73
Development of Library Automation Software SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIRENMENTS FOR THE DEGREE OF Master of Technology in Computer Science and Engineering by Satish Kumar Khitoliya [06CS6020] under the guidance of Dr Anupam Basu Department of Computer Science and Engineering Indian Institute of Technology Kharagpur May 2008

Development of Library Automation Software - ERNETpabitra/facad/06CS6020t.pdf · Development of Library Automation Software ... 2.2 Data Flow Diagram ... In chapter 4 we shall discuss

Embed Size (px)

Citation preview

Development of Library Automation Software

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIRENMENTS FOR THE DEGREE OF

Master of Technology

in

Computer Science and Engineering

by

Satish Kumar Khitoliya

[06CS6020]

under the guidance of

Dr Anupam Basu

Department of Computer Science and Engineering

Indian Institute of Technology

Kharagpur

May 2008

Acknowledgements

This M.Tech. thesis is the result of development performed under the guidance of Dr.

Anupam Basu at the Department of Computer Science and Engineering of the Indian

Institute of Technology.Kharagpur.

I am Deeply grateful to my advisor Dr. Anupam Basu for having given me the

opportunity of working as part of under guidance and the huge amount of time and effort

they spent introducing me to the basics of Library management system, helping me

choose a problem to study, and guiding me through several difficulties on the way.

Without the help, encouragement and patient support I received from my guides this

thesis would never have materialized.

Satish Kumar Khitoliya

Department of Computer Science and Engineering

Indian Institute of Technology,

Kharagpur 721302, INDIA

May 2008

ii

Certificate

This is to certify that the thesis titled Development of Library Automation Software

submitted by Satish Kumar Khitoliya to the Department of Computer Science and

Engineering in partial fulfillment for the award of the degree of Master of Technology is

a bonafide record of work carried out by them under my guidance. The thesis has fulfilled

all the requirements as per the regulations of this institute and, in my opinion, has reached

the standard needed for submission.

Dr Anupam Basu

Department of Computer Science and Engineering

Indian Institute of Technology

Kharagpur 721302, INDIA

May 2008

iii

Abstract

This thesis deals with the procedures related to analysis, design and implementation of

Library system. It is a low-volume real time transaction processing system intended for

small or medium size libraries. It is designed to provide such library functions as library

cataloging, patron registration, circulation and reference services based on a relational

databases management system.

This is an integrated system that contains both user component and the librarian

component. The goals are to enhance access and improve delivery of information in

various prints and non-print formats for resource sharing.

The aim of project is to create access to databases, accelerate documents to user and gives

us complete information about the library.

iv

List of Contents ________________________________________________ Introduction.........................................................................................................................

1.1 An overview......................................................................................................1

1.2 Motivation ........................................................................................................2

1.3 Objective ..........................................................................................................2

1.4 Overview of Thesis ............................................................................................2

Design metholodogy............................................................................................................

2.1 Uses case Diagram .............................................................................................3

2.2 Data Flow Diagram ............................................................................................4

2.3 Entity Relationship Diagram ..............................................................................7

2.4 What are Entities and Relationships .....................................................................8

2.4 Symbole used in E-R Diagram and its mapping .....................................................8

2.5 Sequence Diagram ........................................................................................... 11

Implemantation...................................................................................................................

3.1 Keyword used.................................................................................................. 15

3.2 Front End Java ..........................................................................................................15

3.3 Back-End Microsoft SQL 2000…………………………………………………… .16 3.4 Plateform(Linux/Window)…………………………………………………………..17 User Manual ........................................................................................................................

4.1 Before You Login ............................................................................................ 18

4.2 Getting J2SE Development Kit (JDK).......................................................................18

4.3 Getting J2SE Runtrme Environment (JRE)……………………………………. …...19 4.4 Java Servlet Development Kit (JSDK)................................................................ 20

v

4.5 Start the Servlettunner Utolity ........................................................................... 19

4.6 Start a web Browser and Request the Servlet....................................................... 19

4.7 Microsoft SQL Server 2000 .............................................................................. 19

4.8 Executing for First time .................................................................................... 20

4.9 Getting Microsoft SQl Server 2000 Root Password.............................................. 21

4.10 Using SQL to Communication with Microsoft SQL Server 2000......................... 22

4.11 Creating a Databases in Microsoft SQL Server 2000 .......................................... 22

4.12 Selecting a JDBC Driver to Microsoft SQL Server 2000 ........................................22

Databases Mnagement-Cataloguing.............................................................................. 23

5.1 Relational Databases tables Degin...............................................................................24

5.2 Primary Key and Foreign Key .....................................................................................26

5.3 Syntax of Foreign key..................................................................................................26

5.4 Participation constraint and key constraints ................................................................27

5.5 Associative entity and Unary Relationships ................................................................28

Online Public Acess Catalouge (OPAC) ...........................................................................

6.1 Simple Search ............................................................................................................. 28

6.2 Advanced Search ........................................................................................................ 28

6.3 Additional Search........................................................................................................ 29

6.4 Search by ISBN Number…………………………………………………………….29

6.5 Search by Accession Number ..................................................................................... 29

6.6 Journal Search............................................................................................................. 29

6.7 Help............................................................................................................................. 29

Circulation-Transaction.....................................................................................................

7.1 Self Checking(Issue Books)........................................................................................ 30

7.2 Check-Out (Return Books) ......................................................................................... 33

7.3 Reserved Books .......................................................................................................... 36

7.4 Create Member Record ……………………………………………………………...38

vi

7.5 Delete Member Record ............................................................................................... 40

7.6 Genrate Remainder Message ...................................................................................... 42

7.7 Dispose-of Books........................................................................................................ 42

7.8 Delete Dispose-of Books ............................................................................................ 43

Experimental Results...................................................................................................... 47

Conclution........................................................................................................................ 60

Bibliography ................................................................................................................... 61

vii

List of Figures

2.1.1 Use Case Diagram...................................................................................................... 3

2.2.1 Static Context or 0 Level Data Flow Diagram.....................................................5

2.2.2 Level 1 Data Flow Diagram..............................................................................6

2.2.3 Data Flow Diagram .........................................................................................7

2.3.1 Entity RelationShip Diagram..................................................................................10

2.4.1 Sequence Diagrame for Book Handle .............................................................. 13

2.4.2 Sequence Diagram for Search Book Details...........................................................14

8.1.4 Sequence Diagram for Book(s) Issue ............................................................... 33

8.2.4 Sequence Diagram for Return Book(s)...................................................................35

8.3.3 Sequence Diagram for Book Reseve………………………………………………38 8.4 .1 Sequence Diagram for Create Member..................................................................40

