SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
( Word to PDF Converter - Unregistered )

                    http://www.Word-to-PDF-Converter.net




  Application, Implementation & Development of RFID

 (Radio Frequency Identification) Technology in Modern

                               Libraries


                          Dr. M. ANJAIAH

                             Assistant Professor

                            Dravidian University

                           Kuppam, A. P, India

                           anjaiahlib@gmail.com


                 VUPPALA. LINGAIAH
                       MA. M Phil., PGDLAN (P h D.)

                             Research scholar &

                            CHIEF LIBRARIAN

 K G REDDY COLLEGE OF ENGINEERING & TECHNOLOGY, HYDERABAD

lingaiahphd@gmail.com ,lingaiahlib@yahoo.co.in www.kgr.ac.in mob:09985554351
ABSTRACT

This Paper Discuss About                   The Application , Implementation

Of   Rfid      Technology             In       Modern    Libraries        .,   The    Rfid

Technology Is A               Latest Technology Today Most Of The

Libraries Adopting To Rfid Technology For Their Services

Like     Stock      Management             ,   Check     In   Check       Out        Theft

Controlling.           The          Modern        Libraries         Are     Using      This

Technology Iit , Iim S , Central Universities                              Repudiated

Universities . The Rid Technology Playing Vital Role in

Academic Environment ., the rapid advances in information

processing , storage and communication technologies have

revolutionized              thr role of world wide                        libraries in

disseminating information services to their users .




KEY WORDS : Rfid, modern academic Libraries ,

Implementation




Introduction: RFID Technology is the Latest Technology to be used in

library for book identification, for self check out and for sorting and conveying of library
books and also for theft detection. The aim of using RFID Technology to increase the

efficiency, reduce data entry errors and free up staff to perform more value added

functions.

RFID is a combination of radio frequency based technology and micro chips in the tags

affixed to library materials is read using radio frequency technology regardless of item

orientation or alignment (i.e., the technology does not require line –of-sight or a fixed

plane to read tags as do traditional theft detentions systems) and distance fro the item is

not a critical factor except in the case of extra wide exit gates. The corridors of the

building exit can be as wide as four feet because the tags can be read at a distance of up to

two feet by each of two parallel exit sensors

Rapid advances in information processing, storage and communication technologies have

revolutionized the role of world wide libraries in disseminating information services to

their users. libraries are facing new challenges ,new competitors, new demands ,new

expectations and a variety of information services for reconsolidating their positions

,redesigning their services, and information products ,incorporating new technologies

,upgrading information resources ,training people ,changing information objects modes

of communication and information delivery in order to add value to their services ,and to

satisfy the changing information needs of user community

The technology playing vital role in the libraries now a day theft controlling is very

challenging part in the library the academic libraries have huge collection in university level



DEFINATIONS / origin OF RFID:
Radio frequency identification Is a generic term that is used to describe that transmit the

identity of an object of person wirelessly, using radio waves .it is grouped under the broad

category of automatic identification technologies.

RFID was introduced in the early 1980s for item tracking and access control applications.

Tracking of materials is done using radio frequency baed technology combined with

microchip technology, hence designated as RFID. These contact less and wireless

automatic identification data capturing systems are highly effective in hostile environments

such as , industry and logistics , textile and libraries ,where barcode labels cannot servive

and need for inventory control and waste management . Owing to its ability to track

moving objects RFID has been established it self in livestock identification and automated

vechele identification systems. in recent times , its use has raised to track books , audio /

video tapes and other multimedia collection in a library . After realizing the advantages of

RFID technology libraries are considering it, the more productive tool for flow man agent

sooner than barcodes and other identification technologies




History
RFID technology was first used in World War II to differentiate between friendly and

enemy aircraft. Over the years this technology has evolved and been applied to animal

tracking and identification, speed pass lanes on toll roads, building security access, and for

electronic payment processing at gas stations. The basic components of any RFID system

include:
Tags—Also called transponders, these can be either active with their own means

       of sending a signal, or passive, relying upon the tag reader to provide the power

       necessary to generate the response signal. The signal could be a simple

       identification number stored in a read-only tag or a complex data stream that

       includes additional data stored within the tag's memory. These more complex tags

       could contain such data items as manufacture date, lot number, serial number, or

       even built-in sensors to track average storage temperatures or other data.


       Readers—also called interrogators, come in various configurations depending on

       the location, environment, and scanning area coverage required. A reader is used

       to identify all tags within its reception coverage area. Readers require some

       intelligence for aggregating and smoothing the tag data.


Information transmitted from the tag can be interpreted by reading the data directly from

the reader itself or through a software–based interface.


