Escolar Documentos
Profissional Documentos
Cultura Documentos
RFID is one of the automatic identification or auto ID systems like bar codes, smart
cards, and voice recognition etc., used to help machines identify objects. This technology is
often coupled with automatic data capture systems to identify objects and capture information
and transfer them into computer without data entry. Naturally, the aim of these systems is to
increase efficiency and reduce data entry. RFID has been around for long time with many
literatures published on it. This article is just a little extract of those, and hopes to give a high
level overview of the RFID technology, its characteristics, its applications, and its relevance
to Windows CE world. It is a generic term for technologies that use radio waves to
automatically identify people or objects.
Recently the use of RFID tags to track books, videotapes, CD-ROMs and other library
collection, components has risen in popularity. Libraries are finding that RFID technology
holds many advantages over traditional barcodes and antitheft tags and contributes to realize
considerable labor and cost savings. “The task of receiving, transporting, sorting and shelving
materials has exploded in recent years. Library staff size remains constant at best while
circulation and materials management continues to grow.
RFID provides a solution to automate much of these handling and return staff to the
business of customer service.”
1
1.1 Need of RFID In Library Management
RFID is used in Library Management for providing security to it. Various transactions
on book can be done by using Barcode also, but then there wouldn’t be any security. It
provides security to both student and book by assigning RFID tag to it.
Various transactions such as issue return book can be done at faster rate when RFID is
used. RFID provides various anti-collision algorithms that can reduce the reading error when
multiple books come into contact with the reader.
RFID provides security to the complete system since only librarian can access the
database and has the authority of looking at book inventory and transactions. So, no one else
other than librarian can access the database.
Hence RFID is required to be implemented into the Library Management for securing it
by using anti theft detection algorithms.
3
A unique advantage of RFID systems is their ability to scan books on the shelves
without tipping them out or removing them to access the barcodes. A hand-held inventory
reader can be moved rapidly across a shelf of books at a distance of approximately six inches
to read all of the unique identification information. Using wireless technology, it is possible
not only to update the inventory, but also to identify items which are out of proper order.
4
There is no line of sight or no wired connection required between the tag and the
reader.Data is read by the reader using radio frequency waves captured by antenna of reader
and transmitted from the antenna of tag.
1. Here RFID tag is used for books, students and the librarian.
2. When a book is issued / returned having RFID tag, reader reads the tag information and
database is updated automatically
3. While issuing book, Reader of RFID reads the information from book RFID tag. And
searches the relevant information regarding book in the database with library book
issue rules.
4. While returning of book, date of return is checked with the date on which he is supposed
to return in the database of student. If he has delayed then he has to pay fine as per
allotted. The fine paid by him is entered into the database by librarian.
5. Here RFID Reader is used to provide security, it provides facility to display message on
mobile phone if return date exceed & it also provide facility to student to access book
database in the campus of library.
6. Whenever librarian wants to log-in he /she will have to use his/her RFID card. Log-in and
Log-out details are automatically stored into the log database.
5
7. Searching of any student, book can be done very easily either by using his/her card, book
card respectively. And in case student want to search for book then he can do it by
entering any of the following fields i.e. book card no., author name, book name etc.
8. Student can also check the books issued by him, and his limit of issuing them, book return
date by simply scanning his card.
“To implement Library Management Using RFID”. This system should provide
security to the library. Along with that it should also provide many facilities such as fast
searching of books/members, fast transactions etc. that makes the working of system efficient.
Library system provides many facilities for student, staff and other members for that
purpose we use RFID technique for issuing, renewing, updating database and provide
security. Here RFID tag is used for books and student when a book is issued / returned having
RFID tag reader reads the tag information and database is updated automatically.
RFID reader is used for reading RFID tag which is attached to book. To provide
security in library from thefting of book for that purpose we display message on screen that is
‘Book is misplaced’ and also student can access book database on any pc in library campus.
Chapter 1: Introduction
6
issues and objective of area is seen.
Study of previous systems that were used for managing library and how the current
Current system requires some hardware and software for its working.Here
platform required for running the application and structure of team is stated.
In this chapter cost of the project is estimated.For this COCOMO i.e. Constructive
Cost Model.It estimates cost in terms of lines of code , Number of team members and time
required for development of project.
Here, schedule of the project is mentioned. This schedule is divided into semesters.
We have used GP-20 RFID reader for our poject.It gives 20 cm reading range that
7
is sufficient for library purpose. There are other readers also there in the market that provides
large range but cost is high.
This system follows Object Oriented Approach.So, this chapter shows various
UML Diagrams such as Use Case, Class ,State Chart etc. .Entity Relationship(E-R) Diagram
specifies the relationships between various users(entities).
