SlideShare una empresa de Scribd logo
1 de 43
1. INTRODUCTION
1.1 ORGANIZATION PROFILE
Coalesce Technologies Private Limited is a global information technology (IT) services
company providing IT consulting, technology and outsourcing services. Using our enhanced
global delivery model, innovative plat forming approach and industry expertise, it provide cost-
effective services that enable our clients to use IT to enhance business performance, accelerate
time-to-market, increase productivity and improve services. Coalesce is the Services Provided by
the Organization.
Ever since its inception in 2001, Coalesce has been committed to providing Total Client
Satisfaction on higher-end platforms through Total Quality. In today's largely impersonal
business environment, Coalesce, with its firmly ingrained corporate philosophy of ‘Responsible
Relationships’ remains committed to its clients till they attain self sufficiency. With a rapidly
growing network of branches in India and overseas, Coalesce has built up an impressive client-
base of corporations within the country and abroad and has become one of the fastest growing IT
organizations, posting a phenomenal growth rate in the last financial year. Whether it is offering
Turnkey Solutions, providing right Manpower or creating extraordinary Software Careers,
Coalesce is sensitive to the needs of the industry .We partner with our clients to provide business
process improvement in key areas, cost reduction through process management, process re-
engineering and automation. Our customized solutions enable flexible business processes,
enhanced process clarity and cycle time. We also provide business strategy inputs to improve
competitiveness, ensure better market positioning and reduced time to market.
Innovation and customization is key to our delivery of value added services that best serve our
clientele. Our approach to address customer requirements involve people, processes, technology,
data and strategy to provide holistic solutions that can best address the customer needs and create
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
new business opportunities. Our consultants apply industry leading best practices to improve
business effectiveness, employee productivity and implement enterprise solutions.
2. LITERATURE SURVEY
Literature survey is the most important step in software development process. Before
developing the web Application tool it is necessary to determine the time factor, economy and
company strength. Once these things are satisfied, then next steps are to determine which
operating system and language can be used for developing the tool. Once the programmers start
building the tool the programmers need lot of external support. This support can be obtained
from senior programmers, from book or from websites. Before building the system the above
consideration are taken into account for developing the proposed system.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
3. PROBLEM DEFINITION
• The Library Management System implements databases to make the existing system
more efficient.
• It is difficult to catch defaulters in a usual library system, but LMSsolves this problem by
providing messages to the administrator about the fine to be paid and books to be
returned.
• When a book is to be borrowed, its barcode is read and is fed to LMS.
• When the administrator tries to issue a book to a member, LMSchecks whether the
member is allowed to borrow books respective to his limit.
• LMS also checks whether the book to be issued is a reference book or not. If the book is a
reference book, it cannot be issued.
• If the book has no restrictions it is issued to the member, and also the
• Member’s details are updated with the books that he has just borrowed.
• Any member can search a book with its title name, or author’s name.
4. DATA COLLECTION
Data collection is any process of preparing and collecting data, for example, as part of a
process improvement or similar project. The purpose of data collection is to obtain information
to keep on record, to make decisions about important issues, or to pass information on to others.
Data are primarily collected to provide information regarding a specific topic.
Provide an application which allows residents and visitors of a city to find out more about
Online Library Management system-related aspects about the city. Aspects include information
about library and Online Library Management system for the city. The site might also provide
real-time information about flooding, library handling (books alert), library-related work
projects.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The application could also provide information about Online Library Management
system-related studies and/or projects that the city is working on. Anything from measured
bacteria and contaminant levels in Support resident and visitor feedback for a variety of items:
library pressure issues, library quality concerns, water pollution incidents, or submit a suggestion
for improvement.
5. FEASIBILITY STUDY
Preliminary investigation examines project feasibility; the likelihood the system will be
useful to the organization. The main objective of the feasibility study is to test the Technical,
Operational and Economical feasibility for adding new modules and debugging old running
system. All systems are feasible if they are given unlimited resources and infinite time. There are
aspects in the feasibility study portion of the preliminary investigation:
• Economical Feasibility
• Technical Feasibility
• Operation Feasibility
5.1 ECONOMIC FEASILITY
The computerized system takes care of the present existing system’s data flow and procedures
completely and should generate all the reports of the manual system besides a host of other
management reports. It should be built as a web based application with separate web server and
database server. This is required as the activities are spread throughout the organization customer
wants a centralized database. Further some of the linked transactions take place in different
locations. Open source software like TOMCAT, JAVA used to minimize the cost for the
Customer.
5.2 TECHNICAL FEASIBILITY
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The technical issue usually raised during the feasibility stage of the investigation includes the
following: We can strongly say that it is technically feasible, since there will not be much
difficulty in getting required resources for the development and maintaining the system as well.
All the resources needed for the development of the software as well as the maintenance of the
same is available in the organization here we are utilizing the resources which are available
already.
i) The Java technology is sufficient to develop all the requirements of this project.
ii) Apache Tomcat server is sufficient for hosting this application.
5.3 OPERATIONAL FEASIBILITY
User-friendly
Customer will use the forms for their various transactions i.e. for adding new routes,
viewing the routes details. Also the Customer wants the reports to view the various
transactions based on the constraints. These forms and reports are generated as user-friendly
to the Client.
Reliability
The package wills pick-up current transactions on line. Regarding the old transactions,
User will enter them in to the system.
Security
The web server and database server should be protected from hacking, virus etc
Portability
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The application will be developed using standard open source software (Except Oracle)
like Java, tomcat web server, Internet Explorer Browser etc these software will work both on
Windows and Linux o/s. Hence portability problems will not arise.
Availability
This software will be available always.
Maintainability
The system uses the 2-tier architecture. The 1st tier is the GUI, which is said to be front-
end and the 2nd tier is the database, which uses Oracle, which is the back-end.
The front-end can be run on different systems (clients). The database will be running at the
server. Users access these forms by using the user-ids and the passwords.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
6. SYSTEM ANALYSIS
Present Working System :
• In the existing system, the transactions of the books are recorded in a local computer and
the information cannot be accessed by other members of the library.
• In some libraries, the transactions are recorded in a register, and then later they are fed
into the computer by a Data Entry Operator.
• This type of maintenance usually causes some errors due to delay inundation and
mistakes during large data entry.
• Basically there is no security, i.e. any person can perform transactions other than the
administrator
To Be Praposed :
The development of this new system contains the following activities, which try to automate the
entire process keeping in the view of database integration approach.
• In Library Management System, the processing of transactions is done with the help of
computer.
• LMS provides a very simple GUI.
• Through LMS, updating to the database is very efficient and instantly done.
• It provides a guest login for the members to view details about the available books and
allows
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
• LMS provides security (i.e. only the administrator can update any information to the
database)
6.3 USER REQUIREMENT DOCUMENTATION FOLLOWED BY USE CASE
DIAGRAMS
UML DIAGRAMS
What is UML?
The Unified Modelling Language (UML) is a standard language for specifying,
visualizing, constructing and documenting the artefacts of software systems, as well as for
business modelling and other non-software systems. The UML represents a collection of best
engineering practices that have proven successful in the modelling of large and complex systems.
The UML is a very important part of developing objects oriented software and the software
development process. The UML uses mostly graphical notations to express the design of
software projects. Using the UML helps project teams communicate, explore potential designs,
and validate the architectural design of the software.
Class diagram:
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
user
+user name
+password
+registration()
+search for books()
+view journals()
+reserved books()
+logout()
admin
+user name
+password
+add books()
+add journals()
+view reserved books()
+logout()
USE CASE DIAGRAM:
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
st udent
regist rat ion
login
search books
view books
reserved books
logout
Fig: Use Case Diagrams for Student
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
librarian
login
add new books
add journals
view reserved books
logout
Fig: Use case Diagram For Librarian
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Sequence diagram:
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
student system librarian
register
search books
view books
resereved books
login
login
add books
view reserved books
logout
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Collaboration diagram:
student system
librarian
1: register
2: login
3: search books
4: view books
5: resereved books
6: login
7: add books
8: view reserved books
9: logout
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Activitydiagram:
home
login
search books
view books
reserved books
libraryianstudent
add books
view reserved books
logout
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Deployment diagram:
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
hom e
login
st udent
librarian
search books
v iew book s
reserved books
add books
view reserved books
logout
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
