database a Unique Book Id is generated for that book.

1.2. LIST OF ALL BOOKS

Administrator can view the list of all the books that are in library. A table is shown in which all

books that are in library, are shown.

1.3. LIST OF AVAILABLE BOOKS

Administrator can also view the list of books that are avaialale at any current time.Table shows

the list of those books which are not issued yet.

1.4. LIST OF ISSUED BOOKS

Administrtaor can also Vies the List of those books which are currently not available i.e. which

are currently issued by students/members.

1.5. UPDATE AND DELETE BOOK INFO.

Administrator can also Update/ Edit the Information/Detail of any book which is not issued by

any student at the time of updation.He can also Delete the record of any book.

1.6. ADD NEW MEMBER

10
Admin can Add New Members/Student to database at any time.When a new member is added a

unique Student Id/Member Id is generated for that Student/Member.

1.7. UPDATE AND DELETE MEMBER INFO.

Admin is responsible for Updating the information/Detail of any Student.He is also responsible

for deleting the detail of any student at any time.

1.8. ISSUE AND RETURN BOOK

Admin is fully responsible for issuing a book to student and also responsible for taking issued

book back from that studebt/member.

A Unique Student Id is generated for every student. If Student wants to login into their account

then he/she should enter his/her Student Id and Password. A Student can perform following

actions after login into their account.

1.9. VIEW DETAIL

Students can view theie detail after login into their account.

1.10 EDIT DETAIL

Students can also Update or Edit their detail After login into their account.

2. HARDWARE AND SOFTWARE

2.1. MINIMUM HARDWARE REQUIREMENTS:

11
Processor P3 500Mhz or above

Memory 256MB RAM


Hard Disk 100MB free hard disk space
Monitor CRT or LCD monitor

2.2. MINIMUM SOFTWARE REQUIREMENTS:

Operating system with the java installed.

MYSQL Query Browser.

2.3. OPERATING SYSTEM:

Microsoft Windows XP service pack 2 or higher versions.

2.4. OTHER NONFUNCTIONAL REQUIREMENTS:

2.4.1 Performance Requirements

System should provide the accurate information according to the requirements of the user and the

retrieval of data should be fast.

System should be efficient, precise and easy to maintain.

2.4.2 Safety Requirements


The database used for this project should be backed up on routine basis in order to protect the loss of

data or damage resulted due to any reason i.e. proper backup and recovery procedure should be there.
2.4.3. Security Requirements

System should be capable of handling all types of malicious attacks made by intruders. System

should not provide access to any unauthorized

3.PROGRAMMING LANGUAGE AND

DEVELOPEMENET TOOLS

3.1 JAVA :

12
JAVA is a programming language originally developed by James Gosling at Sun Microsystems

(which has since merged into Oracle Corporation) and released in 1995 as a core component of

Sun Microsystems’ Java platform. The language derives much of its syntax from C and C++ but

has a simpler object model and fewer low-level facilities. Java applications are typically

compiled to byte code (class file) that can run on any Java Machine (JVM) regardless f computer

architecture. Java is a general-purpose, concurrent, class-based, object-oriented language that is

specifically designed to have as few implementation dependencies as possible. It is intended to let

application developers “write once, run anywhere” (WORA), meaning that code that runs on one

platform does not need to be recompiled to run on another. Java is as of 2012 one of the most

popular programming language in use, particularly for client-Query Browser web applications,

with a reported 10 million users. Object-oriented programming is at the core of Java. In fact, all

Java programs are objectoriented—this isn’t an option the way that it is in C++, for example.

OOP is so integralto Java that you must understand its basic principles before you can write even

simple Java programs. To manage increasing complexity, the second approach, called object-

oriented programming, was conceived. Object-oriented programming organizes a program

around its data (that is, objects) and a set of well-defined interfaces to that data. An object-

oriented program can be characterized as data controlling access to code.

3.2 SIGNIFICANT NEW FEATURES OF JAVA:


3.2.1 Platform Independence
Many types of computers and operating systems are in use throughout the world— and many are
connected to the Internet. For programs to be dynamically downloaded to all the various types of

platforms connected to the Internet, some means of generating portable executable code is needed. As

you will soon see, the same mechanism that helps ensure security also helps create portability. Indeed,

Java’s solution to these two problems is both elegant and efficient.


3.2.2 Object Oriented

13
Although influenced by its predecessors, Java was not designed to be source-code compatible

with any other language. This allowed the Java team the freedom to design with a blank slate.

