Beruflich Dokumente
Kultur Dokumente
SUBMITTED TO:
SESSION: 2016-2019
WEBSITE: www.nerimindia.org
1
CECRTIFICATE OF APPROVAL
This is to certify that the project work entitled “SCHOOL LIBRARY MANAGEMENT
SYSTEM” carried out by BIPLAB ACHARJEE bearing exam Roll No 31520006,
Registration No 16320594 under the guidance of DR. TARALI KALITA has been found
satisfactory and is hereby approved as a project work carried out and presented in a manner
required for its acceptance in partial fulfillment of minor project work of BCA 6th semester
under Dibrugarh University, Dibrugarh, Assam.
(________________) (_________________)
2
CERTIFICATE FROM HOD
This is to certify that the project work entitled “SCHOOL LIBRARY MANAGEMENT
SYSTEM” is carried out by BIPLAB ACHARJEE bearing exam roll no 31520006
registration no 16320594 of NERIM GROUP OF INSTITUTIONS under the guidance of
DR. TARALI KALITA in partial fulfillment of minor project work of 6th sem of 3 year
full time BCA course under Dibrugarh university, Dibrugarh, Assam is accepted by the
Department of Computer Science, NERIM, Guwahati.
NERIM
3
CERTIFICATE FROM INTERNAL GUIDE
This is to certify that the project work entitled “SCHOOL LIBRARY MANAGEMENT
SYSTEM” is a bonafied work carried out by BIPLAB ACHARJEE bearing exam Roll No
31520006, Registration No 16320594 Of BCA 6th Sem of 3 Year full Time BCA course
under Dibrugarh University at NERIM GROUP OF INSTITUTIONS under my personal
supervision and guidance. The report is found worthy of acceptance for the partial
fulfillment of Major Project of BCA 6th Sem under 3 Year Full Time BCA program under
Dibrugarh University, Dibrugarh, Assam.
All helps received have been duly acknowledged and no part of this report has been
reproduced for any other degree or diploma.
Assistant Professor,
NERIM
4
PROFORMA FOR SUBMISSION OF STUDENT PROJECT
PROPOSAL
Date: Date:
5
ACKNOWLEDGEMENT
I deeply express my sincere thanks to our head of the department Dr. Hillol Kanti
Bhattacharjee for encourage me. It is my sheer privilege to express my sincerest regards to
my internal project guide Dr. Tarali Kalita for her valuable inputs, able guidance,
encouragement, whole-hearted cooperation and constructive criticism throughout the
duration of my project.
I would like to take the opportunity to express my gratitude to all the teachers who have
directly or indirectly helped in my project.
Biplab Acharjee
Roll No
6
DECLARATION
( ______________ )
Biplab Acharjee
7
CONTENTS
CHAPTER 1: INTRODUCTION 10-13
1.1 Brief Description of the Organization
1.2 Title Of the project
1.3 Project definition
1.4 Drawbacks Of the Existing system
1.5 Proposed System and Objectives
8
CHAPTER 6: FRONT END DESIGN 36-42
6.1 Input Design.
CONCLUSION 51
BIBLIOGRAPHY 52
9
CHAPTER 1:
INTRODUCTION
10
1.1 BRIEF DESCRIPTION OF THE ORGANISATION:-
11
1.2 TITLE OF THE PROJECT:-
The project titled “School Library Management System” is Library management software
for monitoring and controlling the transactions of a library in a school. The project “School
Library Management System” is developed in Visual Basic 6.0, which mainly focuses on
basic operations in a library like adding new member, new books, and updating new
information, searching books and members and facility to borrow and return books.
In our existing system all the transaction of books are done manually, So taking
more time for a transaction like borrowing a book or returning a book and also for searching
of members and books. Another major disadvantage is that to preparing the list of books
borrowed and the available books in the library will take more time, currently it is doing as
alone day process for verifying all records. So after conducting the feasibility study we
decided to make the manual Library management system to be computerized.
12
1.5 PROPOSED SYSTEM AND OBJECTIVES:-
All the manual difficulties in managing the Library have been rectified by implementing
computerization.
13
CHAPTER 2:
FEASIBILTY
STUDY
14
The initial investigation points to the question the project is feasible or not. A
feasibility study is conducted to identify the best system that meets all the requirements.
This includes an identification description, a valuation of the proposed system and selection
of the best feature for the system. Here the study is conducted in four ways such as
economic, technical, behavioral feasibility and operational feasibility.
Economic analysis is the most frequently used method for evaluating the effectiveness of
the candidate system. More commonly known as cost/benefit analysis, the procedure is to
be determining the benefits and savings that are expected from a system and compare them
with costs. The proposed system is economically feasible because the system is less time
consuming, the system will provide fast and secure environment thereby reducing the
chances of error. The system will also require very less man power thereby reducing costs
and increasing benefits.
