Advanced Library Management System Using Bluetooth in Android Platform



Similar documents
Dynamic and Efficient Student Management System

E-Commerce: Designing And Creating An Online Store

LIBRARY ACCESS SYSTEM SMARTPHONE APPLICATION USING ANDROID

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

Remote Patient Monitoring- An Implementation in ICU Ward

Iaas for Private and Public Cloud using Openstack

Database Migration over Network

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT

Thick Client Application Security

A SMART AND EFFICIENT CLOUD APPROACH FOR BACKUP AND DATA STORAGE

Mobile Operating Systems. Week I

ESET Secure Authentication Java SDK

Installation and Administration Guide

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Data Center Real User Monitoring

Electronic Questionnaires for Investigations Processing (e-qip)

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Authorize.net modules for oscommerce Online Merchant.

Mobile Based Attendance Management System

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Student Attendance Through Mobile Devices

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Two Factor Authentication - USER GUIDE

esarinformation Systems Simplifying your Technology Mobile Applications Development Profile

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN

Online signature API. Terms used in this document. The API in brief. Version 0.20,

HelpSystems Web Server User Guide

Server Software Installation Guide

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns

ATTENDANCE MANAGEMENT SYSTEM

Safer data transmission using Steganography

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS

1. Introduction. 1.1 Purpose of this Document

The Raiser s Edge Mobile Application Guide

Final Year Project Interim Report

CPM release notes

Using Foundstone CookieDigger to Analyze Web Session Management

Amazon S3 Cloud Backup Solution Contents

Security Token User Guide

Freshservice Discovery Probe User Guide

Introducing the Adafruit Bluefruit LE Sniffer

How to Send Stealth Text From Your Cell Phone

GEPL Capital Mobile Trading App

DKIM Enabled Two Factor Authenticated Secure Mail Client

Android Based Appointment Scheduler and Location Helper using file operation

Performance Analysis of Client Side Encryption Tools

Ubisecure. White Paper Series. e-service Maturity Model

BCTextEncoder Help File

Two-Factor Authentication

A new Design Approach for Developing Electronic Health Record Application on Android

Student Attendance Tracker System in Android

TrustKey Tool User Manual

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

(C) Global Journal of Engineering Science and Research Management

Published : License : None

Storing Encrypted Plain Text Files Using Google Android

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

WebLogic Server 6.1: How to configure SSL for PeopleSoft Application

Instruction Manual for BicDroid QDocument (Mac OS X 10.9 or higher)

Discovering authentication credentials in volatile memory of Android mobile devices

Help. myprint introduction myprint website. Create account. Forgot your password? Home. Printing using upload (WebPrint)

Information Security in Big Data using Encryption and Decryption

SAS Drug Development Release Notes 35DRG07

Discovering Computers

Junos Pulse for Google Android

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Remote Desktop on Mobile

The increasing popularity of mobile devices is rapidly changing how and where we

Discovering passwords in the memory

01. Introduction of Android

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

THE CHALLENGE OF ADMINISTERING WEBSITES OR APPLICATIONS THAT REQUIRE 24/7 ACCESSIBILITY

Active Directory Authentication Integration

Summary. How-To: Active Directory Integration. April, 2006

Reading an sent with Voltage Secur . Using the Voltage Secur Zero Download Messenger (ZDM)

Summer Project Report. Fingerprint Based Attendance System

Salesforce1 Mobile Security Guide

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

Budget Event Management Design Document

Authorize.Net. Advanced Integration Method. Miva Merchant Module. Documentation for module version Last Updated: 5/07/03

Web Based Admission System

VPN: Virtual Private Network Setup Instructions

Member FAQ. General Information: Security:

1. Scope of Service. 1.1 About Boxcryptor Classic

White Paper BMC Remedy Action Request System Security

Transcription:

