You are on page 1of 71

A

Mini Project Report


On
“RFID BASED LIBRARY MANAGEMENT SYSTEM”
Submitted in partial fulfillment of the

Requirement for the award of degree of

BACHELOR OF TECHNOLOGY
In
ELECTRONICS AND COMMUNICATION ENGINEERING
Submitted by

CH. SHIVANI 15M61A04A8


SD. APSHA TAHASEEN 15M61A04E1
Y. ESHWAR SAI 16M65A0418
B. UDAY BHANU 15M61A04A4

Under the Guidance of


Mr. N. MALLIKARJUN M .Tech

Assistant Professor

DEPARTM ENT OF ELECTRONICS & COM M UNICATION ENGINEERING


SW ARNA BHARATHI INSTITUTE OF SCIENCE & TECHNOLOGY, KHAM M AM
(Approved by AICTE, Govt. of T.S. & Affiliated to JNTUH, Hyderabad)
(2016-17)
Department of Electronics & Communication Engineering
Swarna Bharathi Institute of Science & Technology, Khammam
(Approved by AICTE, Govt. of T.S. & Affiliated to JNTUH, Hyderabad)

CERTIFICATE
This is to certify that the project report entitled “RFID
BASED LIBRARY MANAGEMENT SYATEM” is a bonafide record of
work carried out by

CH. SHIVANI 15M61A04A8


SD. APSHA TAHASEEN 15M61A04E1
Y. ESHWAR SAI 16M65A0418
B. UDAY BHANU 15M61A04A4
We hereby accord our approval of it as a project work carried out and
presented in a manner required for its acceptance in partial fulfillment for the
award of degree of BACHELOR OF TECHNOLOGY in ELECTRONICS AND
COMMUNICATION ENGINEERING of Jawaharlal Nehru Technological
University Hyderabad, Hyderabad during the academic year 2018-2019.

INTERNAL GUIDE HEAD OF THE DEPARTM ENT


Mr. N. Mallikarjun Mr. Gandham Srinivasa Rao M.T ech, MIEEE.
M.Tech
Assistant Professor Associate Professor

External Examiner PRINCIPAL


Prof. P. Krishna Murthy M.T ech., P h.D.
ACKNOWLEDGEMENT

We take the opportunity to express our deep sense of gratitude to my


Project guide, M r. N. M allikarjun M .Tech, Assistant Professor, Department of
ECE, Swarna Bharathi Institute of Science & Technology, Khammam, for his
excellent guidance, technical information and support which helped us in
successfully completing this project report.

We take the opportunity to express our heartfelt thanks to the Head of the
Department M r. Gandham Srinivasa Rao, Associate Professor, Department of
Electronics & Communication Engineering, Swarna Bharathi Institute of Science
& Technology, Khammam, for his excellent guidance, technical information and
support which helped us in successfully completing this project.

We wish to express our profound thanks to Prof. P. Krishna M urthy,


Principal, Swarna Bharathi Institute of Science & Technology, Khammam, for
providing necessary facilities to make this project a success.

We thank all the members of Teaching and Non-Teaching Staff, Department


of ECE, and all those who have helped us directly or indirectly in completing our
project successfully.

CH. SHIVANI 15M61A04A8


SD. APSHA TAHASEEN 15M61A04E1
Y. ESHWAR SAI 16M65A0418
B. UDAY BHANU 15M61A04A4
DECLARATION
We declare that the project entitled “RFID BASED LIBRARY

MANAGEMENT SYSTEM” recorded in this report does not form part of any
other thesis on which a degree has been awarded earlier. We further declare that
this project report is based on our work carried out at the “SW ARNA BHARATHI
INSTITUTE OF SCIENCE & TECHNOLOGY”, Khammam during the B.Tech
course.

DATE:

PLACE: Khammam

Submitted by

CH. SHIVANI 15M61A04A8


SD. APSHA TAHASEEN 15M61A04E1
Y. ESHWAR SAI 16M65A0418
B. UDAY BHANU 15M61A04A4
INDEX

CHAPTERS Page No.

CHAPTER-1: INTODUCTION 1

1.1. Introduction 1

1.2. Organization of Thesis 2

CHAPTER-2: AIM AND OBJECTIVE 3

2.1. Aim 3

2.2. Objective 3

CHAPTER-3: LITERATURE SURVEY 4

CHAPTER-4: 5

4.1. INTRODUCTION TO EMBEDDED SYSTEM 5

4.1.1. History and Future 6

4.1.2. Application Areas 6

4.1.3. Overview of Embedded system Architecture 8

4.2. HARDWARE IMPLIMENTATION 11

4.2.1. Block diagram overview 11

4.2.2. Power Supply 12

4.2.3. LCD Module 16

4.2.4. LED 18

4.2.5. Tags 19

4.2.6. RFID Reader 22

4.2.7. AT89S52 Microcontroller 23

4.2.8. Memories 31

4.3. SOFTWARE IMPLIMENTATION 36

4.3.1. Introduction to Software 36

4.3.2. Source Code Implementation 39


CHAPTER-5: FLOW CHART AND SOURCE CODE 47

5.1. Flow Chart 47

5.2. Source Code 48

CHAPTER-6: RESULT AND DISCUSSION 56

CHAPTER-7:

CONCLUSION, LIMITATIONS AND FUTURE SCOPE 58

7.1. Conclusion 58

7.2. Limitation 58

7.3. Future Scope 58

BIBLOGRAPHY 59
LIST OF FIGURES

S.NO Name of the figure Page.no


1. Architecture of embedded system 9

2. Block diagram of the project 11

3. Block diagram of the power supply 12

4. Transformer 12

5. Voltage Regulator 14

6. Circuit diagram of power supply 15

7. LCD module 17

8. LCD Controller 18

9. Figure of LED 18

10. Figure of LED life time 19

11. RFID Tags 20

12. AT89S52 Microcontroller 24

13. Pin diagram of AT89S52 Micro controller 26

14. Oscillator and timing circuit 30

15. Functional block diagram of Micro controller 31


LIST OF TABLES

S.NO. Name of the Table Page.no


1. Specifications of IC7805 16

2. Pin description of LCD module 17

3. Port 1 pin description of AT89S52 controller 27

4. Port 3 pin description of AT89S52 28


ABBREVIATIONS

RFID - Radio Frequency Identification

LMS – Library Management Systems

PADS – Packet Assemblers Disassemblers

ROM – Read Only Memory

RAM – Random Access Memory

LCD – Liquid Crystal Diode

LED – Light Emitting Diode

EPC – Electronic Product Code


ABSTRACT

Radio Frequency Identification (RFID) is a new generation of Auto Identification


and Data collection technology which helps to automate business processes and allows
identification of large number of tagged objects like books, using radio waves.

RFID based Library Management system (LMS) would allow fast


transaction flow for the library and will prove immediate and long-term benefits to
library in traceability and security. The proposed system is based on UHF RFID readers,
supported with antennas at gate and transaction sections, and library cards containing
RFID-transponders which are able to electronically store information that can be read /
written even without the physical contact with the help of radio medium. This project
presents the experiments conducted to set up RFID based LMS.
RFID BASED LIBRARY MANAGEMENT SYSYEM

CHAPTER-1

INTRODUCTION

1.1 INTRODUCTION OF THE PROJECT:

RFID technology is being implemented in a number of industries. Supply chain


implementation is perhaps one of the most frequently mentioned applications of RFID
tags and equipment. The libraries across the globe started to use RFID to speed up the
self-check in/out processes, to control the theft and to ease the inventory control in
library. The barcode technology is slowly getting replaced by the RFID technology. The
RFID tag does not have to be visible for detection. It can be read even when it is
embedded in an item, such as in the cardboard cover of a book or in the packaging of a
product. It can also store data such as stack number, accession number, book number,
author information etc., but barcode is limited to just an identification number. The paper
presents the study taken and corresponding experiments conducted for integrating RFID
to existing LMS of CDAC. The remaining sections of this paper are organized as
follows: describes about Library, the tasks involved in that, problems faced by librarians
and RFID‘s role in automating some of the tasks of library, describes about the technical
specification of the hardware and tags used in project (RFID based LMS), describes
about the modules developed in project, describes about the experiments conducted to
find out the proper tag position in book and describes about the benefits of the project.

1.1.1. RFID in Library:

A library is a collection of information, sources, resources, books, and


services, and the structure in which it is housed. Apart from books many libraries are
now also repositories and access points for maps, prints, or other documents on various
storage media such as microform (microfilm/microfiche), audio tapes, CDs, LPs,
cassettes, videotapes, and DVDs. Libraries have materials arranged in a specified order
according to a library classification system, so that items may be located quickly and
collections may be browsed efficiently. Reference stacks are different which has only
reference books and only selected members

1
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Basic tasks in library management include the planning of acquisitions of


materials, arranging the acquired materials according to the library classification,
preservation of materials the de accessioning of materials, patron borrowing of materials,
and developing and administering library computer systems. Among these, the proposed
system will automate the following tasks using RFID technology.