6.4 SOFTARE REQUIREMENT SPECIFICATION
USER REQUIREMENTS:
1. Home
2. Register
3. Login
4. Library
5. Student
Home:
Use case ID Online Library Management System
Use case Name Home button
Description Display home page of application
Primary actor Student
Precondition Student must open application
Post condition Display the Home Page of an application
Frequency of Use case Many times
Alternative use case N/A
Use case Diagrams
Attachments N/A
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Registration Form:
Use case ID Online Library Management System
Use case Name Registration
Description It display the credential form
Primary actor Student
Precondition Student Must have Email ID and Phone
Post condition Student get the popup Message” U successfully Registered”
Frequency of Use case One time
Alternative use case N/A
Use case Diagrams
Attachments N/A
Login Form:
Use case ID Online Library Management System
Use case Name Login Form
Description Display Login form to the student
Primary actor Student
Precondition Student must have username &password
Post condition Display the Home Page
Frequency of Use case Many times
Alternative use case Forgot password
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Use case Diagrams
Attachments N/A
Administrator:
Use case ID Online Library Management System
Use case Name Library
Description Add OLMS and Library details
Primary actor Student
Precondition Must open the application home page
Post condition It displays the OLMS and Library details
Frequency of Use case Many times
Alternative use case N/A
Use case Diagrams
Attachments N/A
Student:
Use case ID Online Library Management System
Use case Name Student
Description Post complaints and post feedbacks
Primary actor Student
Precondition Student must be login
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Post condition It displays post complaints and post feedbacks
Frequency of Use case Many times
Alternative use case N/A
Use case Diagrams
Attachments Photos (if any)
6.7 DATA DICTIONARY
NORMALIZATION:
Definition: Normalization is the process of efficiently organizing data in a database. There are
two goals of the normalization process: eliminating redundant data (for example, storing the
same data in more than one table) and ensuring data dependencies make sense (only storing
related data in a table). Both of these are worthy goals as they reduce the amount of space a
database consumes and ensure that data is logically stored. There are several benefits for using
Normalization in Database.
Benefits:
• Eliminate data redundancy
• Improve performance
• Query optimization
• Faster update due to less number of columns in one table
• Index improvement
There are different types of Normalizations form available in the Database. Let’s see one by one.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Post condition It displays post complaints and post feedbacks
Frequency of Use case Many times
Alternative use case N/A
Use case Diagrams
Attachments Photos (if any)
6.7 DATA DICTIONARY
NORMALIZATION:
Definition: Normalization is the process of efficiently organizing data in a database. There are
two goals of the normalization process: eliminating redundant data (for example, storing the
same data in more than one table) and ensuring data dependencies make sense (only storing
related data in a table). Both of these are worthy goals as they reduce the amount of space a
database consumes and ensure that data is logically stored. There are several benefits for using
Normalization in Database.
Benefits:
• Eliminate data redundancy
• Improve performance
• Query optimization
• Faster update due to less number of columns in one table
• Index improvement
There are different types of Normalizations form available in the Database. Let’s see one by one.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
1. First Normal Form (1NF):
First normal form (1NF) sets the very basic rules for an organized database:
• Eliminate duplicative columns from the same table.
• Create separate tables for each group of related data and identify each row with a unique
column or set of columns (the primary key).
• Create Primary Key
NOTE:
In Our Tables There is no First Normalization. Because we are not allowing the duplicate
columns.
2. Second Normal Form (2NF):
Second normal form (2NF) further addresses the concept of removing duplicative data:
• Meet all the requirements of the first normal form.
• Remove subsets of data that apply to multiple rows of a table and place them in separate
tables.
• Create relationships between these new tables and their predecessors through the use
of foreign keys.
• Remove columns which create duplicate data in a table and related a new table with
Primary Key – Foreign Key relationship
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Note:
In the Above table we are not allowing duplication for columns, for that we are using PRIMARY
KEY for username [only once]
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Column Name Data Type Null able Primary Key Constraint
USERNAME VARCHAR2(40) No 1 alphanumeric(0-9)
PID NUMBER(8,0) Yes -
FNAME VARCHAR2(20) Yes -
LNAME VARCHAR2(20) Yes -
PASSWORD VARCHAR2(20) Yes - It Should Consists only characters
GENDER VARCHAR2(10) Yes -
DOB VARCHAR2(20) Yes -
DOORNO VARCHAR2(20) Yes -
STREET VARCHAR2(20) Yes -
CITY VARCHAR2(20) Yes -
STATE VARCHAR2(20) Yes -
COUNTRY VARCHAR2(20) Yes -
PINCODE NUMBER(10,0) Yes -
EMAIL VARCHAR2(40) Yes -
MOBILE VARCHAR2(10) Yes -
TELNO VARCHAR2(15) Yes -
Third Normalization:
In the above table we are using the REFERANCE for PID into Another table by using
FOREIGN KEY.
5.1.3. DATA DICTIONARY
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Column Name Data Type Null able Primary Key Constraints
USERNAME VARCHAR2(40) No 1 alphanumeric(0-9)
PID NUMBER(8,0) Yes -
FNAME VARCHAR2(20) Yes -
LNAME VARCHAR2(20) Yes -
PASSWORD VARCHAR2(20) Yes -It Should Consists only characters
GENDER VARCHAR2(10) Yes -
DOB VARCHAR2(20) Yes -
DOORNO VARCHAR2(20) Yes -
STREET VARCHAR2(20) Yes -
CITY VARCHAR2(20) Yes -
STATE VARCHAR2(20) Yes -
COUNTRY VARCHAR2(20) Yes -
PINCODE NUMBER(10,0) Yes -
EMAIL VARCHAR2(40) Yes -
MOBILE VARCHAR2(10) Yes -
TELNO VARCHAR2(15) Yes -
Table Name: Library
Field Name Data Type Size
USERNAME VARCHAR 100
PASSWORD VARCHAR 100
Table Name: Student
Field Name Data Type Size
USERNAME VARCHAR 100
PASSWORD VARCHAR 100
Table Name: Librarian register.
Field Name Data Type Size
(fname VARCHAR 100
lname VARCHAR 100
rollno VARCHAR 100
gender VARCHAR 100
mailid VARCHAR 100
address VARCHAR 100
phone VARCHAR 100
password VARCHAR 100
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Table Name : Student register
Field Name Data Type Size
(fname VARCHAR 100
lname VARCHAR 100
rollno VARCHAR 100
gender VARCHAR 100
mailid VARCHAR 100
address VARCHAR 100
phone VARCHAR 100
password VARCHAR 100
STUDENT NAME VARCHAR 100
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
7. SYSTEM ENVIRONMENT
Software Requirements:
Operating System : Windows XP
Front End : J2ee
Programming tool : net beans
Back End : Sql Server 2005
Hardware Requirements:
Processor : Intel Pentium IV
Cache Memory : 1MB
HDD : 40 GB
RAM : 512 MB
Processor Speed : 600 MHz
Display Type : VGA
Mouse : Logitech
Monitor : 15” Samsung Color Monitor
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
8.SYSTEM DESIGN
The System Design includes the maintenance of the Patient information, their login details,
authorization services, details of the messages with respect to the user logged into and their
accessibility information in the database server.
The design also needs to provide the communication channel to the user to communicate with
the website to know better details about the healthcare system. Authorization and authentication
services are preferred most for this purpose.
The user is also expected to have the facility to store the information of the healthcare system, to
speed up the communication process between the server and the process of maintaining the
details, which include all the doctors and there suggested medicines, and their detailed
information required for the usage process. The user also should give all his details as a
registration to get registered.
WHY CHOOSE “JAVA":
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
In its brief existence, the WORLD WIDE WEB has evolved into a truly global Information
space. Not only does it offer information on any subject, it provides its citizens with the power to
globally publish information on any subject and at minimal cost. The massive international
participation in the web has resulted in the creation of many web pages that are not only
informative, but also entertaining. This entertainment value has further fuelled the webs growth
and has led to browsing becoming an international pastime. Browsing involves scanning web
pages for interesting information, following useful links to other pages, and repeating the process
until we come across something that makes us temporarily stop and focus sometimes we mutter
"HMM" or "That's interesting!" and create a bookmark. Then, eventually, we move on. The
tendency to move on and continue browsing is natural.
We usually don't read the same book over and over. If we have stock of magazines in front of us,
we are likely to flip through them all. Web pages are like magazine pages, except that they are
move available, usually free and have more "next" pages to which to turn computer programs are
different. They are active, while books, magazines, and web pages are static or passive.
The Modern software developers faces enormous headaches and challenges when he tries to
develop software that is portable to Microsoft windows, x window systems, motif, Macintosh,
and OS/2 windowing and networking environments. The usual approach is to pick a target
operating system (o s), write software for that o s, and eventually migrate it to the other o s
platforms. This usually involves great expense in terms of labour and software development
resources. It also results in the sacrifice of features that are difficult to support across multiple o s
platforms.
Java fulfils the software developer's dream of being able to write software in a single language
that will support windowing and networking on all major o s platforms, without specified
tailoring or even compilation. But Java's attractiveness does not end here. Sun's engineers were
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
thoughtful enough to develop in java a language and runtime system that art simple, compact,
Object Oriented, extendible, and secure. And then they gave it away for free.
ABOUT JAVA:
Java is a programming language, a runtime system, a set of development tools, an application
programming interface (API). The relationship between these elements is depicted in figure.
The Java API contains predefined software packages with numerous platform-independent
"hooks" into the native windowing and networking capabilities of the host operating system. The
Java API provides a single common API across all operating system to which Java is ported.
The keys to Java's portability are its run time system, and it’s API. The run time system is very
compact, evolving from earlier Sun efforts to build a software platform for consumer electronics.
Because this platform was not designed around any existing microprocessor, it was built from
scratch to be simple and efficient. The fact that it was not tied to a given hardware architecture
enabled it to be architecture neutral.
JAVA AND MODULARITY
Application Java supports the partition of a large program into modules. Specifically, a
Java program consists of number of classes. If the program is properly designed, these classes
