Smart RFID Based Library System
Smart RFID Based Library System
1.1 ABSTRACT:........................................................................................................................ 6
1.2 INTRODUCTION ................................................................................................................. 6
1.3RFID Technology in Libraries .............................................................................................. 6
1.4 COMPONENTS .................................................................................................................. 7
1.4.1RFIDTags:.......................................................................................................................... 7
1.4.2RFIDReaders: .................................................................................................................. 10
1.4.4 MICROCONTROLLER: ................................................................................................ 12
1.5 DATABASE:....................................................................................................................... 12
2 Modules that are described as follows .................................................................................. 13
2.1Module1 ............................................................................................................................ 13
2.1.1 The Initial Setup ............................................................................................................ 13
2.2 Module2 ........................................................................................................................... 13
2.2.1 The Login Process........................................................................................................... 13
2.2.2 The Issue Process ............................................................................................................ 13
D.2.3 Module 4 ....................................................................................................................... 13
The Return Process ................................................................................................................. 13
3.0 About Scope of RFID Technology .................................................................................... 13
3.1 Auto-On ............................................................................................................................. 14
3.2 Features .............................................................................................................................. 14
3.3 Differences between RFID and a simple barcode system ................................................. 15
4.0 Introduction: ....................................................................................................................... 19
4.1 Purpose & Scope ............................................................................................................... 19
4.2 Time Management: ........................................................................................................... 19
4.3 Objective: .......................................................................................................................... 19
5.0 Tools Used in the Project: .................................................................................................. 20
MYSQLI SERVER v.3.3.2: ..................................................................................................... 20
Sublime and Notepad++ latest version: ................................................................................... 20
5.1 Languages used in Software: ............................................................................................ 20
PHP .......................................................................................................................................... 20
SQL .......................................................................................................................................... 20
Microsoft Word 2013 latest version ........................................................................................ 21
RFID Reader Latest ZKTECO................................................................................................. 21
Existing System ....................................................................................................................... 21
Improvements .......................................................................................................................... 21
Advantages of RFID systems................................................................................................... 22
Rapid check-out / check-in ...................................................................................................... 22
Simplified patron self check-out / check-in ............................................................................. 22
High reliability ......................................................................................................................... 22
Page 1 of 85
High-speed inventorying .......................................................................................................... 23
Automated materials handling ................................................................................................. 23
Long tag life ............................................................................................................................. 23
PROPOSED SYSTEM OF LIBRARY MANAGEMENT SYSTEM ................................. 25
6.1 User Module: .................................................................................................................... 25
6.2 New user register: .............................................................................................................. 25
6.3 Student Login: ................................................................................................................... 25
6.4 Search book:....................................................................................................................... 26
6.5 Issue Book:......................................................................................................................... 26
6.6 Return Book: ...................................................................................................................... 26
Admin Module: ........................................................................................................................ 26
Register user............................................................................................................................. 26
6.7 Issue Book .......................................................................................................................... 26
6.8 Librarian:............................................................................................................................ 26
6.8 Software Requirements: ..................................................................................................... 28
Front End: ................................................................................................................................ 28
Back End: ................................................................................................................................. 28
6.9 Books and its attirbutes: ..................................................................................................... 28
User: ......................................................................................................................................... 29
Issue Status: ............................................................................................................................. 30
6.10 Return Status: ................................................................................................................... 31
Diagrams: ................................................................................................................................. 32
7.0 Use Case Diagram: ........................................................................................................... 32
7.1 Class Diagram ................................................................................................................... 33
Use case 2 diagram .................................................................................................................. 34
7.2 ER Diagrams ...................................................................................................................... 35
7.4 Class Diagrams ................................................................................................................. 36
7.4.1 Advance Class Diagram .................................................................................................. 36
7.5 Activity diagramfor RFID Library Management System. ................................................. 37
7.6 Sequence diagram templates. ............................................................................................ 38
7.8 Entity Relationship Diagram advance for library ............................................................. 39
8.0 Phases of Software Development Life Cycle ................................................................... 41
8. 1. Planning ........................................................................................................................... 41
8.2. Systems Analysis and Requirements ................................................................................ 41
8. 3. Systems Design ................................................................................................................ 42
8.4. Development ..................................................................................................................... 42
8.5. Integration and Testing ..................................................................................................... 42
8.6. Implementation ................................................................................................................. 43
8.7. Operations and Maintenance............................................................................................. 43
Page 2 of 85
8.8 Importance of the SDLC .................................................................................................... 43
9.0 Models in Software ............................................................................................................ 44
9.1 Waterfall Model ................................................................................................................. 44
Waterfall model Diagram ........................................................................................................ 45
9.2 V-Shaped Model: ............................................................................................................... 45
V Model diagram ..................................................................................................................... 45
9.3 Prototype Model................................................................................................................. 46
9.4 Spiral Model....................................................................................................................... 46
Spiral Model has four phases: .................................................................................................. 46
9.5 Which model is use in RFID-LMS .................................................................................... 48
9.6 What is Agile?................................................................................................................... 49
Agile Model - Pros and Cons ................................................................................................... 53
10.0 Software Development Life Cycle................................................................................... 55
10.1 Defining &Planning and Requirement Analysis.............................................................. 56
10.2 Design: ............................................................................................................................. 56
10.3 Coding/Implimentation. .................................................................................................. 57
Code For RFID-LMS Dashboard and Sign in and sign Up page. ........................................... 57
Code for Book retrieve the book:............................................................................................. 58
Coding Techniques .................................................................. Error! Bookmark not defined.
STRUCTURED PROGRAMMING ........................................................................................ 59
PROGRAMMING STYLE ...................................................... Error! Bookmark not defined.
INTERNAL DOCUMENTATION ......................................................................................... 60
CODING .................................................................................................................................. 60
CODING STANDARD AND GUIDELINES ......................................................................... 61
REPRESENTATIVE CODING STANDARDS...................................................................... 61
REPRESENTATIVE CODING GUIDELINES ...................................................................... 61
NAMES.................................................................................................................................... 61
VARIABLES ........................................................................................................................... 62
Coding Walkthroughs .............................................................................................................. 62
CODE INSPECTION .............................................................................................................. 62
SUMMARY ............................................................................................................................. 63
11.1 Screen Short for RFID-LMS ............................................ Error! Bookmark not defined.
Login & Signup: Introduction and code .................................................................................. 66
Code For student Registration/login page................................................................................ 66
11.3 Dashboard with all related Features and Menu: ............................................................ 69
Description ............................................................................................................................... 69
11.4 Student Registered Page: ................................................ Error! Bookmark not defined.
11.4 Student Registration page Register students: ................................................................... 70
11.5 Code For Student Registration Page: .............................................................................. 70
Page 3 of 85
11.6 Website Preview ............................................................................................................. 72
This is my website for RFID-LMS System ............................................................................. 72
Screen Shot for Books Register w.r.t rfid / isbn number that are unique for each
book.......................................................................................... Error! Bookmark not defined.
Issue Books by RFID. .............................................................. Error! Bookmark not defined.
