Professional Documents
Culture Documents
BACHELOR OF TECHNOLOGY
In
ELECTRONICS AND COMMUNICATION ENGINEERING
Submitted by
Assistant Professor
CERTIFICATE
This is to certify that the project report entitled “RFID
BASED LIBRARY MANAGEMENT SYATEM” is a bonafide record of
work carried out by
We take the opportunity to express our heartfelt thanks to the Head of the
Department M r. Gandham Srinivasa Rao, Associate Professor, Department of
Electronics & Communication Engineering, Swarna Bharathi Institute of Science
& Technology, Khammam, for his excellent guidance, technical information and
support which helped us in successfully completing this project.
MANAGEMENT SYSTEM” recorded in this report does not form part of any
other thesis on which a degree has been awarded earlier. We further declare that
this project report is based on our work carried out at the “SW ARNA BHARATHI
INSTITUTE OF SCIENCE & TECHNOLOGY”, Khammam during the B.Tech
course.
DATE:
PLACE: Khammam
Submitted by
CHAPTER-1: INTODUCTION 1
1.1. Introduction 1
2.1. Aim 3
2.2. Objective 3
CHAPTER-4: 5
4.2.4. LED 18
4.2.5. Tags 19
4.2.8. Memories 31
CHAPTER-7:
7.1. Conclusion 58
7.2. Limitation 58
BIBLOGRAPHY 59
LIST OF FIGURES
4. Transformer 12
5. Voltage Regulator 14
7. LCD module 17
8. LCD Controller 18
9. Figure of LED 18
CHAPTER-1
INTRODUCTION
1
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
The RFID based Library Management Systems facilitates the fast issuing, reissuing and
returning of books with the help of RFID enabled modules. It directly provides the book
information and library member information to the library management system and does
not need the manual typing. It also provides monitoring and searching system. The
monitoring module will continuously monitor the movement of books across the gates,
so that the books taken out without prior issuing will be traced out easily and will alarm
the librarians. The searching module provides the fast searching of books using RFID
handheld reader. The physical location of the books can be easily located using this
module.
CHAPTER-2
AIM AND OBJECTIVES
2.1 AIM:
Library is a place where knowledge resides, in the form of books,
journals, and audio visuals such as CDs and DVDs. The management and maintenance
of a library is a very crucial and time-consuming task. Since long, libraries have been
using Barcode technology for the maintenance of books and other documents available
for the customer. But the Barcode technology has its own limitation regarding the time
consumed and security. RFID (Radio Frequency Identification) technology is one of the
latest technologies being used by libraries. RFID technology does not require line of
sight to detect the target and hence it makes detecting documents (digital or print) easier
and quick. RFID based Library Management System comes with many benefits, but cost
is a big challenge for its adoption. This paper discusses RFID based Library
Management System, with its various benefits and challenges.
2.2 OBJECTIVES:
Here I am presenting a brief idea about how RFID based library system
would operate. Conventional procedure in libraries involve manually handling functions
like keeping record of the books (or magazines, journals etc.) being read at the place, or
being given to the reader for a stipulated time-period, checking membership authenticity
of existing readers, creating new memberships etc. These functions are usually done by a
person who manually enters new data or modifies existing data in the software, making it
tedious as well as time consuming. Hence a more convenient method would be a system
where automatic handling of all these operations would be successful. One of the
feasible methods is using Radio Frequency Identification System.
3
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
CHAPTER-3
LITERATURE SURVEY
Many researches have been carried out in design of library management system using
RFID technology. The author Kiyotaka FUJISAKI in ―An RFID based system for library
management and its performance evaluation‖ proposed the idea of electromagnetic
coupling. The resonant frequency was measured using grip dip oscillator under various
conditions and as was shown that as the volume of book increases the resonant frequency
becomes low. The resonant frequency changed according to the algorithmic function. It
was also shown that after attaching the tag on goods the resonant frequency became
appropriate and as the distance between the two pieces of tags becomes narrow the
resonant frequency decreases rapidly. The environment condition humidity also affects
the resonant frequency.
―Self-service management platform design for library based on RFID‖ overviewed
the necessity of new technology of self-service of book borrowing and returning system
in library which will replace the barcode technology and accelerate the library‘s self-
service process. He showed that RFID technology can identify the high-speed moving
objects, even can identify the number of labels; the operation is fast and convenient.
RFID is a simple wireless system composed of by tag, reader and antenna.
4
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
CHAPTER-4
DESIGN IMPLEMENTATION
4.1. INRODUCTION OF EMBEDDED SYSTEMS:
An Embedded System is a combination of computer hardware and software, and
perhaps additional mechanical or other parts, designed to perform a specific function. A
good example is the microwave oven. Almost every household has one, and tens of
millions of them are used every day, but very few people realize that a processor and
software are involved in the preparation of their lunch or dinner.
