Library Information System Documentation
Library Information System Documentation
1.0Project Proposal
1.0 INTRODUCTION
Today’s practice of medicine is extremely information-intensive. Health science professionals
depend heavily on access to varied information resources to make intelligent and informed
choices for education, patient care management and research protocols (Davis, 1987).
Libraries and librarians who serve medical clients face a paradox. Health science disciplines are
highly specialized, yet users need a broad, multi-disciplinary approach. Information and know-
ledge continue to grow exponentially, but the purchasing power of resource collections have
decreased. Library collection growth has stabilized, user information demands have escalated.
Library measures to maintain self-sufficiency are laudable, but unrealistic goals (Broer-ing,
1986).
Several authors have addressed these contradictions and have concluded that the solution for
libraries and users lies in building and strengthening networks and engaging in resource sharing
projects. In 1975, de Gennaro suggested that the emphasis for libraries should shift from
holdings (storing) and size to access and services. At that time, he predicted that computer
technology would have its greatest payoff for libraries as a tool to assist librarians in developing
and operating networks and other mechanisms for resource sharing (De Gennaro, 1975).
Similarly, Kronick (1982) reached the conclusion that libraries can no longer afford self-
sufficiency and he suggested that a more attainable goal is "mutual sufficiency" (Kronick, 1982).
The growing resource sharing trend of the 1970s and 1980s, which is even more feasible today
through high performance computers and networks, is bound to become an essential part of
library operations in the 1990s.
The project implications and significance are profound in potentially changing the library service
paradigm and shaping delivery of information in the future. Unique project features are use of
Internet not only to access other library catalogs, but to have a central menu of LIS databases
with transparent transfer capabilities to whatever data-base a user chooses regardless of
1
geographic location. Automatic online access to document delivery directly from a literature
search is provided from different library systems, Current Contents, Bioethicsline and the
OPACs. An innovative milestone under development is the search and display of images through
the online catalog. Users will navigate easily, unaware of the underlying technical complexities.
Another significant milestone is the development of a Library Management Information System
(LMIS) to allow the FLIS libraries to organize data efficiently, improve their reports and
complete national library association.
Library Information System (LIS) Resource Sharing Project to provide electronic access and
delivery of information in various print and non-print formats and in varying formats to a
consortium of libraries that all use the LIS and through this advanced system, improve medical
education, research , patient care and the academicians. The project design include a
collaborative network of databases, document delivery, digitized images and an information
management system to extend services to LIS user libraries.
To enhance access to and delivery of information by providing LIS member libraries and their
users with access to the collective resources and information formats.
2
1.5 Beneficially of the system
The beneficially of the project are the library users like health institutions, research institutions
,the academic institutions and the academicians and even other government agencies like the law
society of Kenya, Kenya land survey authority, Kenya resource management institutions and
other agencies which need information in their day to day activities.
1.6 Purpose
The purpose of literature review was to establish the potential topics and suggest ideas for
another research, reporting published materials on existing conceptual framework, theories,
techniques, processes, styles and instruments of other researchers related to the topic under
investigation. At the same time to identify why some of the literature was noteworthy and which
literature had made important theoretical contributions to the field being studied (Anderson and
Kanuka, 2003). It helped align our scope of study and in determining the various variables to be
included. As for this research, the main purpose of literature review was to grasp comprehensive
ideas on the extent of library information initiatives and projects that had taken place worldwide
and the factors and conditions that had influenced and contributed to their success.
1.6.1Minimedline
Automatic online access to document delivery directly from a literature search is provided from
minimedline, Current Contents, Bioethics line and the OPACs. An innovative milestone under
development is the search and display of images through the online catalog. Users will navigate
easily, unaware of the underlying technical complexities. Another significant milestone is the
development of a Library Management Information System (LMIS) to allow the LIS libraries to
organize data efficiently, improve their reports and complete national library association.
3
1.6.2The Dahlgren Memorial Library
At Georgetown University, for example, the Dahlgren Memorial Library has undertaken the task
of developing a Knowledge Network that provides access to a family of bibliographic,
information, diagnostic and research databases. The strategy was developed in 1985 as part of a
multi-phasic, ten year project supported by the National Library of Medicine (NLM) to plan,
develop and implement an Integrated Academic Information Management System (IAIMS). It
has further enhanced cooperative endeavors with the medical libraries that use the Georgetown
Library Information System (LIS). Collaborations with these institutions began in the mid-1980s
and have increased rapidly since 1990. Some of the most notable features are the Dahlgren
Library’s ability to design functional models for the integrated LIS, to develop educational
software that integrates print and non-print materials, and to expand the IAIMS Knowledge
Network of health sciences databases. Through the IAIMS network, users at Georgetown are
also linked to other university resources including the collections of all campus libraries (law,
medical and main campus). The two paths of LIS and IAIMS have served to expand the library’s
traditional role in information management and now places it in a position to explore even
further (Broering 1988; Broering, 1985).
The approach to literature review was the browse method where print and electronic sources
were looked at, read and digested, looking for some relevancy, appropriateness and usefulness of
the topic at hand. Browsing the printed materials – books, periodicals, journals, conference
papers, annual reports, newsletter, newspapers and theses, would strengthen and reinforce the
researcher’s foundation of the subject matter. The use of information retrieval tools such as
OPAC, abstracts, indexes and bibliographies allowed greater insight of the subject in a more
organized manner. Amongthe online databases and e-journals searched were LISA, Emerald,
Ebsco Host, D-Lib Magazine, Libri, Ariadne and the websites/homepages of many foreign
digital libraries.
