Full Project Library
Full Project Library
2015
Table of Contents
List of Figures.............................................................................................................................................IV
List of Tables................................................................................................................................................V
Abstract.....................................................................................................................................................VII
Acknowledgment......................................................................................................................................VII
CHAPTER ONE..............................................................................................................................................2
1 .Introduction.............................................................................................................................................2
1.1 Background............................................................................................................................................3
1.2. Statement of the Problem....................................................................................................................3
1.2.1 Justification of the current system.................................................................................................3
1.3. Objectives.............................................................................................................................................4
1.3.1. General objectives.........................................................................................................................4
1.3.2. Specific objectives..........................................................................................................................4
1.4. Scope of the Project.............................................................................................................................4
1.5. Methodology........................................................................................................................................5
1.5.1. Data gathering tools......................................................................................................................5
1.5.2. Analysis and design........................................................................................................................6
1.5.3. System implementation method...................................................................................................7
1.5.4. Development tools and techniques...............................................................................................7
1.6. Significance of the Project....................................................................................................................8
1.7. Risk Assessment and Management......................................................................................................8
1.8. Operating Environment........................................................................................................................9
1.8.1. Hardware requirements................................................................................................................9
1.8.2. Software requirements..................................................................................................................9
1.9 Project Plan and Time Table..................................................................................................................9
1.10 Cost Estimation..................................................................................................................................11
1.10.1. Software development cost.......................................................................................................11
1.10. Project organization..........................................................................................................................12
CHAPTER TWO...........................................................................................................................................13
2.1 Introduction.........................................................................................................................................13
JJU Page I
2.2 The main activities...............................................................................................................................13
2.3 Functions of the Existing System.........................................................................................................14
2.4 Players of the Existing System.............................................................................................................15
2.5 Report Generating in the Existing System...........................................................................................15
2.6 Documents Used in the Existing System..............................................................................................16
2.7 Weakness of the Existing System.........................................................................................................16
2.8 Strength of the Existing System...........................................................................................................16
2.9 Alternative Solution.............................................................................................................................17
3.1 Introduction.........................................................................................................................................18
3.1.1 Purpose.........................................................................................................................................18
3.1.2 Intended Audience and Reading Suggestions...............................................................................18
3.1.3. Document Convention.................................................................................................................20
3.2 Objective.............................................................................................................................................21
3.3 Functional Requirements.....................................................................................................................21
3.4 Product Perspective.............................................................................................................................22
3.5 Product Functions................................................................................................................................22
3.6 Principal Actors....................................................................................................................................23
3.7 User Characteristics.............................................................................................................................23
3.8 General Constraints.............................................................................................................................23
3.9 Assumptions and Dependencies..........................................................................................................24
3.10 Non Functional Requirements...........................................................................................................24
3.11 System Models..................................................................................................................................26
3.11.1 Use Case Models.........................................................................................................................27
3.11.2 Use Case Descriptions.................................................................................................................28
3.11.3 Sequence Diagram......................................................................................................................38
3.11.4 Class Diagram/UML....................................................................................................................45
Diagram.................................................................................................................................................45
CHAPTER FOUR..........................................................................................................................................46
4.2 Design Goals........................................................................................................................................46
4.2.1 Performance Criteria....................................................................................................................46
4.2.2 Maintenance Criteria....................................................................................................................46
4.2.3 End User Criteria...........................................................................................................................47
4.3 System Architecture............................................................................................................................47
4.4 Subsystem Decomposition..................................................................................................................48
4.4.1 Login subsystem...........................................................................................................................49
4.4.2 Member management..................................................................................................................49
4.4.3 Book management.......................................................................................................................50
4.4.4 View report...................................................................................................................................50
4.4.5 Class Modeling..............................................................................................................................50
4.4.6 Documenting the Classes..............................................................................................................52
4.5 Deployment Diagram (Hardware/Software Mapping).........................................................................57
4.6 Persistent Data Management..............................................................................................................58
CHAPTER FIVE............................................................................................................................................60
IMPLEMENTATION AND TESTING..............................................................................................................60
5.1. INTRODUCTION..................................................................................................................................60
5.2. Algorithm Design / Coding..................................................................................................................60
5.3. Testing................................................................................................................................................62
5.3.1. Unit testing..................................................................................................................................62
5.3.2. Integration testing.......................................................................................................................62
5.3.3. System testing.............................................................................................................................62
5.4. Hardware and Software Requirements..........................................................................................64
5.4.1. Hardware Requirements..............................................................................................................64
5.4.2. Software Requirements...............................................................................................................64
5.6. User Manual.......................................................................................................................................65
5.9. Installation..........................................................................................................................................67
CHAPTER SIX..............................................................................................................................................68
6. CONCLUSION AND RECOMMENDATION...............................................................................................68
6.1. CONCLUSION......................................................................................................................................68
6.2. Recommendation...............................................................................................................................68
References.................................................................................................................................................69
Appendex..................................................................................................................................................70
List of Figures
Figure1. 1 Pictures that show the future aim of the project----------------------------------------------
Error! Bookmark not defined.