This is in direct contrast to the personal computer in the family room. It too is
comprised of computer hardware and software and mechanical components (disk drives,
for example). However, a personal computer is not designed to perform a specific
function rather; it is able to do many different things. Many people use the term general-
purpose computer to make this distinction clear. As shipped, a general-purpose computer
is a blank slate; the manufacturer does not know what the customer will do wish it. One
customer may use it for a network file server another may use it exclusively for playing
games, and a third may use it to write the next great American novel.
Frequently, an embedded system is a component within some larger system. For
example, modern cars and trucks contain many embedded systems. One embedded
system controls the anti-lock brakes, other monitors and controls the vehicle's emissions,
and a third displays information on the dashboard. In some cases, these embedded
systems are connected by some sort of a communication network, but that is certainly not
a requirement.
At the possible risk of confusing you, it is important to point out that a general-
purpose computer is itself made up of numerous embedded systems. For example, my
computer consists of a keyboard, mouse, video card, modem, hard drive, floppy drive,
and sound card-each of which is an embedded system. Each of these devices contains a
processor and software and is designed to perform a specific function. For example, the
modem is designed to send and receive digital data over analog telephone line. That's it
and all of the other devices can be summarized in a single sentence as well.
If an embedded system is designed well, the existence of the processor and
software could be completely unnoticed by the user of the device. Such is the case for a
5
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
microwave oven, VCR, or alarm clock. In some cases, it would even be possible to build
an equivalent device that does not contain the processor and software. This could be
done by replacing the combination with a custom integrated circuit that performs the
same functions in hardware. However, a lot of flexibility is lost when a design is hard-
cooled in this way. It is much easier, and cheaper, to change a few lines of software than
to redesign a piece of custom hardware.
remote controls for TV and air-conditioner, VCO player, video game consoles, video
recorders etc. Today‘s high-tech car has about 20 embedded systems for transmission
control, engine spark control, air-conditioning, navigation etc.
Even wristwatches are now becoming embedded systems. The palmtops are powerful
embedded systems using which we can carry out many general-purpose tasks such as
playing games and word processing.
7
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
other than the end systems (desktop computers) we use to access the networks, are
embedded systems.
8
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
The operating system runs above the hardware, and the application software runs
above the operating system. The same architecture is applicable to any computer
including a desktop computer. However, there are significant differences. It is not
compulsory to have an operating system in every embedded system. For small appliances
such as remote-control units, air conditioners, toys etc., there is no need for an operating
system and you can write only the software specific to that application. For applications
involving complex processing, it is advisable to have an operating system. In such a case,
you need to integrate the application software with the operating system and then transfer
the entire software on to the memory chip. Once the software is transferred to the
memory chip, the software will continue to run for a long time you don‘t need to reload
new software. Now, let us see the details of the various building blocks of the hardware
of an embedded system. We have six building blocks and they are mentioned below and
a small description about every block also mentioned.
Read-Only Random
access
Memory
Memory
Communication
Interfaces
Application Specific Circuitry
9
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
The Central Processing Unit (processor, in short) can be any of the following:
microcontroller, microprocessor or Digital Signal Processor (DSP). A micro-controller is
a low-cost processor. Its main attraction is t2hat on the chip itself, there will be many
other components such as memory, serial communication interface, analog-to digital
converter etc. So, for small applications, a micro-controller is the best choice as the
number of external components required will be very less.
On the other hand, microprocessors are more powerful, but you need to use many
external components with them. D5P is used mainly for applications in which signal
processing is involved such as audio and video processing.
2) Memory:
3)Input devices:
Unlike the desktops, the input devices to an embedded system have very limited
capability. There will be no keyboard or a mouse, and hence interacting with the
embedded system is no easy task. Many embedded systems will have a small keypad-
you press one key to give a specific command. A keypad may be used to input only the
digits. Many embedded systems used in process control do not have any input device for
user interaction; they take inputs from sensors or transducers 1‘fnd produce electrical
signals that are in turn fed to other systems.
10
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
4) Output devices:
The output devices of the embedded systems also have very limited capability.
Some embedded systems will have a few Light Emitting Diodes (LEDs) to indicate the
health status of the system modules, or for visual indication of alarms. A small Liquid
Crystal Display (LCD) may also be used to display some important parameters.
5) Communication interfaces:
The embedded systems may need to, interact with other embedded systems at
they may have to transmit data to a desktop. To facilitate this, the embedded systems are
provided with one or a few communication interfaces such as RS232, RS422, RS485,
Universal Serial Bus (USB), IEEE 1394, Ethernet etc.