will reflect encapsulation and information hiding. In Java, grouping sets of related classes into
packages. Could enhance encapsulation and information hiding.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
JAVA AND CONSTANTS
Java is pure object-oriented language. Thus, it does not support constants as such instead;
constants have to be defined as final variables within a class. It is somewhat confusing for a
constant to be defended as a "variable". Unlike C and C++, Java also do not support macros such
as # defines that can be used, in conjunction with a pre-processor, to declare the value of a
constant? There is a good reason for this. Java applets are design to be independent programs
loaded over the Internet. Java therefore does not support header files or other components that
need to be available in conjunction with otherwise stand-alone programs.
JAVA AND OBJECT ORIENTATION
Java supports the five basic elements of Object-Oriented language, namely, classes,
objects, inheritance, polymorphism, and dynamic binding. Java is a pure Object-Oriented
language; it does not support the classical paradigm. Thus there are no functions or procedures,
only methods or classes.
JAVA AND REUSABILITY
All Object-Oriented programming language supports reuse via inheritance of classes. In
addition, mechanisms such as templates (in C++) and generics (in Adam) provide reuse at a
higher level of abstraction. A template or generic is a module that is defined in terms of
parameters. The generic is then instantiated for a particular set of parameters. There is a good
reason for this. Java applets are design to be independent programs loaded over the Internet.
There is a good reason for this. Java applets are design to be independent programs loaded over
the Internet.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
JAVA DATABASE CONNECTIVITY
The database is the most important component of a company's information services
infrastructure. It is heart of the applications on which a company depends for its survival. Any
programming language must be able to provide an application with access to these databases if it
is to be considered a serious programming language.
The issues surrounding database access are often very difficult; other languages use either
proprietary APIs specific to individual databases or complex universal APIs such as ODBC.
Before starting any program the must be a need to used through data modeling and database
design.
JSP:
Java Server Pages (JSP) is a technology for developing web pages that support dynamic
content which helps developers insert java code in HTML pages by making use of special JSP
tags, most of which start with <% and end with %>.
A Java Server Pages component is a type of Java served that is designed to fulfil the role of a
user interface for a Java web application. Web developers write JSPs as text files that combine
HTML or XHTML code, XML elements, and embedded JSP actions and commands.
Using JSP, you can collect input from users through web page forms, present records from a
database or another source, and create web pages dynamically.
JSP tags can be used for a variety of purposes, such as retrieving information from a database or
registering user preferences, accessing JavaBeans components, passing control between pages
and sharing information between requests, pages etc.
Why Use JSP?
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Java Server Pages often serve the same purpose as programs implemented using the Common
Gateway Interface (CGI). But JSP offer several advantages in comparison with the CGI.
Performance is significantly better because JSP allows embedding Dynamic Elements in HTML
Pages itself instead of having a separate CGI files.
JSP are always compiled before it's processed by the server unlike CGI/Perl which requires the
server to load an interpreter and the target script each time the page is requested.
Why Oracle 10G?
Top 10 Differences between Oracle and Mysql?
1. Oracle Support Pl-Sql (Procedural Language) in addition to Sql, Mysql support only Sql
2.Oracle Provides lots of security features such as row lock while Mysql provide column.
3. Oracle requires username, password, and profile validation at the time of logging while Mysql
requires only username, password and host.
4. Oracle9i Database supports the use of temporary tables for an individual session, or global to
all users.
5. Oracle is used for the large Enterprise.
6. Mysql is light, reliable and can connect to multi-Client Program.
7. Facebook-The world 2nd number website drive on mysql.
8. MySQL does not support data partitions, and requires a server for each set of data files.
Scalability is limited to the size of a single server. The limitations within MySQL of not
supporting distributed databases is a serious roadblock in creating a high-performance, scalable
database solution.
9. MySQL is an open source database, and is completely free.
10. Compare to Oracle, MySQL doesn't have Tablespace, Role management, snapshots,
synonym and packages.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
9. IMPLEMENTATION
10. SYSTEM TESTING
10.1TESTING STRATEGIES:-
In order to make sure that the system does not have errors, the different levels of testing
strategies that are applied at differing phases of software development are:
UNIT TESTING:
Unit Testing is done on individual modules as they are completed and become
executable. It is confined only to the designer's requirements. Each module can be tested
using the following two Strategies:
BLACK BOX TESTING:
In this strategy some test cases are generated as input conditions that fully execute all
functional requirements for the program. This testing has been uses to find errors in the
following categories:
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
i. Incorrect or missing functions
ii. Interface errors
iii. Errors in data structure or external database access
iv. Performance errors
v. Initialization and termination errors.
In this testing only the output is checked for correctness.
The logical flow of the data is not checked.
WHITE BOX TESTING:
In this the test cases are generated on the logic of each module by drawing flow graphs of
that module and logical decisions are tested on all the cases. It has been uses to generate the test
cases in the following cases:
i. Guarantee that all independent paths have been executed.
ii. Execute all logical decisions on their true and false sides.
iii. Execute all loops at their boundaries and within their operational bounds
INTEGRATING TEST:
Integration testing ensures that software and subsystems work together a whole. It
tests the interface of all the modules to make sure that the modules behave properly when
integrated together.
SYSTEM TESTING:
Involves in-house testing of the entire system before delivery to the user. Its aim is to
satisfy the user the system meets all requirements of the client's specifications.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
TEST APPROACH:
Testing can be done in two ways:
• Bottom up approach
• Top down approach
BOTTOM UP APPROACH:
Testing can be performed starting from smallest and lowest level modules and
proceeding one at a time. For each module in bottom up testing a short program executes the
module and provides the needed data so that the module is asked to perform the way it will
when embedded within the larger system. When bottom level modules are tested attention
turns to those on the next level that use the lower level ones they are tested individually and
then linked with the previously examined lower level modules.
TOP DOWN APPROACH:
This type of testing starts from upper level modules. Since the detailed activities
usually performed in the lower level routines are not provided stubs are written. A stub is a
module shell called by upper level module and that when reached properly will return a
message to the calling module indicating that proper interaction occurred. No attempt is
made to verify the correctness of the lower level module.
VALIDATION: The system has been tested and implemented successfully and thus ensured
that all the requirements as listed in the software requirements specification are completely
fulfilled. In case of erroneous input corresponding error messages are displayed
10.2. TEST CASES
Use case Name: ADMIN Login
Test Case WMPP001
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Test case
Number
Operational
Description
Expected
Output
Observed
Output
Discrepancy Priority Severity
Tc1 Enter the
invalid librarian
email id and in
valid password.
Error
Message
should be
displayed
invalid id
and
password.
Error
Message
should be
displayed.
No - -
Tc2 Enter the valid
librarian email
id and valid
password.
Message
should be
displayed
invalid id
and
password.
Message
should be
displayed.
No - -
Use case Name: Student Login
Test Case ID: WMP003
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Test case
Number
Operational
Description
Expected
Output
Observed
Output
Discrepancy Priority Severity
Tc1 Enter the
invalid student
email id and in
valid password.
Error
Message
should be
displayed
invalid id
and
password.
Error
Message
should be
displayed.
No - -
Tc2 Enter the valid
student email id
and valid
password.
Message
should be
displayed
invalid id
and
password.
Message
should be
displayed.
No - -
Tc4 Send request
for Librarian
Message
should be
displayed.
Yes No - -
Tc5 Take properties
of lease or rent
or student
Displays the
magazine
lists.
Yes No - -
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
11. REPORTS
11. CONCLUSION
LMS simplifies the manual work load and is helpful in the effective transactions of the library. The work
load of the administrator is reduced to a great extent by computerized transactions and instant information about
thebooksinthelibrary.Themembersofthelibraryareprovidedaveryinteractiveinterfacetosearchforthebooks
by title as well as author. The administrator can instantly make changes to the database. LMS provides messages
whenever required viz. limit reached of member to borrow books, error when trying to remove member who still
has to pay fine. Thus the mini project LMS by implementing VB as front end and Oracle as back end was
achievedandtestedaccordingly.
11.1 LIMITATIONS
FUTURE ENHANCEMENTS
APPENDIX
USER MANUAL:
Steps for running this program
• Load the required software’s with guidance of this manual
• The software’s required are
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
• jdk1.7.0
• Apache Tomcat 7.0
• Oracle 10G Express Edition
• Install the jdk1.7.0 in the system
• Install the Apache Tomcat 7.0
• Install the Oracle 10G Ex
• Start the Tomcat server services
• The application is loaded into the Tomcat server
• Run Tomcat server
• Execution
Type the following URL on Mozilla Firefox
For Tomcat: http:// localhost: 9999/ecura/
• After getting home page process the different operations like Doctors, Pharmacy and
Services etc.
• Do Administrative operations which can do by the Administrator only.
BIBLIOGRAPHY
Book Resources:
[1] Wallace Wang “Visual Basic 6 Programming For Dummies” IDG Books India.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
[2] Gary Cornell, “Visual basic 6: from the GROUND UP” Build windows and web applications
step by step, pp. 950-1000
[3] Kevin Loney, “Oracle 10g: The complete reference”, Master the revolutionary features of
oracle, pp. 940-950, 2004.
[4] Steven Holzner, “Visual Basic black book”, Comprehensive problem solver, pp. 1050-1100,
1998.
[5]http://www.vbtutor.net
[6] http://www.johnsmiley.com/cis18/Smiley003.pdf
[7] http://www.johnsmiley.com/cis18/Smiley004.pdf
---------------------END -----------------
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457