4
Predetermined keywords used during the search were digital library, virtual library, e-library,
hybrid library, digital library initiatives, digital library problems, digital library research, digital
services, digital reference, resource sharing, distributed information resources, Intellectual
Property Rights, digitization, online databases, dematerialization, born digital materials,
information surrogates, digital objects, information revolution, library automation, library
systems, hybrid library, cyberian, information professionals, digital librarian, global access,
repositories and interoperability. As the research involved qualitative data as well, the researcher
made a lot of efforts at the initial stage of the research making enquiries to get as much primary
data as possible from as many librarians as possible whenever there were opportunities, to
understand the subject better and helped in the formulation of the research questions.
1.8.2Assumptions
The system assumption relate to the requirements here are:
The system is not supposed to exceed the stated budget since this may lead to omissions
of some necessary requirements that are stated in this project.
The system will be fully integrated with the database and then the system will be a web
based.
6
Wampserver
MySQL
Antivirus
Browser
2. Minimum Hardware requirements
Pentium IV 2.0 GHz or compatible.
4GB RAM (Minimum) 8GB RAM (Recommended).
500GB Hard disk for storage.
1TB external hard disk for back up.
1.9.1Non-functional requirement
This describes the non-functional requirements that characterize the function of the software
product:
1.9.2 Security
Security is always an issue with the implementation of the systems. Currently the security of
patent and copyrighted information is enforced by the server administrator on a central sever.
This means that the admin has to be taken through the security feature of the system.
Security of library user’s usernames and passwords will be hashed such that even the system
admin cannot reverse the password to retrieve the user credentials.
The system will provide enhanced security for the library and information through the use of
access code and passwords that will limit access and it will help to curb piracy or plagilism.
1.9.3 Reliability
The system will provide accurate, correct and reliable outputs that will meet the user’s
requirements and enable library user to get access to different information within the same site.
And since the application can help one to make a limited print out of given information which
can either be soft copy or hard copy.
7
1.9.4 Maintainability
New arrivals can be added to the system to update the information, the system can also be
updated and even when errors are encountered the system can be maintainable.
1.9.5 Portability
The system should be the one which is compatible with other machines not the one which is
machine independent and also the system can be run in any platform and can use different
browser soft wares available.
8
with the
supervisor
2 Write the 1day 10/05/15 10/05/15 Project
project proposal
proposal document
document
3 Prepare slides 1day 11/05/15 11/05/15 Complete
for project proposal
proposal document
presentation
4 Project 1 day 12/05/15 12/05/15 Project
proposal proposal
presentation presentation
5 Correction of 2weeks 13/05/15 26/05/15 Project
the error found proposal
during project
proposal
presentation
6 System 4weeks 27/05/15 24/6/15 System
analysis and requirements
preparation of specification
system document
requirements
specification
document
7 System design 4weeks 25/6/15 22/7/15 System design
1.Logical specification
design document
2.Physical
design
8 Progress 1day 23/7/15 23/7/15 Progress report
9
presentation
9 Coding 4weeks 24/7/15 20/8/15 Progress
report
10 Testing 2week 21/8/15 3/9/15 system
11 implementatio 4week 4/9/15 1/10/15
n
12 documentation 4week 2/10/15 29/10/15 Project
documentation
13 final project 1day 30/10/15 3/10/15 Complete
presentation functional
project
1.9.7Budget
The estimated cost of the project is as follows;
Chapter Two
2.0 Introduction
The software requirement specification (SRS) is basically a designers understanding (in
writing) of a customer’s or potential client's system requirements and dependencies at a
10
particular point in time prior to any actual design or development work. It's a two-way insurance
policy that assures that both the client and the software designer understand the other's
requirements from that perspective at a given point in time.
SRS is a document that describes all the data, functions and behavioral requirements of the
software under development. It forms a foundation on which the design and implementation of
the system becomes easy.
The system requirement specification is an abstract description of the services that the system is
intended to provide and the constraints under which it must operate. This document outlines the
specifications such as scope of the document, the designer’s view of the client’s need and
requirements just before the actual system design. It is a landmark to indicate that both the users
and the designers are in agreement
2.0.1Purpose
The main and major purpose of this document is to serve as a guide to the developers of the
library information system on how to develop a system which will meet the needs of the users
and to meet the system objectives. SRS helps developers in the following ways:
Develop an information system that will enable users to get the information about new
information books, journals from different writers and authors who have done extensive
research on various areas of study.
The system also provides a platform for updating of information of different users who
have subscribed to the system to get information about new arrivals for the users to
check them in the system and get to know the information; also new users can be
registered to the services offered by LIS.
The LIS will have portal for e-learning which can enable users to download some
section of the book to curb plagiarism for the copyrighted books and journals and also
can buy an electronic book from author.
It includes information which sets the scope size and complexity of the final system
It drives the system architecture testing activities and overall system design
It creates a flow of events during the development of the system that is to say it lays
down the schedule on how activities will be performed an activity will be fully finished
11
before moving to next activity.
Project manager: analyzes designs and implement the system according to the user’s
specification
Designer: the designer will translate the requirements to graphical or logical
representation of knowledge.
System developer: to record the progress in developing the system goals and the steps
taken to develop the system.
System testers: it will act like a check list once development of the system is completed
and confirm if the user requirements and the functional requirement are achieved.
System administrator: will use the system to make any required update to the system to
ensure that there is no loss of data.
Supervisor will use the new system to assess and update record s to repair and mainatain
the system.
