faculty of informatic and computing csf 35104 final …

27
1 FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL YEAR PROJECT 1 PROJECT TITLE: UNISZA BOOK BORROWING SYSTEM USING QR CODE SUPERVISOR: DR SUHAILAN SAFEI PREPARED BY: ASMA ATIQAH BINTI AZMI 056849 BACHELOR COMPUTER SCIENCE (INTERNET COMPUTING)

Upload: others

Post on 18-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

1

FACULTY OF INFORMATIC AND COMPUTING

CSF 35104 FINAL YEAR PROJECT 1

PROJECT TITLE:

UNISZA BOOK BORROWING SYSTEM USING QR CODE

SUPERVISOR:

DR SUHAILAN SAFEI

PREPARED BY:

ASMA ATIQAH BINTI AZMI

056849

BACHELOR COMPUTER SCIENCE (INTERNET COMPUTING)

Page 2: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

2

Table of Contents

CHAPTER 1: INTRODUCTION ........................................................................................................ 3

1.1 BACKGROUND OF STUDY ................................................................................................ 4

1.2 PROBLEM STATEMENT ..................................................................................................... 5

1.3 OBJECTIVE ........................................................................................................................... 6

1.4 SCOPE .................................................................................................................................... 6

1.5 THESIS STRUCTURE ........................................................................................................... 7

1.6 HARDWARE AND SOFTWARE REQUIREMENT ............................................................ 8

CHAPTER 2: LITERATURE REVIEW ............................................................................................ 9

2.1 INTRODUCTION .................................................................................................................. 9

2.2 REVIEW OF CURRENT BORROWING METHOD .......................................................... 10

2.3 COMPARISON WITH EXISTED/SIMILLAR SYSTEM ................................................... 11

2.3.1 BARCODE ................................................................................................................... 11

2.3.2 RFID ............................................................................................................................. 12

2.3.3 SIMILLAR SYSTEM THAT APPLY QR CODE ....................................................... 12

2.4 PROPOSED SYSTEM ......................................................................................................... 13

2.5 SUMMARY .......................................................................................................................... 14

CHAPTER 3: METHODOLOGY ..................................................................................................... 15

3.1 CHOSEN METHODOLOGY ............................................................................................... 15

3.2 APPLICATION OF CHOSEN METHODOLOGY ............................................................. 16

3.2.1 STAGE 1 – REQUIREMENT ANALYSIS ................................................................. 17

3.2.2 STAGE 2 – SYSTEM DESIGN ................................................................................... 17

3.2.3 STAGE 3 – IMPLEMENTATION ............................................................................... 17

3.2.4 STAGE 4 – TESTING .................................................................................................. 17

3.2.5 STAGE 5 – DEPLOYMENT ........................................................................................ 17

3.2.6 STAGE 6 – MAINTENANCE ..................................................................................... 18

3.3 SYSTEM DESIGN ............................................................................................................... 19

3.3.1 CONTEXT DIAGRAM (CD) ....................................................................................... 19

3.3.2 DATA FLOW DIAGRAM (DFD)................................................................................ 20

3.3.3 ENTITY RELATIONSHIP DIAGRAM (ERD) ........................................................... 22

3.3.4 PROOF OF CONCEPT/INTERFACE/PROTOTYPE ................................................. 23

GANTT CHART ................................................................................................................................. 26

REFERENCES .................................................................................................................................... 27

Page 3: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

3

CHAPTER 1: INTRODUCTION

Today's rapid development in technology is undeniable. In addition to the nature of the

pandemic of covid-19, which forced people to operate both online and from home. Therefore,

as people have to use nearly all internet technologies to complete their duties, the technology

industry becomes more lively.

UniSZA Book Borrowing System using QR code is a system that can assist Unisza

students to conduct the book borrowing process more easily by simply scanning the QR code

contained in the book. Apart from saving time and easier processes, this system can also

indirectly reduce direct meetings between students and library staff and at the same time helps

them to comply with standard operating procedures as required by the government when the

world experiences this pandemic.

