A Smart QR: Based Library Management System
A Smart QR: Based Library Management System
Abstract:- This research is important since libraries are This paper describes a library system that uses QR code
becoming more technologically advanced. For thousands in place of the existing systems that have the problems
of people, libraries continue to be the main source of mentioned above. This system is designed for tertiary
information, even in the age of digital information. This institution libraries and their student users in mind. Many
research goal is aimed to provide a smart, easy and user- tertiary institutions lack the funding necessary to adopt
friendly method for managing library materials using QR cutting-edge technologies. But being able to use technology
code system. Currently, the majority of library at a library to find what they need and finish the activities they
management systems need a lot of finance, resources, need to on their own would be incredibly helpful. Students
supervision, and human work. With the implementation frequently have time constraints during hectic school times
of this Quick response (QR) code management system, and need to be able to obtain information quickly and on their
lots of challenges and efforts is reduced drastically own. Apart from time constraint, congestion in libraries tends
ranging from; money, time, energy and other resources. to become the commonest source of communicable diseases.
Users of libraries can access a single application that The proposed smart QR based library management system is
powers this management system. Users can use the system practical for all tertiary institutions in Nigeria, including those
to issue, return, and manage library materials with little without financial resources, and can assist students in using
to no help from library staff, thanks to the QR code library resources more effectively and independently. This
capability. The developed management system system offers an operational and interactive library
streamlines operations, maintains an audit trail, and management software solution for students. Using their own
increases user accessibility to the library. phone, students can use the library and keep track of their
activities there. This program offers a comprehensive solution
Keywords:- QR Code, Library, Resources, Smart. for library management, including library resource
exploration, resource returns and resource record keeping. In
I. INTRODUCTION addition to being incredibly easy to use and comprehend, QR
code technology can store user data and book details in a
In order to stay current with the digital world and the database that powers the program. The application is
range of technology available in this day and age, a library is available in two versions: one for students and one for
necessary (Rahaman, 2016). Libraries have been using librarians.
Library Management Systems (LMS) more often during the
last 20 years in order to digitize data storage and streamline The structure of the paper is as follows: In Section 2,
operations. Due to the high number of users and materials of relevant works are discussed, along with an introduction to
the libraries, organization and record keeping are the main various technologies and library management systems; while
challenges for such system. The regular movement of library in Section 3, the design and implementation of the QR code
resources inside and outside the library makes it difficult for solution is described; in Section 4, the application's test
both the librarian and the user(s) to locate and maintain track strategy is explained; and in Section 5, the paper is concluded.
of such resources, which makes misplaced materials a
particular problem. The user should be the second priority of II. REVIEW OF RELATED WORKS
a library management system. A library should be designed
with the general public's accessibility and ease of use in mind, This section discusses the various applications of QR
as their primary purpose is to further education and code and related works of different authors on commonly
knowledge acquisition (Varadarajan and Malpani, 2022). used technologies in library management systems. The
Ultimately, it's preferable for the user to interact with library section will begin by introducing the three management
resources directly and develop into an autonomous library methods that libraries currently use: IoT system, barcode
user; that is, to be able to access resources without assistance technology, and RFID technology. The QR code and the two
(Whitchurch, 2021). While some library systems use various common systems that presently use it will be introduced in
technologies, like barcodes, Radio Frequency Identifier the second section; Ticketing systems and ATM transactions.
(RFID), and the Internet of Things (IoT), the use of such
technologies in library management is typically subpar. This
is either because most libraries lack the resources to
implement these systems, or they are too time-consuming,
lack flexibility and heavily reliant on humans.
A. Different Technologies Used by Smart Library at the entrance. The user can check books in and out, book
Management System rooms, schedule appointments, and do a lot more things here.
The Smart Library Management System (SLMS) has
been the subject of a good deal of research, and the following Comparing this method to the barcode and RFID
part provides a brief overview of three technologies that are technologies, it is most likely the most successful in resolving
most frequently utilized in tertiary institutions libraries: the problems that libraries have encountered (Brian et al.,
barcodes, RFID, and IoT. 2022). Nevertheless, this approach necessitates a thorough
redesign of libraries, which would demand a massive
Barcode resource commitment. For this reason, many libraries will
The bar code provides a real-time data storage which is find the QR code system to be a far more appealing option.
a component of Automatic Identification Technology (Auto
ID). It consists of a set of vertical bars that, when a barcode B. QR Code
reader is used to measure the intensity of reflected barcode A QR code is a matrix barcode that can be read by
light, can be used to readily recover and understand numbers cameras on mobile phones and smart phones. A Toyota
and letters encoded in that format. Barcode technology has subsidiary called Denso-Wave created it in 1994 (Narmadhaa
replaced keyboard data entry in almost every industry et al, 2017). The QR code can be processed using a free
because it is more precise and operates at a far faster pace. application on the majority of phones bought in the US.
