One of the main benefits is that it gives you access to any area-restricted content. When you choose to use a VPN server in a specific country, it will appear as that location, granting access to all content available for that country.
You can also access popular social media platforms like YouTube, Twitter and Facebook without location restrictions.
The connection service is compatible with all browsers and can launch when Windows boots. The service requires a MHz processor or faster. For example, an Intel Dual-Core processor can be used. This virtual private network connection is also compatible with older versions of Windows, like Windows XP. Based on the location of the server you use, you can get complete access to all content available for that specific location.
The setup is simple enough even for beginners and is great when travelling for business or vacation. The latest release offers faster downloads of videos with the YouTube Downloader and better support for Windows We don't have any change log information yet for version 2.
However, since all the team members do not have laptop computer, the group members will be forced to get through any way during the time of for longed power cut. Operating Environment 1. Hardware requirements The hardware this system needs to be operated is:. Software requirements The software requirements are no more for these operations. It needs windows operating system with MS-Office installed in the computer.
Software development cost For this particular project we will be using different software but the software is provided by the university. Table 1. Total 0. Phase II contains two chapters. System Implementation and Testing and Conclusion. Project Proposal: Before being starting a project we submit the proposal of the project to the advisor that contain the aim of the project and discuss the methodology intended to use in achieving those aims.
Progress report: We submit to our advisor periodically written progress of the project that contain project title and full content of each chapter to be submitted. After carefully review our work on the given chapter and the advisor comment which is correct and which need correction again and give back for us. Interim report: We submit the first phase of the project that contains four chapters at the end of this semester and we give detail presentation of each chapter.
Final report: At the end of second semester we submit the second phase of the project that contain System Implementation and Testing of the first phase and present it. This phase is pointing what the system needs and contains many diverse activities and tasks that are extremely important to the overall success of the learning solution. It also includes weakness, strengthens, documents used in the system, players of the system and description current system description , function of the existing system, alternative solution currently the system use.
The main activities of the library management system are as listed below:. All of this activity is very complex and time loosing. Prepares the general reports.
Reports problems and the shortage of books to the target or responsible body and obtains solution. Output: Registered in the cabinet. When they receive new books, they record the essential information with prepared form [Appendix]. Output: Documentation and Member details should be updated. Mostly the operations are based on forms of hard copy; this is not secured for wise protection of books.
The use of computer is rarely and the used software is also not comfortable to handle easily. It is difficult to handle with this method so it needs rapid automation. As we observed and also interviewed the library managements the report generating mechanism is manual. Mainly the system reports include book related information, member related information, staff related information, users related information and other side problems of the library management system reports are written on paper by clerk and then it will be transformed to the manager.
When the reports are preparing, the computer system is used. In this, it also needs man powers for a long period of time [2]. The way of stack is almost with a manual check. Due to the manual means being used, in giving treatment for students, a lot of problems are encountered which includes:. It does not need electric power to see files automatically.
It does not need more computer skill and not require specialized software. The technological aspects like internet connections are not matter for the users as well as for the operators workers since most of its operations based on manual system [2].
The office takes more employers or support workers when there is a load of work emerged. They use other shelve workers to handle the current activities with a given period of time [2]. In order to provide the desired treatment for the users, the system uses different methods such as time restriction; with the recorded treatment; arranged time table for certain applications like less amounted books and internet service. This enables the system to manage the seasonal problems.
Requirement is a major base for better solution or for solving problem which exists in the current system by gathering requirement [3]. The new system is based on the interest and understanding of users. The sequences of activities which are performed in the current system also affect the new developing system. To work in accordance with interest of users and working process of current system there must be a clear understanding of the way how activities are performed, what current system requires, what are the problems that the current system faces, and what improvement should be done to make it a better system.
Having such kind of understanding helped us to distinguish parts which are going to be changed in the new system and to determine how our system can solve the current problems and also able to design other new features which are user interactive.
To gather the information we used interviewing and reviewing document forms, reports. In addition to the above two methods we observed how they perform their activities in the current system. Some of the purposes of analyzing manual system are In case of finding solution we analyzed which parts of the existing manual system has to be converted into new computerized system.
When we implement this system we prepare essential reading manuals that are used to simplify the use of the system by the user. We hope the system handled easily according our manual.
