SlideShare a Scribd company logo
1 of 39
Download to read offline
RFID
for Resource Management
By
N.PRAVEEN RAJ
SAMS College Of Engineering And Technology(SCET)
&
ALTANAI BISHT
Veltech Multitech Dr Rangarajan
Dr Sakunthala Engg College
Modules :LIBRARY MANAGEMENT USING
RFID READER
1. INTRODUCTION: RADIO FREQUENCY IDENTIFICATION
2. SYSTEM ANALYSIS:
Feasibility Study
Existing System
Proposed System
Requirement Analysis
3. FLOW DIAGRAM
4. SYSTEM ARCHITECTURE
System Architecture
System Implementation
5. SOFTWARE SPECIFICATION
6.CONCLUSION
INTRODUCTION :
● RFID :RADIO FREQUENCY IDENTIFICATION
● It has a purpose of identification and tracking
using radio waves
● There two types of RFID :Active RFID And
Passive RFID
INTRODUCTION :RFID :RADIO
FREQUENCY IDENTIFICATION
◼ RFID is a technology for identification using
radio waves. Its main parts are: an RFID
identifier (a tag, also called a responder), an
RFID reader and a data system for handling
the information. RFID tags, which include an
antenna and a chip for information storage,
are commonly installed on targets that need
to be identified
RFID TECHNOLOGY
DIFFERENT RFID CHIP
RFID READER
RFID TAG
SYSTEM ANALYSIS:
➢ Feasibility Study
➢ Existing System
➢ Proposed System
➢ Requirement Analysis
FEASIBILITY STUDY:
The feasibility of the project is analyzed in this
phase and business proposal is put forth with a
very general plan for the project and some cost
estimates..
Three key considerations involved in the feasibility
analysis are
➢ ECONOMICAL FEASIBILITY
➢ TECHNICAL FEASIBILITY
➢ SOCIAL FEASIBILITY
SYSTEM ANALYSIS:
2.1.1 Economical Feasibility:
This study is carried out to check the
economic impact that the system will have on the
organization.
2.1.2 Technical Feasibility:
This Any system developed must not have
a high demand on the available technical
resources.
2.1.3 Social Feasibility:
The aspect of study is to check the level of
acceptance of the system by the user.
Existing System
The students and staffs are taking books by searching
their related title in every rack from a library. This may
be a complex term if there are so many racks available
in a library..
Proposed System
In the proposed system, the students and staffs can
take books using their mobile phone and a RFID tag.
The admin can add or update the new book entries
through the web-site.
SYSTEM ANALYSIS:
REQUIREMENT ANALYSIS
Hardware Requirements
Processor : PENTIUM4
Mother board : Intel 815 chipset
Ram : 512 MB
Hard disk drive : 40 GB
Monitor : SAMSUNG 20” color
Keyboard : Logitech 110 keys
Mouse : Logitech scroll
Software Requirements
Development kit : JDK 1.5
Operating System : windows XP
Tool : Sun Java Wireless Toolkit
Back End : Ms-Access
Flow diagrams :
◼ In the dataflow diagram ,is used explain about
the authentication process has been carrying
out .
Flow diagrams :level 0
1. Validate the
username and
Password
2. Choose a
product from the
menu
Admin
Login
Valid/ Invalid
Student/Staff Login Valid/Invalid
Flow diagrams :level 1
SERVER
Admin Upload Book
Details
View/Delete
Book Details
Book ID
Displays the details of
the Author Name, Book
Name and No. of Issues,
which is matching with
that given ID or Deletes
the particular book
details
Adding new books to the
library or deleting the book
details
Student/Staff
Login
Taking books from
the Library
Level 2Administrator
View/Delete
Book Details
of the given ID
Upload/Delete the
book details
SERVER
Student/Staff
Login
Display the details of the
author name, book
name and no. of issues
of the corresponding
Book ID or Delete the
corresponding book
detail
Valid/ Invalid
The RFID Tag reads
the details of the titles
of the books available
in the Rack
Lists the selected title
related book’s
Author Name and
Version
By selecting any one of the
item from the list, it will
display the corresponding
sub-menus and then displays
the details of the books as
per the input given
Upload the new entries
into the library account.
The book details can also
be deleted by giving the
book id
Authentication level of the
ADMINISTRATOR:
Start
Login
View Book Details
C
Upload Book Details
Add Detail Delete Detail
BA
AUTHENTICATION LEVEL OF THE
STUDENT AND STAFF:
Stop
Start
Login
Lists of titles available in the rack
and display the details in the
student’s or staff’s mobile phones.
Lists the available sub-menus of
the selected item
The list of books available under the
selected category is retrieved from the
database and displayed in the user’s
mobile phones
SYSTEM ARCHITECTURE
Wireless
Network SERVER
User’s Mobile
Phone
SYSTEM ARCHITECTURE
◼ This scenario explain about how the rfid
reader works in wireless network
◼ In the server side, the application will use a
web server and a database
◼ A client side application is developed for the
phone.
SYSTEM ARCHITECTURE
SYSTEM ARCHITECTURE
After entering all the details, the details are
transferred into a RFID reader. And this RFID
reader is fixed in the Racks available in the
library
SOFTWARE SPECIFICATION
• Software Used: Core Java and jdk 1.5 or Later
• “Java: A simple, object-oriented, distributed,
interpreted, robust, secure, architecture neutral,
portable, high performance, multithreaded and
dynamic language”.
Java:
• A language developed by Sun Microsystems
• A general-purpose language
• High-level language
• Developed initially for consumer devices
• Popular platform to develop enterprise applications
COMPLETE SCENARIO OF LIBRARY
MANAGEMENT SYSTEM USING RFID
COMPLETE SCENARIO OF LIBRARY
MANAGEMENT SYSTEM USING RFID
COMPLETE SCENARIO OF LIBRARY
MANAGEMENT SYSTEM USING RFID
COMPLETE SCENARIO OF LIBRARY
MANAGEMENT SYSTEMUSING RFID
SCREEN SHOTS
THE SELECT THE
APPICATION
THE SELECTION
THE
AUTHENTICATION
LEVEL OF THE
USER
ENTER THE TAG
NAME
Choose
the
type
Select the
option which
are available:
Choose the
subject
Verifyinf if the books are properly
issued before the exit
Book return process
Conclusion
➢The RFID technology brings needed functions for developing and
building a modern identification system for decreasing mistakes in
healthcare. With these technologies, controlling different materials
and records can be improved
➢The system presented was based on a combination of wireless,
J2ME and RFID technology