One outcome of this was a clean, usable, pragmatic approach to objects. Borrowing liberally

from many seminal object-software environments of the last few decades, Java manages to strike

a balance between the purist’s “everything is an object” paradigm and the pragmatist’s “stay out

of my way” model. The object model in Java is simple and easy to extend, while simple types,

such as integers, are kept as high-performance nonobjects.

3.2.3 Robust

The multiplatformed environment of the Web places extraordinary demands on a program,

because the program must execute reliably in a variety of systems. Thus, the ability to create

robust programs was given a high priority in the design of Java. To gain reliability, Java restricts

you in a few key areas, to force you to find your mistakes early in program development. At the

same time, Java frees you from having to worry about many of the most common causes of

programming errors. Because Java is a strictly typed language, it checks your code at compile

time. However, it also checks your code at run time. In fact, many hard-to-track-down bugs that

often turn up in hard-to-reproduce run-time situations are simply impossible to create in Java.

Knowing that what you have written will behave in a predictable way under diverse conditions is

a key feature of Java.

3.2.4 Multithreaded

Java was designed to meet the real-world requirement of creating interactive, networked

programs. To accomplish this, Java supports multithreaded programming, which allows you to

write programs that do many things simultaneously. The Java run-time system comes with an

elegant yet sophisticated solution for multiprocess synchronization that enables you to construct

14
smoothly running interactive systems. Java’s easy-to-use approach to multithreading allows you

to think about the specific behavior of your program, not the multitasking subsystem.

3.2.5 Security

As you are likely aware, every time that you download a “normal” program, you are risking a

viral infection. Prior to Java, most users did not download executable programs frequently, and

those who did scanned them for viruses prior to execution. Even so, most users still worried

about the possibility of infecting their systems with a virus. In addition to viruses, another type of

malicious program exists that must be guarded against. This type of program can gather private

information, such as credit card numbers, bank account balances, and passwords, by searching

the contents of your computer’s local file system. Java answers both of these concerns by

providing a “firewall” between a networked application and your computer. When you use a

Java-compatible Web browser, you can safely download Java applets without fear of viral

infection or malicious intent access to other parts of the computer. The ability to download

applets with confidence that no harm will be done and that no security will be breached is

considered by many to be the single most important aspect of Java.

3.2.6 Compiler/Interpreter Combo

Code is compiled to byte codes that are interpreted by Java Virtual Machine (JVM).

This provides portability to any machine for which a virtual machine has been written.

The two steps of compilation and interpretation allow for extensive code checking and improved

security.

3.3 Several dangerous features of C & C++ eliminated

No preprocessors.
No memory pointers.
Array

15
Automatic Memory Management

Automatic garbage collection - memory management handled by JVM.

3.3.1 Security

No memory pointers

Programs run inside the virtual machine sandbox.

Array index limit checking.

3.3.2 Dynamic Binding

The linking of data and methods to where they are located, is done at run-time.

New classes can be loaded while a program is running. Linking is done on the fly.

Even if libraries are compiled, there is no need to recompile code that uses classes in those

libraries. This differs from C++, which uses static binding. This can result in fragile classes for

cases where linked code is changed and memory pointers then point to the wrong addresses.

3.3.3 Good Performance


Interpretation of byte codes slowed performance in early versions, but advanced virtual machines
performance up to 50% to 100% the speed of C++ programs.
3.3.4 Threading
Lightweight processes, called threads, can easily be spun off to perform multiprocessing.
Can take advantage of multiprocessors where available
Great for multimedia displays.

3.4 ADVANTAGES OF JAVA:


3.4.1 Java is easy to learn

Java was designed to be easy to use and is therefore easy to write, compile, debug and learn than

other programming languages.

3.4.2 Java is object-oriented

Java allows you to create modular programs and reusable code.

3.4.3 Java is platform-independent

16
One of the most significant advantages of Java is its ability to move easily from one computer

system to another. The ability to run the same program on many different systems is crucial to

World Wide Web software, and Java succeeds at this by being platform-independent at both the

source and binary levels.

3.4.4 Java is distributed

inherently integrated into it. Writing network programs in Java is like sending and receiving data

to and from a file.

3.4.5 Java is secure


Java considers security as part of its design. The Java language, compiler, interpreter, and runtime

environment were each developed with security in mind.


3.4.6 Java is robust

Robust means reliability. Java puts a lot of emphasis on early checking for possible errors, as

Java compilers are able to detect many problems that would first show up during execution time

in other languages.

3.4.7 Java is multithreaded

Multithreaded is the capability for a program to perform several tasks simultaneously within a

program. In Java, multithreaded programming has been smoothly integrated into it, while in other

languages, operating system-specific procedures have to be called in order to enable

multithreading.