8.6.1 Sequence Diagrame for Genrate Remainder...........................................................43

8.7.1 Sequence Diagrame for Disposed Book(s) ....................................................... 44

8.8.1 Sequence Diagram for Delete Diposed Book(s) ................................................ 46

9.1.1 The Home Page............................................................................................. 47

9.2.1 Simple Search ............................................................................................... 48

9.2.2 Advanced Search........................................................................................... 48

9.2.3 Additional Search.......................................................................................... 49

9.2.4 Search by ISBN Number ................................................................................ 50

9.2.5 Search by Aceesion Number........................................................................... 51

9.2.6 Journal Search............................................................................................... 51

9.3.1 System Administration authentication.................................................................... 52

9.4.1 Inserting Member ID for Issuing Book(s) Module Level Scuirty ............................52

9.4.2 Before Issuing Book(s) .........................................Error! Bookmark not defined.53

9.4.3 Inserting ISBN Number and Account No. for Issuing Book(s)...............................53

9.4.4 Successfully Book(s) Issued .....................................................................................54

viii

9.4.5 Before Returning Books ...........................................................................................54

9.4.6 Successfully Book(s) are Return...............................................................................55

9.4.7 Result if Book(s) are already Returned.....................................................................55

9.4.8 Before Re-Issuing Book(s) ...................................................................................... 56

9.4.9 Book(s) are Successfully Re-Issued......................................................................... 57

9.5.1 Add Member Record……………………………………………………………….58

9.5.2 Insert Member Record Successfuly ......................................................................... 58

9.5.3 Add Book(s) Record ................................................................................................ 59

9.5.4 Insert Successfully Book(s) Record......................................................................... 60

ix

List of Tables

Fig: 2.3.1 Entity Relationship Diagram ........................................................................ 11

x

Chapter 1

Introduction

1.1 An overview

Library Automation software, also known as an automated library management

system is a software that has been developed to handle basic housekeeping functions of a

library. The function may be either single function or integrated and realizing the

important role of library management system will play in planning and implementing

library automation projects.

It is an enterprise resource planning system for a library used to track items

owned, orders made, bills paid, and patrons who have borrowed and usually comprised of

a relations databases, software to act on that database, and two graphical user interfaces.

The basic purpose of this project to identify requirements for the library

management system which capable of supporting a union catalogue and other is

document retrieval from databases, the retrieval information contained may be

publication of books, journals articles, or technical report. With the exception of

automatic full text searching the information content of the documents is represented in

the form of a surrogate such as a set of index terms, the information in the documents is

accessed via the surrogates and the output of the system is a reference to a document

rather than the information itself.

1

1.2 Motivation Library corresponds to the very essential integrated part of any premier institute

which reveals the academic infrastructure capacities and potential to achieve novel work

in the field of education. Hence to maintain a good library is the huge task and I am very

much motivated to aim the library management system as my project work.

1.3 Objective The main objective of this project is provided complete solution for library

automation, management and accelerates transmission of document to user; generate

outcomes and evolutions via a library management information system

1.4 Overview of this thesis

In Chapter 2, I discussed Design methodology as UML, DFD, Entity-Relationship

and Sequence diagram. In chapter 3, I discussed keywords which are used for our project.

In chapter 4 we shall discuss overall set-up for running client-server architrature and how

a server listen client request and give response for a static page. In chapter 5, I discussed

our databases management (cataloguing) module, designed relational databases tables, its

relationship, mapping, constraints define, roll of primary key and its corresponding

foreign key. In chapter 6, I discussed our OPAC module which offered as an add-on

module. The main aim of this module related query searches. In chapter 6, I discussed our

Circular-Transaction module which used for the creation, storage, retrieval and

management of bibliographic records and/or indexes and defines the record format used

in the database and provides for authority control author, subject headings, useful for

Handles circulation activities such as lending, return, renewal, and place on hold manages

library materials - circulation type, location, status profiles, privileges; and other

transactions such as computation and payment of overdue fines, lost books etc. and in

chapter 7, I presented experimental results of our modules and finally in chapter 8, I

presented my conclusions.

2

Chapter 2

Design Methodology

2.1 Use case diagram

A use case diagram is a type of behavioral diagram defined by the Unified

Modeling Language created from a use case analysis. Main purpose is to present a

graphical overview of the functionality provided by the system in term of actors, the goal

represented as use case and any dependedencies between use cases. It shows various

activities thus users can perform on the system, and system something performs a

function. The model shows dynamic aspects of system and user provides perspective of

the system.

Fig: 2.1.1 Use case diagram

3

2.2 Data Flow Diagram

A data flow diagram is a significant modeling technique for analyzing and

constructing information processes. DFD literally means an illustration that explains

the course or movement of information in a process. DFD illustrates this flow of

information in a process based on the inputs and outputs. A DFD can be referred to as

a Process Model. Additionally, a DFD can be utilized to visualize data processing or a

structured design.

A designer usually draws a context-level DFD showing the relationship

between the entities inside and outside of a system as one single step. This basic DFD

can be then disintegrated to a lower level diagram demonstrating smaller steps

exhibiting details of the system that is being modeled. Numerous levels may be

required to explain a complicated system.

Data flow diagrams can be used to provide a clear representation of any

function. The technique starts with an overall picture of flow of data and continues by

analyzing each of the functional areas of interest. This analysis can be carried out to

precise the level of details required. The technique exploits a method called top-down

expansion to conduct the analysis in a targeted way. The result is a series of diagrams

that represent the business activities in a way that is clear and easy to communicate.

Initially a context diagram is drawn, which is a simple representation of the entire

system under investigation. This is followed by a level 1 diagram; which provides an

overview of the major functional areas of the business. Using the context diagram

together with additional information from the area of interest, the level 1 diagram can

then be drawn.

The level 1 diagram identifies the major processes at a high level and any of

these processes can then be analyzed further - giving rise to a corresponding level 2

process diagram. This process of more detailed analysis can then continue through

4

level 3, 4 and so on. However, most investigations will stop at level 2 and it is very

unusual to go beyond a level 3 diagram.

There are different sets of symbols used for data flow diagram, depending on

accepted conventions, the symbol used in the data flow diagram are:

1. Process: A process is a unit of work that operates on the data the process may

be automated or manual, on -line, batch or real time. The symbol for a process

is a rounded rectangle.

2. Data flow: A dataflow is a named flow of data through a system of processes.

A data flow is shown as a directed line on the diagram.

3. Data store: A data store is a logical repository or data. It may be an automated

file, a paper file etc. A data store is shown as an open-ended rectangle.

4. External agent: An external agent is a source or destination of data. The

external agent is a source or destination of data. The external agent is depicted

by an overlapping rectangle.

Library Management System

Fig 2.2.1 Static context diagram of LMS

5

6

Fig: 2.2.3 Level 2 Diagram

7

2.3 Entities Relationship Diagram

An Entity Relationship Diagram is a graphical representation of entities and their

relationship to each other, typically used in computing in regard to organization of data

within databases or information system.

