Professional Documents
Culture Documents
Book keeping is the main task in Library Administration. In the old method of book
keeping, preserving the manually written records and ledgers were very hard. Paper records
date back to more than 10 years require some special chemical to get preserved. By applying
some sort of special chemicals we can preserve them only for certain years. Moreover for
every transaction, we should make some entries on more than one corresponding ledgers.
Hence it is a laborious work to keep manually the book transaction in a library.
But the computerized book keeping relieves us from these burdens. The data are
written on electronic media which can be processed as and when required even after 100
years. The data can be copied, altered, reproduced in black and white form at any time. The
book transaction can also be done automatically. The computer employed in the book
keeping will make necessary entries in the corresponding ledgers.
It gives users the ability to search thorough materials by their unique assigned item
numbers, titles, author names, subject and keywords with or without any restriction on place
(for example queries only on reference section or any group of given sections are valid),
borrowing state (i.e. the book is usable or book has been barrowed more than 5 times that
year) and item type. Giving exact or partial phrases can do these searches. Users can borrow
items and they can put reserve on items for further borrowings.
User penalties for late returned items are automatically calculated by administrator
given constants, and users can be restricted to borrow any more items if they have penalty
more than an administrator set value. When there is more than one reserve on an item the
reserves are assigned automatic sequence numbers according to their reserve time so that first
person to reserve an item gets an opportunity to borrow the item first for a time period, then
the second person reserved that item.
Administrators are able to add items to the library; they can remove items as well as
they can change information on an item (i.e. location, mistyped title or any other item related
data). They can also list workers in each department and their working hours. Administrators
can view the borrow history to find out all the users that borrowed a specific material to keep
1
track of possibly missing or damaged library items. Administrators can add new users or
workers to the library, delete existing users or workers or modify user or worker information.
The LMS consists of three parts - one is user menu, the other is for the worker menu
in the library these are the clients that requests information from the server. The third part of
the program is the server, which is a bridge across the client and the actual database. As soon
as it gets a request from one of the clients it opens a connection to database send the query in
order to reply the requests of clients and after taking the result from database it sends the
result to the client.
The users will interact with the user menu and the workers will interact with the
worker menu. There is no access control for user menu but as worker menu starts it asks for a
password for security issues. There is also a server, which these clients interact with.
2
1. INTRODUCTION
Home
This option takes the user to the homepage. Every pages of this website contains this
option.
About Us
This option gives idea about the operations of the Central Library with the history and
about the staff members.
Membership
This option enables users
1. To join as a new member - An application seeking details about the user will be
presented and on submission of the same the details will be structured for its
genuineness. The member will be invited for collecting the membership card.
2. To know about the waiting status.
3. To see the details of a particular member
4. To see the withdraw membership
Books
This option presents the details of the books available in the library. Every book will
be given a unique code number. The title of the books will be displayed as per the code
number. The details of the books can be viewed as per the subjects, book name, author name
and Publishers.
3
Transaction
This option presents
1. Details regarding the distributed of books. The details contain name of the
member, name of the book, Due date and penalty (if any).
2. Details of books delivered
3. Details of books to be returned as on date
Stock:
Number of books on hand, number of books damaged, number of books lent, number
of books missed are presented on selecting this option.
Branches:
Details of libraries of different location can be viewed on selecting this option.
Journals:
Details of magazines, daily newspaper and novels are given.
Office use:
This is meant for administering the database. The details collected from the options
specified above are stored in a database. Users are given a unique password to process their
data only. They are not allowed to process data of other users. The data of all the users can
be processed by authorized staff members of the library only by entering this option.
Feedback:
Opinion of the website users about this website are gathered through this option.
4
1.2. ORGANIZATION PROFILE
Thamizh Technologies is a professionally managed organization providing total HR
Solutions, Recruitments, Outsourcing and Training to various companies. We provide
services to various types of students which include Engineering, IT, Management department
etc.
GROUP
We have an enviable history of providing high quality services in the fields of R&D,
Design and Development, Training and HR Consulting in Sivaganga. Our organization has
already established its reputation in offering High quality education in the areas of
Engineering, Arts, Science, and Management Courses.
SERVICES
We dedicate our trainees in Software Development, Human Resource Consulting,
Academic Assistance and Training.
