Professional Documents
Culture Documents
Seminar Report
On
TCOC30
Department of Computer
Engineering,
Dr. D. Y. Patil Institute of
Technology, Pimpri,Pune
CERTIFICATE
This is to certify that Joshi Sarthak Vijay from Third Year Computer Engineering has
successfully completed his / her seminar work titled ’’RFID Based Library Management
System at DR.D.Y.Patil Institute of Technology, Pimpri in the partial fulfillment of the Bachelors
Degree in Engineering.
Abstract
Applicability of Radio Frequency Identification (RFID) system which is a new generation of Auto
Identification and Data collection technology in a future Smart Library Management System is
presented in this paper. It helps to automate business processes and allows identification of large
number of tagged objects like books, using radio waves. In existing system barcode and token
card system were used. Barcodes have no read/write capabilities; they do not contain any added
information such as expiry date etc. and it needs line of sight, less security and it also can easily
damaged. By using token card system, they are very labor intensive and work process for the
librarians was more. By considering the above demerits in the existing systems, the proposed
Smart RFID system , which is a wireless non-contact system that uses radio frequency to transfer
data from a tag attached to an object, for the purpose of automatic identification and tracking.
RFID doesn’t need the line of sight, it remove manual book keeping of records, improved
utilization of resources like manpower, infrastructure etc. Also less time consumption as line of
sight and manual interactions are not needed for RFID Tag reading. RFID based Library
Management system would helps to allow fast transaction flow for the library and will prove
immediate and long term benefits to library in traceability and security.
Acknowledgements
With deep sense of gratitude we would like to thank all the people who have lit our path with
their kind guidance. We are very grateful to these intellectuals who did their best to help during
our project work.
It is our proud privilege to express a deep sense of gratitude to L.K.Wadhwa, respected
Principal of Dr. D Y Patil Institute of Technology, Pimpri Pune, for his comments and kind
permission to complete this project. We remain indebted to Dr. Chobe sir, H.O.D. Computer
Engineering Department for his timely suggestion- and valuable guidance.
The special gratitude goes to Prof. Kamal Reddy Mam, excellent and precious guidance in
completion of this work. We thanks to all the colleagues for their appreciable help for our
working project. With various industry owners or lab technicians to help, it has been our
endeavor throughout our work to cover the entire project work.
We are also thankful to our parents who provided their wishful support for our project
completion successfully. And lastly we thank our all friends and the people who are directly or
indirectly related to our project work.
Sarthak Joshi
5. System Design 18
5.1 Components of RFID 18
5.2 Devices used in Library Based on RFID 20
5.2.1 Self Kiosk 20
5.2.2 RFID Book Return 21
5.2.3 RFID Security Gate 21
5.2.4 Multipurpose Work Station 22
5.2.5 OPAC Kiosk 23
5.2.6 RFID Book Label (Tags) 23
5.2.7 RFID Smart Card 24
5.2.8 Anti-Theft Stickers 25
6. Application & Advantages of RFID 26
6.1 Applications 26
6.2 Advantages 27
7. Conclusion 29
7.1 Conclusion 29
7.2 Future Scope 29
8. References 30
Chapter 1
Introduction
An RFID tag is an object that can be applied to or incorporated into a product, animal, or person
for the purpose of identification and tracking using radio waves. Some tags can be read from
several meters away and beyond the line of sight of the reader.
An RFID tag is an object that can be applied to or incorporated into a product, animal, or person
for the purpose of identification and tracking using radio waves. Some tags can be read from
several meters away and beyond the line of sight of the reader.
A library is a collection of information, sources, resources, books, and services, and the
structure in which it is housed. Apart from books many libraries are now also repositories
and access points for maps, prints, or other documents on various storage media such as
microform (microfilm/microfiche), audio tapes, CDs, LPs, cassettes, video tapes, and
DVDs. Libraries have materials arranged in a specified order according to a library
classification system, so that items may be located quickly and collections may be browsed
efficiently. Reference stacks are different which has only reference books and only selected
members.
Our College Library is a large one having 17,000 books and staffed by both paraprofessionals
and professional librarians. The following are the tasks to be performed in the library.
Circulation: handling user accounts and issuing/returning and shelving of materials.
Collection, development, order materials, maintain materials’ budgets.