An entity is a piece of data-an object or concept about which data is stored. And a

relationship is how the data is shared between entities

2.3.1 What are Entities and Relationships?

An entity represents a discrete object. An entity is something that has a distinct

separate existence, In particular abstraction and legal fictions are usually regarded as

entities. In general, there is also no presumption that an entity is animate.

An entity could be viewed as a set containing subset. The word entity is often

useful when one wants to refer to something that could be a human being, Sometimes; the

word entity is used in a general sense of a being whether or not the referent has material

existence. Taken further, entity sometimes refers to existence or being itself..

A relationship captures how two or more entities are related to one another a

relationship is a specific connection between objects, entities or concepts. Typical forms

of relationship are social relationships between people, causal relationships between

events, and mathematical or theoretical relationships between components of a modeled

system.

2.3.2 Symbol used in (E-R) Diagram and its mapping:

In the E-R Diagram the symbol rectangles represents entity class, circle represent

attributes, diamond represents relationships

Manly three types of relationships may be between entities:

8

1 One-to- one: one instance of any entity X is associated with one other instance of

another entities Y

2 One-to-many: one instance of an entity X is associated with zero, one or many

instances of another entity Y, but for one instance of entity Y there is only one

instance of entity X.

3 Many-to-many: one instance of an entity X is associated with one, zero or

many instances of another entity Y, and one instance of entity Y is

associated with one, zero or many instances of entity X

Note : According our relational databases tables, relational schema table

Book_Details and table Borrower_Issue had relationships one-to-many,relation

schema table Book_Details and Borrower_Return had one-to-many relationships

and relational databases table user_type and user details had a relationship many-

to-many.

9

10

Borower_Issue

Mem_IDbb

ISBN_No

Status

Date_issue

User_Type

Type_IDCat_Descr

Return_DayyD

No_Book_Issue

Loan_Period

Loan_due

Book_Details

Title

Author

Subject

No_copies

ISBN_No

Publisher

Acc_NoDate_purc

Description

User_Details

Mem_ID

Name

Phone[R]

Phone[o]

P_Address

E-mail

Department

Category

exp_Date

Reg_Date

Remark

C_Address

E-mail[A]

Description Borrower_Return

Mem_ID

Acc_No Return_D

Issue

Retun

User

ISBN_No

Profesion

Fig: 2.3.1 Entity Relationship Diagram

2.4 Sequence Diagram

A Sequence diagram depicts the sequence of actions that occur in a system. The

invocation of methods in each object, and the order in which the invocation occurs is

captured in a Sequence diagram. This makes the Sequence diagram a very useful tool to

easily represent the dynamic behavior of a system.

A Sequence diagram is two-dimensional in nature. On the horizontal axis, it

shows the life of the object that it represents, while on the vertical axis, it shows the

sequence of the creation or invocation of these objects.

Because it uses class name and object name references, the Sequence diagram is

very useful in elaborating and detailing the dynamic design and the sequence and origin

of invocation of objects. Hence, the Sequence diagram is one of the most widely used

dynamic diagrams in UML.

A sequence diagram shows, as parallel vertical lines, different processes or

objects that live simultaneously, and, as horizontal arrows, the messages exchanged

between them, in the order in which they occur. The symbol used in the sequence

diagram

: Stand for Object lifeline: A representation of the existence of an object over a

particular period of time

11

: Stand for Computing activation: The period during which an object activation is

actually computing (i.e. it is the top item on the stack).

: Stand for Lifeline node: A connection point in a lifeline.

: Stand for send message: Connects into object lifelines and acts as the source of

any type of message.

: Stand for Activation: The period during which an object is performing an action

either directly or through a subordinate procedure. The Activation time may include time

when it has control information on a stack, but during which control resides

: Flow of control message: A message that passes the focus of control from one

object to another.

Synchronous message: An instantaneous communication between objects that

conveys information, with the expectation that an action will be initiated as a result.

12

2.4.1 Sequence Diagram of Handle Book Details

Fig: 2.4.1 Handle Book Details

13

2.4.2 Sequence Diagram for Search Books

Fig: 2.4.2 Search Books

14

Chapter 3

Implementation

Currently the system runs on a single machine and assumes that the required software

(like JDK, JRE.MicrosoftSQLServer2000, and Jcreators etc) is installed on the same

machine. The user is expected to compile and configure Library Automation Software

correctly before start

3.1 Keywords used For developing the project following keywords were used

• Generic Technology Keywords Databases and Java programming used for developing project

• Specific Technology Keywords Microsoft SQL Server 2000, HTML, and servlet (Apache Tomcat 5.5 versions) used for implementation.

• Project Type Keywords Analysis, Design, Implementation, Testing and User Interface. 3.2 The Front End (Java)

For developing the project the Java Development Kit (JDK) is being used as implementation language. Java is suited to creating general business programs rather than low level drivers, performance critical or operating system code. Typically it is used for accessing databases or writing networking system some of the main alternative language to java are C++, Visual Basic and the new language from Microsoft called C#. You will sometimes see a description of a language as C/C++ because C and C++ are closely related. C++ compilers will generally compile any valid C language but most developers take advantage of the Object Oriented nature of C++.

15

C++ has a reputation for being able to create lower level programs than Java or Visual Basic and so is a natural choice if you are programming drives or anything that involves getting “close to the metal” where performance is at a premium. Most programming is not of this type however and C++ does not come with a slandered set of libraries for creating graphical programs.

The C# language is the joker in the pack when selecting a language because Microsoft recognized that Java include some very good ideas and “borrowed” many of the concepts to produce a new language that blended many of the virtues of C++ and Java. Although there are projects to make C# available on platforms other than Windows, the main platform at the moment is Window and for commercial purpose it should probably be considered non portable. The good news is that C# is sufficiently like Java that if you learn the one it will not be hard to learn the other, By contrast Visual Basic has very little in common with C/C++ or C# 3.3 Back End (Microsoft SQL Server2000)

Back end the databases is built on Microsoft SQL Server2000 which support all SQL queries and which is compatible with a long list of platforms. The Microsoft SQL Server2000 databases server provides the ultimate in scalability, supporting the capacity to handle deeply embedded applications with a footprint of 1MB to running massive data warehouses holding terabytes of information. Platform flexibility is a stalwart feature of Microsoft SQL Server2000 with all flavors of Linux, UNIX, and Window being supported. And of course, the open source nature of Microsoft SQL Server2000 allows complete customization for those wanting to add unique requirements to the database server.

A unique storage-engine architecture allows databases professionals to configure the Microsoft SQL Server2000 databases server specifically for particular applications, with the end result being amazing performance results. Whether the intended application is a high-speed transactional processing system or a high-volume web site that services a billion queries a day, Microsoft SQL Server2000 can meet the most demanding performance expectations of any system. With high-speed load utilizes, distinctive, Microsoft SQL Server2000 offers all right ammunitions for today’s critical business system.