6) Application-specific circuitry:
BUZZER
LCD
POWER
SUPPLY
RFID AT89S52
READER
LED
11
DEPARTMENT OF ECE, SBIT, KMM
T AG
T AG
T AG
RFID BASED LIBRARY MANAGEMENT SYSYEM
All digital circuits require regulated power supply. In this article we are going to learn
how to get a regulated positive supply from the mains supply.
Figure 1 shows the basic block diagram of a fixed regulated power supply. Let us go
through each block.
1)TRANSFORMER:
12
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
A transformer consists of two coils also called as ―WINDINGS‖ namely PRIMARY &
SECONDARY.
They are linked together through inductively coupled electrical conductors also called as
CORE. A changing current in the primary causes a change in the Magnetic Field in the
core & this in turn induces an alternating voltage in the secondary coil. If load is applied
to the secondary then an alternating current will flow through the load. If we consider an
ideal condition then all the energy from the primary circuit will be transferred to the
secondary circuit through the magnetic field.
So
The secondary voltage of the transformer depends on the number of turns in the Primary as
well as in the secondary.
2) Rectifier:
13
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
3) FILTER CAPACITOR:
Even though half wave & full wave rectifier give DC output, none of them
provides a constant output voltage. For this we require to smoothen the waveform
received from the rectifier. This can be done by using a capacitor at the output of the
rectifier this capacitor is also called as ―FILTER CAPACITOR‖ or ―SMOOTHING
CAPACITOR‖ or ―RESERVOIR CAPACITOR‖. Even after using this capacitor a small
amount of ripple will remain.
Where,
Vr= accepted ripple voltage. (should not be more than 10% of the voltage)
I= current consumed by the circuit in Amperes.
F= frequency of the waveform. A half wave rectifier has only one peak in one cycle so
F=25hz
Whereas a full wave rectifier has Two peaks in one cycle so F=100hz.
14
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
generate high noise due to their switching action. For low level of output power
switching regulators tend to be costly but for higher output wattage they are much
cheaper than linear regulators.
5) Circuit diagram:
IC 7805:
The 7805 will automatically reduce output current if it gets too hot. The last two digits
represent the voltage; for instance, the 7812 is a 12-volt regulator. The 78xx series of
15
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
regulators is designed to work in complement with the 79xx series of negative voltage
regulators in systems that provide both positive and negative regulated voltages, since
the 78xx series can't regulate negative voltages in such a system.
The 7805 & 78 is one of the most common and well-known of the 78xx series regulators,
as it's small component count and medium-power regulated 5V make it useful for
powering TTL devices.
SPECIFICATIONS IC 7805
Vout 5V
Output Imax 1A
16
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
The display contains two internal byte-wide registers, one for commands (RS=0)
and the second for characters to be displayed (RS=1). It also contains a user-programmed
RAM area that can be programmed to generate any desired character that can be formed
using a dot matrix. To distinguish between these two data areas, the hex command byte
80 will be used to signify that the display RAM address 00h will be chosen. Port1 is used
to furnish the command or data type, and ports 3.2 to3.4 furnish register select and
read/write levels. The display takes varying amounts of time to accomplish the functions
as listed. LCD bit 7 is monitored for logic high (busy) to ensure the display is
overwritten.
Liquid Crystal Display also called as LCD is very helpful in providing user interface as
well as for debugging purpose. The most common type of LCD controller is HITACHI
44780 which provides a simple interface between the controller & an LCD.
The most commonly used ALPHANUMERIC displays are 1x16 (Single Line & 16
characters), 2x16 (Double Line & 16 character per line) & 4x20 (four lines & Twenty
characters per line).
The LCD requires 3 control lines (RS, R/W & EN) & 8 (or 4) data lines. The number on
data lines depends on the mode of operation. If operated in 8-bit mode then 8 data lines +
3 control lines.
Table 2: Pin description of LCD
17
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
When RS is low (0), the data is to be treated as a command. When RS is high (1), the
data being sent is considered as text data which should be displayed on the screen.
When R/W is low (0), the information on the data bus is being written to the LCD. When
RW is high (1), the program is effectively reading from the LCD. Most of the times there
is no need to read from the LCD so this line can directly be connected to Gnd thus saving
one controller line.
The ENABLE pin is used to latch the data present on the data pins. A HIGH
- LOW signal is required to latch the data. The LCD interprets and executes our
command at the instant the EN line is brought low. If you never bring EN low, your
instruction will never be executed.
DATA
RS L
CONTROLLER C
RW
D
ENABLE
4.2.4.LED:
18
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
Be sure not to exceed I*max which is given in each LED specification and do
not use test instrument that contain sources/batteries with voltage greater that Vcw max
given in specification. For LED current restriction and further LED current measurement
we recommend to use resistor (1-5 Ohms) connected in serial to LED. We recommend
activating pulse generator prior connecting LED to generator. On switching off the
procedure is reversed: disconnect LED, switch off pulse generator. Long wires
connecting LED with pulse generator may be the reason for LED failure because of
unexpected voltage surges when switching on and off the LED supply.