Advanced Library Management System Using Bluetooth in Android Platform A.M.Rangarajan 1 S.Gavaskar 2 P. Purusotham Naidu 3 Associate Professor MCA Scholar MCA Scholar Department of Master of Computer Applications Sri Venkateswara College of Engineering and Technology Chittoor Abstract: Bluetooth Library Manager (BLM) is library administration programming which can be utilized as a part of any library for keeping up distinctive capacities like book inquiry, demand accommodation, information passage and so on. I have actualized this product on Android stage which has the benefit of movability and wide accessibility. I utilized Bluetooth as correspondence medium between the server and the customer. BLM has extra abilities (call, SMS, email) for correspondence between library card holder and the organization. I have executed this exceptionally for any instructive establishment which has a library having limit not more than 20,000 clients. An encryption calculation is utilized to upgrade the security of that product. This calculation is utilized for the log-in reason. Utilizing the encryption calculation we encode the watchword in the customer side and the figure content and the username is send over Bluetooth to the server side. The decoding calculation is utilized as a part of the server side to unscramble the figure - content. At that point the decoded secret word is coordinated with relating watchword of that client put away in the server side database. The client can effectively sign in into the framework if and if the secret key of the database matches with the decoded secret word. The whole database of the library is executed in a standardized manner. Understudy can present their demand from that point telephone without utilizing web. They can contact their resources and comrades through SMS, email or call and the other way around. An understudy can check the accessibility utilizing this product. She/he can likewise see the arrival date of any book which is out of stock now and acquired by another understudy. Resources can likewise send any warning to any understudy through email or SMS. Index words: Android, Python, SL4A, Bluetooth, SQLite, Library Management System I. INTRODUCTION These days, cell phones are turning out to be all the more capable with strengthened processors, bigger capacity capacities, wealthier diversion capacities and more specialized systems. Android Android is a portable working framework (OS) taking into account the Linux bit that is at present grew by Google. With a client interface in light of direct control, Android is composed principally for touchscreen cell phones, for example, cell phones and tablet PCs. Android is main stream with innovation organizations which oblige a prepared -made, ease and adaptable working framework for cutting edge gadgets. Bluetooth Bluetooth, which is essentially utilized for information trade, add new elements to cell phones. Bluetooth obliges low power which results to long battery life. Bluetooth innovation can be utilized inside of the scope of 30-feet, which is sensible inside of a little building. This reach can be expanded utilizing Bluetooth repeater. Besides, the information exchange rate of the Bluetooth innovation is truly adequate, i.e. 3-4Mbps. In this way, at long last, because of the aforementioned advantages, I chose to ISSN: 2348 8387 www.internationaljournalssrg.org Page 37

utilize the Bluetooth innovation for the network in my application. SL4A I have utilized Scripting Layer for Android (SL4A) and python for adding to my application. SL4A is a Library that permits the creation and running of scripts written in different scripting dialects specifically on Android gadget. Python Python is an abnormal state programming dialect which permits software engineer to express ideas in less lines of code. Python is broadly utilized as scripting dialect. The Java dialect is too overwhelming weight f or some and is not by any stretch of the imagination open source. Python has a wide use and is open source. It additionally has seen the most enthusiasm as far as SL4A is concerned. SQLite I have additionally utilized SQLite for my database related work. I utilize SQLite utilizing sqlite3 module for python. I have utilized the distinctive UI exteriors accessible in SL4A for client collaborations. BLM is equipped for performing distinctive capacities, for example, Searching any book, Requisition accommodation, Contact help, Book issue and so on. An encryption calculation is additionally included utilizing ASCII change and a few computations. This encryption procedure is utilized for upgrading the dependability of the product. subtle elements of a y book additionally take heaps of time as the understudy needs to go to the library and quest for that book. BLM serves to incorporate a few works of library and computerize them. It spares time of the understudies as well as. In today s world Andro id telephones are generally accessible and broadly utilized among the understudy group. So I have executed the programming in Android stage utilizing python for Android. I have executed it utilizing Bluetooth correspondence since it will help understudies to work that product anyplace in the foundation with no web association. BLM can be utilized for keeping up the diverse library works and in addition for correspondence between the resources and understudies. I likewise utilized an encryption calculation to principle the authentication of the client. To utilize the usefulness of that product both understudy and power need to log -in with his username and secret word. The verification weighing is done in the server. After effective log-in client can utilize the distinctive functionalities of that product. The establishment and upkeep expense of BLM is likewise less so it can be utilized successfully. I. Database Structure III. METHODOLOGY II. MOTIVATION Library administration programming is vital for expanding the adaptability of any library. It diminishes the work power needed for keeping up the day by day work of any library framework. In the present manual library framework a understudy need to take after a few stages for getting to any book. At first order for a book must be composed on paper and submitted to the bookkeeper. At that point she/he needs to hold up in a long line to get that book if the book is accessible. Along these lines, it can be inferred that the manual framework take bunches of time of both understudies and the library powers for getting to any specific book. Other than that seeking ISSN: 2348 8387 www.internationaljournalssrg.org Page 38