RFID tags can come in numerous forms with different capabilities including:


       Key fobs (active read/write)


       Bulk metal tags (use-once, passive read-only)


       Garment disks (reusable, active read-only)


       Smart Card credit-cards with RFID tags embedded for storing personal

       information
RFID nails that can be driven directly into palettes (passive read-only)


Today every RFID implementation is different, and all RFID solutions have to evaluate

various performances and cost factors including the operating environment, on-tag

memory storage, and signal transmission restrictions. Each of these issues has significant

cost impacts on both tags and readers. In addition, RFID solutions in the market today are

generally proprietary in nature and tags from one vendor cannot generally be read by a

reader from a different vendor. There are some limited RFID standards in place, but these

standards are not globally accepted and some even conflict with RFID standards in other

countries.


Decades of RFID:


Decade       Event

1940–195     Radar refined and used, major World War II development effort. RFID invented in
0            1948.

1950–196
             Early explorations of RFID technology, laboratory experiments.
0

1960–197
             Development of the theory of RFID. Start of application field trials.
0

1970–198     Explosion of RFID development. Tests of RFID accelerate. Very early adopter
0            implementations of RFID.

1980–199
             Commercial applications of RFID enter mainstream.
0

1990–200     Emergence of standards. RFID widely deployed. RFID becomes a part of
0            everyday life.
a The history of RFID, Association for Automatic Identification and Mobility, October
2001, http://www.aimglobal.org.
R F I D in academic libraries:
Radio Frequency Identification is a technology that facilitates non line of sight

identification of items. Basic elements of a comprehensive RFID System for library kind of

environment are tags, readers & library management system

Implementing RFID system in libraries will aid tasks such as circulation, re – shelving &

theft detection, and it as several other important advantages.

It can either replace or supplement existing library bar code system. When the costs of

labor taken into consideration for tasks such as check out , check -in , inventory holds

,lists miss shelved items etc., RFID can prove to be very efficient when compared to

traditional bar codes .

The RFID Technology using academic Libraries in Hyderabad Central University,

Moulana Azad National Urdu University, Hyderabad. And K G Reddy college of

Engineering & Technology Hyderabad. Academic institutions using this technology for

library services like house keeping operations theft controlling.

IMPLIMENTATION OF RFID IN LIBRARIES:

The RFID Management System in Libraries Can be implemented in following for ways

    1. library Security System

    2. Library circulation Counter

    3. Self Check in and Check out

    4. smart and quick inventory
KEY COMPONETS OF RFID

Source: www.rfid-Library.com
LIBRARY SECURITY SYSTEM:

The Library Security system through RFID can be ensured through Electronic Article

Surveillance (EAC) Gate, which is the anti- theft part of the RFID Library

management system using the same RFID tags embedded in the Library items . each

lane is able to track items of one meter or more would trigger the alarm system when

an unbar barrowed item passes through them .

The alarm will sound and lights on the gate will flash as patron passes through with the

library material. The EAS anti theft gate has option to trigger a Camera to record

patrons who trigger the alarm to the Surveillance Station. Theft detection is an

integral feature of the chip within the tag. It is a stand-alone technology, which

operates independently of the library databases.



                                                           Security Gate Theft

                                                           Control




RFID Circulation Counter:

RFID Counter System is a staff assisted station mainly to help to support library

circulation functions such as issue, return, tagging, sorting of documents etc. The

Counter system is loaded with alarming and disalarming module, tagging module,
sorting module. The library circulation staff puts the library materials on the reader

and can view the information stored inside the tag and status of the EAS and perform

the transaction function accordingly. There are also provisions for auto issues and

return of library materials.

Self Check in and Check Out

The self-check out station is basically a computer with a normally touch screen, a built

in RFID reader and special software for personal identification and material

identification. During self-check out, the user first is asked to identify with a library

ID Card, a barcode card or his personal ID number (PIN). Then he/she is asked to

choose next action i.e check out of one or more books.

After choosing check out the next step which is to place the book in front of the

screen on the RFID reader and the display will show the book title and its ID number

which have been check out. After confirmation by the user the check out process is

finished and a receipt is printed showing which books have been borrowed and the due

date. The same time the RFID tag in the book is set on quite so that no alarm will go

off at the EAS gate. Thee process is same as in case return of books. But after return

the RFID tag is reset: if the books are taken through the gate, an alarm will sound.

The main benefit of the self check out/and c heck in system is increase in library

productivity

Book Drop.
This is specifically meant for self-check in of library materials. The Book Drops can

be located anywhere, within or outside the library. This offers unprecedented

flexibility and convenience of returning library materials at anytime of the day even

when library is closed. In this process, the user inserts the library materials into the

book drop and the RFID reader captures the electronic signatures and sends backend

system for loan cancellation. The check in is acknowledged by beeping sound and

flashlight. The users” transaction record is updated immediately. The design of the

Book Drops is such that items cannot be retrieved back once deposited.