Returning the books by RFID . ................................................ Error! Bookmark not defined.
Software Quality and software attributes ................................................................................. 75
What Are The Quality Attributes? ........................................... Error! Bookmark not defined.
Reliability................................................................................................................................. 75
Maintainability ...................................................................................................................................... 75
Correctness:.............................................................................................................................. 75
Learnability: Learnability of a software system depends on: .................................................. 76
Robustness: Robustness reduces the impact of operational mistakes, erroneous
input data, and hardware errors. ............................................................................................... 76
Extensibility: ............................................................................................................................ 77
Testing Estimation Techniques ....................................................................................................... 78
PERT Software Testing Estimation Technique ....................................................................... 78
Use-Case Point Method ........................................................................................................... 79
Function Point / Testing Point Analysis .................................................................................. 79
Experience-based Testing Estimation Technique .................................................................... 79
Software Testing Phase ............................................................................................................ 79
Software validation and verification ........................................................................................ 80
Advantages of Validation: ....................................................................................................... 80
Verification makes sure that the product is designed to deliver all functionality to
the customer. ............................................................................................................................ 81
Advantages of Software Verification : .................................................................................... 81
Challenges ................................................................................................................................ 81
Poorly defined goal .................................................................................................................. 82
Unrealistic Deadlines ............................................................................................................... 82
Solution: ................................................................................................................................... 82
Conclusion and Summery: ....................................................................................................... 83
Conclusion and Thanks ............................................................ Error! Bookmark not defined.
Page 4 of 85
CHEPTER NO: 1
Page 5 of 85
INTRODUCTION
---------------------------------------------------------------------***--------------------------
----------------
1.1 ABSTRACT:
Radio Frequency Identification (RFID) mean says that transfers the
information wirelessly, using radio frequency waves. It is automatic
identification technology. This paper is about RFID based Smart Library
Management System (SLMS) that allows fast transaction flow and will
make easy to handle the activities like issue and return of books from the
library without much manual intervention. This system is based on RFID
readers and passive RFID tags that are able to store the information
electronically which can be read by the RFID readers.
This system will make users to issue and return of books via RFID tags
very easy and also calculate the corresponding fine associated with the
period of time the absence of the book from the library.
1.2 INTRODUCTION
Page 6 of 85
provides libraries with more effective way of managing their data while
providing greater service. The technology works through thin smart
labels, which placed on the inside cover of each book in a library’s
collection. Manual interactions are not needed for RFID-tag reading. It
most care is taken to provide following features to the Library using RFID
technology to minimize the manual intervention and to minimize the
manual errors and to provide fast issuing, reissuing and searching of
books.
1.4 COMPONENTS
Page 7 of 85
addressing privacy and security issues. ISO/IEC 18000 and ISO/IEC
29167 use on-chip cryptography methods for untraceability, tag and
reader authentication and over-the-air privacy. ISO/IEC 20248 specifies a
digital signature data structure for RFID and barcodes providing data,
source and read method authenticity. This work is done within ISO/IEC
JTC 1/SC 31 Automatic identification and data capture techniques.Tags
can also be used in shops to expedite checkout, and to prevent theft by
customers and employees.
Page 8 of 85
A radio-frequency identification system uses tags, or labels attached to the
objects to be identified. Two-way radio transmitter-receivers called interrogators
or readers send a signal to the tag and read its response.
RFID tags can be either passive, active or battery-assisted passive. An active tag
has an on-board battery and periodically transmits its ID signal. A battery-
assisted passive (BAP) has a small battery on board and is activated when in the
presence of an RFID reader. A passive tag is cheaper and smaller because it has
no battery; instead, the tag uses the radio energy transmitted by the reader.
However, to operate a passive tag, it must be illuminated with a power level
roughly a thousand times stronger than for signal transmission. That makes a
difference in interference and in exposure to radiation.
RFID tags contain at least three parts: an integrated circuit that stores and
processes information and that modulates and demodulates radio-frequency (RF)
signals; a means of collecting DC power from the incident reader signal; and an
antenna for receiving and transmitting the signal. The tag information is stored in
a non-volatile memory. The RFID tag includes either fixed or programmable
logic for processing the transmission and sensor data, respectively.
Page 9 of 85
When we bring the tag in front of the reader of the reader, the reader antenna
senses the tag and checks the unique serial number of the tag. If the tag is
registered in the data base then the reader authenticates the tag otherwise the
reader shows an error and gives the message that the tag is not registered or the
tag is not authenticated.
Page 10 of 85
Figure 2.4 RFID Reader
Different types of readers are available in market depending on their range and
suitable applications.
Lowfrequencyreaders-125Khz
High frequencyreaders-13.56Mh
Ultra High frequencyreaders-800-900Mhz
Features:
-It is a 13.56MHZ non-contact IC reader which is easy and stable to use.
-Fast in reading the RFID Tags.
-Plug and play, needn't extra driver.
-Widely used in many RFID application systems such as personnel identification, logistics,
access control, conference attendance system, anti-counterfeit and industrial production
process control system.
Specification:
Color: Black
Net Weight: 39g
Gross Weight: 100g
Size: 104x70x11mm/4.09"x2.76"x0.43"
Support MIFARE, 14443A protocol, S50, S70
Power source: USB
Interface: USB, 106Kbit/s , (RS232, 9600,N,8,1)
Working distance: Up to 8 cm
Frequency: 13.56MHz
Temperature: -30 degrees Celsius to + 60 degrees Celsius
Humidity: 5%-95%
Audio/Visual Indication: LED and buzzer
SDK: Communication Protocol
Package includes:
1 x RIFD Card Reader
1 x USB Cable
Page 11 of 85
1.4.4 MICROCONTROLLER:
In this project, we are going to design a system by which user can use the library
smartly. Major components in our system areas micro controller, Database, RFID
readers and RFID tags. Micro controller has the in built USART support and we will
use it to obtain serial communication for transmitting and receiving the data
between RFID readers, Microcontroller & the Database stored in PC. Also to
achieve anti-theft we will interface a Buzzer and one more RFID reader to the
Microcontroller.
Figure 1.4 Database for SLMS overview
1.5 DATABASE:
Page 12 of 85
2 Modules that are described as follows
2.1Module1
Whenever a book is acquired by the library, an RFID tags are placed into the
books with the relevant information like, call number, author name, and book
number, etc. The detailed information regarding the book is also stored in the
computer database. The computer database also stores all information for
individual users (users) of the library. Each user is supplied with registered RFID
cards. These cards carry identification data and details like: address, roll number,
and telephone no. etc. for each user.
2.2 Module2
When a user needs to get a book issued , he can get it done without any manual
intervention. He simply needs to scan his RFID card in front of the RFID reader
and it automatically opens his/her login account page. The again he needs to scan
the selected books to be issued, one by one in front of the RFID reader. The
computer records all these data against his name. Finally a message is displayed
informing the user that the ISSUE process has been successful. The user takes the
books for a specified time period from the library after which he has to return the
books to the library.
