Library Management System Using RFID Technology: Sree Lakshmi Addepalli Sree Gowri Addepalli
Library Management System Using RFID Technology: Sree Lakshmi Addepalli Sree Gowri Addepalli
Library Management System Using RFID Technology: Sree Lakshmi Addepalli Sree Gowri Addepalli
Abstract —Radio frequency identification (RFID) is a rapidly One step is to decide on which kind of RFID reader and tag
emerging technology which allows productivity and is used for library automation. The importance of reader are
convenience. Radio Frequency Identification (RFID) is a new what kind of tag it reads, its operating frequency,
generation of Auto Identification and Data collection capability of near reading, writing inside the tag ,
technology which helps to automate business processes and
allows identification of large number of tagged objects like
connection type with computer The reader has two main
books, using radio waves. This paper proposes RFID Based functions: the first is to transmit a carrier signal, and the
Library Management System that would allow fast second is to receive a response from any tags in proximity
transaction flow and will make it easy to handle the issue and of the reader. A tag needs to receive the carrier signal,
return of books from the library without much intervention of modify it in some way corresponding to the data on the
manual book keeping which benefits by adding properties of card, and retransmit the modified response back to the
traceability and security. The proposed system is based on reader.
RFID readers and passive RFID tags that are able to Further, tags which are located in book are binding with the
electronically store information that can be read with the help specific Id. In modern passive RFID devices; the tag
of the RFID reader. This system would be able to issue and
return books via RFID tags and also calculates the
consists of a small integrated circuit and an antenna. The
corresponding fine associated with the time period of the benefit of passive RFID is that it requires no internal power
absence of the book from the library database. source; the circuit on the tag is actually powered by the
carrier signal. Thus, the carrier signal transmitted from the
Keywords—radio frequency identification(RFID), RFID tags, reader must be considerably large so that the response can
Matlab , MySQL, Android. be read even from the card.
In practical applications of using RFID technology, a tag
I. INTRODUCTION is attached to an object used to identify the target, when the
target object pass through the area that the reader can read,
Radio-Frequency Identification (RFID) devices have the tag and the reader builds up the radio signal connections,
importance in our daily life and they will become appearing the tag sends its information to the reader, such as unique
in the near future. There is a tremendous growth in the code and other data stored on, the reader receives those
industry to use RFID technology in the recent years. information and decodes them, and then sends to a host
Research and development in this field has made this computer so as to complete the whole information
technology to be used in supply chain management, processing.
attendance management, library management, automated
toll collection etc. RFID is an electronic technology II. SYSTEM DESIGN
whereby digital data encoded in an RFID tag is retrieved
utilizing a reader. In contrast to bar code technology, RFID A. Concept
systems do not require line-of-sight access to the tag in Each book would be uniquely identified via the RFID tags
order to retrieve the tag’s data. Passive RFID is sure to attached to it and communication would be done wirelessly.
replace bar codes in library applications. The bar-code An RFID sensor would be placed near the library desk
system used in libraries is very time consuming and labor wherein one should only place the book near the sensor and
intensive. it would get reissued/issued/returned depending on the
The RFID based LMS facilitates the fast issuing, reissuing actions required. Moreover information regarding the asset
and returning of books with the help of RFID enabled i.e. book can be gained by both the authority and students
modules. It directly provides the book information and remotely instead of the traditional way of manually
library member information to the library management searching the book. This would save a lot of time and enable
system and does not need the manual typing. The RFID tag efficient queue management. As actions on these tagged
assets are being recorded, data can be usefully exploited as
can contain identifying information which is unique, such
per librarian's need. Hence, it is tracking books within a
as a book's title or code, without having to be pointed to a
limited transmission range.
separate database. The information is read by an RFID
reader, which replaces the standard barcode reader
commonly found at a library's circulation desk.
www.ijcsit.com 6932
Sree Lakshmi Addepalli et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 6932-6935
B. Components a magnetic field. The tag draws power from it, energizing
the circuits in the tag. The tag then sends the information
The system consists of following components: encoded in the tag's memory. The tag is typically much
less expensive to manufacture. All tags have unique
• RFID READER: It communicates with the tags through identification number (15 characters long) which is quite
an RF channel to obtain identifying information. useful and these tags can be re-used.
Depending on the type of tag, this communication may
be a simple ping or maybe a more complex multi-round One set of library tags are attached within the Library
protocol. In environments with many tags, a reader may cards of the books and details of books can be accessed
have to perform an anti-collision protocol to ensure that and actions like Issue/Re-Issue can be done in the library
communication conflicts don’t occur. Anti-collision interface after the tags are scanned.
protocols permit readers to rapidly communicate with Other set of tags are used as Library identity cards of
many tags in serial order. student to get the details of the student.