Technical feasibility centers around the existing computer system(hardware and software
etc.) and to what extend it support the proposed addition. In this project, all the necessary
cautions have been taken care to make it technically feasible. Using a key the display of
text/object is very fast. Also, the tools, operating system and programming language used in
this localization process is compatible with the existing one.
15
2.3 BEHAVIORAL FEASIBILITY:-
People are inherently resistant to change, and computers have been known to facilitate
change. An estimate should be made of how strong a reaction the user staff is likely to have
toward the development of a computerized system. The software that is being developed is
user friendly and easy to learn. In this way, the developed software is truly efficient and can
work on any circumstances, tradition, locales.
The main concern is to ensure operational feasibility of the system. The system that will be
developed will solve the problem that business encounters. The necessary solutions are
applied to the organization will be more at ease in their day to day operation. The
demanding tasks that are quite time consuming are minimized and lessen by applying
efficient methods with the use of the system.
16
CHAPTER 3:
SOFTWARE REQUIREMENT
GATHERING,ANALYSIS AND
SPECIFICATION
17
3.1 FUNCTIONAL REQUIREMENTS
The functional requirements specification documents the operations and activities that a
system must be able to perform. It is designed to be read a general audience. Readers should
be able to understand the system, but no particular technical knowledge should be required
to understand the document.
The main purpose of the system is to perform basic operations in a library like adding new
member, new books, and updating new information, and facility to issue and return books.
The system will allow admin to login and perform their own individual functions. Let us
study these functions in detail:
18
7 Return Books Admin can approve return Mandatory
for books which are issued requirement
by the member.
8 Report generation Admin can view the Mandatory
details of all the requirement
members,books,issue
details,unreturned books
placed between two dates.
1) The users must be able to access their account 24 hours a day, seven days a week.
2) Better component design to get better performance at peak time.
3) The system is supposed to take as less time as possible to respond to any event.
4) It should provide error message whenever any undesired event takes place.
19
CHAPTER 4:
HARDWARE AND
SOFTWARE
SPECIFICATIONS
20
4.1 HARDWARE SPECIFICATION OF THE CLIENT MACHINE
NEEDED:
HDD : 80 GB or higher
21
CHAPTER 5:
SYSTEM
ANALYSIS AND
DESIGN
22
System analysis is a detailed study of the various operation performed by a system and their
relationship within and outside the system. It is a systematic technique the refines goals and
objectives. The goal of the system development is to deliver the system in line user
requirement. And analysis is the heart of this process. One of the best approaches to the
system analysis is the structured analysis.
Structured analysis is a set of technique and graphical tools that allows us to develop new
kind of specification that is easily understandable to the developer. It is the detailed step by
step investigation of the related procedure to see what must be done and to determine the
best way of doing it. The objective is to build a system specification that provides the basis
for design and implementation.
DFDs show the flow of data from external entities into the system, showed how the data
moved from one process to another, as well as its logical storage. There are only four
symbols:
5.2 ER DIAGRAM:-
23
technique that can help define business processes and be used as the foundation for
a relational database.
EXTERNAL ENTITY
PROCESS
DATA FLOW
DATA STORE
OUTPUT
24
SYSMBOLS USED FOR E-R DIAGRAM: -
ENTITY
RELATION
ATTRIBUTE
KEY_ATTRIBUTE
25
CONTEXT DIAGRAM:-
Issue_info
Book_Entry
Member_entry
Login SLMS REPORT
ADMIN Acknowledgement
Return_Info 0
IssueDate
26
Level 1 DFD:-
Login_info User
Login
0.1
Book_info,member_info Books
Entry
0.2
Book_info,Member_info
Update
Member
0.3
Issue_info
Issue
Transactions
0.4
Return_info
Return
0.5
ReportGen
0.6
27
Level 2 DFD (For Entry):-
Book_info Book
Books
Entry
0.2.1
0.2.2
0.3.1
Member
Member_info
Update Member
0.3.2
28
E-R Diagram:-
Publisher
Rdate
Idate Name Subject
ID Author
Issue / N Books
Return
Price
bDate
Borrowed NoofBooks
Name Age
M
ID Member Class
Section
mDate
Bookstatus Address
29
5.3 DATA DICTIONARY
30
5.4 MODULE DESCRIPTION
This module starts when the admin logs in to the system by providing valid userid and
password.
This module starts when the admin wish to add a new books to the system. The admin can
add any new books by entering all the necessary and valid descriptions such as publisher,
book name, author, price and many more.
This module starts when the admin wish to add a new member to the system. The admin can
add any new member by entering all the necessary and valid descriptions such as class,
member name, class, section and many more.
This module starts when a member issue a book and the admin needs to approve the
transaction. If the transaction is succesfull, appropriate message will be displayed.
This module starts when a member returns a book and the admin needs to approve the
transaction. If the transaction is succesfull, appropriate message will be displayed.
This module starts when the admin wish to view all the reports such as member details.
Books details, books issue details, unreturned books details.