QR(Quick Response) code is used with this system. It is possible to retrieve QR codes

faster and can contain more data. To store data, QR codes do not require advanced technology.

It is, instead, given on a piece of paper as a small black and white box. The use of QR codes

on this system is designed to speed up the book borrowing process and can save time for

students.

The introduction of this thesis opens with the statement of problems faced by students

when trying to borrow a book. Next, followed by project objectives as well as the scope. By

the end of this chapter, the structure of the thesis will be concluded.

Page 4: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

4

1.1 BACKGROUND OF STUDY

Borrowing and returning books is key to library services. The advancement of

technology has also changed the evolution of library facilities from traditional to modern

services. Traditionally, library services require users to go through the borrowing and return

process in person, and records of borrowing and return are kept manually using paper. Later, a

borrowing method using self-check machines was turned into a more modern system.

There are some disadvantages to the use of conventional and existing systems and it

needs a lot of librarian participation. Traditionally, the service often wants its customers to

spend more time doing the borrowing and returning process. This causes users, especially

students, to be not interested in borrowing library books.

Therefore in order to solve the problems faced, a system is needed to handle the process

of borrowing and repayment. This is to assist librarians in simplifying their work. The main

aim of this system is to minimize librarians' participation in the process of returning and

borrowing books, as well as to reduce the time needed for students to borrow books.

Page 5: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

5

1.2 PROBLEM STATEMENT

The book borrowing process starts manually, which students have to meet the library

staff and the record of book borrowing is also manually recorded using the computer. Then,

move on to the borrowing process by using a self-check machine to perform the borrowing

process. Therefore, there are some problems that arise when using previous methods.

The use of traditional approaches has created issues because if there are many students

at the time who want to borrow a book at the same time, students need to queue to do the book

borrowing process. Therefore, the other problem is the possibility of a damaged self-check

machine. If the machine is broken, students need to consult with librarians to manually conduct

the borrowing process. And this clearly increases the time taken for the students to perform the

book borrowing process.

Page 6: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

6

1.3 OBJECTIVE

The following is a list of objectives for the system to be developed:

I. To analyze problems on the previous book borrowing method.

II. To design a book borrowing system using QR code.

III. To develop the system using secured web framework Laravel.

1.4 SCOPE

This system is limited to UniSZA students and the librarians only.

1. Students

First, students need to login to the system and register their student information such as

student name, matric number, and their study field. For the borrowing process, they just

need to choose the book they want to borrow and scan the QR code in/on the book.

Then, the popup will appear, listing the book details, the date of the book being

borrowed, and the date they need to return the book, the student details then they are

good to go. If they want to view their list of books that have been borrowed, they can

just go to the system and view it. They also can view the list of books that are available

in the library.

2. Librarians (Admin)

Librarians also need to login into the system as admin. Then, they can view the books

that have been borrowed by the students. They can also cancel and terminate the book

for the next borrowing process. For book availability, they also can add and update the

list of books and also checks the due date of books being borrowed.

Page 7: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

7

1.5 THESIS STRUCTURE

This thesis is organized into four chapters which start with Chapter 1. It begins with an

introduction to the system that will be developed. Then, it will describe the problem statement,

objective, and then the scope of the system.

Chapter 2 shows a review of the literature review that explains the study relevant to the

current project carried out by the existing scheme. Furthermore, this chapter explains the

techniques/methods/equipment or technologies to be used in the project implementation.

In Chapter 3, it will provide a systematic model of application development

methodology and framework taken in the development of applications. This chapter also

includes methods, techniques or approaches to be used throughout the design and execution of

the project.

Page 8: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

8

1.6 HARDWARE AND SOFTWARE REQUIREMENT

HARDWARE

TYPE OF HARDWARE DESCRIPTION

HP Laptop I. To do research that is related to the

project.

II. To write code for the system that will be

developed.

SOFTWARE

TYPE OF SOFTWARE DESCRIPTION

Myfik cloud/laravel To do the programming (coding).

MICROSOFT WORD To do the proposal.