Given that both approaches require scanning a matrix, the Although some colorful and even branded QR codes are
design of the QR system put out here and a barcode-based already being utilized, the typical QR code is a small white
library system are extremely similar (El Mhouti and Erradi square with black geometric elements (Ashford, 2020). A
2018). conventional QR code uses four defined encoding modes
(binary, kanji, alphanumeric, and numeric) to store data
But compared to a barcode, a QR code is more effective efficiently. When compared to a standard barcode, a QR code
(Zhang et al., 2018). It keeps data organized both vertically may store far more data. A QR code can contain any type of
and horizontally. Compared to a standard barcode, a QR code text, including phone numbers, URLs, SMS messages, V-
can store far more data in a smaller space. These features cards, and more. Because they enable rapid content decoding,
come in handy in libraries where managing huge amounts of they are known as QR codes. The Reed Solomon Code's
compressed data is necessary. error-correcting and error-detecting capabilities are one of
this technology's shortcomings (Kieseberg et al,. 2022).
RFID
RFID is an automatic contactless data collecting method C. Various Applications of QR Code
technology. Tags, a microcontroller, a reader, and database In recent years, QR codes have gained a lot of popularity
software are some of the parts used in RFID technology in and are being utilized in many different systems and
library management system (Yu et al., 2021). To identify the scenarios. In order to clarify the usage of QR codes in a
tags, the readers are positioned in specific areas. Compared to library management system, this section will help introduce
barcodes, RFID technology can detect tags across greater the system and explain how to utilize it. ATMs and ticketing
distances and numerous tags at once. According to systems are two distinct QR code applications among others
Whitchurch (2021), using the RFID instead of a barcode that have gained popularity. These are introduced in this
makes library transactions more efficient. It can also be used section.
for ID cards. According to Addepalli (2022), an RFID library
system is made up of sensors and tags. The sensor scans and ATM
shows the actions that are necessary or possible when a ATM transactions are one area where QR codes have
student enters or exits the library (Addepalli and Addepalli, gained popularity. Users can authenticate themselves at ATMs
2022). However, this technology has significant downsides, and other security machines for card-less transactions by
including expensive tags and time-consuming installation. using QR codes.
The QR code is a good substitute since it saves a significant
amount of money by doing away with the need for tags and An external device displays an image code that
scanners (Kieseberg et al, 2022). facilitates these transactions. Next, users require a mobile
device typically offered by their banking application that has
IoT a decoding feature. This feature permits access to a secure
The luxury of retrieving library resource from its resource by decoding the transaction information encoded in
location with the use of an interconnected system that uses a the picture (Varadarajan and Malpani, 2022). If the
Wi-Fi based Local Positioning System (LPS) and Near Field transaction data and the identifier pass the authentication test,
Communication (NFC) tags is discussed by Larsan et al it sends the data and the mobile device's identifier to an
(2019) in his discussion of IoT based SLMS (Brian et al, authentication system, allowing access to the secure resource.
2022). This IoT solution is innovative in the field of education The ATM system serves as an illustration of how library
because it creates a smart library system that enhances real- patrons' personal information can be kept safe and how QR
time visibility, user experiences, and functional competence. code authentication techniques can be used to grant users
To enter the local area network of the library, the user places access to a system. The QR code technology can monitor
his NFC-enabled phone over the NFC scanner that is situated library patrons, their personal data, and the items they have
checked out. Most notably, the user gains self-reliance
through the QR code authentication mechanism, negating the The following features are available to users who access
need for an intermediary to oversee the transaction in order to the library system through the student version:
guarantee appropriate use. The approach is straightforward
and guarantees the organization and security of patrons,
employees, and library materials.
Ticketing System
Humans are typically the driving force behind ticket
sales in places where internet technology deployment is still
in its infancy. Even though QR codes are being employed in
ticking operations more and more, human intervention is still
typically required to help supervise the code scanning and
entry processes.
A. Features
The system has four primary features, which were
covered in the preceding subsection: searching library
resource, managing library resource, issuing library resource,
and returning library resource. Two functions that call for the
usage of the QR code scanner integrated into the application
are the issuing and returning of library resource.
Upon launching the application, the user is redirected to When a library resource is returned, the library staff is
the welcome screen, where they can select to reset their notified, and they may confirm the return by scanning the QR
application password, sign up, or login. When registering, code on each book. The application keeps tabs on the due date
new users have the option to enter personal data such name, via the database and determines if the library resource is
student ID, and cell phone number. Following a successful returned prior to or subsequent to that date. If the resource is
registration, the user is taken to the homepage. The homepage returned after the due date, the user is informed and the fine
is the application's home screen, from which the user can is computed appropriately. A N100 fine is assessed for books
access all of its core functions, including checking the status that arrive late by 1-4 days, a N200 fine for books arriving
of a library resource issue, returning or extending its loan late by 5-29 days, and a larger penalty of more than one month
period, and issuing and searching library resource. is due by the student.