1)Lifetime Tests: Room temperature lifetime tests were performed with In GaAs
homojunction diodes, un-encapsulated and encapsulated at current pulses of 2A, duration
50 µs and repetition rate of 30 Hz.
This confirms that LED encapsulation or by protection with window should increase
LED lifetime at elevated temperatures.
4.2.5. TAGS:
An RFID tag is comprised of a microchip containing identifying information and an
antenna that transmits this data wirelessly to a reader. At its most basic, the chip will
19
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
contain a serialized identifier, or license plate number, that uniquely identifies that item,
similar to the way many bar codes are used today. A key difference, however is that
RFID tags have a higher data capacity than their bar code counterparts. This increases
the options for the type of information that can be encoded on the tag, including the
manufacturer, batch or lot number, weight, ownership, destination and history (such as
the temperature range to which an item has been exposed). In fact, an unlimited list of
other types of information can be stored on RFID tags, depending on application needs.
An RFID tag can be placed on individual items, cases or pallets for identification
purposes, as well as on fixed assets such as trailers, containers, totes, etc.
Tags come in a variety of types, with a variety of capabilities. Key variables include:
There are three options in terms of how data can be encoded on tags:
(1) Read-only tags contain data such as a serialized tracking number, which is pre-
written onto them by the tag manufacturer or distributor. These are generally the least
expensive tags because they cannot have any additional information included as they
move throughout the supply chain. Any updates to that information would have to be
maintained in the application software that tracks SKU movement and activity.
(2) "Write once" tags enable a user to write data to the tag one time in production or
distribution processes. Again, this may include a serial number, but perhaps other data
such as a lot or batch number.
(3) Full "read-write" tags allow new data to be written to the tag as needed—and even
written over the original data. Examples for the latter capability might include the time
and date
of ownership transfer or updating the repair history of a fixed asset. While these are the
costliest of the three tag types and are not practical for tracking inexpensive items, future
standards for electronic product codes (EPC) appear to be headed in this direction.
20
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
1) Data capacity:
The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as
much as several thousand bits on the high end. Of course, the greater the storage
capacity, the higher the price per tag.
2) Form factor:
The tag and antenna structure can come in a variety of physical form factors and
can either be self-contained or embedded as part of a traditional label structure (i.e., the
tag is inside what looks like a regular bar code label—this is termed a 'Smart Label')
companies must choose the appropriate form factors for the tag very carefully and should
expect to use multiple form factors to suit the tagging needs of different physical
products and units of measure.
―Passive‖ tags have no battery and "broadcast" their data only when energized by a
reader. That means they must be actively polled to send information. "Active" tags are
capable of broadcasting their data using their own battery power. In general, this means
that the read ranges are much greater for active tags than they are for passive tags—
perhaps a read range of 100 feet or more, versus 15 feet or less for most passive tags.
The extra capability and read ranges of active tags, however, come with a cost; they are
several times more expensive than passive tags. Today, active tags are much more likely
to be used for high-value items or fixed assets such as trailers, where the cost is minimal
compared to item value, and very long read ranges are required. Most traditional supply
chain applications, such as the RFID-based tracking and compliance programs emerging
in the consumer goods retail chain, will use the less expensive passive tags.
4) Frequencies:
Like all wireless communications, there are a variety of frequencies or spectra through
which RFID tags can communicate with readers. Again, there are trade-offs among cost,
performance and application requirements. For instance, low-frequency tags are cheaper
than ultra-high-frequency (UHF) tags, use less power and are better able to penetrate
21
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
non-metallic substances. They are ideal for scanning objects with high water content,
such as fruit, at close range. UHF frequencies typically offer better range and can
transfer data faster. But they use more power and are less likely to pass through some
materials. UHF tags are typically best suited for use with or near wood, paper, cardboard
or clothing products. Compared to low-frequency tags, UHF tags might be better for
scanning boxes of goods as they pass through a bay door into a warehouse. While the tag
requirements for compliance mandates may be narrowly defined, it is likely that a variety
of tag types will be required to solve specific operational issues. You will want to work
with a company that is very knowledgeable in tag and reader technology to appropriately
identify the right mix of RFID technology for your environment and applications.
5) EPC Tags:
EPC refers to "electronic product code," an emerging specification for RFID tags,
readers and business applications first developed at the Auto-ID Center at the
Massachusetts Institute of Technology. This organization has provided significant
intellectual leadership toward the use and application of RFID technology. EPC
represents a specific approach to item identification, including an emerging standard for
the tags themselves, including both the data content of the tag and open wireless
communication protocols. In a sense, the EPC movement is combining the data standards
embodied in certain bar code specifications, such as the UPC or UCC-128 bar code
standards, with the wireless data communication standards that have been developed by
ANSI and other groups.