D.2.3 Module 4
When a user want store turn books, he simply places the books again in front of
the RFID connected with the controller and the books are automatically adjusted
for return against the user’s name.
Figure 1.5 RFID Reader That reads the Tags and store information
3.1 Auto-On
3.2 Features
Many libraries have already installed barcode systems where a barcode is placed
in each book and the LMS (Library Management System) uniquely identifies the
book by reading the barcode, using a barcode scanner. This technology has
enabled self service and self return to operate successfully for many years,
functions which have since come to be synonymous with RFID technology. The
main differences between using barcodes or RFID tags are the latter’s ability to
issue multiple items simultaneously and to allow items to be read without having
to open them to find the bar codes. Libraries should consider the volumes of
items which will need to be processed either for self-service and self-return and
aim for an RFID/ sortation solution which can cope. A larger library with big
volumes could justify a sortation solution perhaps using a system of conveyors
and sorting units etc. A smaller library probably could not justify this investment.
RFID tags and workstations can also identify multi-part sets to detect whether
these are complete on return or issue. This is a useful function of RFID assuming
the LMS knows to look for all the parts which make up a complete item. Another
significant difference between barcode and RFID systems is that barcodes use
standards that can be read by most scanners. While RFID transmission protocols
are well established tags are, at present, not governed by similar standards,
meaning that some tags may only be read by a specific reader.
Another important difference between barcodes and RFID is that barcode
data is uni-directional (i.e. you can only read it, not write it). RFID not only reads
from, but can also write information to, the tag. RFID therefore requires an
exchange of data.
Because most libraries have library management IT systems, the data for the tags
can be generated from the library's database. The data can include a number of
fields such as the book's unique identifier, loan record and bar code number.
The tag, costing around 45p, is manually stuck into the book's inner spine or
close to the spine in the inside cover, sometimes using special non-damaging
glue. The library then uses handheld readers to perform stocktakes, while fixed
readers at issuing desks scan books entering or leaving the library. A stack of
books can be scanned in seconds, significantly reducing the time and staff needed
to manage loans. In some libraries, this activity has become partly self-service.
Page 15 of 85
According to The RFID Knowledgebase, a research service, US libraries lead the
world in RFID use, with the UK and Japan equal second. It estimates that 35m
library items have been tagged worldwide.
In the UK, 18 libraries are using the technology, either in pilot projects or with
complete systems. The latest - and possibly the largest to go live - is the Hendon
Campus Library at Middlesex University. This new library has selected a
£200,000 system from Switzerland-based Biblioteca, which has been installed by
its UK distributor D-Link in association with Dynix, the university's library
management system supplier. D-Link has also installed similar systems at
Nottingham Trent University's library, Colchester public library, the Barbican
library in London and Norwich Millennium library.
Crisp believes that RFID systems are only scratching the surface of their
potential. "It is possible to make returns fully automated using a device that sorts
returned books for you. It is also possible to have 'intelligent shelving' by putting
antennas throughout the library so books can be constantly monitored. This
means that if a book is misplaced, its location will automatically be noted;
therefore it can be easily found."
Because the data on borrowing can be kept on the tag, it is technically possible to
walk around the library to weed out items not regularly used: books that have not
been taken out for more than a year, for example.
But with concerns about cost, it won't be adopted overnight. Crisp says that most
of the library systems installed have been with new libraries or those involved in
new extensions. "That way, it is possible to put the cost of RFID into the building
budget," he adds.
At the British Library in London, cost is a key concern: "We are looking at the
technology with a view to running a pilot next year," says Dawn Olney, head of
collection and storage, "but with a collection of 150m items, we are concerned
about cost. We are trying to identify which items to tag in a trial project. If lots of
libraries opt for RFID, then prices will come down, making it more feasible."
Page 16 of 85
The next "flagship" library system will be Brighton's new £14m city centre
Jubilee library, which will hold 110,000 books and 16,000 audiovisual items. The
system, which is being installed by Manchester-based specialists Intellident, will
go live when the library opens in March. Intellident has 15 RFID library
installations in the south of England, and recently secured an agreement to RFID-
enable Essex's public libraries.
Sally McMahon, head of libraries at Brighton & Hove City Council, says: "RFID
technology will transform the way we deliver public library services. The remit
of a library is much wider nowadays, and this will free staff to play a more
supporting role running classes and helping people. But there will always be staff
present."
Page 17 of 85
CHEPTER NO: 2
Page 18 of 85
4.0 Introduction:
RFID –SLMS Web Application covers the requirement of the day to day
monitoring of the Book. You can create customized all books reports daily.
4.3 Objective:
Sublime Text, Atom, and Notepad++ are all general purpose text editors. They
are suited to web development, with features beyond those available in basic text
applications like Notepad. But they are not as complex or specialized as most
IDEs. All three are cross-platform and support a variety of languages.
PHP
SQL
SQL is a domain-specific language used in programming and designed for
managing data held in a relational database management system, or for stream
processing in a relational data stream management system
Page 20 of 85
Other languages are:
1. JavaScript
2. CSS
3. HTML
4. Objective C
Microsoft Word 2013 latest version word processor, part of the Office 2013. It
boasts improved performance on the previous version, and more features.
Existing System
They give registration form from customer with personal and ordered books
details.
Then they will ordered them to supplier, supplier supply book transport through
and payment the supplier banking through manual.
Improvements
Before this project, all the library was working by manual and very rare
Universities use barcode. Manual work was very time consumer and costly
required people and hardware registers for student registrations.
Barcode system was also costly. Some time we required advance barcode
machine that read barcode tag if it became dim.
The use of RFID reduces the amount of time required to perform circulation
operations. The most significant time savings are attributable to the facts that
information can be read from RFID tags much faster than from barcodes and that
several items in a stack can be read at the same time. While initially unreliable,
the anti-collision algorithm that allows an entire stack to be check-out or check-in
now appears to be working well.
The other time savings realized by circulation staff are modest unless the RFID
tags replace both the EM security strips or RF tags of older theft detection
systems and the barcodes of the library management system - i.e., the system is a
comprehensive RFID system that combines RFID security and the tracking of
materials throughout the library; or it is a hybrid system that uses EM for security
and RFID for tracking, but handles both simultaneously with a single piece of
equipment. There can be as much as a 50 percent increase in throughput. The
time savings are less for check-out than for check-in because the time required
for check-out usually is extended by social interaction with patrons.
For patrons using self check out, there is a marked improvement because they do
not have to carefully place materials within a designated template and they can
check out several items at the same time.
Patron self check-in shifts that work from staff to patrons. Staff is relieved further
when readers are installed in book-drops.
High reliability
1. The readers are highly reliable. RFID library systems claim an almost 100
percent detection rate using RFID tags.
2. There is no false alarm than with older technologies once an RFID system is
properly tuned.
3. RFID systems encode the circulation status on the RFID tag. This is done by
designating a bit as the "theft" (EAS) bit and turning it off at time of check-out
and on at time of check-in. If the material that has not been properly check-out is
taken past the exit sensors, an immediate alarm is triggered.