 Accessing number of books at a time

 Searching a particular book to check its presence in the library

 Locating the physical location of the book

 Accounting/Stock verification of the materials

The RFID based Library Management Systems facilitates the fast issuing, reissuing and
returning of books with the help of RFID enabled modules. It directly provides the book
information and library member information to the library management system and does
not need the manual typing. It also provides monitoring and searching system. The
monitoring module will continuously monitor the movement of books across the gates,
so that the books taken out without prior issuing will be traced out easily and will alarm
the librarians. The searching module provides the fast searching of books using RFID
handheld reader. The physical location of the books can be easily located using this
module.

1.2 ORGANIZATION OF THESIS:


This thesis is divided into 7 chapters. Following this introductory part is
chapter1, which presents background information of the project. Chapter 2 describes the
aim and objectives of this project. Chapter 3 describes the Literature survey. Chapter 4
divided into two parts they are part 1: hardware implementation and part 2: software
implementation. Part 1 describes the construction, working and specifications of the
rectifier, regulator, LCD module, LED Light, Tags, RFID Reader, electronic buzzer and
AT89S52 micro controller. Part 2 describes the software tools we use and
implementation of programs and procedure. Chapter 5 describes flowchart of the project
and sample outputs of the project. Chapter 6 describes result and discussion. Chapter 7
covers conclusion, limitations and future scope. And concluding this thesis is the
bibliography.
2
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

CHAPTER-2
AIM AND OBJECTIVES
2.1 AIM:
Library is a place where knowledge resides, in the form of books,
journals, and audio visuals such as CDs and DVDs. The management and maintenance
of a library is a very crucial and time-consuming task. Since long, libraries have been
using Barcode technology for the maintenance of books and other documents available
for the customer. But the Barcode technology has its own limitation regarding the time
consumed and security. RFID (Radio Frequency Identification) technology is one of the
latest technologies being used by libraries. RFID technology does not require line of
sight to detect the target and hence it makes detecting documents (digital or print) easier
and quick. RFID based Library Management System comes with many benefits, but cost
is a big challenge for its adoption. This paper discusses RFID based Library
Management System, with its various benefits and challenges.

The main aim of this project is for Fastest, easiest, most


efficient way to track, locate & manage library materials, Efficient Book circulation
management, Automatic Check-in and Check-out Library inventory tracking in minutes
instead of hours, Multiple books can be read simultaneously, Unique ID of the RFID tag
prevents counterfeiting, Automated material handling using conveyor & sorting systems.

2.2 OBJECTIVES:
Here I am presenting a brief idea about how RFID based library system
would operate. Conventional procedure in libraries involve manually handling functions
like keeping record of the books (or magazines, journals etc.) being read at the place, or
being given to the reader for a stipulated time-period, checking membership authenticity
of existing readers, creating new memberships etc. These functions are usually done by a
person who manually enters new data or modifies existing data in the software, making it
tedious as well as time consuming. Hence a more convenient method would be a system
where automatic handling of all these operations would be successful. One of the
feasible methods is using Radio Frequency Identification System.

3
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

CHAPTER-3
LITERATURE SURVEY

Many researches have been carried out in design of library management system using
RFID technology. The author Kiyotaka FUJISAKI in ―An RFID based system for library
management and its performance evaluation‖ proposed the idea of electromagnetic
coupling. The resonant frequency was measured using grip dip oscillator under various
conditions and as was shown that as the volume of book increases the resonant frequency
becomes low. The resonant frequency changed according to the algorithmic function. It
was also shown that after attaching the tag on goods the resonant frequency became
appropriate and as the distance between the two pieces of tags becomes narrow the
resonant frequency decreases rapidly. The environment condition humidity also affects
the resonant frequency.
―Self-service management platform design for library based on RFID‖ overviewed
the necessity of new technology of self-service of book borrowing and returning system
in library which will replace the barcode technology and accelerate the library‘s self-
service process. He showed that RFID technology can identify the high-speed moving
objects, even can identify the number of labels; the operation is fast and convenient.
RFID is a simple wireless system composed of by tag, reader and antenna.

4
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

CHAPTER-4
DESIGN IMPLEMENTATION
4.1. INRODUCTION OF EMBEDDED SYSTEMS:
An Embedded System is a combination of computer hardware and software, and
perhaps additional mechanical or other parts, designed to perform a specific function. A
good example is the microwave oven. Almost every household has one, and tens of
millions of them are used every day, but very few people realize that a processor and
software are involved in the preparation of their lunch or dinner.
This is in direct contrast to the personal computer in the family room. It too is
comprised of computer hardware and software and mechanical components (disk drives,
for example). However, a personal computer is not designed to perform a specific
function rather; it is able to do many different things. Many people use the term general-
purpose computer to make this distinction clear. As shipped, a general-purpose computer
is a blank slate; the manufacturer does not know what the customer will do wish it. One
customer may use it for a network file server another may use it exclusively for playing
games, and a third may use it to write the next great American novel.
Frequently, an embedded system is a component within some larger system. For
example, modern cars and trucks contain many embedded systems. One embedded
system controls the anti-lock brakes, other monitors and controls the vehicle's emissions,
and a third displays information on the dashboard. In some cases, these embedded
systems are connected by some sort of a communication network, but that is certainly not
a requirement.
At the possible risk of confusing you, it is important to point out that a general-
purpose computer is itself made up of numerous embedded systems. For example, my
computer consists of a keyboard, mouse, video card, modem, hard drive, floppy drive,
and sound card-each of which is an embedded system. Each of these devices contains a
processor and software and is designed to perform a specific function. For example, the
modem is designed to send and receive digital data over analog telephone line. That's it
and all of the other devices can be summarized in a single sentence as well.
If an embedded system is designed well, the existence of the processor and
software could be completely unnoticed by the user of the device. Such is the case for a

5
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

microwave oven, VCR, or alarm clock. In some cases, it would even be possible to build
an equivalent device that does not contain the processor and software. This could be
done by replacing the combination with a custom integrated circuit that performs the
same functions in hardware. However, a lot of flexibility is lost when a design is hard-
cooled in this way. It is much easier, and cheaper, to change a few lines of software than
to redesign a piece of custom hardware.

4.1.1. History and Future:


Given the definition of embedded systems earlier is this chapter; the first such
systems could not possibly have appeared before 1971. That was the year Intel
introduced the world's first microprocessor. This chip, the 4004, was designed for use in
a line of business calculators produced by the Japanese Company Busicom. In 1969,
Busicom asked Intel to design a set of custom integrated circuits-one for each of their
new calculator models. The 4004 was Intel's response rather than design custom
hardware for each calculator, Intel proposed a general-purpose circuit that could be used
throughout the entire line of calculators. Intel's idea was that the software would give
each calculator its unique set of features.
The microcontroller was an overnight success, and its use increased steadily over
the next decade. Early embedded applications included unmanned space probes,
computerized traffic lights, and aircraft flight control systems. In the 1980s, embedded
systems quietly rode the waves of the microcomputer age and brought microprocessors
into every part of our kitchens (bread machines, food processors, and microwave ovens),
living rooms (televisions, stereos, and remote controls), and workplaces (fax machines,
pagers, laser printers, cash registers, and credit card readers).

4.1.2. Application Areas:


Nearly 99 per cent of the processors manufactured end up in embedded systems.
The embedded system market is one of the highest growth areas as these systems are
used in very market segment- consumer electronics, office automation, industrial
automation, biomedical engineering, wireless communication, data communication,
telecommunication, transportation and military so on.
1) Consumer appliances: At home we use a number of embedded systems which
include digital camera, digital diary, DVD player, electronic toys, microwave oven,
6
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

remote controls for TV and air-conditioner, VCO player, video game consoles, video
recorders etc. Today‘s high-tech car has about 20 embedded systems for transmission
control, engine spark control, air-conditioning, navigation etc.

Even wristwatches are now becoming embedded systems. The palmtops are powerful
embedded systems using which we can carry out many general-purpose tasks such as
playing games and word processing.

2) Office automation: The office automation products using am embedded systems


are copying machine, fax machine, key telephone, modem, printer, scanner etc.

3) Industrial automation: Today a lot of industries use embedded systems for


process control. These include pharmaceutical, cement, sugar, oil exploration, nuclear
energy, electricity generation and transmission. The embedded systems for industrial use
are designed to carry out specific tasks such as monitoring the temperature, pressure,
humidity, voltage, current etc., and then take appropriate action based on the monitored
levels to control other devices or to send information to a centralized monitoring station.
In hazardous industrial environment, where human presence has to be avoided, robots
are used, which are programmed to do specific jobs. The robots are now becoming very
powerful and carry out many interesting and complicated tasks such as hardware
assembly.

4) Medical electronics: Almost all medical equipment‘s in the hospital are an


embedded system. These equipment‘s include diagnostic aids such as ECG, EEG, blood
pressure measuring devices, X-ray scanners; equipment used in blood analysis, radiation,
colonoscopy, endoscopy etc. Developments in medical electronics have paved way for
more accurate diagnosis of diseases.