More Related Content

What's hot

Rfid for library management system printronix
Rfid for library management system printronixRfid for library management system printronix
Rfid for library management system printronixBlaze_Hyd
 
RFID for Modern libraries
RFID for Modern libraries RFID for Modern libraries
RFID for Modern libraries K L universityH
 
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIANAPPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIANKartika Mahajan
 
Attendance management system using rfid or biomatric
Attendance management system using rfid or biomatricAttendance management system using rfid or biomatric
Attendance management system using rfid or biomatricShitalinfotech
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in librariesShivashish Verma
 
Has RFID any more to offer libraries - or has demand peaked?
Has RFID any more to offer libraries - or has demand peaked?Has RFID any more to offer libraries - or has demand peaked?
Has RFID any more to offer libraries - or has demand peaked?Michael Fortune
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDEcoTrackSystemsETSRF
 
30 minute guide to Library RFID
30 minute guide to Library RFID30 minute guide to Library RFID
30 minute guide to Library RFIDMichael Fortune
 
The Future of Library RFID - a Personal View
The Future of Library RFID - a Personal ViewThe Future of Library RFID - a Personal View
The Future of Library RFID - a Personal ViewMichael Fortune
 
RFID Based Student Attendance Management System in India
RFID Based Student Attendance Management System in IndiaRFID Based Student Attendance Management System in India
RFID Based Student Attendance Management System in IndiaSmart Schooling
 
The Skinny on RFID and Automated Materials Handling in Library
The Skinny on RFID and Automated Materials Handling in Library The Skinny on RFID and Automated Materials Handling in Library
The Skinny on RFID and Automated Materials Handling in Library loriayre
 
