Sysmac Library User’s Manual for RFID Communications Library
RFID in Assets and Library Management
-
Upload
altanai-bisht -
Category
Technology
-
view
115 -
download
1
Transcript of RFID in Assets and Library Management
![Page 1: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/1.jpg)
RFIDfor Resource Management
ByN.PRAVEEN RAJSAMS College Of Engineering And Technology(SCET)&ALTANAI BISHTVeltech Multitech Dr Rangarajan Dr Sakunthala Engg College
![Page 2: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/2.jpg)
Modules :LIBRARY MANAGEMENT USING RFID READER
1. INTRODUCTION: RADIO FREQUENCY IDENTIFICATION 2. SYSTEM ANALYSIS:
Feasibility Study Existing System Proposed System Requirement Analysis
3. FLOW DIAGRAM 4. SYSTEM ARCHITECTURE System Architecture System Implementation
5. SOFTWARE SPECIFICATION
6.CONCLUSION
![Page 3: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/3.jpg)
INTRODUCTION :
● RFID :RADIO FREQUENCY IDENTIFICATION
● It has a purpose of identification and tracking using radio waves
● There two types of RFID :Active RFID And Passive RFID
![Page 4: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/4.jpg)
INTRODUCTION :RFID :RADIO FREQUENCY IDENTIFICATION
◼ RFID is a technology for identification using radio waves. Its main parts are: an RFID identifier (a tag, also called a responder), an RFID reader and a data system for handling the information. RFID tags, which include an antenna and a chip for information storage, are commonly installed on targets that need to be identified
![Page 5: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/5.jpg)
RFID TECHNOLOGY
![Page 6: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/6.jpg)
DIFFERENT RFID CHIP
![Page 7: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/7.jpg)
RFID READER
RFID TAG
![Page 8: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/8.jpg)
SYSTEM ANALYSIS:
➢ Feasibility Study➢ Existing System➢ Proposed System➢ Requirement Analysis
![Page 9: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/9.jpg)
FEASIBILITY STUDY:
The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates..
Three key considerations involved in the feasibility analysis are
➢ ECONOMICAL FEASIBILITY➢ TECHNICAL FEASIBILITY➢ SOCIAL FEASIBILITY
![Page 10: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/10.jpg)
SYSTEM ANALYSIS:
2.1.1 Economical Feasibility: This study is carried out to check the
economic impact that the system will have on the organization.
2.1.2 Technical Feasibility: This Any system developed must not have
a high demand on the available technical resources.
2.1.3 Social Feasibility: The aspect of study is to check the level of
acceptance of the system by the user.
![Page 11: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/11.jpg)
Existing System
The students and staffs are taking books by searching their related title in every rack from a library. This may be a complex term if there are so many racks available in a library..
Proposed System
In the proposed system, the students and staffs can take books using their mobile phone and a RFID tag. The admin can add or update the new book entries through the web-site.
SYSTEM ANALYSIS:
![Page 12: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/12.jpg)
REQUIREMENT ANALYSIS
Hardware Requirements
Processor : PENTIUM4Mother board : Intel 815 chipsetRam : 512 MBHard disk drive : 40 GBMonitor : SAMSUNG 20” colorKeyboard : Logitech 110 keysMouse : Logitech scroll
Software Requirements
Development kit : JDK 1.5Operating System : windows XPTool : Sun Java Wireless Toolkit Back End : Ms-Access
![Page 13: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/13.jpg)
Flow diagrams :
◼ In the dataflow diagram ,is used explain about the authentication process has been carrying out .
