Title: design and realization of the information system for library data management
Abstract
Application of the current rapid development of computer technology, the formation of library management system. With the computer and network technology, rapid development, Internet / Intranet applications in the growing worldwide popularity of today's society is rapidly advancing to the information society, the role of information has become increasingly automated. So that our affairs from the complex to liberate and improve our work efficiency. The system of work for the library management features, design the login interface, library management, user management, and on the systematic introduction of 4 sub-systems. Using this system, managers can get out of the original hand-book management work, through the computer to complete the main business of library management to improve the efficiency of library management, library management to make more modern and scientific. This paper is divided into five parts: Part I: Introduction expounds the significance of the topic papers and research papers and organizations. Part II: Demand analysis is mainly explained the feasibility study and needs analysis. Part III: the general design of the system mainly discusses the architecture of the system to determine which modules the program. Part IV: System specific implementation (detailed design) the detailed design of each module to determine the functionality required to implement the module algorithms and data structures. Part V: System Test: The test and debug the software appropriate to achieve the desired requirements. After three months of this thesis, the development, from system analysis - outline design - detailed design - system implementation to run, completed the "lending management system" books and information management, information management readers, library operations, but also books operation, the query processing requirements. Can be applied to the school and community library management
Keywords:MIS; Database; security; permission
Paper Type: Software Development