1 FACULTY OF INFORMATIC AND COMPUTING CSF 35104 FINAL YEAR PROJECT 1 PROJECT TITLE: UNISZA BOOK BORROWING SYSTEM USING QR CODE SUPERVISOR: DR SUHAILAN SAFEI PREPARED BY: ASMA ATIQAH BINTI AZMI 056849 BACHELOR COMPUTER SCIENCE (INTERNET COMPUTING)
1
FACULTY OF INFORMATIC AND COMPUTING
CSF 35104 FINAL YEAR PROJECT 1
PROJECT TITLE:
UNISZA BOOK BORROWING SYSTEM USING QR CODE
SUPERVISOR:
DR SUHAILAN SAFEI
PREPARED BY:
ASMA ATIQAH BINTI AZMI
056849
BACHELOR COMPUTER SCIENCE (INTERNET COMPUTING)
2
Table of Contents
CHAPTER 1: INTRODUCTION ........................................................................................................ 3
1.1 BACKGROUND OF STUDY ................................................................................................ 4
1.2 PROBLEM STATEMENT ..................................................................................................... 5
1.3 OBJECTIVE ........................................................................................................................... 6
1.4 SCOPE .................................................................................................................................... 6
1.5 THESIS STRUCTURE ........................................................................................................... 7
1.6 HARDWARE AND SOFTWARE REQUIREMENT ............................................................ 8
CHAPTER 2: LITERATURE REVIEW ............................................................................................ 9
2.1 INTRODUCTION .................................................................................................................. 9
2.2 REVIEW OF CURRENT BORROWING METHOD .......................................................... 10
2.3 COMPARISON WITH EXISTED/SIMILLAR SYSTEM ................................................... 11
2.3.1 BARCODE ................................................................................................................... 11
2.3.2 RFID ............................................................................................................................. 12
2.3.3 SIMILLAR SYSTEM THAT APPLY QR CODE ....................................................... 12
2.4 PROPOSED SYSTEM ......................................................................................................... 13
2.5 SUMMARY .......................................................................................................................... 14
CHAPTER 3: METHODOLOGY ..................................................................................................... 15
3.1 CHOSEN METHODOLOGY ............................................................................................... 15
3.2 APPLICATION OF CHOSEN METHODOLOGY ............................................................. 16
3.2.1 STAGE 1 – REQUIREMENT ANALYSIS ................................................................. 17
3.2.2 STAGE 2 – SYSTEM DESIGN ................................................................................... 17
3.2.3 STAGE 3 – IMPLEMENTATION ............................................................................... 17
3.2.4 STAGE 4 – TESTING .................................................................................................. 17
3.2.5 STAGE 5 – DEPLOYMENT ........................................................................................ 17
3.2.6 STAGE 6 – MAINTENANCE ..................................................................................... 18
3.3 SYSTEM DESIGN ............................................................................................................... 19
3.3.1 CONTEXT DIAGRAM (CD) ....................................................................................... 19
3.3.2 DATA FLOW DIAGRAM (DFD)................................................................................ 20
3.3.3 ENTITY RELATIONSHIP DIAGRAM (ERD) ........................................................... 22
3.3.4 PROOF OF CONCEPT/INTERFACE/PROTOTYPE ................................................. 23
GANTT CHART ................................................................................................................................. 26
REFERENCES .................................................................................................................................... 27
3
CHAPTER 1: INTRODUCTION
Today's rapid development in technology is undeniable. In addition to the nature of the
pandemic of covid-19, which forced people to operate both online and from home. Therefore,
as people have to use nearly all internet technologies to complete their duties, the technology
industry becomes more lively.
UniSZA Book Borrowing System using QR code is a system that can assist Unisza
students to conduct the book borrowing process more easily by simply scanning the QR code
contained in the book. Apart from saving time and easier processes, this system can also
indirectly reduce direct meetings between students and library staff and at the same time helps
them to comply with standard operating procedures as required by the government when the
world experiences this pandemic.