Table1.1cost estimation.............................................................................................................11
ID: Identification
Mid: member id
In addition, we would like to forward our special words of gratitude to Jigjiga University library
system librarian who helped us by providing information and by giving useful documents and
materials that are useful for our project.
We would also thank our Department and Our project coordinator without whom this project
would have been a distant reality.
ONLINE LIBRARY MANAGEMENT SYSTEM FOR JJU
2015
CHAPTER ONE
1 .Introduction
Library is one of the basic requirements that enable the functionality of all educational institutes.
In the university and college level the main criteria is also adjusted in library system. To obtain
enough amount and specified book without any restriction, online library management system is
obligatory [1]. We mean online library system, it is supported with automation system and its
work process should be based on computer aided. Library Management System is mainly focuses
on basic operations in a library like adding new member, new books, and updating new
information, searching books and members and facility to borrow and return books. It features a
familiar and well thought-out, an attractive user interface, combined with strong searching
Insertion and reporting capabilities.
The report generation facility of library system helps to get a good idea of which is the books
borrowed by the members,
JJU Page 2
1.1 Background
Jigjiga University is one of the higher institution established in eastern part of Ethiopia in Somali
region Jigjiga town. Jigjiga University was founded in 1999 E.C. It has no enough facility to
develop online Library management system at that time. From foundation, still now, the library
system uses manual system. So we have decided to develop online Library management system
for Jigjiga University that overcomes the problems of the existing manual system like academic
case, food, wastage of time, dormitory problem etc. Our new system will eliminate the problems
in the manual system and increase the speed of whole process.
Problems or weakness of the existing system is its manual operation that kills
much amount of time to complete a simple work.
In this, it also needs man powers for a long period of time.
The way of stack is almost with a manual check.
Insufficiencies of reference resources for some course users.
Our new system will help the office by providing support method to complete their tasks with a
simple difficulty and with few workers with little period of time.
This new system need to fulfill the automation plan of the office. Therefore we as developer or
as designer going to complete their plan by providing designed supportable website as much as
possible in our standard.
1.3. Objectives
1.3.1. General objectives
The general objective of this project is to develop interactive online library Management system
for Jigjiga University.
This project helps the workers to work without barrier of bad actions during their daily activity.
On the completion of this project we expect the system will have:
Search for specified book: using book’s unique information (i.e., book code, book title) to
check the availability of a given book.
The library manager who is responsible for this process can do the following with help of our
interface: -
1.5. Methodology
Method is the process and way we will use to develop this project. The project we proposed
will be started using requirements elicitation technique. The software process that we will be
using is iterative SOFTWARE development approach type since we will discuss and correct our
errors with our advisor frequently.
This method has been the primary base for the project. Therefore using the current and
background knowledge and experience of the team, the team will be able to identify and list out
the common functionalities and requirements for the project.
