Professional Documents
Culture Documents
CHAPTER 4
functions, physical environment and resources and the design and implementation
system.
The primary goal of this phase was to gather the requirements given by the
client. The following were the requirements, according to the library's librarian:
This module allows the library personnel to monitor students who visit the
New User To use this module, library personnel assigned to the In and
out of the library must register the library user and generate a QR (Quick
Response) code.
Entry and Exit This feature allows the person in charge of the library to
record a user’s entry and exit. User who desires to enter the library must first
register before the system will confirm their visit record. The library user will
only be able to enter the library using his or her QR (Quick Response) code.
Update User This feature allows the library personnel in charge to update
charge to obtain information on library users who come into the library. This
report can only be viewed by library personnel in charge who have been granted
authorized access. The visit report contains a list of users who visited the library
This module allows the library staff, librarian, and library administrator to
enter book information, search books, generate book reports, add library
User Login User who logs in include the system administrator, librarian,
and library staff. The system administrator has all the access to all the system’s
modules. The librarian on the other hand, has the access to all modules except for
deleting library user’s and adding new admins and staffs. The library staff, on the
other hand, has access to all module except for deleting books, users, currently
Register new user Only the system administrator has access to this
feature. Staff accounts should not be used to create new library personnel’s
Library Users The library user should be the one to create their accounts.
The system should not allow a single user to register several times. Students,
Education, Agriculture, Computer Studies, Sr. High School, and Jr. High School.
Record Books All the system users who have been granted access to the
system are able to add, delete, and edit book information on books. The system
must be able to validate data, not allow two books with same accession number,
Search Book This feature is used to search book information based on book
section, and book name. The system should be able to search the database based
24
on the select search type, system should be able to filter book information based
on keyword entered, and system should be able to show the book information in
table view.
Search User This feature allows the library personnel to search library
user. The system should be able to fetch library information in the table view.
Search Currently Issued Book This feature allows the library personnel
to view or search who is currently borrowing a book. The system should be able
to fetch library user’s id, book id, book name, date of issue, and due date, in the
table view.
Issue, Renew, and Return Books This feature allows the library
personnel in charge to accept or reject requests for books, renew books, and issue
new books. There is no reject option when returning a book. The system must be
able to fetch the library users id, book id, and book name. The system should be
able to fetch automatically select date of issue book and due date within three
days, in renewal book request the system automatically select date of renewal and
Currently Issued Book This feature allows the library personnel in charge to
view the currently issued book. The system should be able to fetch library users
id, book id, book, name, issue date, due date, and return date. The delete option of
25
deleting information in currently issued book is only available for librarian and
administrator only.
Message and Receive This feature allow the library personnel to message
the library user, librarian, library staff, administrator. The system should be able
Manage Users This feature allows the library administrator, and Librarian
to manage library users edit information, and delete users. The library staff has
this access also, but they can’t delete and edit library user. The system should be
Log out This feature allows the library personnel to log out in the system.
This module allows library user such as students, faculty, and staff to have
Receive Message This feature can only be accessed by the user and only
the user can view the message this message. The system should send a message to
Issue Request This feature allows the user to send request to admin to borrow a
book. The system must be able to automatically fetch date of book issue.
Renew Request This feature allows the user to send a renewal request to
the library personnel to renew a borrowed book. The system must be able to send
Return Book This feature allows the user to send request of returning a
book to the library personnel. The system must be able to automatically fetch the
Previously Borrowed Book This feature allows the user to view the
transaction history of borrowed book. The system must be able to fetch the data in
the tables consist of: Book id, Book name, Issue date, and Return Date.
This module allows library users such as students, faculty, and staff to
search book information. The functionalities of this module are the following:
27
section and book name. This module should allow users to identify if a book is
available or not.
Log out This feature allows the library users to exit the user domain
Module.
28
relationship that the system has with other entities and scope and boundaries of
the system. As gathered in the phase 1, Library user can only interact with their
renewal, and book return. The system must provide the user with all the
information of the books. Library personnel, staff, and librarian are responsible
for feeding data to the system such books and library user’s visit information,
validate library user’s request details, library users’ in and out visit record,
generate reports. Library administrator can register and update library personnel’s
information, delete library users includes, library staff, librarian, generate reports,
Fig. 3
29
The diagram on the next page shows the interaction between the user and
except for registration new library personnel includes staff, librarian, and
administrator. The user level can perform all transaction like recording
books, checking in and out of books, record in and out visits, and generate
reports.