22
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
operating system and memory to filter and store the data. The data is now ready to be
sent to the network.
RFID reader types are fixed, mobile or handheld units. Which type to use is governed by
the application or environment in which they will be utilized. Fixed readers are often
used for large-scale deployments; installed in portals at dock doors and conveyor belts to
capture inventory or for tracking parts, tools and equipment. Fixed RFID readers require
access to a grounded power source and usually connect to the network by cable such as
RS-232, RJ-45 or USB.
Mobile RFID readers come into play for hard to reach areas where it would be difficult
to install a fixed reader. Their robustness is beneficial when it comes to mounting them
on moving vehicles such as forklifts. When self-contained, with their own battery and
antennas, their wireless communication allows them to connect to a network from a
trolley or cart. Now you can bring hands free reading to the source.
3) RFID Frequencies:
Radio waves are the carriers of data between the reader and tags. The approach generally
adopted for RFID communication is to allocate frequencies depending on application.
The frequencies used cover a wide spectrum. These specified bands are: Low Frequency
(LF) 125 - 135 kHz High Frequency (HF) 13.56 MHz Ultra High Frequency (UHF) 400
-1200 MHz Microwave 2.45 and 5.8 GHZ. The allocation of frequencies is regulated by
government agencies, requiring care in considering RFID applications in different
countries. Efforts at standardization should avert these problems. The many varied
applications will work their best at different frequencies, therefore, it is important to
understand the requirements before selecting a particular type of RFID system. The most
common uses of low frequency systems are in security access, asset tracking and animal
identification. They generally have short reading ranges and lower system costs. High-
23
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
frequency systems are used for such applications as railroad car tracking and automated
toll collection. They offer long reading ranges and high reading speeds. This higher
performance usually entails higher costs. The power level of the interrogator and the
power available within the tag to respond will determine the reading range that can be
achieved in an RFID system. Like the restrictions on carrier frequencies there are
legislative constraints on power levels. Environmental conditions, particularly at the
higher frequencies, can also influence the range of communication.
I. NECESSITY OF MICROCONTROLLERS:
II. FEATURES:
25
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
26
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
27
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
In addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count
input (P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively, as
shown in the following table. Port 1 also receives the low-order address bytes during
Flash programming and verification.
4) Port 3:
Port 3 is an 8-bit bidirectional I/O port with internal pullups. The Port 3 output
buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are
pulled high by the internal pullups and can be used as inputs. As inputs, Port 3 pins that
are externally being pulled low will source current (IIL) because of the pullups. Port 3
28
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
also serves the functions of various special features of the AT89S52, as shown in the
following table. Port 3 also receives some control signals for Flash programming and
verification.
Table 4: Alternative functions of port 3
twice each machine cycle, except that two PSEN activations are skipped during each
access to external data memory.
7) EA/VPP: (Pin 31):
External Access Enable: EA must be strapped to GND in order to enable the
device to fetch code from external program memory locations starting at 0000H up to
FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on
reset. EA should be strapped to VCC for internal program executions. This pin also
receives the 12-volt programming enable voltage (VPP) during Flash programming.
8) XTAL1: (Pin 19):
Input to the inverting oscillator amplifier and input to the internal clock operating circuit.
10) VCC:
Supply voltage pin
11) GND:
Ground pin of the micro controller
The heart of the 8051 circuitry that generates the clock pulses by which all the
internal all internal operations are synchronized. Pins XTAL1 And XTAL2 is provided
for connecting a resonant network to form an oscillator.
Typically, a quartz crystal and capacitors are employed. The crystal frequency is
the basic internal clock frequency of the microcontroller. The manufacturers make 8051
designs that run at specific minimum and maximum frequencies typically 1 to 16 MHz
30
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
31
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
4.2.9. MEMORIES:
Types of memory:
The 8052 have three general types of memory. They are on-chip memory,
external Code memory and external Ram. On-Chip memory refers to physically existing
memory on the micro controller itself. External code memory is the code memory that
resides off chip. This is often in the form of an external EPROM. External RAM is the
Ram that resides off chip. This often is in the form of standard static RAM or flash
RAM.
a) Code memory
b) Internal RAM
a) Code memory:
Code memory is the memory that holds the actual 8052 programs that is to be run. This
memory is limited to 64K. Code memory may be found on-chip or off-chip. It is possible
to have 8K of code memory on-chip and 60K off chip memory simultaneously. If only
off-chip memory is available then there can be 64K of off chip ROM. This is controlled
by pin provided as EA.
b) Internal RAM:
The 8052 have a bank of 256 bytes of internal RAM. The internal RAM is found on-
chip. So, it is the fastest Ram available. And also, it is most flexible in terms of reading
and writing. Internal Ram is volatile, so when 8051 is reset, this memory is cleared. 256
bytes of internal memory are subdivided. The first 32 bytes are divided into 4 register
banks. Each bank contains 8 registers. Internal RAM also contains 256 bits, which are
addressed from 20h to 2Fh. These bits are bit addressed i.e. each individual bit of a byte
can be addressed by the user. They are numbered 00h to FFh. The user may make use of
these variables with commands such as SETB and CLR.
