Sie sind auf Seite 1von 10

IMPLEMENTATION OF LIBRARY MONITORING SYSTEM FOR SECURITY WITH

RFID TECHNOLOGY
Mohd Abdul Rahman *1, Ayesha Fatima*2, Zeenath*3
*1 PG Student Dept of ECE(Embedded system), Nawab shah Alam Khan College of Engineering and Technology
*2 Assistant Professor, Dept of ECE(Embedded system), Nawab shah Alam Khan College of Engineering and Technology
*3 Associate Professor,(HOD) Dept of ECE(Embedded system), Nawab shah Alam Khan College of Engineering and
Technology

Abstract: A library is a developing living being. As it develops in size the issues related with the support and security of the records additionally
develops. The analysts have dependably helped the bookkeeper in tackling their issues. To take care of the issues of looking records they have
given inventorying rules. Scanner tags have served the curators and libraries for quite a while, and now it is gradually getting supplanted by RFID.
Radio Frequency Identification (RFID) is another age of Auto Identification and Data gathering innovation which mechanizes business forms and
permits distinguishing proof of huge number of labeled articles like books, utilizing radio waves. RFID based Library Management System (LMS)
would permit quick exchange stream for the library and will demonstrate prompt and long haul advantages to library in discernibility and security.
The proposed framework depends on Ultra High Frequency(UHF) RFID perusers, upheld with reception apparatuses at entryway and exchange
areas, and library cards containing RFID-transponders which can electronically store data that can be perused/composed even without the physical
contact with the assistance of radio medium. This paper exhibits the innovation usage, includes, the trials led to set up RFID based LMS,
conceivable issues of RFID in Library.

Keywords: Library, RFID, LMS, UHF, RFID-transponders

RFID innovation [1] has existed since the mid 1940s


I. THE BACKGROUND TO RFID when it was utilized for military airplane distinguishing
TECHNOLOGY proof. Later high esteem merchandise stock control
applications were determined. In its initial business
The omnipresent standardized identification, for indications every thing to be labeled had a little electronic
example, diagrammatically depicted in Figure 1, has been get together (a transponder) fitted to it that would react with
utilized since the late 1960's as a printed methods for a burst of radio recurrence (RF) transporter adjusted
recognizing item classifications. The scanner tag distinguishing proof information when examined by a RF
framework was successfully institutionalized with the far motion (on an alternate recurrence) from either a hand-held
reaching appropriation in 1973, by clients and gear creators, scanner/peruser, or one mounted, state, in an entryway. This
of the Universal Product Code (UPC) 8 or 14 digit burst of distinguishing information was captured by the
symbology. From that point forward there have created scanner, decoded and used to both recognize the labeled
distinctive renditions of this standardized identification thing and for it to be checked. The early RFID labeling
innovation (EAN, JAN) enveloping 8 to 14 digit implies were battery controlled (purported dynamic
frameworks. gadgets). These were exorbitant, as well as generally
cumbersome. From that point forward RFID use, and
Standardized identification innovation keeps on playing potential, has significantly expanded in vast part because of
out a basic job in stock control and circulation, especially in the unit cost, size and power needs, of the basic 'tag' having
the purchaser item showcase part, however can be found diminished by numerous requests [2] [3] [8].
being used from vehicle make to library stock control.
Scanner tags require close filtering with an optical peruser,
much like the laser examining perusers found at most
general store checkouts.
A. Barcodes
• Are restricted to the information imprinted on them
and can't be refreshed, other than by substitution or
staying a mark over them (which might be work
Figure.1 Barcode
concentrated).
• Should be considerably fat for solid perusing. Subordinate upon the RFID innovation utilized RFID
memory does not need to be settled but rather might be
• Are ordinarily (however not generally) paper altered, broadened/added to, or even eradicated. As will be
names, or imprinted on paper based bundling, and seen RFID innovation will beat the restrictions of
along these lines inclined to harm. standardized identifications. Be that as it may, as with
• Typically provide inventory data to the level of scanner tags, to increase wide worldwide acknowledgment
product category. as the favored means for stock control frameworks there
• Are very unlikely to show through which should be open principles for their. Further if RFID
distribution depots and transport means the innovation is to wind up as omnipresent as standardized
product arrived at the point of sale. identifications in the conveyance chain, at that point the
unit cost of the 'tag' should be significantly as shabby as
the printed scanner tags. Apparently, a RFID tag may
never progress toward becoming as shoddy as the printed
standardized identification fused on the 'oat box
bundling', but since of RFID's focal points they may turn
into the favored stock control implies for customer
durables, and high esteem capital products and so forth
[6] [7].
over the signs got from the tag into advanced information
B. Key components of an RFID System and sends it to a PC. and sends it to a computer.
an essential RFID framework, four basic segments are
III TECHNICAL SPECIFICATION
required:
The venture utilizes Workabout Pro UHF RFID
• A transponder (tag) that is modified with data that handheld peruser fabricated by Psion Teklogix, working
interestingly distinguishes itself, therefore the idea of at 869.5 MHz. It has Windows Embedded CE 5.0 and
"programmed ID" full VGA, sunlight comprehensible touch screen show
and well spread out illuminated console [9]. This gadget
• A handset (peruser) to deal with radio correspondence is utilized for seeking Module. The task likewise utilizes
through the recieving wires and pass label data to the outside the Mercury4 RFID peruser produced by ThingMagic
world supporting four reception apparatuses, working at UHF
scopes of 865-870MHz, 902-928MHz and 950-956MHz
• An recieving wire connected to the peruser to speak [10]. The peruser underpins the exchange of information
with transponders to a remote PC over a system association. The peruser
do bolster label conventions of EPC Class 0, EPC Class
• A peruser interface layer, or middleware, which packs
a huge number of label signals into a solitary ID and
furthermore goes about as a course between the RFID
equipment components to the customer's application
programming frameworks, for example, stock, debt claims,
transportation, coordinations, etc

