Академический Документы
Профессиональный Документы
Культура Документы
II – Hardware Design
A. Block Diagram
The reader antenna senses the tag and checks for the unique
serial number of the tag when we bring the tag in front of
the reader or in close proximity to the reader. If the tag is
registered in the database of the reader, the reader will
authenticate the tag otherwise the reader will show an error
and will give the message that the tag is not registered or
that the tag is not authenticated.
Three types of tags are available: read only, WORM, and
read / write. Tags are "read only" if they are encoded and not
rewritable at the time of manufacture. "WORM" (Write-
Once-Read-Many)tags are programmed by the organization
that uses them, but later without the ability to rewrite the
data. "Tags for reading / writing,"
Arduino Mega is used to control the all functions.Memory
card is used for the database.
TFT LCD touch screen lcd which is used in our project.
On the TFT LCD we have established a GUI(graphical user
interface) to perform actions like registering of student,
book data in database and issuing and reissuing of book.
Registration of Book:
When we have scanned the unknown RFID tag to the RC-
522 reader module placed at desk the GUI menu on the
TFT LCD has opened ,where we have added the book
name,author name.After that by clicking on “Register ”
book has been registered in the database.
Registration of Student: IV - CONCLUSION
Again we have scanned the unknown RFID tag to the RC- Radio Frequency Identification (RFID) Systems have been
522 reader module placed at desk the GUI menu on the in use in libraries for book identification, for self checkout,
TFT LCD has opened ,where we have added the student for anti-theft control, for inventory control, and for the
name,roll number.After that by clicking on “Register ” sorting and conveying of library books. These applications
student has been registered registered. can lead to significant savings in labor costs, enhance
Libraries Book Information: customer service, lower book theft and provide a constant
When a person wants to know the stock of library he can do record update of new collections of books. It also speeds up
this by simply scaning his card to RC-522 module placed at book borrowing, returning and monitoring, and thus frees
the desk and and the issued book details and remaining staff from doing manual work so that they could be used to
book details will be opened on the TFT LCD. enhance user-services task. The efficiency of the system
Entrance Level: depends upon the information to be written in tag. To yield
First RFID reader module RC522 is placed at the gate.When best performance, RFID readers and RFID tags to be used
a person wants to make access to the library he will scan his must be of good quality.
RFID card to reader module.Only that person could make REFERENCES
access to library who has been authorized with registered [1] Karen Coyle, “Management of RFID in Libraries”
RFID tag. ,Preprint version of article published in the Journal of
Issue Process: Academic Librarianship, v. 31, n. 5, pp. 486-489
When a user wants to issue the book he will go to second [2] Smart, Laura "Making Sense of RFID," Netconnect
RFID placed at the desk and then firstly he will place the (Fall, 2004): 4-14.
book’s card infront of reader module and then he will place [3] RFID Based Library Management System,
his own card to reader module and that book will be issued Dhanalakshmi M, Uppala Mamatha.
against his name. Finally a message is displayed informing [4] RFID and Organizational Transformation in the
the user that the ISSUE has been successful National Library Board of Singapore Paul Raj DEVADOSS
Return Process: [5] RFID Technology: A Revolution in Library
When a user wants to return the book he will go again to Management, By Dr. Indira Koneru.
second RFID reader module placed at the desk and then
[6] Roadmap for RFID Implementation in Central [9] Finkenzeller, RFID Handbook: Fundamentals and
Library,PEC University of Technology, By Seema Vasishta Applications, 2nd ed., Wiley 2003. (Chapter 3)
[7] Bansode, S.Y. & Desale, S.K. (2009).Implementation of [10] Classification of RFID Systems,Prof. Robert Merelos-
RFID technology in University of Pune Library. Program: Zaragoza, Department of Electrical Engineering, San Jose
electronic library and information systems, 43(2), 202-214. State University.
[8] Radio Frequency Identification (RFID) Vs Barcodes,
ElectroCom (Australia) Pty Ltd.
W