Special Function registered memory:
Special function registers are the areas of memory that control specific
functionality of the 8052-micro controller.
A) Accumulator (0E0h):
32
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
B) B registers (0F0h):
The B register is very similar to accumulator. It may hold 8-bit value. The b
register is only used by MUL AB and DIV AB instructions. In MUL AB the higher byte
of the product gets stored in B register. In div AB the quotient gets stored in B with the
remainder in A.
D) Data Pointer:
The SFRs DPL and DPH work together work together to represent a 16-bit value
called the data pointer. The data pointer is used in operations regarding external RAM
and some instructions code memory. It is a 16-bit SFR and also an addressable SFR.
E) Program counter:
The program counter is a 16-bit register, which contains the 2-byte address,
which tells the 8052 where the next instruction to execute to be found in memory. When
the 8052 is initialized PC starts at 0000h. And is incremented each time an instruction is
executes. It is not addressable SFR.
The power control SFR is used to control the 8051‘s power control modes. Certain
operation modes of the 8051 allow the 8051 to go into a type of ―sleep mode‖ which
consumes much lee power.
33
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
The timer control SFR is used to configure and modify the way in which the
8051‘s two timers operate. This SFR controls whether each of the two timers is running
or stopped and contains a flag to indicate that each timer has overflowed. Additionally,
some non-timer related bits are located in TCON SFR. These bits are used to configure
the way in which the external interrupt flags are activated, which are set when an
external interrupt occurs.
The timer mode SFR is used to configure the mode of operation of each of the
two timers. Using this SFR your program may configure each timer to be a 16-bit timer,
or 13-bit timer, 8-bit auto reload timer, or two separate timers. Additionally, you may
configure the timers to only count when an external pin is activated or to count ―events‖
that are indicated on an external pin.
These two SFRs taken together represent timer 0. Their exact behavior depends
on how the timer is configured in the TMOD SFR; however, these timers always count
up. What is configurable is how and when they increment in value.
These two SFRs, taken together, represent timer 1. Their exact behavior depends
on how the timer is configured in the TMOD SFR; however, these timers always count
up.
34
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
This is port 0 latch. Each bit of this SFR corresponds to one of the pins on a
micro controller. Any data to be outputted to port 0 is first written on P0 register. For
e.g., bit 0 of port 0 is pin P0.0, bit 7 is pin p0.7. Writing a value of 1 to a bit of this SFR
will send a high level on the corresponding I/O pin whereas a value of 0 will bring it to
low level.
This is port latch1. Each bit of this SFR corresponds to one of the pins on a micro
controller. Any data to be outputted to port 0 is first written on P0 register. For e.g., bit 0
of port 0 is pin P1.0, bit 7 is pin P1.7. Writing a value of 1 to a bit of this SFR will send
a high level on the corresponding I/O pin whereas a value of 0 will bring it to low level
This is a port latch2. Each bit of this SFR corresponds to one of the pins on a
micro controller. Any data to be outputted to port 0 is first written on P0 register. For
e.g., bit 0 of port 0 is pin P2.0, bit 7 is pin P2.7. Writing a value of 1 to a bit of this SFR
will send a high level on the corresponding I/O pin whereas a value of 0 will bring it to
low level.
This is a port latch3. Each bit of this SFR corresponds to one of the pins on a
micro controller. Any data to be outputted to port 0 is first written on P0 register.
35
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
A project manager.
A make facility.
Tool configuration.
Editor.
A powerful debugger.
36
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
37
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
Project – New Project…. This opens a standard Windows dialog that asks you for the
new project file name.
We suggest that you use a separate folder for each project. You can simply use
the icon Create New Folder in this dialog to get a new empty folder. Then select this
folder and enter the file name for the new project, i.e. Project1.
µVision2 creates a new project file with the name PROJECT1.UV2 which contains a
default target and file group name. You can see these names in the Project
Window – Files.
Now use from the menu Project – Select Device for Target and select a CPU for
your project. The Select Device dialog box shows the µVision2 device database. Just
select the microcontroller you use. We are using for our examples the Philips 80C51RD+
CPU. This selection sets necessary tool options for the 80C51RD+ device and simplifies
in this way the tool Configuration.