RFID: What is it? Where is it going? Is it right for you library?
RFID: What is it?  Where is it going? Is it right for you library?RFID: What is it?  Where is it going? Is it right for you library?
RFID: What is it? Where is it going? Is it right for you library?loriayre
 
Using rfid technology to develop an attendance system and avoid traffic 1
Using rfid technology to develop an attendance system and avoid traffic 1Using rfid technology to develop an attendance system and avoid traffic 1
Using rfid technology to develop an attendance system and avoid traffic 1Baghya Lakshmi
 
Library management system
Library management systemLibrary management system
Library management systemRaaghav Bhatia
 

What's hot (20)

Rfid for library management system printronix
Rfid for library management system printronixRfid for library management system printronix
Rfid for library management system printronix
 
RFID for Modern libraries
RFID for Modern libraries RFID for Modern libraries
RFID for Modern libraries
 
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIANAPPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
 
Rfid e273b
Rfid e273bRfid e273b
Rfid e273b
 
Attendance management system using rfid or biomatric
Attendance management system using rfid or biomatricAttendance management system using rfid or biomatric
Attendance management system using rfid or biomatric
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in libraries
 
Has RFID any more to offer libraries - or has demand peaked?
Has RFID any more to offer libraries - or has demand peaked?Has RFID any more to offer libraries - or has demand peaked?
Has RFID any more to offer libraries - or has demand peaked?
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFID
 
30 minute guide to Library RFID
30 minute guide to Library RFID30 minute guide to Library RFID
30 minute guide to Library RFID
 
RFID
RFIDRFID
RFID
 
Frid smart lms
Frid smart lmsFrid smart lms
Frid smart lms
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
The Future of Library RFID - a Personal View
The Future of Library RFID - a Personal ViewThe Future of Library RFID - a Personal View
The Future of Library RFID - a Personal View
 
RFID Based Student Attendance Management System in India
RFID Based Student Attendance Management System in IndiaRFID Based Student Attendance Management System in India
RFID Based Student Attendance Management System in India
 
The Skinny on RFID and Automated Materials Handling in Library
The Skinny on RFID and Automated Materials Handling in Library The Skinny on RFID and Automated Materials Handling in Library
The Skinny on RFID and Automated Materials Handling in Library
 
RFID: What is it? Where is it going? Is it right for you library?
RFID: What is it?  Where is it going? Is it right for you library?RFID: What is it?  Where is it going? Is it right for you library?
RFID: What is it? Where is it going? Is it right for you library?
 
Using rfid technology to develop an attendance system and avoid traffic 1
Using rfid technology to develop an attendance system and avoid traffic 1Using rfid technology to develop an attendance system and avoid traffic 1
Using rfid technology to develop an attendance system and avoid traffic 1
 
Rfid based smart lms with logo
Rfid based smart lms with logoRfid based smart lms with logo
Rfid based smart lms with logo
 
Rfid based smart lms intro
Rfid based smart lms introRfid based smart lms intro
Rfid based smart lms intro
 
Library management system
Library management systemLibrary management system
Library management system
 

Viewers also liked

Library Management System
Library Management SystemLibrary Management System
Library Management SystemAditya Shah
 
Current Issues in Library RFID
Current Issues in Library RFIDCurrent Issues in Library RFID
Current Issues in Library RFIDMichael Fortune
 
JAVA AND MYSQL QUERIES
JAVA AND MYSQL QUERIES JAVA AND MYSQL QUERIES
JAVA AND MYSQL QUERIES Aditya Shah
 
RFID based car parking system-final ver
RFID based car parking system-final verRFID based car parking system-final ver
RFID based car parking system-final verDebasis Nayak
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Feasibility report
Feasibility reportFeasibility report
Feasibility reportnithishpro
 
online library management system
online library management systemonline library management system
online library management systemVirani Sagar
 
