Project report on library management system pdf download






















The powerful Report Engine processes the formatting, grouping, and charting criteria you specify. Report Experts Using the Crystal Report Experts, you can quickly create reports based on your development needs: Choose from report layout options ranging from standard reports to form letters, or build your own report from scratch.

Each of these terms describes a fundamental part of the architecture of SQL Server. Database A database is similar to a data file in that it is a storage place for data.

Like a data file, a database does not present information directly to a user; the user runs an application that accesses data from the database and presents it to the user in an understandable format. A database typically has two components: the files holding the physical database and the database management system DBMS software that applications use to access data.

Relational Database There are different ways to organize data in a database but relational databases are one of the most effective. Relational database systems are an application of mathematical set theory to the problem of effectively organizing data. In a relational database, data is collected into tables called relations in relational theory. When organizing data into tables, you can usually find many different ways to define tables. Relational database theory defines a process, normalization, which ensures that the set of tables you define will organize your data effectively.

When individuals need to use the resource, they connect over the network from their computers, or clients, to the server.

A communications component is provided so applications can run on separate clients and communicate to the database server over a network. Server applications are usually capable of working with several clients at the same time. SQL Server can work with thousands of client applications simultaneously.

The server has features to prevent the logical problems that occur if a user tries to read or modify data currently being used by others. There are several different languages that can be used with relational databases; the most common is SQL.

SQL Server also includes tools for visually designing databases and analyzing data using English-based questions. Databases A database in Microsoft SQL Server consists of a collection of tables that contain data, and other objects, such as views, indexes, stored procedures, and triggers, defined to support activities performed with the data. The data stored in a database is usually related to a particular subject or process, such as inventory information for a manufacturing warehouse.

SQL Server can support many databases, and each database can store either interrelated data or data unrelated to that in the other databases. For example, a server can have one database that stores personnel data and another that stores product- related data.

Alternatively, one database can store current customer order data, and another; related database can store historical customer orders that are used for yearly reporting. Before you create a database, it is important to understand the parts of a database and how to design these parts to ensure that the database performs well after it is implemented.

Normalization theory: Relations are to be normalized to avoid anomalies. In insert, update and delete operations. Normalization theory is built around the concept of normal forms. A relation is said to be in a particular form if it satisfies a certain specified set if constraints. To decide a suitable logical structure for given database design the concept of normalization, which are briefly described below.

F : A relation is said to be in 1 NF is and only if all unaligned domains contain values only. That is the fields of an n-set should have no group items and no repeating groups. F : A relation is said to be in 2 NF is and only if it is in 1 NF and every non key attribute is fully dependent on primary key. This normal takes care of functional dependencies on non-key attributes. F : A relation is said to be in 3 NF is and only if it is in 2 NF and every non key attribute is non transitively dependent on the primary key.

This normal form avoids the transitive dependencies on the primary key. This is called Join Dependency. Net Overview ADO. NET is an evolution of the ADO data access model that directly addresses user requirements for developing scalable applications.

It was designed specifically for the web with scalability, statelessness, and XML in mind. Key new ADO. The important distinction between this evolved stage of ADO. NET and previous data architectures is that there exists an object -- the Dataset -- that is separate and distinct from any data stores.

Because of that, the Dataset functions as a standalone entity. Inside a Dataset, much like in a database, there are tables, columns, relationships, constraints, views, and so forth. A Data Adapter is the object that connects to the database to fill the Dataset. Then, it connects back to the database to update the data there, based on operations performed while the Dataset held the data.

In the past, data processing has been primarily connection-based. Now, in an effort to make multi-tiered apps more efficient, data processing is turning to a message-based approach that revolves around chunks of information. At the center of this approach is the Data Adapter, which provides a bridge to retrieve and save data between a Dataset and its source data store. It accomplishes this by means of requests to the appropriate SQL commands made against the data store.

The XML-based Dataset object provides a consistent programming model that works with all models of data storage: flat, relational, and hierarchical. It does this by having no 'knowledge' of the source of its data, and by representing the data that it holds as collections and data types. No matter what the source of the data within the Dataset is, it is manipulated through the same set of standard APIs exposed through the Dataset and its subordinate objects.

While the Dataset has no knowledge of the source of its data, the managed provider has detailed and specific information. The role of the managed provider is to connect, fill, and persist the Dataset to and from data stores.

