An Approved Proposal of Automated Library System Utilizing Barcode Technology

Only available on StudyMode
  • Topic: Dewey Decimal Classification, Library classification, Password
  • Pages : 5 (1205 words )
  • Download(s) : 462
  • Published : October 22, 2011
Open Document
Text Preview

Name of the Proponents: Galano, Kariz Reinalyn B.
Lazaro, Don Ricardo C.
Sebastian, Rozmaigne Ann L.
Viesca, Kevin Patrick E.

School Year/Trimester:2011-2012/Second Trimester

Proposed System Title:Automated Library System in AMA Computer Learning Center (ACLC) Las Piñas Utilizing Barcode Technology

Area of Investigation:
AMA Computer Learning Center Las Piñas, was formerly known as AMA Telecommunication Learning Center or AMATEL. It was established on June, 1996 located in the heart of Las Piñas in front of SM Southmall under the management of Mr. and Mrs. Eduardo S. Aguirre Jr. After four years AMATEL was then changed to ACLC under the order of AMA Group of Companies.

At present ACLC has three hundred sixty five students enrolled. The institution is currently using a manual system in their Library and has weak security. Students can borrow books but need to return it within 5 school days. There is no proper monitoring on books being returned. There are no penalties imposed to the students as well. The only way the librarian will find out if there are still pending books not returned is during the end of semester at the inventory period. The librarian then will not sign the clearance of the students who failed to return the books. Another problem is the list of inventory of books. The students need to go and ask for the librarian’s assistance in order for them to search for the books.

The advantage of Library automation is to improve the quality, speed and effectiveness of services. For the Barcode technology and LAN concept it ensures total integrity of collected data.

The proposed system will consists of the following modules:

Registration and Verification
This module is for the librarian to easily monitor the old/new students and faculty member’s identity. This registration contains their personal information such as name, student/employee number, email address, course and address. If the system detects that the user has an existing account, the librarian validate their accounts to use continuously.

This module helps the Librarian to register newly acquired books. He/She must input the book code, book title, book author, and book type or category.

The proponents assure the security of the system by setting two (2) types of user account. The first type is the Administrator which is the librarian, and the second type of user account is the Borrower which the teachers and students who wants to borrow books from the library.

The Administrator account have the full access of all the modules, he/she can edit and update the information in the system while the Borrower account can only access the Registration/ Verification, Borrowing/ Returning, Search, and Payments Module.

The users are required to input their uniquely desired username and password, and choose the level of access. Username and Password must be eight to twelve (8 to12) characters long and is case-sensitive.

In case the user fails to enter his/her password three (3) times, a “forgot password” option is available in order to retrieve the password through entering their username, the system will provide the retrieved password to their respective email addresses.

It will also provide the audit trail feature that contains records of login/logout, whether it is successful or not. It saves as a log file with the information when the user enters his / her username and password.

Borrowing and Returning
This module will allow students and teachers to borrow and return book. In order to borrow a book, the system will require the borrower’s information which will be encoded by the librarian. Another requirement is the book number, title of book, and book author which will be obtained by scanning the barcode of the book. Borrowed books...
tracking img