Observation: as our team member will detect in the university about the system. These will help
the team (us) to precede some data gathering stages. Furthermore, it creates a bridge or cause for
other methodology to conduct them in proper method.
Interview: This methodology encapsulates two types of methods. These methods are closed and
open interview. So the team has selected an open interview for interviewing the manager and
employees for recognizing the existing working procedure of the system. So the team will be
able to gather more information about the library system and requirements.
Document analysis: Besides the interviewing we also use the library general work document.
This document available in the office, that gives the directions for total activities. It is the paper
hard copy that gives the general function that the system currently handling.
After completing the development of the system, the testing process will be take place. This part
recognizes that the system works correctly or not, accurate or not, updates the features if
necessary. It will be carried out after all coding process completed. If this process realizes the
functionalities of the system and is ok, the product CD will be submitted to the Jigjiga university
library system that they can use this web technology for their further work process.
The users also use the library resources with safely and complete security without any time restriction.
Some of the significant for the project.
Time consuming
Reduce man power & budget
Avoid document or reference misplacing.
It ensuring the availability of library books in their proper place.
With less effort and cost, the system will be able to
maintain and store information.
Pen 5 15 Birr
CD 11 44 Birr
Total 0.00birr
1.10. Project organization
The project content: The project contains generally two phases: Phase І and Phase ІІ. Phase І
contains four chapters, introduction, Description of current system, Requirement Analysis and
Specification and system modeling using object oriented paradigm (oop). Phase II contains two
chapters. System Implementation and Testing and Conclusion.
Project Proposal: Before being starting a project we submit the proposal of the project to the
advisor that contain the aim of the project and discuss the methodology intended to use in
achieving those aims.
Progress report: We submit to our advisor periodically written progress of the project that
contain project title and full content of each chapter to be submitted. After carefully review our
work on the given chapter and the advisor comment which is correct and which need correction
again and give back for us.
Interim report: We submit the first phase of the project that contains four chapters at the end of
this semester and we give detail presentation of each chapter.
Final report: At the end of second semester we submit the second phase of the project that
contain System Implementation and Testing of the first phase and present it.
CHAPTER TWO
2.1 Introduction
This library management system contains the description of the existing system and the problem
that we are going to solve. This phase is pointing what the system needs and contains many
diverse activities and tasks that are extremely important to the overall success of the learning
solution. It also includes weakness, strengthens, documents used in the system, players of the
system and description (current system description), function of the existing system, alternative
solution currently the system use.
All of this activity is very complex and time loosing .The main reason for these problems is the
absence of any computer technology or web based system, which will bring a best solution by
reducing a time consumed by performing each activity
2.3 Functions of the Existing System
The existing system has major functionalities namely protection of total books, recording newly
entered books, supplies books to users, and controls the book security. Prepares the general
reports. Reports problems and the shortage of books to the target or responsible body and obtains
solution.
Member Management
Input: Name, Age, Id No, year, number of books taken.
Book Management
Input: Author, Title, Call number.
Returning
Input: Member Id No, Book code, Date of issue and Date of expiry.
Process: Librarian should check the issue book and pocket of the members.
Mostly the operations are based on forms of hard copy; this is not secured for wise protection of
books. The use of computer is rarely and the used software is also not comfortable to handle
easily. It is difficult to handle with this method so it needs rapid automation.
Administrator/ manager: is the responsible person in the library for managing and
coordinating the whole system. This service called as backline service which means that he/she
doesn’t contact with members.
Librarian/clerk: They provide front line service for the user/members and always have direct
contact with members.
Student and Teacher: are registered members who are authorized to issue articles from library.
Searching for a given reference is very difficult and rarely unable to get.
The office takes more employers or support workers when there is a load of work emerged. They
use other shelve workers to handle the current activities with a given period of time [2].In order
to provide the desired treatment for the users, the system uses different methods such as time
restriction; with the recorded treatment; arranged time table for certain applications like less
amounted books and internet service. This enables the system to manage the seasonal problems.