OleDb and System. SqlClient that are part of the. NET Data Providers explaining what they are, and how to program against them. The following sections will introduce you to some objects that have evolved, and some that are new. For connection to and managing transactions against a database. For issuing SQL commands against a database. For reading a forward-only stream of data records from a SQL Server data source. For storing, removing and programming against flat data, XML data and relational data.

For pushing data into a Dataset, and reconciling data against a database. When dealing with connections to a database, there are two different options: SQL Server. In these samples we will use the SQL Server. NET Data Provider. Connections Connections are used to 'talk to' databases, and are represented by provider- specific classes such as SQLConnection. Commands travel over connections and result sets are returned in the form of streams which can be read by a Data Reader object, or pushed into a Dataset object.

Commands Commands contain the information that is submitted to a database, and are represented by provider-specific classes such as SQLCommand. You can also use input and output parameters, and return values as part of your command syntax.

A Data Reader object is returned after executing a command against a database. The format of the returned Data Reader object is different from a record set. For example, you might use the Data Reader to show the results of a search list in a web page. Datasets The Dataset object is similar to the ADO Record set object, but more powerful, and with one other important distinction: the Dataset is always disconnected.

The Dataset object represents a cache of data, with database-like structures such as tables, columns, relationships, and constraints. However, though a Dataset can and does behave much like a database, it is important to remember that Dataset objects do not interact directly with databases, or other source data. This allows the developer to work with a programming model that is always consistent, regardless of where the source data resides. Data coming from a database, an XML file, from code, or user input can all be placed into Dataset objects.

Then, as changes are made to the Dataset they can be tracked and verified before updating the source data. The Get Changes method of the Dataset object actually creates a second Dataset that contains only the changes to the data. This Dataset is then used by a Data Adapter or other objects to update the original data source. XML schemas can be used to describe schemas interchanged via Web Services. In fact, a Dataset with a schema can actually be compiled for type safety and statement completion.

The Data Adapter object uses commands to update the data source after changes have been made to the Dataset. You can explicitly set these commands in order to control the statements used at runtime to resolve changes, including the use of stored procedures.

For ad-hoc scenarios, a Command Builder object can generate these at run-time based upon a select statement. Net Framework. Two new objects, the Dataset and Data Adapter, are provided for these scenarios. NET can be used to get data from a stream, or to store data in a cache for updates. There is a lot more information about ADO.

NET in the documentation. Remember, you can execute a command directly against the database in order to do inserts, updates, and deletes. You don't need to first put data into a Dataset in order to insert, update, or delete it. Functions are called by user-initiated events. They are loaded first before a user can do anything that might call a function. Scripts can be placed between inside comment fields to ensure that older browser do not display the script itself. In fact we have a lot of possibilities just by adding functions to our scripts.

There are many attributers for this tag only that types and name attributes are required for each element, each type of input element uses only a subset of the followed attributes.

We many have more than submit buttons will be added to the parameter list the browser sends along to the server. We can change that by specifying a value attribute with tour own button label. NET API via an intermediate server resulted server resulted in a new type of database model which is different from the client-server model. However this is useful only in case of small applications. The advantage with this is the simplicity and portability of the application developed.

Server and client Database Two Tier client-server In two tier architecture the database resides in one machine and client in different machine they are connected through the network. In this type of architecture a database management takes control of the database and provides access to clients in a network. This software bundle is also called as the server. Software in different machines, requesting for information are called as the clients.

Which in turn serve clients in a network. For example, you want to access the database using java applets, the applet running in some other machine, can send request only to the server from which it is down loaded.

For this reason we will need to have a intermediate server which will accept the requests from applets and them to the actual database server.

This intermediate server acts as a two-way communication channel also. This is the information or data from the database is passed on to the applet that is requesting it. This can be extended to make n tiers of servers, each server carrying to specific type of request from clients, however in practice only 3 tiers architecture is popular. It was developed by Microsoft as part of the. C is one of the 44 programming languages supported by the. C is intended to be a simple, modern, general-purpose, object-oriented programming language.

Anders Hejlsberg, the designer of Delphi, leads the team which is developing C. However, in July , when Microsoft made the project public, the name of the programming language was given as C. The most recent version of the language is C 3. NET Framework 3. The next proposed version, C 4. History:- In , Sun Microsystems released the Java programming language with Microsoft soon purchasing a license to implement it in their operating system.

Java was originally meant to be a platform independent language, but Microsoft, in their implementation, broke their license agreement and made a few changes that would essentially inhibit Java's platform-independent capabilities.