Typical, the tool settings under Options – Target are all you need to start a new
application. You may translate all source files and line the application with a click on the
Build Target toolbar icon. When you build an application with syntax errors, µVision2
will display errors and warning messages in the Output
Window – Build page. A double click on a message line opens the source file on the
correct location in a µVision2 editor window.
Once you have successfully generated your application you can start debugging.
After you have tested your application, it is required to create an Intel HEX file to
download the software into an EPROM programmer or simulator. µVision2 creates HEX
files with each build process when Create HEX files under Options for Target – Output
is enabled. You may start your PROM programming utility after the make process when
you specify the program under the option Run User Program #1.
CPU Simulation
38
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
µVision2 simulates up to 16 Mbytes of memory from which areas can be mapped for
read, write, or code execution access. The µVision2 simulator traps and reports illegal
memory accesses being done.
In addition to memory mapping, the simulator also provides support for the
integrated peripherals of the various 8051 derivatives. The on-chip peripherals of the
CPU you have selected are configured from the Device
Database selection
You have made when you create your project target. Refer to page 58 for more
Information about selecting a device. You may select and display the on-chip peripheral
components using the Debug menu. You can also change the aspects of each peripheral
using the controls in the dialog boxes.
Start Debugging
You start the debug mode of µVision2 with the Debug – Start/Stop Debug Session
command. Depending on the Options for Target – Debug Configuration, µVision2 will
load the application program and run the startup code µVision2 saves the editor screen
layout and restores the screen layout of the last debug session. If the program execution
stops, µVision2 opens an editor window with the source text or shows CPU instructions
in the disassembly window. The next executable statement is marked with a yellow
arrow. During debugging, most editor features are still available.
For example, you can use the find command or correct program errors. Program
source text of your application is shown in the same windows. The µVision2 debug
mode differs from the edit mode in the following aspects:
_ The ―Debug Menu and Debug Commands‖ described on page 28 are Available. The
additional debug windows are discussed in the following.
_ The project structure or tool parameters cannot be modified. All build Commands are
disabled.
Disassembly Window
The Disassembly window shows your target program as mixed source and
assembly program or just assembly code. A trace history of previously executed
39
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
instructions may be displayed with Debug – View Trace Records. To enable the trace
history, set Debug – Enable/Disable Trace Recording. If you select the Disassembly
Window as the active window all program step commands work on CPU instruction
level rather than program source lines. You can select a text line and set or modify code
breakpoints using toolbar buttons or the context menu commands. You may use the
dialog Debug – Inline Assembly… to modify the CPU instructions. That allows you to
correct mistakes or to make temporary changes to the target program you are debugging.
40
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
5. Save the Project by typing suitable project name with no extension in your
own folder sited in either C:\ or D:\
41
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
42
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
15. Click on the file option from menu bar and select ―new‖
16. The next screen will be as shown in next page, and just maximize it by double
clicking on its blue boarder.
43
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
19. Now right click on Source group 1 and click on ―Add files to Group
Source‖
20. Now you will get another window, on which by default ―C‖ files will appear.
44
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
21. Now select as per your file extension given while saving the file
22. Click only one time on option ―ADD‖
23. Now Press function key F7 to compile. Any error will appear if so happen.
28. Drag the port a side and click in the program file.
29. Now keep Pressing function key ―F11‖ slowly and observe.
You are running your program successfully.
46
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
CHAPTER-5
FLOW CHART AND SAMPLE SOURCE CODE
start
Initialization
NO If YES
year>=a
Invalid card
YES If NO
year = =1
Row 1 LED ON
If
47 year==2
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
YES NO
Row 2 LED ON
NO
If
YES
year==3
NO
Row 3 LED ON
YES If
year==4
Row 4 LED ON
Magazines LED
ON
EXIT
stop
5.2. SOURCE CODE:
#include<reg51.h>
#include<string.h>
#include"rfidfunctions.h"
#include"addd.c"
#include"serial.c"
#include"rfid.c"
//sbit d2=P3^6;
//sbit d3=P3^7;
main()
P0=0X00;
led1=0;
led2=0;
48
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
led3=0;
led4=0;
led5=0;
serial_init();
Lcd_Init();
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcddata_Str("Management systm");
Lcd_Cursor_off();