12
Database administrator: monitor and check the system to ensure that it works properly so
as to meet the users’ requirements and also work to ensure that the necessary standards
are enforced
2.0.3PROJECT SCOPE
The project application and significance are profound in potentially changing the library service
paradigm and shaping delivery of information in the future . unique project features are use of
internet not only to access other libraries catalogs, but also to have a central menu of LIS
databases with transparent transfer capabilities to whatever database user chooses regardless of
geographical location. Automatic online access to document delivery directly from a literature
search is provided from different library systems, current contents, Bioethics line and the
OPACs. An innovative milestone under development is the search and display of images through
the online catalog. Users will navigate easily, unaware of the underlying technical complexities.
Another significant milestone is the development of library management information system
(LMIS) to allow the FLIS libraries to organize data efficiently, improve their reports and
complete national library association. This document defines at a functional level the business
activities that are encompassed by the system and the rules that apply to the. It also encompasses
some of the key high level technical requirements of the system required by intended users.
It will be for general purposes such as data capture by data entry, entering data captured on
relevant forms. The captured data will be processed and stored in a database hosted in central
server. Then data will be output in form web pages .the users log in to the system through an
interface. On successful authentication through login username and password this user will get
access to the system and do any transaction privileged to him/her by the system administrator.
The new user to the system will be needed to create a profile with the system to be granted the
privilege to access to the system and for the diverse end users can access, search, analyze and
report various types of integrated data based on access rights.
13
2.0.5 Description and priority
The library information system should be stable and secured, have high performance (in terms of
speed and efficiency/effectiveness), and be easy to maintain .this component is central to the
effort and is thus of highest priority. The other thing is to make the system very first in
displaying information either in soft copy and hardcopy where by printing may be required also
it will enable users to download documents in different formats and also to view the documents
in different formats in different platforms without any compatibility issues.
Gallery
Library facilities
OPAC
Log in Home page
user About us
Log out
14
A user with the profile or account the system can go directly to log in and enter the valid
username and password to get access to the system and the he/she can access the page she/he
wants to access the use case above has got other sub groups of pages which are directly linked
with other use cases.
If a user is a new user who doesn’t have account with the system then he/she is required to create
an account so as to get full access to the system the use case for creating an account is shown
below.
Gallery
Library facilities
OPAC
Sign up Log in Home page
user
About us
Log out
15
2.0.7 User characteristics:
The user classes of this library information system will be;
a) System administrators: staff responsible for managing the system by creating users,
assigning rights and have full read and write rights to viewing users’ activities .and also
to grant and revoke privileges to different users for security purposes.
b) Database administrator: maintenance with read/write/modify privileges to all data in
the servers to enable him make system backup to make the system hide the fact that it has
encountered the error to make updates to the database that is if there is new arrivals of
books journals and other information books which can be accessed via the internet using
the LIS.
c) Support staff: require technical skills on troubleshooting and assisting users when they
encounter a problem and also to guide users on step by step to overcome the problem
they encountered .this would likely be conversant with the general characteristics of
system, the user should be familiar with the following:
Working on a graphical user interface.
Searching the required information.
Downloading given information.
Printing a section of a book.
To help users to troubleshoot their users’ accounts when they get a problem while
logging in.
d) System maintainers: the people in charge of maintaining the system will also need access
to the system. This is because some of the problems that will be encountered won’t
necessary need to be reformatted or the editing of code
16
executed in any browsers like internet explorer ;Mozilla Firefox; Google chrome; tor browser
and even opera mini for windows .
Note that the application can function on other lower specifications than these but for the
purpose of being in line with the current technology, will have to go with the identified
specifications in the document. The system will be based on network setup and through this; it
will ensure different units to be integrated with the central database without remodeling the
entire database. This therefore implies that there must be a central server that holds this
information and that there can only be update to the server other than creating pieces of
information on different computers. The application will again ensure that there is a simple
interface that allows the users to interact with it without much complexity.
2.4 Storage
The system needs to be able to store hundreds of megabytes of data on demand. The potential
for needing gigabytes of data storage capacity is also in the realm of possibilities. Further
17
requirements gathering is needed to get real-world estimates of such data storage needs. Since it
is a web based application a storage capacity will be needed to store the cookies for more than a
week to get the real number of the application users and also to capture the most visited books
and also the most downloaded book.
2.4.0Networking
Load balancing- database servers must be load balanced at the application level to ensure
maximum stability and availability. Specific scenarios, such as fail-over versus session-managed
load balancing need to be addressed in the functional requirements specification.
2.5Backup software
Data and application backups will be through fully supported backup software solutions.
18
2.5.2 Scope and limitations
Analysis methodology will involve business analysis, requirement analysis, data analysis, and
process analysis and application architecture:
Requirement analysis- system I/O description, user requirement definition, functional and
security
Data analysis- involves data collection process, data validation, data storage,
manipulation and retrieval.
Process analysis – data/process flow analysis, process decomposition and system
interfaces
Application architecture- analyzes application information structure, usability, user
interface design.
Interaction and application implementation.
The system architecture of the system can be described as a set of integrated applications. The
application architecture consists of a number of application components that, working together
meet the requirements for the system’s application.
The system solution will be built using the PHP and MYSQL in order to create the integrated
platform to a single system.
System analysis and requirements specification perform an analysis of the problem using object
oriented techniques
An external view of the model including records, subscriber information, and class schedules
will be developed. This system requirement specifications document will form part of the
documentation for the project.
19
The ability to search/view processes as desired
Provide report generation platform
This section of the SRS specifies the functional requirements of the system in terms of use cases
and their associated use case paths. The use case model is primarily organized in terms of the
externals that benefit from the use cases.
