LibRFID: Automation Software for Library Management System Using RFID Technology



Similar documents
Modern Multipurpose Security Management System

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

Using RFID Techniques for a Universal Identification Device

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

How To Understand The Power Of An Freddi Tag (Rfid) System

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

The Place of Emerging RFID Technology in National Security and Development

International Journal of Engineering Research & Management Technology

Keywords RFID READER, FPGA, GSM.

RFID BASED VEHICLE TRACKING SYSTEM

Evolving Bar Codes. Y398 Internship. William Holmes

Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework

Efficient Asset Tracking: From Manual to Automated

RFID Based Centralized Patient Monitoring System and Tracking (RPMST)

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

Fingerprint Based Biometric Attendance System

Review of RFID & GSM Based Automatic Ration Distribution System

RESEARCH SURVEY ON MIFARE WITH RFID TECHNOLOGY

Microtronics technologies Mobile:

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

WHITE PAPER. ABCs of RFID

RF Attendance System Framework for Faculties of Higher Education

Gemalto Mifare 1K Datasheet

Data Protection Technical Guidance Radio Frequency Identification

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Other 555 based and 8051 based projects...

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

915MHz RFID State of the Art RFID

Inventory & Location System

Implementing RFID in Library: Methodologies, Advantages and Disadvantages

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Intelligent Fleet Management System Using Active RFID

Frequently Asked Questions

INTEGRATING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN ACADEMIC MANAGEMENT SYSTEM

Online Student Monitoring System Using Passive RFID

Radio Frequency Identification (RFID) An Overview

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

Self-Check-In Hotels Using RFID. Technology

LIBRARY ACCESS SYSTEM SMARTPHONE APPLICATION USING ANDROID

CONDIS. IT Service Management and CMDB

Developing a Multitasking Shopping Trolley Based On RFID Technology

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER

RF ID Security and Privacy

RFID based Bill Generation and Payment through Mobile

RFID Basics HEGRO Belgium nv - Assesteenweg Ternat Tel.: +32 (0)2/ Fax : +32 (0)2/ info@hegrobelgium.

Security & Chip Card ICs SLE 44R35S / Mifare

CHAPTER 1 Introduction 1

Time & Access System An RFID based technology

The Drug Quality & Security Act

The Design and Construction of an Intelligent Taxi Electronic Payment System Solution

Active RFID Solutions for Asset Tracking and Inventory Management

Intelligent Home Automation and Security System

RFID Toys. Cool Projects for Home, Office, and Entertainment. Amal Graafstra. WILEY Wiley Publishing, Inc.

Time Attendance V1.0

Strengthen RFID Tags Security Using New Data Structure

Automated Security System using ZigBee

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

RFID Based Real Time Password Authentication System for ATM

Using Contactless Smart Cards for Secure Applications

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Aperio Online System Description

Implementing radio frequency identification technology in libraries: Advantages and disadvantages

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010

SOURCE ID RFID Technologies and Data Capture Solutions

DESIGN AND IMPLEMENTATION OF LOW COST HOME SECURITY SYSTEM USING PIC MICROCONTROLLER ANDGSM NETWORK

Cloud RFID UHF Gen 2

A Study on the Security of RFID with Enhancing Privacy Protection

Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas

Can RFID Tags Work Inside Metal?

RFID Design Principles

An Introductory and Elementary Study on RFID & Its Applications

EL 25,1. Received 21 December 2005 Revised 31 March 2006 Accepted 7 April 2006

Military Usage of Passive RFID 1

RFID BASED AUTOMATED LOW COST DATA ACQUISITION SYSTEM FORPUBLIC TRANSPORT

Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module

Computerized RTBS System

ALL-USB-RS422/485. User Manual. USB to Serial Converter RS422/485. ALLNET GmbH Computersysteme Alle Rechte vorbehalten

Embedded Security System using RFID & GSM

Automobile Speed Violation Detection System using RFID and GSM Technologies

RADIO FREQUENCY IDENTIFICATION IN LIBRARIES

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

AAS. Automatic Attendance System. Grant Hornback, Alex Babu, Bobby Martin, Ben Zoghi, Madhav Pappu, Rohit Singhal

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

School Management System

Chip Card & Security ICs Mifare NRG SLE 66R35

Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology

INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors

RFID Technology Based Attendance Management System

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

How To Hack An Rdi Credit Card

Living Requirements Document: Sniffit

Transcription:

LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi, Karnataka, India 1 ABSTRACT: Radio Frequency Identification (RFID) is a one of the Auto Identification and Data capture technology which helps to automate library management system and also it helps to identify the books from being taken out by the user of library from the library premises without issuing the books authentically from the circulation counter. The identification is done with help of radio frequency waves which are emitted by the rfid tags which are pasted in the books. The rfid software which is developed would allow for the fast library book circulating and also provide immediate traceability and security for the books which are there in the library. The aim of this paper is to implementing efficient library management system software with the rfid technologies to provide security to books in the library as well as to provide fast service by the library staff to the library users KEYWORDS: Authentication, RFID- Radio Frequency Identification RFID Reader, RFID Tag, Security, USB- Universal Serial Bus, PICC- Integrated Circuit Card, PCD- Proximity Coupling Device, COM Port- Communication port I. INTRODUCTION Identification of persons or things is always important in places like Airports, railway stations, shopping malls, industries, education sectors like libraries etc. Identification can be made automatic using Auto-identification. There are various methods for auto-identification; some of them are bar-code systems, optical character recognition, biometrics, smart cards and RFIDs [1]. RFID based systems are going to revolutionize the entire auto identification system due to its fast processing speed. In this paper we are going to develop library automation system using this revolutionary rfid technology[2], which will track the books, whether they are issued or they are in library, so that library user will get the instant information and also to the library staff to maintain and manage the books library easily. RFID can be used library circulation operations and theft detection systems. RFID-based systems are tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster circulation of books, inventorying, and books handling. II. GETTING INTO RFID RFID stands for Radio-Frequency Identification. It is the acronym stands for small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying data around 2,000 byte or less. RFID is not a single technology it is a combination of radio-frequency-based technology and microchip technology. The unique identification contained on microchip tags are already fed into the server which is present in the library and the tags attached to library materials and those tags emits radio frequency waves which is read using radio frequency reader, regardless of item orientation or alignment[7] i.e. the technology does not require line-of-sight or a fixed plane to read tags as do traditional theft detection system and compared with the information of microchip which is stored in the server. The RFID tags provide a unique identification for the each book. III. COMPONENTS OF RFID In RFID technology we use lot of components but following are the major components we use it for implementations. Copyright to IJIRCCE www.ijircce.com 43

a. RFID Tag RFID tag is contactless card, referred to as a Proximity Integrated Circuit Card (PICC) [5]. Tags may either be actively or passively powered. Active tags contain an on-board power source, such as a battery, while passive tags must be inductively powered via an RF signal from the reader. The distance a reader may interrogate tags from is limited by the tag s power. Consequently, active tags may be read from a greater distance than passive tags. Active tags may also record sensor readings or perform calculations in the absence of a reader. Passive tags can only operate in the presence of a reader and are inactive otherwise [6]. An active tag's memory size varies according to application requirements and some systems operate with up to 1MB of memory. Passive RFID tags operate without a separate external power source and obtain operating power generated from the reader. Tags contain microchips that store the unique identification (ID) of each object. The ID is a serial number stored in the RFID memory. The chip is made up of integrated circuit and embedded in a silicon chip. RFID memory chip can be permanent or changeable depending on the read/write characteristics. RFID tags can be different sizes and shapes depending on the application and the environment at which it will be used b. RFID Reader Figure 1. A RFID Tag with Tag ID as 007330967 RFID reader, also referred as Proximity Coupling Device (PCD) [5], reads tag s data through the RFID antennas at a certain frequency. Basically the reader is an electronic apparatus which produce and accept a radio signals. The antennas contains an attached reader, the reader translates the tag s radio signals through antenna [3], depending on the tag s capacity. The readers consist of a build-in anti-collision schemes and a single reader can operate on multiple frequencies. As a result, these readers are expected to collect data from tag. For this purpose readers can be connected using RS-232, RS-485 and USB cable as a wired option and connect to the computer system. In LibRFID project developed our own module using RFID EM-18 Module with USB cable as a wired option to send the data to our Software when we swipe the RFID IDs and RFID Tags. Following is the Diagram of final developed RFID reader Figure 2. A RFID Reader with USB Cable Copyright to IJIRCCE www.ijircce.com 44