Technical Services work behind the scenes cataloguing and processing new materials and de
accessioning weeded materials.
and administering library computer systems. Among these, the proposed system will
automate the following tasks using RFID technology,
Accessing number of books at a time.
The RFID based LMS facilitates the fast issuing, reissuing and returning of books with the help
of RFID enabled modules. It directly provides the book information and library member
information to the library management system and does not need the manual typing. It also
provides monitoring and searching system. The monitoring module will continuously monitor
the movement of books across the gates, so that the books taken out without prior issuing will be
traced out easily and will alarm the librarians. The searching
module provides the fast searching of books using RFID handheld reader. The physical
location of the books can be easily located using this module.
Utmost care has been taken to provide following features to the Library using RFID
technology:
To remove manual book keeping of records.
Traceability of books and library members as they move.
Improved utilization of resources like manpower, infrastructure etc.
Less time consumption as line of sight and manual interaction are not needed for RFID-tag
reading.
• Whenever a new book is acquired by the library, an RFID tag is attached into
the book with the relevant information like, call number, accession number, book
number
• The detailed information regarding the book is also captured in the computer
database.
• The computer database also stores all information for individual users (patrons)
of the library.
• Each patron is supplied with a smart card. These smart cards carry identification
data for each patron.the efficacy of the above smart system is best utilized while searching for
an book or while issuing a book or while returning a book.
• When a patron needs to get a book issued, he can get it done without any
manual intervention. He walks to the issue kiosk, flashes his smart card and the
system automatically opens his login account page.
•He then places the selected books, one by one on the RFID scanner.
•The computer records all these data against his name.
• When a patron wants to return books, he simply places the books in the book
drop counter and the books automatically are adjusted for return against the
patron’s name.
• Such a system is very useful for searching - any patron is able to search for a
book from any networked computer. He/she is also able to get all information
regarding how many copies of a book are presently available and when the
book will be again available for circulation.
Chapter 2
Literature Survey
been programmed with information. The scanning antenna puts out radio- frequency
signals in a relatively short range. The RF radiation provides a means of communicating
with the transponder (the RFID tag) and provides the RFID tag with the energy to
communicate (in the case of passive RFID tags).The scanning antennas can be permanently
affixed to a surface, handheld antennas are also available. They can takewhatever shape you
need; for example, you could build them into a door frame to accept data from persons or
objects passing through. When an RFID tag passes through the field of the scanning
antenna, it detects the activation signal from the antenna. That ‖wakes up‖ the RFID chip,
and it transmits the information on its microchip to be picked up by the scanning antenna.
The RF low frequency range 120- 150 KHz is used for thedata transmission.
This is an on-going pilot project where RFID technology finds a useful and potentially promising
application in the field of library science [1]. The idea is to design and deploy an intelligent
Library Management System (LMS) for the university library in order to replace the existing
barcode system in an attempt to improve productivity and reduce labour cost. Specifically, the
proposed RFID-enabled LMS will be able to a) provide stock management including inventory
monitoring, identification of missing or lost library items, and locating books on shelves with the
push of a button; b) implement item security measures against possible thefts often occurred in
libraries; c) eliminate time-consuming processes when checking items out of the library or
returning items to the library (i.e. implementation of self-check-out/in counters). Today’s LMS’s
are based on barcode or magnetic tape technology that require line-of-sight and time consuming
circulation processing of each individual book. Therefore, frustrating circulation delays are
experienced by both library personnel and library users. Furthermore, individual barcode
scanning for each book multiplies risky repetitive motion of circulation staff, which is considered
a major drawback by librarians. Finally, barcode technology, due to its inherent limited read
range, is inappropriate for automated stock taking or for quick locating misplaced items – which
are often declared ―lost‖ – resulting in significant replacement costs.
2.4 Study on RFID Based Book Tracking and Library Information System
The technology of Radio Frequency Identification (RFID) has been invented by Charlie Walton
[1]. The RFID tags are essentially a transponder and have a data inside which can identify each
item through transmitting of radio waves. The retrieving of information and data in the RFID
system can be done by using machinereadable data at a particular time and place to satisfy the
particular application [2-4]. Currently, RFID-based systems can be utilised as a tracking system
in addition to security. It integrates the security with competent materials tracking for the library
that includes charging and discharging easily and quickly, inventorying, and materials handling.
This system has many merits such as minimising the required time for scanning barcodes by
librarians when charge and discharge different books and items.