2.6.2Process requirements
The following are among the inherent requirements that the system must be able to handle.
i) Transaction –the system must be able to send , receive and trigger transaction to the
database system
ii) Data integrity- commit transactions that are completed and/or rollback unfinished or
time-out transaction
20
iii) Data validation- data error from the user’s end and from the back-end database
processing end must be gratefully handled.
iv) Performance- must resolve locking issues and handle concurrent use of the system
throughout .send, receive and display user messages to assit the over-all user
experience.
2.7.3 Throughput:
Throughput refers to transactions per second (tps). As it is difficult to calculate the throughput in
terms of transaction per sec, it is expected that the system should be able to support maximum
throughput for the booking processes
21
2.7.5 Robustness or fault tolerance requirements
When the system is disconnected or frozen due to over access at the same time, it should save all
the process of the users have made up to the point of abnormal happenings. It should also ensure
that the system continues even after user has encountered an error.
2.7.9 Authentication
The system will follow industry best practices for authentication, using single –sign-on systems
like. Authentication addresses security requirements to ensure those using system are who they
say they are. This is of greatest concern when data are being changed or updated .this is
primarily done through password.
2.7.0.1 Confidentiality
Confidentiality security requirements describe the need to protect the data appropriately. The
system will use the user classes to define boundaries of information sharing to ensure
confidentiality as appropriate. Any date should be viewed by a restricted audience must be
protected with appropriate security features.
22
the adding process. The system will need policy and procedures protecting the data from
intentional or unintentional modifications, and to ensure accurate data are made available.
2.7.0.3 Availability
The system must be available to the intended audience on demand, with 99% availability and a
tolerance of -5%(not less than 50% of working hours in any week) .for this system ,availability
will be concerned with the reliability of the software and network components. Intentional
“denial of service attacks “is not foreseen as a significant concern.
2.8Portability
This database will be built for a particular system and may not be portable but results to queries
will be portable between many environments
2.8.0 Adaptability
Implementation of the application software/code and design of database structure should be
flexible enough for the necessary change in the later phase.
2.8.1Availability
Availability is defined here to mean the ability to use the system during its intended period of
operation.
2.8.2 Reliability
appropriate validations and intimation to users on any abnormal inputs/situations
Consistency of data to be maintained
Conformation should be taken from the user before deleting any record.
2.8.3Maintainability
Administrator manual and user manual to be provided.
23
The system should be maintainable over a period of time. This implies that proper coding
standards and naming conventions are followed: design should be according to proper
standards.
2.8.4 Usability
Usability includes looking at, capturing and starting requirements based around user interface
issues things such as accessibility, interface aesthetics and consistency within the user interface.
2.8.6 Efficient
The system should be efficient. This is measured by the time taken to do an operation fully
through the system.
2.8.7 Familiarity
The system’s interfaces and navigations should be based on other systems that the users are
familiar with and like.
2.9.0Time
Due to the urgency to bring into completion the proposed system, I as the developer will be
forced to develop and implement the system in a period of six months. This does not only take
the six months to develop the application only but also I will be having other subjects that need
to be covered and examined during the six months period.
2.9.1 Portability
Currently there is a trend of moving towards Linux and open source platforms for security
purposes and also the fact that open source products are free. The proposed system being
implemented in a windows platform may pose a problem in case the company wanted to migrate
to Linux or open source platform.
24
2.9.2 Equipment
More equipment will have to be bought to cater for the development of the system and also
because of the amounts of information that will need to be backed up from the system e.g. flash
disks or external hard disks, printers, CD diskettes to act as a permanent storage space for the
already finished documents e.g. the proposal document.
25
Chapter three
3.0 Introduction
26
3.0.2 Definitions, Acronyms, and Abbreviations
Term Definition
GUI Graphical User Interface. The GUI provides a graphical interface for
users to interact with the system.
27
Synchronization Synchronization is the act of connecting the Personal Digital
Assistant to a computer, using a special device called a docking
station, whereby the information in both the PDA and the computer
become identical.
Client Any person who uses the system, with the general case being the any
computer device that is requesting for service from the server
Subscriber Any customer who registers with this system to get access to the
information offered by it.
Main Menu Page the initial menu which allow users to register/login
Home Page The initial menu for users who have logged in successfully. It’s also
called the home page.
Registration Page The page that allows the user to create new accounts.
Login Page the page that allows the user to login if they have a valid login
28
The system can be described by the environmental requirements associated to this
document.
The system the application is executing on will have the required resources available
as necessary. This entails sufficient memory and permanent storage space, an
adequate CPU for the necessary application, and a TCP/IP network connection.
The client application makes the following assumptions about its operation environment;
The client machine will have wamp server installed, , PHP scripting language, CSS
(cascading style sheet) The client application is dependent on this set of component.
These components are required for our implementation of access to the dialog
database.
The client machine will have the necessary databases setup through Msql database
server embedded on it.
The server application makes the following assumptions about its operation environment;
The client machine will have wamp server installed, , PHP scripting language, CSS
(cascading style sheet) The client application is dependent on this set of component.
These components are required for our implementation of access to the dialog
database.
The client machine will have the necessary databases setup through Msql database
server embedded on it.
Preferably the server machine will have TCP ports free for use of the server
application. This is the default port for the server to listen on, though it is not
required to listen on this port.
29
The Library information server is intended to have a simple interface that is relatively
easy to administer. A minimal yet complete set of options is provided for the server
administrator to have control of resources consumed by the server application. These
options include, but are not limited to; controlling the limit of clients able to connect to
the server for maximum efficiency, ability to configure which port the server listens on,
ability to change the Library information database location, and control how often the
database is updated.
Another major goal of the application is that the user gets a response in a timely fashion.
Intuition tells that a user will lose interest if they have to wait long times for software to
respond. This is why the design has minimal data transferred between client and server.