DRAW.IO To produce a context diagram, data flow

diagram, entity relationship diagram.

GOOGLE CHROME To view the system that has been developed.

Page 9: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

9

CHAPTER 2: LITERATURE REVIEW

2.1 INTRODUCTION

In a world that is growing and evolving with the advancement of technology, the use

of a computerized system is no longer a new thing to the users. The use of this technology is

to replace the use of paper that is inefficient, particularly to handle matters involving data

management. The distinctions between conventional methods of borrowing and a book

borrowing system using QR codes will be demonstrated in this literature review.

The new system would be introduced in order to replace the inefficiency and more time

consumption on the existing system. The purpose of developing this system is to minimize the

workload of librarians in the process of returning and borrowing books, as well as to reduce

the time required for book borrowing by students. The existence of this system will make it

easier for the librarian in order to manage and monitor the book borrowing process. For

students, it will reduce the time taken to perform the borrowing process.

This system will be implemented with the UniSZA Library System. So, it can only be

used by UniSZA students and librarians. With this system, they are allowed to scan the QR

code from the book to perform the borrowing process. They also can view the book that is

being borrowed. For the librarians, the hardware and software inventory and the borrower's list

can be viewed, updated, added, and deleted. Students and librarians can access this system

anytime, anywhere since it's a web-based application.

Page 10: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

10

2.2 REVIEW OF CURRENT BORROWING METHOD

The borrowing and return system used today still requires the participation of librarians.

To perform the borrowing and return process, students need to go to the counter or they can

choose to do it from the self-check machine. Therefore, the approach explicitly needs the time

of both students and librarians.

In addition, if students want to check the availability of a book, they also need to go to

the counter to settle down. Such matters should be carried out during office hours only since

the involvement of librarians is needed. This will obviously give difficulties to students

especially to students at Besut campus.

In addition, the use of current approaches causes the inability of students who have

borrowed a book to recall the correct day to return the book. Failure to borrow the book on the

due date would result in a penalty for the student.

In brief, it obviously takes a lot of time to complete a borrowing process using this old

method. Students may also be less interested in borrowing books from the library because of

this.

Page 11: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

11

2.3 COMPARISON WITH EXISTED/SIMILLAR SYSTEM

A library is expected to use different resources to keep up with the modern world. This section

presented similar works on widely used technologies in Programs for Library Management. A

fair amount of work on the Smart Library Management System (SLMS) has been published

and a brief section is given below. A summary of the most widely used technologies in

university libraries: barcodes and RFID.

2.3.1 BARCODE

A barcode is an Automated Identification Technology (Auto ID) piece that stores

information in real time. It is a series of vertical bars which encode numbers and letters in a

format that, by measuring the intensity of the reflected barcode light, can easily be retrieved

and interpreted by a reader.

In the computerised circulation system, one of the helpful implementations of the

barcode system is, in the computerised circulation scheme, the borrower shows his library card

and the book(s) to be borrowed before the counter assistant. The circulation assistant enters the

borrower's identification number through the keyboard and triggers the database record. It is

the computer programme that measures the return due date, finishes and makes book

reservations. The charging and discharging of books is a time-consuming procedure due to the

usual delivery system, as stamping of due dates and other data entry work must be carried out.

The QR code is more effective than a barcode. In both horizontal and vertical patterns,

it stores information. Far more details than a standard barcode can be held by QR codes. QR

codes often store a smaller region with larger data. In a library where big data needs to be

compressed for easy handling, these features are beneficial.

Page 12: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

12

2.3.2 RFID

Radio frequency electromagnetic wave (RFID) technology is a type of technique for automated

contact-less data collection. As a library management system, RFID technology has many

elements: tags, a micro-controller, a reader and database applications. To identify the tags, the

readers are put in certain positions. RFID technology can distinguish tags over longer distances

than barcodes and can identify many tags at once. It can also be used for ID cards, making

purchases in libraries more effective than dealing with a barcode. High tag costs and time-

consuming implementation, however, are major disadvantages of this technology. As it avoids

the use of tags and scanners, the QR code is a tough competitor, saving a great amount of

money.