A.ENCRYPTION ALGORITHM Step1: Divide the whole plain content into 4 bit sub writings. Step 2: For every sub content go to Step3. Step 3: Determine the ASCII estimations of all character of keys and discover its summation (k). Step 4: Determine the ASCII estimations of all characters of plain content and consolidation them consecutively. On the off chance that the length of ASCII estimation of any character is equivalent to 3, include // in the previously, then after the fact that ASCII esteem. Step5: Determine t1 by wiping out the // s. Step6: Calculate L utilizing L=length (t1)-2. Make an extraordinary number(s) utilizing L. Step7: Calculate x=t1*s. Step8: Calculate y=k-s Step9: Determine y1 by deciding the ASCII estimations of all characters of y aside from. and union them successively. Step10: Create y1. y1=<l>.<number of characters having ASCII estimations of length=3><positions of characters having ASCII estimations of length=3>.<y1> Go to step 2. Step11: Determine the figure message by changing over every character into whole number aside from. and supplant them with the character having ASCII value=integer worth. B.DECRYPTION CALCULATION Step1: Convert the figure content into y1 by deciding the ASCII estimation of every character with the exception of. Step2: Split the altered figure content while any clear space is happened and store those sub figure content into a rundown li. Instate d=[], decrypted_text="" Step3: For every string in li go to step 4. ISSN: 2348 8387 www.internationaljournalssrg.org Page 39

Step4: Determine L, number of characters having ASCII estimations of length=3, positions of characters having ASCII estimations of length=3 and y1. Step5: Determine y1 into y by changing over ASCII values into characters. Focus s. Step6: Calculate t1= (k-y)/s Step7: Determine t utilizing the quantity of characters and positions of characters having ASCII estimations of length=3. Decryption Step8: Convert each ASCII esteem into its relating character and attach the whole string in a rundown d. Go to step 3 Step9: For every string in d consolidate it with decrypt_text. C.EXAMPLE Encryption Fig 1: Context Flow Diagram ISSN: 2348 8387 www.internationaljournalssrg.org Page 40

Step4: If association set up, brief it. Step5: Write "Bluetooth" to server. Step6: Write client id and figure content to the server. Step7: Read ack from the server. On the off chance that ack= 1, brief "Login Successful" and go to step 7 Fig 2: Data Flow Diagram(Level 1) Step8: Choose choice (Search, Requisition Submission, SMS, Call, email) from the ready box. On the off chance that option=search, go to step8 On the off chance that option=requisition Submission, go to step13 On the off chance that option=sms, go to step14 On the off chance that option=call, go to Step15 On the off chance that option=e-mail, go to Step16 Step9: Choose Search choice (Book_name, Author_name, Call_no., Subject) from the ready box. Compose "1" to server. On the off chance that inquiry option=book_name, go to step 9 On the off chance that inquiry option=author_name, go to step10, On the off chance that inquiry option=call_no, go to step 11, On the off chance that inquiry option= Subject, go to step12. Step10: Read book_name, release and arrangement. Get book_id, book_name, author_name, class_no, author_mark, version and arrangement from server side database utilizing those subtle elements. Fig 3: Data Flow Diagram(Level 2) A. CLIENT PART: III.ALGORITHM Step1: Choose client type(admin or others). On the off chance that client type=others go to step2. In the event that client type=admin go to step 18. Step2: Read User id and Password from the client. Focus figure content utilizing encryption calculation. Step3: Check current Bluetooth condition of the gadget. On the off chance that Bluetooth is off, enact it. Begin Bluetooth disclosure. Select the administrator gadget from the rundown. Step11: Read author_name. Get book_id, book_name, author_name, class_no, author_mark, version and arrangement from server side database utilizing author_name. Step12: Read class_no. Get book_id, book_name, author_name, class_no, author_mark, version and arrangement from server side database utilizing author_name. Step13: Read subject. Get book_id, book_name, author_name, class_no, author_mark, version and arrangement from server side database utilizing subject. Step14: Write "2" to server. Read card_no, book_id, book_name, author_name, class_no, ISSN: 2348 8387 www.internationaljournalssrg.org Page 41