CHAPTER THREE
3.1 Introduction
Requirement gathering is a way of collecting information to improve or change the existing
system by the new system. Requirement is a major base for better solution or for solving
problem which exists in the current system by gathering requirement [3].The new system is
based on the interest and understanding of users. The sequences of activities which are
performed in the current system also affect the new developing system. To work in accordance
with interest of users and working process of current system there must be a clear understanding
of the way how activities are performed, what current system requires, what are the problems
that the current system faces, and what improvement should be done to make it a better system.
Having such kind of understanding helped us to distinguish parts which are going to be changed
in the new system and to determine how our system can solve the current problems and also able
to design other new features which are user interactive. To gather the information we used
interviewing and reviewing document (forms, reports). In addition to the above two methods we
observed how they perform their activities in the current system.
3.1.1 Purpose
Analyzing the current system and making requirement determination helped us to develop a
system which includes necessary information and source for different activities. Some of the
purposes of analyzing manual system are:-
To distinguish current problems in different categories based on the case and to find
solution to each. In case of finding solution we analyzed which parts of the existing
manual system has to be converted into new computerized system.
To design and develop different type of files, forms and report generating system based on
manual activity.
Possible use of a process model approach is to prescribe how things should be done in contrast to
the process itself which is really what happens. A process model is roughly an anticipation of
what the process will look like. What the process shall be will be determined during actual
system development
Spiral model
We use spiral model to work out our project because of the following reason.
User interface layer: the section of the assignment referring to what the user interacts with
directory
Use case: a broad level diagram of the project showing a basic overview
Search book: users can search for the book where necessary by the searching that can be done
according to title and Author.
Book Return Procedure: Student/user is required to return the book within the due date.
View book/member: users can also see the list of member/user who have not returned their
books even after due day from the date of issuing, in which system prints a detailed report of
the member who have not returned their books and their relevant information include the
book details.
Update: Any changes in the database either details information of books or members should be
updated
Delete member or book: Wrong or not allowed data entry to the system must be removed from
the database.
Issuing Procedure: Member/user can issue the respective book he/she needs .The procedure
checks for the case when the book is already issued by some other borrower or the book is not
present in the library and thus it is not available for issuing. The user is required to enter the
issuing date and then the validations for the date are performed .Also the procedure incorporates
automatic return date generations system as discussed previously. The return date must be
calculated with in specified time constraints.
Generate report: The system incorporates report generation and data filtering mechanisms.
Reports can be built on the following various criterions:
List different books present in the library with the columns separated under different
files. Author name, Edition number, ISBN and status of the book whether the book is
issued or not.
View the details of books currently issued.
View the books present in the library that is the books which have not been issued by any
of the borrowers.
Member detail who have issued the books with the details of the books and the respective
member’s details.
List of books which are requested by the members.
The authorized person (Manager) can perform update, delete, and insert operations on the books
as needed.
Librarian/clerk: They provide front line service for the user/members and always have direct
contact with members.
Student and Teacher: are registered members who are authorized to view and issue articles
from library.
Since the instructors or the other registered members of the college are the users of this software
system, they can provide their demands to the operators to view and use available resources for
their need.
Administer or head manager take over all control for this application in case of security,
checking and others.
Librarians perform by following the correct way as a system leads and respect the
manager instruction that related with time.
Book recorded in the book table with correct book ISBN as it entered into college and
functionally available for view.
Registered member can see the book detail by using correct username and password with
the permission of manager.
The application will used within any windows form.
User Interface: The developed system provides desktop application user interfaces that are
compatible for any windows operating system. For this reason the user of the system especially
the librarians who develop the collections is expected to know at least how to interact with this
application. The users or who navigate the other interface of the system to retrieve the collections
of the system is also expected to know basic understanding on how to navigate.
Software Interface: A firewall will be used with the application to prevent unauthorized access
to the system.