In this design, a minimum set of information is transferred to the server in order to
retrieve the necessary information, and the server only returns the requested data that is
then formatted into a readable phrase on the client side.
The other goals include:
To come up with the Database design
To run on Supported browsers
Be Simplicity
To Speed and memory load
To be scalable
To be reliable
portability
3.1Design methodology
It will be worthwhile to state here that the waterfall approach will be used. I intend to deliver the
first model at the end of the first month from the date when the requirement details shall be
submitted.
In waterfall model
I want the users to give their opinions about what they want the system to do or behave.
To give users time to learn and understand the cognitive methods aligned to the system
that is to say how to use and interact with the system.
30
3.2 System Architecture Description
The Library information System sever is an active machine interacting with the system users.
The interface user registration and authentication, selects the client, uploading of information,
updating the system functionality.
Client
The client runs on the user machines. It sends message to the main server and gets feedback
according to the purpose it requires; through this the system is updated. The client starts by
looking for a match of entered subscribers username and password. All this is achieved through
communication between client and the server which is achieved through use of communication
protocols via networking interface.
3.2.2Architectural design
The system consists of three major levels:
31
3.2.3The application level
The application level is the client application. Is designed to support the following major
features; a simple and intuitive graphical user interface (GUI), easy to understand dialogs,
flexible dialog structure support, and support of an internet transport for subscribers information
retrieval. Unlike the server application, the client application has been designed completely data
independent. No portion of the client application is implementation dependent (excluding dialog
database access). This provides maximal flexibility for other potential uses for the client
application.
Data Inputs
Processor level
Application level
Data display
Database level
32
3.2.6 System flowchart procedure
The flowchart below shows how the user can login and use the system. It also shows the general
view of the whole system.
33
Start
Home page
Login
Login successful?
No
Home page
(Login as user)Yes
Select tasks
34
3.3 Data modeling
3.3Tables Schema
The tables below are under MYSQL platform which ware created using MYSQL commands;
35
3.3.4 Online public access catalogs books and upload Table
Data Name Data Type Data size Description
File Text 50 File name
Type Text 50 File type
ID Text 20 Identification
number(PK)
Size Text 10 Size of book in kb/mb/gb
3.4User Interface
If a user tries to login without entering anything in the either fields (password field and the
Username field), he receives the error message shown below telling him that invalid Username;
Username field cannot be left blank.
Fig1.0 The print screen below shows the login form for the users;
36
3.4.0 Home page
The main page is also known as HOME PAGE for the user to navigate/manipulate through the
system. From the main home page, there are links to the various pages i.e. page for the authors
online public access catalog, gallery, about us etc.
37
3.4.1 Library facility
This is the page where the types of facilities available in the Library Information System are
accessed through different categories of books carrying information the system is carrying
different information according to the information the user wants to enrich him/herself with the
different books available can be accessed inform of e-book, and at the same time they can upload
any information they wish to share with the other users and as well they can also download a
book.
38
3.5 System implementation
39
expected. After completely developing the applications modules, I will link the modules and
tested if they can work together without incompatibility issues. During this Integration Testing,
I resolved any inter-module conflicts that were spotted and ensured that the different modules
work well together to achieve the overall goal of the system.Finally I will carry out correctly and
conforms to the user requirements.
The main objective of testing was not only to ensure that the system does what is expected of it
but also to confirm that it does it correctly. This was mainly done to assess the quality of the
system.
I will make backup of the system that could be restored or used in case the system got corrupted.
User Interface of the system. Because system coding is still in progress, below is the only code
for the login form which authenticates the user for accessing the system.
session_start();
40
include_once 'dbconnect.php';
if(isset($_SESSION['user'])!="")
header("Location: index.php");
if(isset($_POST['btn-login']))
$email = mysql_real_escape_string($_POST['email']);
$upass = mysql_real_escape_string($_POST['pass']);
$row=mysql_fetch_array($res);
if($row['password']==md5($upass))
$_SESSION['user'] = $row['user_id'];
header("Location: index.php");
else
41
{
?>
<?php
?>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Login System</title>
</head>
<body>
<center>
<div id="login-form">
<form method="post">
42
<tr>
</tr>
<tr>
</tr>
<tr>
</tr>
<tr>
</tr>
</table>
</form>
</div>
</center>
</body>
</html>
<?php
session_start();
43
include_once 'dbconnect.php';
if(!isset($_SESSION['user']))
header("Location: login.php");
$userRow=mysql_fetch_array($res);
?>
<html>
<head>
<!--
#Layer1 {
position:absolute;
left:3px;
top:157px;
44
width:975px;
height:504px;
z-index:1;
background-color: #FFFFFF;
#Layer2 {
position:absolute;
left:2px;
top:-3px;
width:975px;
height:119px;
z-index:2;
#Layer3 {
position:absolute;
left:2px;
top:112px;
width:975px;
height:40px;
z-index:3;
45
.style1 {
color: #FFFFFF;
font-weight: bold;
#Layer4 {
position:absolute;
left:170px;
top:-7px;
width:973px;
height:797px;
z-index:4;
#Layer5 {
position:absolute;
left:0px;
top:720px;
width:976px;
height:77px;
z-index:5;
background-color: #0066CC;
46
#Layer6 {
position:absolute;
