SlideShare ist ein Scribd-Unternehmen logo
1 von 93
Downloaden Sie, um offline zu lesen
KETABY
Library Management System
Presented by:
Ahmed Atef Elnaggar
Amr Darwish Ibrahim
Supervisor:
Prof. Ahmed M. Elfatatry 1
Contents
• How did we start?
• Why do we choose library? (An example of the actual)
• Who are we within the project?
• How is the project going? (Applying PRINC2)
• Revision history.
• Purpose and audiences
• Over all Library description
– Inception phase
– Requirements gathering
– Feasibility study
– Drawbacks of present system
– Domain analysis
– User categories and their characteristics
– Functional ,Non-functional and technical requirements
2
3
Contents
– User documentation
– The estimate cost LOC (line of code) / Priority and risk
• Business activities (Main and Sub.)
• Business process workflow
• Use case diagrams and their descriptions
• User Interfaces
• Collaboration diagrams
• Class diagrams
• State diagrams
• Unit testing – Integration testing – System testing
• Conclusion
How did we start?
• First we were hesitated about many projects
– Attendance system
– Hyper market system
– Library management system
• Finally we decided to go ahead with library management system.
We met together many times and divided the work between us and sent Eng.
Shimaa a formal email about our project.
4
5
We decided to use some application like:
1- M.S. Office 2010
2- Software Ideas Modeler 6.10
3- Smart draw 2010
3- Adobe Reader XI
Why do we choose a library?
"Books to the ceiling,
Books to the sky,
My pile of books is a mile high.
How I love them! How I need them!
I'll have a long beard by the time I read them."
By Arnold Lobel
6
Why do we choose library?
• Library is regarded as the brain of any institute
and universities; many institutes understand the
importance of the library to the growth of the
institute and their esteem users. LMS supports
the general requirement of the library.
• Library management system offers many
flexible and convenient features, allowing
librarians and library users to maximize time
and efficiency. It will track on the how many
books available in library and books issued to
the members.
7
8
Who are we within the project?
• We are students who registered for OOAD course
• Or imagine a virtual scenario that we are working for IT
company which is applying PRINCE2 standard.
• May be PMP or CMMI or ITIL.
• Any way PRINCE2 (Projects IN Controlled Environment) which is a de
facto process-based method for effective project management.
• Used extensively by the UK Government, PRINCE2 is also
widely recognized and used in the private sector, both in the
UK and internationally.
• The key features of PRINCE2 are a:
– focus on business justification
– defined organization structure for the project management team
– product-based planning approach
– emphasis on dividing the project into manageable and controllable
stages
– flexibility that can be applied at a level appropriate to the project.
9
10
How is the project going? (Applying PRINC2)
11
Revision history
Date
D/M/Y
version Description
1/4/2013 1.0 Library management sys.
1/5/2013 2.0 Library management sys.
DAVe Desirable Achieve Viable
Must be available at all the time and stand to Executive manager.
• Improved customer service through greater access to accurate info.
• Increased productivity and job satisfaction among staff members as it
eliminates duplication of effort.
• More economical and safer means of storing and keeping track of
information.
• Easier access to Information like management reports and stock etc.,
as well as more accurate and faster results from statistical analyses.
• Reduces errors and eliminating the ennui of long and repetitive
manual processing.
• Greater accountability and transparency in operations.
• Improved efficiency and effectiveness in administration and
management as it has unprecedented access to real-time information.
• More reliable security for sensitive and confidential information.
• Appropriate knowledge-based action and intervention can now take
place in a timelier manner.
12
13
Purpose
This document describes the software requirements and specification (SRS) for LMS
software. The document is intended for the customers and the developer (designers,
testers, maintainers).
The reader is assumed to have basic knowledge of LMS. Knowledge and understanding
of Unified Modeling Language (UML) diagrams is also required.
Intended Audience
The intended audience consists of:
Software Project Managers
Software Engineers
Software Developers
Library Organizers
Project Scope
LMS is essentially meant of collections, It is a multi-user version and can take care of
all the fundamental functions of a Library like Cataloguing, Circulation, Accessioning
and Housekeeping. It can satisfactorily cater to all the basic functions of a small library.
14
Overall Description (Brief)
Modern Libraries are not made up of just books but CD ROM’s, articles, project reports. bound
volumes are substantial part of the holding, managing the holdings manually is a not a simple job.
There are few solutions but many a times, we find ourselves “making them works” by finding
“ways to work around” system inadequacies.
Moreover we have limited staff resources. these “work around” waste time, effort, and skills that
should be sent on user services.
Many solutions do not keep up with the technological changes and hence prove to be time
wasters.
Library management system is a small footprints software suitable for personal /individual
libraries. You can store the information about the books and other material and control the
movement of the same.
Silent Features
• Control the movement of books and other material and avoid loosing the same.
• Search if you have a specific book in your collection based on the title. author etc.
• Print the spine labels for the book,
• Find what a specific person has borrowed from you.
It offers the following modules Cataloguing, Circulation, Queries
15
Cataloguing - Salient Features
You can create a catalogue of your books, CDs, maps, drawings and all
similar collections using this module. It supports various classification
schemes like DDC, DD, and CC etc. The cataloguing module is based on
AACR2 (Anglo American cataloguing rule Circulation)
Circulation
Module deals with issue and return of material from the library.
It is a barcode & and smart card enabled system and hence the issue and
return of material is handled uniformly. You can issue member cards and
also do the transactions.
Inception phase
• We have been asked to build a computer based
library system that will handle the bookkeeping
aspects of a library and provide user browsing
facilities.
• The first thing to do is to go and find out about the
target library or libraries to see what they do now
and what they would like to be able to do.
• We get the following data:
16
Library description
• Books and Journals. The library contains both books and journals.
It may have several copies of the same book.
Some of the books are for short term loans only.
All other books may be borrowed by any library member for 3 weeks.
After the selected day, they have to pay the fine per day (ten pounds).
If the student lost the book he has to purchase the same book and submit to the library.
Only members of staff may borrow journals.
Members of the library can normally borrow up to 6 items at a time,
but members of staff may borrow up to 12 items at a time.
New articles arrive regularly and sometime disposed of the catalogue needs to be updated.
The current year’s journals are sent away to be bound at the end of each year.
• Borrowing.
It is essential that the sys. keeps track of when books and journals are borrowed & returned.
The new system should produce reminders when a book is overdue.
It may be desirable to allow users to extend their loans if the book is not reserved.
The system enforces the rules for borrowing given above.
• Browsing:
The sys. should allow users to search for a book on a particular topic or by an author or by the ISBN.
The user should then be able to check if the book is on loan and if so to reserve the book.
Requirements gathering
17
Feasibility study
18
Some of the problems being faced in manual
system are as follows:
1. Fast report generation is not possible.
2. Tracing a book is difficult.
3. Information about issue/return of the books are not
properly maintained.
4. No central database can be created as information is
not available in database.
19
Drawbacks of present system
• This whole process in manually, we need to develop the fully
automatic library that enables the user to search for the relevant
book and they can also who have which book.
• We need to computers in the library so that user can access to
online books.
• We need to bar code scanner, so the user just scans the code and
the book will be issued.
• The PCs used in the library must be connected to each other.
• The system should be accessed from outside over the internet.
• The user needs to enter his roll no and the details of the book.
• We can also add new feature of member ship in the library in
the starting of the year, then they can become the member and
they will be issued the role number to run this software.
20
Domain analysis
• To start the design of the system it is useful to
decide on a set of use-cases and use-cases involve
actors so who are a suitable set of actors?
• One way of choosing Actors is to read the
description of what the system does and see what
external people or systems are mentioned:
Members/Patrons
Administrator
Librarians
Guests
Browsers
User category
21
• Administrator
Enough computer knowledge and experience.
• Librarians and their assistances
Skilled at library daily operation.
No much prior computer knowledge.
• Members/Patrons and guests
Current students and staffs have basic
computer knowledge.
User characteristics
22
23
Software project requirements
The Librarian
1. Add Article (Add books and their information of the books to the database)
2. Update Article (Edit the information of the existing books or mark as missing)
3. Delete Article (Wrong entry must be removed from system)
4. Inquiry Members (For enrolled members to view their details, check and print)
5. Inquiry Issuance (For all database articles to check and print)
6. Check out Article (borrow operation)
7. Check In article (return operation)
8. Inquiry waiting for approvals (Generate newly application to be in waiting list)
9. Reserve Article (Booking a book with the name of librarian, it can be pledged)
Member
1. Authentication (own an account in the library before accessing system)
2. Search Article (view basic info. of book and its status)
3. Request Article (After successful searching ,can create or cancel booking)
4. Renew or Extension of a borrowed article
5. Check Account (View the history of books issued to him previously)
Functional requirements
24
Assistance librarian or librarian :Prepare Library database.
Administrator:
1. Add/delete a librarian.
2. Change the password of a librarian.
3. Add/delete a Member.
System:
1. Send an email to member when due date comes.
2. Send an email to member when due date passed.
3. Calculate the penalty.
Data base system:
Proposed Database is intended to store, retrieve, update, and manipulate information