QR(Quick Response) code is used with this system. It is possible to retrieve QR codes
faster and can contain more data. To store data, QR codes do not require advanced technology.
It is, instead, given on a piece of paper as a small black and white box. The use of QR codes
on this system is designed to speed up the book borrowing process and can save time for
students.
The introduction of this thesis opens with the statement of problems faced by students
when trying to borrow a book. Next, followed by project objectives as well as the scope. By
the end of this chapter, the structure of the thesis will be concluded.
4
1.1 BACKGROUND OF STUDY
Borrowing and returning books is key to library services. The advancement of
technology has also changed the evolution of library facilities from traditional to modern
services. Traditionally, library services require users to go through the borrowing and return
process in person, and records of borrowing and return are kept manually using paper. Later, a
borrowing method using self-check machines was turned into a more modern system.
There are some disadvantages to the use of conventional and existing systems and it
needs a lot of librarian participation. Traditionally, the service often wants its customers to
spend more time doing the borrowing and returning process. This causes users, especially
students, to be not interested in borrowing library books.
Therefore in order to solve the problems faced, a system is needed to handle the process
of borrowing and repayment. This is to assist librarians in simplifying their work. The main
aim of this system is to minimize librarians' participation in the process of returning and
borrowing books, as well as to reduce the time needed for students to borrow books.
5
1.2 PROBLEM STATEMENT
The book borrowing process starts manually, which students have to meet the library
staff and the record of book borrowing is also manually recorded using the computer. Then,
move on to the borrowing process by using a self-check machine to perform the borrowing
process. Therefore, there are some problems that arise when using previous methods.
The use of traditional approaches has created issues because if there are many students
at the time who want to borrow a book at the same time, students need to queue to do the book
borrowing process. Therefore, the other problem is the possibility of a damaged self-check
machine. If the machine is broken, students need to consult with librarians to manually conduct
the borrowing process. And this clearly increases the time taken for the students to perform the
book borrowing process.
6
1.3 OBJECTIVE
The following is a list of objectives for the system to be developed:
I. To analyze problems on the previous book borrowing method.
II. To design a book borrowing system using QR code.
III. To develop the system using secured web framework Laravel.
1.4 SCOPE
This system is limited to UniSZA students and the librarians only.
1. Students
First, students need to login to the system and register their student information such as
student name, matric number, and their study field. For the borrowing process, they just
need to choose the book they want to borrow and scan the QR code in/on the book.
Then, the popup will appear, listing the book details, the date of the book being
borrowed, and the date they need to return the book, the student details then they are
good to go. If they want to view their list of books that have been borrowed, they can
just go to the system and view it. They also can view the list of books that are available
in the library.
2. Librarians (Admin)
Librarians also need to login into the system as admin. Then, they can view the books
that have been borrowed by the students. They can also cancel and terminate the book
for the next borrowing process. For book availability, they also can add and update the
list of books and also checks the due date of books being borrowed.
7
1.5 THESIS STRUCTURE
This thesis is organized into four chapters which start with Chapter 1. It begins with an
introduction to the system that will be developed. Then, it will describe the problem statement,
objective, and then the scope of the system.
Chapter 2 shows a review of the literature review that explains the study relevant to the
current project carried out by the existing scheme. Furthermore, this chapter explains the
techniques/methods/equipment or technologies to be used in the project implementation.
In Chapter 3, it will provide a systematic model of application development
methodology and framework taken in the development of applications. This chapter also
includes methods, techniques or approaches to be used throughout the design and execution of
the project.
8
1.6 HARDWARE AND SOFTWARE REQUIREMENT
HARDWARE
TYPE OF HARDWARE DESCRIPTION
HP Laptop I. To do research that is related to the
project.
II. To write code for the system that will be
developed.
SOFTWARE
TYPE OF SOFTWARE DESCRIPTION
Myfik cloud/laravel To do the programming (coding).
MICROSOFT WORD To do the proposal.