With over 12 million installations, the Microsoft SQL Server2000 community is huge. This community has an incredibly diverse talent pool around the global-able to provide

16

Assistance with virtually any development language or host environment. Virtually every system admin has used and set-up Microsoft SQL Server2000 installation at one point or another making it even more pervasive. It is easier to find good developers with knowledge of Microsoft SQL Server2000 then any other databases. 3.4 Platform (Linux/Windows)

Library Automation system on operating Systems that support the Microsoft SQL Server2000. The Linux operating system is prevalent on server system these days, and with good cause. It’s an excellent, open Source operating system, robust, and with a very wide range of features and utilities. Its efficient in operation and there are lots of people who know it and will support it .Linux is a computer scientist’s operating system still- in other words it’s really not got the ease and simplicity of operation

17

Chapter 4

User manual Following sections will show how to configure, and need for installation

client-server architrature 4.1 Before You Begin

In this section you will be guided through the compilation and configuration process of Library Automation System. It’s not easy but it won’t necessarily be hard Library Automation System need the following software to be pre- installed on your system. 4.2 Getting J2SE Development Kit (JDK)

The Java Development Kit (JDK) is a Sun Microsystems product aimed at Java developers. Since the introduction of Java, it has been by far the most widely used Java SDK. In the current time Sun announced that it would be released under the GNU General Public License (GPL), thus making it free software. When the Java SE Development Kit (JDK) is installed, the Java SE Runtime Environment (JRE) is installed, as well. The JRE can also be installed separately. Installation notes for the J2SE Development Kit (JDK), including system requirements and installation instructions, are available for the following platforms. Platform 32-bit Installation 64-bit Installation Solaris Operating System JDK for Salaries JDK for Salaries 64-bit Microsoft Windows JDK for Windows JDK for Windows 64-bit Linux JDK for Linux JDK for Linux 64-bit 4.3 Getting Java 2SE Runtime Environment (JRE)

The run time Environment, or JRE, is a software bundle from sun Microsystems that allows a computer system to run an application. The software bundle consists of the JVM and programming interface and (API).The API provides a set of standard class libraries. The virtual machine and API have to be consistent with each other and are therefore bundled together as the JRE. This can be considered a

18

virtual computer in which the virtual machine is the processor and the API is the user interface. Installation notes for the J2SE Runtime Environment (JRE), including system requirements and installation instructions are available for the following platforms. Platform 32-bit Installation 64-bit Installation Solaris Operating System JDK for Salaries JDK for Salaries 64-bit Microsoft Windows JDK for Windows JDK for Windows 64-bit Linux JDK for Linux JDK for Linux 64-bit 4.4 Java Servlet Development Kit

The java Servlet Development Kit (JSDK) contains the class libraries that you will need to create servlet .a utility known as the servletrunner is also included, which enables you to test some of the servlet thjat you create. Thus for executing the servlet program first download JSDK from sun Microsystems follow the above instructions for installation on your machine The directory c:\Jsdk2.0\bin Contains servletrunner.exe and update the path the directory c:\Jsdk2.0\lib contains jsdk.jar This Jar file contains the classes and interfaces that are need to build servlet. Update your Class path environment variable so that it includes c:\Jsdk2.0\lib\jsdk.jar 4.5 Start the servletrunner Utility

Open a command prompt window and type servletrunner to start the utility. This tool listens on port 8080 for incoming client request 4.6 Start a web Browser and Request the Servlet Start a web browser and enter the URL shown here http://127.0.0.1:8080/servlet/filename 4.7 Microsoft SQL Server 2000

Microsoft SQL Server is a relational database management system (RDBMS) produced by Microsoft Its primary query language is Transact-SQL an implementation of the ANSI/ISO standard Structured Query Language (SQL) used by both Microsoft and Sybase. Its a multithreaded, multi user SQL Databases

19

management system which has according to Microsoft SQL Server more than 10 million installations. Microsoft SQL Server also supports Open Database Connectivity (ODBC).

4.8 Executing for the First Time For Execution first time of Client –Server programming adopted following steps:

Installed Jakarta-tomcat-5.5.9 which is include some file folder for file directory Installed jdk-1_5__0_06 –window-i586-p Select the user variable as well as system variable value User variable name : CATALINA_HOME User variable value: C:\ Jakarta_tomcat-5.5.9 System variable name : JAVA_HOME System variable value : c:\jdk 1.5.0_06 Select the path name "C:\ProgramFiles\Java\jdk1.5.0_06\bin\javac.exe"-classpath "C:\Servlet\flles;C:\Servlet\jakarta-tomcat-5.5.9\common\lib\ant.jar;C:\Servlet\jakarta-tomcat-5.5.9\common\lib\servlet-api.jar" C:\Servlet\flles\ When we executing the first time is different than executing it for the subsequent times You may expect to see some like this In terminal: Java.io.FileFoundException:setting-servlet-api.jar(No such file or directory) at java.io.FileInputStream.open(Native Method) at java.io.FileInputStream.<init>(FileInputStream.java:Error)

You might have already guessed that it is not as easy as opening the wrapper and having the sweet candy (may be easier than that but) so we need to do few things first, such as: Getting Microsoft SQL Server 2000 root Password Using SQL to communicate with Microsoft SQL Server Creating a Database in Microsoft SQL Server Selecting a JDBC driver to Connect to Microsoft SQL Server

20

4.9 Getting Microsoft SQL Server 2000 Root Password

By default, Microsoft SQL Server 2000 wills we installed with root super-user without any password. You can connect to Microsoft SQL Server 2000 without requiring password or by keying in blank password. However if you have set the password for root we need that one.

4.10 Using SQL to communicate with Microsoft SQL Server 2000

In this section we explain how to create SQL queries and use them to build new databases and interact with existing databases. When Microsoft SQL Server 2000 is installed, a simple, text –based program called Microsoft SQL Server 2000 client is also installed to send SQL queries to Microsoft SQL Server 2000 client . For communicate with Microsoft SQL Server 2000 msjdbc.tar is required witch is include following jar files lib/msbase.jar lib/mssqlserver.jar lib/msutil.jar 4.11 Creating a Databases in Microsoft SQL Server 2000

To create a new empty database, use the following SQL query CREATE DATABASE database-name Where database-name is the name that you wish to give to the database. To see for yourself that a database was in fact created, use this SQL query: SHOW DATABASES You can delete any databases with this SQL query: DROP DATABASES databases-name Use DROP carefully because it is irreversible 4.12 Selecting a JDBC Driver to Microsoft SQL Server 2000

Short for Java Database Connectivity, a Java API that enables Java programs to execute SQL, statement. This allows Java programs to connect with any SQL- compliant databases. Since nearly all relational databases management system (DBMS) supports SQL, and because Java itself runs on platforms, JDBC makes it possible to write a single database system application that can run on different platforms and interact with different RDBMS. JDBC is similar to ODBC, but is designed specifically for Java programs, Whereas ODBC is language- independent. Presently only Microsoft SQL Server 2000 connector is available which is the official JDBC driver for Microsoft SQL Server 2000

21

The connectivity to Microsoft SQL Server 2000 given by the following JDBC Driver Class.forName(“com.microsoft.jdbc.sqlserver.SQLServerDriver”); Connection conn =DriverManager.getConnection (“jdbc: microsoft: sqlserver: //10.5.18.60:1433;User=satishk;Password=satishk12”);

22

Chapter 5

Databases Management -Cataloguing

This use case allows enter the values in the databases a librarian enter the values using a static page the databases entry/updating/integrity is an import part of whole project thus a librarian enter the records of user, author, publishers, supplier, member, books, journals/Issue/Back Volume/Article/Report and other Non-book materials the selection of databases entry using enter a hot key. The librarian can view the current status of identification enter the values in the databases and also responsible for updating/deleting etc.