related to library which include
1. All basic data related to the article stored in & books availability.
2. The borrow /return long for all action (depends on article).
3. The IDs & password for all the user (Staff information-Members details).
4. Determining level of user & maximum items which he can borrow.
5. Calculation of fines
Guest :Register (Full fill all application form for registration, Record his contacts).
Functional requirements
25
• Safety Requirements
The database may get crashed at any certain time due to virus or operating
system failure. Therefore backup is required.
• Security Requirements
Log in required because depending upon the category of user the access rights
are decided. For example if the user is an administrator then he can be able to
modify the data, delete, append etc.
• Availability Requirements
The system should be accessible to members through a website at all time.
• Performance Requirements
the web site searching engine system should response reasonably.
The search time should be less than 5 seconds.
The system should not make any mistake on the borrow/return action.
• Software Quality Attributes
The database should be user friendly.
Non-functional requirements
26
• Hardware Constraints
The system requires a database in order to store persistent data.
The database should have backup capabilities.
• Culture, political and religion requirement
There are some anticipated category of articles doesn’t suites the
Egyptian society.
• Software Constraints
The development of the system will be constrained by the
availability of required software such as database and
development tools.
• Design Constraints
The system must be designed to allow web usability. That is, the
system must be designed in such a way that will be easy to use
and visible on most of the browsers.
Non-functional requirements
27
• Assumptions and Dependencies ,The product needs following third party
(Microsoft SQL server to store the database. – Visual studio& IIS to develop Product.)
• Hardware requirement :
- Server side: -Client side:
• Windows Processor: Pentium 4.0 GHz Pentium III or 2.0 GHz
• Hard Drive: 80 GB or more 40 GB or more
• RAM: 1 GB or higher 1 GB or higher
– bar code scanner
• Software requirement &Operating Environment
– OS: Window 7 and supported for other platform such as Applet, Mac and UNIX.
– Product is developed using ASP (Active Server Pages).
– Most of the features will be compatible with the Mozilla Firefox, Opera and IE.
– MS SQL server 2008
• Communications Interfaces
– The Customer must connect to the Internet to access the Website.
– Connection between computers inside library via LAN at the speed of 10MBps.
– Dialup Modem of 56 kbps, Broadband connection with a Internet Provider.
• Web Server: IIS (Internet Information Services is a powerful Web server that
provides a highly reliable, manageable, and scalable Web app. infrastructure) 28
Technical(Build) requirements
Supplementary requirements
ASP.NET is a Microsoft technology where you will have to
purchase the development environment which is Visual
Studio. There are many advantages that I have seen in
ASP.NET
1. Ease of development where the burden of coding for large or huge
web applications reduces while using this language.
2. Master Pages to Improve Efficiency
3. You got your source with You where the web application can be
made in different languages as this technology is language
independent.
4. Building the application with ASP.net is safe and secure because of
windows inbuilt authentication.
5. The web pages written with this language can be easily maintained
as the source code and HTML are together for this technology.
6. You get what you pay for
29
Why ASP.NET?
• This application can be easily implemented under
various situations. We can add new features as and
when we require.
• Reusability is possible as and when require in this
application.
• There is flexibility in all the modules.
• There will be no online help for the product at this
moment.
• A database of library will include magazines,
microfilm, videos, audios, online sessions.
• Allows patrons to search the database of library assets
by date of publication, publisher or subject.
30
Future features requirements
• LMS should handle every day to day library problems
and its GUI let the library management personal work
very easily. With the help of multi-window opening
person can do multiple task in same time.
• The product will include user manual.
• The user manual will include product overview,
complete configuration of the used software (such as
SQL server),technical details, backup procedure and
contact information which will include email address.
• The product will be compatible with the Internet
Explorer 8.0 or higher. The data bases will be created
in the Microsoft SQL server 2008
31
User Documentation
The estimate effort and cost
32
There are many considerations to estimate cost project like:
• LOC(Line Of Code)approach
One of the most effective direct measurements for software size is a
count of the number of lines of source code that have been
implemented. The time and effort involved in implementing a software
programs linearly related to the software size in lines of code.
• Advantages • Disadvantages.
-LOC is a direct measure of S.W size.
-LOC is easily counted.
-Counting can be easily automated
-Simplicity of categorizing code into
reusable, new, changed, and reused
-Lack of agreement on standards of S.W industry.
-LOC counts vary with language.
-Difficulty in visualizing LOC early in development.
-The same automatic counter may not work for all
programming styles in the same language.
-A Line of Code is a strange term to most clients.
-Some calculated statistics using LOC can be misleading
Reference Considerations in Project Cost Estimation Prepared by Randall Colville July 2008
Function Estimated LOC
Library user functions 800
Librarian functions 700
Administrator functions 900
Web site and related functions 1000
Library date base 1000
Integration 800
Software interface for Librarian 700
Software interface for administrator 700
Estimate total line of code 6.600
33
LOC(Line Of Code)approach
• Quick Facts: development tools: C# Code ,Asp Code ,SQL
Project Development Length: 30 days
34
Given that
– Average productivity for systems of this type =1,000 LOC/person-months
– Burdened labor rate = 5,000 L.E per month
Then
– the cost per line of code = 1,000/5,000 = 5 L.E per line
– estimated project cost = 6,600*5 = 33,000 L.E
– Estimated effort = 66,000/1,000 = 6.6 person-months
LOC(Line Of Code)approach
35
The estimate priority& Risk
• Each possible requirement is described in a few short sentences.
• Additional information is provided for each requirement to indicate
its estimated cost of development, the risk involved and its priority
to the success of the system as a whole
36
Given that
– Burdened labor rate = 5,000 L.E per month
– Number of working hours = 22days *8hours = 176 Hrs.
Then
– the cost of working hour = 5,000 L.E / 176 Hrs. = 28.5 L.E per hour
– estimated project cost = 28.5 * 970 = 27,645 L.E
– Estimated effort = 970 / 176 = 5.5 person-months
Candidate requirements Prior. Hrs. Risk
Maintains a database of library assets include books and journals. High 100 Low
Allows librarian to add assets to the library database. High 10 Med
Allows librarian to lend library assets to patrons. High 30 Med
Allows librarian to set the length of time to overdue. High 30 Med
Maintains a database of library patron accounts. High 80
Allows librarian to access patron account information. High 30 Med
Automates the process of assigning fines to patrons when overdue. High 60 Med
Allows librarian to generate a mailing of overdue notices. High 120 Med
Allows patrons to search the database of library assets by title, author or ISBN. High 80 Med
Allows patrons to determine whether an article is available. High 10 Med
Allows remote library system to search the asset database. Med 120 High
Allow patrons access to all functionality from a remote site via a web site. Med 300 High
Total cost per hours 970
• Secured database.
• User tracking
• Search feature
• Calculating fines
• Asset tracking.
• Rules and penalties
37
Business activities
Expedite onsite search /borrow /return /book sys.
Handling online search / hold /send system
Frequent updating back-end database system
Main &Sub Business activities
Log in
Search
articles
Book
article
Cancel
Booking
Search
articles
Book
article
Cancel
Booking
Log in
Check in
articles
Check out
articles
Delete
article
Updating
article
Add
article
IDs & Password
of Users
Info. of
articles
38
Send
email
39
Business
Process
workflow
1
40
Business process no 1 Activity name Add asset to database
Brief description Using to maintain an
asset database records
Frequency of
execution
Every time have
a new asset
Business actors Admin, Librarian Scalability Able to scalable when
adding new
categories to database
Criticality high Notes Scalability very soon
Other non-functional
requirement
Performance ,speed
replay and accuracy
Exceptions
Primary path Scan library card
Authorize account
Scan asset
Enter asset type
Enter book inf.
Set due date
Add to asset D.B
Alternatives Enter account by K.B
Enter asset by K.B
Enter journal info
Add asset to database activity
41
Workflow diagram 2
42
Business process no 2 Activity name Issue library card
Brief description Using to issue a
library card for every
user and add record to
database account
Frequency of
execution
When doing any
change in database
like check in or out or
reserve asset
Business actors Admin, Librarian Scalability --
Criticality high Notes Admin issues for
librarian but librarian
issues for patron
Other non-functional
Requirement
Should to be accurate Exceptions
Primary path 1-Scan un issued
library card
2-Enter patron
information
3-Create account
record
Alternatives
Issue library card activity
43
Business process no 3 Activity name Access account info.
Brief description Used to verify
,authorize user
account
Frequency of
execution
Every time have to
login
Business actors Admin, Librarian Scalability Able to scalable when
adding new librarian
or member
Criticality high Notes Should to be secure
Other non-functional
requirement
Security and accuracy Exceptions
Primary path Scan library card
Access account in D.B
Display account info.
Alternatives Enter account by K.B
Access account info. activity
44
Workflow diagram 3
45
Business process no 4 Activity name Check in asset
Brief description Using when asset
return back to library
Frequency of
execution
Business actors Librarian Scalability
Criticality Mid Notes Should remove any
mark with related
asset
Other non-functional
requirement
Speed and accuracy Exceptions
Primary path Scan asset
Check account balance
No Unpaid fine
Remove asset from
patron's account +
Mark asset as checked
in
Alternatives Enter asset by K.B
unpaid overdue fine
Display notice of
overdue fine
Check in asset activity
46
Workflow diagram 4
47
Business process no 5 Activity name Check out or reserve
asset
Brief description Using when asset
return back to library
Frequency of
execution
Business actors Librarian Scalability
Criticality Mid Notes Should remove any
mark with related
asset
Other non-functional
requirement
Speed and accuracy Exceptions