3.5 DISADVANTAGES OF JAVA:


5.5.1 No separation of specification from implementation

Java classes are not divided into specification and implementation parts. Lacking such a

separation, he would at least like to be able to write prototypes for methods, which Java doesn’t

allow except within an abstract class or interface.

17
3.5.2 No preconditions and postconditions

Java, like most languages, has no such support for preconditions and postconditions.

3.5.3 No support for genericity

Java lacks support for writing generic data structures and methods.

3.5.4 No enumeration types


Java lacks enumeration types entirely, although they can be simulated by creating a series of named
constants.
3.5.5 No local constants

In Java, variables that belong to a class can be made constant by declaring them to be final.

Variable that are local to a method cannot be declared final, however.

3.5.6 Exceptions not caught within a method must be declared as thrown by that

method

For introductory students, Exception Handling is a sequence of ugly, unintelligible syntactic

marks.

3.6 DATABASE: MYSQL Query Browser

3.6.1 What is MYSQL?

MYSQL stands for Structural Query Language.


MYSQL lets you access and manipulate databases.
MYSQL is an ANSI (American National Standards Institute) standard.
3.6.2 What can MYSQL do?
MYSQL can execute queries against a database.
MYSQL can retrieve data from a database.
MYSQL can insert records in a database.
MYSQL can update records in a database.
MYSQL can delete records from a database.
MYSQL can create new databases.
MYSQL can create new tables in a database.
MYSQL can create stored procedures in a database.
MYSQL can create views in a database.
MYSQL can set permissions on tables, procedures, and views.

18
3.7 INTRODUCTION TO MYSQL QUERY BROWSER:

MYSQL query Browser is an MYSQL-compliant RDBMS. MYSQL-compliant means it uses the

ANSI (American National Standard Institute) version of Structured Query Language or

‘MYSQL’. Structured Query Language is a command that allow us to modify or retrieve

information from the database. It works on client Query Browser environment. Client Query

Browser means that MYSQL Query Browser is designed to store data in the central location (the

Query Browser) and deliver it on demand to numerous other locations.

Microsoft MYSQL Query Browser is a relational database management system (RDBMS)

produced by Microsoft. Its primary query language is Transact-MYSQL, an implementation of

the ANSI/ISO standard Structured Query Language (MYSQL). An RDBMS stores and retrieves

data for multiple sources.

At the center of any MYSQL relational database implementation is the MYSQL Query Browser.

This is the software platform (usually multi-user) that manages the database itself. It has much in

common with traditional Query Browser implementations in that the user model consists of an

administrative ‘super user’, various user groups and users all with authentication.

Microsoft MYSQL Query Browser and the Oracle family are the two best-known commercial

MYSQL implementation.

19
4. METHODOLOGY

4.1 WELCOME FORM:

The project flow begins with the WELCOME FORM. This form provides the user with the three

options:

Admin Login

Student Login

• The hierarchy is as shown below:

20
ADMINISTRATOR LOGIN provides the facility for the admin to login to his account

and then access the various services or controls.


STUDENT LOGIN provides the facility for the student to login to his account and then

access the various services.


.

4.2 ADMIN LOGIN:

After the admin presses the ADMIN LOGIN button, the LOGIN FORM opens which asks for

the “User Name” and “Password”. After filling the fields with correct entries the ADMINMENU

opens.

ADMIN MENU provides the various options to admin for accessing various controls over the

system. The various options provides with the updating, registration, recording, etc.

The various options include:

1. ADD NEW BOOK


2. VIEW LIST OF ALL BOOKS
3. VIEW LIST OF AVAILABLE BOOKS
4. VIEW LIST OF ISSUED BOOKS
5. SEARCH BOOK

21
6. DELETE BOOK FROM DATABASE
7. ADD NEM MEMBER/STUDENT
8. SEARCH STUDENT DETAIL
9. EDIT STUDENT DETAIL
10. DELETE STUDENT RECORD
11. ISSUE A BOOK TO STUDENT
12. TAKING BACK BOOK FROM STUDENT
13. LOGOUT

All the above options provide flexibility to the managing record. This helps inn saving the

time and even the paper work. This results in less errors and complications. We

implemented some dynamic databases like Student_record, , id_result, etc. to implement the

above updation options easily.

OPTIONS FUNCTIONS
Add New Book Enables the admin to register a new book in the

database newbooks and newbooks1


List of All Books Enables the admin to view the list of all the books which

are in library.
List of Available Books Enables the admin to view the list of those books which

currently present in library and available for issue.


List of Issued Books Enables the admin view the list of all those books which

are issued to studens with their book id and Student

Id ,who issue them. .