So they should read the manual that we provide. Possible use of a process model approach is to prescribe how things should be done in contrast to the process itself which is really what happens. A process model is roughly an anticipation of what the process will look like. What the process shall be will be determined during actual system development. Document Convention The following are the list of convensions and acronyms in this document and the project as well:.
User interface layer: the section of the assignment referring to what the user interacts with directory. RAM: random access memory. The requirement specification is the phase that leads to the designing and implementation; that the correct and accurate designing has a great role to the system implementation. Based on this designing our target, providing the automated system to the library system, be attained with the rapidly developing technologies. The system is to be beneficiary of this by applying the possible technology results as much as possible.
And add the book details by the book title, author, edition etc. Search book: users can search for the book where necessary by the searching that can be done according to title and Author. Update: Any changes in the database either details information of books or members should be updated. Delete member or book: Wrong or not allowed data entry to the system must be removed from the database.
The procedure checks for the case when the book is already issued by some other borrower or the book is not present in the library and thus it is not available for issuing. The user is required to enter the issuing date and then the validations for the date are performed. The return date must be calculated with in specified time constraints. Generate report: The system incorporates report generation and data filtering mechanisms.
Reports can be built on the following various criterions:. This system will provide the mechanism for the new book and already existed book is to register by the manager and the students reserve online.
The systems user can also retrieve and search for books. The authorized person Manager can perform update, delete, and insert operations on the books as needed. Student and Teacher: are registered members who are authorized to view and issue articles from library.
Since the instructors or the other registered members of the college are the users of this software system, they can provide their demands to the operators to view and use available resources for their need.
It is assumed the maintenance of the database will be assigned to the authorized person only, i. The system does not depend on the software components and operating system like windows version and windows flat form. This application is used to convert the manual application to the computerized application. Customized data will be used in this application.
So it should be given more emphasis for the speed to access the system. User Interface: The developed system provides desktop application user interfaces that are compatible for any windows operating system. For this reason the user of the system especially the librarians who develop the collections is expected to know at least how to interact with this application.
The users or who navigate the other interface of the system to retrieve the collections of the system is also expected to know basic understanding on how to navigate. Software Interface: A firewall will be used with the application to prevent unauthorized access to the system.
Security and Access permissions: We are going to develop a secured database for the College. There are different categories of users namely administrator, library and member.
Depending upon the category of user the access rights are decided. It means if the user is an administrator then he can be able to modify the entire data, delete, append etc. In another way authentication is provided to all the users, only authenticated users can use. No Redundancy: In the proposed system can be avoided reputation of data anywhere in the database but there may reputation is case of data backup.
This would assure economic use of storage space and consistency of the data stored in the database. Error handling: When the users of the system interact with the system errors may appear. To control these inaccuracies the system will generate different messages. Data errors which are entered in to the system may not be completely avoided but they can be minimized.
To do this, most of the system execution buttons will be controlled according to the sequence which the user is expected to follow. Or this can be done by generating different system responses to the input of the users. Reduced Maintenance: The primary goal of object-oriented development is the assurance that the system will enjoy a longer life while having far smaller maintenance costs. Real-World Modeling: Object-oriented system tend to model the real world in a more complete fashion than do traditional methods.
Improved Reliability and Flexibility: Object-oriented system promise to be far more reliable than traditional systems, primarily because new behaviors can be "built" from existing objects. High Code Reusability: When a new object is created, it will automatically inherit the data attributes and characteristics of the class from which it was spawned. Description To interact with the system, LMS will validate its registration with this system.
It also defines the actions a user can perform in LMS. Basic flow 1. System show login screen. A1 action 2. User filling required information enters user name and password. Alternative If users found the system display invalid user name and password error condition: message. Then go to step 1. Description Registered new members in the database of the library system. Precondition The member should have a valid college membership document which contains his name, department, ID number to obtain library membership.
To register the member the administrator or librarian has to first Basic flow of action login. After login the administrator or librarian searches for the existing member. The system displays registration form. The Librarian to fill full his name, ID number and any information about the user. The system sends successfully message for the user to be registered.
Post condition The user account, the system generates and sends user information to the user. A1 Administrator or librarian can try again by entering username and password. Description The books in the library can be searched through parameters like title book name , Author. Pre condition The book to be searched should have been registered in the database of the library management system.