Primary path Scan library card
Authorize account
Check account balance
No Unpaid fine
Scan asset
Add asset to patron's
account+Mark asset as
checked
Alternatives Enter account by k.B
Unpaid overdue fine
Pay overdue fine
Reserve asset
Check out or reserve asset activity
48
Workflow diagram 5
49
Business process no 6 Activity name Delete asset from D.B
Brief description Using when asset lost
or removed from D.B
Frequency of
Execution
Business actors Librarian Scalability
Criticality Mid Notes Should remove any
mark with related
asset
Other non-functional
requirement
Accuracy Exceptions
Primary path Scan library card
Authorize account
Scan asset
Asset not checked out
Delete from asset
database
Alternatives Enter account by K.B
Enter asset by K.B
asset checked out
Remove asset from
patron account
Delete asset from D.B activity
50
Workflow diagram 6
51
Business process no 8 Activity name Pay overdue
Brief description Using when asset lost
or removed from D.B
Frequency of
Execution
Business actors Librarian Scalability
Criticality Mid Notes Should remove any
mark with related
member
Other non-functional
requirement
Security and accuracy Exceptions
Primary path Scan library card
Authorize account
Check account balance
unpaid overdue fine
Credit account
Alternatives Enter account by K.B
No unpaid fine
Pay overdue activity
It is clear that the physical objects from the
previous section
• the member, books, library are correspond to
entities
• In the Entity-Relationship model, and the
operations to be done on those entities
• Holds, checkouts, and so on correspond to
relationships.
• However, a good analysis will minimize
redundancy and attempt to store all the
required information in as small a space as
possible.
• Optimize business processes before
automating them.
• Make activities parallel if possible
• Delete unnecessary activities
• Combine steps
52
Business
process
workflow
53
Business process workflow diagram
54
Use case
Diagram
1
55
Use case
Diagram
2
56
Use case
Description
1
Use case number:1 Use case name: issue library card
Goal: Create library card
Brief description Add library card for new member to use it in for check out and
check in books
Actors: admin
Frequency of execution When you need
Scalability High
Criticality Important
Post conditions: Update accounts database
Other non-functional
requirements
Use case number:2 Use case name: delete asset
Goal: Delete asset
Brief description Admin can delete asset from database
Actors: admin
Frequency of execution If necessary
Scalability High
criticality important
Post conditions: Update assets database
Other non-functional
requirements
57
Use case
Description
2
Use case number:3 Use case name: add asset
Goal: Add asset
Brief description Add asset to database to check in or check out
Actors: Admin., librarian
Frequency of execution When needed
Scalability High
Criticality important
Post conditions: Update assets database
Other non-functional
requirements
Use case number:4 Use case name: generate asset report
Goal: Generate report
Brief description Generate report to get information about asset
Actors: Admin., librarian
Frequency of execution When needed
Scalability Medium
criticality important
Post conditions: Update assets database
Other non-functional
requirements
58
Use case
Diagram
3
59
Use case
Description
3
Use case number:5 Use case name: search asset
Goal: Search asset
Brief description Search asset by name or author to determine which book to
borrow
Actors: member
Frequency of execution When needed
Scalability High
Criticality important
preconditions: Valid card
Other non-functional
requirements
Use case number:6 Use case name: access account information
Goal: Access account information
Brief description Get information about member and overdue fines
Actors: member
Frequency of execution When needed
Scalability High
criticality important
preconditions: Valid card
Other non-functional
requirements
60
Use case
Diagram
4
61
Use case
Description
4 Use case number:8 Use case name: check in asset
Goal: check in asset
Brief description Librarian check in asset which will update account database
Actors: Librarian
Frequency of execution daily
Scalability High
Criticality important
Post conditions: Update asset database
Update account database
Other non-functional
requirements
Use case number:7 Use case name: check out asset
Goal: check out asset
Brief description Librarian check out asset for member which will update
account database
Actors: Librarian
Frequency of execution daily
Scalability High
Criticality important
preconditions: Pay overdue fines
Post conditions Update account database
Update asset database
Other non-functional
requirements
62
Use case
Diagram
5
63
Use case
Description
5
Use case number:9 Use case name: generate overdue notice
Goal: generate overdue notice
Brief description Librarian get information for overdue notice for member
Actors: Librarian
Frequency of execution when needed
Scalability High
Criticality important
Post conditions Access account information
Other non-functional
requirements
Use case number:10 Use case name: pay overdue notice
Goal: Pay overdue notice
Brief description Librarian pay overdue fine for member
Actors: Librarian
Frequency of execution when needed
Scalability High
Criticality important
Post conditions Update account database
Other non-functional
requirements
64
User Interface 1
65
User Interface 2
66
User Interface 3
67
User Interface 4
68
User Interface 5
69
User Interface 6
70
User Interface 7
71
User Interface 8
72
User Interface 9
73
User Interface 10
74
Collaboration Diagram 1
75
Collaboration Diagram 2
76
Collaboration Diagram 3
77
Collaboration Diagram 4
78
Collaboration Diagram 5
79
Collaboration Diagram 6
80
Class diagram
Another powerful way to model systems is in terms of
their states and the transitions between states.
A simple example for the class issue book is:
The diagram shows how the state of book availability
changes as a result of borrowing and returning of
copies of the book. 81
State
Diagrams
82
State Diagrams
83
Testing overview
Unit testing
Integration testing
System testing
• Test of subprograms.
• Choose 3 subprograms as the test points.
• Cover most frequently used functions.
• Black box testing
– Equivalence testing
– Boundary testing
84
Unit testing
• Feature :Search books
• Testing content
85
Unit test :case 1
Equivalence classes Selected value inputs
Book title only Software engineering
Author only Roger S. Pressman
Subject only Software development
ISBN only 007-123840-9
Two search criteria with “and”
relation
(book title + author)
Software engineering+ Roger S. Pressman
Two search criteria with “or"
relation
(book title/author)
Software engineering / Roger S. Pressman
More search criteria with “and”
relation
(book title + author + subject) Software engineering
+Roger S. Pressman + Software development
More search criteria with “or”
relation
(book title /author / subject) Software engineering /
Roger S. Pressman / Software development
• Feature :Check out assets
• Testing content
86
Unit test :case 2
Equivalence classes Value for student ID Value for book
number
Patron ID without fine book type 1
Patron ID with fine under the limitation
book type 1
Patron ID with fine over the limitation
Book type 1
Patron ID without fine book type 2
Patron ID with fine under the limitation
book type 2
Patron ID with fine over the limitation
Book type 2
• Feature :Check in assets
• Testing content
87
Unit test :case 3
Equivalence classes Selected value inputs
Book of type 1 within due
Book of type 1 overdue
Book of type 2 within due
Book of type 2 overdue
• Big bang method
• Proposed test cases
– Find books vs. Request
– Request vs. Pick up requested book
– Check out vs. Online renew
• Regression testing at unit level
88
Integration testing
• The purpose of the system testing is to consider all the likely
variations to which it will be suggested and push the systems
to limits.
• The testing process focuses on the logical intervals of the
software ensuring that all statements have been tested and on
functional interval is conducting tests to uncover errors and
ensure that defined input will produce actual results that
agree with the required results.
• Program level testing, modules level testing integrated and
carried out.
• Proposed test cases (Non-functional requirements)
• The response time of the system(performance)
• The volume of the system (performance)
• The login procedure of the system (security)
89
System testing
• Is the menu bar displayed in the appropriate contested some
system related features included either in menus or tools?
• Do pull –Down menu operation and tool-bars work properly?
• Are all menu function and pull down sub function properly listed
• Is it possible to invoke each menu function using a logical
assumptions that if all parts of the system are correct, the goal
will be successfully achieved .?
• In adequate testing or non-testing will leads
– to errors that may appear few months later.
– This create two problem
1. Time delay between the cause and appearance of the problem.
2. The effect of the system errors on files and records within the system
90
Software testing
• There are two major type of testing they are (White Box Testing, Black Box Testing).
• White Box Testing
– White box some times called “Glass box testing” is a test case design uses the control structure
of the procedural design to drive test case.
– Using white box testing methods, the following tests where made on the system
• All independent paths within a module have been exercised once. In our system, ensuring
that case was selected and executed checked all case structures. The bugs that were
prevailing in some part of the code where fixed
• All logical decisions were checked for the truth and falsity of the values.
• Black box Testing
– Black box testing focuses on the functional requirements of the software.
– This is black box testing enables the software engineering to derive a set of input conditions that
will fully exercise all functional requirements for a program.
• Black box testing is not an alternative to white box testing rather it is complementary approach
that is likely to uncover a different
• Class of errors that white box methods like..
1) Interface errors
2) Performance in data structure
3) Performance errors
4) Initializing and termination errors
91
White &Black Box Testing
Our project is only a humble venture to satisfy the needs in a library.
Several user friendly description have also adopted. This package
shall prove to be a powerful package in satisfying all the
requirements of the organization.
The objective of software planning is to provide a frame work that
enables the manger to make reasonable estimates made within a
limited time frame at the beginning of the software project and should
be updated regularly as the project progresses. Last but not least it is
no the work that played the ways to success but ALMIGHTY Allah.
From a proper analysis of positive points and constraints on
the component, it can be safely concluded that the product is a highly
efficient GUI based component. This application is working properly
and meeting to all user requirements. This component can be easily
plugged in many other systems.
92
Conclusion
93

