Top Banner

of 14

Rfid for Modern Libraries

Nov 02, 2014




  • 1. Electronic Security system in Modern Libraries VUPPALA. LINGAIAH MA. M Phil., PGDLAN (P h D.) Research scholar &CHIEF LIBRARIAN K G REDDY COLLEGE OF ENGINEERING & TECHNOLOGY, , mob:09985554351

2. 2 Electronic Security system in Modern LibrariesVUPPALA. LINGAIAH MA. M Phil., PGDLAN (P h D.) Research scholar &CHIEF LIBRARIAN K G REDDY COLLEGE OF ENGINEERING & TECHNOLOGY, , mob:09985554351ABSTRACTThisPaperDiscussAboutTheApplication,Implementation Of Rfid Technology In Modern Libraries., The RfidTechnology Is ALatest Technology TodayMost Of The Libraries Adopting To Rfid TechnologyForTheir ServicesLike Stock Management , Check InCheck Out Theft Controlling. The Modern Libraries AreUsing This Technology Iit , Iim S , Central Universities 2 3. 3Repudiated Universities . The Rid Technology PlayingVital Role in Academic Environment ., the rapidadvances in information processing , storage andcommunication technologies have revolutionized thrroleof worldwide libraries in disseminatinginformation services to their users .KEY WORDS: Electronic Security, Rfid TechnologyIntroduction: RFID Technology is the Latest Technology to be used inlibrary for book identification, for self check out and for sorting and conveying of librarybooks and also for theft detection. The aim of using RFID Technology to increase theefficiency, reduce data entry errors and free up staff to perform more value addedfunctions.RFID is a combination of radio frequency based technology and micro chips in the tagsaffixed to library materials is read using radio frequency technology regardless of itemorientation or alignment (i.e., the technology does not require line of-sight or a fixedplane to read tags as do traditional theft detentions systems) and distance fro the item is3 4. 4not a critical factor except in the case of extra wide exit gates. The corridors of thebuilding exit can be as wide as four feet because the tags can be read at a distance of upto two feet by each of two parallel exit sensorsRapid advances in information processing, storage and communication technologies haverevolutionized the role of world wide libraries in disseminating information services totheir users. libraries are facing new challenges ,new competitors, new demands ,newexpectations and a variety of information services for reconsolidating their positions,redesigning their services, and information products ,incorporating new technologies,upgrading information resources ,training people ,changing information objects modesof communication and information delivery in order to add value to their services ,and tosatisfy the changing information needs of user communityThe technology playing vital role in the libraries now a day theft controlling is verychallenging part in the library the academic libraries have huge collection in universitylevelDEFINATIONS / origin OF RFID:Radio frequency identification Is a generic term that is used to describe that transmit theidentity of an object of person wirelessly, using radio waves .it is grouped under thebroad category of automatic identification technologies.RFID was introduced in the early 1980s for item tracking and access control applications.Tracking of materials is done using radio frequency baed technology combined withmicrochip technology, hence designated as RFID. These contact less and wirelessautomatic identification data capturing systems are highly effective in hostileenvironments such as , industry and logistics , textile and libraries ,where barcode labels4 5. 5cannot servive and need for inventory control and waste management . Owing to itsability to track moving objects RFID has been established it self in livestockidentification and automated vechele identification systems. in recent times , its use hasraised to track books , audio / video tapes and other multimedia collection in a library .After realizing the advantages of RFID technology libraries are considering it, the moreproductive tool for flow man agent sooner than barcodes and other identificationtechnologiesHistoryRFID technology was first used in World War II to differentiate between friendly andenemy aircraft. Over the years this technology has evolved and been applied to animaltracking and identification, speed pass lanes on toll roads, building security access, andfor electronic payment processing at gas stations. The basic components of any RFIDsystem include: TagsAlso called transponders, these can be either active with their own means of sending a signal, or passive, relying upon the tag reader to provide the power necessary to generate the response signal. The signal could be a simple identification number stored in a read-only tag or a complex data stream that includes additional data stored within the tags memory. These more complex tags could contain such data items as manufacture date, lot number, serial number, or even built-in sensors to track average storage temperatures or other data. 5 6. 