The RFID Technology has arisen as a very efficacious technique and supplied contributions to
the supply chain management (SCM) due to its flexibility in both of detectable range and
mechanisms of accessible [5-7]. It also has enhanced the items identification, object tracking and
stock controlling significantly. Many industrial sectors and companies have realized the
importance of RFID which allows the wireless storage, automatic retrieval of data, and increases
the performance within the supply chain. In any typical library, each book has to be allocated in
assigned position to facilitate the easy accessible [8-10].
A library is where students, teachers and library staff have access to variety of resources.
Libraries contain thousands of books, magazines, periodicals and a lot of things to keep track
of. A library's goal is to ensure equal access to books and learning, information and information
technology (IT) for all members [1]. Library functions have been done manually and
independently from each other. These old ways of keeping libraries are no longer dynamic and
effective [2]. Most libraries are heading towards most of their operations being automated.
School libraries are shifting to flexible, dynamic, high technology learning centers level of
functionality as IT has developed various kind of automation processes. Libraries have been
radically changed as new technologies have expanded, evolving from electronic equivalent to
physical collections of libraries to complex systems capable of supporting connectivity and user
interaction.
Table 2.1
Table 2.2
Chapter 3
Problem Statement
This project idea was taken up with a vision to create a Smart Library Management System
using RFID to minimize the requirement of a librarian. Here is a list of features of library
management system which Ample trials offer:
Keep record of different categories like; Books, Journals, Newspapers, Magazines, etc.
Classify the books subject wise. Easy way to enter new books. Keep record of complete
information of a book like; Book name, Author name, Publishers name, Date/ Year of
publication, Cost of the book, Book purchasing date/ Bill no. Easy way to make a check-
out. Easy way to make a check-in. Automatic fine calculation for late returns. Different criteria
for searching a book. different kind of reports like; total no. of books, no. of issued books,
no. of journals, etc. Easy way to know how many books are issued to a particular student.
Easy way to know the status of a book. Event calendar for librarianto remember their dates.
My Notes section for librarian to write any note. Online accessfor registered user to see the
status of their books.
Tagging: Tag is the most important link in any RFID system. It has the ability to store
information relating to the specific item to which they are attached, rewrite again withoutany
requirement for contact or line of sight. Data within a tag may provide identification for an
item, proof of ownership, original storage location, loan status and history. RFID tags have
been specifically designed to be affixed into library media, including books, CDs, DVDs and
tapes. The role of the librarian is to classify the books into groups andpaste the RFID tags
on them. These paper-like tags helps in tracking the books withinthe range of the reader.
Chapter 4
Technical Details
4.1 Methodology
(i) The Initial Setup
Whenever a book is acquired by the library, an RFID tags are placed into the books
with the relevant information like, call number, author name, and book number, etc. The
detailed information regarding the book is also stored in the computer database. The
computer database also stores all information for individual users (users) of the library. Each
user is supplied with registered RFID cards. These cards carry identification data and details
like: address, roll number, and telephone no. etc. for each user.
There is an administrator with special privileges who has a unique master password
controlling the GUI of the RFID SLMS system. As soon as he powers on the system,
the first screen displays the LOGIN dialogue box. First he will need to scan his ID card
in front of the RFID reader and then entering the corresponding password to enable the
system for further usage. When a user wants to return books, he simply places the books
again in front of the RFID connected with the controller.
This tutorial is designed for all those readers who want to learn the fundamentals of SQL
Server and put it into practice.
To create databases.
To maintain databases.
INT NULL,
PRIMARY KEY CLUSTERED ((BookID) ASC) );
(iii) Specifications
RFID tagging is an ID system that uses small radio frequency identification devices for
identification and tracking purposes. An RFID tagging system includes the tag itself, a
read/write device, and a host system application for data collection, processing, and
transmission.
4. Stop bit
DipTrace is an EDA/CAD software for creating schematic diagrams and printed circuit
boards. The developers provide a multi-lingual interface and tutorials (currently available
in English and 21 other languages). DipTrace has 4 modules: schematic capture editor,
PCB layout editor with built-in shape-based autorouter and 3D-preview and export,
component editor, and pattern editor.
Simple user interface Multi-sheet and hierarchical schematics High-speed and Differential
signal routing Smart manual routing modes Wide import/export capabilities High-speed
shape-based autorouter Advanced verifications with real-time DRC.