Weitere ähnliche Inhalte

Was ist angesagt?

Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Totan Banik
 
Library Management System SRS
Library Management System SRSLibrary Management System SRS
Library Management System SRSParas
 
Library and member management system (lamms) by vikas sharma
Library and member management system (lamms) by vikas sharmaLibrary and member management system (lamms) by vikas sharma
Library and member management system (lamms) by vikas sharmaVikas Sharma
 
Library management
Library managementLibrary management
Library managementakki_hearts
 
Final Presentation on Online Library Management
Final Presentation on Online Library ManagementFinal Presentation on Online Library Management
Final Presentation on Online Library ManagementSneha Yadav
 
Library Management System
Library Management SystemLibrary Management System
Library Management SystemPankaj Kumar
 
Library management system
Library management systemLibrary management system
Library management systemwethecodershelp
 
Abstract of Library Management System
Abstract of Library Management SystemAbstract of Library Management System
Abstract of Library Management SystemMd Mudassir
 
Library Management System
Library Management SystemLibrary Management System
Library Management SystemAnit Thapaliya
 
Library Management System.powerpoint.pptx
Library Management System.powerpoint.pptxLibrary Management System.powerpoint.pptx
Library Management System.powerpoint.pptxKaiumShuvo1
 
Online library managment thesis by bilal khattak
Online library managment thesis by bilal khattakOnline library managment thesis by bilal khattak
Online library managment thesis by bilal khattakBilal Khattak
 
Presentation LIBRARY MANAGEMENT SYSTEM
Presentation LIBRARY MANAGEMENT SYSTEM Presentation LIBRARY MANAGEMENT SYSTEM
Presentation LIBRARY MANAGEMENT SYSTEM binrehmat
 
System requirement specification report(srs) T/TN/Gomarankadawala Maha vidyal...
System requirement specification report(srs) T/TN/Gomarankadawala Maha vidyal...System requirement specification report(srs) T/TN/Gomarankadawala Maha vidyal...
System requirement specification report(srs) T/TN/Gomarankadawala Maha vidyal...Ravindu Sandeepa
 
Library Management System
Library Management SystemLibrary Management System
Library Management SystemCHINMAYA BHOI
 
Library management system se project
Library management system se projectLibrary management system se project
Library management system se projectREHMATQADEER
 
Library management system
Library management systemLibrary management system
Library management systemParesh Gosavi
 
Library management system
Library management systemLibrary management system
Library management systemKhushboo Taneja
 
Dlis007 library automation
Dlis007 library automationDlis007 library automation
Dlis007 library automationsaniul rahaman
 

Was ist angesagt? (20)

Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)
 
Library Management System SRS
Library Management System SRSLibrary Management System SRS
Library Management System SRS
 
Library and member management system (lamms) by vikas sharma
Library and member management system (lamms) by vikas sharmaLibrary and member management system (lamms) by vikas sharma
Library and member management system (lamms) by vikas sharma
 
Library management
Library managementLibrary management
Library management
 
Final Presentation on Online Library Management
Final Presentation on Online Library ManagementFinal Presentation on Online Library Management
Final Presentation on Online Library Management
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Library management system
Library management systemLibrary management system
Library management system
 
Koha presentation
Koha presentationKoha presentation
Koha presentation
 
Abstract of Library Management System
Abstract of Library Management SystemAbstract of Library Management System
Abstract of Library Management System
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Library Management System.powerpoint.pptx
Library Management System.powerpoint.pptxLibrary Management System.powerpoint.pptx
Library Management System.powerpoint.pptx
 
Online library managment thesis by bilal khattak
Online library managment thesis by bilal khattakOnline library managment thesis by bilal khattak
Online library managment thesis by bilal khattak
 
Presentation LIBRARY MANAGEMENT SYSTEM
Presentation LIBRARY MANAGEMENT SYSTEM Presentation LIBRARY MANAGEMENT SYSTEM
Presentation LIBRARY MANAGEMENT SYSTEM
 
System requirement specification report(srs) T/TN/Gomarankadawala Maha vidyal...
System requirement specification report(srs) T/TN/Gomarankadawala Maha vidyal...System requirement specification report(srs) T/TN/Gomarankadawala Maha vidyal...
System requirement specification report(srs) T/TN/Gomarankadawala Maha vidyal...
 