5) Computer networking: Computer networking products such as bridges, routers,


Integrated Services Digital Networks (ISDN), Asynchronous Transfer Mode (ATM),
X.25 and frame relay switches are embedded systems which implement the necessary
data communication protocols. For example, a router interconnects two networks. The
two networks may be running different protocol stacks. The router‘s function is to obtain
the data packets from incoming pores, analyze the packets and send them towards the
destination after doing necessary protocol conversion. Most networking equipment‘s,

7
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

other than the end systems (desktop computers) we use to access the networks, are
embedded systems.

6) Telecommunications: In the field of telecommunications, the embedded systems


can be categorized as subscriber terminals and network equipment. The subscriber
terminals such as key telephones, ISDN phones, terminal adapters, web cameras are
embedded systems. The network equipment includes multiplexers, multiple access
systems, Packet Assemblers Dissemblers (PADs), sate11ite modems etc. IP phone, IP
gateway, IP gatekeeper etc. are the latest embedded systems that provide very low-cost
voice communication over the Internet.

7) Wireless technologies: Advances in mobile communications are paving way for


many interesting applications using embedded systems. The mobile phone is one of the
marvels of the last decade of the 20th century. It is a very powerful embedded system
that provides voice communication while we are on the move. The Personal Digital
Assistants and the palmtops can now be used to access multimedia services over the
Internet. Mobile communication infrastructure such as base station controllers, mobile
switching centers are also powerful embedded systems.

8) Insemination: Testing and measurement are the fundamental requirements in all


scientific and engineering activities. The measuring equipment we use laboratories to
measure parameters such as weight, temperature, pressure, humidity, voltage, current etc.
All are embedded systems. Test equipment such as an oscilloscope, spectrum analyzer,
logic analyzer, protocol analyzer, radio communication test set etc. Embedded systems
are built around powerful processer. The test and measuring equipment are now
becoming portable facilitating easy testing and measurement in the field by field-
personnel.

4.1.3 Overview of Embedded System Architecture:

Every embedded system consists of custom-built hardware built around a Central


Processing Unit (CPU). This hardware also contains memory chips onto which the
software is loaded. The software residing on the memory chip is also called the
‗firmware‘. The embedded system architecture can be represented as a layered
architecture

8
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

The operating system runs above the hardware, and the application software runs
above the operating system. The same architecture is applicable to any computer
including a desktop computer. However, there are significant differences. It is not
compulsory to have an operating system in every embedded system. For small appliances
such as remote-control units, air conditioners, toys etc., there is no need for an operating
system and you can write only the software specific to that application. For applications
involving complex processing, it is advisable to have an operating system. In such a case,
you need to integrate the application software with the operating system and then transfer
the entire software on to the memory chip. Once the software is transferred to the
memory chip, the software will continue to run for a long time you don‘t need to reload
new software. Now, let us see the details of the various building blocks of the hardware
of an embedded system. We have six building blocks and they are mentioned below and
a small description about every block also mentioned.

The six basic building blocks are:

 Central Processing Unit (CPU)


 Memory (Read-only Memory and Random Access Memory)
 Input Devices
 Output devices
 Communication interfaces

 Application – specific circuitry

Read-Only Random
access
Memory
Memory

Input Central Processing Output

Devices Unit Devices

Communication
Interfaces
Application Specific Circuitry

9
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.1: Architecture of an embedded system

1)Central Processing Unit (CPU):

The Central Processing Unit (processor, in short) can be any of the following:
microcontroller, microprocessor or Digital Signal Processor (DSP). A micro-controller is
a low-cost processor. Its main attraction is t2hat on the chip itself, there will be many
other components such as memory, serial communication interface, analog-to digital
converter etc. So, for small applications, a micro-controller is the best choice as the
number of external components required will be very less.

On the other hand, microprocessors are more powerful, but you need to use many
external components with them. D5P is used mainly for applications in which signal
processing is involved such as audio and video processing.

2) Memory:

The memory is categorized as Random-Access Memory (RAM) and Read Only


Memory (ROM). The contents of the RAM will be erased if power is switched off to the
chip, whereas ROM retains the contents even if the power is switched off. So, the
firmware is stored in the ROM. When power is switched on, the processor reads the
ROM; the program is program is executed.

3)Input devices:

Unlike the desktops, the input devices to an embedded system have very limited
capability. There will be no keyboard or a mouse, and hence interacting with the
embedded system is no easy task. Many embedded systems will have a small keypad-
you press one key to give a specific command. A keypad may be used to input only the
digits. Many embedded systems used in process control do not have any input device for
user interaction; they take inputs from sensors or transducers 1‘fnd produce electrical
signals that are in turn fed to other systems.

10
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

4) Output devices:

The output devices of the embedded systems also have very limited capability.
Some embedded systems will have a few Light Emitting Diodes (LEDs) to indicate the
health status of the system modules, or for visual indication of alarms. A small Liquid
Crystal Display (LCD) may also be used to display some important parameters.

5) Communication interfaces:

The embedded systems may need to, interact with other embedded systems at
they may have to transmit data to a desktop. To facilitate this, the embedded systems are
provided with one or a few communication interfaces such as RS232, RS422, RS485,
Universal Serial Bus (USB), IEEE 1394, Ethernet etc.

6) Application-specific circuitry:

Sensors, transducers, special processing and control circuitry may be required


fat an embedded system, depending on its application. This circuitry interacts with the
processor to carry out the necessary work. The entire hardware has to be given power
supply either through the 230 volts main supply or through a battery. The hardware has
to design in such a way that the power consumption is minimized.

4.2. HARDWARE IMPLEMENTATION:

4.2.1. BLOCK DIAGRAM OVERVIEW:

BUZZER
LCD
POWER

SUPPLY

RFID AT89S52
READER
LED

11
DEPARTMENT OF ECE, SBIT, KMM
T AG
T AG
T AG
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.2: Block diagram of RFID Based Library Management System

4.2.2. POWER SUPLY:

All digital circuits require regulated power supply. In this article we are going to learn
how to get a regulated positive supply from the mains supply.

Fig 4.3: Block diagram of power supply circuit

Figure 1 shows the basic block diagram of a fixed regulated power supply. Let us go
through each block.

1)TRANSFORMER:

12
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.4: Transformer

A transformer consists of two coils also called as ―WINDINGS‖ namely PRIMARY &
SECONDARY.
They are linked together through inductively coupled electrical conductors also called as
CORE. A changing current in the primary causes a change in the Magnetic Field in the
core & this in turn induces an alternating voltage in the secondary coil. If load is applied
to the secondary then an alternating current will flow through the load. If we consider an
ideal condition then all the energy from the primary circuit will be transferred to the
secondary circuit through the magnetic field.

So

The secondary voltage of the transformer depends on the number of turns in the Primary as
well as in the secondary.

2) Rectifier:

A rectifier is a device that converts an AC signal into DC signal. For rectification


purpose we use a diode, a diode is a device that allows current to pass only in one
direction i.e. when the anode of the diode is positive with respect to the cathode also
called as forward biased condition & blocks current in the reversed biased condition.
Rectifier can be classified as follows:

1) Half Wave rectifier.


2) Full wave rectifier.
3) Bridge Rectifier.

13
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

If we use a center tapped transformer for a bridge rectifier, we can get


both positive & negative half cycles which can thus be used for generating fixed positive
& fixed negative voltages.

3) FILTER CAPACITOR:

Even though half wave & full wave rectifier give DC output, none of them
provides a constant output voltage. For this we require to smoothen the waveform
received from the rectifier. This can be done by using a capacitor at the output of the
rectifier this capacitor is also called as ―FILTER CAPACITOR‖ or ―SMOOTHING
CAPACITOR‖ or ―RESERVOIR CAPACITOR‖. Even after using this capacitor a small
amount of ripple will remain.

Where,
Vr= accepted ripple voltage. (should not be more than 10% of the voltage)
I= current consumed by the circuit in Amperes.
F= frequency of the waveform. A half wave rectifier has only one peak in one cycle so
F=25hz
Whereas a full wave rectifier has Two peaks in one cycle so F=100hz.

4) VOLTAGE REGULATOR: A Voltage regulator is a device which converts


varying input voltage into a constant regulated output voltage. Voltage regulator can be
of two types

1) Linear Voltage Regulator:


Also called as Resistive Voltage regulator because they dissipate the excessive
voltage resistively as heat.
2) Switching Regulators:
They regulate the output voltage by switching the Current ON/OFF very rapidly.
Since their output is either ON or OFF it dissipates very low power thus achieving higher
efficiency as compared to linear voltage regulators. But they are more complex &

14
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

generate high noise due to their switching action. For low level of output power
switching regulators tend to be costly but for higher output wattage they are much
cheaper than linear regulators.