Security and Access permissions: We are going to develop a secured database for the College.
There are different categories of users namely administrator, library and member. Depending
upon the category of user the access rights are decided. It means if the user is an administrator
then he can be able to modify the entire data, delete, append etc., all other users other than library
staff only have the rights to retrieve the information about database. In another way
authentication is provided to all the users, only authenticated users can use.
No Redundancy: In the proposed system can be avoided reputation of data anywhere in the
database but there may reputation is case of data backup. This would assure economic use of
storage space and consistency of the data stored in the database.
Error handling: When the users of the system interact with the system errors may appear. To
control these inaccuracies the system will generate different messages. Data errors which are
entered in to the system may not be completely avoided but they can be minimized. To do this,
most of the system execution buttons will be controlled according to the sequence which the user
is expected to follow. Or this can be done by generating different system responses to the input
of the users.
System modification: Through time there are always changes when the user’s needs another
additional functionality, when the system administrator identifies the system need to be
modified, while the organizations work style is changed and depending on different reasons.
Some of the user interface and basic modification can be performed by the collection developers
but the system developers are the right persons to update the system
3.11 System Models
Analysis approach
The analysis approach that we used object oriented paradigm because of the following reason.
Reduced Maintenance: The primary goal of object-oriented development is the assurance that
the system will enjoy a longer life while having far smaller maintenance costs
Real-World Modeling: Object-oriented system tend to model the real world in a more complete
fashion than do traditional methods.
Improved Reliability and Flexibility: Object-oriented system promise to be far more reliable
than traditional systems, primarily because new behaviors can be "built" from existing objects.
High Code Reusability: When a new object is created, it will automatically inherit the data
attributes and characteristics of the class from which it was spawned.
3.11.1 Use Case Models
Description To interact with the system, LMS will validate its registration with this
system. It also defines the actions a user can perform in LMS.
Pre condition Any user must have user name and password.
Post condition System transfer control to user main screen to precede actions.
Alternative If users found the system display invalid user name and password error
condition: message. Then go to step 1.
A1
Post condition The user account, the system generates and sends user information to the
user.
Description The books in the library can be searched through parameters like title
(book name), Author.
Pre condition The book to be searched should have been registered in the database of
the library management system.
Basic flow of action 1. The staff or Librarian login to the system. A1
Alternative action:
A1 If the login is fail. The staff/member can enter user name and password
again.
A2
If the search is unsuccessful, then the Librarian should add that book.
Description End user can issue the respective book he/she needs.
Pre condition To borrow any book it is important that the member or other user;
member is registered with the library and the book to be borrowed is
available with the library.
Alternative action: If the login fails the librarian or administrator should enter user name and
password again.
A1
If the member search is unsuccessful and no data is found then the
A2
administrator should re-register the member.
Description The end user can return the books. Fine is charged if he/she submits the
book after the due date.
Pre condition The member and the staff member are registered and that book
4. The librarian should enter the call number of the book (title, author and
subject).A2
4. The librarian should check the report data for any pending fine.
5. The system display message no fine pending the book can be returned.
Alternative action : If the login fails the librarian or administrator should enter user name and
password.
A1
If the member search is unsuccessful and book data is not found then an
A2
administrator must enter the book and member ID in database.
Description It allows to modifying (changing) the details information of the book from
data base.
Pre condition Detail information the user must be recorded in the database.
Basic flow of action 1. The librarian logs to his account from the home page of the
JJULMS.A1
Alternative action: If the login fails the librarian should enter user name and password.
A1 If the data there is a mistake in the data entry the system displays error
message and allow making correction.
A2
Pre condition Detail information the user must be recorded in the database.
Basic flow of action 1. The librarian logs to his account from the home page of the
JJULMS.A1
Alternative action If the login fails the librarian should enter user name and password.
A1 If the data there is a mistake in the data entry the system displays
error message and allow making correction.
