CLMS Computerized Library Management System
CLMS Computerized Library Management System
Management System
(CLMS)
Provido, Jeremy C.
March 2023
Chapter I: Introduction of the study
PEOPLEWARE
ADMIN
LIBRARIAN
STUDENTS or STAFF
This Conceptual framework for input and minimum requirements for running the SysBoC
including the software, hardware, and peopleware components.
Software
Microsoft Visual Studio 2008 software for the IDE(integrated development environment)
use of Vb.Net Language to create an custom GUI(graphic user interface) for the library
management system.
In terms of Hardware, the Dell Inc. Laptop use and Intel(R) Core(TM) i5-5250U 5 th Gen
CPU @ 1.60GHz 1.60 GHz, System model of Inspiron 5558, Intel(R) HD Graphics 6000 for GPU,
and 4gb DDR3 RAM. Together of all these components can provide a functional system to
manage library resources and databases.
Peopleware or users of the CLMS might be a Librarian, Students and also Staff who will
interact with the system to manage and have access to library resources.
We have decided to use the Iterative Model to create CLMS during the process. This model
provides flexibility, user feedback, and early issue identification. This approach requires
developers to make changes in each implementation and to review user feedback until the
system is ready to deploy, as well as to provide maintenance to keep the system up to date.
2. LIBRARIANS or BOOK KEEPER. The Librarians can easily issue and return books with just a
few clicks, and it saves a lot of time and effort. The System maintains a centralized record of
all books, their availability, and their borrowing and returning data.
3. STUDENTS and STAFF. Students can easily fill their data computerized along with the
librarians, and can borrow and return books. This reduces the waiting time and improves the
overall efficiency of the library system, unlike manual procedure.
Login system. This form is used by librarians to gain access to the system using their
username and password.
Admin. This form is used by admin to administrates a system crud for librarians, also if
they forget their login password it will be edited here.
Student or Staff Form. Librarians can use this form to search, add, edit, and delete
library users' profiles or records. Furthermore, librarians have access and can see every
member of the library system's user.
Book maintenance. Librarians can access availability of books, books maintenance or
manage every book’s that search, add, edit and delete. Including adding author’s name
or publisher information.
Issued books. In this part when member wants to borrow books it is all under this form.
Return books. Librarians use this form when member wants to pay penalties and return
books.
Limitation
Barcode Scanner. The CLMS can’t generate barcode scanner or any devices
Email. The CLMS can’t operate email or any online messaging update.
Authentication code. The CLMS can’t provide authentication code for verifying users
contact or emails.
SMS. The CLMS can’t operate any messages to update a borrower when it will be return.
Reports. The CLMS can’t provide paper reports of returned, loss or issued books.
Admin short for administration: the activities involved in managing or organizing a business
or other organization.
Authentication is how companies verify a person's identity or device before allowing them
to access network systems. This cybersecurity strategy can protect an organization's
sensitive information from unofficial access. The three main authentication factors are
knowledge factors, such as passwords and other confidential login details, possession
factors, such as an access card or key fob, and inherent factors, such as fingerprints.
Barcodes encode product information into bars and alphanumeric characters, making it
much faster and easier to ring up items at a store or track inventory in a warehouse.
Bug represents an error in software coding that prevents a program from working.
Digital refers to something that can be manipulated by the fingers (called "digits"), it also is a
type of electronic signal that uses a binary code (a system using numbers, or "digits") to
transmit information.
Email (electronic mail) is the exchange of computer-stored messages from one user to one
or more recipients via the internet.
Hardware is the Physical component of the computer system, which we can touch.
Input the information entered into a computer system, examples include: typed text, mouse
clicks, etc.
Online connected to, served by, or available through a system and especially a computer or
telecommunications system (such as the Internet)
Output the visual, auditory, or tactile perceptions provided by the computer after processing
the provided information.
Peopleware is the user that interface between the computer hardware or computer
software.
Search engine optimization (SEO) refers to techniques marketers use to rank their web
pages highly on search engines. It involves identifying and using specific keywords in
websites and articles users commonly search for with the goal of marketing. This provides
relevant search results, allowing the webpage to rank high on the search engines and reach a
higher audience.
Server represents the software and hardware that uses HTTP to respond to client requests
over the web.
Software is the collection of instructions, Programing or codding, which we can only see,
Feel or can imagine about its logic.
System is a set of integrated devices that input, output, process, and store data and
information.
User interface represents the elements of an application that a user can interact with, such
as the display and menus.
OPERATIONAL TERMS
Efficient productive of desired effects especially: capable of producing desired results with
little or no waste (as of time or materials)
1.11 ERD Diagram – backend (database) – explain the connections among tables
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES (5 each)
A computerized library system for a school keeps track of all books and periodicals in the library, as well
as their Issued status. The library system also communicates with an external relational database, which
holds information about library users (students, faculty, and staff), such as whether or not they have any
library materials checked out. Users of the library can search the catalog and request books and
magazines.
The library is regarded as the brain of any institute; of course, many institutes recognize the importance
of the library to the growth of the institutes/colleges and its valued users, whom we refer to as students.
A library management system, also known as an integrated library system (Adamson et al., 2008), is an
enterprise resource planning system for a library that is used to track item owned, orders placed, bills
paid, and patrons who have borrowed.
According to Dio P. Doble (2011) A college strengthens its educational level through the
advancement of its library. The Botolan Community College Computerized Library System
aimed to enhance the procedures of the library, from manually operated to a computerized
system.
This proposal's purpose was to ease the transactions in the library, i.e., leading of books,
storing of books, search engine of books, manage members of the library and secure the
library system. The librarian and the library users still use the manual way of transacting of
borrowing and returning of books. The Librarian use log books in listing the books. They use
library cards and card catalogues in searching for reading and reference materials.
(http://www.scribd.com/doc/99431218/Computerized-Library-System).
2.3 Synthesis