AUTOMATED FOOTBALL MANAGEMENT SYSTEM
AUTOMATED FOOTBALL MANAGEMENT SYSTEMAUTOMATED FOOTBALL MANAGEMENT SYSTEM
AUTOMATED FOOTBALL MANAGEMENT SYSTEMAbhishek Kumar
 
Library Management System PPT
Library Management System PPTLibrary Management System PPT
Library Management System PPTTamaghna Banerjee
 

Viewers also liked (10)

Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Current Issues in Library RFID
Current Issues in Library RFIDCurrent Issues in Library RFID
Current Issues in Library RFID
 
JAVA AND MYSQL QUERIES
JAVA AND MYSQL QUERIES JAVA AND MYSQL QUERIES
JAVA AND MYSQL QUERIES
 
RFID based car parking system-final ver
RFID based car parking system-final verRFID based car parking system-final ver
RFID based car parking system-final ver
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Feasibility report
Feasibility reportFeasibility report
Feasibility report
 
online library management system
online library management systemonline library management system
online library management system
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
AUTOMATED FOOTBALL MANAGEMENT SYSTEM
AUTOMATED FOOTBALL MANAGEMENT SYSTEMAUTOMATED FOOTBALL MANAGEMENT SYSTEM
AUTOMATED FOOTBALL MANAGEMENT SYSTEM
 
Library Management System PPT
Library Management System PPTLibrary Management System PPT
Library Management System PPT
 

Similar to RFID in Assets and Library Management

Java based rfid attendance management system
Java based rfid attendance  management systemJava based rfid attendance  management system
Java based rfid attendance management systemAA Tech
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsPratul Sharma
 
Automated location tracking_using_bluetooth
Automated location tracking_using_bluetoothAutomated location tracking_using_bluetooth
Automated location tracking_using_bluetoothabyaz
 
Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...Dominique Guinard
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
Presentation 3 software developer in rfid
Presentation 3 software developer in rfidPresentation 3 software developer in rfid
Presentation 3 software developer in rfidMouhanad Alkhaldi
 
2 d barcode based mobile payment system
2 d barcode based mobile payment system2 d barcode based mobile payment system
2 d barcode based mobile payment systemParag Tamhane
 
IRJET- Development and Implementation of Smart RFID based Library Managem...
IRJET-  	  Development and Implementation of Smart RFID based Library Managem...IRJET-  	  Development and Implementation of Smart RFID based Library Managem...
IRJET- Development and Implementation of Smart RFID based Library Managem...IRJET Journal
 
Arch stylesandpatternsmi
Arch stylesandpatternsmiArch stylesandpatternsmi
Arch stylesandpatternsmilord14383
 
Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Ollie Whitehouse
 
Wireless lan scope and sequences
Wireless lan scope and sequencesWireless lan scope and sequences
Wireless lan scope and sequencesKumar
 

Similar to RFID in Assets and Library Management (20)

Java based rfid attendance management system
Java based rfid attendance  management systemJava based rfid attendance  management system
Java based rfid attendance management system
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
posterPDF
posterPDFposterPDF
posterPDF
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
 
Automated location tracking_using_bluetooth
Automated location tracking_using_bluetoothAutomated location tracking_using_bluetooth
Automated location tracking_using_bluetooth
 
Resume
ResumeResume
Resume
 
Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...
 
Remote Web Desk
Remote Web DeskRemote Web Desk
Remote Web Desk
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
CV-short
CV-shortCV-short
CV-short
 
NewGenLib 3.0 Presentation
NewGenLib 3.0 PresentationNewGenLib 3.0 Presentation
NewGenLib 3.0 Presentation
 
2017 dagstuhl-nfv-rothenberg
2017 dagstuhl-nfv-rothenberg2017 dagstuhl-nfv-rothenberg
2017 dagstuhl-nfv-rothenberg
 
Presentation 3 software developer in rfid
Presentation 3 software developer in rfidPresentation 3 software developer in rfid
Presentation 3 software developer in rfid
 
2 d barcode based mobile payment system
2 d barcode based mobile payment system2 d barcode based mobile payment system
2 d barcode based mobile payment system
 
IRJET- Development and Implementation of Smart RFID based Library Managem...
IRJET-  	  Development and Implementation of Smart RFID based Library Managem...IRJET-  	  Development and Implementation of Smart RFID based Library Managem...
IRJET- Development and Implementation of Smart RFID based Library Managem...
 