B. Library personnel/ staff – Any staff assigned granted an access to use the
library management and visits module. The user level can perform all
and out visits, and generate reports. All except registration/ update of
system user.
C. Library user – These are library user who can only search for availability
of books by book section, book name, and can send request to any library
user’s must first register to the system to enter their own dashboard.
30
D. Administrator – The administrator has given all the access to the system
with no restrictions.
The Use Case Diagram below shows the basic functionalities of Library
Fig. 4
31
Visit Hours
1.0 Description
This use case allows the library staff, Librarian, and Administrator to
monitor and manage library visits, and to manage visitors’ information. This
card.
2.0 Pre-Condition
a. The library staff, librarian, and admin must have logged in into the
a. If the use case is successful, the visit hours control panel will display.
This use case takes effect when the library has visitor and the library
personnel wishes to add, edit, delete, generate visit report, generate library id, and
a. The system let the library personnel choose the function he/she likes to
perform (add, edit, delete, generate visit report, generate id, generate
b. Once the library personnel choose the function, he/she likes one of the
sub-flows is executed.
i. If the library personnel, select “add visitor”, then add new visitor
ii. If the library personnel, select “edit visitor”, then the edit visitor
iii. If the library personnel, select “delete visitor” then the visitor
iv. If the library personnel, select “generate visit report” the system
will let the user choose if he/she want to select specific date for
v. If the library personnel, select “generate id” then the user must fill
file.
vi. If the library personnel, select “generate QR” then the user must
vii. If the library personnel, click “Scan IN&OUT” then the system
will record the visitor entry if the visitor has record in entry then it
Add visitor
Edit Visitor
a. The system retrieves the data of the selected visitor and display the edit
visitor form.
34
c. The library personnel click “update” to update all the changes made to
Delete Visitor
a. The system retrieves and displays all the information of the selected
visitor.
b. The library personnel may then select “Delete” to delete the selected
visitor.
a. The system will retrieve and displays all the information of all who
b. The system will let the user choose what date he/she likes to filter for
the report.
Generate ID
a. The system will display the add form for the generating of ID
35
b. The library personnel must fill-up all the requested information needed,
user’s ID number.
Generate QR
b. The library personnel must fill-up the form consist of library users ID
number.
c. If the library personnel want to save the QR code, right-click the mouse
1.0 Description
This allows all the library user to receive messages, and to send message
2.0 Pre-Condition
a. The library user’s and library personnel must log in to the system to gain
3.0 Post-Condition
a. If the use case is successful the message will be display on the receive if
your library personnel and if your library user it will display on the
messagess.
This use case takes effect when the library personnel wants to send or
b. The library personnel must first fill up the text fields and then click send
c. The system will send the save the data to the database and send it to the
d. The message that has been sent will be displayed at the specific users
a. If the library personnel wants to cancel this use case he/she can simply
press back and if the library user want also to cancel the use case he/she
Manage Student
1.0 Description
This use case allows the library admin, librarian, and staff to view details
all the users information except the passwords of the user, the admin and
a. The library admin, librarian, and the staff must log-in to the system
a. If the use case is successful, the Manage student is then updated in the
This use case takes effect when the library personnel wished to view
a. The system let the library personnel choose the function he/she likes to
perform (details and delete), only the librarian and admin can delete,
ii. If the admin and librarian select “Delete”, the system will display
Details
Delete
39
a. The system retrieves and displays all the information of the selected
user
b. The library admin may then select “Delete” to delete the selected user.
c. The system displays the confirmation dialog box if you really want to
a. If in the Delete sub-flow the library admin click cancel the process will
be terminated.
b. If the library personnel entered the invalid value, it will display no user
found.
All Books
1.0 Description
This use case allows the library personnel to manage library books
information. This includes edit, details and delete from the system, also all
the library personnel and administrator can generate books reports, and the
2.0 Pre-Condition
a. The library personnel and library user must log-in to the system to gain
3.0 Post-Condition
This use case takes when the library personnel wish to edit, delete, and
generate book report or view books information and the library user can only
a. The system let the library personnel and user to choose the function
he/she likes to perform (edit, delete, details, and generate book report,
request), the library user can only interact with view and request for
book.