5
2. SYSTEM SPECIFICATION
6
.NET FRAMEWORK
The .NET Framework is an environment for building, deploying, and running Web
Services and other applications. It is the infrastructure for the overall .NET Platform. The
framework consists of three main parts: the Common Language Runtime, the class libraries,
and VB.NET.
The Common Language Runtime and class libraries, including Windows Forms,
ADO.NET, and VB.NET, combine together to provide services and solutions that can be
easily integrated within and across a variety of systems. The .NET Framework provides a
fully managed, protected, and feature-rich application execution environment, simplified
development and deployment, and seamless integration with a wide variety of languages.
7
.NET FRAMEWORK CLASS LIBRARY
The .NET Framework class library provides a collection of useful and reusable types
that are designed to integrate with the common language runtime.
Types are object-oriented and
Fully extensible
The Common Language Specification defines the minimum standards that .NET
language compilers must conform to, and thus ensures that any source code compiled by a
.NET compiler can interoperate with the .NET Framework. The Common Type System
ensures type compatibility between .NET components. Because .NET applications are
converted to IL prior to deployment and execution, all primitive data types are represented as
.NET types. Thus, a Visual Basic Integer and a C# int are both represented in IL code as a
System.Int32. Because both languages use a common and interconvertable type system, it is
possible to transfer data between components and avoid time-consuming conversions or hard-
to-find errors.
8
Each assembly has one and only one assembly manifest, and it contains all the
description information for the assembly. The assembly manifest can be contained in its own
separate file, or it can be contained within one of the assembly's modules.
9
Some of the services provided by the Execution Support are
Automatic Memory Management
Security
Interoperability with Unmanaged Code
Cross – Language Debugging Support
Enhanced Deployment and Versioning Support
COMPONENTS OF CLR
.NET also provides many other features, such as garbage collection for freeing up
resources, true inheritance for the first time, debugging that works across languages and
against running applications, and the ability to create Windows services and console
applications.
10
COMMON TYPE SYSTEM
The Common Type System specifies the types supported by the CLR. The types
specified by the CLR include
Classes — the definition of what will become an object; includes properties, methods,
and events
Interfaces — the definition of the functionality a class can implement, but does not
contain any implementation code
Value Types — User-defined data types that are passed by value
The type system sets out the rules that language compilers must follow to produce
code that is cross-language compatible. By following the type system, vendors can produce
code that is guaranteed to work with code from other languages and other compilers because
all languages are consistent in their use of types.
In this system, the concept of ADO.NET will have different requirements for working
with data. In some cases, the user might simply want to display data on a form. In other cases,
the user might need to device a way to share information with another company. The user
might never need to know some of the details of data handling — for example, user might
never need to directly edit an XML file containing data — but it is very useful to understand
the data architecture in ADO.NET.
11
Similarly, applications that require an open database connections are extremely
difficult to scale up. An application that does not scale up well might perform acceptably with
four users but will likely not to do so with hundreds.
For all these reasons, data access with ADO.NET is designed around an architecture
that uses connections sparingly. Applications are connected to the database only long enough
to fetch or update the data. Because the database is not holding on to connections that are
largely idle, it can service many more users of languages.
ADO.NET
ActiveX ® Data Objects.NET (ADO.NET), formerly known as ADO+, is a new set of
classes that expose the data access services of the .NET Framework. ADO.NET is a natural
evolution of ADO and is built around N-Tier application development. ADO.NET has
been created with XML at its core. The ADO.NET object model is composed of two central
components: the connected layer, which consists of the classes that comprise the .NET Data
Provider, and the disconnected layer, which is rooted in the Dataset.
.NET Data Providers includes the following components: the Connection object, the
Command object, the Data Reader, and the Data Adapter. The first two should be familiar
to existing ADO programmers; they are used to open a connection to a data source and
execute a command against it. The Data Reader loosely corresponds to a forward-only, read-
only
DATA VIEW
The Data View speaks to the Dataset and is a special class designed for objects to
bind to and can provide customized views of the Data Set. It provides methods and properties
that enable objects such as a Data Grid to bind to a Dataset and contains properties such as
Allow Edit and Count that allow the object to work with the data in meaningful ways. A Data
View is only used in conjunction with a Dataset and never with a Data Reader.