The creation of databases design based on the all tables and its corresponding constraints satisfy all table are in normal form which improve the efficiency of the databases. Java recognize some type of variables as numeric, string, Boolean, date, object and variant.

Numeric: Like other programming language java provide numeric variable. They are integers; single, double, byte, long and currency. Integer: Integer variable are used for the non functional values. It stores values in the range from -32768 to 326767. long data type is used for the range -2147483648 to 2147483647.single byte data type is used for representing number from 0 to 255.string variable are used to store string data type. Boolean: Boolean data type stores true/false value. Boolean variable are used in testing conditions Date: Date and time variables are stored internally in a special format, date variables are declared by following statements. Object: An object variable is used to refer any object in the application they are set to any of the object in the applications with set command. Variant: Special type of variables declares without any data type treated as variant they are capable of containing any type of value. if one can data type in variable declaration statement then variable will treated as a variant

23

5.1 Relational Databases Table Design

The following tables were used for developing the project

Book_Details Attribute Data Type Constraints DescriptionTitle Char(50) not null Name of the Title of bookAuthor Char(100) not null Name of the Author Subject Char(50) not null Name of the Subject No_of_Copies Int (4) not null No_of_Copies available ISBN_number Char(50) Primary Key Unique id of the book Accession_number Char(50) not null unique number of bookRack_number Char(50) not null Possion of book Publisher Char(50) not null Name of publishers Date_of_Purchase Datetime(8) not null Date of book purchase Description Char(100) not null Any description[if any]

Table: 5.1.1 Relational Database Book_Details

User_Details Attribute Data Type Constraints DescriptionMember_ID Char(50) Primary Key Unique id of member Name Char(50) not null Name of the member Permanent_Address Char(100) not null Address of the member Corrosponding_Address Char(100) not null C_Address of the member Phone_no.(Res.) Char(50) not null Phone no. of the member Phone_no.(Off.) Char(50) not null Off_Phone no. of the

member Fax no. Char(50) not null Fax_no. of user E-mail Address Char(50) not null Mailing address of

member E-mail Address[Alternate] Char(50) not null Alter Mailing

addressofmem Profession Char(50) not null Type of Profession Category Char(50) not null Category of member Department Char(50) not null Name of Department

24

Date of Registration Char(50) not null Reg date of member Exipry_date Char(50) not null Cross date deadline Remark Char(100) not null Any remark

Table 5.1.2 Relational Database User_Details

Borower_Issue Attribute Data Type Constraints DescriptionMember_ID Char(50) not null Unique id of member ISBN_number Char(100) Primary Key Unique id of the book Date of Issue book Datetime(8) not null Date of book issue Status Char(50) not null Current Status of book ISBN_number Char(50) Primary Key Unique id of the book

Table 5.1.3 Relational Database Borrower_Issue Borower_Return Attribute Data Type Constraints DescriptionMember_ID Char(50) not null Unique id of member ISBN_number Char(50) Primary Key Unique id of the book Accession no Char(50) not null unique number of bookReturn date Char(50) not null Return date of book ISBN_number Char(50) Primary Key Unique id of the book

Table 5.1.4 Relational Database Borrower_Return User_Type Attribute Data Type Constraints DescriptionType_ID Char(100) Primary Key Unique id of Type member Category_Description

Char(50) not null Name of Classified cat of user

No_of_Book_Issue Int(4) not null Max no of book(s) allowed Loan Peroid Char(100) not null Allowed period of book(s) Return days Char(50) not null Days which member return book Loan overdue Char(50) not null Loan extension if it exceed then

fine

Table 5.1.5 Relational Database User_Type

25

5.2 Primary key and foreign key:

Every entity unless a weak entity must have a minimal set of uniquely identifying

attributes, which is called the entity's primary key. In the diagram underline attributes

with circle represents primary key.

In the context of relational databases a foreign key is a referential constraint

between two tables the foreign key identifies a column or a set of columns in one

referencing table that refers to a column or set of columns in another referenced table.

The columns in the referencing table must be primary key or other candidate key in the

referenced table. The values in one row of the referencing columns must occur in a single

row in the referenced table. Thus, a row in the referencing table cannot contain values

that don't exist in the referenced table except potentially NULL. This way references can

be made to link information together and it is an essential part of databases

normalization. Multiple rows in the referencing table may refer to the same row in the

referenced table. Most of the time, it reflects the one master table, or referenced table to

many relationship.

The referencing and referenced table may be same table, i.e. the foreign key refers

back to the same table. Such a foreign key also known as self-referencing or recursive

foreign key.

5.3 Syntax of Foreign key:

Foreign keys are defined through a FOREIGN KEY constraint. The syntax to add such a

constraint to an existing table is defined as shown below.

ALTER TABLE <table identifier> ADD [ CONSTRAINT <constraint identifier> ] FOREIGN KEY ( <column expression> {, <column expression>}... ) REFERENCES <table identifier> [ ( <column expression> {, <column expression>}... ) ]

26

[ ON UPDATE <referential action> ] [ ON DELETE <referential action> ]

In our relational databases design omitting the column list in the REFERENCES clause

implies that the foreign key shall reference the primary key of the referenced table.

Foreign keys can be defined as part of the CREATE TABLE SQL statement

CREATE TABLE table_name ( id INTEGER PRIMARY KEY, col2 CHARACTER VARYING(20), col3 INTEGER, ... CONSTRAINT col3_fk FOREIGN KEY(col3) REFERENCES other_table(key_col) ON DELETE CASCADE, ... )

If the foreign key is a single column only, the column can be marked as such using the

following syntax:

CREATE TABLE table_name ( id INTEGER PRIMARY KEY, col2 CHARACTER VARYING(20), col3 INTEGER FOREIGN KEY REFERENCES other_table(column_name), ... )

5.4 Participation constraint and key constraints:

In E-R databases table If all entities in an entity set must participate in the

relationship set Called a participation constraint and If each entity of the entity set can

participate in at most one relationship in the relationship set, an arrow is drawn from the

entity set to the relationship set. This is called a Key constraint.