Edit Book Detail Enables the admin Edit the book detail if that book is

currently not issued by any member.

Delete Book Detail Enables the admin to Delete Book Record from

newbooks database.

22
Add New Member Enables the admin to Add New Student with his/her

detail like Student Name, Roll No. , Mobile No. ,

Branch , etc in newstudent database.

View List of all Students Enable the admin to view the list of all the students

which are registerd.


Edit Student Detail Admin can Update Student detail from databse

newstudent.
Delete Student Record Admin can also be able to delete a particular student

record fom newstudent database if there is no book

issued by that student at the time of deletion.


Issue Book Enables the admin Issue book to any student if that book

is available in the library.


Return Book Enables the admin to take back issued book from

student and add that book back to databse newbook and

show avaialability yes and delete that book from student

database newstudent.
Search Book/Student Detail Enables the admin to Search Student/Book Detail from

Database.

Hence by implementing dynamic databases we have made updation, registration and

management work easier as well as flexible for the user. This innovation makes our project stand

out from the rest of the projects. The dynamic databases we used in our project are:

newbooks,newbooks1,newstuden etc.
4.3 STUDENT LOGIN:

After the student presses the STUDENT LOGIN button, the STUDENT WELCOME PAGE

opens. This window provides the student with five buttons:

23
SHOW DETAILS

EDIT DETAILS
VIEW ISSUED BOOK
By clicking on SHOW DETAILS button the REGISTRATION FORM opens which show all the

details of student like student id,username, branch , rool no. mobile no. etc. student can only view

his/her details but cant edit it.:

24
By clicking on the EDIT DETAILS button the REGISTRATION FORM opens. This form shows

all the basic information of student and if student want to do any changes then student can easily

update the entries with the data from the database student_record.

By clicking on ISSUED BOOK button ISSUED BOOK PAGE will be open in form of form.

5. RESULTS AND DISCUSSIONS

5.1 FEASIBILITY STUDY:


Feasibility study is done so that an ill-conceived system is recognized early in definition phase.

During system engineering, however, we concentrate our attention on four primary areas of

interest. This phase is fairly important as before starting with the real work of building the system

it was very important to find out whether the idea thought is possible or not. This evaluates the

systems and provides for the selection of the best system that meets the system performance

requirements. Three key considerations are involved in the feasibility analysis:


Economic Feasibility
Technical Feasibility

25
Operational Feasibility

5.2 Feasibility study of LIBRARY MANAGEMENT SYSTEM:

Yes, the Library Management System can be implemented and its various types of feasibilities

are given below:

5.3 ECONOMIC FEASIBILITY:


In the cost benefit analysis of this project can be clearly seen that the benefits of the existing

project are very much higher than its cost running manually.

5.4 TECHNICAL FEASIBILITY:


The Library Management System is technically feasible. The only things required are a computer

with appropriate configuration and MYSQL Query Browser.


5.5 PROBLEM STATEMENT:
Project risk is the main problem for any project. The top most software project risk that may
affect the successful completion of project is:
RISK 1: Inherent schedule flaws
Explanation: Software development, given the intangible nature and uniqueness of software, is

inherently difficult to estimate and schedule.


Solution: We have selected basic features that can be implemented in given time constraints.
RISK 2: Specification Breakdown
Explanation: When coding and integration begin it becomes apparent that the specification is

incomplete or contains conflicting requirements.


Solution: Continuously studying existing project to understand requirements of project to take

necessary decisions as soon as possible.


RISK 3: Requirement Inflation
Explanation: As the project progresses more and more features that were not identified at the

beginning of the project emerge that threaten estimates and timeliness.


Solution: We have selected basic features that can be implemented in given time constraints.
RISK 4: Poor Productivity
Explanation: Given long project timeliness, the sense of urgency to work in earnest is often

absent resulting t time lost in early project stages that can never be regained.
Solution: Given a deadline, people tend to wait until the deadline is nearly here before starting

work. By having short iterations,, work is time boxed into a manageable iteration(typically 1-2

weeks) and there is always a sense of urgency.

26
Security mechanisms are implemented at Login page. Programmatic security refers to security-

aware applications. Programmatic security is useful when declarative security alone is not

sufficient to express the security model of an application. For example, an application might

make authorization decisions based on the time of the day, the parameters of a call, or the internal

state of an enterprise bean or Web component. Another application might restrict access based on

user information stored in a database. Often, you need to protect resources to ensure that only

authorized users have access. Authorization provides controlled access to protected resources.