41
b. Once library personnel and user provide the requested information, one
i. If the library admin select “delete”, then the book information will
ii. If the library personnel select “Edit”, then the book information will
iii. If the library personnel select “Generate Book report”, then the
iv. If the library personnel and user select “Details”, then the system
v. If the library user selects “request”, then the system will send a
Edit
a. The system retrieves and displays all the information of the selected
book.
Delete Book
a. The system retrieves and displays all the information of the selected
book.
c. The system displays the confirmation dialog box if you really want to
Details
b. If the users want to view the full details of the book, he/she can click
a. The system will let the library personnel, choose he/she wants to
generate, the user can generate by book section and book status.
Request
a. If the user clicks “request” the request will be sent to any library
personnel.
simply press the cancel button to terminate the process, and the system
1.0 Description
This use case allows the library personnel to accept and reject the
2.0 Pre-Condition
a. The library personnel must log-in to the system before he/she can gain
3.0 Post-Condition
a. If the use case is successful, the book requested the accepted request will
be save to the records and the rejected the system will send a message to
This use case takes effect when the library user sends a request to the
system and the library personnel must validated the request then the sub-flow
executed.
a. If the library user sent request it will appear at the library personnel,
b. The system will let the library personnel choose what he/she likes
(accept and reject) once the library personnel select either of the two
will be saved to the records and the system will also send message to
ii. If the library personnel, select “reject” then the system will send a
a. If the library personnel want to cancel the transaction, he/she can simply
1.0 Description
This use case allows the library personnel to “delete, view, and export to
2.0 Pre-Condition
a. The library personnel must log-in to the system before he/she can gain
3.0 Post-Condition
46
This use case takes effect when the library personnel want to view, delete,
and export to excel the previously borrowed books then the sub-flow is executed.
b. The system will let the library personnel choose functions what he/she
likes (delete and export to excel), if one of the functions is selected then
the sub-flow is executed, only the library admin and librarian can delete
i. If the library personnel, select “delete” then the selected data will be
deleted to the system the system will display the confirmation dialog
ii. If the library personnel, select “export to excel” then the all the
Delete
a. The system retrieves and displays all the information of the selected
data.
b. The librarian and administrator may then select “Delete” to delete the
selected data.
c. The system displays the confirmation dialog box if you really want to
Export to Excel
b. If the user click export to excel all the information if the previously
2.0 Description
48
This use case allows the library personnel to “delete, view, and export to
2.0 Pre-Condition
b. The library personnel must log-in to the system before he/she can gain
3.0 Post-Condition
This use case takes effect when the library personnel want to view, delete,
and export to excel the currently borrowed books then the sub-flow is executed.
d. The system will let the library personnel choose functions what he/she
likes (delete and export to excel), if one of the functions is selected then
the sub-flow is executed, only the library admin and librarian can delete
iii. If the library personnel, select “delete” then the selected data will be
deleted to the system the system will display the confirmation dialog
iv. If the library personnel, select “export to excel” then the all the
Delete
d. The system retrieves and displays all the information of the selected
data.
e. The librarian and administrator may then select “Delete” to delete the
selected data.
f. The system displays the confirmation dialog box if you really want to
Export to Excel
50
d. If the user click export to excel all the information if the currently
b. If a library personnel want to cancel the process he/she can simply select
1.0 Description
This use case allows both librarian and administrator to view the recent
deletion of books, the system will display the: Book name, Deleter Name,
2.0 Pre-Condition
This use case takes effect when the librarian and administrator wish to
a. The system will display all the recent deletion of books in the data
tables.
Logout
1.0 Description
This allows all the library user to logout their perspectives dashboard.
2.0 Pre-Condition
a. The library user must first logged-in before he/she can gain access to
3.0 Post-Condition
a. If the use case is successful, the system will then display the login and
register form.
52
This use case takes effect when the library users wish to logout to the
system.
b. If the logout was successful, the system will then display the login and
registration form.
a. If the library user doesn’t want to log out the system state will remain
unchanged.