Page 22 of 85
High-speed inventorying
A unique advantage of RFID systems is their ability to scan books on the shelves
without tipping them out or removing them. A hand-held inventory reader can be
moved rapidly across a shelf of books to read all of the unique identification
information. Using wireless technology, it is possible not only to update the
inventory, but also to identify items which are out of proper order.
Finally, RFID tags last longer than barcodes because nothing comes into contact
with them. Most RFID vendors claim a minimum of 100,000 transactions before
a tag may need to be replaced.
Page 23 of 85
CHEPTER NO: 3
Page 24 of 85
6.0 System Flow
This project has many features which such as the facility of user login and
teachers login. Also on the top of all this, there is an admin who will be managing
the entire application’s authorization and authentication, not any intruder can
login and modify the data, as a login for admin is also available.
This module is further divided into various sub-modules describing the user in a
better way:
Page 25 of 85
6.4 Search book:
The user can search book based on book id, book name, or by author name.
To return the book before the last date without fine, or after the specified time
duration with a late fine.
Admin Module:
It is to be operated by the admin with unique id and password. The admin is the
person who decides authentication and authorization for all the different users of
the application. It further can be subdivided as:
Register user
6.7 Issue Book
Maintain books in a stack, means record the availability at regular time interval.
6.8 Librarian:
Includes all the library staff who are required to enter the records in the system
and keep an eye on the various activities like the issue of the book, the return of
the book, non-availability of books etc. through the developed system.
Page 26 of 85
Page 27 of 85
6.8 Software Requirements:
Front End:
- Client on Internet: Web Browser, Operating System(any).
- Client on Intranet: Web Brower, Operating System(any).
Back End:
- JavaScript
- PHP
- SQL
- MySQL
- Web Server
- Database Server Apache
- Operating System
Page 28 of 85
These are the basic building block of this system as well as any library. In other
words the main purpose of any library and the cause to develop systems like this.
Book _Name:
Book_ Code:
A number to use for sorting and arranging the book, as well as identifying it in
the library.
Author:
The one who has written the book. As sometimes the book’s series become more
popular by the author’s name rather than the book name.
Price:
The market value of the book is also required to maintain in the record, as
sometimes it is needed to arrange and sort based on this, secondly, it is also
required for compensation in case of loss or damage, as fine charges.
Quantity:
Rack/addition No:
To get the exact location of the book, so as it becomes easy to search it and sort it
at the time of binding up work.
Published date:
As there are various further division and subcategories of any subject. So, in that
case, this is the unique id to distinguish the books, arrange them, and sort them.
Like in computer science there are further many specialties like core java,
advanced java, HTML, html5 etc.
User:
The next is the beneficiary, by whom the library is being accessed and who
serves as a purpose for this system. Its attributes include:
CNIC Number
The name of the student or teacher, who will get the book issued, or who will
return the book.
Page 29 of 85
Contact:
To indicate the amount of fine he/she has to deposit and keep it up to date so that
he/she is aware of the payment to be made at the end of the year or session.
Issue Status:
It makes to the notice of the librarian as well as to the student or teacher that ow
many books they have already got issued and how much more can they get at the
current point of time. It includes attributes as:
Issue ID
Roll number of Student Name
Book Name:
Book Code:
A number to use for sorting and arranging the book, as well as identifying it in
the library.
Id:
The user’s unique college or university roll number i.e. the id. The same is
applicable to teachers also, with their unique id. To know which user has been
issued the book and for what time limit, that is what time the user is supposed to
return the book, and if not will be charged fine.
Date_Issue:
The date on which user got the book issued to read from it.
Page 30 of 85
Return_Date:
It indicates the date on which user is supposed to be returning the book, that is it
is the date after the duration completed for which the user has been issued the
book.
This tells the library management authority about the status of returned books per
user. Whether a particular user has returned the book or not, on or before the last
date. If not, in that case, the fine will be charged from him/her as a penalty for
late submission.
Book_Name:
Book_Code:
A number to use for sorting and arranging the book, as well as identifying it in
the library.
Id:
The user’s unique college or university roll number i.e. the id. The same is
applicable to teachers also, with their unique id. To know which user has been
issued the book and for what time limit, that is what time the user is supposed to
return the book, and if not will be charged fine.
Date_Issue:
The date on which user got the book issued to read from it.
Return_Date:
It indicates the date on which user is supposed to be returning the book, that is it
is the date after the duration completed for which the user has been issued the
book.
Page 31 of 85
Diagrams:
Page 32 of 85
7.1 Class Diagram
Page 33 of 85
Use case 2 diagram
For Student, Teacher, Non Teacher and Librarian Use Case Diagram
Librarian register student, book, using RFID Card to publish.
Use Case Diagram – Library Management System
The use case diagram are usually referred to as behavior diagram used to
describe the actions of all user in a system. All user describe in use case are
actors and the functionality as action of system.
Page 34 of 85
7.2 ER Diagrams
Library management system class diagram describes the structured class diagram
of library management system, their attributes, methods and relationships among
objects. Class uml teach software uml classless diagram class diagram template
library class library management class.
Page 35 of 85
7.4 Class Diagrams
Page 36 of 85
7.5 Activity diagramfor RFID Library Management System.
The activity diagram used to describe flow of activity through a series of
actions. Activity diagram is a important diagram to describe the system
Page 37 of 85
Figure 3.8 (2nd Activity diagram for Returning Book)
Many project managers and engineers use sequence diagrams in UML to get a
better idea of how tasks within a project will function, overlap, and move
between objects or components. Create sequence diagrams to display interactions
between objects and the order in which those interactions occur.
Page 38 of 85
7.8 Entity Relationship Diagram advance for library
Page 39 of 85
CHEPTER NO: 4
Page 40 of 85
8.0 Phases of Software Development Life Cycle
Following are the seven phases of the SDLC (System analysis and Planning)
8. 1. Planning
This is the first phase in the systems development process. It identifies whether or
not there is the need for a new system to achieve a business’s strategic objectives.
This is a preliminary plan (or a feasibility study) for a company’s business
initiative to acquire the resources to build on an infrastructure to modify or
improve a service. The company might be trying to meet or exceed expectations
for their employees, customers and stakeholders too. The purpose of this step is
to find out the scope of the problem and determine solutions. Resources, costs,
time, benefits and other items should be considered at this stage. Requirement
gathering and analysis: Business requirements are gathered in this phase. This
phase is the main focus of the project managers and stake holders. Meetings with
managers, stake holders and users are held in order to determine the requirements
like; Who is going to use the system? How will they use the system? What data
should be input into the system? What data should be output by the
system? These are general questions that get answered during a requirements
gathering phase. After requirement gathering these requirements are analyzed for
their validity and the possibility of incorporating the requirements in the system
to be development is also studied.