5.5 Associative entity and Unary Relationships:

Relationships between two entities with a many-to-many relationship called

Associative entity and a relationship between the rows of a single table known as Unary

Relationships.

27

Chapter 6

Online Public Access Catalog (OPAC)

The Online Public Access Catalog offered as an add-on module that is integral

with the cataloging module. The aim of this module is Accelerate Transmission of

Documents to Users due to help of this module a user as well as librarian staff can query

for own related query documents. The most query related to this module may be simple

search, advanced search, addition search, search by unique number, search by accession

number and journals search and see the current status of book either issued or not. Thus

most integrated library systems offer a browse-based OPAC module as a standard

capability or optional feature. Thus this module helpful for search for beginners and

query builders for advanced users.

6.1 Simple Search

This search allow single interface to all the resources a users and its members

Enter a word(s) from any of the searchable fields such as author, title, subject, unique

number(ISBN),accession number/account number, publishers etc. The search may also be

restricted to a specific field with an option to form a phrase. In this search a user can

search different query corresponding your string for example using exact word, any of

word ,ending word, initial word, and all word corresponding own input string the search

may also restricted through input string hence a user or others may be search own query

through Title, Search by Author, search by ISBN number ,search by Account/accession

,publishers and search by subject name, hence this types of search allows single

interface to all resources, multilevel sorting facility of search result and user

define/customized search result which are features of this search.

6.2 Advanced Search

An interface allows for development of complex search strategies using Boolean

operators like 'OR, ‘AND’, and 'AND NOT' between keywords in various fields. Hence a

28

user can interact for searchable search in advanced your input string using Boolean

operators, mostly this modules and query builder for experts using Boolean and logical

operators, and exporting search result in various file formats which are essential feature

of this search

6.2 Additional Search

An interface to develop search strategies using word(s) from various searchable

fields with an implied 'AND' operator.

6.3 ISBN Search

Its an also a interface where a user can search with a unique field, and search may also be restricted to a specific field with an option to form a phrase 6.4 Accession Search

Its an also a interface where a user can search with a unique field as search by

Accession/Account Number

6.5 Journals

The Serials Catalogue may be browsed, and on selecting a journal, details

including the holdings (both bound volumes and loose issues) are displayed. Basically

this option used for searching journals/research paper using by searchable fields

6.6 Help

Basically this option useful when a user and its member feel any difficulty

corresponding own query, option and other in this case user can help, to go option value

help, click Help menu a dialog box which is look like will we appear for window help.

29

Chapter 7 Circular-Transaction The aim of circulation module used for the creation, storage, retrieval and

management of bibliographic records and/or indexes and defines the record format used

in the database and provides for authority control author, subject headings etc.

Usually there are two different interfaces for search and retrieval of the electronic

catalog: one used by the catalogers that allows them to maintain the library database and

one provided for users that allows them to search and display the results through Online

Public Access Catalog .

This module useful for Handles circulation activities such as: lending, return,

renewal, and place on hold Manages library materials - circulation type, location, status,

patron type, profiles, privileges; and other transactions such as computation and payment

of overdue fines, lost books, etc. It may have added value functions like import, export,

and backup and restore functions for the databases, inventory and report generation. It

may support integration with security systems that complement the self-check-in and

checkout features of the circulation module. The main function of this module are-

7.1 Self-check-in/Issue book In this circulation process a librarian selects the authorized area, for her he would

be asked to enter unique authentication member ID after validation user selects issue

books, the “Issue book” can be issued to the membership code number of the library

member if no more books can be issued to the member a message indicating displayed. If

the member is eligible to get a book issued he is asked to enter the ISBN number of the

book issue is displayed and an entry is made in the member account and book is also set

as “issued” and the date of issue is also set to the current date. If the particular books are

30

reserved or the book number is invalid, a message indicating that displayed, the function

works as

Main success scenario:

1. Librarian scan borrowers card

2. LIS verifies the card

3. Check for issuing

4. Issue the book

5. Print the slip

“Alternate” sequences:

1: Invalid card

System does not verifies the card or it is expired

System display not a valid user

Librarian does not issue the book.

2: Issue limit

System display limit is full can not be issued

Librarian does not issue the book

Functions R 7.1.1: Select area State: The librarian on the main page select the option circulation/ self-check-in, and

enter the user/member id which are provided unique for a particular user or member,

member staff and others and current date of issue book etc.

Input: Area option Output: librarian prompted to enter the above field. If user/member id is valid the area is

displayed otherwise the area is asked to re enter the unique id for above field.

31

Processing: user/member id is validation next function R 8.1.2, if user/member id is

valid else R 8.1.2 if it is invalid.

R 7.1.2: Check validity and eligibility from librarian/ library member to get book issued Input: member identification number Output: An error message is generated if the identification number is invalid or the

member has already issued maximum number of books if it is the case otherwise prompt

to enter the book ISBN

Processing: Check to see if the identification number is valid or not. If it is valid check

then if the maximum book limit is reached or not

R 7.1.3: Issue book. Input: book ISBN. Output: An error message is generated if the ISBN is invalid or the book is already

reserved by someone else. Otherwise a book issue confirmation message is displayed.

Processing: Check to see if the ISBN is valid or not and the book is reserved or not. If it

is available for issue, an entry is made in the member account and book Register is also

updated and a confirmation message is also displayed.

Next function: R 8.1.3 if error and R 8.1.4 if user wants to cancel the task.

R 7.1.4: select other option Input: select any other tab Output: Back to the default screen. 7.1.4 Sequence Diagram of Self-check-in/Issue book

32

Fig: 7.1.4 Issue Book

7.2 Check-out/Return book

In this circulation process Once the clerk/librarian selects to enter the authorized

area for her, he would be asked to enter her member id/user id .After user id/member id

validation the librarian/clerk selects the “Return book” option, and he is asked to enter

the ISBN number of the book to be returned .If the ISBN number is valid and found

issued in the name of some library member, user and other the book is set as “Not

Issued” , the entry in the member account is deleted , for the book the return date is also

set to the current date and a slip in the name of the member is printed indicating the due if

any. If the book is a reserved one a slip is printed out in the name of the corresponding

library member. user and other to get it issued within seven days and set the book to

be”ReservedForSevenDays”. If the ISBN number is invalid a message showing that is

displayed.

33

Main success scenario:

Librarian scan borrower’s card

LIS verifies the card

Check for issuing date

Functions

R 7.2.1: Select Area State: The librarian is on the library main page. Input: librarian Area option. Output: librarian prompted to enter the member id, If id is valid the selected area is

displayed otherwise the librarian is responsible for re-enter the member id.