Fig. 5
The Login Activity Diagram shows the flow of activities and action during
login.
54
Fig. 6
The manage user activity diagram shows the flow of activities and actions
in managing user.
The manage all book activity diagram shows the flow of activities and
Fig. 8
The book borrowing activity diagram show the flow of activities and
Fig. 10
Fig. 11
Fig. 12
Library Visit – In & Out user sequence diagram shows the sequence
Fig. 13
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Manage All Book – Add book sequence diagram shows the sequence of
Fig. 20
Manage All Book – Edit user sequence diagram shows the sequence of
Fig. 21
Manage All Book – Delete book sequence diagram shows the sequence of
Fig. 22
Manage All Book – View user sequence diagram shows the sequence of
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
by showing the system’s classes, their attributes operation and the relationships
The user login and register class diagram shows the type of object and its
Fig. 29
The library visit class diagram shows the type of objects and its
Fig. 30
The manage user class diagram shows the type of objects and its
Fig. 31
The manage all books class diagram shows the type of object and its
Fig. 32
The generate report class diagram shows the type of objects and its
.
78
Fig. 33
4.2.5 State Transition Diagrams
The state transition diagrams describe the change of state of the Library
4.2.5.1 Login
The login state transition diagram shows the states the transition in
Fig. 34
4.2.5.2 Logout
The logout state transition diagram shows the state and transitions in
Fig. 35
The library visit – Add user state transition diagram shows the states and
Fig. 36
The library visit – Edit user state transition diagram shows the states and
The library visit – Delete user state transition diagram shows the states and
Fig. 38
81
The manage user – Add user state transition diagram shows the states and
Fig. 39
The manage user – Edit user state transition diagram shows the states and
Fig. 40
The manage user – Delete user state transition diagram shows the states
Fig. 41
The manage all book – Add user state transition diagram shows the states
Fig. 42
83
The manage all book – Edit book state transition diagram shows the states
Fig. 43
The manage all book – Delete book state diagram shows the states and
Fig. 44
84
The issue book state transition diagram shows the states and transitions in
Fig. 45
The return book state transition diagram shows the states and transitions in
Fig. 46
85
The deployment diagram below models the hardware and software used in
Fig. 47
between objects.
87
Fig. 48
The tables below show the actual design of the database according to the
request of user is
sent
TABLE: RENEW LMS
RollNo The unique Numbe Yes Yes
identifier of User r
BookId The unique Numbe Yes Yes
identifier of Book r
TABLE: RETURN LMS
RollNo The unique Numbe Yes Yes
identifier of User r
BookId The unique Numbe Yes Yes
identifier of Book r
TABLE: TBL LMS
BookId The unique Numbe Yes Yes
identifier of Book r
Deletor The name of the Text Yes No
one who delete the
book
Item The name of the Text Yes No
book deleted
Date The date of book Date Yes No
deletes
TABLE: USER LMS
RollNo The unique Numbe Yes Yes
identifier of User r
and the username
Name The name of the Text Yes No
user
Type Type of user a Text Yes No
Category The category Text Yes No
where the user
90
belongs
Department If the user is a Text Yes No
student, it is the
department where
the user belongs
EmailId The user email Text Yes No
Password The password of Text Yes Yes
the user
TABLE: MESSAGE LMS
M_id The unique Numbe Yes Yes
identifier of the r
message
Sender The name of the Text Yes No
sender
RollNo The unique Numbe Yes Yes
identifier of the r
sender
Msg The content of the Text Yes No
message
Date The date message Date Yes No
was sent
Time The time message Time Yes No
was sent
TABLE: STUDENT QRCODEDB
Id The unique Numbe Yes Yes
identifier of visitor r
in the database
STUDENTID The unique Numbe Yes Yes
identifier of the r
visitor in the
attendance
FIRSTNAME The name of Text Yes No
91
visitor
AGE The age of the Numbe Yes No
visitor r
GENDER The gender of the Text Yes No
visitor
CATEGORY The category of Text Yes No
the visitor
DEPARTMENT The visitor Text Yes No
category where the
visitor belongs.