The second phase is where businesses will work on the source of their problem or
the need for a change. In the event of a problem, possible solutions are submitted
and analyzed to identify the best fit for the ultimate goal(s) of the project. This is
where teams consider the functional requirements of the project or solution. It is
also where system analysis takes place—or analyzing the needs of the end users
to ensure the new system can meet their expectations. Systems analysis is vital in
determining what a business"s needs are, as well as how they can be met, who
will be responsible for individual pieces of the project, and what sort of timeline
should be expected.
There are several tools businesses can use that are specific to the second phase.
They include:
Page 41 of 85
CASE (Computer Aided Systems/Software Engineering)
Requirements gathering
Structure snalysis
8. 3. Systems Design
The third phase describes, in detail, the necessary specifications, features and
operations that will satisfy the functional requirements of the proposed system
which will be in place. This is the step for end users to discuss and determine
their specific business information needs for the proposed system. It"s during this
phase that they will consider the essential components (hardware and/or software)
structure (networking capabilities), processing and procedures for the system to
accomplish its objectives. On receiving system design documents, the work is
divided in modules/units and actual coding is started. Since, in this phase the
code is produced so it is the main focus for the developer. This is the longest
phase of the software development life cycle.
8.4. Development
As soon as the product is given to the customers they will first do the beta testing.
If any changes are required or if any bugs are caught, then they will report it to
the engineering team. Once those changes are made or the bugs are fixed then the
final deployment will happen.
The fourth phase is when the real work begins—in particular, when a
programmer, network engineer and/or database developer are brought on to do
the major work on the project. This work includes using a flow chart to ensure
that the process of the system is properly organized. The development phase
marks the end of the initial section of the process. Additionally, this phase
signifies the start of production. The development stage is also characterized by
instillation and change. Focusing on training can be a huge benefit during this
phase.
The fifth phase involves systems integration and system testing (of programs and
procedures)—normally carried out by a Quality Assurance (QA) professional—to
determine if the proposed design meets the initial set of business goals. Testing
may be repeated, specifically to check for errors, bugs and interoperability. This
testing will be performed until the end user finds it acceptable. Another part of
Page 42 of 85
this phase is verification and validation, both of which will help ensure the
program"s successful completion.
8.6. Implementation
The sixth phase is when the majority of the code for the program is written.
Additionally, this phase involves the actual installation of the newly-developed
system. This step puts the project into production by moving the data and
components from the old system and placing them in the new system via a direct
cutover. While this can be a risky (and complicated) move, the cutover typically
happens during off-peak hours, thus minimizing the risk. Both system analysts
and end-users should now see the realization of the project that has implemented
changes.
The seventh and final phase involves maintenance and regular required updates.
This step is when end users can fine-tune the system, if they wish, to boost
performance, add new capabilities or meet additional user requirements.
If a business determines a change is needed during any phase of the SDLC, the
company might have to proceed through all the above life cycle phases again.
The life cycle approach of any project is a time-consuming process. Even though
some steps are more difficult than others, none are to be overlooked. An
oversight could prevent the entire system from functioning as planned.
Page 43 of 85
9.0 Models in Software
Waterfall models the very first model that is used in SDLC. It is also known as
the linear sequential model.
In this model, the outcome of one phase is the input for the next phase.
Development of the next phase starts only when the previous phase is complete.
First, Requirement gathering and analysis is done. Once the requirement is freeze then
only the System Design can start. Here in, the SRS document created is the output for the
Requirement phase and it acts as an input for the System Design.
In System Design Software architecture and Design, documents which act as an input for
the next phase are created i.e. Implementation and coding.
In the Implementation phase, coding is done and the software developed is the input for
next phase i.e. testing.
In the testing phase, the developed code is tested thoroughly to detect the defects in the
software. Defects are logged into the defect tracking tool and are retested once fixed.
Bug logging, Retest, Regression testing goes on until the time the software is in go-live
state.
In the Deployment phase, the developed code is moved into production after the sign off
is given by the customer.
Any issues in the production environment are resolved by the developers which come
under maintenance.
Page 44 of 85
Waterfall model Diagram
Page 45 of 85
9.3 Prototype Model
Software prototypes are built prior to the actual software to get valuable feedback
from the customer. Feedbacks are implemented and the proOnce the requirement
gathering is done, the quick design is created and the prototype which is
presented to the customer for evaluation is built.
Customer feedback and the refined requirement is used to modify the prototype
and is again presented to the customer for evaluation. Once the customer
approves the prototype, it is used as a requirement for building the actual
software. The actual software is build using the Waterfall model approach.
Prototype is again reviewed by the customer for any change. This process goes on
till the model is accepted by the customer.
Spiral model phases are followed in the iterations. The loops in the model
represent the phase of the SDLC process i.e. the innermost loop is of requirement
gathering & analysis which follows the Planning, Risk analysis, development,
and evaluation. Next loop is Designing followed by Implementation & then
testing.
System maintenance
Page 46 of 85
System enhancement
System Development
Concept Development
(i) Planning:
The planning phase includes requirement gathering wherein all the required
information is gathered from the customer and is documented. Software
requirement specification document is created for the next phase.
In this phase, the best solution is selected for the risks involved and analysis is
done by building the prototype.
The risk involved in accessing the data from a remote database can be that the
data access rate might be too slow. The risk can be resolved by building a
prototype of the data access subsystem.
(iii) Engineering: Once the risk analysis is done, coding and testing are done.
Page 47 of 85
When to use Spiral Methodology?
Spiral model is a combination of sequential and prototype model. This model is best
used for large projects which involves continuous enhancements. There are specific
activities which are done in one iteration (spiral) where the output is a small prototype
of the large software. The same activities are then repeated for all the spirals till the
entire software is build.
Agile Model:
Planning
Requirements Analysis
Design
Coding
Unit Testing and
Acceptance Testing.
At the end of the iteration, a working product is displayed to the customer and
important stakeholders.
What is Agile?
Agile model believes that every project needs to be handled differently and the
existing methods need to be tailored to best suit the project requirements. In
Agile, the tasks are divided to time boxes (small time frames) to deliver specific
features for a release.
Iterative approach is taken and working software build is delivered after each
iteration. Each build is incremental in terms of features; the final build holds all
the features required by the customer.
Page 48 of 85
9.5 Which model is use in RFID-LMS
Agile SDLC model separates the product into cycles and delivers a working
product very quickly. This methodology produces a succession of releases.
Testing of each release feeds back info that’s incorporated into the next version.
According to Robert Half, the drawback of this model is that the heavy emphasis
on customer interaction can lead the project in the wrong direction in some cases
Requirements Analysis
Design
Coding
Unit Testing and
Acceptance Testing.
At the end of the iteration, a working product is displayed to the customer and
important stakeholders.
Agile model believes that every project needs to be handled differently and the
existing methods need to be tailored to best suit the project requirements. In
Agile, the tasks are divided to time boxes (small time frames) to deliver specific
features for a release.
Iterative approach is taken and working software build is delivered after each
iteration. Each build is incremental in terms of features; the final build holds all
the features required by the customer.
The two main styles of Agile project management are Scrum and Kanban, which
both utilize a board to visualize tasks in columns of to-do, in progress, and done.