C.Implementation
1.SETUP OF THE SYSTEM
Whenever a new book is acquired by the library, an
RFID tag is attached into the book with the relevant
information like, Book name, Book author, book
number, etc. The detailed information regarding the
book is captured in the computer database. The
computer database also stores all information for
individual users of the library. Each user is supplied
with registered RFID cards. These cards carry
identification data and other associated details like:
name, address, roll no., and mobile no. etc. for each
Figure 2: Application Circuit of RFID Reader user.
2. The Login Process
The librarian has the special privilege of having a
• RFID TAGS: These are the tags that have a unique master password for controlling the GUI of the
magnetic coil within them and are used to generate RFID LMS system. The LOGIN dialogue box appears
radiofrequency waves. They are passive in nature i.e. they as soon as he powers on the system. The librarian then
can be read up to a small distance of 10-15 cm, so the enters the corresponding password and enables the
system is static. A passive tag is an RFID tag that does not system for further usage.
contain a battery; the power is supplied by the reader. 3. Librarian Interface
When radio waves from the reader are encountered by a
This is the part of software that has all the operations
passive RFID tag, the coiled antenna within the tag forms
like issue, reissue, and add data about new user or a
www.ijcsit.com 6933
Sree Lakshmi Addepalli et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 6932-6935
book. Most importantly the database control is given to books automatically are adjusted for return against the
the librarian so that she can access it. Even then, we user’s name.
have created an option of viewing the transactions that
have taken place. The search is made easy by giving
him/her to search history according to the member,
book or date. Hence manual errors are removed and
transactions have been more automated than before.
Various actions of the UI like add, delete, issue re-issue
and search by name, email-id have been displayed.
7 Fine Calculations
The user during the time of returning the book clicks or
activates the fine calculation button on the display area
or GUI panel. The panel returns the fine.
Figure 4: Librarian Interface
8. Website
The library website is developed, where each member
of the library can access his/her account and view
personal transaction details and know about the book
Figure 5: User Interface availability. This reduces time taken for transactions
and standing in long queue as data is automatically
5. The Issue Process uploaded. As internet is widely available, this can be
When a user needs to get a book issued, he can get it reached to a large amount of users, irrespective of
done without any manual intervention. He simply zaps variation in devices.
his RFID card in front of the RFID reader and it
automatically opens his/her account activity page. He
then places the selected books to be issued, one by one
in front of the RFID reader. The computer records all
these data against his name. Finally a message is
displayed informing the user that the ISSUE has been
successful. The user takes the books for a specified time
from the library after which he has to return the books
to the library.
www.ijcsit.com 6934
Sree Lakshmi Addepalli et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 6932-6935
REFERENCES
[1] www.wikipedia.org - Library
[2] Psion Teklogix handheld reader manual – www.psionteklogix.com
[3] [4] Mercury 4 RFID reader manual – www.thingmagic.comG.
Eason, B. Noble, and I.N. Sneddon, “On certain integrals of
Figure 10: Interrelation between various interfaces Lipschitz-Hankel type involving products of Bessel functions,” Phil.
Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955.
(references)
This flowchart depicting the inter relation between the
[4] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed.,
interfaces. A book with RFID tag is scanned by the vol. 2. Oxford: Clarendon, 1892, pp.68-73.
reader and the input is fed into the librarian interface [5] I.S. Jacobs and C.P. Bean, “Fine particles, thin films and exchange
and the requested query is processed and the following anisotropy,” in Magnetism, vol. III, G.T. Rado and H. Suhl, Eds.
data is extracted from the database. Personal New York: Academic, 1963, pp. 271-350.
transactions can be seen both on mobile and website as [6] K. Elissa, “Title of paper if known,” unpublished.
per user convenience. [7] R. Nicole, “Title of paper with only first word capitalized,” J. Name
Stand. Abbrev., in press.
III. RESULT [8] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron
spectroscopy studies on magneto-optical media and plastic substrate
RFID based Library Management System is a unique interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740-741, August
system to be implemented in libraries to manage the books 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
automatically and efficiently. It will use the RFID reader to [9] M. Young, The Technical Writer’s Handbook. Mill Valley, CA:
identify and manage the books efficiently. Time saving, fast University Science, 1989
www.ijcsit.com 6935