Chapter 9: Modeling
It shows the various types of testing done on the system. It includes test cases for
each Module.
It concludes that the current system is better from the previous and the traditional
8
Systems. But it is very much expensive.
9
CHAPTER 2
PREFACE
In this the complete survey of the existing system is done.What are the advantages in
using the and why there is a need for its replacement with the new technology is studied.
We have studied two systems-traditional manual system and the system using barcode.
In traditional systems, everything was done by the human being. For complete
management of library it requires a great manpower. Since transactions are done manually in
this system ,there are more possibilities of errors. Here librarian had the responsibility of
maintaining book inventory database ,one more person was required to maintain the database
of issue/return of book ,then accountant was required for fin calculation and collection etc.
10
2.1.2 Limitation
• It may happen that many student comes at the same time for either issuing or returning
the book, then collision may occur. Hence database may have some invalid entries into
the database.
• If there is a great crowd ,then any member can take the book out of the library without the
permission of librarian.
• Members have to wait for a long time for issuing /returning the book.
• Librarian’s more time is wasted in performing transactions only. He can’t think about
library enhancement , increasing facilities etc.
• Sometimes it may happen that the member searches the book and requests librarian for its
issue. Librarian searches for his record into the database and then gets that member can’t
issue more books. Hence wastage of member’s and librarian time.
This book_id is captured by the barcode reader and is decoded into the format that
computer can understand. When this number is scanned by the librarian at the check-out, it is
11
transmitted to the computer which finds the record associated with that book_id in the data
base.
The matching book record contains a description of the book, vendor name, price etc.
The computer instantly does an "availability" check and displays the result. It also subtracts
the quantity issued by the student. This entire transaction is done instantly. In a nutshell, a bar
code typically has ID data encoded in it, and that data is used by computer to look up all
specific information associated with the data.
• Barcodes are universally accepted because they are very inexpensive and there are
• Barcode scanner scans only nearest barcode number. It has very short reading range.
• It does not provide any security like RFID Scanner. Book can be taken out of library when
there is a crowd. It does not support Anti theft detection algorithms and Anti Collision
Algorithms.
• The need for the bar code to be visible. Since it required lines of sight.
• [1]
Around 10% reading error. At the time of reading barcode, barcode reader can not scan
barcode properly. Since it gives error.
12
• Tags encrypt data, along with an unalterable unique identification number .
• Tags provide permanent identification for the life of the product.
• RFID tags for library items would be disabled after check-out.
• Library databases are highly secure.
• It’s too hard to use this information anyway.
CHAPTER 3
13
• Reading tag
The reader sends a radio signal that is received by all tags present in the RF field
tuned to that frequency. Tags receive the signal via their antennas and respond by
transmitting their stored data. The tag holds a book_id. The read/write device receives the tag
signal via its antenna, decodes it and transfers the data to the computer system through a cable
or wireless connection.
• Search
Book_id is searched into the computer and matched with the record. If book_id
matches with the record then it displays the output as “available”.
• Display
Computer displays the list of available books on screen. it also displays whether a
member can issue more books or not. It shows the number of days delayed, issue/return date
from the database.
• Security
• Automation
14
CHAPTER 4
PREFACE
In this chapter project estimation is done on the basis of man power, lines of code, size
of development. This is required for computing the total cost of the project during planning
and deployment phase. For computing the LOC various models are being used such as
COCOMO model
Effective software project estimation is one of the challenging and important activity
in software development. Proper project planning and control is not possible without sound
and reliable estimate.
• Estimate the size of development product .The units of measure are Lines of Code (LOC).
In this amount of work, resources and the time required to complete the project is
estimated. The metrics estimated will invariably change as time progress. This exercise will
help us to suitably distribute and allocate the work task equally among the members based on
the time line and way time allows.
4.2 Resources
The resources that would be utilized the project life cycle are:
15
Human Resources : The project team is comprised of 4(four) members.
Officially, the project is allotted 6 hours per week (h/w) over a period of roughly 8
months. Thus the available time period is:
= 33 man-months
(@17 man-hours/month)
Constructive cost model is one of the most widely used and discussed software cost
estimation model. Our project is COCOMO model.the basic cocomo model complete
software development effort and cost as function of program size expressed in estimated line
of code.
a b c d
Software project b b b b
Automated checking and result generation is software that is developed within a set of
tight hardware and software constraint. The basic cocomo model takes following equation:
Effort = a bKLOC b b
Duration = cbEffort d b
COMPUTATION
16
Function Estimated LOC
Module 1 600
Module 2 350
Module 3 430
Module 4 410
Module 5 210
Module 6 300
Module 7 350
Module 8 350
Effort =3.0*(3.0^1.12)
=10.26 person-month
Duration =2.5*(10.26^0.35)
= 5.64 months
= 10.26/5.64
= ~ 3 people
The average productivity for our product is: 600 LOC/per month
17
Thus the cost per line of code is: approximately Rs.11
18
CHAPTER 5
PROJECT PLANNING
PREFACE
Planning is the initial phase required for development of the project.It includes the
schedule that which task should start at what time and finish at what time.Schedule is
prepared as per the months in the project duration.