Arch stylesandpatternsmi
Arch stylesandpatternsmiArch stylesandpatternsmi
Arch stylesandpatternsmi
 
Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems
 
Wireless lan scope and sequences
Wireless lan scope and sequencesWireless lan scope and sequences
Wireless lan scope and sequences
 
Kathiravan-T
Kathiravan-TKathiravan-T
Kathiravan-T
 

More from ALTANAI BISHT

Practical byzantine fault tolerance by altanai
Practical byzantine fault tolerance by altanaiPractical byzantine fault tolerance by altanai
Practical byzantine fault tolerance by altanaiALTANAI BISHT
 
Ramudroid presented in woman in robotics 2021
Ramudroid  presented in woman in robotics 2021Ramudroid  presented in woman in robotics 2021
Ramudroid presented in woman in robotics 2021ALTANAI BISHT
 
Telecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learningTelecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learningALTANAI BISHT
 
Machine Learning applications in Voice over IP
Machine Learning applications in Voice over IPMachine Learning applications in Voice over IP
Machine Learning applications in Voice over IPALTANAI BISHT
 
Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IPALTANAI BISHT
 
Plivo webrtc telephony in your browser
Plivo webrtc telephony in your browserPlivo webrtc telephony in your browser
Plivo webrtc telephony in your browserALTANAI BISHT
 
Hybrid Smart Grid System for Renewable energy
Hybrid Smart Grid System for Renewable energyHybrid Smart Grid System for Renewable energy
Hybrid Smart Grid System for Renewable energyALTANAI BISHT
 
Unified Communications and Collaborations (UC&C)
Unified Communications and Collaborations (UC&C)Unified Communications and Collaborations (UC&C)
Unified Communications and Collaborations (UC&C)ALTANAI BISHT
 
Media Streams in IOT via WebRTC
Media Streams in IOT  via WebRTCMedia Streams in IOT  via WebRTC
Media Streams in IOT via WebRTCALTANAI BISHT
 
Hackaday ramudroid 6.5
Hackaday ramudroid 6.5Hackaday ramudroid 6.5
Hackaday ramudroid 6.5ALTANAI BISHT
 
WbeRTC in IOT presented in KrankyGeek
WbeRTC in IOT presented in KrankyGeekWbeRTC in IOT presented in KrankyGeek
WbeRTC in IOT presented in KrankyGeekALTANAI BISHT
 
Ramu droid for swach bharat abhiyaan
Ramu droid for swach bharat abhiyaanRamu droid for swach bharat abhiyaan
Ramu droid for swach bharat abhiyaanALTANAI BISHT
 
Ramu droid @gracehopper
Ramu droid @gracehopperRamu droid @gracehopper
Ramu droid @gracehopperALTANAI BISHT
 
Single board computer options
Single board computer optionsSingle board computer options
Single board computer optionsALTANAI BISHT
 
Real time control and communication ( Robots , Machines , IOT )
Real time control and communication ( Robots , Machines , IOT )Real time control and communication ( Robots , Machines , IOT )
Real time control and communication ( Robots , Machines , IOT )ALTANAI BISHT
 
Augmented reality in web rtc browser
Augmented reality in web rtc browserAugmented reality in web rtc browser
Augmented reality in web rtc browserALTANAI BISHT
 

More from ALTANAI BISHT (20)

Practical byzantine fault tolerance by altanai
Practical byzantine fault tolerance by altanaiPractical byzantine fault tolerance by altanai
Practical byzantine fault tolerance by altanai
 
Cinemarkup
CinemarkupCinemarkup
Cinemarkup
 
Ramudroid presented in woman in robotics 2021
Ramudroid  presented in woman in robotics 2021Ramudroid  presented in woman in robotics 2021
Ramudroid presented in woman in robotics 2021
 
Telecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learningTelecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learning
 