Figure.3. RFID Handheld Reader

Figure.4. RFID Reader

Figure.2. RFID system components

1. The tag is actuated when it goes through a radio


recurrence field, which has been created by a recieving wire
connected to a peruser.

2. The tag conveys a modified reaction.

3. The recieving wire that produced the field initially and


is joined to the peruser distinguishes that reaction.
A. RFID Tags utilized in the task are EPC worldwide
4. The handset (or peruser) sends the information to the Generation2 (Gen2) UHF uninvolved labels which have the
middleware. 96 bits memory for hexadecimal information stockpiling. It
works at Ultra High Frequency (850 MHz to 950 MHz)
5. The middleware sends the data contained in the labels extend.
to whatever frameworks require that data.
B. Reasons for choosing UHF in Library Application
II. HOW RFID WORKS UHF innovation was decided for library application
because of its long perused range, speed of recurrence and
Each RFID tag has a non-fueled radio reception minimal effort. The read scope of mercury 4 peruser is up
apparatus which can be imparted to by a controlled to 2 meters, which is adequate to screen the development of
recieving wire having a place with a label peruser on a books over the entryways. The read scope of psion-teklogix
scanner or security door. In spite of the fact that it isn't handheld peruser is up to 30 cms which will be helpful for
important that the two radio wires "see" each other as is finding a specific book in a rack. With the new EPC Global
required with a customary standardized tag, it is vital that Gen 2 standard, more than 1000 labels can be perused every
they be generally near each other since the wattage utilized second in applications where they are protected from RF
by the fueled recieving wire is low for wellbeing and clamor. UHF additionally has the choice to back off the
security reasons. read procedure to 100 labels for each second with high
The RFID peruser conveys electromagnetic waves and unwavering quality in RF boisterous applications. These
the label reception apparatus is empowered to get these advantages make the UHF innovation the perfect decision
waves. "At the point when the label reception apparatus for Library applications [11] [15].
enters the RF (radio recurrence) field, the label's microchip
circuits are controlled by signs from this RF field made by
the peruser. The chip at that point balances the waves and III. RFID TECHNOLOGY IN LIBRARIES
the tag sends them back to the peruser. The peruser changes
RFID (Radio Frequency IDentification) is the most recent
innovation to be utilized in library burglary discovery
frameworks. In contrast to EM (Electro-Mechanical) and RF
(Radio Frequency) frameworks, which have been utilized in
libraries for decadesRFID-based frameworks move past security
to wind up following frameworks that join security with
progressively productive following of materials all through the
library, including less demanding and quicker charge and
release, reviewing, and materials taking care of [4] [5].RFID is
a blend of radio-recurrence based innovation and microchip
innovation. The data contained on microchips in the labels
joined to library materials is perused utilizing radio recurrence
innovation paying little respect to thing introduction or Figure.5. Patron Card Process System
arrangement (i.e., the innovation does not require observable
pathway or a settled plane to peruse labels as do customary
2) Key Benefits:
burglary location frameworks) and separation from the thing is
anything but a basic factor aside from on account of additional • Double Side Card Printing will set administrator print supporter
wide leave doors. The hallways at the building exit(s) can be as card without changing side of card.
wide as four feet in light of the fact that the labels can be
• Library can make benefactor card in fast path and without
perused at a separation of up to two feet by every one of two
supporter to bring their very own photograph.
parallel leave sensors. The objectives utilized in RFID
frameworks can supplant both EM or RF burglary location • It is most ideal approach to serve benefactor.
targets and standardized tags.
• Connect to Integrated Library System Directly (this choice rely
IV.FEATURES OF RFID LIBRARY MANAGEMENT upon ILS/LMS framework)
[14].Check out / in Station (Counter Station)
The Counter Station is a staff helped station on
administrations, for example, advance, return, labeling,
arranging and so on. It is stacked with
equipping/incapacitating module, labeling module and
arranging module. Equipping/Disarming module permits
EAS (Electronic Article Surveillance) bit inside the tag of
the library material to be set/reset in order to trigger/not
trigger the caution of the EAS entryway. Checking of EAS
status of library material is simple. The staff puts the thing
on the peruser and tap on the view to show the data put
away inside the tag and status of EAS. There are
additionally highlight of Auto Arming and Auto Disarm.