Design
Development
Testing
CHAPTER 6
RISK ANALYSIS
Customer characteristics risks are associated with the sophistication of the customer
i.e. it includes the GUI, whether it is user friendly and guides the user in an efficient manner
and also the developer’s ability to communicate with the customer in a timely manner.
Development environment risks are associated with the availability and quality of
tools to be used to build the product
6.4 Risk Mitigation, Monitoring And Management (RMMM) Plan
Risk Mitigation, Monitoring and Management mean risk avoidance. Avoidance is the
best strategy by adapting the proactive strategy to risk. The project manager should monitor
i.e. keep a check on the project to see whether the risk is becoming more likely or not. Risk
management comes into play when the mitigation efforts have failed and the risk has become
a reality.
Risk #1
Sophistication of the end user’s application program
Mitigation - Develop a front end that is both user friendly and covers all needs.
Monitor - Test the application with novice, expert and intermediate users.
Management - Customer should be notified about the limitations and the scope of the API.
Risk #2
Delay in completion of modules due to member being sick.
Mitigation - Keep work of all members documented.
Monitor - Review is made between members and ideas, thought, plans are discussed in
meetings.
22
Management - Shift one or more members to sick member’s module.
Risk #3
Schedule might slip due to inexperience
Mitigation - The planned schedule should be followed strictly.
Monitor - Check whether work is going according to time.
Management - Add more members to the project or increase the working hours of already
working people.
Risk #4
Resources might prove insufficient
Mitigation - Gather all the resources that are required and check whether they are feasible.
Monitor - Check at any point of time whether the resources allocated are less and whether
more resources will be required.
Management - Increase the fund that is allocated to the resources or try and adjust with the
existing resources.
6.5 Hardware
These can also be used instead of the GP-20 and proximity passive tags. But due to
high cost they are not used.
GP 20 : This is the reader that provides reading range upto 20cm range.It receives the radio
waves transmitted by the antenna of the tags. It stores this information into the database.
RFID tags : It stores the unique number.
CHAPTER 7
DETAILED DESIGN
PREFACE
23
In Design phase actually modules are designed using the software.In this GUI is given
the first importance.It should include all the modules that satisfies the user requirements.This
is the only thing through which user interacts with the system.
7.7.1 Sructural
7.7.2 Object oriented
Diagrams have been drawn in Unified Modeling Language using Rational Rose
Software. These diagrams have been classified under following 5 fields:
3) Behavior View : It includes the sequence diagram, the collaboration diagram, the
24
Figure 7.1: Use-case Diagram
25
Figure 7.2: Class Diagram
26
Figure 7.3: Package Diagram
27
Figure 7.4: Activity Diagram
28
Scenario
When member enters into the library, his/her I-card information is captured by reader and
is matched with the database server. If server validates it, then member enter book-id into the
system. System will search into database for its availability. If it is available then it checks
that whether user can issue more books or not. If yes then member can issue it else leaves
from library.
Scenario
29
When member enters into the library, his/her I-card information is captured by reader
and is matched with the database server .Member will return the book to librarian. Librarian
will check the database and if delayed then he/she pays fine and leaves from library or can do
more transaction.
30
Figure 7.7: Collaboration Diagram for issuing book
31
Figure 7.8: Collaboration Diagram for returning book
32
Figure 7.9: State Chart Diagram
33
Figure 7.10: Component Diagram
34
Figure 7.11: Deployment Diagram
In this E-R diagram we have used four entities such as Magazine, CD, Accession
register and member, which contains information about student and staff. Transaction is
considered as a aggregation relationship, as all entities have transactions.
36
7.4.1 Borrower Database
In this table it stores all the information of borrower i.e. borrower id, First name,
Middle name, Last name, Street address, Zip code ,Email, contact no.etc. using this
information you can perform issue/return transaction easily.
In this table store all the information about the books i.e. Book ID, ISBN no.,
Author, Book Title, Price, Quantity etc. This information is used at the of
issuing/returning book, searching book.