left:641px;
top:8454px;
width:201px;
height:40px;
z-index:6;
#Layer7 {
position:absolute;
left:169px;
top:664px;
width:974px;
height:42px;
z-index:5;
#Layer8 {
position:absolute;
left:533px;
top:751px;
width:343px;
47
height:38px;
z-index:6;
#Layer9 {
position:absolute;
left:177px;
top:146px;
width:772px;
height:325px;
z-index:7;
#Layer10 {
position:absolute;
left:173px;
top:527px;
width:972px;
height:137px;
z-index:8;
48
background-color: #999999;
.style7 {
font-size: 24px;
font-weight: bold;
color: #000000;
#Layer11 {
position:absolute;
left:178px;
top:150px;
width:869px;
height:45px;
z-index:9;
.style8 {
color: #0000CC;
font-size: 36px;
49
.style9 {
color: #00ff00;
font-size: 55px;
-->
</head>
<body id="top">
<div id="header">
<div class="fl_left">
<p>Information</p>
</div>
<div id="right">
<div id="content">
</div>
50
</div>
<ul id="topnav">
<li><a href="logout.php?logout">Logout</a></li>
<li><a href="#">Authors</a>
<ul>
<li><a href="books.php">Books</a></li>
<li><a href="">Biography</a></li>
</ul>
</li>
<ul>
<li><a href="about.php">About</a></li>
<li><a href="#">FAQ</a></li>
</ul>
</li>
<ul>
<li><a href="view.php">Medical</a></li>
51
<li><a href="me.php">Information Technology</a></li>
<li><a href="opac.php">OPAC</a></li>
</ul>
</li>
</ul>
</div>
</div>
</marquee>
<div class="container">
<div id="content-slider">
<ul>
<li id="first" class="firstanimation"> <!-- ID for tooltip and class for animation -->
52
<a href="#"> <img src="photos/slide5.jpg" width="1000" height="1000 class="img-
thumbnail" alt="decoder"/> </a>
</li>
</li>
</li>
</li>
53
<li id="fifth" class="fifthanimation">
</li>
</ul>
</div>
</div>
</div>
</body>
</html>
54
3.6.2 Uploading codes
<?php
include_once 'dbconfig.php';
if(isset($_POST['btn-upload']))
$file = rand(1000,100000)."-".$_FILES['file']['name'];
$file_loc = $_FILES['file']['tmp_name'];
$file_size = $_FILES['file']['size'];
$file_type = $_FILES['file']['type'];
$folder="uploads/";
$new_size = $file_size/1024;
$new_file_name = strtolower($file);
$final_file=str_replace(' ','-',$new_file_name);
55
if(move_uploaded_file($file_loc,$folder.$final_file))
mysql_query($sql);
?>
<script>
alert('successfully uploaded');
window.location.href='info.php?success';
</script>
<?php
else
?>
<script>
window.location.href='info.php?fail';
</script>
<?php
56
}
?>
Chapter Four
4.0 Introduction
This is the process that checks whether the system developed is the required results under known
conditions. The purpose of testing is to identify and correct the errors of the system.
In system testing, performance and acceptance standards are developed. It can take place when
one is coding the program. One can code a module and run it to see whether it works perfectly.
This does involve the process of inputting real data for testing the suitability of the module and
the system as a whole. The system should work according to the specifications outlined in
previous chapter under the system Requirements Specification document.
57
4.0.2Testing Strategy
The test Strategy consists of various tests that will ensure the system is tested appropriately in
units and as a whole. This will assist to discover the uncovered errors in the system, unit modules
and during their integration and as a whole
58
4.0.3 Test Plan
This does show how the program is to be tested and the procedure. The test data is identified,
what is to be tested, the expected output and the actual results after inputting the test date The
system will be tested in a standalone machine where the database will be hosted locally first .For
the majority of testing, there will be a small test in programs and this will be testing for
compatibility. All test cases will be documented.
3 Search Start search Check database for the Error due to fail Inserted
criteria book and display book invalid search valid date
keyword
4 Create User name new user Create succes
username and Password s
and password
password
4.1.1ADMINISTRATION MODULE
Fig 1
4.1.2 LIBRARY MODULE
Fig 2
Security is the main objective of any project. The importance of security testing is to stop
unauthorized usages of data, means to ensure that the users only can access the data that is
permitted by the system developer.
Application testing can be stated as the process of validating and verifying that a computer
program/application/product:
This term may be used differently and here it’s important to state that our application can
work smoothly in any critical condition. We have to observe that the load testing is
successfully passed by this application.
In systems engineering it may involve black-box testing performed on a system prior to its
delivery. In these case of application acceptance testing performed by the customer shall be
known as user acceptance testing, end user testing or field testing.
4.8 Changeover
This does involve all activities carried out during the switching from the existing system to the
new system. The various approaches are direct changeover, Pilot Changeover, Phased
changeover and parallel changeover. The best approach of implementing the system is the
parallel changeover system
The parallel changeover method involves running both system side by side that is simultaneously
over a period of time until its proved beyond reasonable doubt that the new system is working
appropriately as per the stated specifications and the anticipated benefits are being realized.
4.9 Introduction
This describes the preferred strategy that will be used when taking in the system or rather
implementing the system. It clearly depicts the step by step procedures of activities to be carried
out during implementation by use of almost applicable and preferred strategy.
System Implementation is one of the most important parts in coming up with a system and it
entails processes and steps which should be adhered to systematically as indicated in order to
achieve a successful changeover.
This document therefore describes the selected strategy to perform this function and why it was
chosen or agreed upon by the developer
4.9.1Parallel Changeover
This is the most popular method as it does provide the lowest risk in case a tragedy occurs thus
affecting the system such that the old system can be reverted back to if necessary in order to go
back and make improvements for the new system.