Authorization provides controlled access to protected resources. Authorization is based on

identification and authentication. Identification is a process that enables recognition of an entity

by a system, and authentication is a process that verifies the identity of a user, device, or other

entity in a computer system, usually as a perquisite to allowing access to resources in a system.

Authorization is not required to access unprotected resources. Because authorization is built upon

authentication, authentication is also needed to access unprotected resources. Accessing a

resource without authentication is referred to as unauthenticated or anonymous access.


Safety: Protecting Software

Protect software by never sharing the password and looking out for suspicious links and behavior.

To keep the data save, change the password regularly.

Keep software username, password and personal information secret, and change the password

regularly.

Scan your computer regularly for viruses, spy ware and ad ware.
5.6 PROJECT FUNCTIONALITY:

First of all a Welcome Screen/Splash Screen is displayed.After that a Login Page is displayed,

which contain two login Options Either ADMINLOGIN or STUIDENT LOGIN.

5.6.1 ADMIN LOGIN:

27
Once You Select Admin Login Option , then a new Login Page for Admin is Open. For Login

Into Admin Section , one has to enter the UserName and Password. If username and Password is

matched , then AdminWelcome screen is opened. Adminwelcome screen contain various

functions which can be performed by Administrator.Some them are as follows:

1 . ADD NEW BOOK : Admin Can Add Books into the database. A unique book id is generated

for every new book.

2 . LIST OF ALL /AVAILABLE /ISSUED : Admin can view various lists of books.For e.g.

Admin can view list of all books , list of available books , list of issued books.

3 . EDIT / DELETE BOOK RECORD : Admin can also Edit Book record . Admin can also

Delete a book record from database if that book is not issued by any student at the time of

deletion.

4. ADD NEW STUDENT : Admin can Add New Student/Member with unique Student Id and

his/ger detail like student name , roll no. , branch , address , mobile no. ,email id , password etc.

5. LIST OF ALL STUDENTS : Admin can view the list of all the students which are member of

library.

6. EDIT / DELETE STUDENT : Admin can Edit / Delete Student detail from Database. A student

record is deleted if and only if there is no book issued to that student at the time of deleting

his/her record from the database.

7. ISSUE BOOK : Administrator is fully responsible for issuing a book to student with book id

and student id. Book is issued to student if and only if that book is available in the library.

8 . RETURN BOOK: Admin is also responsible for taking issued book back from the student and

add that book in the list of available books again.

9. LOGOUT : After performing the required operations Admin can logout from his/her account.

28
5.7 STUDENT LOGIN:

Once You Select Student Login Option , then a new Login Page for Student is Open. For Login
Into Student Section , one has to enter his/her STUDENT ID and PASSWORD. If Student Id and

Password is matched , then Student Welcome screen is opened. Studentwelcome screen contain

various functions which can be performed by that Student.Some them are as follows:

1. VIEW DETAIL : Student can view his/her Detail

2. EDIT DETAIL : Student can Edit/Update his/her own Detail.

3. VIEW ISSUED BOOKS : Students can see a list of those books which are issued by

them currently.

4. LOGOUT : After performing required operations Students can logout from their accounts.

29
6. DATA FLOW DIAGRAM

LEVEL1 DFD

BOOKS

STUDENTS

LOAN
LOAN

ADMINISTRATOR SYSTEM

HELP

LOGOUT

30
LEVEL 2 DFD
Store in newbbooks

Book Id and Other New Books


Detail newbooks
List of all
books
All Book

BOOKS
List of All Books
Avaialable
List of available
books
Administrator
Enter Book ID Edit/Delete

Edit/Delete Book Record


Store in
newstudents

STUDENTS New Student newstudent

List of all
students
Pass Student Id All Students

Result
Edit/Remove

Wrong Student Id If Student Id Matched


Enter Book Id and
Student Id
Issue Books
LOAN
Book Issue
Add into Student
Account

If Book Id or Student Id not


Matched Book Return

Enter Book Id Delete from issue book list and


add into available books

Search Search Book

If Book Id Matched then get Book Detail from new books

Enter Student Id
Search Student

If Student Id Matched then get Student Detail from new student

31
7. BIBLIOGRAPHY
Books:

1. Beginning Java Objects: From Concepts to Code -by Jacquie

Barker)

2. The Complete Reference Java(McGrawhill; Herbert Schildth-

reprint 2008)

3. Gary Cornell and Cay S. Horstmann, Core Java, second ed., SunSoft Press,

1997.

32
8. SCREEN SHOTS OF THE PROJECT

33
34
35
36
37
38
39
40
41
42
43
44
45
46

Das könnte Ihnen auch gefallen