DRAW.IO To produce a context diagram, data flow
diagram, entity relationship diagram.
GOOGLE CHROME To view the system that has been developed.
9
CHAPTER 2: LITERATURE REVIEW
2.1 INTRODUCTION
In a world that is growing and evolving with the advancement of technology, the use
of a computerized system is no longer a new thing to the users. The use of this technology is
to replace the use of paper that is inefficient, particularly to handle matters involving data
management. The distinctions between conventional methods of borrowing and a book
borrowing system using QR codes will be demonstrated in this literature review.
The new system would be introduced in order to replace the inefficiency and more time
consumption on the existing system. The purpose of developing this system is to minimize the
workload of librarians in the process of returning and borrowing books, as well as to reduce
the time required for book borrowing by students. The existence of this system will make it
easier for the librarian in order to manage and monitor the book borrowing process. For
students, it will reduce the time taken to perform the borrowing process.
This system will be implemented with the UniSZA Library System. So, it can only be
used by UniSZA students and librarians. With this system, they are allowed to scan the QR
code from the book to perform the borrowing process. They also can view the book that is
being borrowed. For the librarians, the hardware and software inventory and the borrower's list
can be viewed, updated, added, and deleted. Students and librarians can access this system
anytime, anywhere since it's a web-based application.
10
2.2 REVIEW OF CURRENT BORROWING METHOD
The borrowing and return system used today still requires the participation of librarians.
To perform the borrowing and return process, students need to go to the counter or they can
choose to do it from the self-check machine. Therefore, the approach explicitly needs the time
of both students and librarians.
In addition, if students want to check the availability of a book, they also need to go to
the counter to settle down. Such matters should be carried out during office hours only since
the involvement of librarians is needed. This will obviously give difficulties to students
especially to students at Besut campus.
In addition, the use of current approaches causes the inability of students who have
borrowed a book to recall the correct day to return the book. Failure to borrow the book on the
due date would result in a penalty for the student.
In brief, it obviously takes a lot of time to complete a borrowing process using this old
method. Students may also be less interested in borrowing books from the library because of
this.
11
2.3 COMPARISON WITH EXISTED/SIMILLAR SYSTEM
A library is expected to use different resources to keep up with the modern world. This section
presented similar works on widely used technologies in Programs for Library Management. A
fair amount of work on the Smart Library Management System (SLMS) has been published
and a brief section is given below. A summary of the most widely used technologies in
university libraries: barcodes and RFID.
2.3.1 BARCODE
A barcode is an Automated Identification Technology (Auto ID) piece that stores
information in real time. It is a series of vertical bars which encode numbers and letters in a
format that, by measuring the intensity of the reflected barcode light, can easily be retrieved
and interpreted by a reader.
In the computerised circulation system, one of the helpful implementations of the
barcode system is, in the computerised circulation scheme, the borrower shows his library card
and the book(s) to be borrowed before the counter assistant. The circulation assistant enters the
borrower's identification number through the keyboard and triggers the database record. It is
the computer programme that measures the return due date, finishes and makes book
reservations. The charging and discharging of books is a time-consuming procedure due to the
usual delivery system, as stamping of due dates and other data entry work must be carried out.
The QR code is more effective than a barcode. In both horizontal and vertical patterns,
it stores information. Far more details than a standard barcode can be held by QR codes. QR
codes often store a smaller region with larger data. In a library where big data needs to be
compressed for easy handling, these features are beneficial.
12
2.3.2 RFID
Radio frequency electromagnetic wave (RFID) technology is a type of technique for automated
contact-less data collection. As a library management system, RFID technology has many
elements: tags, a micro-controller, a reader and database applications. To identify the tags, the
readers are put in certain positions. RFID technology can distinguish tags over longer distances
than barcodes and can identify many tags at once. It can also be used for ID cards, making
purchases in libraries more effective than dealing with a barcode. High tag costs and time-
consuming implementation, however, are major disadvantages of this technology. As it avoids
the use of tags and scanners, the QR code is a tough competitor, saving a great amount of
money.