Smart and Quick Inventory

The smart and quick inventory system helps in locating and identifying library

materials on the shelves, which make the inventory tasks easy for library professionals.

It basically comprises a portable scanner and a base station. The primary functions

performed by this system are search for individual books requested, inventory check of

the whole library stock and stock rectification.

These functions are performed by sweeping the portable scanner across the spines of

the books on the shelves to gather information on them. In an inventory check

situation, this information is compared with the database and a discrepancy reported is

generated. In situation where search for a particular item is required the information is

first entered into the portable scanner of the base station. When a mismatch item is

found on the shelves a beep sound alerts the librarian. /
Communication Flow, Protocols & Standards :




Re

vie

w

of

Lit

era

tur

e:

Literature is the basic foundation of any subject .It presents a record of achievements of

human race. Today, literature is diverse, complex and multilingual in nature. Knowledge

about Literature Is Diverse, Complex and Multi Lingual in Nature, Knowledge about

literature is a prerequisite for conducting meaning full information search or literature
search and doing fulfill research in any field of discourse . Hence, it necessary for a user to

have a basic knowledge about literature ,regarding method of organization of information

, various type of search methods , search strategies etc., available for effective

information search.

Objectives of the Study:

For the present study, the fallowing objectives are made:

   1. to know the application of RFID in libraries

   2. to know the Implementation of RFID in academic libraries

   3. to examine the RFID university libraries in Andhra Pradesh

   4. to know the development of the RFID Technology

   5.   Careful investigation of Library Automation with RFID in libraries services

   6. to find out the library services ( Theft Control ) through RFID

   7. the contractive Suggestions are made




REFERENCES / BIBLIOGRAPHY:

1 Finkenzeller, Klaus RFID Hand Book 2nd ed.

2 T Nagaseshulu applications of RFID Technology in Academic Libraries (management

of E resources in Academic libraries)
3 Cooney Elaine M, The complete review of RFID Cengage Publications

4., Dr. Dibyendu Paul : RFID Technology is the Revolution in Library automation System

:

5. www.rfid-Library.com

6. Vuppala Lingaiah, implementation of RFID technology in Libraries Project Report

submitted for Refresher Course on Library Automation & Digitization Conducted by UGC

– ASC JNT University Hyderabad

Weitere ähnliche Inhalte

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Empfohlen (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Application Implimentation of RFID Technology Modern Libraries