Real-time 3D PCB preview Export of PCB to STEP 3D file format ODB++ and
Gerber (including Gerber X2) manufacturing outputs Advanced circuit design tool with
support of multi-sheet and multi-level hierarchical schematics that delivers a number of
features for visual and logical pin connections. Cross-module management ensures that
principal circuits can be easily converted into a PCB, back-annotated, or imported/exported
from/to other EDA software, CAD formats and net-lists. DipTrace Schematic has ERC
verification and Spice export for external simulation.
Engineering tool for board design with smart manual routing, differential pairs, length-
matching tools, shape-based autorouter, advanced verification, layer stackup manager,and
wide import/export capabilities. Design requirements are defined by netclasses, class-to-
class rules, and detailed settings by object types for each class or layer. When routing with
real-time DRC, the program reports errors on the fly before actually making them. DRC
also checks length and phase tolerances for differential pairs and controls signal
synchronization for nets and buses (including layer stackup and bonding wire induced
signal delays). The board can be previewed in 3D and exported to STEP format for
mechanical CAD modeling. Design rule check with in-depth detailing and netconnectivity
verification procedures are available.
This module includes real-time 3D preview and export feature. It shows the model of the
manufactured printed circuit board with all components installed. Rotate board in three
axes, zoom in and out in real time, change colors of the board, copper areas, solder mask,
silkscreen, and background. 3D preview works on all stages of the design. Board can be
exported to STEP or VRML 2.0 formats for mechanical CAD modeling. More than
7500 3D models of PCB packages are supplied for free. Externally designed 3D models
in *.wrl, *.step, *.iges, and *.3ds formats can be uploaded and attached to patterns in
Pattern Editor or PCB Layout.
Manage component libraries and create single- or multi-part components by selecting a template
and its dimensions, defining visual and electrical pin parameters, setting up a Spice model, and
attaching pattern with a 3D model to finalize component creation. BSDL import, bulk pin
naming, and pin manager tools for pins and buses. Importinglibraries from different EDA
formats. More than 140000 components in standard libraries.
Draw patterns with various types of shapes, pads, holes, and dimensions. Circle, lines
(headers, DIP), square (QFP), matrix (BGA), rectangle (RQFP), and zig-zag standard
templates. Creation of pattern is basically selecting a template, entering a couple of vital
parameters, drawing the silkscreen, and launching automatic pad renumbering. Custom
templates can be created for non-standard patterns. DXF import makes creating complex
layouts easier.
Chapter 5
System Design
An antenna or coil
A transceiver (with decoder)
A transponder (RF tag) electronically programmed with unique information.
ANTENNA
The antenna emits radio signals to activate the tag and read and write data to it. Antennas are the
conduits between the tag and the transceiver, which controls the system's data acquisition and
communication. Antennas are available in a variety of shapes and sizes; they can be built into a
door frame to receive tag data from persons or things passing through the door, or mounted on an
interstate tollbooth to monitor traffic passing by on a freeway. The electromagnetic field
produced by an antenna can be constantly present when multiple tags are expected continually. If
constant interrogation is not required, a sensor device can activate the field.
Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a.
interrogator), which can be configured either as a handheld or a fixed-mount device. The reader
emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its
power output and the radio frequency used. When an RFID tag passes through the
electromagnetic zone, it detects the reader's activation signal. The reader decodes the data
encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer
for processing.
TAGS (Transponders)
An RFID tag is comprised of a microchip containing identifying information and an antenna that
transmits this data wirelessly to a reader. At its most basic, the chip will contain a serialized
identifier, or license plate number, that uniquely identifies that item,
similar to the way many bar codes are used today. A key difference, however is that RFID tags
have a higher data capacity than their bar code counterparts. This increases the options for the
type of information that can be encoded on the tag, including the manufacturer, batch or lot
number, weight, ownership, destination and history (such as the temperature range to which an
item has been exposed). In fact, an unlimited list of other types of information can be stored on
RFID tags, depending on application needs. An RFID tag can be placed on individual items,
cases or pallets for identification purposes, as well as on fixed assets such as trailers, containers,
.Tags come in a variety of types, with a variety of capabilities. Key variables include: "Read-
only" versus "read-write". There are three options in terms of how data can be encoded on tags:
(1) Read-only tags contain data such as a serialized tracking number, which is pre-written onto
them by the tag manufacturer or distributor. These are generally the least expensive tags because
they cannot have any additional information included as they move throughout the supply chain.