2.3.3 SIMILLAR SYSTEM THAT APPLY QR CODE
A QR code is a matrix barcode that can be read by cameras on smartphones and mobile
phones. A typical QR code uses four standardised encoding modes to efficiently store data:
numeric, alphanumeric, binary, and kanji. Far more details than a standard barcode can be held
by QR codes. A URL, a phone number, an SMS message, a V-card, or any text could be the
information encoded in a QR code. As they allow the content to be decoded at high speed, they
are referred to as QR. One of the disadvantages of this technology lies in the Reed Solomon
Code's ability to correct errors and to detect errors.
ATM transactions are one of the places where the QR code has become common. QR
codes are used to authenticate users for cardless transactions on ATMs and other secure
devices. These transactions operate on an external computer via an image code that is
displayed. Users then need a mobile device, usually supported by their banking application,
with a decoding feature. This feature decodes transaction information embedded in the picture
13
and enables a protected resource to be accessed. It transmits the mobile device's information
and identifier to the authentication system, granting access to the protected resource if the
authentication test is met by the transaction information and identifier.
2.4 PROPOSED SYSTEM
To solve the problems that occur among these students, a book borrowing system using
QR code needs to be implemented. This system has the ability to replace current methods where
its use is simpler and easier.
The aim of developing this system is to minimize the workload of librarians in the
process of returning and borrowing books, as well as to reduce the time required for book
borrowing by UniSZA students especially for students at Besut Campus. With this system,
students can perform the borrowing process properly without having problems with the time
taken. It also helps librarians to manage books, borrowing records properly. This system would
also provide borrowers with notice of the due date so students will no longer forget about the
day they should return the book.
Furthermore, the system also helps students to search the book they want first before
borrowing it. This would make things easier for students, so if others borrow the book they
want, they don't have to bother going to the library to find the book. It is also obvious that this
system will reduce the time for students to find and borrow books. This ensures that this system
can be accessed anytime and anywhere by students.
14
2.5 SUMMARY
In conclusion, the development of the Book Borrowing System Using QR code will
solve the problems encountered by students. The use of older methods is obviously inefficient
and causes inconvenience for students. Therefore, it is appropriate if this system is developed
to facilitate various parties.
15
CHAPTER 3: METHODOLOGY
3.1 CHOSEN METHODOLOGY
In a system development process, System Development Life Cycle (SDLC) plays an
important role before a system is developed. Having an SDLC in place is crucial as it helps to
turn the concept of a project into a practical and fully operational framework. SDLC deals with
process creation, change management, user interface, and regulations, in addition to covering
the technical aspects of system development. One systematic model of system development
has been chosen and will be discuss in this chapter.
16
3.2 APPLICATION OF CHOSEN METHODOLOGY
The suitable and appropriate approach for this system development that has been decide to use
Waterfall Model. Waterfall model also referred as linear-sequential life cycle model which it
is simple to understand and use. The entire process of software development is split into
different phases in "The Waterfall" approach. Usually, the result of one phase serves as the
input for the next phase sequentially in this Waterfall model.
Figure 1: WATERFALL MODEL
17
3.2.1 STAGE 1 – REQUIREMENT ANALYSIS
In this stage, all requirement of the proposed system are gathered. System requirements
like functional and non-functional requirements which are necessary for the system
development are included.
3.2.2 STAGE 2 – SYSTEM DESIGN
Project development begins here in the system design. Appropriate appearance and the
function that the system have must be stated and it should be the first things to be highlighted.
Database design also happen here where all the data element for the system are well assigned
and tables related to the system must be draft.
3.2.3 STAGE 3 – IMPLEMENTATION
In implementation stage, database that has been designed in design stage must be
created here. MYSQL will be use to create the database. The code to develop this project will
be written in PHP Language with Laravel framework.