37
Table 7.14 : Book Database
In this table stored the information about borrowed records such as Book no.,
Borrower ID, Date borrowed, Due date, Return date, Fines , Added date etc. At the
time of returning book all the information is stored in this table automatically.
38
7.4.4 Category Database
In this table stored information about the which types of books are available in the
library such as Category name, Category Description Added by, Add date etc.
when student issue the book then choose the category of book from this table.
In this table store the information about courses such as Course name, Course
description, Added by, Add date etc. when librarian enter the borrower information
at that time librarian choose the course information from this table.
39
7.4.6 Level Database
This table store level of student such as Level name, Added by, Date adds etc.
This table stores the information about the librarian such as Librarian ID, Name,
Street Address, Zip code, Contact number, Email, Username, Password, IP
Address etc. when librarian login into the system at that time it check the
password, username and IP address with this stored information.
When librarian login into the system then Librarian ID, login time, logout time all
are stored in this table.
CHAPTER 8
REVIEW OF DESIGN
Design phase includes that how the system is drawn, which approach does it follows
and how the database is organized.
8.1 Approach
41
This project follows the Object Oriented Approach. System is represented by using
structural and behavioural diagrams. Structural diagrams are class, component, deployment,
package. Behavioural diagrams includes use case, state , activity.
Structural diagrams shows the structure of the system and behavioural diagrams
indicates that how the system flow will occur.
The complete system flow is shown by using use case diagram.Various classes in
class diagram represents the total entities. State chart diagram implies the different states from
which an object passes.
This show the relationship between entities.It represents that how the entities work
into the system and how they are interrelated.Relationship can either be one-to-one,one-to-
many or many-to-one or none.
Entities require several fields for their description.These include keys such as
primary ,foreign keys.
In this system CD, Member, Magazine and Accession Register are entities.
Database is required for storage of information, transactions etc. Here for this
purpose MS-Access is being used. Various databases such as borrower, book issue/return etc
are developed.
CHAPTER 9
MODELLING
The first step is to assign the tags to the books, members and the librarian.
Tag contains the unique identity number.
42
When member enters the library, he/she searches the book at the helpdesk. For
searching he must know either the name or author of the book. He retrieves the information
that whether the book is available into the library or not.
If he wants to issue the book and if the book is available then he takes the book
and issues it with the help of the librarian. For issuing it, it is checked that whether his book
issue limit is not already maximum. If it is so, then he first will have to return the book.
If the book is delayed then on the last date a SMS is sent on to the member’s
phone that he should return the book today else he will have to pay the fine.
If the book is already delayed then automatically fine is calculated on his name
and whenever he returns the book, he has to pay fine.
For any kind of announcement, an e-mail can also be sent to the member by the
librarian.
9.2 Algorithms
Step 2:He searches for the book by entering the book name or author.
Step3:If it is present then he checks for the book limit.If limit is not exceeded then he
issues the book else he have to return any of the previously issued book.
Step4:If return date exceeds then SMS is sent.For due date he will have to pay fine.
Step 3:Librarian checks the due date.If due is there,then member pays fine.
43
Step 4: He returns the book and leaves the library.
• C#.NET 2.0 : This is used for front end i.e. for GUI.
9.4 Hardware
RFID Reader GP-20 :It reads the information from the tag using radio 9.2 frequency
9.5 Modules
1. Login
This module has been designed for authentication of administrator. He will enter the
password and if password is correct then he will be considered as an administrator. His
login time is also maintained into the database.
Functions:
• Check username ()
• Check password ()
• Check IP address ()
2. Borrower
This module has been design for displaying all the information of library members i.e.
Personal, academic, issue or return record etc.
Functions:
• Search record ()
• Update record ()
• Reload record ()
• Display record ()
44
3. Books
It stores all the information about book. Those books that are newly purchased are
given the unique accession no. and are then entered into the database. And database is
updated.
Functions:
• Add book ()
• Delete book ()
• Search book ()
• Update book record ()
• Display book info ()
45
Whenever any book is return, then that book’s entry is made in this database and then
updates the record of library member and then takes fine if not return within time
period.
Functions:
• Search record ()
• Calculate fine ()
• Update record ()
7. SMS module
This module is used to send sms to library member if returning date is close and if any
fine.
Functions:
• Search member ()
• Send sms ()
8. Search module
In this module search the member info, zip code, book info or many other information.
It shows the different prototypes designed into the system and the graphical User
Interface.
