Abstract

Purpose: The aim of this project is to design and build a library management system based on radio frequency identification that will help the librarian manage the shelves with less human involvement.
 Methodology: A dc supply at +5volts was connected to the microcontroller, with a voltage of +12volts dc connected to the buzzer, and a step-down transformer was used to convert 220volts to 5volts in this system. This power supply was connected to the switch, and by pressing a switch button, the current passed through the entire circuit. RFID collects all the data from the RFID tag. Using a UART module, the EM-18 RFID reader module was connected to 5v pic microcontrollers. The EM-1 RFID reader will read the tag number from an RFID tag when it is placed in its field of operation and output the information via a TX terminal. In order to signal successful tag detection, the beep terminal will turn low. Once the card is in front of the RFID reader, the student extracts the data from it and compares it to the data that is stored in the microprocessor, which is coded using embedded c language. If the data matches, the information is shown on the LCD.
 Finding: A library management system based on radio frequency identification and detection (RFID) was developed in this study to improve library use and management. To efficiently identify and manage the books, it will make use of the RFID reader. The student can search the database and, if the book is available, pick it up from the library because the database displays the book's availability at the library. The main advantages of this project in libraries include time savings, quick access to books, and the elimination of manual errors.
 Unique Contribution to Theory, Practice and policy: Every inventive technical design has its limits. This passive RFID-based library management system has some limitations as a technology for precise data collection. This study recommend that the RFID reader should be improved so that it has finger and thumb print access, which is needed to access student data and details. However, it should also include a facial recognition application, which would further strengthen the biometric security of the system and protect it from impersonation by careless students.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call