IV. HOW TO USE RFID IN LIBRARY WORKS? A library is a center of Knowledge which has collection of information, sources, resources, books, and services in a single place. Apart from book libraries are now also becoming repositories and access points for maps, prints, or other documents on various storage media such as microfilm or microfiche, audio tapes, CDs, LPs, cassettes, videotapes, and DVDs. According Library Science 5 th Law The library is the growing organism, the resources of the library will increased from one year to another year. So all the Libraries materials are arranged in a specified order according to a library classification system, so that items may be located quickly and collections may be browsed efficiently. The following are the tasks to be performed in the library. Circulation: handling user accounts and issuing/returning and shelving of materials. Collection, development, order materials, maintain materials budgets. Technical Services work behind the scenes cataloguing and processing new materials and de accessioning weeded materials. Basic tasks in library management include the planning of acquisitions of materials, arranging the acquired materials according to the library classification, preservation of materials the de accessioning of materials, patron borrowing of materials, and developing and administering library computer systems. Among these, the proposed system will automate the following tasks using RFID technology, Searching a particular book to check its presence in the library Locating the physical location of the book Accounting/Stock verification of the materials The RFID technology facilitates the fast issuing, reissuing and returning of books with the help of RFID enabled tags and rfid readers. It directly provides the book information and library member information to the library management system and does not need the manual typing. It also provides monitoring and searching system. The monitoring module will continuously monitor the movement of books across the gates, so that the books taken out without prior issuing will be traced out easily and will alarm the librarians. The searching module provides the fast searching of books using RFID reader [4] and finds the physical location of the books in the library. V. IMPLEMENTATION OF RFID IN LIBRFID In LibRFID software we are maintaining the separate database for issuing or returning reissuing the books etc. Also to identify the authorized student, staff using their RFID IDs and to check the status of the each and every book whether it is issued or not using the LibRFID software. Each student or staff has issued RFID IDs and each has got unique id number and in the Library software for that id is stored with the student or staff detail. Whenever student or staff needs any book from the Library to be issued, he or she needs to swipe his RFID card in front of the RFID Card Reader placed in the Library after that he have to swipe the book in front of RFID reader. Once the rfid readers read the tag value it checks whether the student or staff got membership or not, and the details of the book by communicating with RFID Card Reader and database of the LibRFID software. If student or staff has the membership and books detail is found in the data base then the book has been issued in the particular student or staff name. If any user of the library will not follow the above procedure and try to go out of the library the rfid gate reader reads the tag in the book and it send the tag to the server which is connected to the gate and search for authentic issue of that book if the book is not authentically issued then the software buzz the buzzer loudly to indicate the book has been taken out without issued authentically so the security person or library person can stop that user from taking that book out of library premises. The LibRFID Software is implemented using.net platform using VB.NET as a front end and Microsoft SQLServer 2008 Express as back end to maintain the database. VI. RESULTS AND DISCUSSION In the LibRFID first is needed to attach the reader to system and have to connect it via COM ports. COM port number of the particular rfid has been searched first then has to choose that port number in the LibRFID software to configure the port to the rfid. After configuring successfully we can use the RFID reader to read the rfid IDs and rfid tags. After Successful reading the tags the tags values are used to track the resources in the library with the database and also for issuing the books, returning the books or to reissue the books we use the same ID. If anyone tries to take the library Copyright to IJIRCCE www.ijircce.com 45

resource out of the library without issuing it from the counter the buzzer in the LibRFID will be buzzed to indicate book has been stolen. Some of the Screen shots of the applications are as follows Figure 3. Connecting RFID reader module with LibRFID System With help of COM Ports Figure 4. Reading the RFID Tags After Connecting RFID reader module with LibRFID System With help of COM Ports VII. CONCLUSION According to the Library Science 4 th Law Save the time of the reader -the time of the user should be saved when he or she is searching some resource in library. The LibRFID in the library speeds up book borrowing, monitoring, books searching processes and thus frees the library staff to do more user-service tasks and helps the library user to get their desired books easily. Thus LibRFID is able to fulfill this law by speeding library process and providing extra service to the library user thus the time of the users is saved lot since library staff provided a right way to find the book instead of searching it here and there in the library building. The RFID system may be a system that helps to implement both the security and materials tracking needs of a library. The significant advantage of LibRFID systems is the non-contact, non-line-of-sight nature of the technology. Further improvement can be done by using a method in which the tag encrypts its ID and then sends to the reader, which will eliminate the capturing of the tag IDs and hence cloning the tags. Right Now the LibRFID will work for low frequency range tags we can extend our implementation for the higher frequency ranges by implementing a reader which can read the high frequency ranges. REFERENCES [1] Karen Coyle, Management of RFID in Libraries, Preprint version of article published in the Journal of Academic Librarianship, v. 31, n. 5, pp. 486-489 [2] Daniel McPherson and Vinod Chachra. Personal privacy and use of RFID technology in libraries. White Paper, VTLS Inc., October 2003 (www.vtls.com/documents/privacy.pdf ) [3] Kamran AHSAN, Hanifa SHAH and Paul KINGSTON, RFID Applications: An Introductory and Exploratory Study, IJCSI International Journal of Computer Science Issues, Volume 7, Issue 1, No. 3, January 2010. [4] Irani, Zahir; Gunasekaran, Angappa; Dwivedi, Yogesh K, Radio frequency identification (RFID): research trends and framework, International Journal of Production Research, May2010, Vol. 48 Issue 9 p2485-2511. Copyright to IJIRCCE www.ijircce.com 46

[5] Stephen a. Weis, Sanjay E.Sarma, Ronald.L.Rivest a paper on Security and privacy aspects of low cost radio frequency identification systems, Proc. Int. Conf. Security in Pervasive Comput., vol. 2802, pp.454-469 2003 :Springer-Verlag [6] Gynanendra K Verma, Pawan Tripathi, IIIT Allahabad a paper on A digital security system with door lock system using rfid technology, International Journal of Computer Applications p0975 8887,Volume 5 No.11, August 2010 [7] Xiao, Y., Yu, S., Wu, K., Ni, Q., Janecek., C., Nordstad, J, Radio frequency identification: technologies, applications, and research issues Wiley Journal of Wireless Communications and Mobile Computing, Vol 7, May 2007. Copyright to IJIRCCE www.ijircce.com 47