Fig 4.5: Voltage Regulator


After filtering the rectifier output the signal is given to a voltage regulator. The
maximum input voltage that can be applied at the input is 35V.Normally there is a 2-3
Volts drop across the regulator so the input voltage should be at least 2-3 Volts higher
than the output voltage. If the input voltage gets below the Vmin of the regulator due to
the ripple voltage or due to any other reason the voltage regulator will not be able to
produce the correct regulated voltage

5) Circuit diagram:

Fig 4.6: Circuit Diagram of power supply

IC 7805:

7805 is an integrated three-terminal positive fixed linear voltage regulator. It supports an


input voltage of 10 volts to 35 volts and output voltage of 5 volts. It has a current rating
of 1 amp although lower current models are available. Its output voltage is fixed at 5.0V.
The 7805 also has a built-in current limiter as a safety feature. 7805 is manufactured by
many companies, including National Semiconductors and Fairchild Semiconductors.

The 7805 will automatically reduce output current if it gets too hot. The last two digits
represent the voltage; for instance, the 7812 is a 12-volt regulator. The 78xx series of
15
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

regulators is designed to work in complement with the 79xx series of negative voltage
regulators in systems that provide both positive and negative regulated voltages, since
the 78xx series can't regulate negative voltages in such a system.

The 7805 & 78 is one of the most common and well-known of the 78xx series regulators,
as it's small component count and medium-power regulated 5V make it useful for
powering TTL devices.

Table 1: Specifications of IC7805

SPECIFICATIONS IC 7805

Vout 5V

Vein - Vout Difference 5V - 20V

Operation Ambient Temp 0 - 125°C

Output Imax 1A

4.2.3. LCD MODULE:

To display interactive messages, we are using LCD Module. We examine an


intelligent LCD display of two lines,16 characters per line that is interfaced to the
controllers. The protocol (handshaking) for the display is as shown. Whereas D0 to D7th
bit is the Data lines, RS, RW and EN pins are the control pins and remaining pins are
+5V, -5V and GND to provide supply. Where RS is the Register Select, RW is the Read
Write and EN is the Enable pin.

16
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

The display contains two internal byte-wide registers, one for commands (RS=0)
and the second for characters to be displayed (RS=1). It also contains a user-programmed
RAM area that can be programmed to generate any desired character that can be formed
using a dot matrix. To distinguish between these two data areas, the hex command byte
80 will be used to signify that the display RAM address 00h will be chosen. Port1 is used
to furnish the command or data type, and ports 3.2 to3.4 furnish register select and
read/write levels. The display takes varying amounts of time to accomplish the functions
as listed. LCD bit 7 is monitored for logic high (busy) to ensure the display is
overwritten.

Liquid Crystal Display also called as LCD is very helpful in providing user interface as
well as for debugging purpose. The most common type of LCD controller is HITACHI
44780 which provides a simple interface between the controller & an LCD.

Fig 4.7: 2x16 Line Alphanumeric LCD Display

The most commonly used ALPHANUMERIC displays are 1x16 (Single Line & 16
characters), 2x16 (Double Line & 16 character per line) & 4x20 (four lines & Twenty
characters per line).
The LCD requires 3 control lines (RS, R/W & EN) & 8 (or 4) data lines. The number on
data lines depends on the mode of operation. If operated in 8-bit mode then 8 data lines +
3 control lines.
Table 2: Pin description of LCD

Pin Symbol Function


1 Vss Ground
2 Vdd Supply Voltage
3 Vo Contrast Setting
4 RS Register Select
5 R/W Read/Write Select

17
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

6 En Chip Enable Signal


7-14 DBo-DB7 Data Lines
15 A/Vee Gnd for the backlight
16 k Vcc for backlight

When RS is low (0), the data is to be treated as a command. When RS is high (1), the
data being sent is considered as text data which should be displayed on the screen.
When R/W is low (0), the information on the data bus is being written to the LCD. When
RW is high (1), the program is effectively reading from the LCD. Most of the times there
is no need to read from the LCD so this line can directly be connected to Gnd thus saving
one controller line.
The ENABLE pin is used to latch the data present on the data pins. A HIGH
- LOW signal is required to latch the data. The LCD interprets and executes our
command at the instant the EN line is brought low. If you never bring EN low, your
instruction will never be executed.

DATA

RS L
CONTROLLER C
RW
D
ENABLE

Fig 4.7: LCD Controller

4.2.4.LED:

An electroluminescent IR LED is a product which requires care in use. IR


LEDs are fabricated from narrow band heterostructures with energy gap from 0.25 to 0.4
eV. That's why the bias used to initiate current flow is low compared to the well-known
visible or NIR LEDs. Typical forward bias is V~0.1- 1 V only for mid-IR LEDs.

18
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.8: LED

Be sure not to exceed I*max which is given in each LED specification and do
not use test instrument that contain sources/batteries with voltage greater that Vcw max
given in specification. For LED current restriction and further LED current measurement
we recommend to use resistor (1-5 Ohms) connected in serial to LED. We recommend
activating pulse generator prior connecting LED to generator. On switching off the
procedure is reversed: disconnect LED, switch off pulse generator. Long wires
connecting LED with pulse generator may be the reason for LED failure because of
unexpected voltage surges when switching on and off the LED supply.
1)Lifetime Tests: Room temperature lifetime tests were performed with In GaAs
homojunction diodes, un-encapsulated and encapsulated at current pulses of 2A, duration
50 µs and repetition rate of 30 Hz.

Fig 4.9: Life time Tests

This confirms that LED encapsulation or by protection with window should increase
LED lifetime at elevated temperatures.

4.2.5. TAGS:
An RFID tag is comprised of a microchip containing identifying information and an
antenna that transmits this data wirelessly to a reader. At its most basic, the chip will
19
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

contain a serialized identifier, or license plate number, that uniquely identifies that item,
similar to the way many bar codes are used today. A key difference, however is that
RFID tags have a higher data capacity than their bar code counterparts. This increases
the options for the type of information that can be encoded on the tag, including the
manufacturer, batch or lot number, weight, ownership, destination and history (such as
the temperature range to which an item has been exposed). In fact, an unlimited list of
other types of information can be stored on RFID tags, depending on application needs.
An RFID tag can be placed on individual items, cases or pallets for identification
purposes, as well as on fixed assets such as trailers, containers, totes, etc.

Tags come in a variety of types, with a variety of capabilities. Key variables include:

"Read-only" versus "read-write"

There are three options in terms of how data can be encoded on tags:
(1) Read-only tags contain data such as a serialized tracking number, which is pre-
written onto them by the tag manufacturer or distributor. These are generally the least
expensive tags because they cannot have any additional information included as they
move throughout the supply chain. Any updates to that information would have to be
maintained in the application software that tracks SKU movement and activity.
(2) "Write once" tags enable a user to write data to the tag one time in production or
distribution processes. Again, this may include a serial number, but perhaps other data
such as a lot or batch number.
(3) Full "read-write" tags allow new data to be written to the tag as needed—and even
written over the original data. Examples for the latter capability might include the time
and date
of ownership transfer or updating the repair history of a fixed asset. While these are the
costliest of the three tag types and are not practical for tracking inexpensive items, future
standards for electronic product codes (EPC) appear to be headed in this direction.

20
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.10: RFID Tags

1) Data capacity:

The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as
much as several thousand bits on the high end. Of course, the greater the storage
capacity, the higher the price per tag.

2) Form factor:
The tag and antenna structure can come in a variety of physical form factors and
can either be self-contained or embedded as part of a traditional label structure (i.e., the
tag is inside what looks like a regular bar code label—this is termed a 'Smart Label')
companies must choose the appropriate form factors for the tag very carefully and should
expect to use multiple form factors to suit the tagging needs of different physical
products and units of measure.

3) Passive versus active:

―Passive‖ tags have no battery and "broadcast" their data only when energized by a
reader. That means they must be actively polled to send information. "Active" tags are
capable of broadcasting their data using their own battery power. In general, this means
that the read ranges are much greater for active tags than they are for passive tags—
perhaps a read range of 100 feet or more, versus 15 feet or less for most passive tags.
The extra capability and read ranges of active tags, however, come with a cost; they are
several times more expensive than passive tags. Today, active tags are much more likely
to be used for high-value items or fixed assets such as trailers, where the cost is minimal
compared to item value, and very long read ranges are required. Most traditional supply
chain applications, such as the RFID-based tracking and compliance programs emerging
in the consumer goods retail chain, will use the less expensive passive tags.

4) Frequencies:

Like all wireless communications, there are a variety of frequencies or spectra through
which RFID tags can communicate with readers. Again, there are trade-offs among cost,
performance and application requirements. For instance, low-frequency tags are cheaper
than ultra-high-frequency (UHF) tags, use less power and are better able to penetrate

21
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

non-metallic substances. They are ideal for scanning objects with high water content,
such as fruit, at close range. UHF frequencies typically offer better range and can
transfer data faster. But they use more power and are less likely to pass through some
materials. UHF tags are typically best suited for use with or near wood, paper, cardboard
or clothing products. Compared to low-frequency tags, UHF tags might be better for
scanning boxes of goods as they pass through a bay door into a warehouse. While the tag
requirements for compliance mandates may be narrowly defined, it is likely that a variety
of tag types will be required to solve specific operational issues. You will want to work
with a company that is very knowledgeable in tag and reader technology to appropriately
identify the right mix of RFID technology for your environment and applications.
5) EPC Tags:

EPC refers to "electronic product code," an emerging specification for RFID tags,
readers and business applications first developed at the Auto-ID Center at the
Massachusetts Institute of Technology. This organization has provided significant
intellectual leadership toward the use and application of RFID technology. EPC
represents a specific approach to item identification, including an emerging standard for
the tags themselves, including both the data content of the tag and open wireless
communication protocols. In a sense, the EPC movement is combining the data standards
embodied in certain bar code specifications, such as the UPC or UCC-128 bar code
standards, with the wireless data communication standards that have been developed by
ANSI and other groups.