Any updates to that information would have to be maintained in the application software that
tracks SKU movement and activity. (2) "Write once" tags enable a user to writedata to the tag
one time in production or distribution processes. Again, this may include a serial number, but
perhaps other data such as a lot or batch number. (3) Full "read-write" tags allow new data to
be written to the tag as needed—and even written over the original data. Examples
for the latter capability might include the time and date of ownership transfer or updating the
repair history of a fixed asset. While these are the most costly of the three tag types and are not
practical for tracking inexpensive items, future standards for electronic product codes (EPC)
appear to be headed in this direction.
The Book Drop Station Can be placed at any convenient location to enable patrons to return
their items any time, even after the library is closed.
The Security Gate feature the most modern detection algorithm that constantly detects any
unauthorized items removal from the library.
A Single Lane Gate antenna range covers approximately 1 meter wide pathway and its anti-
collision feature allows it to read up to 50 items simultaneously. Library Security Gate opens
perspectives for library security by protecting a wider variety of library materials. EM Gate
System delivers superior detection in different directions of all secured items of the valuable
library collection (books, CD’s, Audio cassettes, microfiches etc). It uses advanced EM
(Electromagnetic) technology in combination with Diagnostic Signal Rating (DSR) and Switch
Capacitor Filtering (SCF) to ensure optimum customer satisfaction. The system integrates easily
into any library environment due to its streamline design.
The rfLiMS Multipurpose Staff Station is an elegant desktop station that enables librarians to
quickly and efficiently process the circulation of library items. When a stack of tagged items are
placed over a station, they are immediately identified, processed by the LMS (Library
Management System), and EAS bit (Security bit) of book label is quickly reset in a single
operation. Multiple simultaneous checkouts & checkins Renewal of library material Identify the
borrower using RFID Patron Cards Tagging of new library items Programming of new RFID
Patron Cards. It is versatile unit that operate as a circulation desk or tag encoding station. It Arm
/ Disarm Library items Programming is being done of RFID Patron Cards. It also provide the
functionality to activate and deactivate the library items.
This is the OPEN PUBLIC ACCESS CATALOGUE. This helps the Visitors need to who
perform quick access to entire library catalogue.
At the heart of the Daphne's rfLiMS is the RFID Book Label. Capable of storing and rewriting
the items related information, RFID label streamlines circulation and collection management
processes. RaceTrack tags and inlays are credit card sized top performing products suitable for
wide range of end use applications. Credit card sized all-around product for library and media
management. Excellent performance in all printed media products and applications including self
check with stack reading capability and EAS. Best-in-class read range for EAS gates and less
material detuning with printed media products.
The RFID Smart Card raise patron identification to new levels of convenience by allowing
patron to identify themselves without the need to swipe a magnetic stripe or scan a barcode.
Anti-collision for Multi read.
Anti-theft Sticker is used for protection of RFID Book Label. It is water proof, dust proof,
temper proof sticker. It has pre-printed institute logo and information. It is available in different
sizes. These Stickers are made by high quality materials and non-acidic adhesive, and will not
damage the pages in long run.
Chapter 6
6.1 Applications
Our readers can be used for Access control, Time & Attendance, Vending machines, industrial
and other applications where Reading the data from the Card only is required.
Self check-out station: used to check out library materials without staff assistance
Self check-in station: used to check in library materials without staff assistance
Exit sensors: to verify that all material leaving the library has been checked out
Sorter and conveyor: automated system for returning material to proper area of library
Hand-held reader: used for inventorying and verifying that material is shelved correctly.
EAD RFID is a combination of our Ethernet Adapter – EAD 01 and the RFID reader module.
This unit contains our EAD 01 B Board level Serial to LAN converter, RFID module which can
read the Tags and Built-in Antenna to pick up the RFID signal, a buzzer to indicate the
successful reading of the card and a LED-indication.
The Unit can additionally support Time Stamping function with Real Time Clock
as an Option. This unit can store up to 20 K of Data in its memory until the Server or PC
software polls to pick up the data. (With a 10 digit Tag and Time Stamp, upto800records)
We can also customize this product for System Integrators or Software developers to meet their
software requirement.