Machine Learning applications in Voice over IP
Machine Learning applications in Voice over IPMachine Learning applications in Voice over IP
Machine Learning applications in Voice over IP
 
Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IP
 
Ramudroid
RamudroidRamudroid
Ramudroid
 
Plivo webrtc telephony in your browser
Plivo webrtc telephony in your browserPlivo webrtc telephony in your browser
Plivo webrtc telephony in your browser
 
Hybrid Smart Grid System for Renewable energy
Hybrid Smart Grid System for Renewable energyHybrid Smart Grid System for Renewable energy
Hybrid Smart Grid System for Renewable energy
 
Unified Communications and Collaborations (UC&C)
Unified Communications and Collaborations (UC&C)Unified Communications and Collaborations (UC&C)
Unified Communications and Collaborations (UC&C)
 
Media Streams in IOT via WebRTC
Media Streams in IOT  via WebRTCMedia Streams in IOT  via WebRTC
Media Streams in IOT via WebRTC
 
Ramudroid v7.0
Ramudroid v7.0Ramudroid v7.0
Ramudroid v7.0
 
Hackaday ramudroid 6.5
Hackaday ramudroid 6.5Hackaday ramudroid 6.5
Hackaday ramudroid 6.5
 
WbeRTC in IOT presented in KrankyGeek
WbeRTC in IOT presented in KrankyGeekWbeRTC in IOT presented in KrankyGeek
WbeRTC in IOT presented in KrankyGeek
 
Ramu droid for swach bharat abhiyaan
Ramu droid for swach bharat abhiyaanRamu droid for swach bharat abhiyaan
Ramu droid for swach bharat abhiyaan
 
Ramu droid @gracehopper
Ramu droid @gracehopperRamu droid @gracehopper
Ramu droid @gracehopper
 
Single board computer options
Single board computer optionsSingle board computer options
Single board computer options
 
Ramu droid
Ramu droidRamu droid
Ramu droid
 
Real time control and communication ( Robots , Machines , IOT )
Real time control and communication ( Robots , Machines , IOT )Real time control and communication ( Robots , Machines , IOT )
Real time control and communication ( Robots , Machines , IOT )
 
Augmented reality in web rtc browser
Augmented reality in web rtc browserAugmented reality in web rtc browser
Augmented reality in web rtc browser
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