DATA SET
The Dataset is the core component of the disconnected architecture of ADO.NET that
caches data locally on the client. The Dataset is explicitly designed for data access
independent of any data source. As a result it can be used with multiple and differing data
sources, XML data, or used to manage data local to the application. The Dataset contains a
collection of one or more Data Table objects made up of rows and columns of data, as well as
primary key, foreign key, constraint and relation information about the data in the Data Table
objects.
DATA PROVIDER
The Data Provider connects to the database on behalf of ADO.NET. It encapsulates all
connections to a database. The Data Provider containing some objects in it:
Connection
Command
DataAdaptor
DataReaderS
13
CONNECTIONS
Connections are part of a Data Provider and the Connection object provides
connectivity to a data source. Connections can be opened in two ways:
1. Explicitly by calling the Open method on the connection;
2. Implicitly when using a DataAdapter.
COMMANDS
The Command object enables access to database commands to return data, modify
data, run stored procedures, and send or retrieve parameter information. Commands contain
information that is submitted to a database as a query, and, like connections, are represented
by the provider-specific classes SqlCommand and OleDbCommand. Functionally, once the
Connections are established and the Commands are executed the results are in the form of
streams. These resultant streams can be accessed either by DataReader object, or passed into
a DataSet object via a DataAdapter. The SqlCommand class provides four different methods
to execute a command. They are: ExecuteReader, ExecuteNonQuery, ExecuteScalar and
ExecuteXmlReader.
DATA ADAPTERS
The DataAdapter provides a set of methods and properties to retrieve and save data
between a DataSet and its source data store. It does the actual work of putting returned data
from a database into a DataSet. It also manages reconciling how data should be updated
against a database. Connections and Commands whose properties are set early on in code are
often passed into DataAdapters for use when their action methods are invoked. The
DataAdapter object encapsulates a set of data commands and a database connection, which
are used to fill the DataSet and update the data source.
14
DATA READERS
When dealing with large read only data, e.g. reading 5,000 rows of data, the .NET
framework includes the DataReader object, which is a read-only, forward-only stream
returned from the database record set. It is a highly optimized, no buffering, and fire hose-
style interface for getting the results of a query executed against the data source. The Data
Adapter provides the bridge between the .NET Data Providers and the Dataset. The Dataset
is a local buffer of tables or a collection of disconnected record sets.
Microsoft Access (current full name Microsoft Office Access) is a relational database
management system from Microsoft, packaged with Microsoft Office Professional which
combines the relational Microsoft Jet Database Engine with a graphical user interface.
Microsoft Access can use data stored in Access/Jet, Microsoft SQL Server, Oracle, or
any ODBC-complaint data container. Skilled software developers and data architects use it
to develop application software. Relatively unskilled programmers and non-programmer
“power users” can use it to build simple applications. It supports some object-oriented (OO)
techniques but falls short of being a fully OO development tool.
Microsoft Access was also the name of a communications program from Microsoft,
meant to compete with ProComm and other programs. This Microsoft Access proved a
failure and was dropped. Years later Microsoft reused the name for its database software.
FEATURES
One of the benefits of Access from a programmers perspective is its relative
compatibility with SQL – queries may be viewed and edited as SQL statements, and SQL
statements can be used directly in Macros and VBA Modules to manipulate Access tables.
Users may mix and use both VBA and “Macros” for programming forms and logic and offers
object-oriented possibilities.
15
MSDE (Microsoft SQL Server Desktop Engine) 2000, a mini-version of MS SQL
Server 2000, is included with the developer edition of Office XP and may be used with
Access as an alternative to the Jet Database Engine.
Unlike a complete RDBMS, the Jet Engine lacks database triggers and stored
procedures. Starting in MS-Access 2000(Jet 4.0), there is a syntax that allows creating
queries with parameters, in a way that looks like creating stored procedures, but these
procedures are limited to one statement per procedure. Microsoft Access does allow forms to
contain code that is trigged as changes are made to the underlying table (as long as the
modifications are done only with that form), and it is common to use pass-through queries
and other techniques in Access to run stored procedures in RDBMS that support these.