SRS of Library Circulation System
SRS of Library Circulation SystemSRS of Library Circulation System
SRS of Library Circulation System
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Library management system se project
Library management system se projectLibrary management system se project
Library management system se project
 
Library management system
Library management systemLibrary management system
Library management system
 
Library management system
Library management systemLibrary management system
Library management system
 
Dlis007 library automation
Dlis007 library automationDlis007 library automation
Dlis007 library automation
 

Andere mochten auch

Control Pc Via Bluetooth Enable Mobile
Control Pc Via Bluetooth Enable MobileControl Pc Via Bluetooth Enable Mobile
Control Pc Via Bluetooth Enable MobileSamiul Hoque
 
جدران الحماية
جدران الحمايةجدران الحماية
جدران الحمايةalimashi
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone pptLaxman Puri
 
Project Managing An Implementation Of A Library Management System
Project Managing An Implementation Of A Library Management SystemProject Managing An Implementation Of A Library Management System
Project Managing An Implementation Of A Library Management Systemianbays
 
17337071 srs-library-management-system
17337071 srs-library-management-system17337071 srs-library-management-system
17337071 srs-library-management-systemANAS NAIN
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Network security ppt
Network security pptNetwork security ppt
Network security pptshashi712
 
Object Oriented Analysis and Design with UML2 part2
Object Oriented Analysis and Design with UML2 part2Object Oriented Analysis and Design with UML2 part2
Object Oriented Analysis and Design with UML2 part2Haitham Raik
 
Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Dinesh Jogdand
 

Andere mochten auch (20)

Remote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile PhoneRemote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile Phone
 
Semantic web
Semantic webSemantic web
Semantic web
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
Control Pc Via Bluetooth Enable Mobile
Control Pc Via Bluetooth Enable MobileControl Pc Via Bluetooth Enable Mobile
Control Pc Via Bluetooth Enable Mobile
 
جدران الحماية
جدران الحمايةجدران الحماية
جدران الحماية
 
Firewall
FirewallFirewall
Firewall
 
Mobile commerce 2
Mobile commerce 2Mobile commerce 2
Mobile commerce 2
 
Spmp
SpmpSpmp
Spmp
 
Topologies
TopologiesTopologies
Topologies
 
Spmp updated checked 29
Spmp updated checked 29Spmp updated checked 29
Spmp updated checked 29
 
4G
4G4G
4G
 
OSI layers
OSI layersOSI layers
OSI layers
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
 
Project Managing An Implementation Of A Library Management System
Project Managing An Implementation Of A Library Management SystemProject Managing An Implementation Of A Library Management System
Project Managing An Implementation Of A Library Management System
 
17337071 srs-library-management-system
17337071 srs-library-management-system17337071 srs-library-management-system
17337071 srs-library-management-system
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Object Oriented Analysis and Design with UML2 part2
Object Oriented Analysis and Design with UML2 part2Object Oriented Analysis and Design with UML2 part2
Object Oriented Analysis and Design with UML2 part2
 
Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)
 

Ähnlich wie Object-oriented analysis and design

Library Management System Waterfall Model
Library Management System Waterfall ModelLibrary Management System Waterfall Model
Library Management System Waterfall Modelmitwa1990
 
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Emmanuel E C
 
E library management system
E library management systemE library management system
E library management systemVibhuThakur3
 
11.project online library management system
11.project online library management system11.project online library management system
11.project online library management systemmonika ahalawat
 
11.project online library management system
11.project online library management system11.project online library management system
11.project online library management systemricharamgarh
 
JAMES RESEARCH PRESENTATION .pptx
JAMES RESEARCH PRESENTATION .pptxJAMES RESEARCH PRESENTATION .pptx
JAMES RESEARCH PRESENTATION .pptxjameskilonzo1
 
Online Library Management
Online Library ManagementOnline Library Management
Online Library ManagementVarsha Sarkar
 
11 Project-Online Library Management System
11 Project-Online Library Management System11 Project-Online Library Management System
11 Project-Online Library Management SystemHeather Strinden
 
Integrated library management system
Integrated library management systemIntegrated library management system
Integrated library management systemdrningappaarabagonda
 
MGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxMGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxRbalasubramani
 
MGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxMGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxlisbala
 
FINGERPRINT BASED STUDENT IDENTIFICATION WITH RFID BASED LIBRARY AUTOMATION
 FINGERPRINT BASED STUDENT IDENTIFICATION WITH RFID BASED LIBRARY AUTOMATION FINGERPRINT BASED STUDENT IDENTIFICATION WITH RFID BASED LIBRARY AUTOMATION
FINGERPRINT BASED STUDENT IDENTIFICATION WITH RFID BASED LIBRARY AUTOMATIONAppu S
 
Integration and Filtering: Creating visibility across library resources using...
Integration and Filtering: Creating visibility across library resources using...Integration and Filtering: Creating visibility across library resources using...
Integration and Filtering: Creating visibility across library resources using...Emmanuel E C
 
Creating visibilitythroughngl final
Creating visibilitythroughngl finalCreating visibilitythroughngl final
Creating visibilitythroughngl finalEmmanuel E C
 
UKSG webinar - TERMS revisited: developing the combination of electronic reso...
UKSG webinar - TERMS revisited: developing the combination of electronic reso...UKSG webinar - TERMS revisited: developing the combination of electronic reso...
UKSG webinar - TERMS revisited: developing the combination of electronic reso...UKSG: connecting the knowledge community
 
UKSG 2018 Breakout - TERMS redefined: developing the combination of electroni...
UKSG 2018 Breakout - TERMS redefined: developing the combination of electroni...UKSG 2018 Breakout - TERMS redefined: developing the combination of electroni...
UKSG 2018 Breakout - TERMS redefined: developing the combination of electroni...UKSG: connecting the knowledge community
 

Ähnlich wie Object-oriented analysis and design (20)

Library Management System Waterfall Model
Library Management System Waterfall ModelLibrary Management System Waterfall Model
Library Management System Waterfall Model
 
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
 
E library management system
E library management systemE library management system
E library management system
 
E-library mangament system
E-library mangament systemE-library mangament system
E-library mangament system
 
11.project online library management system
11.project online library management system11.project online library management system
11.project online library management system
 
11.project online library management system
11.project online library management system11.project online library management system
11.project online library management system
 
JAMES RESEARCH PRESENTATION .pptx
JAMES RESEARCH PRESENTATION .pptxJAMES RESEARCH PRESENTATION .pptx
JAMES RESEARCH PRESENTATION .pptx
 
ishrat fatimadefense.ppt
ishrat fatimadefense.pptishrat fatimadefense.ppt
ishrat fatimadefense.ppt
 
Online Library Management
Online Library ManagementOnline Library Management
Online Library Management
 
ilp on koha.pptx
ilp on koha.pptxilp on koha.pptx
ilp on koha.pptx
 
11 Project-Online Library Management System
11 Project-Online Library Management System11 Project-Online Library Management System
11 Project-Online Library Management System
 
Integrated library management system
Integrated library management systemIntegrated library management system
Integrated library management system
 
MGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxMGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptx
 
MGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxMGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptx
 
FINGERPRINT BASED STUDENT IDENTIFICATION WITH RFID BASED LIBRARY AUTOMATION
 FINGERPRINT BASED STUDENT IDENTIFICATION WITH RFID BASED LIBRARY AUTOMATION FINGERPRINT BASED STUDENT IDENTIFICATION WITH RFID BASED LIBRARY AUTOMATION
FINGERPRINT BASED STUDENT IDENTIFICATION WITH RFID BASED LIBRARY AUTOMATION
 
Integration and Filtering: Creating visibility across library resources using...
Integration and Filtering: Creating visibility across library resources using...Integration and Filtering: Creating visibility across library resources using...
Integration and Filtering: Creating visibility across library resources using...
 
Creating visibilitythroughngl final
Creating visibilitythroughngl finalCreating visibilitythroughngl final
Creating visibilitythroughngl final
 
srno-2,3,16,18,21.pptx
srno-2,3,16,18,21.pptxsrno-2,3,16,18,21.pptx
srno-2,3,16,18,21.pptx
 
UKSG webinar - TERMS revisited: developing the combination of electronic reso...
UKSG webinar - TERMS revisited: developing the combination of electronic reso...UKSG webinar - TERMS revisited: developing the combination of electronic reso...
UKSG webinar - TERMS revisited: developing the combination of electronic reso...
 
UKSG 2018 Breakout - TERMS redefined: developing the combination of electroni...
UKSG 2018 Breakout - TERMS redefined: developing the combination of electroni...UKSG 2018 Breakout - TERMS redefined: developing the combination of electroni...
UKSG 2018 Breakout - TERMS redefined: developing the combination of electroni...
 