4.2.6. RFID Reader:

An RFID reader's function is to interrogate RFID tags. The means of interrogation is


wireless and because the distance is relatively short; line of sight between the reader and
tags is not necessary. A reader contains an RF module, which acts as both a transmitter
and receiver of radio frequency signals. The transmitter consists of an oscillator to create
the carrier frequency; a modulator to impinge data commands upon this carrier signal
and an amplifier to boost the signal enough to awaken the tag. The receiver has a
demodulator to extract the returned data and also contains an amplifier to strengthen the
signal for processing. A microprocessor forms the control unit, which employs an

22
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

operating system and memory to filter and store the data. The data is now ready to be
sent to the network.

1)Fixed RFID reader:

RFID reader types are fixed, mobile or handheld units. Which type to use is governed by
the application or environment in which they will be utilized. Fixed readers are often
used for large-scale deployments; installed in portals at dock doors and conveyor belts to
capture inventory or for tracking parts, tools and equipment. Fixed RFID readers require
access to a grounded power source and usually connect to the network by cable such as
RS-232, RJ-45 or USB.

2) Mobile RFID reader:

Mobile RFID readers come into play for hard to reach areas where it would be difficult
to install a fixed reader. Their robustness is beneficial when it comes to mounting them
on moving vehicles such as forklifts. When self-contained, with their own battery and
antennas, their wireless communication allows them to connect to a network from a
trolley or cart. Now you can bring hands free reading to the source.

3) RFID Frequencies:

Radio waves are the carriers of data between the reader and tags. The approach generally
adopted for RFID communication is to allocate frequencies depending on application.
The frequencies used cover a wide spectrum. These specified bands are: Low Frequency
(LF) 125 - 135 kHz High Frequency (HF) 13.56 MHz Ultra High Frequency (UHF) 400
-1200 MHz Microwave 2.45 and 5.8 GHZ. The allocation of frequencies is regulated by
government agencies, requiring care in considering RFID applications in different
countries. Efforts at standardization should avert these problems. The many varied
applications will work their best at different frequencies, therefore, it is important to
understand the requirements before selecting a particular type of RFID system. The most
common uses of low frequency systems are in security access, asset tracking and animal
identification. They generally have short reading ranges and lower system costs. High-

23
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

frequency systems are used for such applications as railroad car tracking and automated
toll collection. They offer long reading ranges and high reading speeds. This higher
performance usually entails higher costs. The power level of the interrogator and the
power available within the tag to respond will determine the reading range that can be
achieved in an RFID system. Like the restrictions on carrier frequencies there are
legislative constraints on power levels. Environmental conditions, particularly at the
higher frequencies, can also influence the range of communication.

4.2.7. AT89S52 Microcontroller:


The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller
with 8K bytes of in-system programmable Flash memory. The device is manufactured
using Atmel‘s high-density nonvolatile memory technology and is compatible with the
industry-standard 80C51 instruction set and pinout. The on-chip Flash allows the
program memory to be reprogrammed in-system or by a conventional nonvolatile
memory programmer. By combining a versatile 8-bit CPU with in-system programmable
Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller, which
provides a highly flexible and cost-effective solution to many, embedded control
applications. The AT89S52 provides the following standard features: 8K bytes of Flash,
256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit
timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port, on-
chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic
for operation down to zero frequency and supports two software selectable power saving
modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial
port, and interrupt system to continue functioning. The Power-down mode saves the
RAM con-tents but freezes the oscillator, disabling all other chip functions until the next
interrupt.

Fig 4.16: AT89S52


24
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

 8031 has 128 bytes of RAM, two timers and 6 interrupts.


 8051 has 4K ROM, 128 bytes of RAM, two timers and 6 interrupts.
 8052 has 8K ROM, 256 bytes of RAM, three timers and 8 interrupts.

From the above three microcontrollers, 8051 is the most preferable.


Microcontroller supports both serial and parallel communication. In the concerned
project 8052 microcontroller is used. Here microcontroller used is AT89S52, which is
manufactured by ATMEL laboratories.

I. NECESSITY OF MICROCONTROLLERS:

Microprocessors brought the concept of programmable devices and made many


applications of intelligent equipment. Most applications, which do not need large amount
of data and program memory, tended to be costly. The microprocessor system had to
satisfy the data and program requirements so; sufficient RAM and ROM are used to
satisfy most applications. The peripheral control equipment also had to be satisfied.
Therefore, almost all-peripheral chips were used in the design. Because of these
additional peripherals cost will be comparatively high.

Peripheral devices like Timer/Counter, Parallel programmable port, Serial


Communication Port, Interrupt controller and so on, which were most often used were
integrated with the Microprocessor to present the Micro controller .RAM and ROM also
were integrated in the same chip. The ROM size was anything from 256 bytes to 32Kb or
more. RAM was optimized to minimum of 64 bytes to 256 bytes or more.

II. FEATURES:

 Compatible with MCS-51 Products


 8K Bytes of In-System Reprogrammable Flash Memory
 Fully Static Operation: 0 Hz to 33 MHz
 Three-level Program Memory Lock
 256 x 8-bit Internal RAM
 32 Programmable I/O Lines
 Three 16-bit Timer/Counters
 Eight Interrupt Sources

25
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

 Programmable Serial Channel


 Low-power Idle and Power-down Modes
 4.0V to 5.5V Operating Range
 Full Duplex UART Serial Channel
 Interrupt Recovery from Power-down Mode
 Watchdog Timer
 Dual Data Pointer
 Power-off Flag
 Fast Programming Time
 Flexible ISP Programming (Byte and Page Mode)
The 89S52 has 4 different ports, each one having 8 Input/output lines providing a
total of 32 I/O lines. Those ports can be used to output DATA and orders do other
devices, or to read the state of a sensor, or a switch. Most of the ports of the 89S52 have
'dual function' meaning that they can be used for two different functions: the first one is
to perform input/output operations and the second one is used to implement special
features of the microcontroller like counting external pulses, interrupting the execution
of the program according to external events, performing serial data transfer or connecting
the chip to a computer to update the software.

III. PIN DIAGRAM:

26
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.17: Pin Diagram of 89S52 IC

IV. PIN DESCRIPTION:

1) Port 0: (Pin 39 -32)


Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin
can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as
high impedance inputs. Port 0 can also be configured to be the multiplexed low order
address/data bus during accesses to external program and data memory. In this mode, P0
has internal pullups. Port 0 also receives the code bytes during Flash programming and
outputs the code bytes during program verification. External pullups are required during
program verification.
2) Port 1:( Pin 1 – 8)
Port 1 is an 8-bit bidirectional I/O port with internal pullups. The Port 1 output
buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are
pulled high by the internal pullups and can be used as inputs. As inputs, Port 1 pins that
are externally being pulled low will source current (IIL) because of the internal pullups.

27
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

In addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count
input (P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively, as
shown in the following table. Port 1 also receives the low-order address bytes during
Flash programming and verification.

Table 3: Alternative functions of port 1

Port No. Alternative Functions

P1.0 T2(Eternal count input to Timer/Counter


2), Clock-Out
P1.1 T2EX (Timer/Counter 2 capture/reload
trigger and direction control)
P1.5 MOSI (Used for In-system programming)

P1.6 MISO (Used for In-system programming)

P1.7 SCK (Used for In-system programming)

3) Port 2: (Pin 21- 28)


Port 2 is an 8-bit bidirectional I/O port with internal pullups. The Port 2 output
buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are
pulled high by the internal pullups and can be used as inputs. As inputs, Port 2 pins that
are externally being pulled low will source current (IIL) because of the internal pullups.
Port 2 emits the high-order address byte during fetches from external program memory
and during accesses to external data memory that use 16-bit addresses (MOVX @
DPTR). In this application, Port 2 uses strong internal pull-ups when emitting 1s. During
accesses to external data memory that use 8-bit addresses (MOVX @ RI), Port 2 emits
the contents of the P2 Special Function Register. Port 2 also receives the high-order
address bits and some control signals during Flash programming and verification.