Más contenido relacionado

La actualidad más candente

Software requirements specification of Library Management System
Software requirements specification of Library Management SystemSoftware requirements specification of Library Management System
Software requirements specification of Library Management SystemSoumili Sen
 
Software engineering srs library management assignment
Software engineering srs library management assignmentSoftware engineering srs library management assignment
Software engineering srs library management assignmentRajat Mittal
 
library management system
library management systemlibrary management system
library management systemaniket chauhan
 
Library and member management system (lamms) by vikas sharma
Library and member management system (lamms) by vikas sharmaLibrary and member management system (lamms) by vikas sharma
Library and member management system (lamms) by vikas sharmaVikas Sharma
 
Library Management System Project in PHP with BlackBook & Source Code
Library Management System Project in PHP with BlackBook & Source CodeLibrary Management System Project in PHP with BlackBook & Source Code
Library Management System Project in PHP with BlackBook & Source CodeRadikhaSharma
 
Library mangement system project srs documentation.doc
Library mangement system project srs documentation.docLibrary mangement system project srs documentation.doc
Library mangement system project srs documentation.docjimmykhan
 
Online Library Management
Online Library ManagementOnline Library Management
Online Library ManagementVarsha Sarkar
 
Library management system
Library management systemLibrary management system
Library management systemwethecodershelp
 
Library Management system
Library Management systemLibrary Management system
Library Management systemTayyab Hussain
 
Online Library management system proposal by Banuka Dananjaya Subasinghe
Online Library management system proposal by Banuka Dananjaya SubasingheOnline Library management system proposal by Banuka Dananjaya Subasinghe
Online Library management system proposal by Banuka Dananjaya SubasingheBanukaSubasinghe
 
Library management system
Library management systemLibrary management system
Library management systemParesh Gosavi
 
Library management
Library managementLibrary management
Library managementakki_hearts
 
Final Presentation on Online Library Management
Final Presentation on Online Library ManagementFinal Presentation on Online Library Management
Final Presentation on Online Library ManagementSneha Yadav
 
Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Totan Banik
 
The library management system
The library management systemThe library management system
The library management systemMunem Shahrear
 
online library management system
online library management systemonline library management system
online library management systemVirani Sagar
 
Library management sytem
Library management sytemLibrary management sytem
Library management sytemashu6
 
Library management system
Library management systemLibrary management system
Library management systemtechlike
 

La actualidad más candente (20)

Software requirements specification of Library Management System
Software requirements specification of Library Management SystemSoftware requirements specification of Library Management System
Software requirements specification of Library Management System
 
Library management project
Library management projectLibrary management project
Library management project
 
Software engineering srs library management assignment
Software engineering srs library management assignmentSoftware engineering srs library management assignment
Software engineering srs library management assignment
 
library management system
library management systemlibrary management system
library management system
 
Library and member management system (lamms) by vikas sharma
Library and member management system (lamms) by vikas sharmaLibrary and member management system (lamms) by vikas sharma
Library and member management system (lamms) by vikas sharma
 
Library Management System Project in PHP with BlackBook & Source Code
Library Management System Project in PHP with BlackBook & Source CodeLibrary Management System Project in PHP with BlackBook & Source Code
Library Management System Project in PHP with BlackBook & Source Code
 
Library mangement system project srs documentation.doc
Library mangement system project srs documentation.docLibrary mangement system project srs documentation.doc
Library mangement system project srs documentation.doc
 
Online Library Management
Online Library ManagementOnline Library Management
Online Library Management
 
Library management system
Library management systemLibrary management system
Library management system
 
Library Management system
Library Management systemLibrary Management system
Library Management system
 
Online Library management system proposal by Banuka Dananjaya Subasinghe
Online Library management system proposal by Banuka Dananjaya SubasingheOnline Library management system proposal by Banuka Dananjaya Subasinghe
Online Library management system proposal by Banuka Dananjaya Subasinghe
 
Library management system
Library management systemLibrary management system
Library management system
 
Library management
Library managementLibrary management
Library management
 
Final Presentation on Online Library Management
Final Presentation on Online Library ManagementFinal Presentation on Online Library Management
Final Presentation on Online Library Management
 
Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)
 
Srs library m s
Srs library m sSrs library m s
Srs library m s
 
The library management system
The library management systemThe library management system
The library management system
 
online library management system
online library management systemonline library management system
online library management system
 
Library management sytem
Library management sytemLibrary management sytem
Library management sytem
 
Library management system
Library management systemLibrary management system
Library management system
 