TABLE: QRCODEDB
ATTENDANCE
ID The unique Numbe Yes Yes
identifier of the r
visitor in
attendance
STUDENTID The visitor unique Numbe Yes Yes
identifier that the r
webcam read
TIMEIN The time in of the Time Yes No
visitor
TIMEOUT The time out of Time Yes No
the visitor
LOGDATE The visit date of Date Yes No
the visitor in the
library
STATUS The status of the Text Yes No
time in and out if
the time has no
time out it is not
finished
92
Fig. 49
4.4 Physical Environment and Resources
needed for both developers and client to implement and execute the system.
Table 4.2
For the client’s side, the minimum hardware and software requirement are
Table 4.4
SOFTWARE REQUIREMENTS DESCRIPTION
Windows Operating System, preferably Interfaces between hardware and
Windows 7 or better applications
Web browser, preferably Google Chrome Displays web application
Version 3.0 or better
In this section, the design and implementation of the major data structures and
algorithms used in the software is discussed as well as the major issues and the
problems encountered during the development of the system and the respective
When developing the system, looking ahead for any unexpected events
and circumstances that might arise during the development of the system is
99
necessary. The developers must plan for whatever backup is needed and
that will occur, an Uninterrupted Power Supply (UPS) must be used or any power
supply which will prevent the occurring of abrupt power interruption. Thus,
currently running won’t be disastrous to the system being developed. To block the
information thieves, hackers and unauthorized users, the system is username and
password protected. For security of data, a secured database is used to store data
files.
The system was thoroughly tested throughout its development. Its goal
was to resolve faults and issues that were either visible or invisible to the system's
end users. The system was tested by the developers, as well as the designated
library person-in-charge and librarian, to ensure that the project objectives were
met. The table below shows the result of the test for each system’s function
Table 4.6.1
USE CASE TEST DONE RESULT FOR RESULT FOR INVALID INPUT
VALID INPUT
100
Table 4.6.2 presents the results and interpretation of the data gathered
during the testing and evaluation for each system’s function done by the selected
Edit User
View User
Delete User
View Book
Delete User
students and Library Staffs in terms of library management system and the rate of
performance of the proposed system in terms of the following features. The table
Library Staffs.
INDICATORS WM Interpretation
103
1.1 The proposed system displays the accurate book borrowing 3.54 Agree
list.
1.2 The proposed system displays the proper book return list. 3.5 Agree
1.3 The proposed system will keep track of all book 3.75 Agree
information.
Average Weighted Mean = 3.59 (Agree)
Table 1 shows the accuracy of the proposed system. The proposed system
displays the accurate book borrowing list, The proposed system displays the
proper book return list. and the proposed system will keep track of all book
information with the weighted mean 3.54, 3.5 and 3.75 respectively. The MSU-
LNAC students and library staffs liked the accuracy of the system.
INDICATORS WM Interpretation
2.1 The proposed system has a step-by-step method for issuing 3.58 Agree
books.
2.3 The proposed system can quickly generate reports. 3.54 Agree
Table 2 shows the efficiency of the proposed system. The proposed system
has a step-by-step method for issuing books, The proposed system can swiftly
select a book and the proposed system can quickly generate reports with the
weighted mean 3.58, 3 and 3.54 respectively. The MSU-LNAC students and
INDICATORS WM Interpretation
Table 3 shows the reliability of the proposed system. The proposed system
useful results, and the proposed system requires simple effort with the weighted
mean 3.54, 3.66 and 3.66 respectively. The MSU-LNAC students and library
INDICATORS WM Interpretation
procedures, and the proposed system produces useful results with the weighted
mean 4.17 and 3.95 respectively. The MSU-LNAC students and library staffs
INDICATORS WM Interpretation
5.1 The administrators take control throughout the entire 3.87 Agree
system.
5.2 It secures the information of each user of the system. 3.54 Agree
take control throughout the entire system, and it secures the information of each
user of the system with the weighted mean 3.87 and 3.54 respectively. The MSU-
LNAC students and library staffs liked the efficiency of the system.
106
4.7.3 Summary
The tables show the result of the respond of the respondent in terms of its
proposed system. There are 100% of respondent of students and 100% of library
staffs. The rate of performance of the proposed system is 3.63 means agreeing of
using proposed system. This result show that the proposed system and manual
system result.