Advanced Library Management System Using Bluetooth in Android Platform A.M.Rangarajan 1 S.Gavaskar 2 P. Purusotham Naidu 3 Associate Professor MCA Scholar MCA Scholar Department of Master of Computer Applications Sri Venkateswara College of Engineering and Technology Chittoor Abstract: Bluetooth Library Manager (BLM) is library administration programming which can be utilized as a part of any library for keeping up distinctive capacities like book inquiry, demand accommodation, information passage and so on. I have actualized this product on Android stage which has the benefit of movability and wide accessibility. I utilized Bluetooth as correspondence medium between the server and the customer. BLM has extra abilities (call, SMS, email) for correspondence between library card holder and the organization. I have executed this exceptionally for any instructive establishment which has a library having limit not more than 20,000 clients. An encryption calculation is utilized to upgrade the security of that product. This calculation is utilized for the log-in reason. Utilizing the encryption calculation we encode the watchword in the customer side and the figure content and the username is send over Bluetooth to the server side. The decoding calculation is utilized as a part of the server side to unscramble the figure - content. At that point the decoded secret word is coordinated with relating watchword of that client put away in the server side database. The client can effectively sign in into the framework if and if the secret key of the database matches with the decoded secret word. The whole database of the library is executed in a standardized manner. Understudy can present their demand from that point telephone without utilizing web. They can contact their resources and comrades through SMS, email or call and the other way around. An understudy can check the accessibility utilizing this product. She/he can likewise see the arrival date of any book which is out of stock now and acquired by another understudy. Resources can likewise send any warning to any understudy through email or SMS. Index words: Android, Python, SL4A, Bluetooth, SQLite, Library Management System I. INTRODUCTION These days, cell phones are turning out to be all the more capable with strengthened processors, bigger capacity capacities, wealthier diversion capacities and more specialized systems. Android Android is a portable working framework (OS) taking into account the Linux bit that is at present grew by Google. With a client interface in light of direct control, Android is composed principally for touchscreen cell phones, for example, cell phones and tablet PCs. Android is main stream with innovation organizations which oblige a prepared -made, ease and adaptable working framework for cutting edge gadgets. Bluetooth Bluetooth, which is essentially utilized for information trade, add new elements to cell phones. Bluetooth obliges low power which results to long battery life. Bluetooth innovation can be utilized inside of the scope of 30-feet, which is sensible inside of a little building. This reach can be expanded utilizing Bluetooth repeater. Besides, the information exchange rate of the Bluetooth innovation is truly adequate, i.e. 3-4Mbps. In this way, at long last, because of the aforementioned advantages, I chose to ISSN: 2348 8387 www.internationaljournalssrg.org Page 37
utilize the Bluetooth innovation for the network in my application. SL4A I have utilized Scripting Layer for Android (SL4A) and python for adding to my application. SL4A is a Library that permits the creation and running of scripts written in different scripting dialects specifically on Android gadget. Python Python is an abnormal state programming dialect which permits software engineer to express ideas in less lines of code. Python is broadly utilized as scripting dialect. The Java dialect is too overwhelming weight f or some and is not by any stretch of the imagination open source. Python has a wide use and is open source. It additionally has seen the most enthusiasm as far as SL4A is concerned. SQLite I have additionally utilized SQLite for my database related work. I utilize SQLite utilizing sqlite3 module for python. I have utilized the distinctive UI exteriors accessible in SL4A for client collaborations. BLM is equipped for performing distinctive capacities, for example, Searching any book, Requisition accommodation, Contact help, Book issue and so on. An encryption calculation is additionally included utilizing ASCII change and a few computations. This encryption procedure is utilized for upgrading the dependability of the product. subtle elements of a y book additionally take heaps of time as the understudy needs to go to the library and quest for that book. BLM serves to incorporate a few works of library and computerize them. It spares time of the understudies as well as. In today s world Andro id telephones are generally accessible and broadly utilized among the understudy group. So I have executed the programming in Android stage utilizing python for Android. I have executed it utilizing Bluetooth correspondence