Processing: if member id is/are validation. Next function: R8.2.2 if id is valid else R 8.2.1 if id is invalid. R 7.2.2: select “Return Book”. State: The librarian is in personal area. Input: “Return Book” option. Output: Prompt to enter the ISBN. R 7.2 3: return book. Input: book ISBN. Output: An error message is generated if the ISBN is invalid or is not issued to

Anyone otherwise book return confirmation message is displayed. A due slip is

Printed in the name of the member and a message is generated for the member

Who has reserved the book?

34

Processing: Check to see if the ISBN is valid and the book is issued. If it is

Returned successfully, the entry in the corresponding member’s account is deleted

And book register is also updated.

Next function: R8.2.3 if error and R8.2.4 if user wants to cancel the task. R 7.2.4: select other option Input: select any other tab Output: Back to the default screen Sequence Self-check-out/Return book

Fig: 7.2.4 Return Book

35

7.3 Reserve book

Once a librarian selects to enter the authorized area for her he would be enter the

member id, after it validation the librarian selects the “Reserve book” option and if it is

found that he is eligible to get a book reserved he would be asked to enter the book title

and author name. The function displays the issued books details along with due-dates

.Member now can select any one book issued to be reserved and the book is also set as

“Reserved” and the date of reservation is also set to the current date. If the member has

already exceeded the prescribed limit then an error message indicating that is displayed.

Main success scenario:

Librarian scan borrower’s card

LIS verifies the card

Check for status whether the book’s are available for reserve or not if any then reserved

the book using borrower member identification number which is unique for particular

member. for a specific time period.

R 7.3.1: Select “Reserve book Area for reserved book”. State: The librarian is on the library main page.

Input:” Reserve book Area for reserved book” option.

Output: librarian prompted to enter the member id If id is valid then selected area is

displayed otherwise the librarian is responsible for re-enter the member id.

Processing: member id validation.

Next function: R 8.3.2 if member id/user id is valid and R 8.3.1 if password is invalid.

36

R 7.3.2: Select “Reserve Book”. State: The librarian is in personal area. Input: “Reserve Book” option. Output: If user is eligible to get a book reserved he is prompted to enter the book

Title and author name. Otherwise an error message is displayed.

Processing: check to see if member is eligible to get a book reserved. Next Function: R 8.3.3 if user is eligible to get a book reserved. R 7.3.3: Reserve the book. Input: book ISBN. Output: confirmation message is displayed. Processing: An entry is made in the member account and book register is also updated. R 7. 3.4: select other option Input: select any other tab Output: Back to the default screen.

37

Fig: 7.3.3 Reserve Book 7.4 Create Member Record

Once the Librarian selects to enter the authorized area for her, he would be asked

to enter her user/member id. After id validation when the librarian selects the “Create

Member Record” option he would be asked to enter the member details e.g. name,

institute I-Card number roll no. for students ,membership type .After successful creation

of member record her membership code is displayed. If the I Card number is a duplicate

one a warning message regarding that is displayed.

R 7.4.1: Select “Librarian Area”. State: The librarian is on the library main page. Input: “Library Area” option.

38

Output: librarian prompted to enter the member id. If member id is valid the specified

area is displayed otherwise the librarian is responsible for re-enter the member id

Processing: member id validation.

Next function: R 8.4.2 if member id is valid and R 8.4.1 if /member id is invalid. R 7.4.2: Select “Create member Account” State: The librarian is in his personal area. Input:”Create member Account” option. Output: Various fields of member details to be filled are displayed. Next function: R 8.4.3 if librarian wants to enter details else R 8.4.4 R 7.4.3: Select “Enter” option Input: member details and “Enter” option or cancel operation. Output: confirmation message regarding the member entry. An error message is

Generated if the I Card number already exists. Generate and display the member

identification number.

Processing: Check to see if the I Card number already exists. If not then enter the

Book member in the member register by making a new entry and member

Identification number is displayed.

Next function: R 8.4.3 if the I Card number already exists and R8.4.4 if user wants to

Cancel the entering details.

R 7.4.4: select other option Input: select any other tab Output: Back to the default screen.

39

Fig 7.4.1 Create Member

7.5 Delete Member Record

Once the Librarian selects to enter the authorized area for user, he would be asked

to enter her member id. After member id validation when the librarian selects the “Delete

Member Record” option he would be asked to enter the membership code/id number of

the member whose record is to be deleted, and the member record is deleted from the

register. An error message is displayed if the member does not exist.

R 7.5.1: select “Librarian Area”. State: The librarian is on the library main page. Input:” Librarian Area” option.

40

Output: librarian prompted to enter the member id. If member id is valid then selected

area is displayed otherwise the librarian is responsible for re-enter the member id.

Processing: member id validation. Next function: R8.5.2 if user/member id is valid and R8.5.1 if member id is invalid. R 7.5.2: Select “Delete member Account” State: The librarian is in his personal area. Input: ”Delete member Account” option. Output: field for member identification number is displayed. Next function: R 8.5.3 if librarian wants to enter details else R 8.5.4. R 7.5.3: Enter member identification number Input: member identification number and “Enter” option or cancel operation. Output: confirmation message regarding the member deletion. An error message

is generated if the identification number is invalid.

Processing: Check to see if the identification number exists. Next function: R8.5.3 if the Identification number does not exist and R 8.5.4 if librarian

wants to cancel the entering details.

R 7.5.4: select other option Input: Select any other tab Output: Back to the default screen. 7.6 Generate Remainder Member

41

Once the Librarian selects to enter the authorized area for user, he would be asked

to enter her member id. After member id validation then librarian selects the “Generate

Remainder Message” option, hence this function prints remainder message for all the

members with overdue books along with the various book details, in their respective

information area and a confirmation message is displayed.

R 7.6.1: Select “Librarian Area”. State: The librarian is on the library main page. Input:”Library Area” option. Output: librarian prompted to enter the member id. If member id is valid the valid area

is displayed otherwise the librarian is responsible for re-enter the member id

Processing: member id validation. Next function: R 8.6.2 if user/member id is valid and R 8.6.2 if user/member id is

invalid.

R 7.6.2: Select “Generate remainder message” State: The librarian is in his personal area. Input:”Generate remainder message” option. Output: Confirmation message regarding the generation of remainder message. Processing: Remainder messages in the information area of the member with

overdue books.

42

Fig: 7.6.1 Generate Remainder 7.7 Dispose-of Books

Once the Librarian selects to enter the authorized area for her, the system asked to

enter the number of years for which the books are in the list to be displayed are not issued

.After that a list of books which are not issued for that much years are displayed .If any

member selects some of the books to be disposed-off those books in the booklist are

marked as “DISPOSED”.

R 7.7.1: Select “Dispose-of- books” State: The librarian is in his personal area. Input:”disposes-off books” option. Output: prompt to enter the number of years. And librarian is responsible which books

you want to disposed

R 7.7.2: Enter number of years. Input: number of years.