Page 49 of 85
There are a few defining characteristics of an Agile workflow:
Daily standup – A daily meeting in which contributors and managers discuss what
work was done yesterday, what they’re working on today, and any questions that
come up.
Sprints – Short spans in which products are planned, developed, reviewed, and
released. They are projects within the projects.
Regular reviews and retrospectives – An Agile team manages itself, but there are
built-in measures to make sure work is being delivered at a consistent quality. Peer
review and reviews by managers occur before tasks get completed and after the sprint
is over.
With short task spans and demanding schedules, an Agile workflow requires a
coordinated team. Roles have to be circumscribed enough so that people know
what they ought to be doing at all times, yet flexible enough to allow people to
take the initiative and exceed expectations.
A Scrum team is small, lean, and results-driven. The ideal Scrum team is 5-6
people. An Agile team working in Scrum has three roles The Product Owner –
Often an executive or key stakeholder, the Product Owner has a vision for the end
product and a sense of how it will fit into the company’s long-term goals. This
person will need to direct communication efforts, alerting the team to major
developments and stepping in to course-correct and implement high-level
changes as necessary.
The Scrum Master – The Scrum Master is most akin to a project manager. They
are guardians of process, givers of feedback, and mentors to junior team
members. They oversee day-to-day functions, maintain the Scrum board, check in
with team members, and make sure tasks are being completed on target.
The Team Member – Team members are the makers: front- and back-end
engineers, copywriters, designers, videographers, you name it. Team members
have varied roles and skills but all are responsible for getting stuff done on time
and in excellent quality.
From Beck, Kent et al. (2001), below are the twelve core principles of the Agile
Manifesto:
Page 50 of 85
2. Welcome changing requirements, even late in development
Projects are built around motivated individuals who are given the environment
and support they need, and trusted to get the job done. Team members choose the
jobs they are most interested in through self-organization and not through
external management influence. Micromanagement and top-down approach to
management are shunned.
Obtain direct feedback by going to the source of problem or confusion and use
oral communication at the workplace for the benefit of osmotic communication.
Virtual team conversations are facilitated via video conferencing.
This leads to increase in code quality because "programming out loud" leads to
clearer articulation of the complexities and hidden details in coding tasks,
reducing the risk of error or going down blind alleys. It also yields better
Page 51 of 85
diffusion of knowledge among the team. Other benefits include better transfer of
skills, large reduction in coordination efforts, and improved resiliency of a pair to
interruptions.
Agile methodologies seek work-life balance among the team members and
promote happiness by avoiding burnout or exhaustion. Through close
collaboration and by being alert and creative, these methodologies avoid long
nights and weekends, during which people try to undo the errors of unresponsive
planning. The sponsors, developers, and users are able to maintain a constant
pace indefinitely.
The Pareto principle or the 80/20 rule is applied. It means that typically 80% of
your results may actually come from only 20% of your efforts! The idea is to
focus on the important 20% of effort that gets the majority of the results. If you
have control over the scope, and if speed-to-market is of primary importance,
why not seek to deliver the important 80% of your product in just 20% of the
time?
Focus on what are essential to create value to the project and customer not on
distractors that do not add values like components, process, etc.
This is in contrast to capturing all known requirements and baseline the scope so
that any other changes are subject to change control. Agile Development holds
that that requirements emerge and evolve, and that however much analysis and
design you do, this will always be the case because you cannot really know for
sure what you want until you see and use the software. And in the time you
would have spent analyzing and reviewing requirements and designing a solution,
external conditions could also have changed.
Page 52 of 85
Agile Model - Pros and Cons
Agile methods are being widely accepted in the software world recently.
However, this method may not always be suitable for all products. Here are some
pros and cons of the Agile model.
Page 53 of 85
Depends heavily on customer interaction, so if customer is not clear, team can be
driven in the wrong direction.
There is a very high individual dependency, since there is minimum
documentation generated.
Transfer of technology to new team members may be quite challenging due to
lack of documentation.
Page 54 of 85
CHEPTER NO: 5
Page 55 of 85
10.0 Software Development Life Cycle
Planning for the quality assurance requirements and identification of the risks
associated with the project is also done in the planning stage. The outcome of the
technical feasibility study is to define the various technical approaches that can be
followed to implement the project successfully with minimum risks.
10.2 Design:
In this third phase, the system and software design documents are prepared as per
the requirement specification document.
Low-Level Design(LLD)
Page 56 of 85
Database tables, which include type and size
Complete detail of the interface
Addresses all types of dependency issues
Listing of error messages
Complete input and outputs for every module
10.3 Coding/Implementation.
Once the system design phase is over, the next phase is coding. In this phase,
developers start build the entire system by writing code using the chosen
programming language. In the coding phase, tasks are divided into units or
modules and assigned to the various developers. It is the longest phase of the
Software Development Life Cycle process.
Example:
<?php
error_reporting(E_ERROR | E_WARNING | E_PARSE); // Find the errors
$currDir = dirname(__FILE__); // main file directory
include("{$currDir}/defaultLang.php"); //Including the other file reading
directories in the code.
include("{$currDir}/language.php");
include("{$currDir}/lib.php");
// according to provided GET parameters, either log out, show login form
(possibly with a failed login message), or show homepage
if(isset($_GET['signOut'])){ // sign in authorities
logOutUser();
redirect("index.php?signIn=1");
}elseif(isset($_GET['loginFailed']) || isset($_GET['signIn'])){
if(!headers_sent() && isset($_GET['loginFailed'])) header('HTTP/1.0 403
Forbidden');
include("{$currDir}/login.php");
}else{
Page 57 of 85
include("{$currDir}/main.php")}
<?php
/* accessible tables */
$arrTables = get_tables_info();
if(is_array($arrTables) && count($arrTables)){
/* how many table groups do we have? */
$groups = get_table_groups();
$multiple_groups = (count($groups) > 1 ? true : false);
$i = 0; $current_group = '';
foreach($tg as $tn => $tgroup){
$tc = $arrTables[$tn];
/* is the current table filter-first? */
$tChkFF = array_search($tn, array());
/* hide current table in homepage? */
$tChkHL = array_search($tn,
array('books','NewsPapers','Magazines','Users','Book_Issue','Return_Book','Types
'));
/* allow homepage 'add new' for current table? */
$tChkAHAN = array_search($tn, array());
Page 58 of 85
number_format($count_records) . '</span>';
}
$t_perm = getTablePermissions($tn);
$can_insert = $t_perm['insert'];
$searchFirst = (($tChkFF !== false && $tChkFF !== null) ? '?Filter_x=1' : '');
?>
<?php if(!$i && !$multiple_groups){ /* no grouping, begin row */ ?>
STRUCTURED PROGRAMMING
Page 59 of 85
Loops (Iteration): One or more statements are executed repeatedly
as long as a specified condition is true
The goal of structured programming is to create correct programs that are easy to
write, understand and change. They are easy to write programs by modular
design. Moreover, modular design increases the programmer’s productivity by
allowing them to look at the big picture first and focus on details later. In
addition, several programmers can work on a single, large program, each working
on a different module Studies show structured programs take less time to write
than standard programs. Procedures written for one program can be reused in
other programs requiring the same task. A procedure that can be used in many
programs is said to be reusable.