Destacado

Emerging Strategies for a Proactive Library Management,
Emerging Strategies for a Proactive Library Management,Emerging Strategies for a Proactive Library Management,
Emerging Strategies for a Proactive Library Management,Fe Angela Verzosa
 
project on visual basic 6.0 ' Jewellery Shop Management'
project on visual basic 6.0 ' Jewellery Shop Management' project on visual basic 6.0 ' Jewellery Shop Management'
project on visual basic 6.0 ' Jewellery Shop Management' Anitha Krishnappa
 
Using Change Management to Transform Your Library - March 2017
Using Change Management to Transform Your Library - March 2017Using Change Management to Transform Your Library - March 2017
Using Change Management to Transform Your Library - March 2017ALATechSource
 
Libraries, change management and professional development: discovering an app...
Libraries, change management and professional development: discovering an app...Libraries, change management and professional development: discovering an app...
Libraries, change management and professional development: discovering an app...RAILS7
 
Change Management for Libraries
Change Management for LibrariesChange Management for Libraries
Change Management for LibrariesThomas King
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Projecthani2253
 
Change Management PPT Slides
Change Management PPT SlidesChange Management PPT Slides
Change Management PPT SlidesYodhia Antariksa
 

Destacado (8)

Emerging Strategies for a Proactive Library Management,
Emerging Strategies for a Proactive Library Management,Emerging Strategies for a Proactive Library Management,
Emerging Strategies for a Proactive Library Management,
 
project on visual basic 6.0 ' Jewellery Shop Management'
project on visual basic 6.0 ' Jewellery Shop Management' project on visual basic 6.0 ' Jewellery Shop Management'
project on visual basic 6.0 ' Jewellery Shop Management'
 
Using Change Management to Transform Your Library - March 2017
Using Change Management to Transform Your Library - March 2017Using Change Management to Transform Your Library - March 2017
Using Change Management to Transform Your Library - March 2017
 
Libraries, change management and professional development: discovering an app...
Libraries, change management and professional development: discovering an app...Libraries, change management and professional development: discovering an app...
Libraries, change management and professional development: discovering an app...
 
Change Management for Libraries
Change Management for LibrariesChange Management for Libraries
Change Management for Libraries
 
Change Management
Change Management  Change Management
Change Management
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Project
 
Change Management PPT Slides
Change Management PPT SlidesChange Management PPT Slides
Change Management PPT Slides
 

Similar a 11.online library management system

J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsMumbai Academisc
 
Synopsis on billing system
Synopsis on billing systemSynopsis on billing system
Synopsis on billing systemAlok Sharma
 
Online talent sourcing - a future essentia
Online talent sourcing - a future essentiaOnline talent sourcing - a future essentia
Online talent sourcing - a future essentiaHSE Guru
 
Library Management System
Library Management SystemLibrary Management System
Library Management SystemAditya Shah
 
System analysis and_design.docx
System analysis and_design.docxSystem analysis and_design.docx
System analysis and_design.docxAlaJebnoun
 
Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...SuhaimiHasim1
 
PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)Joseph Olumide
 
Documentation project of college management [1]
Documentation project of college management [1]Documentation project of college management [1]
Documentation project of college management [1]Priyaranjan Verma
 
04.project billing system
04.project billing system04.project billing system
04.project billing systemgirivaishali
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleChristopher Wynder
 
Bank Management System.docx
Bank Management System.docxBank Management System.docx
Bank Management System.docxNikhil Patil
 
46393833 e banking
46393833 e banking46393833 e banking
46393833 e bankingdipali2009
 
Intra mailing-system-documentation-a-asp-net-project
Intra mailing-system-documentation-a-asp-net-projectIntra mailing-system-documentation-a-asp-net-project
Intra mailing-system-documentation-a-asp-net-projectRasa Govindasamy
 
ShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivam Thakur
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java projectTutorial Learners
 

Similar a 11.online library management system (20)

J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Synopsis on billing system
Synopsis on billing systemSynopsis on billing system
Synopsis on billing system
 
Online talent sourcing - a future essentia
Online talent sourcing - a future essentiaOnline talent sourcing - a future essentia
Online talent sourcing - a future essentia
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
 
System analysis and_design.docx
System analysis and_design.docxSystem analysis and_design.docx
System analysis and_design.docx
 
Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...
 
PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)
 
Documentation project of college management [1]
Documentation project of college management [1]Documentation project of college management [1]
Documentation project of college management [1]
 
Resume
ResumeResume
Resume
 
04.project billing system
04.project billing system04.project billing system
04.project billing system
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sample
 
Bank Management System.docx
Bank Management System.docxBank Management System.docx
Bank Management System.docx
 
46393833 e banking
46393833 e banking46393833 e banking
46393833 e banking
 
Job portal
Job portalJob portal
Job portal
 
Intra mailing-system-documentation-a-asp-net-project
Intra mailing-system-documentation-a-asp-net-projectIntra mailing-system-documentation-a-asp-net-project
Intra mailing-system-documentation-a-asp-net-project
 
Billing project
Billing projectBilling project
Billing project
 
ShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business Analyst
 
Document(1)
Document(1)Document(1)
Document(1)
 
BAKKIYA_4YR
BAKKIYA_4YRBAKKIYA_4YR
BAKKIYA_4YR
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java project
 

Más de Pvrtechnologies Nellore

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesPvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesPvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titlesPvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorPvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point CircuitsPvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Pvrtechnologies Nellore
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Pvrtechnologies Nellore
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Pvrtechnologies Nellore
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorizationPvrtechnologies Nellore
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiablePvrtechnologies Nellore
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Pvrtechnologies Nellore
 

Más de Pvrtechnologies Nellore (20)

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar Codes
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division Units
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic Architectures
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
 
2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles
 
2016 2017 ieee vlsi project titles
2016   2017 ieee vlsi project titles2016   2017 ieee vlsi project titles
2016 2017 ieee vlsi project titles
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titles
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...
 
06.e voting system
06.e voting system06.e voting system
06.e voting system
 
New web based projects list
New web based projects listNew web based projects list
New web based projects list
 
Power controlled medium access control
Power controlled medium access controlPower controlled medium access control
Power controlled medium access control
 
IEEE PROJECTS LIST
IEEE PROJECTS LIST IEEE PROJECTS LIST
IEEE PROJECTS LIST
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