2.3.3 SIMILLAR SYSTEM THAT APPLY QR CODE

A QR code is a matrix barcode that can be read by cameras on smartphones and mobile

phones. A typical QR code uses four standardised encoding modes to efficiently store data:

numeric, alphanumeric, binary, and kanji. Far more details than a standard barcode can be held

by QR codes. A URL, a phone number, an SMS message, a V-card, or any text could be the

information encoded in a QR code. As they allow the content to be decoded at high speed, they

are referred to as QR. One of the disadvantages of this technology lies in the Reed Solomon

Code's ability to correct errors and to detect errors.

ATM transactions are one of the places where the QR code has become common. QR

codes are used to authenticate users for cardless transactions on ATMs and other secure

devices. These transactions operate on an external computer via an image code that is

displayed. Users then need a mobile device, usually supported by their banking application,

with a decoding feature. This feature decodes transaction information embedded in the picture

Page 13: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

13

and enables a protected resource to be accessed. It transmits the mobile device's information

and identifier to the authentication system, granting access to the protected resource if the

authentication test is met by the transaction information and identifier.

2.4 PROPOSED SYSTEM

To solve the problems that occur among these students, a book borrowing system using

QR code needs to be implemented. This system has the ability to replace current methods where

its use is simpler and easier.

The aim of developing this system is to minimize the workload of librarians in the

process of returning and borrowing books, as well as to reduce the time required for book

borrowing by UniSZA students especially for students at Besut Campus. With this system,

students can perform the borrowing process properly without having problems with the time

taken. It also helps librarians to manage books, borrowing records properly. This system would

also provide borrowers with notice of the due date so students will no longer forget about the

day they should return the book.

Furthermore, the system also helps students to search the book they want first before

borrowing it. This would make things easier for students, so if others borrow the book they

want, they don't have to bother going to the library to find the book. It is also obvious that this

system will reduce the time for students to find and borrow books. This ensures that this system

can be accessed anytime and anywhere by students.

Page 14: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

14

2.5 SUMMARY

In conclusion, the development of the Book Borrowing System Using QR code will

solve the problems encountered by students. The use of older methods is obviously inefficient

and causes inconvenience for students. Therefore, it is appropriate if this system is developed

to facilitate various parties.

Page 15: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

15

CHAPTER 3: METHODOLOGY

3.1 CHOSEN METHODOLOGY

In a system development process, System Development Life Cycle (SDLC) plays an

important role before a system is developed. Having an SDLC in place is crucial as it helps to

turn the concept of a project into a practical and fully operational framework. SDLC deals with

process creation, change management, user interface, and regulations, in addition to covering

the technical aspects of system development. One systematic model of system development

has been chosen and will be discuss in this chapter.

Page 16: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

16

3.2 APPLICATION OF CHOSEN METHODOLOGY

The suitable and appropriate approach for this system development that has been decide to use

Waterfall Model. Waterfall model also referred as linear-sequential life cycle model which it

is simple to understand and use. The entire process of software development is split into

different phases in "The Waterfall" approach. Usually, the result of one phase serves as the

input for the next phase sequentially in this Waterfall model.

Figure 1: WATERFALL MODEL

Page 17: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

17

3.2.1 STAGE 1 – REQUIREMENT ANALYSIS

In this stage, all requirement of the proposed system are gathered. System requirements

like functional and non-functional requirements which are necessary for the system

development are included.

3.2.2 STAGE 2 – SYSTEM DESIGN

Project development begins here in the system design. Appropriate appearance and the

function that the system have must be stated and it should be the first things to be highlighted.

Database design also happen here where all the data element for the system are well assigned

and tables related to the system must be draft.

3.2.3 STAGE 3 – IMPLEMENTATION

In implementation stage, database that has been designed in design stage must be

created here. MYSQL will be use to create the database. The code to develop this project will

be written in PHP Language with Laravel framework.

3.2.4 STAGE 4 – TESTING

Testing shall take place once the system has been developed. After testing of each unit,

all the units built in the implementation process are incorporated into a system. The whole

system is tested for any faults and errors after integration.