4) Port 3:
Port 3 is an 8-bit bidirectional I/O port with internal pullups. The Port 3 output
buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are
pulled high by the internal pullups and can be used as inputs. As inputs, Port 3 pins that
are externally being pulled low will source current (IIL) because of the pullups. Port 3
28
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

also serves the functions of various special features of the AT89S52, as shown in the
following table. Port 3 also receives some control signals for Flash programming and
verification.
Table 4: Alternative functions of port 3

Port No. Alternative Function

P3.0 RXD (Serial input port)

P3.1 TXD (Serial output port)


P3.2 ̅̅̅̅̅̅̅ (External Interrupt 0)

P3.3 ̅̅̅̅̅̅̅ (External Interrupt 1)

P3.4 T0 (Timer 0 External input)

P3.5 T1 (Timer 1 Eternal input)

P3.6 ̅̅̅̅̅ (Eternal data memory write strobe)

P3.7 ̅̅̅̅ (Eternal data memory read strobe)

5) RST: (Pin 9):


Reset input. A high on this pin for two machine cycles while the oscillator is
running resets the device. This pin drives High for 96 oscillator periods after the
Watchdog times out. The DISRTO bit in SFR AUXR (address 8EH) can be used to
disable this feature. In the default state of bit DISRTO, the RESET HIGH out feature is
enabled. ALE/PROG Address Latch Enable (ALE) is an output pulse for latching the low
byte of the address during accesses to external memory. This pin is also the program
pulse input (PROG) during Flash programming. In normal operation, ALE is emitted at a
constant rate of 1/6 the oscillator frequency and may be used for external timing or
clocking purposes. If desired, ALE operation can be disabled by setting bit 0 of SFR
location 8EH. With the bit set, ALE is active only during a MOVX or MOVC
instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no
effect if the microcontroller is in external execution mode.
6) PSEN: (Pin 29):
Program Store Enable (PSEN) is the read strobe to external program memory.
When the AT89S52 is executing code from external program memory, PSEN is activated
29
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

twice each machine cycle, except that two PSEN activations are skipped during each
access to external data memory.
7) EA/VPP: (Pin 31):
External Access Enable: EA must be strapped to GND in order to enable the
device to fetch code from external program memory locations starting at 0000H up to
FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on
reset. EA should be strapped to VCC for internal program executions. This pin also
receives the 12-volt programming enable voltage (VPP) during Flash programming.
8) XTAL1: (Pin 19):
Input to the inverting oscillator amplifier and input to the internal clock operating circuit.

9) XTAL2: (Pin 18):


Output from the inverting oscillator amplifier.

10) VCC:
Supply voltage pin

11) GND:
Ground pin of the micro controller

8052 Oscillator and Clock:

The heart of the 8051 circuitry that generates the clock pulses by which all the
internal all internal operations are synchronized. Pins XTAL1 And XTAL2 is provided
for connecting a resonant network to form an oscillator.

Typically, a quartz crystal and capacitors are employed. The crystal frequency is
the basic internal clock frequency of the microcontroller. The manufacturers make 8051
designs that run at specific minimum and maximum frequencies typically 1 to 16 MHz

30
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.18: Oscillator and timing circuit

Fig 4.19: Functional block diagram of micro controller

31
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

4.2.9. MEMORIES:
Types of memory:

The 8052 have three general types of memory. They are on-chip memory,
external Code memory and external Ram. On-Chip memory refers to physically existing
memory on the micro controller itself. External code memory is the code memory that
resides off chip. This is often in the form of an external EPROM. External RAM is the
Ram that resides off chip. This often is in the form of standard static RAM or flash
RAM.

a) Code memory

b) Internal RAM

a) Code memory:

Code memory is the memory that holds the actual 8052 programs that is to be run. This
memory is limited to 64K. Code memory may be found on-chip or off-chip. It is possible
to have 8K of code memory on-chip and 60K off chip memory simultaneously. If only
off-chip memory is available then there can be 64K of off chip ROM. This is controlled
by pin provided as EA.

b) Internal RAM:

The 8052 have a bank of 256 bytes of internal RAM. The internal RAM is found on-
chip. So, it is the fastest Ram available. And also, it is most flexible in terms of reading
and writing. Internal Ram is volatile, so when 8051 is reset, this memory is cleared. 256
bytes of internal memory are subdivided. The first 32 bytes are divided into 4 register
banks. Each bank contains 8 registers. Internal RAM also contains 256 bits, which are
addressed from 20h to 2Fh. These bits are bit addressed i.e. each individual bit of a byte
can be addressed by the user. They are numbered 00h to FFh. The user may make use of
these variables with commands such as SETB and CLR.
Special Function registered memory:

Special function registers are the areas of memory that control specific
functionality of the 8052-micro controller.

A) Accumulator (0E0h):
32
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

As its name suggests, it is used to accumulate the results of large no of


instructions. It can hold 8-bit values.

B) B registers (0F0h):

The B register is very similar to accumulator. It may hold 8-bit value. The b
register is only used by MUL AB and DIV AB instructions. In MUL AB the higher byte
of the product gets stored in B register. In div AB the quotient gets stored in B with the
remainder in A.

C) Stack Pointer (81h):


The stack pointer holds 8-bit value. This is used to indicate where the next value
to be removed from the stack should be taken from. When a value is to be pushed onto
the stack, the 8052 first store the value of SP and then store the value at the resulting
memory location. When a value is to be popped from the stack, the 8052 returns the
value from the memory location indicated by SP and then decrements the value of SP.

D) Data Pointer:

The SFRs DPL and DPH work together work together to represent a 16-bit value
called the data pointer. The data pointer is used in operations regarding external RAM
and some instructions code memory. It is a 16-bit SFR and also an addressable SFR.

E) Program counter:

The program counter is a 16-bit register, which contains the 2-byte address,
which tells the 8052 where the next instruction to execute to be found in memory. When
the 8052 is initialized PC starts at 0000h. And is incremented each time an instruction is
executes. It is not addressable SFR.

F) PCON (power control, 87h):

The power control SFR is used to control the 8051‘s power control modes. Certain
operation modes of the 8051 allow the 8051 to go into a type of ―sleep mode‖ which
consumes much lee power.

33
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

G) TCON (timer control, 88h):

The timer control SFR is used to configure and modify the way in which the
8051‘s two timers operate. This SFR controls whether each of the two timers is running
or stopped and contains a flag to indicate that each timer has overflowed. Additionally,
some non-timer related bits are located in TCON SFR. These bits are used to configure
the way in which the external interrupt flags are activated, which are set when an
external interrupt occurs.

H) TMOD (Timer Mode, 89h):

The timer mode SFR is used to configure the mode of operation of each of the
two timers. Using this SFR your program may configure each timer to be a 16-bit timer,
or 13-bit timer, 8-bit auto reload timer, or two separate timers. Additionally, you may
configure the timers to only count when an external pin is activated or to count ―events‖
that are indicated on an external pin.

I) TO (Timer 0 low/high, address 8A/8C h):

These two SFRs taken together represent timer 0. Their exact behavior depends
on how the timer is configured in the TMOD SFR; however, these timers always count
up. What is configurable is how and when they increment in value.

J) T1 (Timer 1 Low/High, address 8B/ 8D h):

These two SFRs, taken together, represent timer 1. Their exact behavior depends
on how the timer is configured in the TMOD SFR; however, these timers always count
up.

34
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

K) P0 (Port 0, address 90h, bit addressable):

This is port 0 latch. Each bit of this SFR corresponds to one of the pins on a
micro controller. Any data to be outputted to port 0 is first written on P0 register. For
e.g., bit 0 of port 0 is pin P0.0, bit 7 is pin p0.7. Writing a value of 1 to a bit of this SFR
will send a high level on the corresponding I/O pin whereas a value of 0 will bring it to
low level.

L) P1 (port 1, address 90h, bit addressable):

This is port latch1. Each bit of this SFR corresponds to one of the pins on a micro
controller. Any data to be outputted to port 0 is first written on P0 register. For e.g., bit 0
of port 0 is pin P1.0, bit 7 is pin P1.7. Writing a value of 1 to a bit of this SFR will send
a high level on the corresponding I/O pin whereas a value of 0 will bring it to low level

M) P2 (port 2, address 0A0h, bit addressable):

This is a port latch2. Each bit of this SFR corresponds to one of the pins on a
micro controller. Any data to be outputted to port 0 is first written on P0 register. For
e.g., bit 0 of port 0 is pin P2.0, bit 7 is pin P2.7. Writing a value of 1 to a bit of this SFR
will send a high level on the corresponding I/O pin whereas a value of 0 will bring it to
low level.

N) P3 (port 3, address B0h, bit addressable):

This is a port latch3. Each bit of this SFR corresponds to one of the pins on a
micro controller. Any data to be outputted to port 0 is first written on P0 register.

O) IE (interrupt enable, 0A8h):


The Interrupt Enable SFR is used to enable and disable specific interrupts. The
low 7 bits of the SFR are used to enable/disable the specific interrupts, where the MSB
bit is used to enable or disable all the interrupts. Thus, if the high bit of IE is 0 all
interrupts are disabled regardless of whether an individual interrupt is enabled by setting
a lower bit.

35
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

P) IP (Interrupt Priority, 0B8h):


The interrupt priority SFR is used to specify the relative priority of each interrupt.
On 8051, an interrupt maybe either low or high priority. An interrupt may interrupt
interrupts. For

Q) PSW (Program Status Word, 0D0h):


The program Status Word is used to store a number of important bits that are set
and cleared by 8052 instructions. The PSW SFR contains the carry flag, the auxiliary
carry flag, the parity flag and the overflow flag. Additionally, it also contains the register
bank select flags, which are used to select, which of the ―R‖ register banks currently in
use.