Delay(150);
Lcd_Display_Clear();
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
while(1)
Rfid_Getdata();
String_Cmp();
}//while(1)
sbit led2=P0^1;
sbit led3=P0^2;
sbit led4=P0^3;
sbit led5=P0^4;
string_cmp()
49
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
Lcd_Line_Disp(1,1);
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcd_Cursor_off();
led1=1;
Delay(150);
Delay(150);
led1=0;
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcddata_Str("Management systm");
Lcd_Cursor_off();
Delay(150);
Lcd_Line_Disp(1,1);
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcd_Cursor_off();
led2=1;
Delay(150);
Delay(150);
led2=0;
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcddata_Str("Management systm");
Lcd_Cursor_off();
Delay(150);
Lcd_Line_Disp(1,1);
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcd_Cursor_off();
led3=1;
Delay(150);
51
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
Delay(150);
led3=0;
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcddata_Str("Management systm");
Lcd_Cursor_off();
Delay(150);
Lcd_Line_Disp(1,1);
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcd_Cursor_off();
led4=1;
Delay(150);
Delay(150);
led4=0;
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
52
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
Lcddata_Str("Management systm");
Lcd_Cursor_off();
Delay(150);
Lcd_Line_Disp(1,1);
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcd_Cursor_off();
led5=1;
Delay(150);
Delay(150);
led5=0;
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcddata_Str("Management systm");
Lcd_Cursor_off();
Delay(150);
else
{
53
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
Lcd_Line_Clear(2);
Lcd_Line_Disp(2,1);
Delay(350);
Lcd_Display_Clear();
Lcd_Line_Disp(1,1);
Lcd_Cursor_off();
Lcd_Line_Disp(2,1);
Lcddata_Str("Management systm");
Lcd_Cursor_off();
Delay(150);
Rfid_Getdata()
RI=0;
for(i=0;i<12;i++)
while(RI==0);
a[i]=serialrx();
for(i=0;i<12;i++)
54
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
a[i]=0x00;
unsigned int z;
for(z=0;z<45000;z++);
sbit LED=P0^1;
char one[13]="5100D28B868E";
char two[13]="530093B52356";
char three[13]="53009351CA5B";
char four[13]="160062413B0E";
char five[13]="530093AD264B";
char a[20],rx;
//serialtx_str(char *temp );
serial_init();
char serialrx();
Lcd_Init();
Lcddata_Cmd(unsigned char);
Lcddata_Str(char *temp);
Lcd_Clear();
Lcd_Cursor_Off();
Lcd_Line_Clear(unsigned int);
Delay(unsigned int);
String_Cmp();
CHAPTER-6
RESULTS:
The main aim and objective of this project is to provide RFID procedure in
libraries handling functions like keeping record of the books (or magazines, journals etc.)
being read at the place, or being given to the reader for a stipulated time-period, checking
membership authenticity of existing readers, creating new memberships etc.
56
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
When ever libraries handling functions like keeping record of the magazines, it
sends the information to microcontroller. And the microcontroller displays
―MAGAZINE BOOKS @ GREEN LED ROW‖
When ever libraries handling functions like keeping record of the Fourth-year
books, it sends the information to microcontroller. And the microcontroller displays ―IV
YEAR BOOKS @ RED LED ROW‖
CHAPTER-7
CONCLUSION, LIMITATIONS AND FUTURE SCOPE
This system mainly reviewed the research and development work with
the help of passive RFID technology. By developing this system, RFID in the library
speeds up book borrowing, monitoring, books searching process and thus frees staff to
do more user-service tasks. To yield best performance, RFID readers and RFID tags to
be used must be of good quality. The efficient utilization of the technology also depends
upon the information to be written in tag. These applications can lead to significant
savings in labour costs, enhance customer service, lower book theft and provide a
constant record update of new collections of books. This application is working properly
and meeting to all requirements.
LIMITATIONS:
With this project, it is possible to reduction in stuff
58
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
Susceptibility of tags
Cost is high
FUTURE SCOPE:
The future scopes of the implemented applications may be extended as
follows:
In future, the transmitter side android is replaced by IOT. Which contain
microcontroller push button switch for command.
BIBLIOGRAPHY
1. Kiyotaka Fujisaki, ―An RFID based system for library management and performance
evaluation‖, Intelligent, and Software Intensive Systems 2015 Ninth International
Conference on Complex, Intelligent, and Software Intensive System, 978-1-4799-8870-
9/15.
2. Dong Zhang, Xiling Shi, ―Self-service management platform design for library based
on RFID‖, Philosophy and Social Sciences, NUC topics, 978-1-4577-0536-6/11/$26.00
©2011 IEEE.
59
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
5. J. Sing, N. Brar, and C. Fong, ―The State of RFID applications libraries‖, Information
Technology and Libraries, 25 (1),24-32, 2011.
6. ―Hitachi's RFID powder freaks us the heck out". Engadget hitachisrfid powder freaks-
us-the-heck-out. Retrieved 2010-04-24.
9. L.M. Riewe, Survey of Open Source Integrated Library Systems, Master thesis, San
Jose State University, August 2008. Retrieved. January 23, 2011.
60
DEPARTMENT OF ECE, SBIT, KMM
RFID BASED LIBRARY MANAGEMENT SYSYEM
61
DEPARTMENT OF ECE, SBIT, KMM