31
5.5 DATABASE DESIGN: -
FOR USER
FOR MEMBER
Age text
Class text
Section text
Address text
Bookstatus text
MDate Date/time
32
FOR BOOKS
Publisher text
Subject text
Author text
Price text
Bdate text
Barowed number
NoofBook Date/time
FOR TRANSACTIONS
33
5.6 NORMALIZATION
Normalization is the process by which we efficiently organize data to achieve the following
goals:
Eliminating redundancy
Ensuring data is stored in the correct table
Eliminating need for restructuring database when data is added.
There are five levels of normal form but Third Normal Form is sufficient for most typical
database applications. The table in my system “School Library Management System” are
normalized. Let us study in details:
1. ADMIN TABLE
i. FIRST NORMAL FORM: It is in first normal form because the fields
“userid” and “password” have no repeating values and has only a single
value. There are no repeating or duplicate fields. Each record is unique.
ii. SECOND NORMAL FORM: It is second normal form because all they non
key fields i.e. “password” completely depends on the primary key i.e.
“userid”.
2. MEMBER TABLE
i. FIRST NORMAL FORM: It is in first normal form because the field “ID”
is atomic and cannot be divided further. It does not have repeating value.
Each record is unique.
ii. SECOND NORMAL FORM: It is in second normal form since there is no
partial dependency of any of the non-key column on the primary key “ID”.
34
3. BOOKS TABLE
i. FIRST NORMAL FORM: It is in first normal form because the field “ID”
is atomic and cannot be divided further. It does not have repeating value.
Each record is unique.
ii. SECOND NORMAL FORM: It is in second normal form since there is no
partial dependency of any of the non-key column on the primary key
“ID”.
4. TRANSACTION TABLE
i. FIRST NORMAL FORM: It is in first normal form because the field “ID”
is atomic and cannot be divided further. It does not have repeating value.
Each record is unique
ii. SECOND NORMAL FORM: It is in second normal form since there is no
partial dependency of any of the non-key column on the primary key “ID”.
35
CHAPTER 6:
FRONT END
DESIGN
36
6. FRONT END DESIGN
2. Add Books
37
3. Add Member
4. New Issue
38
5. Book Return
6. Update Books
39
7. Update Member
40
9. List of all members
41
11. List of unreturned books
42
CHAPTER 7:
TESTING
43
7.1 UNIT TESTING: -
Unit testing emphasizes the verification effort on the smallest unit of software design i.e. a
software component or module. Unit testing is a dynamic method for verification, where
program is actually compiled and executed. Unit testing is performed in parallel with the
coding phase. Unit testing tests units or modules not the whole software.
The log in function will enable the administrator to log in to the system by proving a valid
user-id and password.
44
Through manage Books; admin can view the books that are already in the system.
Through manage Members; admin can view the members that are already in the system.
45
Through delete member, admin can delete the member.
46
7.2 INTEGRATION TESTING: -
Integration testing is the phase in software testing in which individual software modules are
combined and tested as a group. It occurs after unit testing and before validation testing.
The purpose of integration testing is to verify the functional, performance and reliability
between the modules that are integrated.
ADMIN
47
7.3 SYSTEM TESTING
System testing is a level of the software testing where complete and integrated software is
tested. The purpose of this test is to evaluate the system’s compliance with the specified
requirements. It involves the external workings of the software from the user’s perspective.
After performing the above unit tests and integration tests, let us now test the system as a
whole in accordance with the test cases.
1) If the admin can login to the site, he/she will able to add books, view books, delete
books and update them as well. He/she will be also able to issue and generate issue
reports.
2) If the admin can login to the site, he/she will able to add members, view members,
delete members and update them as well.
3) The admin cannot issue without logging in to the system and will not be able to
access the main interface and view, add books and members to the system.
48
CHAPTER 8:
FUTURE SCOPE
49
FUTURE SCOPE OF THE PROJECT
The future scope of the project includes that what all future enhancements can be done in
this system to make it more feasible to use. While developing the software, though we have
tried our best to fulfill all necessities of the organization, there is every possibility of some
drawbacks in the software. Those drawbacks can be overcome by further modifying in the
sphere of security and if a backup system is developed. Again rest of the need is to change
its appearance so that it becomes more users friendly.
We can add many new scopes and features to the system “School Library Management
System” in order to make it more reliable, secure and user friendly.
50
CONCLUSION
While developing the system a conscious effort have been made to create and
develop a software package, making use of available tools, techniques and resources
– that would generate a proper system.
While making the system, an eye has been kept on making it as user-friendly, as
cost-effective and as flexible as possible. As such one may hope that the system will
be acceptable to any user and will adequately meet his/her requirements.
Working on this project was a good experience. It taught how important every step
is in developing software, from collecting user requirements to planning and giving
proper coding to every design.
51
BIBLIOGRAPHY
BOOKS REFERED:
WEB SITES:
https://www.w3schools.com
https://www.scribd.com
https://www.tutorialspoint.com
52