Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Vadlakonda Sai Vedanth, Mandaloju Sai Rohan, Sheelam Vineeth Sai, Dr. T. Ramaswamy, Y. Sreenivasulu
DOI Link: https://doi.org/10.22214/ijraset.2023.48607
Certificate: View Certificate
Historically, libraries have employed barcode-based book management systems for book identification, self-check-in, anti-theft, inventory control, and book classification. The process is manual. We suggest an RFID-based library management system that allows for quick transaction processing and streamlines the borrowing and returning of books from libraries with minimal manual labour. The suggested system has the ability to store data electronically that can be read by a reader. Using RFID tags, the system can issue and receive books. It can also use library databases to compute relevant factors like due dates, renewal dates, and fines.
I. INTRODUCTION
RFID is a cutting-edge automated method for quickly classifying, arranging, and tracking a wide range of commodities. Today's RFID applications include automatic sorting, theft detection, and inventory tracking. In the near future, data gathering, identification, and analysis will be crucial for certain library activities. Radio frequency identification (RFID) technology is the dynamic link between people, things, etc. RFID-enabled automated libraries are transformed into "self-service stations" that require little assistance from library workers. By implementing self-service "check-in" and "check-out," major delivery delays for library resources are eliminated, and operational effectiveness is increased. It is mostly utilised in libraries to automate procedures for managing books, including circulation, inventory control, check-in, shelf management, and anti-theft. Combined with machinery for computer-assisted sorting. Sorting books is facilitated and accelerated using RFID. The material handling procedure at the library can be automated so that librarians can spend more time interacting with users, hence increasing "user interaction and satisfaction."
II. LITERATURE REVIEW
III. METHODOLOGY
A. Existing System
The systems used by libraries nowadays use barcode technology. There is a barcode on every book in the library. The barcode's uniqueness changes according to the line thickness. This kind of library administration necessitates manual management. The library's primary operations, including the lending, renewing, and returning of books, must all be manually monitored and managed. Due to the barcode readers' limited capacity to read more than one code at once, there is typically a long line at the issue and return counters. The barcodes must be encoded during manufacturing, and they can only be programmed once. The attributes of the codes cannot be changed once specified. On a sheet of paper, the codes are printed and adhered to the books. The bar-code reader should be in close proximity to the bar code while both loaning out and returning the books.
The creation of the operating manual is necessary to make this feasible. Even with manual operation, it takes a lot of time and effort since the reader must always be put extremely close to the barcode tag for the book to be correctly read. The read range of the bar-code readers is relatively limited, only a few millimetres or so.
B. Proposed System
An RFID system is made up of several transponders, portable or fixed readers, data input devices, and system software, among other things. The technology's core component, transponders or ID tags, exist in a variety of forms, sizes, and read ranges. The following essential elements make up a complete RFID system:
Tags, often referred to as transponders, are electronic chips made up of an integrated circuit and an antenna coil that exchange radio frequency signals with readers. To track out thefts, they use a feature called EAS (Electronic Article Surveillance). It has a variety of sizes and forms. Three memory elements are present in tags:
a. Identification of the item (code no.
b. Security feature that turns on and off when objects are checked in and out.
c. A variable memory that helps with item sorting.
C. Hardware Specifications
a. Quite affordable
b. An organised and efficient programming environment
c. Scalable hardware and software applications.
IV. WORKING
An external power source typically powers an RFID reader, which is always switched on. The oscillator inside of it produces a signal with the desired frequency when it is turned on, but because the signal strength will be very low (which could cause the signal to fade off if it is transmitted directly), it needs to be amplified, which can be done using an amplifier circuit. We also need to modulate the signal in order to propagate it over a greater distance, which is accomplished by a modulator. Now that the signal has undergone all these enhancements, it is ready to be broadcast. An antenna can do this by converting the electrical signal into an electromagnetic signal. The closeness of an RFID reader allows it to detect tags everywhere it receives signal. When an RFID tag approaches an RFID reader, the tag detects the reader's signal using a built-in coil that turns the RF signal it receives into an electrical signal. The microprocessor within the tag can be powered up with just this converted signal. The microchip's job is to communicate the data (unique ID) that is stored in it once it is switched on. The signal is sent into the air through the same coil it was received through. A transceiver is also a part of the RFID reader. The original data may be collected once the signal from the tag is received by the RFID reader through its antenna, and it is then processed further by a microcontroller or a microprocessor to complete a particular task.
Remember that the description given above refers to a passive RFID tag. Since active RFID tags have a built-in power supply, they simply need to detect the signal from the reader to activate the circuit and prepare the tag to transmit data to the reader.
A. Interfacing
A RC522 based reader linked via the Serial Peripheral Interface (SPI) interface, as illustrated in fig, is used by the library to read and write several types of Radio-Frequency Identification (RFID) cards on the Arduino UNO platform.
The Arduino is connected to the RFID reader in the manner described below:
VI. RESULT
To handle books automatically and effectively, libraries must deploy the RFID-based library management system, which is a special system. Utilizing RFID readers, efficiently identify and handle books. Key advantages of RFID in libraries are time savings, rapid access to books, and the elimination of human mistakes. The website or the Android app are only two examples of interfaces where private transactions may be observed. Utilizing a user interface designed for librarians, you may manage your data. As a result, automation and control have both been used.
The usage of RFID in libraries speeds up the procedures for borrowing, monitoring, and searching books, freeing up personnel to focus on providing better user-service. RFID tags and readers must be of high quality to produce the optimum performance. The information that has to be expressed in tags is another factor in how well technology is used. These programmes can improve customer service, reduce book theft, reduce labour expenses significantly, and continuously update records of new book collections.
[1] K. Finkelzeller, The RFID Handbook, 2nd ed., John Wiley & Sons, 2003. [2] R. Want et al., Connecting the Real and Virtual Worlds with Electronic Tags, Proc. ACM SIGCHI, ACM ???. [3] M. Weiser, 21st Century Computers, Scientific Am., vol. 265, no. 3, 1991 [4] Vol. Kindberg et al., People, Places, and Things: Web Presence in the Real World, ACM Mobile Networks & Applications J, 2002. [5] R. Vant, \"Implementation of Ubiquitous Sensing with RFID\", Computer, vol. 37, no. April 2004. [6] E. Batista, \"A Regression in Radio IdentificationTechnology?\" Wired News, April 8, 2003;www.wired.com/news/wireless/0.1382.58385, 00.html. [7] d. Singel, \"U.S. Passport for Chipping\", Wired News,19Oct.2004;www.wiredcom/news/privacy/0.1848.v65412.00.html. [8] A. Jewels, R. L. Rivest, and M. Schiedlo, \"ThevBlocker Tags: Selective Blocking of the RFIDvTag for Consumer Privacy\", Proc. 8thvACM conf. communication with the computer. Security, ACM Press, 2003.
Copyright © 2023 Vadlakonda Sai Vedanth, Mandaloju Sai Rohan, Sheelam Vineeth Sai, Dr. T. Ramaswamy, Y. Sreenivasulu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET48607
Publish Date : 2023-01-09
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here