4.9.2 Limitations
It is expensive and time consuming since both systems will be running at the same time
Parallel tends to delay the adoption of the new system
Extra workload in maintaining both systems
4.9.6 Installation
It does involve both hardware and Software installations
4.9.6.0 Training
The user is trained on how to use the new system at times the user may tend not to understand
any of the new things he/she is being taught.
4.9.6.1 Execution
This involves performing actual operation of the system and this is done by person in charge of
the system.
4.9.6.2 File Conversion
Conversion of these activities concerned with the transfer of aspects of the old system to the
new. All existing data will need to be entered manually through input controls
4.9.6.3 Maintenance
Ensuring that the system remains operational and also catering for later versions and addressing
issues that encounter as they are using the system
4.9.6.4 Conclusion
With this documentation the system will be able to accomplish the user’s requirements
established in the system requirements analysis documents The aim of these system is to develop
a system of improved facilities. The proposed system can overcome all the limitations of the
existing system. The system provides proper security and reduces the manual work, which will
lead to fast; efficient way for making order reliability to the user.
This system is designed using PHP,CSS AND JAVA SCRIPT linked with MYSQL to help
relate national libraries to carry out the task of disseminating information to different clients
Once the system is installed, it should work effectively to efficiently increase speed at which
information is saved and retrieved.
Here the user keys in his/her credentials that is valid username and password as shown below:
If the user does not have the username and password he/she can go ahead and create a profile
with this system to get access to the system services.
3.3.1Accessing a page:
To access a page
Click on the link on the homepage and select the appropriate page. The page requested
will be displayed.
3.3.2Uploading a book/item:
To Uploading a book/item.
Click on the browse button the dialog box appears select a file u want to upload and then
click upload.
3.3.3 Closing a page:
To close a page
Click on the home button and, on clicking it loads and takes you back to homepage.
3.3.5Troubleshooting
PROBLEM POSSIBLE CAUSE MEASURES
Software not responding Too much system overload, Check memory capacity and may
insufficient memory or run disk cleanup wizard.
corrupt operating system.
Repair the operating system
PC shut down or logoff Power failure which may be Ensure there is power on the main
due to faulty power supply supply
3.3.6Back Up
This is not necessary since the system will be hosted by the internet service providers but for
preparedness of any eventualities we need to backup this system to allow for tolerance during the
concurrency of faults. This can be achieved through replication and fragmentation of the
databases since the database to be used will be hosted in the network.
Chapter Six
6.0 CODES
session_start();
include_once 'dbconnect.php';
if(isset($_SESSION['user'])!="")
{
header("Location: index.php");
if(isset($_POST['btn-login']))
$email = mysql_real_escape_string($_POST['email']);
$upass = mysql_real_escape_string($_POST['pass']);
$row=mysql_fetch_array($res);
if($row['password']==md5($upass))
$_SESSION['user'] = $row['user_id'];
header("Location: index.php");
else
?>
<?php
}
?>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Login System</title>
</head>
<body>
<center>
<div id="login-form">
<form method="post">
<tr>
</tr>
<tr>
<td><input type="password" name="pass" placeholder="Your Password" required /></td>
</tr>
<tr>
</tr>
<tr>
</tr>
</table>
</form>
</div>
</center>
</body>
</html>
6.1 homepage
<?php
session_start();
include_once 'dbconnect.php';
if(!isset($_SESSION['user']))
{
header("Location: login.php");
$userRow=mysql_fetch_array($res);
?>
<html>
<head>
<!--
#Layer1 {
position:absolute;
left:3px;
top:157px;
width:975px;
height:504px;
z-index:1;
background-color: #FFFFFF;
}
#Layer2 {
position:absolute;
left:2px;
top:-3px;
width:975px;
height:119px;
z-index:2;
#Layer3 {
position:absolute;
left:2px;
top:112px;
width:975px;
height:40px;
z-index:3;
.style1 {
color: #FFFFFF;
font-weight: bold;
}
#Layer4 {
position:absolute;
left:170px;
top:-7px;
width:973px;
height:797px;
z-index:4;
#Layer5 {
position:absolute;
left:0px;
top:720px;
width:976px;
height:77px;
z-index:5;
background-color: #0066CC;
#Layer6 {
position:absolute;
left:641px;
top:8454px;
width:201px;
height:40px;
z-index:6;
#Layer7 {
position:absolute;
left:169px;
top:664px;
width:974px;
height:42px;
z-index:5;
#Layer8 {
position:absolute;
left:533px;
top:751px;
width:343px;
height:38px;
z-index:6;
#Layer9 {
position:absolute;
left:177px;
top:146px;
width:772px;
height:325px;
z-index:7;
#Layer10 {
position:absolute;
left:173px;
top:527px;
width:972px;
height:137px;
z-index:8;
background-color: #999999;
.style7 {
font-size: 24px;
font-weight: bold;