11.online library management system

  • 1. 1. INTRODUCTION 1.1 ORGANIZATION PROFILE Coalesce Technologies Private Limited is a global information technology (IT) services company providing IT consulting, technology and outsourcing services. Using our enhanced global delivery model, innovative plat forming approach and industry expertise, it provide cost- effective services that enable our clients to use IT to enhance business performance, accelerate time-to-market, increase productivity and improve services. Coalesce is the Services Provided by the Organization. Ever since its inception in 2001, Coalesce has been committed to providing Total Client Satisfaction on higher-end platforms through Total Quality. In today's largely impersonal business environment, Coalesce, with its firmly ingrained corporate philosophy of ‘Responsible Relationships’ remains committed to its clients till they attain self sufficiency. With a rapidly growing network of branches in India and overseas, Coalesce has built up an impressive client- base of corporations within the country and abroad and has become one of the fastest growing IT organizations, posting a phenomenal growth rate in the last financial year. Whether it is offering Turnkey Solutions, providing right Manpower or creating extraordinary Software Careers, Coalesce is sensitive to the needs of the industry .We partner with our clients to provide business process improvement in key areas, cost reduction through process management, process re- engineering and automation. Our customized solutions enable flexible business processes, enhanced process clarity and cycle time. We also provide business strategy inputs to improve competitiveness, ensure better market positioning and reduced time to market. Innovation and customization is key to our delivery of value added services that best serve our clientele. Our approach to address customer requirements involve people, processes, technology, data and strategy to provide holistic solutions that can best address the customer needs and create Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 2. new business opportunities. Our consultants apply industry leading best practices to improve business effectiveness, employee productivity and implement enterprise solutions. 2. LITERATURE SURVEY Literature survey is the most important step in software development process. Before developing the web Application tool it is necessary to determine the time factor, economy and company strength. Once these things are satisfied, then next steps are to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 3. 3. PROBLEM DEFINITION • The Library Management System implements databases to make the existing system more efficient. • It is difficult to catch defaulters in a usual library system, but LMSsolves this problem by providing messages to the administrator about the fine to be paid and books to be returned. • When a book is to be borrowed, its barcode is read and is fed to LMS. • When the administrator tries to issue a book to a member, LMSchecks whether the member is allowed to borrow books respective to his limit. • LMS also checks whether the book to be issued is a reference book or not. If the book is a reference book, it cannot be issued. • If the book has no restrictions it is issued to the member, and also the • Member’s details are updated with the books that he has just borrowed. • Any member can search a book with its title name, or author’s name. 4. DATA COLLECTION Data collection is any process of preparing and collecting data, for example, as part of a process improvement or similar project. The purpose of data collection is to obtain information to keep on record, to make decisions about important issues, or to pass information on to others. Data are primarily collected to provide information regarding a specific topic. Provide an application which allows residents and visitors of a city to find out more about Online Library Management system-related aspects about the city. Aspects include information about library and Online Library Management system for the city. The site might also provide real-time information about flooding, library handling (books alert), library-related work projects. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 4. The application could also provide information about Online Library Management system-related studies and/or projects that the city is working on. Anything from measured bacteria and contaminant levels in Support resident and visitor feedback for a variety of items: library pressure issues, library quality concerns, water pollution incidents, or submit a suggestion for improvement. 5. FEASIBILITY STUDY Preliminary investigation examines project feasibility; the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. All systems are feasible if they are given unlimited resources and infinite time. There are aspects in the feasibility study portion of the preliminary investigation: • Economical Feasibility • Technical Feasibility • Operation Feasibility 5.1 ECONOMIC FEASILITY The computerized system takes care of the present existing system’s data flow and procedures completely and should generate all the reports of the manual system besides a host of other management reports. It should be built as a web based application with separate web server and database server. This is required as the activities are spread throughout the organization customer wants a centralized database. Further some of the linked transactions take place in different locations. Open source software like TOMCAT, JAVA used to minimize the cost for the Customer. 5.2 TECHNICAL FEASIBILITY Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 5. The technical issue usually raised during the feasibility stage of the investigation includes the following: We can strongly say that it is technically feasible, since there will not be much difficulty in getting required resources for the development and maintaining the system as well. All the resources needed for the development of the software as well as the maintenance of the same is available in the organization here we are utilizing the resources which are available already. i) The Java technology is sufficient to develop all the requirements of this project. ii) Apache Tomcat server is sufficient for hosting this application. 5.3 OPERATIONAL FEASIBILITY User-friendly Customer will use the forms for their various transactions i.e. for adding new routes, viewing the routes details. Also the Customer wants the reports to view the various transactions based on the constraints. These forms and reports are generated as user-friendly to the Client. Reliability The package wills pick-up current transactions on line. Regarding the old transactions, User will enter them in to the system. Security The web server and database server should be protected from hacking, virus etc Portability Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 6. The application will be developed using standard open source software (Except Oracle) like Java, tomcat web server, Internet Explorer Browser etc these software will work both on Windows and Linux o/s. Hence portability problems will not arise. Availability This software will be available always. Maintainability The system uses the 2-tier architecture. The 1st tier is the GUI, which is said to be front- end and the 2nd tier is the database, which uses Oracle, which is the back-end. The front-end can be run on different systems (clients). The database will be running at the server. Users access these forms by using the user-ids and the passwords. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 7. 6. SYSTEM ANALYSIS Present Working System : • In the existing system, the transactions of the books are recorded in a local computer and the information cannot be accessed by other members of the library. • In some libraries, the transactions are recorded in a register, and then later they are fed into the computer by a Data Entry Operator. • This type of maintenance usually causes some errors due to delay inundation and mistakes during large data entry. • Basically there is no security, i.e. any person can perform transactions other than the administrator To Be Praposed : The development of this new system contains the following activities, which try to automate the entire process keeping in the view of database integration approach. • In Library Management System, the processing of transactions is done with the help of computer. • LMS provides a very simple GUI. • Through LMS, updating to the database is very efficient and instantly done. • It provides a guest login for the members to view details about the available books and allows Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 8. • LMS provides security (i.e. only the administrator can update any information to the database) 6.3 USER REQUIREMENT DOCUMENTATION FOLLOWED BY USE CASE DIAGRAMS UML DIAGRAMS What is UML? The Unified Modelling Language (UML) is a standard language for specifying, visualizing, constructing and documenting the artefacts of software systems, as well as for business modelling and other non-software systems. The UML represents a collection of best engineering practices that have proven successful in the modelling of large and complex systems. The UML is a very important part of developing objects oriented software and the software development process. The UML uses mostly graphical notations to express the design of software projects. Using the UML helps project teams communicate, explore potential designs, and validate the architectural design of the software. Class diagram: Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 9. user +user name +password +registration() +search for books() +view journals() +reserved books() +logout() admin +user name +password +add books() +add journals() +view reserved books() +logout() USE CASE DIAGRAM: Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 10. st udent regist rat ion login search books view books reserved books logout Fig: Use Case Diagrams for Student Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 11. librarian login add new books add journals view reserved books logout Fig: Use case Diagram For Librarian Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 12. Sequence diagram: Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 13. student system librarian register search books view books resereved books login login add books view reserved books logout Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 14. Collaboration diagram: student system librarian 1: register 2: login 3: search books 4: view books 5: resereved books 6: login 7: add books 8: view reserved books 9: logout Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 15. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 16. Activitydiagram: home login search books view books reserved books libraryianstudent add books view reserved books logout Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 17. Deployment diagram: Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 18. hom e login st udent librarian search books v iew book s reserved books add books view reserved books logout Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 19. 