43

Output: Display the list of books which are not issued for last given number of

years.

Processing: Searching all the books which are not issued for last specified number

of years.

R 7.7.3: Select the books to be disposed. Input: book choices. Output: confirmation message regarding the disposal of books.

Fig: 7.7.1 Dispose of Books 7.8 Delete Dispose-of Books

Once the librarian selects to enter the authorized area for her. he would be asked

for list of books which are disposed is displayed .Now the user can select some or all of

the books to delete from the book-list. If none of the books is marked as “DISPOSED”,

an information message indicating that is displayed.

R 7.1.1: Select “Area option”. State: The librarian on the library main page. Input:”Area” option.

44

Output: if searchable field successful then selected area option is displayed else a error

message displayed.

R 7.1.2: Select “Delete Disposed books” State: The librarian is in his personal area. Input:”Delete disposed books” option. Output: list of disposed books. Processing: searching all the books which are marked as DISPOSED. R 7.1.3: select the books to be deleted. Input: book choices. Output: confirmation message regarding the deletion of disposed of books.

45

Fig: 7.8.1 Delete Disposed Book

46

Chapter 8

Results

8.1 Home Page:

Before login you will be on the home page at initially.

Fig: 8.1.1 Home Page

8.2 Online Public Access Catalogue (OPAC)

Simple Search:

47

Fig: 8.2.1 Simple Search

Advanced Search:

Fig: 8.2.2 Advanced Search:

Fig: 8.2.3 Advanced Search:

48

Additional Search

Fig: 8.2.4 Advanced Search:

Search by ISBN

49

Fig: 8.2.5 Search by ISBN

Search by Accession

Fig: 8.2.5 Search by Accession

50

Journals

51

Fig: 8.2.6 Journals Search

8.3 Administration authenticate

For working functionality overall project click on the option logout, then a working modules page displayed click on the option value library system then an admin authenticate window look like, enter the username and password for open system.

52

Fig: 8.3.1 Authentication

8.4 Circulation-Transaction Module Results

Issue Book(s)

For issuing the book first the librarian go for issue option Issue click on the icon a window frame displayed, the librarian enter the member id for particular member which want to issue the book submit the button a member details will be appeared which is look like as with all details corresponding member.

Fig: 8.4.1 Inserting Member ID for Issuing Book(s)

53

Fig: 8.4.2 before Issuing Book(s)

Now to follow issuing process enter the ISBN number for a particular book which are still going for issuing and also the current date of book’s, after inserting the ISBN number, Date of Issue and Account Number a message look like with corresponding Book Details records

Fig: 8.4.3 Inserting ISBN no and Account no. for Issuing Book(s)

54

Fig: 8.4.4 Successful Book (s) Issued

Self-Check out or Return Book(s)

Fig: 8.4.4 before Returning Book(s)

Note: if same Member_ID, ISBN_Number and account Number found to be same then a error message displayed look like as, and a

55

Fig: 8.4.6 Results when Book(s) are already returned

Re-Issuing Book(s)

Fig: 8.4.7 before Re-Issuing Book(s)

56

Fig: 8.4.8 Successfully Book(s) Re-Issued/not issued

Fine Collection On the basis of Category description of loan period indivisible validity period is given. If any user/member and other submit the book after deadline a fine will be imposed

Fig: 8.4.9 Fine Collection

57

8.5 Databases Management-Cataloguing Module Results Add Member Record

Fig: 8.5.1 before Adding Member Record

Fig: 8.5.2 Insert Member Record Successfully

58

Add Book(s) Record

Fig: 8.5.3 before Adding Book(s) Record

59

Fig: 8.5.4 Insert Book(s) Record Successfully

Chapter 9

Conclusions

60

The Library management system process made computerized to reduce human

errors and to increase the efficiency. The main focus of this project is to lessen human

efforts. The maintenance of the record is made efficient, as all the record is stored in the

access databases through which data can be retrieved easily. The navigation control is

provided in all the forms to navigate through the large amount of records. If the numbers

of records are very large then user has to just type in the search string and user gets the

results immediately. The editing is also made simple. The user has to just type in the

required field and press the update button to update the desired field. String and user gets

the results immediately. The editing is also made simpler. The user has to just type in the

required field and press the update button to update the desired field.

The books and students are given a particular unique ID no. so, that they can be

accessed correctly and without errors. Our main aim of the project is to get the correct

information about a particular student and books available in the library.

The problems which existed in the earlier library system have been removed to a larger

extent and it is expected that this project will go a long way in satisfying user’s

requirements. The computerization of the library management will not only improves the

efficiency but will also reduce human stress thereby indirectly improving human

recourse.

Bibliography

61

[1] J. Banerjee, H.J. Kim, and H.F Korth,”Semantics and Implementation of schema

Evolution in Object-Oriented Database”,

[2] C. Batini, S. Ceri and S.Nav the Database Design: An Entity-Relationship Approch

[1992]

[3] James Martin, James Odell, Object-Oriented Analysis and Object-Oriented Design

Prentice Hall, Englewood Cliffs,N,J…..,1992

[4] Martin J. and J.J.odell Principles of Object-Oriented Analysis and Design Prentice

Hall England Cliffs. 1992

[5] Somerville I. software Engineering, 4th edition. Addition-Wesley Publishing, Reading

Mass, 1992

[6] Ludolph F,”Model-based User Interface Design-Successive transformations of a

task/object model,” in user interfaces Design- bridging the gap from user requirement to

design CRC Press 1998.

[7] Hood (1989).Hood user manual Issue 3.0 WME/89-353/JB. HOOD Working Group.

European space Agency, December

[8] [Blaha-98] Michael Blaha, William Premerlani, Object- Oriented and Design for

Database Applications, Prentice Hall, Upper Saddle River, N.J.,1998

[9] [Booch-99] Grady Booch, James Rumbaugh,Ivar Jacobson, the Unified Modeling

Language User Guide. Addition-Wesley. Reading Mass.., 1999.

[10] [Rum Baugh] James Rum Baugh, Ivar Jacobson, the Unified Modeling Language.

Reference Manual. Addition-Wesley, Reading,Mass 1999.

[11] [ANSI 1986] American National Slandered for Informational System, Databases

Language SQL .American National Standard Institute, FDT, ANSI X3,135-1986.

[12] http://www.functionx.com/sqlserver (SQL Server tutorial)

[13]M.M.Astrahan,M.W.Blasgen,DD.Chamberlin,J.N.Gray,W.F.King,B.G.Lind

say,R.A.Lorie,J.W.Mehl,J.G.Price, G.R. Purtzolu,M. Schkolnick,P.G Selinger,D.R Stutz,

H.R-Strong,P.Tiberio,I.L, Traiger,B.W Wade, and R.A. Yost.”Syatem Relational

Databases Management System”,IEEE(Computer, Volume 12) (1979)

62

63