In ADP files (supported in MS Access 2000 and later), the database-related features
are entirely different, because this type of file connects to a MSDE or Microsoft SQL Server,
instead of using the Jet Engine. Thus, it supports the creation of nearly all objects in the
underlying server (tables with constraints and triggers, views, stored procedures and UDF-s).
However, only forms, reports, macros and modules are stored in the ADP file (the other
objects are stored in the back-end database).
With windows the user can run programs, enter and move data around and performs
DOS tasks by simply using the mouse to point objects on the screen. Windows owes its name
to the fact it runs each program or each document in its own separate window. Further, the
user can have any number of Windows on the screen at time, each containing its own
program. It is possible to switch between windows easily.
Another advanced feature in windows is that it has clipboard facility. It lets the user to
copy data of different document types, make it easy to cut and paste information from one
application to another.
16
FEATURES OF WINDOWS XP
Microsoft windows XP is more compatible and more powerful than any workstation
that you have used before.
- Easier to use
- Easier to manage
- More compatible and Powerful
EASIER TO USE
Windows XP makes it easier to:
- Work with files
- Find information
- Personalize your computer environment
- Work on the web Work remotely
MORE POWERFUL
Windows XP provides
- Industrial Strength reliability
- The highest level of security
- Powerful performance
DISTRIBUTED PROCESSING
Windows XP allows the connectivity with variety of host environment through its
support of multiple transport protocol an client server facilities.
17
3. SYSTEM ANALYSIS
In this situation a method is required to allocate a suitable person for the correct job at
correct time and maintain the authorized process at a place whereby functions within the
application can only be accessed by persons to whom permission has been granted.
DRAWBACKS
It is very difficult to keep track of the transactions accurately and
efficiently.
It is unable for the existing system to generate variety of reports.
Security and protection of the confidential data is not efficient.
Much user performance leads to errors.
Dynamic queries are not possible
It is not user friendly
Lack of speed, interactive-ness and flexibility.
Possible violation of referential integrity.
18
3.2. PROPOSED SYSTEM
The proposed system was aimed to overcome the major drawbacks of the existing
(i.e.) FoxPro. To eradicate the problems faced there is a need to switch on to the system. The
proposed system is based upon online transactions.
The system that we proposed uses VB.NET 2005 as the front end and MS-Access as
the power database. The front end Visual Basic.NET tools providing graphical user interface
with oracle as a power database system.
This simply reports – a formal document detailing the nature and scope of the
proposed solution.
The main objective of the feasibility study is test the technical, social and economic
feasibility of developing a computer system. this is done by investigation the existing system
in the area under investigation and generating ideas about a new system.
On studying the feasibility of the system three major consideration are deal with, to
find whether the automation of the system feasible.
19
4. SYSTEM DESIGN
The design of the system is essentially a blue print or a plan for a solution for the
system. At the first level the focus is made which modules are needed for the system and how
modules should be interconnected. This is called system design.
In the second level, the internal design of the modules and how the specification of
the module can be satisfied is decide upon. Thus design level is called detailed design. Since
the detailed design delineates the major characteristics of the system and also its efficiency. A
Design methodology is a systematic approach to create a design by application of a set of
techniques and guidelines.
ARCHITECTURAL DESIGN
20
4.1. DATAFLOW DIAGRAM
Data Flow Diagram (DFD) is a directed graph in which the nodes specify processing
activities and the arcs specify data items transmitted between processing nodes.
Data Flow Diagrams are excellent mechanisms for communicating with customers
during analysis. Data Flow Diagram are quit valuable for establishing naming conventions
and names of system components such as subsystems, files and data link.
DFD is used to represent the functional relationship of input, process and output
values presented by system. DFD shows how information moves through the system and how
it is modified by series of transformation that are applied as data moves from input to output.
DFD may be used to represent a system at any level of abstraction.
A DFD also called context diagram represents entire system as a single module with
input to output data indicated by incoming and outgoing allows respectively. Additional
processes and information flow paths are represent as a DFD is partitioned to reveal more
detail represent the system with major modules, data flows and data stores, the other levels
will show each module in the top level DFD in a more detailed fashion.
21
22
23
24
4.2. INPUT DESIGN
Identification of the correct input and output for a system from the major parts of a
system analysis. During the System analysis the provider’s and seeker’s needs, the data
stores, the key system elements are identified. Based on this identification the input to be
provided to the system and the outputs that are to be generated and their formats are decided.