A2
Table3. 8 Remove book description
Description Wrong or not allowed data entry to the system must be removed from the
database. Or The old and damaged books are removed from the library.
Pre condition To delete the book must be part of the database or registered in the database
for the LMS.
Basic flow action 1.The Librarian logs to his account from the main page of the
JJULMS.A1
3. The System displays search options (title, subject and author) .A2
Alternative If the login is unsuccessful the librarian should enter user name and password
action: again.
Description Add new books to the library with all the details of the book.
Pre condition To add any book that book should have parameters like book name,
ISBN, printed date etc.
Basic flow action 1.The librarian logs to his account from the main page of the JJULMS.A1
A2
5. The system displays the searched result.
6. The librarian clicks on the Add button to add the new book.A3
Description System will show member current issue articles, transaction history.
Alternative action: If the users account not correct the system display error message and users try
again.
A1
If the user can not part of the library the system display error massage and
A2
users registered by administrator.
3.11.3 Sequence Diagram
Search Admin
Book
Title
BTitle Fname
Diagram
BCode
Code Lname
Author
Author User name
Mid Password
Published
Search () Login ()
Add B ()
Delete () Create
Update () account ()
Display () Update ()
Delete ()
Logout ()
Teacher/Stu
dent
Librarian
Issue Book Fname
* Lname Fname Lname Role type
BTitle Mcatagory
BCode
s Phone
Mid
E_mail
Category
Login () Role
Issue date Add ()
()
Delete ()
Issue () GenerateReport(
Update ()
Update () ) Logout()
Display ()
Display ()
Return Book
Mid
Due date
BCode
Return ()
Update ()
Display ()
SYSTEM DESIGN
4.1 Introduction
This chapter contains different tools and techniques to model the design of the project these are
deployment diagrams and decomposition diagrams which comes from different models of the
analyses model [3].
Our purpose of designing is to show the direction how this system built and to provide clear and
enough information needed to drive the actual implementation of the system. It is based on
understanding of the model the software built on. Our objective is to model the system with high
quality since the implementations of high quality system depend on the nature of design created
by the designing phase. If one wants to change the system after it has been put in to operation, it
depends on the quality of the system design [3].
The purpose of system architecture is the static structure of how our software will be built. The
only difference with that of analysis class architecture is that it focuses on domain solution rather
than problem domain and it introduce changes to our class model based on implementation
technologies in the project.
Figure4. 1 System architectures
The report subsystem consists of all functionalities of the system that produce report concerning
book operation and member operation. The reports might be in a paper form or data grid
depending on the type of report
Teacher/Student
+Fname: varchar(20)
+Lname: varchar(20)
Issue Book +Mcatagory: varchar(20)
Librarian
+Phone: varchar(20)
+BTitle: varchar(50) +E_mail: varchar(20) +Fname: varchar(50)
+BCode: varchar(20)
+Lname: varchar(50)
+Mid: varchar(20) AddM() +Role type: varchar(50)
+MCategory: varchar(20) Delete()
+Issue date:Date Update() Login() Role()
Display() GenerateReport() Logout()
Issue() Update() Display()
Return Book
+Mid: varchar(20)
+Duedate:Date
+BCode: varchar(20)
Return()
Updte()
Display()
Librarian’s class
Librarian’s class is a persistence class that is used to contain Librarian’s (circulator, clerk and
others) information and also called client it has the following attributes and methods.
Attributes
Methods
BEGIN
ACCEPT Librarians
VALIDAT profession
ELSE
AVOID unprofessional
END IF
END
Member CLASS
Member class is a user class that uses the systems application with registered authentication that
they have their user name and password. It has the following attributes.
ATTRIBUTES
Post condition: the member should be registered and available in data base.
Book class
This class performs the recording or adding process of the new entrance books to the library
database system.
ATTRIBUTES
Pre condition: the book should have been entered to the college library store and qualified.
Post condition: the books should be registered and available in book database.
Issue book
This is a sub class in book class that is used for Librarian’s to manage members those need for
this application. The members’ detail or information stored in database by using this part of
website.