  • 1. ( Word to PDF Converter - Unregistered ) http://www.Word-to-PDF-Converter.net Application, Implementation & Development of RFID (Radio Frequency Identification) Technology in Modern Libraries Dr. M. ANJAIAH Assistant Professor Dravidian University Kuppam, A. P, India anjaiahlib@gmail.com VUPPALA. LINGAIAH MA. M Phil., PGDLAN (P h D.) Research scholar & CHIEF LIBRARIAN K G REDDY COLLEGE OF ENGINEERING & TECHNOLOGY, HYDERABAD lingaiahphd@gmail.com ,lingaiahlib@yahoo.co.in www.kgr.ac.in mob:09985554351
  • 2. ABSTRACT This Paper Discuss About The Application , Implementation Of Rfid Technology In Modern Libraries ., The Rfid Technology Is A Latest Technology Today Most Of The Libraries Adopting To Rfid Technology For Their Services Like Stock Management , Check In Check Out Theft Controlling. The Modern Libraries Are Using This Technology Iit , Iim S , Central Universities Repudiated Universities . The Rid Technology Playing Vital Role in Academic Environment ., the rapid advances in information processing , storage and communication technologies have revolutionized thr role of world wide libraries in disseminating information services to their users . KEY WORDS : Rfid, modern academic Libraries , Implementation Introduction: RFID Technology is the Latest Technology to be used in library for book identification, for self check out and for sorting and conveying of library
  • 3. books and also for theft detection. The aim of using RFID Technology to increase the efficiency, reduce data entry errors and free up staff to perform more value added functions. RFID is a combination of radio frequency based technology and micro chips in the tags affixed to library materials is read using radio frequency technology regardless of item orientation or alignment (i.e., the technology does not require line –of-sight or a fixed plane to read tags as do traditional theft detentions systems) and distance fro the item is not a critical factor except in the case of extra wide exit gates. The corridors of the building exit can be as wide as four feet because the tags can be read at a distance of up to two feet by each of two parallel exit sensors Rapid advances in information processing, storage and communication technologies have revolutionized the role of world wide libraries in disseminating information services to their users. libraries are facing new challenges ,new competitors, new demands ,new expectations and a variety of information services for reconsolidating their positions ,redesigning their services, and information products ,incorporating new technologies ,upgrading information resources ,training people ,changing information objects modes of communication and information delivery in order to add value to their services ,and to satisfy the changing information needs of user community The technology playing vital role in the libraries now a day theft controlling is very challenging part in the library the academic libraries have huge collection in university level DEFINATIONS / origin OF RFID:
  • 4. Radio frequency identification Is a generic term that is used to describe that transmit the identity of an object of person wirelessly, using radio waves .it is grouped under the broad category of automatic identification technologies. RFID was introduced in the early 1980s for item tracking and access control applications. Tracking of materials is done using radio frequency baed technology combined with microchip technology, hence designated as RFID. These contact less and wireless automatic identification data capturing systems are highly effective in hostile environments such as , industry and logistics , textile and libraries ,where barcode labels cannot servive and need for inventory control and waste management . Owing to its ability to track moving objects RFID has been established it self in livestock identification and automated vechele identification systems. in recent times , its use has raised to track books , audio / video tapes and other multimedia collection in a library . After realizing the advantages of RFID technology libraries are considering it, the more productive tool for flow man agent sooner than barcodes and other identification technologies History RFID technology was first used in World War II to differentiate between friendly and enemy aircraft. Over the years this technology has evolved and been applied to animal tracking and identification, speed pass lanes on toll roads, building security access, and for electronic payment processing at gas stations. The basic components of any RFID system include:
  • 5. Tags—Also called transponders, these can be either active with their own means of sending a signal, or passive, relying upon the tag reader to provide the power necessary to generate the response signal. The signal could be a simple identification number stored in a read-only tag or a complex data stream that includes additional data stored within the tag's memory. These more complex tags could contain such data items as manufacture date, lot number, serial number, or even built-in sensors to track average storage temperatures or other data. Readers—also called interrogators, come in various configurations depending on the location, environment, and scanning area coverage required. A reader is used to identify all tags within its reception coverage area. Readers require some intelligence for aggregating and smoothing the tag data. Information transmitted from the tag can be interpreted by reading the data directly from the reader itself or through a software–based interface. RFID tags can come in numerous forms with different capabilities including: Key fobs (active read/write) Bulk metal tags (use-once, passive read-only) Garment disks (reusable, active read-only) Smart Card credit-cards with RFID tags embedded for storing personal information
  • 6. RFID nails that can be driven directly into palettes (passive read-only) Today every RFID implementation is different, and all RFID solutions have to evaluate various performances and cost factors including the operating environment, on-tag memory storage, and signal transmission restrictions. Each of these issues has significant cost impacts on both tags and readers. In addition, RFID solutions in the market today are generally proprietary in nature and tags from one vendor cannot generally be read by a reader from a different vendor. There are some limited RFID standards in place, but these standards are not globally accepted and some even conflict with RFID standards in other countries. Decades of RFID: Decade Event 1940–195 Radar refined and used, major World War II development effort. RFID invented in 0 1948. 1950–196 Early explorations of RFID technology, laboratory experiments. 0 1960–197 Development of the theory of RFID. Start of application field trials. 0 1970–198 Explosion of RFID development. Tests of RFID accelerate. Very early adopter 0 implementations of RFID. 1980–199 Commercial applications of RFID enter mainstream. 0 1990–200 Emergence of standards. RFID widely deployed. RFID becomes a part of 0 everyday life. a The history of RFID, Association for Automatic Identification and Mobility, October 2001, http://www.aimglobal.org.