since it will help understudies to work that product anyplace in the foundation with no web association. BLM can be utilized for keeping up the diverse library works and in addition for correspondence between the resources and understudies. I likewise utilized an encryption calculation to principle the authentication of the client. To utilize the usefulness of that product both understudy and power need to log -in with his username and secret word. The verification weighing is done in the server. After effective log-in client can utilize the distinctive functionalities of that product. The establishment and upkeep expense of BLM is likewise less so it can be utilized successfully. I. Database Structure III. METHODOLOGY II. MOTIVATION Library administration programming is vital for expanding the adaptability of any library. It diminishes the work power needed for keeping up the day by day work of any library framework. In the present manual library framework a understudy need to take after a few stages for getting to any book. At first order for a book must be composed on paper and submitted to the bookkeeper. At that point she/he needs to hold up in a long line to get that book if the book is accessible. Along these lines, it can be inferred that the manual framework take bunches of time of both understudies and the library powers for getting to any specific book. Other than that seeking ISSN: 2348 8387 www.internationaljournalssrg.org Page 38
A.ENCRYPTION ALGORITHM Step1: Divide the whole plain content into 4 bit sub writings. Step 2: For every sub content go to Step3. Step 3: Determine the ASCII estimations of all character of keys and discover its summation (k). Step 4: Determine the ASCII estimations of all characters of plain content and consolidation them consecutively. On the off chance that the length of ASCII estimation of any character is equivalent to 3, include // in the previously, then after the fact that ASCII esteem. Step5: Determine t1 by wiping out the // s. Step6: Calculate L utilizing L=length (t1)-2. Make an extraordinary number(s) utilizing L. Step7: Calculate x=t1*s. Step8: Calculate y=k-s Step9: Determine y1 by deciding the ASCII estimations of all characters of y aside from. and union them successively. Step10: Create y1. y1=<l>.<number of characters having ASCII estimations of length=3><positions of characters having ASCII estimations of length=3>.<y1> Go to step 2. Step11: Determine the figure message by changing over every character into whole number aside from. and supplant them with the character having ASCII value=integer worth. B.DECRYPTION CALCULATION Step1: Convert the figure content into y1 by deciding the ASCII estimation of every character with the exception of. Step2: Split the altered figure content while any clear space is happened and store those sub figure content into a rundown li. Instate d=[], decrypted_text="" Step3: For every string in li go to step 4. ISSN: 2348 8387 www.internationaljournalssrg.org Page 39
Step4: Determine L, number of characters having ASCII estimations of length=3, positions of characters having ASCII estimations of length=3 and y1. Step5: Determine y1 into y by changing over ASCII values into characters. Focus s. Step6: Calculate t1= (k-y)/s Step7: Determine t utilizing the quantity of characters and positions of characters having ASCII estimations of length=3. Decryption Step8: Convert each ASCII esteem into its relating character and attach the whole string in a rundown d. Go to step 3 Step9: For every string in d consolidate it with decrypt_text. C.EXAMPLE Encryption Fig 1: Context Flow Diagram ISSN: 2348 8387 www.internationaljournalssrg.org Page 40
Step4: If association set up, brief it. Step5: Write "Bluetooth" to server. Step6: Write client id and figure content to the server. Step7: Read ack from the server. On the off chance that ack= 1, brief "Login Successful" and go to step 7 Fig 2: Data Flow Diagram(Level 1) Step8: Choose choice (Search, Requisition Submission, SMS, Call, email) from the ready box. On the off chance that option=search, go to step8 On the off chance that option=requisition Submission, go to step13 On the off chance that option=sms, go to step14 On the off chance that option=call, go to Step15 On the off chance that option=e-mail, go to Step16 Step9: Choose Search choice (Book_name, Author_name, Call_no., Subject) from the ready box. Compose "1" to server. On the off chance that inquiry option=book_name, go to step 9 On the off chance that inquiry option=author_name, go to step10, On the off chance that inquiry option=call_no, go to step 11, On the off chance that inquiry option= Subject, go to step12. Step10: Read book_name, release and arrangement. Get book_id, book_name, author_name, class_no, author_mark, version and arrangement from server side database utilizing those subtle elements. Fig 3: Data Flow Diagram(Level 2) A. CLIENT PART: III.ALGORITHM Step1: Choose client type(admin or others). On the off chance that client type=others go to step2. In the event that client type=admin go to step 18. Step2: Read User id and Password from the client. Focus figure content