During the development of. Microsoft had considered keeping the name "Cool" as the final name of the language, but chose not to do so for trademark reasons. By the time the. NET runtime had been ported to C. In interviews and technical papers he has stated that flaws in most major programming languages e. Some argue that C shares roots in other languages. Most of C 's intrinsic types correspond to value-types implemented by the CLI framework. However, the C language specification does not state the code generation requirements of the compiler: that is, it does not state that a C compiler must target a Common Language Runtime CLR , or generate Common Intermediate Language CIL , or generate any other specific format.

All methods and members must be declared within classes. Statements that take conditions, such as while and if, require an expression of a boolean type. Most object access is done through safe object references, which are always either pointing to a valid, existing object, or have the well-defined null value; a reference to a garbage-collected object, or to random block of memory, is impossible to obtain.

An unsafe pointer can point to an instance of a value-type, array, string, or a block of memory allocated on a stack. Code that is not marked as unsafe can still store and manipulate pointers through the System. IntPtr type, but cannot dereference them. Garbage collection addresses memory leaks. C also provides direct support for deterministic finalization with the using statement supporting the Resource Acquisition Is Initialization idiom. This was a design decision by the language's lead architect to avoid complication, avoid dependency hell and simplify architectural requirements throughout CLI.

The only implicit conversions by default are those which are considered safe, such as widening of integers and conversion from a derived type to a base type.

This is enforced at compile-time, during JIT, and, in some cases, at runtime. There are no implicit conversions between booleans and integers, nor between enumeration members and integers except for literal 0, which can be implicitly converted to any enumerated type. A unified type system implies that all types, including primitives such as integers, are subclasses of the System.

Object class. For example, every type inherits a ToString method. For performance reasons, primitive types and value types in general are internally allocated on the stack.

Instances of value types do not have referential identity nor a referential comparison semantics - equality and inequality comparisons for value types compare the actual data values within the instances, unless the corresponding operators are overloaded. Value types are derived from System. ValueType, always have a default value, and can always be created and copied. Some other limitations on value types are that they cannot derive from each other but can implement interfaces and cannot have a default parameterless constructor.

Examples of value types are some primitive types, such as int a signed bit integer , float a bit IEEE floating-point number , char a bit Unicode codepoint , and System. DateTime identifies a specific point in time with millisecond precision. In contrast, reference types have the notion of referential identity - each instance of reference type is inherently distinct from every other instance, even if the data within both instances is the same. This is reflected in default equality and inequality comparisons for reference types, which test for referential rather than structural equality, unless the corresponding operators are overloaded such as the case for System.

In general, it is not always possible to create an instance of a reference type, nor to copy an existing instance, or perform a value comparison on two existing instances, though specific reference types can provide such services by exposing a public constructor or implementing a corresponding interface such as ICloneable or IComparable. Examples of reference types are object the ultimate base class for all other C classes , System.

String a string of Unicode characters , and System. Array a base class for all C arrays. Both type categories are extensible with user-defined types. Boxing and unboxing Boxing is the operation of converting a value of a value type into a value of a corresponding reference type.

Download Free PDF. Abhishek Jaiswal. A short summary of this paper. The Library management system focuses on improving the management of libraries in a city or town. The Integrated Library Management system provides you the ease of issuing, renewing, or reserving a book from an library within your town through your phone. The Integrated Library Management system is developed on the android platform which basically focuses on issuing, renewing and reserving a book. The main purpose of this project is to maintain a easy circulation system between clients and the libraries, to issue books using single library card, also to search and reserve any book from different available libraries and to maintain details about the user fine, address, phone number.

Bibek Chaulagain. A short summary of this paper. Download Download PDF. Translate PDF. We extend our sincere and heartfelt thanks to our esteemed guide, Mrs.

We also take this opportunity to express a deep sense of gratitude to our class coordinators, Dr. We extend our sincere thanks to our respected Head of the division Mr. We would like to thank the other faculty members also, at this occasion. Last but not the least, we would like to thank our friends and family for the support and encouragement they have given us during the course of our work.

This project has many features which are generally not availiable in normal library management systems like facility of user login and a facility of teachers login. It also has a facility of admin login through which the admin can monitor the whole system. It also has facility of an online notice board where teachers can student can put up information about workshops or seminars being held in our colleges or nearby colleges and librarian after proper verification from the concerned institution organizing the seminar can add it to the notice board.