Figure.6. Counter Station

A. Tagging or Patron Card Process System

1) Components: Together with dissemination module from Library


1. Card Printer (Double Side printing) Management System Software, this station is utilized for the
2. Digital Webcam & Tripod accompanying administrations:
3. Mid Range RFID Reader/Writer • Editing and refreshing of benefactor's record
4. Capture, Edit & Printing Software • Add and erasing of patron’s record
5. Price not include PC & Monitor • Generate advance history for a specific benefactor
• Managing of fines incurred by the patron
• Arm/Disarm of EAS bit inside the library material
• Program of new library material
• Sort item in accordance to their branch and
category number
• The features of this station depend on the
module loaded by the Library Management
Software.
1) Key Benefits: o Easy to use: books can be read in any
• Provide the best price-effective Customer Service orientation
instead of manual daily routine
o Reduces queuing time
• Perform media check-in/-out for those patrons who o Provides patron privacy
choose not to use the self service system o Encourages patrons to come back

• Help patron that need assistance from the staff D. Anti-theft Detection
The RFID EAS Gates is the counter robbery part of the
C. Self Check out / in Station Library RFID Management System utilizing the
The Patron Self Check-out station is fundamentally a PC with a equivalent RFID labels installed in the library things.
touch screen and an inherent RFID peruser, in addition to Every path can follow things of around 1 meter and
uncommon programming for individual recognizable proof, would trigger the caution framework when an un-
book and other media dealing with and course. Subsequent to obtained thing went through them. The caution will
recognizing the supporter with a library ID card, a scanner tag sound and lights on the door will streak as benefactor
card, or his own ID number (PIN), the benefactor is requested to goes through with the un-obtained library material. The
pick the following activity (registration of one or a few books). EAS Anti-Theft Gates is utilized to distinguish RFID
In the wake of picking registration , the supporter puts the label that is outfitted with EAS (Electronic Article
book(s) before the screen on the RFID peruser and the Surveillance). It can distinguish the RFID labels inside 1
presentation will demonstrate the book title and its ID number meter extend without impedance of attractive things,
(other discretionary data can be appeared wanted) which have
after recognizing of Armed RFID labels, the caution will
been looked at [12] [13].
sound on the entryway. It has choice to trigger a Camera
to record supporters who trigger the alert to the
Surveillance Station.