Attributes
BEGIN
ACCEPT detail
VALIDAT complete
ELSE
END IF
END
Return book
This is also other sub class of book class which enables the Librarian’s to manage issued book in
order to replace the book in to book store accurately.
Attributes
Due date The date when the book should be returned Date
BEGIN
ACCEPT book
ELSE
END IF
END
Search
This class enables the users of the systems’ application to see the book details that exist in the
book database. It has the following attributes.
ATTRIBUTES
The attribute used her is either the book title or author for one user at a time.
5.1. INTRODUCTION
The Implementation phase in the software life-cycle is where the actual software is implemented.
The result of this phase consists of source code, together with documentation to make the code
more readable. This is what we call software implementation. The purpose of these activities is
to convert the final physical system specification into working model with reliable software and
hardware, document the work that has been done, and provide help for current and future users
and take care of the system.
Login class is a user interface class that is used to validate the authorization of the users to the
system with the help of account information.
Method
Is Valid (account): checks the validity of the user account and password.
BEGIN
ELSE
ENDIF
END
Class Book record is a persistence class that is used to record book data in database.
Methods
BEGIN
ELSE
ENDIF
END
END
BEGIN
END
5.3. Testing
The test plan is designed to analyze the logic used in the implementation of the Library
Management System. The tests will allow us to ensure correct program flow, and to determine
the error-handling capability of the system [6].
Once coding has begun, the testing process can be begin and proceed in parallel. As each
program module is produced, it can be tested individually, as a part of larger program, and then
as a part of larger system.
5.3.1.Unit testing
Unit test is a way of testing each of the system functionality independently. Accordingly the
team has tested each one of the three major activities and the rest accompanying activities
independently using different user input, different login mechanisms and any technique of fault
finding so that an incorrect functioning of the activities was corrected at the right time
5.3.2.Integration testing
By combining each individual form and report with their concerned database we had tested by
giving general data. From this we had understood and realized that how the system works using
separate module.
5.3.3.System testing
It is the final step of testing. In this system tested the entire system as a whole with all forms,
code, modules. In this we tested all the functionalities in the System. All errors in the forms,
functions, modules have been tested. Finally by the system testing we had ensured that the entire
integrated software system meets the desired requirements.
Password admin
Enter all valid filled and
Phone number 0920974103
Click Register button
Id 2090
Role librarian
5.4.1.Hardware Requirements
Computer
Printer
Step1
Step 2
After doing these steps again, copy the folder “HRMData” from the Developing Team then,
Step3
Step4
Installation is finished.
CHAPTER SIX
6.1. CONCLUSION
After we have completed the project we are sure the problems in the existing system would
overcome. The “LIBRARY MANAGEMENT SYSTEM” process made computerized to
reduce human errors and to increase the efficiency. The main focus of this project is to lessen
human efforts. The maintenance of the records is made efficient, as all the records are stored in
the ACCESS database, through which data can be retrieved easily. If the numbers of records are
very large then user has to just type in the search string and user gets the results immediately.
The editing is also made simpler. The user has to just type in the required field and press the
update button to update the desired field.
Our main aim of the project is to get the correct information about a particular student and books
available in the library.
The problems, which existed in the earlier system, have been removed to a large extent. And it is
expected that this project will go a long way in satisfying user’s requirements. The
computerization of the Library Management will not only improves the efficiency but will also
reduce human stress thereby indirectly improving human recourses.
6.2. Recommendation
This application software was developed for better use for the library management system of
Jigjiga University. The system handles major of the operations that carried out in the college like
registering new book entrance and manages the librarian daily attendance with specified period
of time. For this, we strongly recommend for the system users to use our new product to handle
their daily operations easily and secured report generation by printing the daily or weekly
activities.
References
For our further work, we used different necessary materials as references. Major of the
references we used were as follows.
2. Jigjiga College of Teacher Education library system work process printed materials.