46
Figure 9.1: Login Screen
47
Figure 9. 3: Books Records Form
48
Figure 9. 4: Borrower-info Form
49
Figure 9. 5: Issue Book-info Form
50
Figure 9. 6: Return Book-info Form
51
`Figure 9.7: SMS Form
52
Figure 9.8: Librarian info Form
53
Figure 9.3.9: Library Profile
54
CHAPTER 10
MODELLING REVIEW
Algorithms are used for the anti collision and anti theft detection. Anti collision
algorithms avoids collision when multiple tags come into contact at the same time.
Anti theft detection algorithms provides security to the system.If any book is taken out
of the library without issuing it then these algorithms helps to detect it.
Software is used for user interface and storage purpose.For GUI C#.NET is used since it
has many functionalities such as crystal reports , list view that gives a great interaction to the
use with the system.For storage purpose MS Access 2007 is used. It provides advanced
networking functionalities.
Hardware is required for provideng the required environment to the system for
execution.This system uses RFID reader GP 20 for scanning the tag and retrieving the
information from the tag. Passive tags are used for storing information.
Prototypes are designed for user interface.They are designed in C#.NET and stores the
information in MS ACCESS.These helps user to understand that what exactly he is
doing.These includes the complete information that is required by him.
CHAPTER 11
55
TESTING
PREFACE
Testing is the phase that starts from the requirement and gathering phase and
continues till deployment phase.First testing is the unit testing that is done on a single
module.Various other testing are integration,black and white box.Testing is required for
checking correctness,completeness and quality of software.Debug is used for checking of
bugs,defects.It increases the quality of the product.
In doing these Formal Technical Reviews, all the project members were in the review
team.
We had worked for around 10 hours each week for the project excluding the studies
we made for it. In these hours the formal reviews were also done. In these Formal technical
reviews there are some procedures we had followed. As per the routine of the we met twice a
week. The components being reviewed at each meeting.
As per the progress we presented the work done by each and chose the best. We work
on with it till all the requirements are met. Then we tested the component for each and every
requirement. After the testing we took decision whether to consider it or discard it. But time
we amended it and made the component better. But when there are more failures then success
then we discarded with and started it all over again.
Each time reviews decisions and suggestions were documented. This test report is a
part of all the documentation done during the reviews and decisions.
11.2.1 Introduction
56
Human –computer interaction currently faces the challenge of tacking advantage of
new technologies, which efficiently use the capabilities of the computing systems of today
and more efficiently complete user requirement. We identify that how RFID Reader is useful
in library system. This paper consists of a survey of RFID Reader and Tag. There is no doubt
that this software is going to be the way of the future. RFID Reader and Tag improve the
library system perform some operation atomic. RFID Reader is replaced by old Barcode
Scanner because RFID Reader is moer efficient and easily handle.
At the development site first we performed Unit Testing.This is done on each module
individually.
After that Black Box Testing. Black box testing there is no need to view coding part. It
focuses on functional requirement of the software. In block box we give the input & check
whether output is proper or not.
After Black box testing we test modules using Regression testing. In Regression testing
we test whether changed component has introduced any error in unchanged component.
Regression testing focuses on retesting after changes are made.
After Black box testing we conduct system testing. It has to be tested against the system
specification to check it delivers the required features. It verifies the entire project after
integrating all software & hardware component and validates it according to original project
requirements.
White box testing is performed regularly whenever their was any exception or error in
output obtained from the above testing. During this we tested the code against the
requirements.
57
Sr.No Test Cases Expected Result Actual result
Login Module
2 Enter the incorrect MDI form should be MDI form is not open
username , password open
and IP address then
click connect
Borrower Record
Books Record
2 Enter book no. and User enter id and User can’t enter they
borrower ID number only scan
58
of selected student
SMS module
Search
59
CHAPTER 12
CONCLUSION
60
RFID is one of the automatic identification or auto ID systems like bar codes, smart
cards, and voice recognition etc., used to help machines identify objects. This technology is
often coupled with automatic data capture systems to identify objects and capture information
and transfer them into computer without data entry. Naturally, the aim of these systems is to
increase efficiency and reduce data entry. RFID has been around for long time with many
literatures published on it. This article is just a little extract of those, and hopes to give a high
level overview of the RFID technology, its characteristics, its applications, and its relevance
to Windows CE world. It is a generic term for technologies that use radio waves to
automatically identify people or objects.
REFERENCES
[1] AtlasRFIDSolution.com/RFID-vs-barcode.asp
[3] Christian Nagel, Bill Evjen, Jay Glynn, Karli Watson, Morgan Skinner,” C# 2005 with
[4] Patrick Dalton, Paul Whitehead, Kogent Solutions Inc “SQL Server 2005” 2007Edition
[5] Abraham Silberschatz, Henry F. Korth, S. Sudarshan “Database System Concept” Fifth
Edition
62