Figure.7. Self Check out / in Station


Figure.8. Anti-theft Detection System
1) The benefactor at that point affirms that he has
completed the registration procedure and a receipt is Theft detection is an integral feature of the chip within
printed, demonstrating which books have been obtained the tag. It is a stand-alone technology, which operates
and the arrival date. The RFID tag in the book is independently of the library database.
determined to calm thus no alert will go off at the EAS
1) Features:
entryways. It is likewise conceivable to utilize the
station for Check (consequently) of books. For this • Detect EAS Armed RFID tags
situation the supporter recognizes herself, picks return • Multi-item detection
• Able to integrate camera with the gate (Option)
and afterward puts one book or a heap of books onto the
• Gale to integrate with Surveillance Station
peruser. She will get a receipt. In the event that the (Option)
books were to be taken through the entryway now, an
alert would sound. One essential point for library 2) Key Benefits:
profitability is that the entire procedure is altogether less • Single technology is required for both inventory
tedious than with standardized tag and attractive strip and theft management of the library.
framework; accordingly long queues are maintained a • Library staff is alerted immediately when un-
strategic distance from and less stations are required for borrowed items pass through the theft detection
gates.
a similar procedure.
• Would-be thieves are deterred by the physical
2) Key Benefits: presence of the gates.
1. To Librarian:
o Speeds up book check-in / check-out • Number of patrons passing through the gates is
o Frees staff to better service patrons captured by a counter on the gates Alarm volume
o Better space planning can be easily controlled.
o Increases membership rate E. Book-Drop (Return Station)
2. To Patrons: The Book Drops can be found anyplace, inside or outside the
library. Conceivable remote areas outside the library incorporate The Shelf Management Solution makes locating and
MRT/train stations, strip malls, schools; etc. This offers identifying items on the shelves an easy task for librarians. It
extraordinary adaptability and accommodation of returning comprises basically of a portable scanner and a base station
library things at whenever of the day, notwithstanding when the [16].
library is shut. The solution is designed to cover three main requirements:
• Search for individual books requested
• Inventory check of the whole library stock
• Search for books which are miss-helved
1) Every one of these capacities are performed by clearing the
versatile scanner over the spines of the books on the racks to
accumulate their characters. In a stock check circumstance,
the characters gathered are contrasted and the database and a
disparity report could be produced. In circumstances when
look work is required, regardless of whether for a specific
thing or a thing classification, the data is first gone into the
versatile scanner from the base station, and when a remote
thing is found on the racks, an inherent beeper sound to
alarm the curators.
2) Key Benefits:
(a) Changes inventory process:
Figure.9. Book Drop
• No more book handling: just pass the reader
across shelved books to perform an instant
Supporter embeds the library thing into the space. The peruser inventory.
catches the electronic mark and sends to backend framework for • Accuracy: book identification numbers are
credit dropping. Benefactor is recognized by blaring sound and registered in the Shelf-Management Reader.
electric lamp. Supporter's record is refreshed promptly. This is The data is then downloaded to the central
conceivable because of the consistent connection between database.
Library RFID Management System and the host PC framework. • The fastest inventory you have ever made: 20
All things considered, clients who have achieved their credit books per second.
standard can begin acquiring things once they have returned • Notification: books to be pulled are up-loaded
them through the Book Drop. to the reader for quick identification.
(b) User friendly:
• Light weight
• Wand allows easy reading of high and low
shelves
(c) Saves time and resources:
• Implementers indicate a 75% reduction in
human resources required for shelf
management activities.

Figure.10. Return Station

1) Key Benefits:
• The ability to return books during off hours.
• Loans for the returned items will be instantaneously
cancelled so that patron may immediately borrow
again.
• Curators can apportion more opportunity to client Figure.11.RFID Scanner
benefit, as they are free from the work concentrated
advance abrogation action related with standardized
identification framework. V. RFID INTEGRATION MODULES
• Display the return status and printing receipt. So as to furnish RFID mix with LMS, three modules in
• The design of the Book Drops is such that items particular - Transaction Module, Monitoring Module and
cannot be retrieved back once deposited.
Searching Module were produced. Their functionalities are
F. Shelf Management System depicted beneath.
A. Transaction Module book no, book name, writer name and distributer name.