author_mark.embedcard_no, book_id, book_name, author_name, class_no, author_mark into server side database. Read return date from server database if any book is not accessible and reveal to it to client. Step15: Write "1" to server. Read staff or understudy name from the client. Bring his/her telephone number from the server side database. Form and send SMS to that number. Step16: Write "1" to server. Read staff or understudy name from the client. Bring his/her telephone number from the server side database. Make a call to that number. Step17: Write "1" to server. Read staff or understudy name from the client. Bring his/her email id from the server side database. Form and send email to that email id. Step4: Check client name and secret key. Compose ack=1 to customer if sign in effectively. Adjust the database. Step5: Decrypt figure content and check client id and secret word. Compose ack=1 to customer if sign in effectively. Read choice from customer. In the event that option= 1, go to step5. On the off chance that option= 2, go to step6. Step6: Fetch information from database and think of them to customer. Step7: Modify database. Get information from database and keep in touch. IV. RESULT Step18: Check current Bluetooth condition of the gadget. In the event that Bluetooth is off, initiate it. Begin Bluetooth revelation. Select the administrator gadget from the rundown. In the event that association built up, brief it. Step19: Write "Administrator" to server. Compose client id and secret word to the server. Step20: Read ack from the server. In the event that ack= 1, brief "Login Successful" and go to step 21. Step21: Read whole book depiction and adjust the server side database. B.SERVER PART Step1: Check current Bluetooth condition of the gadget. On the off chance that Bluetooth is off, actuate it. Make Bluetooth gadget discoverable. Acknowledge association. Step2: While True, rehash step 3 to 7. Fig 4(a):User id entry Fig 4(b):Password entry Step3: Read client sort from customer. On the off chance that client type= Admin, go to step3. On the off chance that client type= Bluetooth, go to step 4. Fig 5: Different options for user. ISSN: 2348 8387 www.internationaljournalssrg.org Page 42

Fig 8: Book Issuance Fig 6: Search book details V. CONCLUSION Bluetooth Library administrator is exceptionally valuable programming for library administration of any foundation. It can be introduced cost effectively as it doesn't require numerous assets. It help understudies to deal with their library arranged work from wherever inside the organization. It doesn't oblige web associations which is additionally a noteworthy favorable position of this product. It likewise help the resources. They can get to library and correspond with the understudies utilizing this product. The library power can deal with the library in a self-sufficient path with less number of workforces. In this way, it can be reasoned that this product is exceptionally useful for any institutional library framework. I didn't test the execution of this product. Execution of this product can be expanded by including extra capacities and execution testing. REFERENCES Fig 7: Search Resultby author name [1]http://en.wikipedia.org/wiki/Integrated_library_system. [2] http://developer.android.com/index.html. [3]http://en.wikipedia.org/wiki/Android_(operating_system). [4] https://eclipse.org/juno/. [5]http://android-sdk-tools.software.informer.com/. [6]http://developer.android.com/reference/android/database/sqlite/SQ LiteDatabase.html. [7] http://developer.android.com/sdk/index.html. [8]http://developer.android.com/tools/help/adt.html. ISSN: 2348 8387 www.internationaljournalssrg.org Page 43

[9] http://en.wikipedia.org/wiki/library. [10] http://en.wikipedia.org/wiki/computer. AUTHOR PROFILE A.M.Rangaraj is currently working as Associate Professor in SVCET, Chittoor. He has 9 years of Teaching Experience and 1 Year Industry side Experience. His area of Interest is Computer Networks and Computer Graphics S.Gavaskaris Currently MCA Scholar in SVCET, Chittoor. He has graduated his UG in 2012. His area of Interest is Mobile Computing P. Purusotham Naiduis Currently MCA Scholar in SVCET, Chittoor. He has graduated his UG in 2012. His area of Interest is Mobile Computing ISSN: 2348 8387 www.internationaljournalssrg.org Page 44