color: #000000;
#Layer11 {
position:absolute;
left:178px;
top:150px;
width:869px;
height:45px;
z-index:9;
.style8 {
color: #0000CC;
font-size: 36px;
.style9 {
color: #00ff00;
font-size: 55px;
}
.style9 {color: #FF0000}
-->
</head>
<body id="top">
<div id="header">
<div class="fl_left">
<p>Information</p>
</div>
<div id="right">
<div id="content">
</div>
</div>
<ul id="topnav">
<li><a href="logout.php?logout">Logout</a></li>
<li class="last"><a href="gallery.php">Gallery</a></li>
<li><a href="#">Authors</a>
<ul>
<li><a href="books.php">Books</a></li>
<li><a href="">Biography</a></li>
</ul>
</li>
<ul>
<li><a href="about.php">About</a></li>
<li><a href="#">FAQ</a></li>
</ul>
</li>
<ul>
<li><a href="view.php">Medical</a></li>
<li><a href="opac.php">OPAC</a></li>
</ul>
</li>
</ul>
</div>
</div>
</marquee>
<div class="container">
<div id="content-slider">
<ul>
<li id="first" class="firstanimation"> <!-- ID for tooltip and class for animation -->
</li>
<li id="second" class="secondanimation">
</li>
</li>
</li>
</li>
</ul>
</div>
</div>
</div>
</body>
</html>
6.2 upload
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>LIBRARY</title>
<style type="text/css">
<!--
#Layer1 {
position:absolute;
left:3px;
top:157px;
width:975px;
height:504px;
z-index:1;
background-color: #FFFFFF;
#Layer2 {
position:absolute;
left:2px;
top:-3px;
width:975px;
height:119px;
z-index:2;
}
#Layer3 {
position:absolute;
left:2px;
top:112px;
width:975px;
height:40px;
z-index:3;
.style1 {
color: #FFFFFF;
font-weight: bold;
#Layer4 {
position:absolute;
left:170px;
top:-7px;
width:973px;
height:797px;
z-index:4;
#Layer5 {
position:absolute;
left:0px;
top:720px;
width:976px;
height:77px;
z-index:5;
background-color: #0066CC;
#Layer6 {
position:absolute;
left:641px;
top:8454px;
width:201px;
height:40px;
z-index:6;
#Layer7 {
position:absolute;
left:0px;
top:130px;
width:974px;
height:42px;
z-index:5;
#Layer8 {
position:absolute;
left:205px;
top:182px;
width:343px;
height:38px;
z-index:6;
#Layer9 {
position:absolute;
left:175px;
top:152px;
width:967px;
height:497px;
z-index:7;
}
#Layer10 {
position:absolute;
left:771px;
top:325px;
width:0px;
height:2px;
z-index:8;
#Layer11 {
position:absolute;
left:462px;
top:178px;
width:309px;
height:37px;
z-index:9;
#Layer12 {
position:absolute;
left:213px;
top:245px;
width:145px;
height:26px;
z-index:10;
#Layer13 {
position:absolute;
left:381px;
top:244px;
width:139px;
height:32px;
z-index:11;
#Layer14 {
position:absolute;
left:545px;
top:245px;
width:61px;
height:29px;
z-index:12;
}
#Layer15 {
position:absolute;
left:657px;
top:245px;
width:204px;
height:35px;
z-index:13;
#Layer16 {
position:absolute;
left:870px;
top:247px;
width:164px;
height:31px;
z-index:14;
#Layer17 {
position:absolute;
left:261px;
top:377px;
width:100px;
height:38px;
z-index:15;
}
#Layer18 {
position:absolute;
left:407px;
top:375px;
width:210px;
height:36px;
z-index:16;
#Layer19 {
position:absolute;
left:261px;
top:420px;
width:122px;
height:33px;
z-index:17;
#Layer20 {
position:absolute;
left:407px;
top:414px;
width:236px;
height:36px;
z-index:18;
#Layer21 {
position:absolute;
left:262px;
top:460px;
width:117px;
height:27px;
z-index:19;
#Layer22 {
position:absolute;
left:409px;
top:454px;
width:238px;
height:26px;
z-index:20;
#Layer23 {
position:absolute;
left:264px;
top:332px;
width:111px;
height:31px;
z-index:21;
#Layer24 {
position:absolute;
left:408px;
top:334px;
width:243px;
height:35px;
z-index:22;
#Layer25 {
position:absolute;
left:263px;
top:498px;
width:129px;
height:31px;
z-index:23;
#Layer26 {
position:absolute;
left:411px;
top:498px;
width:231px;
height:23px;
z-index:24;
#Layer27 {
position:absolute;
left:557px;
top:552px;
width:134px;
height:37px;
z-index:25;
#Layer28 {
position:absolute;
left:1039px;
top:247px;
width:52px;
height:32px;
z-index:26;
#Layer29 {
position:absolute;
left:216px;
top:190px;
width:874px;
height:424px;
z-index:9;
</style>
<style type="text/css">
#Layer30 {
position:absolute;
left:129px;
top:44px;
width:1018px;
height:419px;
z-index:9;
position:absolute;
left:210px;
top:382px;
width:875px;
height:70px;
z-index:10;
#Layer32 {
position:absolute;
left:132px;
top:156px;
width:975px;
height:38px;
z-index:10;
background-color: #0000FF;
-->
</style>
</head>
<div id="body">
<label> Upload Your Files Here </label>
</form>
<?php
if(isset($_GET['success']))
?>
<?php
else if(isset($_GET['fail']))
?>
<?php
else
{
?>
<label>You can upload the following files (PDF, DOC, EXE, VIDEO, MP3,
ZIP)</label><br>
<?php
?>
</div>
<body bgcolor="#00FF00">
<div id="Layer10"></div>
<div id="Layer30">
<div class="container-fluid">
<div id="Layer3"">
<p> </p>
<p> </p>
<thead>
<tr> <th>NO:</th>
<th>ID Number</th>
<th>File</th>
<th>Size</th>
<th>Type</th>
</tr>
</thead>
<tbody>
<?php
$va="pa";
$no=1;
include('dbconfig.php');
while($row=mysql_fetch_array($resp)){
echo '<tr>';
echo '<td>'.$no.'</td>';
$no++;
?>
</body>
</table>
</div>
<div id="layer">
<tr>
</tr>
</table>
</div>
</div>
</div>
<p> </p>
<p> </p>
</div>
</div>
</div>
<div id="Layer32">
<tr bordercolor="#FFFF66">
</table>
</div>
</form>
</body>
</html>