Kürzlich hochgeladen

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Kürzlich hochgeladen (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Object-oriented analysis and design

  • 1. KETABY Library Management System Presented by: Ahmed Atef Elnaggar Amr Darwish Ibrahim Supervisor: Prof. Ahmed M. Elfatatry 1
  • 2. Contents • How did we start? • Why do we choose library? (An example of the actual) • Who are we within the project? • How is the project going? (Applying PRINC2) • Revision history. • Purpose and audiences • Over all Library description – Inception phase – Requirements gathering – Feasibility study – Drawbacks of present system – Domain analysis – User categories and their characteristics – Functional ,Non-functional and technical requirements 2
  • 3. 3 Contents – User documentation – The estimate cost LOC (line of code) / Priority and risk • Business activities (Main and Sub.) • Business process workflow • Use case diagrams and their descriptions • User Interfaces • Collaboration diagrams • Class diagrams • State diagrams • Unit testing – Integration testing – System testing • Conclusion
  • 4. How did we start? • First we were hesitated about many projects – Attendance system – Hyper market system – Library management system • Finally we decided to go ahead with library management system. We met together many times and divided the work between us and sent Eng. Shimaa a formal email about our project. 4
  • 5. 5 We decided to use some application like: 1- M.S. Office 2010 2- Software Ideas Modeler 6.10 3- Smart draw 2010 3- Adobe Reader XI
  • 6. Why do we choose a library? "Books to the ceiling, Books to the sky, My pile of books is a mile high. How I love them! How I need them! I'll have a long beard by the time I read them." By Arnold Lobel 6
  • 7. Why do we choose library? • Library is regarded as the brain of any institute and universities; many institutes understand the importance of the library to the growth of the institute and their esteem users. LMS supports the general requirement of the library. • Library management system offers many flexible and convenient features, allowing librarians and library users to maximize time and efficiency. It will track on the how many books available in library and books issued to the members. 7
  • 8. 8
  • 9. Who are we within the project? • We are students who registered for OOAD course • Or imagine a virtual scenario that we are working for IT company which is applying PRINCE2 standard. • May be PMP or CMMI or ITIL. • Any way PRINCE2 (Projects IN Controlled Environment) which is a de facto process-based method for effective project management. • Used extensively by the UK Government, PRINCE2 is also widely recognized and used in the private sector, both in the UK and internationally. • The key features of PRINCE2 are a: – focus on business justification – defined organization structure for the project management team – product-based planning approach – emphasis on dividing the project into manageable and controllable stages – flexibility that can be applied at a level appropriate to the project. 9
  • 10. 10 How is the project going? (Applying PRINC2)
  • 11. 11 Revision history Date D/M/Y version Description 1/4/2013 1.0 Library management sys. 1/5/2013 2.0 Library management sys.
  • 12. DAVe Desirable Achieve Viable Must be available at all the time and stand to Executive manager. • Improved customer service through greater access to accurate info. • Increased productivity and job satisfaction among staff members as it eliminates duplication of effort. • More economical and safer means of storing and keeping track of information. • Easier access to Information like management reports and stock etc., as well as more accurate and faster results from statistical analyses. • Reduces errors and eliminating the ennui of long and repetitive manual processing. • Greater accountability and transparency in operations. • Improved efficiency and effectiveness in administration and management as it has unprecedented access to real-time information. • More reliable security for sensitive and confidential information. • Appropriate knowledge-based action and intervention can now take place in a timelier manner. 12
  • 13. 13 Purpose This document describes the software requirements and specification (SRS) for LMS software. The document is intended for the customers and the developer (designers, testers, maintainers). The reader is assumed to have basic knowledge of LMS. Knowledge and understanding of Unified Modeling Language (UML) diagrams is also required. Intended Audience The intended audience consists of: Software Project Managers Software Engineers Software Developers Library Organizers Project Scope LMS is essentially meant of collections, It is a multi-user version and can take care of all the fundamental functions of a Library like Cataloguing, Circulation, Accessioning and Housekeeping. It can satisfactorily cater to all the basic functions of a small library.
  • 14. 14 Overall Description (Brief) Modern Libraries are not made up of just books but CD ROM’s, articles, project reports. bound volumes are substantial part of the holding, managing the holdings manually is a not a simple job. There are few solutions but many a times, we find ourselves “making them works” by finding “ways to work around” system inadequacies. Moreover we have limited staff resources. these “work around” waste time, effort, and skills that should be sent on user services. Many solutions do not keep up with the technological changes and hence prove to be time wasters. Library management system is a small footprints software suitable for personal /individual libraries. You can store the information about the books and other material and control the movement of the same. Silent Features • Control the movement of books and other material and avoid loosing the same. • Search if you have a specific book in your collection based on the title. author etc. • Print the spine labels for the book, • Find what a specific person has borrowed from you. It offers the following modules Cataloguing, Circulation, Queries
  • 15. 15 Cataloguing - Salient Features You can create a catalogue of your books, CDs, maps, drawings and all similar collections using this module. It supports various classification schemes like DDC, DD, and CC etc. The cataloguing module is based on AACR2 (Anglo American cataloguing rule Circulation) Circulation Module deals with issue and return of material from the library. It is a barcode & and smart card enabled system and hence the issue and return of material is handled uniformly. You can issue member cards and also do the transactions.
  • 16. Inception phase • We have been asked to build a computer based library system that will handle the bookkeeping aspects of a library and provide user browsing facilities. • The first thing to do is to go and find out about the target library or libraries to see what they do now and what they would like to be able to do. • We get the following data: 16
  • 17. Library description • Books and Journals. The library contains both books and journals. It may have several copies of the same book. Some of the books are for short term loans only. All other books may be borrowed by any library member for 3 weeks. After the selected day, they have to pay the fine per day (ten pounds). If the student lost the book he has to purchase the same book and submit to the library. Only members of staff may borrow journals. Members of the library can normally borrow up to 6 items at a time, but members of staff may borrow up to 12 items at a time. New articles arrive regularly and sometime disposed of the catalogue needs to be updated. The current year’s journals are sent away to be bound at the end of each year. • Borrowing. It is essential that the sys. keeps track of when books and journals are borrowed & returned. The new system should produce reminders when a book is overdue. It may be desirable to allow users to extend their loans if the book is not reserved. The system enforces the rules for borrowing given above. • Browsing: The sys. should allow users to search for a book on a particular topic or by an author or by the ISBN. The user should then be able to check if the book is on loan and if so to reserve the book. Requirements gathering 17
  • 19. Some of the problems being faced in manual system are as follows: 1. Fast report generation is not possible. 2. Tracing a book is difficult. 3. Information about issue/return of the books are not properly maintained. 4. No central database can be created as information is not available in database. 19 Drawbacks of present system
  • 20. • This whole process in manually, we need to develop the fully automatic library that enables the user to search for the relevant book and they can also who have which book. • We need to computers in the library so that user can access to online books. • We need to bar code scanner, so the user just scans the code and the book will be issued. • The PCs used in the library must be connected to each other. • The system should be accessed from outside over the internet. • The user needs to enter his roll no and the details of the book. • We can also add new feature of member ship in the library in the starting of the year, then they can become the member and they will be issued the role number to run this software. 20 Domain analysis
  • 21. • To start the design of the system it is useful to decide on a set of use-cases and use-cases involve actors so who are a suitable set of actors? • One way of choosing Actors is to read the description of what the system does and see what external people or systems are mentioned: Members/Patrons Administrator Librarians Guests Browsers User category 21
  • 22. • Administrator Enough computer knowledge and experience. • Librarians and their assistances Skilled at library daily operation. No much prior computer knowledge. • Members/Patrons and guests Current students and staffs have basic computer knowledge. User characteristics 22
  • 24. The Librarian 1. Add Article (Add books and their information of the books to the database) 2. Update Article (Edit the information of the existing books or mark as missing) 3. Delete Article (Wrong entry must be removed from system) 4. Inquiry Members (For enrolled members to view their details, check and print) 5. Inquiry Issuance (For all database articles to check and print) 6. Check out Article (borrow operation) 7. Check In article (return operation) 8. Inquiry waiting for approvals (Generate newly application to be in waiting list) 9. Reserve Article (Booking a book with the name of librarian, it can be pledged) Member 1. Authentication (own an account in the library before accessing system) 2. Search Article (view basic info. of book and its status) 3. Request Article (After successful searching ,can create or cancel booking) 4. Renew or Extension of a borrowed article 5. Check Account (View the history of books issued to him previously) Functional requirements 24