RFID systems can be used just about anywhere, from clothing tags to missiles to pet tags
to food - anywhere that a unique identification system is needed. The tag can carry information
as simple as a pet owners name and address or the cleaning instruction on a sweater to as
complex as instructions on how to assemble a car.
Here are a few examples of how RFID technology is being used in everyday places:
RFID systems are being used in some hospitals to track a patient's location, and to provide
real-time tracking of the location of doctors and nurses in the hospital. In addition, the system
can be used to track the whereabouts of expensive and critical equipment, and even to control
access to drugs, pediatrics, and other areas of the hospital that are considered "restricted
access" areas.
RFID chips for animals are extremely small devices injected via syringe under skin. Under a
government initiative to control rabies, all Portuguese dogs must be RFID tagged by
2007.When scanned the tag can provide information relevant to the dog's history and its
owner's information.RFID in retail stores offer real-time inventory tracking that allows
companies to monitor and control inventory supply at all times.
The Orlando/Orange County Expressway Authority (OOCEA) is using an RFID based
traffic-monitoring system, which uses roadside RFID readers to collect signals from
transponders that are installed in about 1 million E-Pass and Sun Pass customer vehicles.
A few libraries use "smart" card, which is an RFID card with additional encryption, is an
alternative to merely adding an RFID tag on staff and user identification cards. Not only does
that identify users for issue and return of library materials, but also for access to restricted
areas or services.
This would make it possible to make it into a "debit" card, with value added upon pre-
payment to the library and value subtracted when a user used a photocopier, printer, or other
fee-based device, or wished to pay fines or fees.
Self-charging/Discharging:
The use of RFID reduces the amount of time required to perform circulation operations. This
technology helps librarians eliminate valuable staff time spent scanning barcodes while
checking out and checking in borrowed items. For the users, RFID speeds up the borrowing
and return procedures.
Reliability:
The readers are highly reliable. Several vendors of RFID library systems claim an almost 100
percent detection rate using RFID tags. Some RFID systems have an interface between the
exit sensors and the circulation software to identify the items moving out of the library. Were
a library user to leave the library and not be caught, the library would at least know what had
been stolen.
If the user card also has an RFID tag, the library will also be able to determine who removed
the items without properly charging them.
Other RFID systems encode the circulation status on the RFID tag. This is done by
designating a bit as the "theft" bit and turning it off at time of charge and on at time of
discharge. If the material that has not been properly charged is taken past the exit gate
sensors, an immediate alarm is triggered. Another option is to use both the "theft" bit and the
online interface to an integrated library system, the first to signal an immediate alarm and the
second to identify what has been taken out.
High-Speed Inventorying:
A unique advantage of RFID systems is their ability to scan books on the shelves without
tipping them out or removing them. A hand-held inventory reader can be moved rapidly
across a shelf of books to read all of the unique identification information. Using wireless
technology, it is possible not only to update the inventory, but also to identify items, which
are out of proper order.
Chapter 7
Conclusion
7.1 Conclusion
Radio Frequency Identification (RFID) based-Systems have been in utilised in many sectors like
libraries for book identification, self-checkout, anti-theft control, inventory control, and in sorting
and conveying of library books. The proposed system was developed to overcome the demerits of
barcoding systems. With this system, reducing the need of skilled librarians is accomplished. The
system reliability, easy to operate, and flexibility in tagging different types of media easily, are an
important criteria in selecting an RFID system. This technology produces a significant saving in
processing time and costs, improve client's service, minimise the book theft, and maintain
continuous update of new books collections. Further, it makes the process of issuing, returning,
and monitoring quickly and reduces the manual work that was supposed to be done previously by
the staff. The system performance was also improved by inserting GSM features to notify the
client with dates of issue, return, due date and its associated fine.
1) To enhance the usability features such as the browser compatibility that users may use
different platforms and also different browsers to visit the system in the web application and to
have a mobile application that can be accessed through iOS platform.
2) To apply AJAX concept so that it can be instantly checking user’s input and provide
immediate feedback. It saves the time of the user, as they will not have to fill in the information
without getting a response until the form is submitted.
3) To implement a robust audit trail program capable of logging operations for data access and
data adjustment. It will improve information security and ensure that privacy is secured and
confidentiality is maintained.
4) To incorporate SMS and MMS that will allow users to send message and send multimedia
such as pictures, music, text and more. Also, it can be included as part of the notification and
reminder in the mobile application such as when the media resources are over the due date and
about to expire.
References