  • 7. R F I D in academic libraries:
  • 8. Radio Frequency Identification is a technology that facilitates non line of sight identification of items. Basic elements of a comprehensive RFID System for library kind of environment are tags, readers & library management system Implementing RFID system in libraries will aid tasks such as circulation, re – shelving & theft detection, and it as several other important advantages. It can either replace or supplement existing library bar code system. When the costs of labor taken into consideration for tasks such as check out , check -in , inventory holds ,lists miss shelved items etc., RFID can prove to be very efficient when compared to traditional bar codes . The RFID Technology using academic Libraries in Hyderabad Central University, Moulana Azad National Urdu University, Hyderabad. And K G Reddy college of Engineering & Technology Hyderabad. Academic institutions using this technology for library services like house keeping operations theft controlling. IMPLIMENTATION OF RFID IN LIBRARIES: The RFID Management System in Libraries Can be implemented in following for ways 1. library Security System 2. Library circulation Counter 3. Self Check in and Check out 4. smart and quick inventory
  • 9. KEY COMPONETS OF RFID Source: www.rfid-Library.com
  • 10. LIBRARY SECURITY SYSTEM: The Library Security system through RFID can be ensured through Electronic Article Surveillance (EAC) Gate, which is the anti- theft part of the RFID Library management system using the same RFID tags embedded in the Library items . each lane is able to track items of one meter or more would trigger the alarm system when an unbar barrowed item passes through them . The alarm will sound and lights on the gate will flash as patron passes through with the library material. The EAS anti theft gate has option to trigger a Camera to record patrons who trigger the alarm to the Surveillance Station. Theft detection is an integral feature of the chip within the tag. It is a stand-alone technology, which operates independently of the library databases. Security Gate Theft Control RFID Circulation Counter: RFID Counter System is a staff assisted station mainly to help to support library circulation functions such as issue, return, tagging, sorting of documents etc. The Counter system is loaded with alarming and disalarming module, tagging module,
  • 11. sorting module. The library circulation staff puts the library materials on the reader and can view the information stored inside the tag and status of the EAS and perform the transaction function accordingly. There are also provisions for auto issues and return of library materials. Self Check in and Check Out The self-check out station is basically a computer with a normally touch screen, a built in RFID reader and special software for personal identification and material identification. During self-check out, the user first is asked to identify with a library ID Card, a barcode card or his personal ID number (PIN). Then he/she is asked to choose next action i.e check out of one or more books. After choosing check out the next step which is to place the book in front of the screen on the RFID reader and the display will show the book title and its ID number which have been check out. After confirmation by the user the check out process is finished and a receipt is printed showing which books have been borrowed and the due date. The same time the RFID tag in the book is set on quite so that no alarm will go off at the EAS gate. Thee process is same as in case return of books. But after return the RFID tag is reset: if the books are taken through the gate, an alarm will sound. The main benefit of the self check out/and c heck in system is increase in library productivity Book Drop.
  • 12. This is specifically meant for self-check in of library materials. The Book Drops can be located anywhere, within or outside the library. This offers unprecedented flexibility and convenience of returning library materials at anytime of the day even when library is closed. In this process, the user inserts the library materials into the book drop and the RFID reader captures the electronic signatures and sends backend system for loan cancellation. The check in is acknowledged by beeping sound and flashlight. The users” transaction record is updated immediately. The design of the Book Drops is such that items cannot be retrieved back once deposited. Smart and Quick Inventory The smart and quick inventory system helps in locating and identifying library materials on the shelves, which make the inventory tasks easy for library professionals. It basically comprises a portable scanner and a base station. The primary functions performed by this system are search for individual books requested, inventory check of the whole library stock and stock rectification. These functions are performed by sweeping the portable scanner across the spines of the books on the shelves to gather information on them. In an inventory check situation, this information is compared with the database and a discrepancy reported is generated. In situation where search for a particular item is required the information is first entered into the portable scanner of the base station. When a mismatch item is found on the shelves a beep sound alerts the librarian. /
  • 13. Communication Flow, Protocols & Standards : Re vie w of Lit era tur e: Literature is the basic foundation of any subject .It presents a record of achievements of human race. Today, literature is diverse, complex and multilingual in nature. Knowledge about Literature Is Diverse, Complex and Multi Lingual in Nature, Knowledge about literature is a prerequisite for conducting meaning full information search or literature
  • 14. search and doing fulfill research in any field of discourse . Hence, it necessary for a user to have a basic knowledge about literature ,regarding method of organization of information , various type of search methods , search strategies etc., available for effective information search. Objectives of the Study: For the present study, the fallowing objectives are made: 1. to know the application of RFID in libraries 2. to know the Implementation of RFID in academic libraries 3. to examine the RFID university libraries in Andhra Pradesh 4. to know the development of the RFID Technology 5. Careful investigation of Library Automation with RFID in libraries services 6. to find out the library services ( Theft Control ) through RFID 7. the contractive Suggestions are made REFERENCES / BIBLIOGRAPHY: 1 Finkenzeller, Klaus RFID Hand Book 2nd ed. 2 T Nagaseshulu applications of RFID Technology in Academic Libraries (management of E resources in Academic libraries)
  • 15. 3 Cooney Elaine M, The complete review of RFID Cengage Publications 4., Dr. Dibyendu Paul : RFID Technology is the Revolution in Library automation System : 5. www.rfid-Library.com 6. Vuppala Lingaiah, implementation of RFID technology in Libraries Project Report submitted for Refresher Course on Library Automation & Digitization Conducted by UGC – ASC JNT University Hyderabad