utilizing encryption calculation. Step3: Check current Bluetooth condition of the gadget. On the off chance that Bluetooth is off, enact it. Begin Bluetooth disclosure. Select the administrator gadget from the rundown. Step11: Read author_name. Get book_id, book_name, author_name, class_no, author_mark, version and arrangement from server side database utilizing author_name. Step12: Read class_no. Get book_id, book_name, author_name, class_no, author_mark, version and arrangement from server side database utilizing author_name. Step13: Read subject. Get book_id, book_name, author_name, class_no, author_mark, version and arrangement from server side database utilizing subject. Step14: Write "2" to server. Read card_no, book_id, book_name, author_name, class_no, ISSN: 2348 8387 www.internationaljournalssrg.org Page 41
author_mark.embedcard_no, book_id, book_name, author_name, class_no, author_mark into server side database. Read return date from server database if any book is not accessible and reveal to it to client. Step15: Write "1" to server. Read staff or understudy name from the client. Bring his/her telephone number from the server side database. Form and send SMS to that number. Step16: Write "1" to server. Read staff or understudy name from the client. Bring his/her telephone number from the server side database. Make a call to that number. Step17: Write "1" to server. Read staff or understudy name from the client. Bring his/her email id from the server side database. Form and send email to that email id. Step4: Check client name and secret key. Compose ack=1 to customer if sign in effectively. Adjust the database. Step5: Decrypt figure content and check client id and secret word. Compose ack=1 to customer if sign in effectively. Read choice from customer. In the event that option= 1, go to step5. On the off chance that option= 2, go to step6. Step6: Fetch information from database and think of them to customer. Step7: Modify database. Get information from database and keep in touch. IV. RESULT Step18: Check current Bluetooth condition of the gadget. In the event that Bluetooth is off, initiate it. Begin Bluetooth revelation. Select the administrator gadget from the rundown. In the event that association built up, brief it. Step19: Write "Administrator" to server. Compose client id and secret word to the server. Step20: Read ack from the server. In the event that ack= 1, brief "Login Successful" and go to step 21. Step21: Read whole book depiction and adjust the server side database. B.SERVER PART Step1: Check current Bluetooth condition of the gadget. On the off chance that Bluetooth is off, actuate it. Make Bluetooth gadget discoverable. Acknowledge association. Step2: While True, rehash step 3 to 7. Fig 4(a):User id entry Fig 4(b):Password entry Step3: Read client sort from customer. On the off chance that client type= Admin, go to step3. On the off chance that client type= Bluetooth, go to step 4. Fig 5: Different options for user. ISSN: 2348 8387 www.internationaljournalssrg.org Page 42
Fig 8: Book Issuance Fig 6: Search book details V. CONCLUSION Bluetooth Library administrator is exceptionally valuable programming for library administration of any foundation. It can be introduced cost effectively as it doesn't require numerous assets. It help understudies to deal with their library arranged work from wherever inside the organization. It doesn't oblige web associations which is additionally a noteworthy favorable position of this product. It likewise help the resources. They can get to library and correspond with the understudies utilizing this product. The library power can deal with the library in a self-sufficient path with less number of workforces. In this way, it can be reasoned that this product is exceptionally useful for any institutional library framework. I didn't test the execution of this product. Execution of this product can be expanded by including extra capacities and execution testing. REFERENCES Fig 7: Search Resultby author name [1]http://en.wikipedia.org/wiki/Integrated_library_system. [2] http://developer.android.com/index.html. [3]http://en.wikipedia.org/wiki/Android_(operating_system). [4] https://eclipse.org/juno/. [5]http://android-sdk-tools.software.informer.com/. [6]http://developer.android.com/reference/android/database/sqlite/SQ LiteDatabase.html. [7] http://developer.android.com/sdk/index.html. [8]http://developer.android.com/tools/help/adt.html. ISSN: 2348 8387 www.internationaljournalssrg.org Page 43
[9] http://en.wikipedia.org/wiki/library. [10] http://en.wikipedia.org/wiki/computer. AUTHOR PROFILE A.M.Rangaraj is currently working as Associate Professor in SVCET, Chittoor. He has 9 years of Teaching Experience and 1 Year Industry side Experience. His area of Interest is Computer Networks and Computer Graphics S.Gavaskaris Currently MCA Scholar in SVCET, Chittoor. He has graduated his UG in 2012. His area of Interest is Mobile Computing P. Purusotham Naiduis Currently MCA Scholar in SVCET, Chittoor. He has graduated his UG in 2012. His area of Interest is Mobile Computing ISSN: 2348 8387 www.internationaljournalssrg.org Page 44