E-Soft Library Control System
|
In order to benefit the student and
staff of the Sumber Manusia, we hereby would be pleased to introduce
our E-Soft Realtime Library System. It will not only replace the old
method of manual system, but also to offers a real cost saving
solutions in terms of time and cost, but increase security. The new
system will deploy the new RfiD technology in the application, so as to
achieve the real time data collection for the Library System, with the
option to protect the system by using Fingerprint Biometric solutions. |
|
Scope Of Project
- To design and develop a Realtime Library System based on RfiD Technology.
- To propose wireless data collection solution by using handheld RfiD Reader.
|
|
Objective Of Project
- To achieve a truly efficient library management system
with the implementation of paperless and realtime data collection
technology.
|
|
System Flow
The system flow of the proposed E-Soft Library System shall be classified into a few stages: |
a. |
Membership Files Maintenance.
This module shall maintain the personal details of the library members
based on the membership number. This will including the membership
number, student number, name, I/C number, address, telephone number,
course taken and so on. There are 2 options for the membership
identification, first is to use the RfiD Card and the others is
deploying the Fingerprint Biometric. For RfiD card, registration
process shall issues RfiD membership card to the students which will
carry identification of the students. The students will needs to show
their RfiD Membership card, whenever they wants to borrow library
materials. In order to ensure the membership are not misused by other
people, we hereby also propose the 2nd option which is to built-in the
Fingerprint Biometric verification in the system. This will protect the
membership card from being used by the others for the borrowing library
material.
|
b. |
Book Title File Maintenance.
This module will maintain the book details available in the library. As
the system have propose to attach an RfiD tags to all the books in the
library, therefore the every books will have an identification code in
the RfiD Tags. To register the books into the system, the librarian
will have to activate the Book Title File Maintenance, scan the book
with a RfiD Reader, filled up the book’s particulars as provided
in the system, and specify the desired location to be stored. This
module will also handling the disposal of the old books which are no
more available in the library. The rack number or location in which the
book are stores are update for every library material, and shall refer
the rack number or location as kept in Racking Master Files
Maintenance.
|
|
c. |
Racking Master File Maintenance.
The Racking Master File shall maintain the rack number or location
number of the library. All rack or location shall be pre-defined. In
order to visualize the location of the rack, it is suggested that a
location plan shall be prepared to define all the racking number and
location.
|
|
d. |
Borrowing Library Material Processing.
The Library RfiD card is the key to borrow library material, however
our system also propose the Fingerprint Biometric device to perform
verification of identity. We have propose a self service book borrowing
counter in the Library System, in which all transaction of borrowing
library material will be performed by the students. The working
procedures are as follows:
• Present the RfiD card and scan to the RfiD reader.
• Membership number, name and other personal particular will display.
• The system will then ask for a Fingerprint Biometric verification.
• Place your finger to the Fingerprint Biometric Device and a scan is performed.
• System will shown verification result which is either Accepted or Rejected.
• If accepted, the system will prompt to scan the books borrowed. (RfiD Scanning)
• Only a limited quantity of book are allowed to borrowed out by every particular student.
• If rejected, system will prompt error message.
After the borrowing process, the students shall pass the borrowed book
to the librarian, to verify the status of the book. The library will
only perform the checking process by placing all books to another RfiD
reader connected to the computer. A checking module will be activated,
in which whenever a book is scan, the book status will be prompted. It
shall be either “Borrowed” or “Not Transacted”.
The student will then walk through the existing EAS scanning reader to
check if any other book are kept by him/her. A beep sound and red light
shall be shown if there are still books attached to the student. The
books will not going through the EAS Scanning device, but going by pass
the EAS Scan.
|
|
e. |
Return Library Material Processing.
A bookdrop have been proposed to place outside the library. This will
ensure the books return process are make easy, and books can be
returned all the times. End of the day, the librarian will collect all
the return books, scan via RfiD reader, and put the books back to the
shelve. |
|
f. |
Books Checking Points.
An books outward checking point is proposed to setup in the exit of the
library. (See proposed system flow). A checking module shall be
developed to scan the books via the RfiD reader and verify on the
books. The checking results which either Pass or Reject shall be
displayed on screen while the checking taken place. Upon detect of
Reject instruction, the student will be stopped for investigation.
Otherwise, green light will be given to the particular student to exit
from the library. |
|
g. |
Late Return Penalty.
In the manage of the Late Return Penalty, a penalty rate module shall
be updated accordingly based on the days of late incurred. In the
detect of the late returned, a records for the late return charges will
be calculated and stored in the students accounts. The student’s
membership will then blacklisted automatically by the system. No
borrowing or renewal transaction shall be able to carry out for the
particular student, until he pay the penalty and the librarian clear
him from the blacklisted list.
|
|
h. |
Renewal of Borrowing Processing.
Renewal of the books borrowed can be done same as the procedure in the
Borrowing Library Material Processing. Click the Renewal button in
Books Borrowing Terminal, scan the RfiD membership card, verify the
fingerprint, and scan the books to be renewed. A pre-define number of
days for the extension shall be updated immediately. |
|
i. |
Stock-Taking.
In order to physically check the balance books in the shelves, the
stock-taking shall be carried out. The proposed stock-taking is to
deploy the hand held RfiD scanner using pocket pc. Librarian shall
carry the hand held reader and scanned all books on the shelves. It
will then download into the system to produce a variance report. It
will also generate the missing books listing which shown all missing
books. |
|
j. |
Missing Books Management.
In detecting the missing books after the stock-taking process,
librarian shall go to the Missing Books Management module to register
the missing, and write off from the books list.
|
|
k. |
Management Reporting.
A numbers of management reports shall be produced as follows:
- Books Title Listing.
- Membership Details Listing.
- Books Borrowing Status Listing.
- Books Return Listing.
- Books Borrowing Transaction List by membership.
- Late Books Return & Penalty Listing.
- Blacklisted Membership Listing.
- Stock-take Listing.
- Missing Books Listing.
|
|
|
Platform
The proposed E-Soft Library System will be developed to run under the
Microsoft Windows 98, Windows 2000, Windows ME or Windows XP platform.
The database deployed will be either Microsoft Access or MYSQL Database. |
|
|
Facilities
Minimum 2 computers are required in implementation of the E-Soft
Library Control System. One of them is to use as the books borrowing
terminal and the other one is for the books checking point terminal.
The minimum requirement for the 2 computer shall be at least Pentium
III with 128MB memory and 10GB Hardisk spaces. The computer shall be
networked in Lan environment. A file server is preferred, but peer to
peer networking will also sufficient to use for the system. |
|
|
|