INTERNAL DOCUMENTATION
CODING
Coding is undertaken once the design phase is complete and the design documents
have been successfully reviewed. In this coding phase, every module identified
and specified in the design document is independently coded. Good software
Page 60 of 85
development organizations require their programmers to adhere to some well-
defined and standard style of coding is called coding standards.
Do not use a coding style that is too clever or too difficult to understand.
Avoid obscure side effect and don’t use go-to statements.
Do not use an identifier for multiple purposes.
The code should be well-documented.
The length of any function should not exceed 10 source lines unless it is
necessary.
NAMES
The naming scheme is one of the most influential aids to understanding the
logical flow of an application. A name should tell “what” rather than “how.” By
avoiding names that expose the underlying implementation, which can change,
the programmers can preserve a layer of abstraction that simplifies the
complexity. For example, they can use GetNextStudent() instead of
GetNextArrayElement(). A problem of naming is the difficulty in selecting a
proper name which may indicate that the programmers need to further analyze or
define the purpose of an item. It makes names long enough to be meaningful but
Page 61 of 85
short enough to avoid verbosity. Programmatically, a unique name serves only to
differentiate one item from another. Expressive names function as an aid to a
human reader; therefore, it makes sense to provide a name that a human reader
can comprehend. However, be certain that the chosen names are in compliance
with the applicable language’s rules and standards.
VARIABLES
CODING REVIEW
The code review for a module is carried out after the module is successfully
compiled and all the syntax errors eliminated. Code reviews are extremely cost-
effective strategies for reduction in coding error in order to produce high quality
code. Normally two types of code reviews are carried out on the code of module-
code walk through and code inspection.
Coding Walkthroughs
CODE INSPECTION
Page 62 of 85
Software maintenance is the general process of changing a system after it has
been diverted. The change may be simple changes to correct coding errors, more
extensive changes to correct design errors or significant enhancement to correct
specification error or
SUMMARY
Page 63 of 85
Page 64 of 85
CHEPTER NO: 6
Page 65 of 85
Login & Signup: Introduction and code
Today I’m going to connect login & Signup Web services using Login & Signup
HTML page. You can use any HTML page, I’m using This because it has a really
beautiful design and has Form for both Login & Signup.
Page 66 of 85
$custom1 = makeSafe($_POST['custom1']);
$custom2 = makeSafe($_POST['custom2']);
$custom3 = makeSafe($_POST['custom3']);
$custom4 = makeSafe($_POST['custom4']);
Page 67 of 85
"Member name: {$memberID}\n" .
"Member group: " . sqlValue("select name from membership_groups
where groupID='{$groupID}'") . "\n" .
"Member email: {$email}\n" .
"IP address: {$_SERVER['REMOTE_ADDR']}\n" .
"Custom fields:\n" .
($adminConfig['custom1'] ? "{$adminConfig['custom1']}:
{$custom1}\n" : '') .
($adminConfig['custom2'] ? "{$adminConfig['custom2']}:
{$custom2}\n" : '') .
($adminConfig['custom3'] ? "{$adminConfig['custom3']}:
{$custom3}\n" : '') .
($adminConfig['custom4'] ? "{$adminConfig['custom4']}:
{$custom4}\n" : '')
);
Page 68 of 85
11.3 Dashboard with all related Features and Menu:
A dashboard has three parts: a header, a sidebar, and a body. Here's the
most minimal possible UI for a dashboard page.DashboardHeader(),
dashboardSidebar(), dashboardBody().
Description
After login to software admin panel the home page looks like this. You can set a
specific page to display in dashboard from settings .
The projects we are building (especially web apps and web software) are also
going to integrate countless aspects of modern web development; analytics,
dynamic forms data, UI and UX elements, and much more.
These simple yet powerful admin templates are well suited for web apps or any other website
or project that requires admin dashboard. This templates will serve as a solid foundation for
your upcoming project and will save you a lot of time. Needless to say that Bootstrap makes
these templates mobile-friendly and responsive.
Below listed free Bootstrap admin templates are rather simple and might not be the right fit
for everyone. On those template collections, you will find HTML5/CSS3 coded admin
templates as well as one powered by AngularJS and Bootstrap.
Page 69 of 85
Figure 6.5 member and student Registerd with RollNo and CNIC
<?php
$x = new DataList;
$x->TableName = "Users";
Page 71 of 85
11.6 Website Preview
Page 72 of 85
Figure 6.6 searching and scanning the book
11.5 Advance Book Scan on RFID Machine to Publish and issue the Books
That dream is slowly becoming a reality as libraries adopt the use of tiny Radio
Frequency Identification (RFID) tags for tracking books and audiovisual items.
Tiny RFID tags can store detailed information about an item, which is then sent
via radio waves to a reading device - either a handheld or fixed unit.
Page 73 of 85
CHEPTER NO: 7
Page 74 of 85
Software Quality and software attributes
How a Product developer will define quality – The product which meets the
customer requirements.
How Customer will define Quality – Required functionality is provided with user
friendly manner.
These are some quality definitions from different perspective. Now lets see how
can one measure some quality attributes of product or application.
Reliability
Maintainability
Correctness:
Page 75 of 85
Reliability of a software system is defined as the probability that this system
fulfills a function (determined by the specifications) for a specified number of
input trials under specified input conditions in a specified time interval (assuming
that hardware and input are free of errors).
A software system can be seen as reliable if this test produces a low error rate
(i.e., the probability that an error will occur in a specified time interval.)
The error rate depends on the frequency of inputs and on the probability that an
individual input will lead to an error.
Adequacy: Factors for the requirement of Adequacy:
- The input required of the user should be limited to only what is necessary. The
software system should expect information only if it is necessary for the
functions that the user wishes to carry out. The software system should enable
flexible data input on the part of the user and should carry out plausibility checks
on the input. In dialog-driven software systems, we vest particular importance in
the uniformity, clarity and simplicity of the dialogs.
- The performance offered by the software system should be adapted to the
wishes of the user with the consideration given to extensibility; i.e., the functions
should be limited to these in the specification.
- The results produced by the software system: The results that a software
system delivers should be output in a clear and well structured form and be easy
to interpret. The software system should afford the user flexibility with respect to
the scope, the degree of detail, and the form of presentation of the results. Error
messages must be provided in a form that is comprehensible for the user.
The user interface should present information as close to reality as possible and
permit efficient utilization of the software’s failures.
The user manual should be structured clearly and simply and be free of all dead
weight. It should explain to the user what the software system should do, how the
individual functions are activated, what relationships exist between functions, and
which exceptions might arise and how they can be corrected. In addition, the user
manual should serve as a reference that supports the user in quickly and
comfortably finding the correct answers to questions.
- Frequent errors (e.g. erroneous commands, typing errors) must be handled with
particular care.
- Less frequent errors (e.g. power failure) can be handled more laxly, but still
must not lead to irreversible consequences.