3.2.5 STAGE 5 – DEPLOYMENT

After all the functional and non-functional testing are done, the system will be deployed

to the user environment.

Page 18: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

18

3.2.6 STAGE 6 – MAINTENANCE

In this stage, it happens when there are some issues come up in the user environment

which need the developer to fix the issues. This will enhance the system to be a better system.

Page 19: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

19

3.3 SYSTEM DESIGN

3.3.1 CONTEXT DIAGRAM (CD)

Figure 2: Context Diagram

Figure above shows the main process of the system. This system consists of 2 users which are

students and librarians. The main process for students, borrows books and the main process for

librarians are to view borrows report and book list report.

Page 20: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

20

3.3.2 DATA FLOW DIAGRAM (DFD)

Figure 3: Data Flow Diagram for Students

Figure above shows the Data Flow Diagram for students.

1. Students register to the system. Students details are stored in table students in the database.

2. After doing the registration, the system will send registration confirmation to the students.

3. Next, students can search the books in the system before perform the borrowing process.

4. Books details that has been search will appear as search report to the students.

5. To perform the borrowing process, students need to scan QR Code on the book. Then the

borrowing process will be saved in borrows table in the database.

Page 21: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

21

Figure 4: Data Flow Diagram for Librarians

Figure above shows the Data Flow Diagram for librarians.

1. Librarians can manage books by add, update, delete books details and it will be saved in table

books in the database.

2. Report of books can be generated from this process.

3. Librarians also can manage sections by add, update, delete sections details, the details are

stored in the sections table and a report will be generated.

4. Same goes to borrows, librarians can add, update, delete borrows details.

5. Borrows details are stored in the database. Then report are generated from this system.

Page 22: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

22

3.3.3 ENTITY RELATIONSHIP DIAGRAM (ERD)

Figure 5: Entity Relationship Diagram

Entity Relationship Diagram displays the relationship of sets stored in database which explain

the logical structure of database. In this project, there are 5 tables in the database which are related to

each other.

Page 23: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

23

3.3.4 PROOF OF CONCEPT/INTERFACE/PROTOTYPE

MAINPAGE

Figure 6: Main page interface

STUDENTS PAGE

Figure 7: Booklist interface

Page 24: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

24

Figure 8: Borrow history interface

Figure 9: Scan interface

Page 25: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

25

LIBRARIANS PAGE

Figure 10: Booklist interface

Figure 11: Borrows list interface

Page 26: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

26

GANTT CHART

WEEK /

ACTIVITIES

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Final Year Project

Briefing

Project Title

Proposal

Proposal Writing

(Chapter 1 -

Introduction)

Proposal Writing

(Chapter 2 -

Literature Review)

Proposal Writing

(Continued)

Proposal Progress

Presentation

Methodology

Workshop

Proposal Writing

(Chapter 3 -

Methodology)

Proof of Concept

Format Writing

Workshop

Drafting Report of

Proposal

Final Presentation

Final Report &

LogBook

Submission

Page 27: FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL …

27

REFERENCES

1. NA, T. (2006). ONLINE BORROWING SYSTEM (Doctoral dissertation,

UNIVERSITY MALAYSIA SARAWAK).

2. Song, W. (2018). Analysis of New Library Borrowing and Returning Mode Based on

Book Transfer System.

3. Akeroyd, J., & Cox, A. (1999). Integrated library management systems:

overview. Vine.

4. Singh, A. (n.d.). Smart Library Management System using QR code. Retrieved

January 29, 2021, from https://portfolios.cs.earlham.edu/wp-

content/uploads/2019/12/Proposal_SLMS_adarsh.pdf

5. Singh, G., & Sharma, M. (n.d.). Barcode technology and its application in libraries

and Information centers Vol.1 No.1 Barcode technology and its application in

libraries and Information centers.

http://www.ijnglt.com/files/Barcode%20technology%20and%20its%20application%2

0in%20libraries%20and%20Information%20centers.pdf