The program stores resource(s), manages all incoming Manage Library Resource
and outgoing resource transactions, authenticates users, and This function is crucial since it controls library resource
registers users using the Firebase database. Before being movement and deters theft in the library. The library staff is
saved, all of the data is encrypted, which lowers the likelihood the only one with access to it. It gives a list of library
of hacking vulnerabilities. resources that are coming in and going out and alerts the staff
when a library resource is past due.
Staff members may decide to prevent a user from A library resource was added to the database from the
releasing library resources going forward if they learn of sample resources collection. Since the feature isn't present in
potential library resource mistreatment. The staff can also use the student application, this test is solely for the librarian
it to administer the database, add new library resource, and application. We will use the "search button" function to look
change existing library resources. for the same library resource to make sure it is correctly
added. The same library resource can be tried to be added
Time Period again to verify security; if the system rejects the library
Although the feature is exclusive to this application and resource, it verifies that each library resource stored is
is dependent on library resource popularity, it is not a main independent of the others.
button. The number of requests (n.r), or the number of persons
interested in borrowing a library resource, is used to C. Library Resource Search
determine how popular the library resources is. Three time All 200 of the library resources that are kept in the
intervals are distinguished: one week (n.r > 10), two weeks database should be searchable by the user. A concise synopsis
(n.r > 5), and three weeks (n.r < 3). This attribute corresponds of the book should be provided in the search result. Any
to the quantity of the same book that is on sale. In the library, attribute in the library resource can be used by the user to
every library resource has a different QR code. For instance, search it. Users should be able to search if it is books by
because Python Programming I is so popular (n.r > 10), users publisher, author, year, or title, and the database should return
are only permitted to utilize it for a single week. the necessary book. A brief synopsis of a book is also
displayed along with the search function, since the purpose of
Database this feature is to allow users to explore the library's content.
The Firebase database houses the metadata and user data
for every library resource. Every library resource has a unique D. Library Resource Issue
QR code that is produced from its metadata and is kept in the Try to borrow a library resource from the library by
database. Every book is saved according to four criteria, as scanning the library resource’s QR code. Each of the 200
illustrated in Figure 3. You can search the library resource library resources will have a distinct QR code.
using its publisher, author, year, and title. A brief abstract is
also included with the book search to provide some Two copies of the same library resource will be included
background information about a library resource. The in the sample size because it is crucial to guarantee each
database is exclusively accessible to library employees. The library resource is independent. The library resources ought
librarian is informed of any modifications to the library to be available for independent library resource borrowing by
resource inventory. This keeps library resources safe from two students. All volumes are available for two-week loan for
thieves and guarantees that they enter and exit the library the experiment. A user has the option to request an extension
without incident. of the time that the library resource is issued to them. We'll
test this feature by adjusting the time period to a couple of
IV. TEST STRATEGY hours. A borrowed library resource may be reissued for an
additional hour if a request for an extension is made within
The Federal Polytechnic Bauchi library will be used to 30 minutes of the original release.
test the application. For testing, a set of two hundred (200)
randomly selected experimental library resources are taken V. CONCLUSION
into consideration. It will be necessary for at least one person
to register, log in, and utilize the many functions. The The QR code implementation and SLMS application
experiments listed below are ones that the application needs have been developed and tested: The implementation of the
to pass: QR code, library management, login, and profile data has
been completed successfully. The list of library resources is
A. Access System always updated each time a user checks out a library resource
The user creates a new account, and if they are able to from the library. 200 library resources were used as a sample
log in successfully, the login mechanism appears to be data set to evaluate the technology. Using a smartphone, the
working. After their registration is approved, the individual test user was able to check out and return library resources as
receives an email. In addition, the "forget password" button needed and search for library resource at their convenience.
generates a new password by email. Approximately 20 With the effective implementation of the SLMS via QR
students will register and validate whether they receive emails codes, students can now utilize libraries more effectively and
in order to ensure the efficiency of the login system. If a user on their own. The number of library employees needed to run
tries to register with the same registration number again, for a library was greatly decreased by using SLMS. Future work
security reasons, the new user registration should fail because will include SLMS security and a machine learning-based
the login account is already active. Since there are just three search option recommendation.
or four library employees, they will be prompted to confirm
that they received notice of new user registrations by logging
into the library application. Making sure that a student ID is
turned down in the library application is also crucial.
B. Include Library Resource
ACKNOWLEDGEMENT
REFERENCES