Extensibility:
Testability:
suitability for allowing the programmer to follow program execution (runtime
behavior under given conditions) and for debugging. The testability of a software
system depends on its:
Modular,
well-structured programs prove more suitable for systematic, stepwise testing
than monolithic, unstructured programs.
Efficiency: ability of a software system to fulfill its purpose with the best
possible utilization of all necessary resources (time, storage, transmission
channels, and peripherals).
Portability: the ease with which a software system can be adapted to run on
computers other than the one for which it was designed.
Unit testing.
Integration testing.
System testing.
Sanity testing.
Smoke testing.
Interface testing.
Regression testing.
Beta/Acceptance testing.
Testing Estimation Techniques
The following testing estimation techniques are proven to be accurate and are
widely used −
Where,
O = Optimistic estimate (best case scenario in which nothing goes wrong and all
conditions are optimal).
M = Most likely estimate (most likely duration and there may be some problem
but most of the things will go right).
Unadjusted Transaction Function Points − i) User Inputs, ii) User Outputs &
iii) User Inquiries
Let’s break down the basic definition of software testing into the following parts:
Page 79 of 85
2) All Life Cycle Activities: Testing is a process that’s take place throughout the
Software Development Life Cycle (SDLC).
The process of designing tests early in the life cycle can help to prevent defects
from being introduced in the code. Sometimes it’s referred as “verifying the test
basis via the test design”.
The test basis includes documents such as the requirements and design
specifications.
A product can pass while verification, as it is done on the paper and no running or
functional application is required. But, when same points which were verified on
the paper is actually developed then the running application or product can fail
while validation. This may happen because when a product or application is build
as per the specification but these specifications are not up to the mark hence they
fail to address the user requirements.
Advantages of Validation:
Page 80 of 85
1. During verification if some defects are missed then during validation process it
can be caught as failures.
2. If during verification some specification is misunderstood and development had
happened then during validation process while executing that functionality the
difference between the actual result and expected result can be understood.
3. Validation is done during testing like feature testing, integration testing, system
testing, load testing, compatibility testing, stress testing, etc.
4. Validation helps in building the right product as per the customer’s requirement
and helps in satisfying their needs.
Verification makes sure that the product is designed to deliver all functionality to
the customer.
Verification helps in lowering down the count of the defect in the later stages of
development.
Verifying the product at the starting phase of the development will help in
understanding the product in a better way.
It reduces the chances of failures in the software application or product.
It helps in building the product as per the customer specifications and needs.
Challenges
1. Undefined Goals – When goals are not clearly identified, the whole project and
team can suffer. When upper management cannot agree to or support undefined
goals, the project in question typically has little chance of succeeding. The project
manager must ask the right questions to establish and communicate clear goals
from the outset.
2. Scope Changes – Also known as scope creep, this occurs when project
management allows the project’s scope to extend beyond its original objectives.
Clients and supervisors may ask for changes to a project, and it takes a strong
project manager to evaluate each request and decide how and if to implement it,
while communicating the effects on budget and deadlines to all stakeholders.
Page 81 of 85
Every day we hear same stories, common challenges and issues in project
management. Yet we fail to learn our lesson out of these stories. Being a project
manager, have you ever wondered why only a handful of companies manage to
deliver projects successfully whereas you struggle to even meet the deadlines?
It’s because besides having the ability to plan, manage resources and meet
deadlines, one must possess the ability to foresee the challenges that may hamper
the progress of the overall project.
The first major challenge that project managers and team members might face is
not knowing what exactly to expect from the project. If the goals and objectives
are not clearly defined, the project is doomed to fail.
Unrealistic Deadlines
The second reason why most projects fail or what most project managers and
project members struggle is with the unrealistic expectations clients and
stakeholders have from them. Most project timelines do eventually slip due to the
unrealistic ‘initial deadlines’. As we live in a world, where competition is getting
aggressive and targets are set either unrealistic or unachievable rather than driven
by calculated business requirements. From then, what begins is a desperate
attempt where the team tries to fit the requirements in the already drawn
boundaries.
Solution:
Project managers can take care of the project deadlines and other related issues
with impeccable planning, alternative analysis and proper communication of the
real-time progress to project participants and other key decision makers. Plan
your events, manage your schedule, and keep track of important dates with a
project calendar.
Page 82 of 85
due to the integration of circulation and security with a single vendor and into a singl
Contents
1. OBJECTIVE
d. Install System.. 2
e. Post-deployment review.
4. DELIVERABLES:
a. Delivered System.
b. Change Requests.
Every project manager fear one thing the most – scope creep. Most of the times, a
project starts a certain way but as it progresses, it takes a different shape and
doesn’t even look the same project you started. This often is a result of the
expansion of a project outside of the planned objectives – aka scope creep.
RFID in the library speeds up book borrowing, monitoring, books searching processes and
thus frees staff to do more user-service tasks. But the performance varies with respect to
the vendors of RFID readers and tags. The efficient utilization of the technology also
depends upon the information to be written in tag. Experimental results with respect to
effectiveness of RFID reader position, tag position are presented in the paper. The work is
in progress to setup the same in CDAC library. Developments in RFID technology
continue to yield larger memory capacities, wider reading ranges, and faster processing
Page 83 of 85
This can put project managers and team members in a difficult spot as
unpredictable or new changes can often lead to the project failure. Remember, a
lot of little changes are as bad as one big change. To avoid scope-creep, it’s
better to determine project goals (cost, schedule, quality) through a systematic
process with proper planning and understanding of the customer needs. Make
realistic assumptions about resource availability and deadlines to achieve quality
results. As, there is no 100% anti-scope-creep solution but documenting what is
happening and communicating challenges to stakeholders, team, and management
in advance might help.
Summary
This document is written for describing all the features and procedures
that were followed while developing the system. This document specially
mentions the details of the project how it was developed, various features
and functionalities of the project and the procedures followed in achieving
their objectives. Smart RFID Based Library System is used to manage
the book by using RFID tags. It is very essential for an Institute or
organization. IT is very useful for their mutual development. This IT
initiatives have encouraged various Organizations or institutions to
develop systems to facilitate by Radio waves operation. The Smart RFID
Based Library System will include various parts (Sign in Log in , Subject
Enrollment, Book, Magazine , Newspaper and other international book
with ISBN number) this system helps in conducting Book Record ,
Student Record quickly and can thus help in saving time and the
operations will be carried out efficiently. With the effective use , nay
Page 84 of 85
Institute can apply the Smart RFID Based Library System for conducting
books and record of RFID Code for match , getting better result in less
time. In recent time, there has been high level of impersonation
experienced on a daily basis in private and public sectors, the ghost
worker syndrome which has become a menace across all tiers of
government.
The Smart RFID Based Library System was implemented with JavaScript,
PHP Core HTML and CSS Microsoft’s Structured Query Language (SQL)
Server xampp as the backend. The experimental result shows that the
developed system is highly efficient in the verification of users book with a
accuracy level of 98.5% with RFID.
Page 85 of 85