  • 25. Assistance librarian or librarian :Prepare Library database. Administrator: 1. Add/delete a librarian. 2. Change the password of a librarian. 3. Add/delete a Member. System: 1. Send an email to member when due date comes. 2. Send an email to member when due date passed. 3. Calculate the penalty. Data base system: Proposed Database is intended to store, retrieve, update, and manipulate information related to library which include 1. All basic data related to the article stored in & books availability. 2. The borrow /return long for all action (depends on article). 3. The IDs & password for all the user (Staff information-Members details). 4. Determining level of user & maximum items which he can borrow. 5. Calculation of fines Guest :Register (Full fill all application form for registration, Record his contacts). Functional requirements 25
  • 26. • Safety Requirements The database may get crashed at any certain time due to virus or operating system failure. Therefore backup is required. • Security Requirements Log in required because depending upon the category of user the access rights are decided. For example if the user is an administrator then he can be able to modify the data, delete, append etc. • Availability Requirements The system should be accessible to members through a website at all time. • Performance Requirements the web site searching engine system should response reasonably. The search time should be less than 5 seconds. The system should not make any mistake on the borrow/return action. • Software Quality Attributes The database should be user friendly. Non-functional requirements 26
  • 27. • Hardware Constraints The system requires a database in order to store persistent data. The database should have backup capabilities. • Culture, political and religion requirement There are some anticipated category of articles doesn’t suites the Egyptian society. • Software Constraints The development of the system will be constrained by the availability of required software such as database and development tools. • Design Constraints The system must be designed to allow web usability. That is, the system must be designed in such a way that will be easy to use and visible on most of the browsers. Non-functional requirements 27
  • 28. • Assumptions and Dependencies ,The product needs following third party (Microsoft SQL server to store the database. – Visual studio& IIS to develop Product.) • Hardware requirement : - Server side: -Client side: • Windows Processor: Pentium 4.0 GHz Pentium III or 2.0 GHz • Hard Drive: 80 GB or more 40 GB or more • RAM: 1 GB or higher 1 GB or higher – bar code scanner • Software requirement &Operating Environment – OS: Window 7 and supported for other platform such as Applet, Mac and UNIX. – Product is developed using ASP (Active Server Pages). – Most of the features will be compatible with the Mozilla Firefox, Opera and IE. – MS SQL server 2008 • Communications Interfaces – The Customer must connect to the Internet to access the Website. – Connection between computers inside library via LAN at the speed of 10MBps. – Dialup Modem of 56 kbps, Broadband connection with a Internet Provider. • Web Server: IIS (Internet Information Services is a powerful Web server that provides a highly reliable, manageable, and scalable Web app. infrastructure) 28 Technical(Build) requirements Supplementary requirements
  • 29. ASP.NET is a Microsoft technology where you will have to purchase the development environment which is Visual Studio. There are many advantages that I have seen in ASP.NET 1. Ease of development where the burden of coding for large or huge web applications reduces while using this language. 2. Master Pages to Improve Efficiency 3. You got your source with You where the web application can be made in different languages as this technology is language independent. 4. Building the application with ASP.net is safe and secure because of windows inbuilt authentication. 5. The web pages written with this language can be easily maintained as the source code and HTML are together for this technology. 6. You get what you pay for 29 Why ASP.NET?
  • 30. • This application can be easily implemented under various situations. We can add new features as and when we require. • Reusability is possible as and when require in this application. • There is flexibility in all the modules. • There will be no online help for the product at this moment. • A database of library will include magazines, microfilm, videos, audios, online sessions. • Allows patrons to search the database of library assets by date of publication, publisher or subject. 30 Future features requirements
  • 31. • LMS should handle every day to day library problems and its GUI let the library management personal work very easily. With the help of multi-window opening person can do multiple task in same time. • The product will include user manual. • The user manual will include product overview, complete configuration of the used software (such as SQL server),technical details, backup procedure and contact information which will include email address. • The product will be compatible with the Internet Explorer 8.0 or higher. The data bases will be created in the Microsoft SQL server 2008 31 User Documentation
  • 32. The estimate effort and cost 32 There are many considerations to estimate cost project like: • LOC(Line Of Code)approach One of the most effective direct measurements for software size is a count of the number of lines of source code that have been implemented. The time and effort involved in implementing a software programs linearly related to the software size in lines of code. • Advantages • Disadvantages. -LOC is a direct measure of S.W size. -LOC is easily counted. -Counting can be easily automated -Simplicity of categorizing code into reusable, new, changed, and reused -Lack of agreement on standards of S.W industry. -LOC counts vary with language. -Difficulty in visualizing LOC early in development. -The same automatic counter may not work for all programming styles in the same language. -A Line of Code is a strange term to most clients. -Some calculated statistics using LOC can be misleading Reference Considerations in Project Cost Estimation Prepared by Randall Colville July 2008
  • 33. Function Estimated LOC Library user functions 800 Librarian functions 700 Administrator functions 900 Web site and related functions 1000 Library date base 1000 Integration 800 Software interface for Librarian 700 Software interface for administrator 700 Estimate total line of code 6.600 33 LOC(Line Of Code)approach • Quick Facts: development tools: C# Code ,Asp Code ,SQL Project Development Length: 30 days
  • 34. 34 Given that – Average productivity for systems of this type =1,000 LOC/person-months – Burdened labor rate = 5,000 L.E per month Then – the cost per line of code = 1,000/5,000 = 5 L.E per line – estimated project cost = 6,600*5 = 33,000 L.E – Estimated effort = 66,000/1,000 = 6.6 person-months LOC(Line Of Code)approach
  • 35. 35 The estimate priority& Risk • Each possible requirement is described in a few short sentences. • Additional information is provided for each requirement to indicate its estimated cost of development, the risk involved and its priority to the success of the system as a whole
  • 36. 36 Given that – Burdened labor rate = 5,000 L.E per month – Number of working hours = 22days *8hours = 176 Hrs. Then – the cost of working hour = 5,000 L.E / 176 Hrs. = 28.5 L.E per hour – estimated project cost = 28.5 * 970 = 27,645 L.E – Estimated effort = 970 / 176 = 5.5 person-months Candidate requirements Prior. Hrs. Risk Maintains a database of library assets include books and journals. High 100 Low Allows librarian to add assets to the library database. High 10 Med Allows librarian to lend library assets to patrons. High 30 Med Allows librarian to set the length of time to overdue. High 30 Med Maintains a database of library patron accounts. High 80 Allows librarian to access patron account information. High 30 Med Automates the process of assigning fines to patrons when overdue. High 60 Med Allows librarian to generate a mailing of overdue notices. High 120 Med Allows patrons to search the database of library assets by title, author or ISBN. High 80 Med Allows patrons to determine whether an article is available. High 10 Med Allows remote library system to search the asset database. Med 120 High Allow patrons access to all functionality from a remote site via a web site. Med 300 High Total cost per hours 970
  • 37. • Secured database. • User tracking • Search feature • Calculating fines • Asset tracking. • Rules and penalties 37 Business activities
  • 38. Expedite onsite search /borrow /return /book sys. Handling online search / hold /send system Frequent updating back-end database system Main &Sub Business activities Log in Search articles Book article Cancel Booking Search articles Book article Cancel Booking Log in Check in articles Check out articles Delete article Updating article Add article IDs & Password of Users Info. of articles 38 Send email
  • 40. 40 Business process no 1 Activity name Add asset to database Brief description Using to maintain an asset database records Frequency of execution Every time have a new asset Business actors Admin, Librarian Scalability Able to scalable when adding new categories to database Criticality high Notes Scalability very soon Other non-functional requirement Performance ,speed replay and accuracy Exceptions Primary path Scan library card Authorize account Scan asset Enter asset type Enter book inf. Set due date Add to asset D.B Alternatives Enter account by K.B Enter asset by K.B Enter journal info Add asset to database activity
  • 42. 42 Business process no 2 Activity name Issue library card Brief description Using to issue a library card for every user and add record to database account Frequency of execution When doing any change in database like check in or out or reserve asset Business actors Admin, Librarian Scalability -- Criticality high Notes Admin issues for librarian but librarian issues for patron Other non-functional Requirement Should to be accurate Exceptions Primary path 1-Scan un issued library card 2-Enter patron information 3-Create account record Alternatives Issue library card activity
  • 43. 43 Business process no 3 Activity name Access account info. Brief description Used to verify ,authorize user account Frequency of execution Every time have to login Business actors Admin, Librarian Scalability Able to scalable when adding new librarian or member Criticality high Notes Should to be secure Other non-functional requirement Security and accuracy Exceptions Primary path Scan library card Access account in D.B Display account info. Alternatives Enter account by K.B Access account info. activity
  • 45. 45 Business process no 4 Activity name Check in asset Brief description Using when asset return back to library Frequency of execution Business actors Librarian Scalability Criticality Mid Notes Should remove any mark with related asset Other non-functional requirement Speed and accuracy Exceptions Primary path Scan asset Check account balance No Unpaid fine Remove asset from patron's account + Mark asset as checked in Alternatives Enter asset by K.B unpaid overdue fine Display notice of overdue fine Check in asset activity
