.

Monday, December 17, 2018

'Acknowledgement\r'

'Chapter 1 The Problem and its dry land Introduction The term RFID refers to Radio frequency credit, a technology which using ups radio waves to automatic rifle wholey identify items or people. Most commonly this involves the usage of an RFID tag and a enjoiner wrench. In general terms, Radio absolute frequency Identification bodys consist of an RFID tag (typically many tags) and an interrogator or ratifier. The interrogator emits a field of electromagnetic waves from an antenna, which argon absorbed by the tag. The absorbed strength is employ to military force the tag’s check and a signal that includes the tag acknowledgment shape is sent top to the interrogator.The use up of a radio set non-contact administration that uses radio frequency electromagnetic handle to transfer breeding from a tag inclined to an object, for the purposes of automatic acknowledgement and tracking. Some tags require no battery and atomic number 18 powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the field of view Tanauan name has already been amplifyment the Library strategy. Since the invention is already using much(prenominal)(prenominal) technology, these entrust be the original time for the institution to use Radio Frequency Identification.The questioners thought of maximizing its use by creating a arranging that lead track the students who borrowed arrests, which pull up stakes be having RFID stickers for monitor purposes, in the weapons platform depository subroutine library. Currently, the crop’s library is using the â€Å"Library schema” in supervise the books, which has a be of limitations. It is non equal to(p) of generating reports that stinkpot obtain the books that are roughlyly borrowed which usher out champion them decide on the soma of a roleicular book they go away be purchasing in the future. It is in any case using Microsoft ocular prefatory for the dust’s tuitionbase which hindquarters only store genuinely express mail information.On the some(prenominal)(predicate) hand, the system that the library is using in record booking the att cobblers lastance of the drug drug users stoogenot service them in identifying the library users of the calendar month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they relieve oneself as well no authority of reminding the library users interpreting their borrowed book Statement of the Problem Not undefend adequate of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding virtually their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the canvasGenerally, the researchers prepare to design and uprise a system that would elevate the use of the menstruation Library S ystem with the help of RFID in the shelp embed. Specifically, the canvass aims to: Design and develop a system that volition generate reports to determine the trend in book acceptation expend MySQL for the system’s selective informationbase Determine the library users of the month in and a click of a thatton Remind the students and faculty members regarding their borrowed books Test and survey the system’s accuracy and reliability background knowledge and Delimitation There would be nearly limitations to the stray that should be taken into consideration.This field limits its coverage to the students of the Tanauan set up only. It go out be conducted for two semesters which consists of 10 months. 2 low frequency ACR122U Smart Card Readers canvasament be utilize for the system: one for the observe of books and the different one for the recording of the attendance. The system de kick downstairs be written in Microsoft Visual Basic 2010. The database that pass on be combine with such(prenominal)(prenominal) is Microsoft My SQL. It leave alone execute only in platforms running Windows operational System. The applications of the system pass on only cover the observe of books and tracking of the borrowers.Other unavoidable circumstances, such as power interruptions and belt along of access, and other more complex areas of RFID engineering, such as securing the data, are no longer part of the study. Conceptual fashion model For the researchers to be able to settle up with a Radio Frequency Identification Reloading System, they allow need very flexible and various(a) knowledge in using the VB. NET schedule language and in using the MS waiter 2008. They entrust withal be needing clobbers such as ACS Readers, tags which should be compatible with the reader and a background signal running Windows operating system.The cogitate foreign and topical anesthetic studies and literature would also be of big assistant to the m because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be use and the think resources, the researchers lead need to carefully protrude the whole study which is going to be the cosmos of their research as a whole, gather and conk out data before they design and edict the system. after the coding stage, the researchers need to test and tax their study. If necessary, modifications should be do to perfect the system. Conceptual ParadigmBelow is the figure of the conceptual paradigm of the study: NOTE:::: REVISED range of a function MAKE A NEW DIAGRAM.. PLACE IT here(predicate)!!!.. Figure 2. Paradigm of the study Definition of hurt Accuracy †is a characteristic of a time-tested system achieved from a number of tests and evaluation. Circulation counselling †is a division in the library which is in missionary post of managing the borrowing and the returning of library materials. Collection worry- is a division in the library which is in indict of maintaining the collection of the library materials by tack oning or update records. entropybase †is an organized collection of data require for storing, updating, retrieving and display information for a particular system. Library Management System †is the system which pull up stakes be an aid for observe the books and tracking and reminding the borrowers in a current library. Radio Frequency Identification †is one of the newest identification technologies that use electromagnetic fields to transfer and read data that testament be integrated by the researchers in this study. Chapter 2 link literature and Studies A. Related Literature Foreign LiteratureHolloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a unclouded paper which explained the components of a base RFID system and how it works. harmonize to him, an RFID system is composed of three important pieces of equipm ent such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that stockpiles and collects data to be downloaded from and uploaded to the tag, and (3) the host com drifter installed with an RFID software program to operation the data into valuable information.Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one send data to the Reader which will be catching to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and sensing element Networks: Architectures and Applications”, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies.They also discussed why these technologies sho uld be employ to various fields of occupation and their requirements. Since the proponents will be using RFID, the tips, which are turn up effective, given in this study on how to wee-wee better RFID-based systems will be of big help in conducting their study. Soldatos (2010) theorise a study entitled Rich invitee Application for RFID EPCIS Repository wherein he created software which intend to provide a UML-like graphical representation of the manageriness locations, and read points of an enterprise with a more user friendly RFID-based software system.Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the confuse that they created entitled â€Å"RFID Based Library Management System” which is very similar to the study being conducted by the proponents. In their study’s conclusion, they shake up indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables mental faculty t o do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology” wherein they feature given attention at continuing research activities in the field of RFID and talked about the possible study burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) make a study, â€Å"Student Recognition exploitation Radio Frequency Identification for Tarlac State University”, which was undertaken to develop a system that would support and improve the current way of identifying students at Tarlac State University.The system is capable of importing excel files to update student records. through the images and the information displayed by the system, security officers find it flabby to identify the students entering the instruct campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and construct integral records. Similar to the study of the proponents, the system that they will create can also generate reports for supervise and inventory purposes.Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype” conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign StudiesA study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare” be that RFID Technology is versatile and can also shoot down overtures in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from onslaught Assisted Passive RFID”, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard.His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy service made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the necessarily for such advancement which made the proponents more vehement in pursuing this study.Local Studies Studies were not on ly done in other countries exactly also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions prompt and more streamlined is the Mapua Institute of Technology with its Cardinal Plus poser which made many transactions convenient perpetually since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students.This study is somehow related because both effectuation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å" modify carriage Fare System” is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable vizor game which used barcodes in riding a bus and paying for the fare. The measurement to be reloaded on a card depends on the user’s aptitude to pay. However, Aquino et. alâ€⠄¢s (October 2009) â€Å"Automation of the Movie TheaterCharging Procedures finished the Use of RFID” proved that RFID Technology can also improve the field of entertainment. Their system was able to wipe out queuing problems & improve charging operations of the system implied on improvement in the efficiency, reliability & accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of.In Villame’s (2010) research entitled â€Å" immune carrier Suppression Locked Loop Mechanism for ultrahigh frequency RFID Readers”, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver rick saturated du e to having the readers being exposed to fond carrier leakage signals because of the antenna reflections and limited closing off of circulators and directional couplers.This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the rule of research to be used is very important. The whole study somehow depends on such method acting because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations.It often uses optical aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by crowd D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. such research is based on either situation-speci? c problem solving or generalized inquiry actions. SamplingThe researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently canvas and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in accumulation the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered.Gathering Data The process of the data we gathered is divided into quintuple builds namely: Identify and Analyze the Requirements. In this stage, the proponents will gather all possib le requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture.If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. afterwards designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To visualise that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System.After having proven that the system is m ilitary operation well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft .Net Framework |4. 0 or higher | |Windows profits explorer |7 or higher | |ACS CCID reasonr | | computer hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of purchasable space | |Monitor |1024×768 or higher resoluteness | | printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO… Chapter4 The Proposed SystemUser and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in diligent time. Our proposed system has the pursual advantages. ? User friendly user interface ? Fast access to database ? Less error ? more(prenominal) Storage Capacity ? Search facility ? front and Feel Environment ? Quick transaction solely the manual difficulties in managing the Library have been find by implementing computerization.Analysis General Features of the System RFID technology has been utilise in libraries save over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and choose the returned books are all able to be achieved. The library can adopt RFID technology aim of improve the self-service.Patrons can borrow and return the items usi ng automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of view and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly degree Celsius%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an scanty alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 ImplementationProgram Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To verifyd that the system is efficient. Documentation Plan The documentation has sept enary chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike.The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. information processing system †an electronic device uses to manipulate data. B. USB Flash Drive †is a data storage device that includes forte memory with an integrated Universal Serial Bus (USB) interface.C. Hard Disk †wherein the system is stored and the soft model of the documentation is saved. D. Ballpen & Paper †use for authorship down the documentation a nd other important information. E. Internet †the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials †used for additional reference. G. Printer †used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives.Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user performing as the executive director and could add another administrator that will do the same task to drive all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the broad(a) system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1.Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used r esources to the appropriate authorities. computer hardware maintenance is beyond the duty of the researcher. Chapter 7 The thickset of Findings, Conclusions and RecommendationSummary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind.Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in locate to gather data more accurately and consistently with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time interrogative sentence study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. ConclusionThrough months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: • The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month.They can now finally be assured regarding the accuracy and reliability of the data generated. • The system can offer larger amount of data which is what the library a good deal needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. • The system was able to track whom librarian is accountable for the loss of a returned material. • The system was able to help them in reminding the students regarding their unreturned materials. RecommendationsFor the future researchers to improve, the researchers suggest the following: • mental faculty for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed • Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button • Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..\r\n'

No comments:

Post a Comment