![Page 14: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/14.jpg)
Flow diagrams :level 0
1. Validate the username and Password
2. Choose a product from the menu
Admin Login
Valid/ Invalid
Student/Staff Login Valid/Invalid
![Page 15: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/15.jpg)
Flow diagrams :level 1
SERVER
Admin Upload Book Details
View/Delete Book Details
Book ID
Displays the details of the Author Name, Book Name and No. of Issues, which is matching with that given ID or Deletes
the particular book details
Adding new books to the library or deleting the book
details
Student/Staff Login
Taking books from the Library
![Page 16: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/16.jpg)
Level 2Administrator
View/Delete Book Details of the given ID
Upload/Delete the book details
SERVER
Student/Staff Login
Display the details of the author name, book
name and no. of issues of the corresponding Book ID or Delete the corresponding book
detail
Valid/ Invalid
The RFID Tag reads the details of the titles of the books available
in the Rack
Lists the selected title related book’s
Author Name and Version
By selecting any one of the item from the list, it will
display the corresponding sub-menus and then displays
the details of the books as per the input given
Upload the new entries into the library account. The book details can also be deleted by giving the
book id
![Page 17: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/17.jpg)
Authentication level of the ADMINISTRATOR:
Start
Login
View Book Details
C
Upload Book Details
Add Detail Delete Detail
BA
![Page 18: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/18.jpg)
AUTHENTICATION LEVEL OF THE STUDENT AND STAFF:
Stop
Start
Login
Lists of titles available in the rack and display the details in the
student’s or staff’s mobile phones.
Lists the available sub-menus of the selected item
The list of books available under the selected category is retrieved from the database and displayed in the user’s
mobile phones
![Page 19: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/19.jpg)
SYSTEM ARCHITECTURE
Wireless Network SERVER
User’s Mobile Phone
![Page 20: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/20.jpg)
SYSTEM ARCHITECTURE
◼ This scenario explain about how the rfid reader works in wireless network
◼ In the server side, the application will use a web server and a database
◼ A client side application is developed for the phone.
![Page 21: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/21.jpg)
SYSTEM ARCHITECTURE
![Page 22: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/22.jpg)
SYSTEM ARCHITECTURE
After entering all the details, the details are transferred into a RFID reader. And this RFID reader is fixed in the Racks available in the library
![Page 23: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/23.jpg)
SOFTWARE SPECIFICATION
• Software Used: Core Java and jdk 1.5 or Later• “Java: A simple, object-oriented, distributed,
interpreted, robust, secure, architecture neutral, portable, high performance, multithreaded and dynamic language”.
Java:• A language developed by Sun Microsystems• A general-purpose language• High-level language• Developed initially for consumer devices• Popular platform to develop enterprise applications
![Page 24: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/24.jpg)
COMPLETE SCENARIO OF LIBRARY MANAGEMENT SYSTEM USING RFID
![Page 25: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/25.jpg)
COMPLETE SCENARIO OF LIBRARY MANAGEMENT SYSTEM USING RFID
![Page 26: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/26.jpg)
COMPLETE SCENARIO OF LIBRARY MANAGEMENT SYSTEM USING RFID
![Page 27: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/27.jpg)
COMPLETE SCENARIO OF LIBRARY MANAGEMENT SYSTEMUSING RFID
![Page 28: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/28.jpg)
SCREEN SHOTS
![Page 29: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/29.jpg)
![Page 30: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/30.jpg)
THE SELECT THE APPICATION
![Page 31: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/31.jpg)
THE SELECTION
![Page 32: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/32.jpg)
THE AUTHENTICATION LEVEL OF THE USER
![Page 33: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/33.jpg)
ENTER THE TAG NAME
![Page 34: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/34.jpg)
Choose the type
![Page 35: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/35.jpg)
Select the option which are available:
![Page 36: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/36.jpg)
Choose the subject
![Page 37: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/37.jpg)
Verifyinf if the books are properly issued before the exit
![Page 38: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/38.jpg)
Book return process
![Page 39: RFID in Assets and Library Management](https://reader034.fdocuments.us/reader034/viewer/2022052318/5885c1be1a28ab6f168b6e49/html5/thumbnails/39.jpg)
Conclusion
➢The RFID technology brings needed functions for developing and building a modern identification system for decreasing mistakes in healthcare. With these technologies, controlling different materials and records can be improved
➢The system presented was based on a combination of wireless, J2ME and RFID technology