Basic flow of action 1. The staff or Librarian login to the system. A1 If the login is fail. A2 If the search is unsuccessful, then the Librarian should add that book. Pre condition To borrow any book it is important that the member or other user; member is registered with the library and the book to be borrowed is available with the library. The member request to the librarian. The librarian should enter the call number of the book title, author and subject.
Alternative action: If the login fails the librarian or administrator should enter user name and password again. A1 If the member search is unsuccessful and no data is found then the A2 administrator should re-register the member.
Description The end user can return the books. Alternative action : If the login fails the librarian or administrator should enter user name and password. A1 If the member search is unsuccessful and book data is not found then an A2 administrator must enter the book and member ID in database. Description It allows to modifying changing the details information of the book from data base. The librarian search using one search method. The system displays the searched result. A1 If the data there is a mistake in the data entry the system displays error message and allow making correction.
Description It allows to modifying changing the details information of the user from data base. The librarian clicks on the update button. Alternative action If the login fails the librarian should enter user name and password. A2 Table3.
Description Wrong or not allowed data entry to the system must be removed from the database. Or The old and damaged books are removed from the library. Pre condition To delete the book must be part of the database or registered in the database for the LMS. Alternative If the login is unsuccessful the librarian should enter user name and password action: again. Pre condition To add any book that book should have parameters like book name, ISBN, printed date etc. The System displays search options author, title, and subject.
Post condition The book result is added to the database. Alternative action: If the login is unsuccessful the librarian should enter user name and password again.
A1 If a book is to be added on search is already exists it should not added. A2 If the registered record exists in the database, the system displays the file A3 already exist message and if the input data has errors the system display error message. Description The system incorporates report generation and generated filtering mechanisms. Or allow librarian to generate reports through parameters like daily, weekly and monthly.
The system verifies the librarian is legal to generate report. The librarian selects the parameters for which report to be generated. Post condition Report will be generated. Alternative action: If login system is failed librarian should be enter user name and password again. A1 If the parameter is failed the system display message. Basic flow of 1. The user login to the system. The system displays successfully message. Alternative action: If the users account not correct the system display error message and users try again.
A1 If the user can not part of the library the system display error massage and A2 users registered by administrator. Mid Due date BCode. Return Update Display. Our purpose of designing is to show the direction how this system built and to provide clear and enough information needed to drive the actual implementation of the system. It is based on understanding of the model the software built on.
Our objective is to model the system with high quality since the implementations of high quality system depend on the nature of design created by the designing phase. If one wants to change the system after it has been put in to operation, it depends on the quality of the system design [3]. It will be reliable, perform every work area should use it with a good performance. The choice of windows form is not matter for this system; through applicable by every windows flat form. When needed, it is possible to take maintenance easily.
By using the same development environment, it can be easily maintained. To enter into the application area the operator should use a correct username and password unless it is not possible to take any single operation. Staff member attendance form is controlled by administrator or manager privilege that it is open for a given period of time and then it will be closed by the manager as necessarily. A common architectural strategy is to layer the architecture of a system into several layers.
The purpose of system architecture is the static structure of how our software will be built. A1 If the member search is unsuccessful and book data is not found then an A2 administrator must enter the book and member ID in database. Description It allows to modifying changing the details information of the book from data base. Basic flow of action 1. A1 If the data there is a mistake in the data entry the system displays error message and allow making correction.
Description It allows to modifying changing the details information of the user from data base. Alternative action If the login fails the librarian should enter user name and password. A2 Table3. Description Wrong or not allowed data entry to the system must be removed from the database.
Or The old and damaged books are removed from the library. Pre condition To delete the book must be part of the database or registered in the database for the LMS. Alternative If the login is unsuccessful the librarian should enter user name and password action: again. Pre condition To add any book that book should have parameters like book name, ISBN, printed date etc.
The System displays search options author, title, and subject. The system displays the searched result. Alternative action: If the login is unsuccessful the librarian should enter user name and password again. A1 If a book is to be added on search is already exists it should not added. A2 If the registered record exists in the database, the system displays the file A3 already exist message and if the input data has errors the system display error message.
Description The system incorporates report generation and generated filtering mechanisms. Or allow librarian to generate reports through parameters like daily, weekly and monthly. The system verifies the librarian is legal to generate report.
The librarian selects the parameters for which report to be generated. Alternative action: If login system is failed librarian should be enter user name and password again.