It has also a facility where student after logging in their accounts can see list of books issued and its issue date and return date and also the students can request the librarian to add new books by filling the book request form. The librarian after logging into his account ie admin account can generate various reports such as student report , issue report, teacher report and book report Overall this project of ours is being developed to help the students as well as staff of library to maintain the library in the best way possible and also reduce the human efforts.

Books and student maintenance modules are also included in this system which would keep track of the students using the library and also a detailed description about the books a library contains.

With this computerized system there will be no loss of book record or member record which generally happens when a non computerized system is used. In addition, report module is also included in Library Management System.

All these modules are able to help librarian to manage the library with more convenience and in a more efficient way as compared to library systems which are not computerized.

The functional and non functional requirements are included in SRS part to provide complete description and overview of system requirement before the developing process is carried out. Besides that, existing vs proposed provides a view of how the proposed system will be more efficient than the existing one. It reduces the risk of paper work such as file lost, file damaged and time consuming.

Evaluating and testing the performance of the system. This system will also provide electronic means of storage and help librarians keep track of library information. The first subsystem is the registration of the users to the system to keep track of authorized users to the system.

The third subsystem is a borrower and return of books which is the major area needed by the user. There are three end users for the Library Management System. The end users are the admin, users and members. Accession Register: A book in which the following information about the book is listed when it is obtained: accession number, title, price and source of supply, date of withdrawal and reason for withdrawal.

Book Card: A card kept in the pocket of a book when the book is on the shelf. Blurb: Blurb tells what the book is about. It is found either in the front, inside flap of the jacket, or on one of the first few pages of the book or on the back cover.

Catalogue: Contain cards with information about each book in the library. Contents: A list in the front of most books after the title page which gives the chapter heading or story titles and their page numbers. Cataloguing: The description of each book on to cards as it comes into the library.

OPAC: An online public access catalogue is an online database of materials held by a library or group of libraries. Users search a library catalogue principally to locate books and other material available at a library. Anintegrated library system, also known as a library management system Adamson et al. The Library Management System is a Library Management software for monitoring and controlling the transactions in a library Ashutosh and Ashish.

Library Management System supports the general requirement of the library such as the acquisition, cataloguing, circulation and other sections. Before the advent of computer in modern age there are different methods of keeping records in the library. Records are kept in the library on shelves and each shelf are labelled in an alphabetical or numerical order, in which the categories of books available are arranged on different position on the shelves and as well are recorded on the library manuscript and when any book is to be referenced the manuscript is being referred to, to know the position of such required book by the person that requested for the book.

The first library management system to be reviewed is the KOHA library management system. Since the original implementation in , KOHA functionality has been adopted by thousands of libraries worldwide, each adding features and functions, deepening the capability of the system. With the 3. The major setback of this Library Management System is that it is a web based and as a result it is not security conscious because hackers could have the database hacked and access or modify the information of such user.

A library management system usually comprises a relational database, software to interact with that database, and two graphical user interfaces one for users, one for staff.

Most integrated library systems, separate software functions into discrete programs called modules, each of them integrated with a unified interface. Examples of modules might include: i. Acquisitions ordering, receiving, and invoicing materials ii. Cataloguing classifying and indexing materials iii. Circulation lending materials to patrons and receiving them back iv. The OPAC public interface for users A library management system usually comprises a relational database, software to interact with that database, and two graphical user interfaces one for users, one for staff.

Most Library Management System separate software functions into discrete program called modules, each of them integrated with a unified interface. Prior to computerization, library tasks were performed manually and independently from one another. Selectors ordered materials with ordering slips, cataloguers manually catalogued items and indexed them with the card cataloguing system in which all bibliographic data was kept on a single index card , and users signed books out manually, indicating their name on cue cards which were then kept at the circulation desk.

Early mechanization came in , when the University of Texas began using a punch card system to manage library circulation. While the punch card system allowed for more efficient tracking of loans, library services were far from being integrated, and no other library task was affected by this change.

The literature study in previous system could give more reference in system development process. All the advantages in the previous system can be implemented during the development of this proposed system. This chapter entails the literature review related to Library Management System initiatives worldwide, at national, regional and international levels.

Secondary data will be searched from print and online resources. Foreign literatures will be mainly used and some of these had been highlighted to peruse and emulate. The purpose of this literature review is to establish the potential topics and suggest ideas for another research, reporting published materials on existing conceptual framework, theories, techniques, processes, styles and instruments of other researchers related to the topic under investigation.