  • 47. 47 Business process no 5 Activity name Check out or reserve asset Brief description Using when asset return back to library Frequency of execution Business actors Librarian Scalability Criticality Mid Notes Should remove any mark with related asset Other non-functional requirement Speed and accuracy Exceptions Primary path Scan library card Authorize account Check account balance No Unpaid fine Scan asset Add asset to patron's account+Mark asset as checked Alternatives Enter account by k.B Unpaid overdue fine Pay overdue fine Reserve asset Check out or reserve asset activity
  • 49. 49 Business process no 6 Activity name Delete asset from D.B Brief description Using when asset lost or removed from D.B Frequency of Execution Business actors Librarian Scalability Criticality Mid Notes Should remove any mark with related asset Other non-functional requirement Accuracy Exceptions Primary path Scan library card Authorize account Scan asset Asset not checked out Delete from asset database Alternatives Enter account by K.B Enter asset by K.B asset checked out Remove asset from patron account Delete asset from D.B activity
  • 51. 51 Business process no 8 Activity name Pay overdue Brief description Using when asset lost or removed from D.B Frequency of Execution Business actors Librarian Scalability Criticality Mid Notes Should remove any mark with related member Other non-functional requirement Security and accuracy Exceptions Primary path Scan library card Authorize account Check account balance unpaid overdue fine Credit account Alternatives Enter account by K.B No unpaid fine Pay overdue activity
  • 52. It is clear that the physical objects from the previous section • the member, books, library are correspond to entities • In the Entity-Relationship model, and the operations to be done on those entities • Holds, checkouts, and so on correspond to relationships. • However, a good analysis will minimize redundancy and attempt to store all the required information in as small a space as possible. • Optimize business processes before automating them. • Make activities parallel if possible • Delete unnecessary activities • Combine steps 52 Business process workflow
  • 56. 56 Use case Description 1 Use case number:1 Use case name: issue library card Goal: Create library card Brief description Add library card for new member to use it in for check out and check in books Actors: admin Frequency of execution When you need Scalability High Criticality Important Post conditions: Update accounts database Other non-functional requirements Use case number:2 Use case name: delete asset Goal: Delete asset Brief description Admin can delete asset from database Actors: admin Frequency of execution If necessary Scalability High criticality important Post conditions: Update assets database Other non-functional requirements
  • 57. 57 Use case Description 2 Use case number:3 Use case name: add asset Goal: Add asset Brief description Add asset to database to check in or check out Actors: Admin., librarian Frequency of execution When needed Scalability High Criticality important Post conditions: Update assets database Other non-functional requirements Use case number:4 Use case name: generate asset report Goal: Generate report Brief description Generate report to get information about asset Actors: Admin., librarian Frequency of execution When needed Scalability Medium criticality important Post conditions: Update assets database Other non-functional requirements
  • 59. 59 Use case Description 3 Use case number:5 Use case name: search asset Goal: Search asset Brief description Search asset by name or author to determine which book to borrow Actors: member Frequency of execution When needed Scalability High Criticality important preconditions: Valid card Other non-functional requirements Use case number:6 Use case name: access account information Goal: Access account information Brief description Get information about member and overdue fines Actors: member Frequency of execution When needed Scalability High criticality important preconditions: Valid card Other non-functional requirements
  • 61. 61 Use case Description 4 Use case number:8 Use case name: check in asset Goal: check in asset Brief description Librarian check in asset which will update account database Actors: Librarian Frequency of execution daily Scalability High Criticality important Post conditions: Update asset database Update account database Other non-functional requirements Use case number:7 Use case name: check out asset Goal: check out asset Brief description Librarian check out asset for member which will update account database Actors: Librarian Frequency of execution daily Scalability High Criticality important preconditions: Pay overdue fines Post conditions Update account database Update asset database Other non-functional requirements
  • 63. 63 Use case Description 5 Use case number:9 Use case name: generate overdue notice Goal: generate overdue notice Brief description Librarian get information for overdue notice for member Actors: Librarian Frequency of execution when needed Scalability High Criticality important Post conditions Access account information Other non-functional requirements Use case number:10 Use case name: pay overdue notice Goal: Pay overdue notice Brief description Librarian pay overdue fine for member Actors: Librarian Frequency of execution when needed Scalability High Criticality important Post conditions Update account database Other non-functional requirements
  • 81. Another powerful way to model systems is in terms of their states and the transitions between states. A simple example for the class issue book is: The diagram shows how the state of book availability changes as a result of borrowing and returning of copies of the book. 81 State Diagrams
  • 84. • Test of subprograms. • Choose 3 subprograms as the test points. • Cover most frequently used functions. • Black box testing – Equivalence testing – Boundary testing 84 Unit testing
  • 85. • Feature :Search books • Testing content 85 Unit test :case 1 Equivalence classes Selected value inputs Book title only Software engineering Author only Roger S. Pressman Subject only Software development ISBN only 007-123840-9 Two search criteria with “and” relation (book title + author) Software engineering+ Roger S. Pressman Two search criteria with “or" relation (book title/author) Software engineering / Roger S. Pressman More search criteria with “and” relation (book title + author + subject) Software engineering +Roger S. Pressman + Software development More search criteria with “or” relation (book title /author / subject) Software engineering / Roger S. Pressman / Software development
  • 86. • Feature :Check out assets • Testing content 86 Unit test :case 2 Equivalence classes Value for student ID Value for book number Patron ID without fine book type 1 Patron ID with fine under the limitation book type 1 Patron ID with fine over the limitation Book type 1 Patron ID without fine book type 2 Patron ID with fine under the limitation book type 2 Patron ID with fine over the limitation Book type 2
  • 87. • Feature :Check in assets • Testing content 87 Unit test :case 3 Equivalence classes Selected value inputs Book of type 1 within due Book of type 1 overdue Book of type 2 within due Book of type 2 overdue
  • 88. • Big bang method • Proposed test cases – Find books vs. Request – Request vs. Pick up requested book – Check out vs. Online renew • Regression testing at unit level 88 Integration testing
  • 89. • The purpose of the system testing is to consider all the likely variations to which it will be suggested and push the systems to limits. • The testing process focuses on the logical intervals of the software ensuring that all statements have been tested and on functional interval is conducting tests to uncover errors and ensure that defined input will produce actual results that agree with the required results. • Program level testing, modules level testing integrated and carried out. • Proposed test cases (Non-functional requirements) • The response time of the system(performance) • The volume of the system (performance) • The login procedure of the system (security) 89 System testing
  • 90. • Is the menu bar displayed in the appropriate contested some system related features included either in menus or tools? • Do pull –Down menu operation and tool-bars work properly? • Are all menu function and pull down sub function properly listed • Is it possible to invoke each menu function using a logical assumptions that if all parts of the system are correct, the goal will be successfully achieved .? • In adequate testing or non-testing will leads – to errors that may appear few months later. – This create two problem 1. Time delay between the cause and appearance of the problem. 2. The effect of the system errors on files and records within the system 90 Software testing
  • 91. • There are two major type of testing they are (White Box Testing, Black Box Testing). • White Box Testing – White box some times called “Glass box testing” is a test case design uses the control structure of the procedural design to drive test case. – Using white box testing methods, the following tests where made on the system • All independent paths within a module have been exercised once. In our system, ensuring that case was selected and executed checked all case structures. The bugs that were prevailing in some part of the code where fixed • All logical decisions were checked for the truth and falsity of the values. • Black box Testing – Black box testing focuses on the functional requirements of the software. – This is black box testing enables the software engineering to derive a set of input conditions that will fully exercise all functional requirements for a program. • Black box testing is not an alternative to white box testing rather it is complementary approach that is likely to uncover a different • Class of errors that white box methods like.. 1) Interface errors 2) Performance in data structure 3) Performance errors 4) Initializing and termination errors 91 White &Black Box Testing
  • 92. Our project is only a humble venture to satisfy the needs in a library. Several user friendly description have also adopted. This package shall prove to be a powerful package in satisfying all the requirements of the organization. The objective of software planning is to provide a frame work that enables the manger to make reasonable estimates made within a limited time frame at the beginning of the software project and should be updated regularly as the project progresses. Last but not least it is no the work that played the ways to success but ALMIGHTY Allah. From a proper analysis of positive points and constraints on the component, it can be safely concluded that the product is a highly efficient GUI based component. This application is working properly and meeting to all user requirements. This component can be easily plugged in many other systems. 92 Conclusion
  • 93. 93