A1 If the parameter is failed the system display message. Basic flow of 1. The user login to the system. The system displays successfully message. Alternative action: If the users account not correct the system display error message and users try again.
A1 If the user can not part of the library the system display error massage and A2 users registered by administrator. Mid Due date BCode. Return Update Display.
Our purpose of designing is to show the direction how this system built and to provide clear and enough information needed to drive the actual implementation of the system. It is based on understanding of the model the software built on. Our objective is to model the system with high quality since the implementations of high quality system depend on the nature of design created by the designing phase.
If one wants to change the system after it has been put in to operation, it depends on the quality of the system design [3]. It will be reliable, perform every work area should use it with a good performance. The choice of windows form is not matter for this system; through applicable by every windows flat form. When needed, it is possible to take maintenance easily. By using the same development environment, it can be easily maintained. To enter into the application area the operator should use a correct username and password unless it is not possible to take any single operation.
Staff member attendance form is controlled by administrator or manager privilege that it is open for a given period of time and then it will be closed by the manager as necessarily. A common architectural strategy is to layer the architecture of a system into several layers.
The purpose of system architecture is the static structure of how our software will be built. The only difference with that of analysis class architecture is that it focuses on domain solution rather than problem domain and it introduce changes to our class model based on implementation technologies in the project.
These are the working area of the project after the completion of total process. In the sub system decomposition we can see the different components emanated from system architecture that collaborate collaborate to handle single application at a time.
When the operator runs the application software, the user interface appears by preceding login screen. Next to login screen is the main page that supports other operational directories. The different subsystemss have a coupling to complete entire process.
The subsystems namely book management; member management, report generation and other simple operations are the major sub system of this project. It checks whether the user is valid or not controls unauthorized users from entrance of the system. So that it consists of the authentication, authorization, and security of the system.
The members may include staff members, instructors and other necessary part those who essence registration in the database. So by using the part prepared for member registration, the responsible body easily can register the members. With the help of this section it is easy to handle the correct book information and store it with in database. The report subsystem consists of all functionalities of the system that produce report concerning book operation and member operation.
The reports might be in a paper form or data grid depending on the type of report. Return Updte Display. Attributes Description Data type. Member class is a user class that uses the systems application with registered authentication that they have their user name and password. It has the following attributes. This class performs the recording or adding process of the new entrance books to the library database system.
Due date The date when the book should be Date returned. Bcode code for the particular book String Methods. It is also used to show a collection of nodes and also dependencies of associations among them. The associations between nodes Represents a physical connection.
The physical deployment model provides a detailed model of the way components will be deployed across the system infrastructure. It details network capabilities, server specifications, hardware requirements and other information related to deploying the proposed system. In this system, ISBN and Mid mainly used to describe the persistence data aspect of the library management system. The following diagram indicates the persistence diagram of the library management system.
The result of this phase consists of source code, together with documentation to make the code more readable. This is what we call software implementation. The purpose of these activities is to convert the final physical system specification into working model with reliable software and hardware, document the work that has been done, and provide help for current and future users and take care of the system.
It is just similar with our code functionality and validity. There are so many different classes in our system, but we selected very few of them to justify the way of algorithm the system follows. Login class is a user interface class that is used to validate the authorization of the users to the system with the help of account information.
Testing The test plan is designed to analyze the logic used in the implementation of the Library Management System. The tests will allow us to ensure correct program flow, and to determine the error-handling capability of the system [6].
Once coding has begun, the testing process can be begin and proceed in parallel. As each program module is produced, it can be tested individually, as a part of larger program, and then as a part of larger system.
Unit testing Unit test is a way of testing each of the system functionality independently. Accordingly the team has tested each one of the three major activities and the rest accompanying activities independently using different user input, different login mechanisms and any technique of fault finding so that an incorrect functioning of the activities was corrected at the right time.
Integration testing By combining each individual form and report with their concerned database we had tested by giving general data. From this we had understood and realized that how the system works using separate module.
System testing It is the final step of testing. In this system tested the entire system as a whole with all forms, code, modules. In this we tested all the functionalities in the System.
All errors in the forms, functions, modules have been tested. Finally by the system testing we had ensured that the entire integrated software system meets the desired requirements. First name kenya Successfully completes the librarian registration Last Name lammi.