RFID in Assets and Library Management

  • 1. RFID for Resource Management By N.PRAVEEN RAJ SAMS College Of Engineering And Technology(SCET) & ALTANAI BISHT Veltech Multitech Dr Rangarajan Dr Sakunthala Engg College
  • 2. Modules :LIBRARY MANAGEMENT USING RFID READER 1. INTRODUCTION: RADIO FREQUENCY IDENTIFICATION 2. SYSTEM ANALYSIS: Feasibility Study Existing System Proposed System Requirement Analysis 3. FLOW DIAGRAM 4. SYSTEM ARCHITECTURE System Architecture System Implementation 5. SOFTWARE SPECIFICATION 6.CONCLUSION
  • 3. INTRODUCTION : ● RFID :RADIO FREQUENCY IDENTIFICATION ● It has a purpose of identification and tracking using radio waves ● There two types of RFID :Active RFID And Passive RFID
  • 4. INTRODUCTION :RFID :RADIO FREQUENCY IDENTIFICATION ◼ RFID is a technology for identification using radio waves. Its main parts are: an RFID identifier (a tag, also called a responder), an RFID reader and a data system for handling the information. RFID tags, which include an antenna and a chip for information storage, are commonly installed on targets that need to be identified
  • 8. SYSTEM ANALYSIS: ➢ Feasibility Study ➢ Existing System ➢ Proposed System ➢ Requirement Analysis
  • 9. FEASIBILITY STUDY: The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates.. Three key considerations involved in the feasibility analysis are ➢ ECONOMICAL FEASIBILITY ➢ TECHNICAL FEASIBILITY ➢ SOCIAL FEASIBILITY
  • 10. SYSTEM ANALYSIS: 2.1.1 Economical Feasibility: This study is carried out to check the economic impact that the system will have on the organization. 2.1.2 Technical Feasibility: This Any system developed must not have a high demand on the available technical resources. 2.1.3 Social Feasibility: The aspect of study is to check the level of acceptance of the system by the user.
  • 11. Existing System The students and staffs are taking books by searching their related title in every rack from a library. This may be a complex term if there are so many racks available in a library.. Proposed System In the proposed system, the students and staffs can take books using their mobile phone and a RFID tag. The admin can add or update the new book entries through the web-site. SYSTEM ANALYSIS:
  • 12. REQUIREMENT ANALYSIS Hardware Requirements Processor : PENTIUM4 Mother board : Intel 815 chipset Ram : 512 MB Hard disk drive : 40 GB Monitor : SAMSUNG 20” color Keyboard : Logitech 110 keys Mouse : Logitech scroll Software Requirements Development kit : JDK 1.5 Operating System : windows XP Tool : Sun Java Wireless Toolkit Back End : Ms-Access
  • 13. Flow diagrams : ◼ In the dataflow diagram ,is used explain about the authentication process has been carrying out .
  • 14. Flow diagrams :level 0 1. Validate the username and Password 2. Choose a product from the menu Admin Login Valid/ Invalid Student/Staff Login Valid/Invalid
  • 15. Flow diagrams :level 1 SERVER Admin Upload Book Details View/Delete Book Details Book ID Displays the details of the Author Name, Book Name and No. of Issues, which is matching with that given ID or Deletes the particular book details Adding new books to the library or deleting the book details Student/Staff Login Taking books from the Library
  • 16. Level 2Administrator View/Delete Book Details of the given ID Upload/Delete the book details SERVER Student/Staff Login Display the details of the author name, book name and no. of issues of the corresponding Book ID or Delete the corresponding book detail Valid/ Invalid The RFID Tag reads the details of the titles of the books available in the Rack Lists the selected title related book’s Author Name and Version By selecting any one of the item from the list, it will display the corresponding sub-menus and then displays the details of the books as per the input given Upload the new entries into the library account. The book details can also be deleted by giving the book id
  • 17. Authentication level of the ADMINISTRATOR: Start Login View Book Details C Upload Book Details Add Detail Delete Detail BA
  • 18. AUTHENTICATION LEVEL OF THE STUDENT AND STAFF: Stop Start Login Lists of titles available in the rack and display the details in the student’s or staff’s mobile phones. Lists the available sub-menus of the selected item The list of books available under the selected category is retrieved from the database and displayed in the user’s mobile phones
  • 20. SYSTEM ARCHITECTURE ◼ This scenario explain about how the rfid reader works in wireless network ◼ In the server side, the application will use a web server and a database ◼ A client side application is developed for the phone.
  • 22. SYSTEM ARCHITECTURE After entering all the details, the details are transferred into a RFID reader. And this RFID reader is fixed in the Racks available in the library
  • 23. SOFTWARE SPECIFICATION • Software Used: Core Java and jdk 1.5 or Later • “Java: A simple, object-oriented, distributed, interpreted, robust, secure, architecture neutral, portable, high performance, multithreaded and dynamic language”. Java: • A language developed by Sun Microsystems • A general-purpose language • High-level language • Developed initially for consumer devices • Popular platform to develop enterprise applications
  • 24. COMPLETE SCENARIO OF LIBRARY MANAGEMENT SYSTEM USING RFID
  • 25. COMPLETE SCENARIO OF LIBRARY MANAGEMENT SYSTEM USING RFID
  • 26. COMPLETE SCENARIO OF LIBRARY MANAGEMENT SYSTEM USING RFID
  • 27. COMPLETE SCENARIO OF LIBRARY MANAGEMENT SYSTEMUSING RFID
  • 29.
  • 37. Verifyinf if the books are properly issued before the exit
  • 39. Conclusion ➢The RFID technology brings needed functions for developing and building a modern identification system for decreasing mistakes in healthcare. With these technologies, controlling different materials and records can be improved ➢The system presented was based on a combination of wireless, J2ME and RFID technology