Figure.12. Interaction of Transaction Module

The association of exchange module is given in (fig. Figure.14. Interaction of Searching Module
12).The RFID interface is given in the exchange frames like
In the event that the book no. is straightforwardly given
issue, reissue, return and fine status shapes. The Manual
as a seeking parameter, the customer s/w will begin finding
intercession is limited as the programmed recognizable proof the book quickly. The blare sound will be given when the
of books and library individuals will be accomplished in light specific book is recognized. On the off chance that different
of RFID. The books and worker ID cards ought to be set parameters like book name, writer name and distributer
close to the recieving wire. The labels will be checked by the names are given as a looking condition, at that point the
peruser and the book id and the worker id will be transmitted customer s/w speaks with the server program to get the
to the s/w module running in the custodian's PC and which required book id from database by coordinating those
thus will store the exchange data in database with timestamp. parameters. On the off chance that more than one book, are
fulfilling the inquiry condition, the curator will be
B. Monitoring Module requested to choose a specific book among those books.
The Monitoring System (fig.13) will be introduced at the The principle advantage is that books can be checked
entryways of the library to screen the approaching/active rapidly utilizing a handheld peruser, lessening the stocktaking
packs persistently. The System will speak with the Mercury 4 time from weeks to a large portion of multi day.
RFID peruser through attachment utilizing RQL. The peruser
examines the RFID labels joined with the books and library VI. EXPERIMENTS ON POSITION OF TAGS
part cards and will send the label IDs to the checking IN BOOKS
framework which thus will spare that data in database with
timestamp. The framework separates the book IDs and library
A. The principle thought process of utilizing RFID innovation
part IDs by checking the organization of the ID esteem. There
is to diminish the time utilization of each undertaking and to
is a moment show framework which will constantly show the
get 100% lucidness of labels. To accomplish this, best label
development of approaching/active books/library-individuals.
position must be recognized to ensure that none of the labels
The System alerts the curators at whatever point there is a
gets bargained with peruser as far as getting covered up by
development at the entryways without earlier issue.
the human body while conveying the books. Thus,
extraordinary label positions have been thought about and
have been checked for its intelligibility. Despite the fact that
there are a few alternatives to trade off the peruser by
concealing the label purposely utilizing aluminum material
or any sort of metals and so on., our thought process is to
augment the clarity of labels in ordinary conditions.
Distinctive conceivable label positions in a book are shown
in figure15.
B. Test results of Monitoring Module

Test size of 60 books of various sizes was taken and checked


Figure.13. Interaction of Monitoring Module with all the label positions in the earth of single reception
apparatus kept at the stature of 1.5 meters from the beginning.
C. Searching Module Reenactment test was led to discover the level of books
identified by RFID peruser when individuals were made to move
The connection of seeking module is given in fig.14.
When a client has found an asset inside the list, they should by holding the books in various routes over the entryways.
then use navigational direction to recover the asset
physically; a procedure that might be helped through RFID The result is as shown in the table I.
labeling. Utilizing RFID labels to follow library books
could build security and simplicity difficult stock takes. The
RFID label connected with the books contains the book
number. The books will be sought with the assistance of the
RFID handheld books will be looked with the
assistance of the peruser utilizing any of the parameters like
TABLE.I 5 60 80 65
TAG POSITION - MONITORING MODULE 6 60 77 65
7 60 87 87
Tag Total Read% Avg. Distance
8 60 55 70
Position Books (Cms)
9 60 40 60
1 60 63 86
2 60 77 76
3 60 85 91
4 60 65 71

Figure.15. Different Tag Positions


At the point when same
test was led with 2 radio
wires at the opposite
sides of the entryway,
100% recognition was
found for the label
position - 7, and 98%
identification was found
for the label position-3,
both with the normal
greatest read separation
of 1.5 meters. The
execution of the product
has been tuned to peruse
the labels inside 2
seconds which is the
time ordinarily
individuals take to cross
the 1.5 meters separate
in library.
C. Test results of
Searching Module
The books of various
sizes kept in 8 racks
have been checked
with the distinctive
label positions to
discover the level of
labels identified by
the handheld peruser.
The outcome is as
appeared in the table-
II
The outcomes
demonstrated that label
position 1, 2, 5 and 9
gave most extreme level
of 92%, 90%, 89% and
96% individually. Be that
as it may, these positions
didn't hold useful for the
checking module as these
positions are inclined to
be covered up by human
hand or body while
conveying the books in
the entryway locale of
library. In view of
composite outcomes from
Table I and Table II, Tag
position 7 is
distinguished for the last
organization of the task.
RFID labels will be stuck
in all books in this
position.