Hardware and Software Requirements The most possible way of the acquisition of the software and hardware for this system is purchasing from the market. If they exist in this organization, it can be used as necessary. User Manual We as a software developer had developed the following user manual to lead our custom users easily get the way of the applications of this application software. See fig. Installation After installing both Macromedia Dreamweaver and vertigo server software do the following steps.
The main focus of this project is to lessen human efforts. The maintenance of the records is made efficient, as all the records are stored in the ACCESS database, through which data can be retrieved easily. If the numbers of records are very large then user has to just type in the search string and user gets the results immediately.
The editing is also made simpler. The user has to just type in the required field and press the update button to update the desired field. Our main aim of the project is to get the correct information about a particular student and books available in the library.
The problems, which existed in the earlier system, have been removed to a large extent. The computerization of the Library Management will not only improves the efficiency but will also reduce human stress thereby indirectly improving human recourses.
Recommendation This application software was developed for better use for the library management system of Jigjiga University. The system handles major of the operations that carried out in the college like registering new book entrance and manages the librarian daily attendance with specified period of time. For this, we strongly recommend for the system users to use our new product to handle their daily operations easily and secured report generation by printing the daily or weekly activities.
References For our further work, we used different necessary materials as references. Major of the references we used were as follows. Online library system [pdf document].
Katipo Communications Ltd. What are the objectives of your System? What is the mission of your System? How many employees do you have? How does your current system work? Is it manual? Open navigation menu. Close suggestions Search Search. User Settings. Skip carousel. Carousel Previous. Carousel Next. What is Scribd? Explore Ebooks. Bestsellers Editors' Picks All Ebooks. Explore Audiobooks. Bestsellers Editors' Picks All audiobooks.
Explore Magazines. Editors' Picks All magazines. Explore Podcasts All podcasts. Difficulty Beginner Intermediate Advanced. Explore Documents. Full Project Library. Uploaded by Mohammed Jibril. Did you find this document useful? Is this content inappropriate? Report this Document. Flag for inappropriate content. Download now. Related titles. Carousel Previous Carousel Next. Status of Philippine Public Libraries and librarianship.
Jump to Page. Search inside document. The report generation facility of library system helps to get a good idea of which is the books borrowed by the members, Library Management System has four main modules. Objectives 1. General objectives The general objective of this project is to develop interactive online library Management system for Jigjiga University. Scope of the Project The scope of this project is developing online library Management System for Jigjiga University This project helps the workers to work without barrier of bad actions during their daily activity.
Generate report, Add, delete and update The library manager who is responsible for this process can do the following with help of our interface: - 1. Generally we used the following methodologies for our data collection. System implementation method After completing the development of the system, the testing process will be take place. Process: Clerk should check the detail information of the user.
Output: Members is recorded in the database. Process: Librarian checks the type and the number of books. Process: Librarian should check pocket and member Id No. Output: Members should get the book. Process: Librarian should check the issue book and pocket of the members. Output: Documentation and Member details should be updated. Process: Librarian and user check the availability of the books. Output: Get the search result by the librarian Mostly the operations are based on forms of hard copy; this is not secured for wise protection of books.
Student and Teacher: are registered members who are authorized to issue articles from library. Process model approach Possible use of a process model approach is to prescribe how things should be done in contrast to the process itself which is really what happens.
What the process shall be will be determined during actual system development Spiral model We use spiral model to work out our project because of the following reason. Document Convention The following are the list of convensions and acronyms in this document and the project as well: User: intended users for the software MYSQL: structured query language, used to retrieve information from a database Layer: represents a section of the project User interface layer: the section of the assignment referring to what the user interacts with directory Use case: a broad level diagram of the project showing a basic overview Interface: something used to communicate a cross different mediums PHP:hypertext preprocessor and server side scripting language RAM: random access memory.
Update: Any changes in the database either details information of books or members should be updated Delete member or book: Wrong or not allowed data entry to the system must be removed from the database. Availability: All data in the system will be available at any time.
Reduced Maintenance: The primary goal of object-oriented development is the assurance that the system will enjoy a longer life while having far smaller maintenance costs Real-World Modeling: Object-oriented system tend to model the real world in a more complete fashion than do traditional methods. Pre condition Any user must have user name and password.
System acknowledges entry. Post condition System transfer control to user main screen to precede actions. A1 Table3. Alternative action : The administrator or Librarian fails for login.
The staff or Librarian login to the system. The Staff or Librarian request search for book.
0コメント