The Input Design is the kind that ties the information system into the World of its users.
Output refers to the results that are generated by the system. The design decision for handling
input specified how data are accepted for computer processing.
25
4.3. OUTPUT DESIGN
One of the most important features of an information system for users is the output it
produces. Output is the information delivered to the users through the information system.
Without quality output, the entire system may appear to the unnecessary that users will avoid
using it. Users generally merit the system solely by its output. Therefore an effective output
design is an important feature of design specifications.
26
4.4. DATABASE DESIGN
Data Source Name: libproj
Table Name: applicant
Field Name Data Type Description
Name Char(15) Name of the applicant
F name char(15) Father’s Name
Dob Date/Time Date of Birth
Sex Char(8) Gender
Address Char(30) Address
Phno Number(10) Phone Number
Occup Char(15) Occupation
Samount Number(5) Subscription Amount
Ddno Number(5) Demand Draft No
Regdate Date/time Registration Date
27
Name Char(15) Library Name
Address Char(30) Address
City Char(10) City
Phno Number(10) Phone Number
Librarian Char(20) Librarian
Books Number(5) Books
Comers Number(4) Commers
Members Number(5) Members
Employs Number(3) Employees
28
Table Name: entry
Field Name Data Type Description
User Char(15) User Name
Pass Char(20) Password
Table Name:fine
Field Name Data Type Description
Name Char(15) Name
Ledate Date/time Lending Date
Lastdate Date/time Last Date
Bcode Number(5) Book Code
Bname Char(25) Book Name
Table Name:journal
Field Name Data Type Description
No Number(4) Journal No
Name Char(10) Journal Name
Issue Date/time Issue
Lang Char(10) Language
Seasion Number(4) Seasion
Nobook Number(5) NoBook
Country Char(15) Country
Rate Number(5) Amount
Table Name:member
Field Name Data Type Description
No Number(5) Member ID
Name Char(15) Member Name
Fname Char(15) Father’s Name
Dob Date/Time Date of Birth
Sex Char(8) Gender
Address Char(30) Address
29
Phno Number(10) Phone No
Occup Char(15) Occupation
Samount Number(5) Subscription Amount
Ddno Number(5) Demand Draft No
Nocard Number(5) No. of. Cards
Wdraw Char(15) Withdrawal
Vdate Date/Time Withdrawal Date
30
Table Name: stock
Field Name Data Type Description
O year Number(4) Opening year
B stock Number(5) Book Stock
B given Number(4) Book Given to
Used Number(5) Used Books
Total Number(6) Total Books
Missed Number(4) Missed books
Damage Number(4) Damage Books
31
5. SYSTEM IMPLEMENTATION
Implementation includes all the activity that takes place to convert the old system to
the new. The new system “Digitized Library Management System” is a totally new, replacing
existing manual system, proper implementation is essential to provide a reliable system to
meet the organization requirements.
Implementation Procedure:
An essential view of software requirements presents the functions to be accomplished
and information to be processed with out regard to implement detail. The system is
implemented and the conversion is complete, user and analysis alike usually conduct review
of the system. The review is also important to gather information for the maintenance of the
system. The review has been proved to meet the expectations and has also improved their
working condition.
User Training:
The quality of training received by the personnel involved with the system affects the
successful implementations of the system. Thus for a successful implementation efficient
training must be given to the system operators and the user of the system. Proper training has
been given to the system operators with regard to the operation system – data entry for
providing the necessary support service and that they are able to handle all possible
operations, both routine as well as extraordinary.
Operational Documentation:
Documentation outline can be used as a model for a design specification. Each section
is comprised of numbered paragraphs that address different aspects of the design
representation. Documentation outline presents a complete design description of software the
sections of the designs specification are completed as a designer refines his representation of
the software. The modules can be increase if they will any requirements in the future in the
project.
32
6. SYSTEM TESTING
The system “Digitized Library Management System” as a whole was deployed in the
VB.NET 2010 and was tested. The system was found to be working perfect and an end user
has been asked to enter the data, and further the connected systems has been tested with the
sample.
In the project, the login details of the user are being verified by various conditions.