6 Readersalso called interrogators, come in various configurations depending on the location, environment, and scanning area coverage required. A reader is used to identify all tags within its reception coverage area. Readers require some intelligence for aggregating and smoothing the tag data.Information transmitted from the tag can be interpreted by reading the data directly fromthe reader itself or through a softwarebased interface.RFID tags can come in numerous forms with different capabilities including: Key fobs (active read/write) Bulk metal tags (use-once, passive read-only) Garment disks (reusable, active read-only) Smart Card credit-cards with RFID tags embedded for storing personal information RFID nails that can be driven directly into palettes (passive read-only)Today every RFID implementation is different, and all RFID solutions have to evaluatevarious performances and cost factors including the operating environment, on-tagmemory storage, and signal transmission restrictions. Each of these issues has significantcost impacts on both tags and readers. In addition, RFID solutions in the market today aregenerally proprietary in nature and tags from one vendor cannot generally be read by areader from a different vendor. There are some limited RFID standards in place, but thesestandards are not globally accepted and some even conflict with RFID standards in othercountries. 6 7. 7Decades of RFID:Decade Event1940Radar refined and used, major World War II development effort. RFID invented1950 in 1948.1950 Early explorations of RFID technology, laboratory experiments.19601960 Development of the theory of RFID. Start of application field trials.19701970Explosion of RFID development. Tests of RFID accelerate. Very early adopter1980 implementations of RFID.1980 Commercial applications of RFID enter mainstream.19901990Emergence of standards. RFID widely deployed. RFID becomes a part of2000 everyday life.a The history of RFID, Association for Automatic Identification and Mobility, October2001, 7 8. 8R F I D in academic libraries:Radio Frequency Identification is a technology that facilitates non line of sightidentification of items. Basic elements of a comprehensive RFID System for library kindof environment are tags, readers & library management systemImplementing RFID system in libraries will aid tasks such as circulation, re shelving &theft detection, and it as several other important advantages.It can either replace or supplement existing library bar code system. When the costs oflabor taken into consideration for tasks such as check out , check -in , inventory holds,lists miss shelved items etc., RFID can prove to be very efficient when compared totraditional bar codes .The RFID Technology using academic Libraries in Hyderabad Central University,Moulana Azad National Urdu University, Hyderabad. And K G Reddy college ofEngineering & Technology Hyderabad. Academic institutions using this technology forlibrary services like house keeping operations theft controlling.IMPLIMENTATION OF RFID IN LIBRARIES:The RFID Management System in Libraries Can be implemented in following for ways 1. library Security System 2. Library circulation Counter 3. Self Check in and Check out 4. smart and quick inventory 8 9. 9 KEY COMPONETS OF RFIDSource: 9 10. 10LIBRARY SECURITY SYSTEM:The Library Security system through RFID can be ensured through Electronic ArticleSurveillance (EAC) Gate, which is the anti- theft part of the RFID Librarymanagement system using the same RFID tags embedded in the Library items . eachlane is able to track items of one meter or more would trigger the alarm system whenan unbar barrowed item passes through them .The alarm will sound and lights on the gate will flash as patron passes through withthe library material. The EAS anti theft gate has option to trigger a Camera to recordpatrons who trigger the alarm to the Surveillance Station. Theft detection is anintegral feature of the chip within the tag. It is a stand-alone technology, whichoperates independently of the library databases.Security Gate Theft Control 10 11. 11RFID Circulation Counter:RFID Counter System is a staff assisted station mainly to help to support librarycirculation functions such as issue, return, tagging, sorting of documents etc. TheCounter system is loaded with alarming and disalarming module, tagging module,sorting module. The library circulation staff puts the library materials on the readerand can view the information stored inside the tag and status of the EAS and performthe transaction function accordingly. There are also provisions for auto issues andreturn of library materials.Self Check in and Check OutThe self-check out station is basically a computer with a normally touch screen, abuilt in RFID reader and specia