R) SBUF (Serial Buffer, 99h):


SBUF is used to hold data in serial communication. It is physically two registers.
One is writing only and is used to hold data to be transmitted out of 8052 via TXD. The
other is read only and holds received data from external sources via RXD. Both mutually
exclusive registers use address 99h.

4.3. SOFTWARE IMPLEMENTATION:


4.3.1. INTRODUCTION TO SOFTWARE:
I. µVision2:
µVision2 is an IDE (Integrated Development Environment) that helps you write,
compile, and debug embedded programs. It encapsulates the following components:

 A project manager.
 A make facility.
 Tool configuration.
 Editor.
 A powerful debugger.

36
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

II. Building an Application in µVision2:


To build (compile, assemble, and link) an application in µVision2, you must:

1. Select Project - (for example, 166\EXAMPLES\HELLO\HELLO.UV2).


2. Select Project - Rebuild all target files or Build target.
µVision3 compiles, assembles, and links the files in your project.

III. Creating Your Own Application in µVision2:

To create a new project in µVision2, you must:

1. Select Project - New Project.


2. Select a directory and enter the name of the project file.
3. Select Project - Select Device and select an 8051, 251, or C16x/ST10 device from
the Device Database™. And Create source files to add to the project.
4. Select Project - Targets, Groups, Files, Add/Files, select Source Group1, and add
the source files to the project.
5. Select Project - Options and set the tool options. Note when you select the target
device from the Device Database™ all special options are set automatically. You
typically only need to configure the memory map of your target hardware.
Default memory model settings are optimal for most applications.
6. Select Project - Rebuild all target files or Build target.

IV. Debugging an Application in µVision2:


To debug an application created using µVision2, you must:

1. Select Debug - Start/Stop Debug Session.


2. Use the Step toolbar buttons to single-step through your program. You may enter
G, main in the Output Window to execute to the main C function.
3. Open the Serial Window using the Serial #1 button on the toolbar.
Debug your program using standard options like Step, Go, Break, and so on.

V. Starting µVision2 and creating a Project:

µVision2 is a standard Windows application and started by clicking on the


program icon. To create a new project file, select from the µVision2 menu

37
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Project – New Project…. This opens a standard Windows dialog that asks you for the
new project file name.

We suggest that you use a separate folder for each project. You can simply use
the icon Create New Folder in this dialog to get a new empty folder. Then select this
folder and enter the file name for the new project, i.e. Project1.

µVision2 creates a new project file with the name PROJECT1.UV2 which contains a
default target and file group name. You can see these names in the Project

Window – Files.

Now use from the menu Project – Select Device for Target and select a CPU for
your project. The Select Device dialog box shows the µVision2 device database. Just
select the microcontroller you use. We are using for our examples the Philips 80C51RD+
CPU. This selection sets necessary tool options for the 80C51RD+ device and simplifies
in this way the tool Configuration.

Building Projects and Creating a HEX Files

Typical, the tool settings under Options – Target are all you need to start a new
application. You may translate all source files and line the application with a click on the
Build Target toolbar icon. When you build an application with syntax errors, µVision2
will display errors and warning messages in the Output

Window – Build page. A double click on a message line opens the source file on the
correct location in a µVision2 editor window.

Once you have successfully generated your application you can start debugging.

After you have tested your application, it is required to create an Intel HEX file to
download the software into an EPROM programmer or simulator. µVision2 creates HEX
files with each build process when Create HEX files under Options for Target – Output
is enabled. You may start your PROM programming utility after the make process when
you specify the program under the option Run User Program #1.

CPU Simulation

38
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

µVision2 simulates up to 16 Mbytes of memory from which areas can be mapped for
read, write, or code execution access. The µVision2 simulator traps and reports illegal
memory accesses being done.

In addition to memory mapping, the simulator also provides support for the
integrated peripherals of the various 8051 derivatives. The on-chip peripherals of the
CPU you have selected are configured from the Device

Database selection

You have made when you create your project target. Refer to page 58 for more
Information about selecting a device. You may select and display the on-chip peripheral
components using the Debug menu. You can also change the aspects of each peripheral
using the controls in the dialog boxes.

Start Debugging

You start the debug mode of µVision2 with the Debug – Start/Stop Debug Session
command. Depending on the Options for Target – Debug Configuration, µVision2 will
load the application program and run the startup code µVision2 saves the editor screen
layout and restores the screen layout of the last debug session. If the program execution
stops, µVision2 opens an editor window with the source text or shows CPU instructions
in the disassembly window. The next executable statement is marked with a yellow
arrow. During debugging, most editor features are still available.

For example, you can use the find command or correct program errors. Program
source text of your application is shown in the same windows. The µVision2 debug
mode differs from the edit mode in the following aspects:

_ The ―Debug Menu and Debug Commands‖ described on page 28 are Available. The
additional debug windows are discussed in the following.

_ The project structure or tool parameters cannot be modified. All build Commands are
disabled.

Disassembly Window

The Disassembly window shows your target program as mixed source and
assembly program or just assembly code. A trace history of previously executed
39
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

instructions may be displayed with Debug – View Trace Records. To enable the trace
history, set Debug – Enable/Disable Trace Recording. If you select the Disassembly
Window as the active window all program step commands work on CPU instruction
level rather than program source lines. You can select a text line and set or modify code
breakpoints using toolbar buttons or the context menu commands. You may use the
dialog Debug – Inline Assembly… to modify the CPU instructions. That allows you to
correct mistakes or to make temporary changes to the target program you are debugging.

4.3.2. IMPLIMENTATION OF SOURCE CODE:

1. Click on the Keil μVision Icon on Desktop


2. The following fig will appear

Fig 4.20: project

3. Click on the Project menu from the title bar


4. Then Click on New Project

Fig 4.21: new project

40
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

5. Save the Project by typing suitable project name with no extension in your
own folder sited in either C:\ or D:\

Fig 4.22: Title

6. Then Click on save button above.


7. Select the component for u r project. i.e., Atmel……
8. Click on the + Symbol beside of Atmel

Fig 4.23: select target device

9. Select AT89C51 as shown below

41
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.24: select device foer target

10. Then Click on ―OK‖


11. The Following fig will appear

Fig 4.25: Copy 8051 startup code

12. Then Click either YES or NO………mostly ―NO‖


13. Now your project is ready to USE
14. Now double click on the Target1, you would get another option ―Source
group 1‖ as shown in next page.

42
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.26: Source group 1

15. Click on the file option from menu bar and select ―new‖

Fig 4.27: new file

16. The next screen will be as shown in next page, and just maximize it by double
clicking on its blue boarder.

43
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.28: Opened new file

17. Now start writing program in either in ―C‖ or ―ASM‖


18. For a program written in Assembly, then save it with extension ―. asm‖ and
for ―C‖ based program save it with extension ―.C‖

Fig 4.29: File Save

19. Now right click on Source group 1 and click on ―Add files to Group
Source‖

Fig 4.30: Add files to the source group

20. Now you will get another window, on which by default ―C‖ files will appear.

44
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Fig 4.31: Adding files to the source group

21. Now select as per your file extension given while saving the file
22. Click only one time on option ―ADD‖
23. Now Press function key F7 to compile. Any error will appear if so happen.

Fig 4.32: Compilation

24. If the file contains no error, then press Control+F5 simultaneously.


25. The new window is as follows

Fig 4.33: building


45
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

26. Then Click ―OK‖


27. Now Click on the Peripherals from menu bar, and check your required port as
shown in fig below

Fig 4.34 : Selecting the Ports to be visualized

28. Drag the port a side and click in the program file.

Fig 4.35: start debugging

29. Now keep Pressing function key ―F11‖ slowly and observe.
You are running your program successfully.

46
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

CHAPTER-5
FLOW CHART AND SAMPLE SOURCE CODE

5.1 FLOW CHART:

start

Initialization

Show your Card

NO If YES
year>=a

Invalid card
YES If NO
year = =1

Row 1 LED ON
If
47 year==2
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

YES NO

Row 2 LED ON
NO
If
YES
year==3
NO
Row 3 LED ON
YES If
year==4

Row 4 LED ON

Magazines LED
ON

EXIT

stop
5.2. SOURCE CODE:
#include<reg51.h>

#include<string.h>

#include"rfidfunctions.h"

#include"addd.c"

#include"serial.c"

#include"rfid.c"

//sbit d2=P3^6;

//sbit d3=P3^7;

main()

P0=0X00;

led1=0;

led2=0;
48
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

led3=0;

led4=0;

led5=0;

serial_init();

Lcd_Init();

Lcd_Line_Disp(1,1);

Lcddata_Str(" RFID LIBRARY ");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str("Management systm");

Lcd_Cursor_off();

Delay(150);

Lcd_Display_Clear();

Lcd_Line_Disp(1,1);

Lcddata_Str("Waiting for RFID");