It will help analyse scope of study and in determining the various variables to be included. The approach to literature review is the browse method where print and electronic sources were looked at, read and digested, looking for some relevancy, appropriateness and usefulness of the topic at hand.

Predetermined keywords to be used during this search are library, virtual library, e-library, hybrid library, library management initiatives, library management problems, library management research, library services, resource sharing, distributed information resources, online databases, library automation, library systems, mobile information access, information professionals, librarian, global access, repositories and interoperability, management systems, library integrated system, database system administration DBSA.

As the research involves qualitative data as well, researches will be made at the initial stage of the research making enquires to get as much primary data as possible from as many librarians as possible whenever there is opportunities to understand the subject better and helped in the formulation of the research questions. The literature review will be about development of library management system which is organized into the following sections namely Introduction,Features of Library Management, Why we need library management system, A Review of Problems and Challenges of Library Professionals in Developing Countries, Library Management System Initiatives Worldwide review of library management system.

Sometime, a phrase like library integrated system is employed, especially in the UK. Cynthia Lopta defines the integrated system as an automated system in which all the functional modules share the same bibliographic database.

Integration as a concept is most usually found in biblioteconomy. It became a landmark over 20 years ago, and it has grown into an almost synonym for integrated system. Sometimes, integrated refers to a system in which the library functions are processed in a main bibliographic file. By the mid to late s, library management system vendors not only the number of services offered but also their prices leading to some dissatisfaction among many smaller libraries.

At the same time open source Integrated Library System was in its early stages of testing. Most reasons noted from these were to avoid vendor lock in, license fees and participate in software development.

The much needed freedom from vendors also allowed libraries to prioritize need according to urgency, as opposed to what their vendor can offer. Recently, libraries which have moved to open source integrated library system have found that vendors are now more likely to provide quality service in order to continue a partnership since they are no longer having the power of owing the Integrated Library System software and tying down libraries to strict contracts.

Library project system that offers many flexible and convenient features, allowing librarians and library users to maximize time and efficiency. Library system gives all the detailed information about students, staffs and books, it will track the books available in the library and the books that have been issued to the library users students.

It shows popular books among the students. It will provide book lost in the library. It keeps records of the supplier and the book binders. Manage Book and Member Record with help of Barcode. Data can be search by feeding Purchase Order number, Invoice number, and Supplier name.

Circulation:Library Management Software enables the complete management of multiple Item issue and return of books using Manual or Barcode Scanner. Alert through Email:Admin can send mail to members, vendors, or any other people from the software. Multiple Library Setup: Library management software can setup at different locations. Export All Report into Excel, Word:Admin can take all the details which are displayed in the reports into excel and word file.

Handles donated items, free items and keep track of donors:Some library items are free or some person donates the item. So Library management software keeps track of those items. Provide Multi User environment:Library management software gives facility of multi user environment.

Multiple users can login at the same time in the Library management software. Also one can maintain media with its own specifications rather than common and define the specification you want for that media, for book pages, ISDN number, type, volume. Custom Field Indices:Library Software provides sorted data on required fields by clicking on the column header that is if clicked on publisher the data will be sorted on publisher.

Lock System:Lock the subject or group of the member, so that media can't be issued which falls under this criteria. One can in this way restrict the issuing of the media. Circulation:Easy operation of circulation by entering the code of media, get all the information related to the media and the number.

Name, group, media type. Easy Navigation and Updating: Selecting an option from the given menu provides all the data related to that option in tabular format in a user friendly manner. Customize:one can customize the system to feel easier for data entry also while adding records user can keep form in 'add' mode. Define Holidays.

And Set the criteria of issuing the book if member is requested for media or not. Scrap-Type:Define their own scrap type for scraping the media. Provides scrap runner utility to record the number of scrap media. Reports 2.

Improved customer services through greater access to accurate information ii. Increased productivity and job satisfaction among staff members as it eliminates duplication of effort iii. More economical and safer means of storing and keeping of information iv. Easier access to information like management reports and stock etc. Reduces errors and eliminating of ennui of long and repetitive manual processing vi.

Greater accountability and transparency in operations vii. Improved efficiency and effectiveness in administration and management as it has unprecedented access to real- time information. More reliable security for sensitive and confidential information. Appropriate knowledge —based action and intervention can now take place in a timelier manner. KOHA is being said to be an integrated software system with all the required models for small to very large libraries Neelakandan et al. The limitations of his research was based on: i.

Lack of Infrastructure facility ii.



0コメント

  • 1000 / 1000