3.2.4 STAGE 4 – TESTING
Testing shall take place once the system has been developed. After testing of each unit,
all the units built in the implementation process are incorporated into a system. The whole
system is tested for any faults and errors after integration.
3.2.5 STAGE 5 – DEPLOYMENT
After all the functional and non-functional testing are done, the system will be deployed
to the user environment.
18
3.2.6 STAGE 6 – MAINTENANCE
In this stage, it happens when there are some issues come up in the user environment
which need the developer to fix the issues. This will enhance the system to be a better system.
19
3.3 SYSTEM DESIGN
3.3.1 CONTEXT DIAGRAM (CD)
Figure 2: Context Diagram
Figure above shows the main process of the system. This system consists of 2 users which are
students and librarians. The main process for students, borrows books and the main process for
librarians are to view borrows report and book list report.
20
3.3.2 DATA FLOW DIAGRAM (DFD)
Figure 3: Data Flow Diagram for Students
Figure above shows the Data Flow Diagram for students.
1. Students register to the system. Students details are stored in table students in the database.
2. After doing the registration, the system will send registration confirmation to the students.
3. Next, students can search the books in the system before perform the borrowing process.
4. Books details that has been search will appear as search report to the students.
5. To perform the borrowing process, students need to scan QR Code on the book. Then the
borrowing process will be saved in borrows table in the database.
21
Figure 4: Data Flow Diagram for Librarians
Figure above shows the Data Flow Diagram for librarians.
1. Librarians can manage books by add, update, delete books details and it will be saved in table
books in the database.
2. Report of books can be generated from this process.
3. Librarians also can manage sections by add, update, delete sections details, the details are
stored in the sections table and a report will be generated.
4. Same goes to borrows, librarians can add, update, delete borrows details.
5. Borrows details are stored in the database. Then report are generated from this system.
22
3.3.3 ENTITY RELATIONSHIP DIAGRAM (ERD)
Figure 5: Entity Relationship Diagram
Entity Relationship Diagram displays the relationship of sets stored in database which explain
the logical structure of database. In this project, there are 5 tables in the database which are related to
each other.
23
3.3.4 PROOF OF CONCEPT/INTERFACE/PROTOTYPE
MAINPAGE
Figure 6: Main page interface
STUDENTS PAGE
Figure 7: Booklist interface
24
Figure 8: Borrow history interface
Figure 9: Scan interface
25
LIBRARIANS PAGE
Figure 10: Booklist interface
Figure 11: Borrows list interface
26
GANTT CHART
WEEK /
ACTIVITIES
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Final Year Project
Briefing
Project Title
Proposal
Proposal Writing
(Chapter 1 -
Introduction)
Proposal Writing
(Chapter 2 -
Literature Review)
Proposal Writing
(Continued)
Proposal Progress
Presentation
Methodology
Workshop
Proposal Writing
(Chapter 3 -
Methodology)
Proof of Concept
Format Writing
Workshop
Drafting Report of
Proposal
Final Presentation
Final Report &
LogBook
Submission
27
REFERENCES
1. NA, T. (2006). ONLINE BORROWING SYSTEM (Doctoral dissertation,
UNIVERSITY MALAYSIA SARAWAK).
2. Song, W. (2018). Analysis of New Library Borrowing and Returning Mode Based on
Book Transfer System.
3. Akeroyd, J., & Cox, A. (1999). Integrated library management systems:
overview. Vine.
4. Singh, A. (n.d.). Smart Library Management System using QR code. Retrieved
January 29, 2021, from https://portfolios.cs.earlham.edu/wp-
content/uploads/2019/12/Proposal_SLMS_adarsh.pdf
5. Singh, G., & Sharma, M. (n.d.). Barcode technology and its application in libraries
and Information centers Vol.1 No.1 Barcode technology and its application in
libraries and Information centers.
http://www.ijnglt.com/files/Barcode%20technology%20and%20its%20application%2
0in%20libraries%20and%20Information%20centers.pdf