Lcd_Cursor_off();

while(1)

Rfid_Getdata();

String_Cmp();

}//while(1)

}// MAIN CLOSE...........sbit led1=P0^0;

sbit led2=P0^1;

sbit led3=P0^2;

sbit led4=P0^3;

sbit led5=P0^4;

string_cmp()
49
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

if((strcmp(one,a) ==0)) //||(strcmp(two,a) ==0)

Lcd_Line_Disp(1,1);

Lcd_Line_Disp(1,1);

Lcddata_Str(" I Year BOOKS @ ");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str(" Yellow Led ROW ");

Lcd_Cursor_off();

led1=1;

Delay(150);

Delay(150);

led1=0;

Lcd_Line_Disp(1,1);

Lcddata_Str(" RFID LIBRARY ");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str("Management systm");

Lcd_Cursor_off();

Delay(150);

else if((strcmp(two,a) ==0)) //||(strcmp(two,a) ==0))

Lcd_Line_Disp(1,1);

Lcd_Line_Disp(1,1);

Lcddata_Str("II Year BOOKS @ ");


50
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str("L.Green Led ROW ");

Lcd_Cursor_off();

led2=1;

Delay(150);

Delay(150);

led2=0;

Lcd_Line_Disp(1,1);

Lcddata_Str(" RFID LIBRARY ");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str("Management systm");

Lcd_Cursor_off();

Delay(150);

else if((strcmp(three,a) ==0)) //||(strcmp(two,a) ==0))

Lcd_Line_Disp(1,1);

Lcd_Line_Disp(1,1);

Lcddata_Str("III Year BOOKS @");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str(" White Led ROW ");

Lcd_Cursor_off();

led3=1;

Delay(150);
51
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Delay(150);

led3=0;

Lcd_Line_Disp(1,1);

Lcddata_Str(" RFID LIBRARY ");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str("Management systm");

Lcd_Cursor_off();

Delay(150);

else if((strcmp(four,a) ==0)) //||(strcmp(two,a) ==0))

Lcd_Line_Disp(1,1);

Lcd_Line_Disp(1,1);

Lcddata_Str("IV Year BOOKS @ ");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str(" RED Led ROW ");

Lcd_Cursor_off();

led4=1;

Delay(150);

Delay(150);

led4=0;

Lcd_Line_Disp(1,1);

Lcddata_Str(" RFID LIBRARY ");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);
52
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Lcddata_Str("Management systm");

Lcd_Cursor_off();

Delay(150);

else if((strcmp(five,a) ==0)) //||(strcmp(two,a) ==0))

Lcd_Line_Disp(1,1);

Lcd_Line_Disp(1,1);

Lcddata_Str("Magazine Books @");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str(" Green Led ROW ");

Lcd_Cursor_off();

led5=1;

Delay(150);

Delay(150);

led5=0;

Lcd_Line_Disp(1,1);

Lcddata_Str(" RFID LIBRARY ");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str("Management systm");

Lcd_Cursor_off();

Delay(150);

else

{
53
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Lcd_Line_Clear(2);

Lcd_Line_Disp(2,1);

Lcddata_Str(" INVALID ");

Delay(350);

Lcd_Display_Clear();

Lcd_Line_Disp(1,1);

Lcddata_Str(" RFID LIBRARY ");

Lcd_Cursor_off();

Lcd_Line_Disp(2,1);

Lcddata_Str("Management systm");

Lcd_Cursor_off();

Delay(150);

}// closing strcmp

Rfid_Getdata()

RI=0;

for(i=0;i<12;i++)

while(RI==0);

a[i]=serialrx();

for(i=0;i<12;i++)
54
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

a[i]=0x00;

unsigned int z;

for(z=0;z<45000;z++);

sbit LED=P0^1;

unsigned int i,j,r ;

char one[13]="5100D28B868E";

char two[13]="530093B52356";

char three[13]="53009351CA5B";

char four[13]="160062413B0E";

char five[13]="530093AD264B";

char a[20],rx;

//serialtx_str(char *temp );

serial_init();

// serialtx_chr(unsigned char recv);

char serialrx();

Lcd_Init();

Lcddata_Cmd(unsigned char);

Lcddata_Chr(unsigned char value);

Lcddata_Str(char *temp);

Lcd_Clear();

Lcd_Cursor_Off();

Lcd_Line_Display(unsigned int,unsigned int);


55
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

Lcd_Line_Clear(unsigned int);

Delay(unsigned int);

String_Cmp();

CHAPTER-6

RESULTS AND DISCUSSION

RFID based Library Management System is a unique system to be implemented in


libraries to manage the books automatically and efficiently. It will use the RFID reader to
identify and manage the books efficiently. Time saving, fast accessing of books and
eliminating manual errors is the main benefits of the RFID in Library. The personal
transactions can be viewed using various interfaces, either the website or the android
app. The data can be managed using the interface created for the librarian. Hence both
management and automation have been implemented.

RESULTS:
The main aim and objective of this project is to provide RFID procedure in
libraries handling functions like keeping record of the books (or magazines, journals etc.)
being read at the place, or being given to the reader for a stipulated time-period, checking
membership authenticity of existing readers, creating new memberships etc.

56
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

When ever libraries handling functions like keeping record of the magazines, it
sends the information to microcontroller. And the microcontroller displays
―MAGAZINE BOOKS @ GREEN LED ROW‖

Fig 6.1: Magazine Books


When ever libraries handling functions like keeping record of the First-year books, it
sends the information to microcontroller. And the microcontroller displays ―I YEAR
BOOKS @ YELLOW LED ROW‖

Fig 6.2: I year books


When ever libraries handling functions like keeping record of the Second-year
books, it sends the information to microcontroller. And the microcontroller displays ―II
YEAR BOOKS @ GREEN LED ROW‖

Fig 6.3: II year books


When ever libraries handling functions like keeping record of the Third-year books,
it sends the information to microcontroller. And the microcontroller displays ―III YEAR
BOOKS @ GREEN LED ROW‖

Fig 6.4: III year books


57
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

When ever libraries handling functions like keeping record of the Fourth-year
books, it sends the information to microcontroller. And the microcontroller displays ―IV
YEAR BOOKS @ RED LED ROW‖

Fig 6.5: IV year books

CHAPTER-7
CONCLUSION, LIMITATIONS AND FUTURE SCOPE

This system mainly reviewed the research and development work with
the help of passive RFID technology. By developing this system, RFID in the library
speeds up book borrowing, monitoring, books searching process and thus frees staff to
do more user-service tasks. To yield best performance, RFID readers and RFID tags to
be used must be of good quality. The efficient utilization of the technology also depends
upon the information to be written in tag. These applications can lead to significant
savings in labour costs, enhance customer service, lower book theft and provide a
constant record update of new collections of books. This application is working properly
and meeting to all requirements.

LIMITATIONS:
 With this project, it is possible to reduction in stuff
58
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

 Susceptibility of tags
 Cost is high

FUTURE SCOPE:
The future scopes of the implemented applications may be extended as
follows:
 In future, the transmitter side android is replaced by IOT. Which contain
microcontroller push button switch for command.

BIBLIOGRAPHY

1. Kiyotaka Fujisaki, ―An RFID based system for library management and performance
evaluation‖, Intelligent, and Software Intensive Systems 2015 Ninth International
Conference on Complex, Intelligent, and Software Intensive System, 978-1-4799-8870-
9/15.

2. Dong Zhang, Xiling Shi, ―Self-service management platform design for library based
on RFID‖, Philosophy and Social Sciences, NUC topics, 978-1-4577-0536-6/11/$26.00
©2011 IEEE.

3. IoannisMarkakis, Theodoros Samaras, Anastasis C. Polycarpou, John N. Sahalos,


―Safe and efficient design of shelf antenna in an RFID based library management
system‖, The 8th European Conference on Antennas and Propagation (EuCAP 2014),
978-88-907018-4-9/1, ©2014 IEEE.

59
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

4. AfefZakhama, Wassim Mansour, KhaledJelassi, ―Software solution for RFID data


management‖, 7th International Conference on Modelling, Identification and Control
(ICMIC 2015) Sousse, Tunisia - December 18-20, 2015, 978-09567157-5-3 © 2014
IEEE.

5. J. Sing, N. Brar, and C. Fong, ―The State of RFID applications libraries‖, Information
Technology and Libraries, 25 (1),24-32, 2011.

6. ―Hitachi's RFID powder freaks us the heck out". Engadget hitachisrfid powder freaks-
us-the-heck-out. Retrieved 2010-04-24.

7. Katipo Communications Ltd. [PDF document] Retrieved 07.07.2006

8. NETCRAFT LTD, "Netcraft January 2011 Web Server Survey".[wwwdocument]


available at M. Breeding, Open Source Library Automation: Overview and Perspective.
Library Technology Reports. 44(8):5-10, 2008.

9. L.M. Riewe, Survey of Open Source Integrated Library Systems, Master thesis, San
Jose State University, August 2008. Retrieved. January 23, 2011.

60
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM

61
DEPARTMENT OF ECE, SBIT, KMM

You might also like