6.4 SOFTARE REQUIREMENT SPECIFICATION USER REQUIREMENTS: 1. Home 2. Register 3. Login 4. Library 5. Student Home: Use case ID Online Library Management System Use case Name Home button Description Display home page of application Primary actor Student Precondition Student must open application Post condition Display the Home Page of an application Frequency of Use case Many times Alternative use case N/A Use case Diagrams Attachments N/A Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 20. Registration Form: Use case ID Online Library Management System Use case Name Registration Description It display the credential form Primary actor Student Precondition Student Must have Email ID and Phone Post condition Student get the popup Message” U successfully Registered” Frequency of Use case One time Alternative use case N/A Use case Diagrams Attachments N/A Login Form: Use case ID Online Library Management System Use case Name Login Form Description Display Login form to the student Primary actor Student Precondition Student must have username &password Post condition Display the Home Page Frequency of Use case Many times Alternative use case Forgot password Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 21. Use case Diagrams Attachments N/A Administrator: Use case ID Online Library Management System Use case Name Library Description Add OLMS and Library details Primary actor Student Precondition Must open the application home page Post condition It displays the OLMS and Library details Frequency of Use case Many times Alternative use case N/A Use case Diagrams Attachments N/A Student: Use case ID Online Library Management System Use case Name Student Description Post complaints and post feedbacks Primary actor Student Precondition Student must be login Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 22. Post condition It displays post complaints and post feedbacks Frequency of Use case Many times Alternative use case N/A Use case Diagrams Attachments Photos (if any) 6.7 DATA DICTIONARY NORMALIZATION: Definition: Normalization is the process of efficiently organizing data in a database. There are two goals of the normalization process: eliminating redundant data (for example, storing the same data in more than one table) and ensuring data dependencies make sense (only storing related data in a table). Both of these are worthy goals as they reduce the amount of space a database consumes and ensure that data is logically stored. There are several benefits for using Normalization in Database. Benefits: • Eliminate data redundancy • Improve performance • Query optimization • Faster update due to less number of columns in one table • Index improvement There are different types of Normalizations form available in the Database. Let’s see one by one. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 23. Post condition It displays post complaints and post feedbacks Frequency of Use case Many times Alternative use case N/A Use case Diagrams Attachments Photos (if any) 6.7 DATA DICTIONARY NORMALIZATION: Definition: Normalization is the process of efficiently organizing data in a database. There are two goals of the normalization process: eliminating redundant data (for example, storing the same data in more than one table) and ensuring data dependencies make sense (only storing related data in a table). Both of these are worthy goals as they reduce the amount of space a database consumes and ensure that data is logically stored. There are several benefits for using Normalization in Database. Benefits: • Eliminate data redundancy • Improve performance • Query optimization • Faster update due to less number of columns in one table • Index improvement There are different types of Normalizations form available in the Database. Let’s see one by one. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 24. 1. First Normal Form (1NF): First normal form (1NF) sets the very basic rules for an organized database: • Eliminate duplicative columns from the same table. • Create separate tables for each group of related data and identify each row with a unique column or set of columns (the primary key). • Create Primary Key NOTE: In Our Tables There is no First Normalization. Because we are not allowing the duplicate columns. 2. Second Normal Form (2NF): Second normal form (2NF) further addresses the concept of removing duplicative data: • Meet all the requirements of the first normal form. • Remove subsets of data that apply to multiple rows of a table and place them in separate tables. • Create relationships between these new tables and their predecessors through the use of foreign keys. • Remove columns which create duplicate data in a table and related a new table with Primary Key – Foreign Key relationship Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 25. Note: In the Above table we are not allowing duplication for columns, for that we are using PRIMARY KEY for username [only once] Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Column Name Data Type Null able Primary Key Constraint USERNAME VARCHAR2(40) No 1 alphanumeric(0-9) PID NUMBER(8,0) Yes - FNAME VARCHAR2(20) Yes - LNAME VARCHAR2(20) Yes - PASSWORD VARCHAR2(20) Yes - It Should Consists only characters GENDER VARCHAR2(10) Yes - DOB VARCHAR2(20) Yes - DOORNO VARCHAR2(20) Yes - STREET VARCHAR2(20) Yes - CITY VARCHAR2(20) Yes - STATE VARCHAR2(20) Yes - COUNTRY VARCHAR2(20) Yes - PINCODE NUMBER(10,0) Yes - EMAIL VARCHAR2(40) Yes - MOBILE VARCHAR2(10) Yes - TELNO VARCHAR2(15) Yes -
  • 26. Third Normalization: In the above table we are using the REFERANCE for PID into Another table by using FOREIGN KEY. 5.1.3. DATA DICTIONARY Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Column Name Data Type Null able Primary Key Constraints USERNAME VARCHAR2(40) No 1 alphanumeric(0-9) PID NUMBER(8,0) Yes - FNAME VARCHAR2(20) Yes - LNAME VARCHAR2(20) Yes - PASSWORD VARCHAR2(20) Yes -It Should Consists only characters GENDER VARCHAR2(10) Yes - DOB VARCHAR2(20) Yes - DOORNO VARCHAR2(20) Yes - STREET VARCHAR2(20) Yes - CITY VARCHAR2(20) Yes - STATE VARCHAR2(20) Yes - COUNTRY VARCHAR2(20) Yes - PINCODE NUMBER(10,0) Yes - EMAIL VARCHAR2(40) Yes - MOBILE VARCHAR2(10) Yes - TELNO VARCHAR2(15) Yes -
  • 27. Table Name: Library Field Name Data Type Size USERNAME VARCHAR 100 PASSWORD VARCHAR 100 Table Name: Student Field Name Data Type Size USERNAME VARCHAR 100 PASSWORD VARCHAR 100 Table Name: Librarian register. Field Name Data Type Size (fname VARCHAR 100 lname VARCHAR 100 rollno VARCHAR 100 gender VARCHAR 100 mailid VARCHAR 100 address VARCHAR 100 phone VARCHAR 100 password VARCHAR 100 Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 28. Table Name : Student register Field Name Data Type Size (fname VARCHAR 100 lname VARCHAR 100 rollno VARCHAR 100 gender VARCHAR 100 mailid VARCHAR 100 address VARCHAR 100 phone VARCHAR 100 password VARCHAR 100 STUDENT NAME VARCHAR 100 Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 29. 7. SYSTEM ENVIRONMENT Software Requirements: Operating System : Windows XP Front End : J2ee Programming tool : net beans Back End : Sql Server 2005 Hardware Requirements: Processor : Intel Pentium IV Cache Memory : 1MB HDD : 40 GB RAM : 512 MB Processor Speed : 600 MHz Display Type : VGA Mouse : Logitech Monitor : 15” Samsung Color Monitor Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 30. 8.SYSTEM DESIGN The System Design includes the maintenance of the Patient information, their login details, authorization services, details of the messages with respect to the user logged into and their accessibility information in the database server. The design also needs to provide the communication channel to the user to communicate with the website to know better details about the healthcare system. Authorization and authentication services are preferred most for this purpose. The user is also expected to have the facility to store the information of the healthcare system, to speed up the communication process between the server and the process of maintaining the details, which include all the doctors and there suggested medicines, and their detailed information required for the usage process. The user also should give all his details as a registration to get registered. WHY CHOOSE “JAVA": Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 31. In its brief existence, the WORLD WIDE WEB has evolved into a truly global Information space. Not only does it offer information on any subject, it provides its citizens with the power to globally publish information on any subject and at minimal cost. The massive international participation in the web has resulted in the creation of many web pages that are not only informative, but also entertaining. This entertainment value has further fuelled the webs growth and has led to browsing becoming an international pastime. Browsing involves scanning web pages for interesting information, following useful links to other pages, and repeating the process until we come across something that makes us temporarily stop and focus sometimes we mutter "HMM" or "That's interesting!" and create a bookmark. Then, eventually, we move on. The tendency to move on and continue browsing is natural. We usually don't read the same book over and over. If we have stock of magazines in front of us, we are likely to flip through them all. Web pages are like magazine pages, except that they are move available, usually free and have more "next" pages to which to turn computer programs are different. They are active, while books, magazines, and web pages are static or passive. The Modern software developers faces enormous headaches and challenges when he tries to develop software that is portable to Microsoft windows, x window systems, motif, Macintosh, and OS/2 windowing and networking environments. The usual approach is to pick a target operating system (o s), write software for that o s, and eventually migrate it to the other o s platforms. This usually involves great expense in terms of labour and software development resources. It also results in the sacrifice of features that are difficult to support across multiple o s platforms. Java fulfils the software developer's dream of being able to write software in a single language that will support windowing and networking on all major o s platforms, without specified tailoring or even compilation. But Java's attractiveness does not end here. Sun's engineers were Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 32. thoughtful enough to develop in java a language and runtime system that art simple, compact, Object Oriented, extendible, and secure. And then they gave it away for free. ABOUT JAVA: Java is a programming language, a runtime system, a set of development tools, an application programming interface (API). The relationship between these elements is depicted in figure. The Java API contains predefined software packages with numerous platform-independent "hooks" into the native windowing and networking capabilities of the host operating system. The Java API provides a single common API across all operating system to which Java is ported. The keys to Java's portability are its run time system, and it’s API. The run time system is very compact, evolving from earlier Sun efforts to build a software platform for consumer electronics. Because this platform was not designed around any existing microprocessor, it was built from scratch to be simple and efficient. The fact that it was not tied to a given hardware architecture enabled it to be architecture neutral. JAVA AND MODULARITY Application Java supports the partition of a large program into modules. Specifically, a Java program consists of number of classes. If the program is properly designed, these classes will reflect encapsulation and information hiding. In Java, grouping sets of related classes into packages. Could enhance encapsulation and information hiding. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 33. JAVA AND CONSTANTS Java is pure object-oriented language. Thus, it does not support constants as such instead; constants have to be defined as final variables within a class. It is somewhat confusing for a constant to be defended as a "variable". Unlike C and C++, Java also do not support macros such as # defines that can be used, in conjunction with a pre-processor, to declare the value of a constant? There is a good reason for this. Java applets are design to be independent programs loaded over the Internet. Java therefore does not support header files or other components that need to be available in conjunction with otherwise stand-alone programs. JAVA AND OBJECT ORIENTATION Java supports the five basic elements of Object-Oriented language, namely, classes, objects, inheritance, polymorphism, and dynamic binding. Java is a pure Object-Oriented language; it does not support the classical paradigm. Thus there are no functions or procedures, only methods or classes. JAVA AND REUSABILITY All Object-Oriented programming language supports reuse via inheritance of classes. In addition, mechanisms such as templates (in C++) and generics (in Adam) provide reuse at a higher level of abstraction. A template or generic is a module that is defined in terms of parameters. The generic is then instantiated for a particular set of parameters. There is a good reason for this. Java applets are design to be independent programs loaded over the Internet. There is a good reason for this. Java applets are design to be independent programs loaded over the Internet. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 34. JAVA DATABASE CONNECTIVITY The database is the most important component of a company's information services infrastructure. It is heart of the applications on which a company depends for its survival. Any programming language must be able to provide an application with access to these databases if it is to be considered a serious programming language. The issues surrounding database access are often very difficult; other languages use either proprietary APIs specific to individual databases or complex universal APIs such as ODBC. Before starting any program the must be a need to used through data modeling and database design. JSP: Java Server Pages (JSP) is a technology for developing web pages that support dynamic content which helps developers insert java code in HTML pages by making use of special JSP tags, most of which start with <% and end with %>. A Java Server Pages component is a type of Java served that is designed to fulfil the role of a user interface for a Java web application. Web developers write JSPs as text files that combine HTML or XHTML code, XML elements, and embedded JSP actions and commands. Using JSP, you can collect input from users through web page forms, present records from a database or another source, and create web pages dynamically. JSP tags can be used for a variety of purposes, such as retrieving information from a database or registering user preferences, accessing JavaBeans components, passing control between pages and sharing information between requests, pages etc. Why Use JSP? Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 35. Java Server Pages often serve the same purpose as programs implemented using the Common Gateway Interface (CGI). But JSP offer several advantages in comparison with the CGI. Performance is significantly better because JSP allows embedding Dynamic Elements in HTML Pages itself instead of having a separate CGI files. JSP are always compiled before it's processed by the server unlike CGI/Perl which requires the server to load an interpreter and the target script each time the page is requested. Why Oracle 10G? Top 10 Differences between Oracle and Mysql? 1. Oracle Support Pl-Sql (Procedural Language) in addition to Sql, Mysql support only Sql 2.Oracle Provides lots of security features such as row lock while Mysql provide column. 3. Oracle requires username, password, and profile validation at the time of logging while Mysql requires only username, password and host. 4. Oracle9i Database supports the use of temporary tables for an individual session, or global to all users. 5. Oracle is used for the large Enterprise. 6. Mysql is light, reliable and can connect to multi-Client Program. 7. Facebook-The world 2nd number website drive on mysql. 8. MySQL does not support data partitions, and requires a server for each set of data files. Scalability is limited to the size of a single server. The limitations within MySQL of not supporting distributed databases is a serious roadblock in creating a high-performance, scalable database solution. 9. MySQL is an open source database, and is completely free. 10. Compare to Oracle, MySQL doesn't have Tablespace, Role management, snapshots, synonym and packages. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 36. 9. IMPLEMENTATION 10. SYSTEM TESTING 10.1TESTING STRATEGIES:- In order to make sure that the system does not have errors, the different levels of testing strategies that are applied at differing phases of software development are: UNIT TESTING: Unit Testing is done on individual modules as they are completed and become executable. It is confined only to the designer's requirements. Each module can be tested using the following two Strategies: BLACK BOX TESTING: In this strategy some test cases are generated as input conditions that fully execute all functional requirements for the program. This testing has been uses to find errors in the following categories: Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 37. i. Incorrect or missing functions ii. Interface errors iii. Errors in data structure or external database access iv. Performance errors v. Initialization and termination errors. In this testing only the output is checked for correctness. The logical flow of the data is not checked. WHITE BOX TESTING: In this the test cases are generated on the logic of each module by drawing flow graphs of that module and logical decisions are tested on all the cases. It has been uses to generate the test cases in the following cases: i. Guarantee that all independent paths have been executed. ii. Execute all logical decisions on their true and false sides. iii. Execute all loops at their boundaries and within their operational bounds INTEGRATING TEST: Integration testing ensures that software and subsystems work together a whole. It tests the interface of all the modules to make sure that the modules behave properly when integrated together. SYSTEM TESTING: Involves in-house testing of the entire system before delivery to the user. Its aim is to satisfy the user the system meets all requirements of the client's specifications. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 38. TEST APPROACH: Testing can be done in two ways: • Bottom up approach • Top down approach BOTTOM UP APPROACH: Testing can be performed starting from smallest and lowest level modules and proceeding one at a time. For each module in bottom up testing a short program executes the module and provides the needed data so that the module is asked to perform the way it will when embedded within the larger system. When bottom level modules are tested attention turns to those on the next level that use the lower level ones they are tested individually and then linked with the previously examined lower level modules. TOP DOWN APPROACH: This type of testing starts from upper level modules. Since the detailed activities usually performed in the lower level routines are not provided stubs are written. A stub is a module shell called by upper level module and that when reached properly will return a message to the calling module indicating that proper interaction occurred. No attempt is made to verify the correctness of the lower level module. VALIDATION: The system has been tested and implemented successfully and thus ensured that all the requirements as listed in the software requirements specification are completely fulfilled. In case of erroneous input corresponding error messages are displayed 10.2. TEST CASES Use case Name: ADMIN Login Test Case WMPP001 Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 39. Test case Number Operational Description Expected Output Observed Output Discrepancy Priority Severity Tc1 Enter the invalid librarian email id and in valid password. Error Message should be displayed invalid id and password. Error Message should be displayed. No - - Tc2 Enter the valid librarian email id and valid password. Message should be displayed invalid id and password. Message should be displayed. No - - Use case Name: Student Login Test Case ID: WMP003 Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 40. Test case Number Operational Description Expected Output Observed Output Discrepancy Priority Severity Tc1 Enter the invalid student email id and in valid password. Error Message should be displayed invalid id and password. Error Message should be displayed. No - - Tc2 Enter the valid student email id and valid password. Message should be displayed invalid id and password. Message should be displayed. No - - Tc4 Send request for Librarian Message should be displayed. Yes No - - Tc5 Take properties of lease or rent or student Displays the magazine lists. Yes No - - Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 41. 11. REPORTS 11. CONCLUSION LMS simplifies the manual work load and is helpful in the effective transactions of the library. The work load of the administrator is reduced to a great extent by computerized transactions and instant information about thebooksinthelibrary.Themembersofthelibraryareprovidedaveryinteractiveinterfacetosearchforthebooks by title as well as author. The administrator can instantly make changes to the database. LMS provides messages whenever required viz. limit reached of member to borrow books, error when trying to remove member who still has to pay fine. Thus the mini project LMS by implementing VB as front end and Oracle as back end was achievedandtestedaccordingly. 11.1 LIMITATIONS FUTURE ENHANCEMENTS APPENDIX USER MANUAL: Steps for running this program • Load the required software’s with guidance of this manual • The software’s required are Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 42. • jdk1.7.0 • Apache Tomcat 7.0 • Oracle 10G Express Edition • Install the jdk1.7.0 in the system • Install the Apache Tomcat 7.0 • Install the Oracle 10G Ex • Start the Tomcat server services • The application is loaded into the Tomcat server • Run Tomcat server • Execution Type the following URL on Mozilla Firefox For Tomcat: http:// localhost: 9999/ecura/ • After getting home page process the different operations like Doctors, Pharmacy and Services etc. • Do Administrative operations which can do by the Administrator only. BIBLIOGRAPHY Book Resources: [1] Wallace Wang “Visual Basic 6 Programming For Dummies” IDG Books India. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 43. [2] Gary Cornell, “Visual basic 6: from the GROUND UP” Build windows and web applications step by step, pp. 950-1000 [3] Kevin Loney, “Oracle 10g: The complete reference”, Master the revolutionary features of oracle, pp. 940-950, 2004. [4] Steven Holzner, “Visual Basic black book”, Comprehensive problem solver, pp. 1050-1100, 1998. [5]http://www.vbtutor.net [6] http://www.johnsmiley.com/cis18/Smiley003.pdf [7] http://www.johnsmiley.com/cis18/Smiley004.pdf ---------------------END ----------------- Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457