All the conditions are satisfied, then after the user go to visit the system project.
This testing was carried out during the programming stage itself.
Performance Test
Stress Test
PERFORMANCE TESTING
It determines the amount of execution time spent in various parts of the unit, program
throughput, and response time and device utilization by the program unit. To recover the
project from the slow response time, try to avoid of apply the looping statement instead of the
control statements.
STRESS TESTING
Stress Test is those test designed to intentionally break the unit. A Great deal can be
learned about the strength and limitations of a program by examining the manner in which a
programmer in which a program unit breaks.
33
6.2. SYSTEM TESTING
System Testing involves two kinds of activities: Integration Testing and Acceptance
Testing. Strategies for integrating software components into a functioning product include the
bottom-up strategy, the top-down strategy and the sandwich strategy. Acceptance Testing
involves planning and execution of the functional tests, performance tests and the stress tests
to verify that the implemented system satisfies its requirements.
The System testing does not test the module wise, but the integration of each module
in the systems. System testing helps to find in discrepancies between the original objectives
of the system.
The inputs are well verified by different conditions at different stages. Suppose the
user may give wrong username or password, then the system will inform the wrong entry.
The ID will be automatically generated for to avoid the redundancy and duplication.
Here book is the base of the project. The customer information, lending details,
books, journal and employee roles, and the lending fine information are maintained under the
same category.
34
7. CONCLUSION
This system has been developed for the present requirement and it works satisfactorily
under all circumstances that may arise in the real environment. It caters to need of
organizations effectively.
Reports generated with live data have proved to be information and also helpful in
making important decisions. This newly development system consumes less processing time
and high productivity. Since screens are user friendly and user get familiarized with use it.
The system is designed to be highly flexible so that any future modifications and requirement
can be easily incorporated without much design complications.
35
8. FUTURE ENHANCEMENT
36
9. BIBLIOGRAPHY
BOOK REFERENCE
o Essential .NET, James S.Miller, Tata McGraw Hill Publications, 2002 Second
Edition.
WEBSITE REFERENCE
http://code.msdn.microsoft.com/GotDotNet.aspx
http://www.devarticles.com/c/b/MSACCESS/
http://www.vbdotnetheaven.com/
37
10. APPENDIX
38
39
40
41
42
43
44
45
46
47
(B) SAMPLE SOURCE CODE
48
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs)
Handles Button2.Click
Dim x
x = Val(TextBox1.Text)
49
Private Sub Button3_Click(ByVal sender As System.Object, ByVal e As System.EventArgs)
Handles Button3.Click
Dim x
x = Val(TextBox1.Text)
con = New OleDb.OleDbConnection("provider=sqloledb.1.0;user id='sa'
password='sa';initial catalog=; data source=;")
con.Open()
cmd = New OleDb.OleDbCommand("select * from t where empid=" & x, con)
dr = cmd.ExecuteReader()
If (dr.HasRows = 0) Then
MsgBox("no records", MsgBoxStyle.Information)
Else
Do While dr.Read
TextBox2.Text = dr(1).ToString()
TextBox3.Text = dr(2).ToString()
ComboBox1.Text = dr(3).ToString()
TextBox4.Text = dr(4).ToString()
TextBox5.Text = dr(5).ToString()
TextBox6.Text = dr(6).ToString()
TextBox8.Text = dr(7).ToString()
TextBox9.Text = dr(8).ToString()
TextBox10.Text = dr(9).ToString()
TextBox11.Text = dr(10).ToString()
TextBox12.Text = dr(11).ToString()
TextBox13.Text = dr(12).ToString()
Loop
End If
con.Close()
End Sub
50
con = New OleDb.OleDbConnection("provider=sqloledb.1.0;user id='sa'
password='sa';initial catalog=; data source=;")
con.Open()
cmd = New OleDb.OleDbCommand("select distinct(empid) from t", con)
dr = cmd.ExecuteReader()
If (dr.HasRows = 0) Then
MsgBox("no rec found", MsgBoxStyle.Information)
Else
ListBox1.BeginUpdate()
Do While dr.Read
ListBox1.Items.Add(dr(0).ToString())
Loop
ListBox1.EndUpdate()
End If
con.Close()
End Sub
55