ITS332 SRS Library Management System
ITS332 SRS Library Management System
ITS332 SRS Library Management System
SPECIFICATION
GROUP MEMBERS:
1) Siti Sabariah binti Draman @ Hashim [2017872896]
2) Siti Aisyah Humairah Binti Che Mohd Yusri [2017241576]
3) Nur Aina Amirah Binti Mohd Yusof [2017693718]
4) Norhidayah Mohd Jaafar [2017294832]
5 MAY 2019
Table of Contents
1. Fact Finding Techniques 3
1.1 Questionnaires/Sampling/Interview/Document Review 3
1.2 Business Case/Rules 4
1.3 Summary of findings 6
1.4 SWOT analysis / Intangible benefits & Tangible benefits 7
2. Storyboard 8
2.1 Storyboard Diagram + Narrative 8
2.2 Storyboard Sketches + Narrative 10
3. Data Modeling 13
3.1 Normalization of ERD + Narrative 13
3.2 Entity Relationship Diagram + Narrative 14
3.3 Data Dictionary 15
Documenting the Processes 15
Documenting the Entities 16
Documenting the Data Flows 17
4. System Specification 25
4.1 Module/Function + narrative 25
4.2 Purpose of Module / Function 25
4.2.1 Lists of Input Data 25
4.2.2 Processes involved 26
4.2.3 Lists of Output Data 26
4.3 User Characteristics 27
4.4 Safety and Security 28
Software Requirement Specifications
The method used to collect requirements for the information system is the
interview. We’ve conducted the interview with the library staffs of UiTM Cawangan
Terengganu Kampus Kuala Terengganu. Here’s the documentation resulting from the
conducted method:
By developing our library management system, this system will solve the
problems which affecting the library system by:
1. Keep and store information of user, books, transaction and staff in more efficient and
effective way.
2. Cutting time taken for the librarian to retrieve specific data from 1 week to 10 minutes.
3. Automatically generate specific report required by the librarian for only around 5
minutes.
This project roughly costs RM 4264. Here we include the budget table:
TOTAL RM 4264
This system will take about 4 months to develop. Here we attach our Gantt chart:
Even Though the previous system doesn’t involve electricity, internet, software and
server to complete the task, doesn’t need proper training and workshop for the new staff to do the
related job, and there’s more job opportunity with this system, the whole system is inefficient
that will only cause so many loss of resources and took a lot of time for a single task which
results loss of productivity.
The excessive use of papers also can lead to inefficiency as it is hard to retrieve data
recorded in the paper. And a single task can take more than one people to complete. And the time
taken to calculate fine manually is higher.
From the fact finding, the previous system needs to be upgraded by implementing a new
system which can solve their problems by:
1. Keep and store information of user, books, transaction and staff in more efficient and
effective way.
2. Cutting time taken for the librarian to retrieve specific data from 1 week to 10 minutes.
3. Automatically generate specific report required by the librarian for only around 5
minutes.
In conclusion, the system that we want to develop will help the library management to
achieve the productivity, reduce the paper usage and to cut time taken to do a single task.
1.4 SWOT analysis / Intangible benefits & Tangible benefits
STRENGTH WEAKNESS
● Easy to use the system even without ● Need constant maintenance
proper workshop training ● Takes time to implement the system
● 10 times faster than manual system ● More expensive than the manual
● Reduce paper usage system
● Easier to retrieve data and information ● Highly dependent on the electricity
of books, transaction member profile. and the internet server
OPPORTUNITY THREAT
● The system can be expand the scope ● Staff and user preference on using the
and function if needed in the future system that they used to
● Can be implemented to other library ● Competition with other system
and modified based on their system developer.
requirement
Member
1. Login into the system.
2. If the id and password correct, it’ll accepted but if the id and password incorrect, it’ll
rejected.
3. After the login accepted, the member will choose the option given that is request,
borrowing/checkout details, checkout and return statement and fine detail.
4. If they choose request, they’ll given the option either to update profile or search book.
5. If the member request to update profile, they will update their data information and send it to
the system. Then it’ll viewed the updated profile details.
6. If the member request to search book, they’ll search the book title as they want and then it’ll
show up the searched book detail.
7. After searched book detail show up, the member will give the option either want to reserve
book or not. If they choose yes to reserve the book, they requested to fill all the confirmation
details.
8. For the member who chooses for borrowing/checkout detail, they have to fill all the
information needed and for those who choose checkout and return confirmation, they also have to
fill all the information needed include return date.
9. Last choices are fine detail. If they choose this option, they’ll get the number of exceed due
days and the total payment that they need to pay.
Librarian
1. Login into the system.
2. If the id and password correct, it’ll accepted but if the id and password incorrect, it’ll
rejected.
3. Then the librarian will given the request to generate report.
4. After finish the report will generated to the librarian.
2.2 Storyboard Sketches + Narrative
MEMBER
1. Login into the system.
2. If the id and password correct, it’ll accepted but if the id and password incorrect, it’ll
rejected.