TABLE.II Tag Total Read%


TAG
Position Books
POSITION - 1 100 92
SEARCHING 2 100 90
MODULE 3 100 76
4 100 56
5 100 89
6 100 86
7 100 88
8 100 67
9 100 96
VII. POSSIBLE PROBLEMS IX. REFERENCES
RFID innovation will persistently speak with the library [1] J. Bohn, “Prototypical implementation of location-
database, the genuine peril of consolidating this innovation aware services based on a middleware architecture for
is in letting secure coordinated library framework (ILS) super-distributed RFID tag infrastructures”, Pers
database be reached/refreshed/opened a few times and Ubiquit computing, (2008) Journal 12:155-166.
along these lines make them inclined to programmers [3]. [2] Klaus Finkenzeller, “RFID Handbook, 2nd Edn” -
A portion of the innovative issues that may happen with translated by Rachel Warrington. John Wiley, 2003.
RFID applications in libraries are: [3] Steve Lewis, “A Basic introduction to RFID
Technology and its use in the supply Chain”. White
• RFID labels are not covered up since these labels paper by LARAN RFID Jan 2004.
are ordinarily appended to within back cover and [4] RFID in Libraries site at
are presented to vandalism. http://www.libraryrfid.net/wordpress/index.php?cat=6
• Some impedance from metallic material in book [5] “RFID for Libraries” at URL: http://www.biblio-
spreads, CDs and DVDs does happen and label tech.com/html/rfid.html.
perusing may not be right. [6] “RFID Survival” at URL:
• RFID labels are anything but difficult to shield from http://www.rfidsurvival.com/contact.html
perusers by standard aluminum thwarts and may [7] Karen Coyle, “Management of RFID in Libraries” ,
not effectively be hostile to robbery devices. Preprint version of article published in the Journal of
• RFID perusing exactness decreases if numerous Academic Librarianship, v. 31, n. 5, pp. 486-489
things are perused at the same time. [8] www.wikipedia.org - Library
• RFID reader range depends on its power and [9] Psion Teklogix handheld reader manual –
antenna size. www.psionteklogix.com
[10] Mercury 4 RFID reader manual – www.thingmagic.com
Notwithstanding these specialized issues, there might be
different challenges in executing RFID frameworks in [11] UHF RFID – Libraries taking the next step into the
libraries. A portion of these are: future – www.Adilam.com.
• Privacy issues. [12] “RFID Library” at http://www.rfid-
• Forward (future) similarity and between library library.com/en/default_e.html
tasks because of contrasts in labels or
programming.
• Limitations in reorganization of library spaces. Authors Profile
• Metal shelves may hinder operations of readers and
sensors.
Mr. Mohd Abdul Rahman, M.Tech student in
• Operational challenges, for example, establishment
of return chutes, arrangement of intensity supply Embedded System from Nawab Shah Alam Khan
close to oneself registration/registration work areas College Of Engineering & Technology, Hyderabad.
or chutes.
• Spending confinements for innovation upgradation
as RFID labels are more costly than scanner tags Ms. Ayesha Fatima ,ASSISTANT PROFESSOR
and security strips. Dept. of Electronics and Communication
Engineering From Nawab Shah Alam Khan
VIII. CONCLUSION College Of Engineering & Technology, Hyderabad.
Supporter fulfillment has turned into a critical issue for
curators. Despite the fact that the one of a kind preferences
Ms. ZEENATH received M.Tech in Digital
and adaptability of RFID is the uplifting news, the innovation Systems and Computer Electronics (DSCE)
is still not yet generally comprehended or introduced in the Engineering from Asifia College of Engineering
library condition. RFID, its application, institutionalization, and Technology JNTUH University & B.Tech ECE
and development are continually evolving. Its appropriation is
still moderately new and consequently there are numerous
from Shadan Womens College Of Engineering &
highlights of the innovation that are not surely knew by the Technology. Presently She is an Associate
general masses. Advancements in RFID innovation keep on Professor and HOD in Department of Electronics
yielding bigger memory limits, more extensive perusing and Communication Engineering From Nawab
ranges, and quicker preparing. RFID is expanding in
prevalence among libraries, as the early adopters of this Shah Alam Khan College Of Engineering &
innovation have appeared, it bodes well, both for substantial Technology(NSAKCET) Malakpet, Hyderabad.
and little libraries. Her interests include Digital Image Processing. She
has contributed many technical papers in
International Journals and Conferences.

Das könnte Ihnen auch gefallen