3. After the login accepted, the member will choose the option given that is request,
borrowing/checkout details, checkout and return statement and fine detail.
4. If they choose request, they’ll given the option either to update profile or search book.
5. If the member request to update profile, they will update their data information and send it to
the system. Then it’ll viewed the updated profile details.
6. If the member request to search book, they’ll search the book title as they want and then it’ll
show up the searched book detail.
7. After searched book detail show up, the member will give the option either want to reserve
book or not. If they choose yes to reserve the book, they requested to fill all the confirmation
details. If not they can go home or log out.
8. For the member who chooses for borrowing/checkout detail, they have to fill all the
information needed and for those who choose checkout and return confirmation, they also have to
fill all the information needed include return date.
9. Last choices are fine detail. If they choose this option, they’ll get the number of exceed due
days and the total payment that they need to pay. Then they were given the option either to go
home or log out.
10. Logout.
EXPLAIN
1NF
LIBRARY (M_ID, M_pass, M_name, Lib_ID, Lib_name, Lib_pass, B_ISBN, B_title,
B_availability, B_noCopies, B_shelfNo, Trans_ID,
Trans_dueDate, Trans_retDate)
2NF
MEMBER (M_ID, M_pass, M_name)
LIBRARIAN (Lib_ID, Lib_pass, Lib_name, Trans_ID, Trans_dueDate, Trans_retDate, B_ISBN,
B_title, B_availability, B_noCopies, B_shelfNo)
3NF
MEMBER (M_ID, M_pass, M_name)
LIBRARIAN (Lib_ID, Lib_pass, Lib_name, Trans_ID, B_ISBN)
BOOK (B_ISBN, B_title, B_availabity, B_noCopies, B_shelfNo)
TRANSACTION (Trans_ID, Trans_dueDate, Trans_retDate)
Above shown normalization is did step by step based on the stages. In first normal form,
there are some attributes that are included such as member id, member password, member name,
librarian id, librarian name, librarian password, book ISBN, book title, book availability, number
of book, book’s shelf number, transaction id, transaction due date and transaction return date.
In second normal form, the partial dependencies are defined and the attributes are in
specific entity but there is still have transitive dependencies such as book ISBN, book title, book
availability, number of book, book’s shelf number, transaction id, transaction date, transaction
due date and transaction return date.
In this normal form which is third normal form, there is no dependencies. New entities
such as book and transaction are defined to keep the attributes in their entity and normalize it as
simple as can.
3.2 Entity Relationship Diagram + Narrative
Process Number : 1
Process Name / Label : Verify Login
Process Description : To verify the ID and password given by member
and librarian
Process Number : 2
Process Name / Label : View profile and status
Process Description : To view profile and status to member
Process Number : 3
Process Name / Label : Update profile
Process Description : To update member profile and status
Process Number : 4
Process Name / Label : Search book
Process Description : To search book via online
Process Number : 5
Process Name / Label : Reserve book
Process Description : To reserve book that booked by member
Process Number : 6
Process Name / Label : Check reservation book
Process Description : To check reservation book by member
Process Number : 7
Process Name / Label : Checkout and Return
Process Description : To checkout and return book by member
Process Number : 8
Process Name / Label : Archive checkout list and member list
Process Description : To archive checkout list and member list from data
store MEMBER.
Process Number : 9
Process Name / Label : Calculate fine
Process Description : To calculate fine for each member
Process Number : 10
Process Name / Label : Generate report
Process Description : To generate report for librarian
This system has two users which are members and librarian. As we know, the library need
librarian to help user on borrowing and returning book which means the librarian frequently use
the system to key-in information of members and book. They also need to update the current
availability of book to ease members on keep updated of the book. The members only borrowing
and returning book through librarian who are using the system. Basically, the librarian know better
and more experience on the system compare to members because they always use it every single
time when the members want to deal at library.
For members, they have to tell the librarian about their personal information details such
as name and id number to keep it into the system for current use. After that, they are allowed to
search the book or any reading material for their study or task. It’s up to members if they want to
borrow the book and they have to deal it with the librarian there. Same situation if they want to
return the book at library.
Librarian who are in the library always know about the flow of the book and the library.
As usually, librarian need to manage every members who want to borrow or return the book by
key-in members information into the system.
4.4 Safety and Security
The server and desktop computer will have its own security to prevent an intruder
from modifying the hardware configuration of a server, damaging the equipment or
removing a disk drive. Server racks should be locked to avoid the unauthorized
placement and retrieval of keystroke loggers.
The portable computer are tempting targets for thieves and industrial spies. So, we
need to select an operating system that allows secure logons, BIOS-level passwords and
strong firewall protection. Then, we also can mark or engrave the computer’s case with
the computer name and address or attach a tamper-proof asset ID tag.
Other than that, wireless network security is a vital concern because wireless
transmission is much more vulnerable than traffic on a wired network. Example, Wi-Fi
Protected Access (WPA), which offered major security improvements. The most recent
wireless security enhancement, called WPA2, further strengthens the level of wireless
protection.