13-10-2012, 12:19 PM
SEMINAR REPORT ON COMPUTERIZED LIBRARY SYSTEM
COMPUTERIZED LIBRARY SYSTEM.doc (Size: 60 KB / Downloads: 28)
INTRODUCTION:
Radio frequency identification (RFID) system is a flexible technology that is convenient, easy to use and well suited for automatic operation. It combines advantages not available with other identification technologies.
RFID does not require contact or line of sight to operate, can function under a variety of environmental conditions, and provides a high level of data integrity. In addition, since the technology is difficult to counterfeit, RFID provides a high level of security.
COMPONENTS OF RFID SYSTEM:
A basic RFID system consists of the following physical components:
• An RFID device (transponder or tag) that contains data about
an item/bookAntennas or sensors used to transmit the RF signals between reader (server)and the RFID deviceA reader (server) to receive and decode the information ,and
To communicate with automated library system.
Transponder/tag:
Historically an RFID device that did not actively transmit to a reader was known as tag . An RFID that actively transmitted information to a reader was known as a transponder (TRANSmitter+resPONDER). However, it has become common within the industry to interchange the terminology and refer to these devices as either tags or transponder. The tags are programmed with data that identifies the item to which the tag is attached. Tags can be read only, volatile read/write, or write once/ read many (worm). It can be either active or passive. RFID comes in variety of shapes and sizes.
The active RFID tags are powered by a battery and are typically read/write, tag data can be rewritten and/or modified. Active tag’s memory size varies according application requirements; some system state with up to 1MB of memory.
ANTENNAS:
A typical RFID system includes several different kinds of antennas, also known as sensors, interrogators or reader. These are radio frequency devices designed to detect and read the intelligent tags to obtain the information stored thereon. The antennas generate a field of power to read the tags with in the range. Each tag generates its own signal for its unique data. The antennae can be used for the circulation desk check-out, book return check in and long range walkthrough devices to detect and interrogate an RFID tag passage for purposes of determining whether it is checked or unchecked i.e.(authorized/no alarm or unaut -horised/alarm)event, it is also possible to read a no of items on the shelve for purpose of locating missing or misplaced items using a portable hand hold scanning gun.
Circulation desk check out units (equipment to charge and discharge the tags) can be placed on the circulation counter or built in. Discharg -ing can be done on the same units, or on one or more dedicated units away from the service counter.
3.3 server:
The server is a heart of the comprehensive RFID system .it is the communication gateway among the various components. It receives the information from the antennas and exchange information with the circu –lation database. Its software should include the application program -ming interface necessary to link it with the automated library system. The server should typically include a transaction database so that the reports can be produced.
USE OF RFID SYSTEM:
The RFID system reduces the amount of time require to perform the circulation operations.The most significant time savings are attributable to the fact that several items in the stack can be grabbed at the same time.The one problem that remains is of the books on which the tag is not pasted correctly or the data in the tags is not filled correctly .The other time saving realized by the staff modest unless the RFID tags repl
aces both the bar codes or rf tags (used in older theft detection systems)
And bar codes used by the automated library system.the RFID system is a comprehensive system which combines circulation and security appli -cation. Security gate with exit control, work as interface to the circul –ation system that can identify the items moving out of the library.
The greatest advantage of RFID tracking system is their ability to scan books on shelves without tipping them out or removing them Hand held inventory recorder can be moved rapidly across the shelves of books to collect all of the unique identification information from the tags. Using wireless technology, it is possible to not only to update the inventory, but also to identify the items, which are out of order.With the up coming better detector it would be possible to locate the book inside the library by sitting on circulation desk and then guide the user to it.This can in a way, over come the problem of depth classification or shelving of books by call number in a library system as the book can be easily traced from large collection of documents and can be automatically sorted shelved and retrived,as and when desired.
TAG FUNCTIONALITY:
Some tags can only be written to once that is, once the tag is programmed, the information stored in the tag’s memory can’t be changed. Alternatively, information stored in the memory of read/write tags can be used as required & these are the tags suitable for library uses for regular automated circulation job pooled with security. Almost all RFID tags of the recent time in the library market are also available with the feature of anti collision i.e.the reader has the ability to read several tags simultaneously. However, the performance of tags varies depending upon speed at which this can be performed by server and the total no. Of tags can be read.
ELECTRONIC DOCUMENT SURVEILLANCE MECHANISM:
As motioned, RFID system can be used to prevent theft in the library. The security mechanism may be integrated into the chip itself, or security gates may be linked to a separate server, which interrogates the database to conclude whether an alarm to be triggered. Electronic documents surveillance is a system that protects books, CDs, micro films
Etc. , from undesirable social activities , such as theft hiding of books , or dislocation from their proper shelf .
The physics of a particular tag & resultant surveillance technology determines which frequency range is used to create the surveillance area.
The system ranges from very low frequencies through the radio frequency range.
COMPARISON WITH BAR-CODE:
The RFID system is similar in concept to bar coding. Bar code system use a reader and coded labels that are attached to an item, whereas RFID uses a reader and special RFID device/tag which is attached to an item. Bar coded uses an optical signals to transfer information from the labels to the reader; RFID uses RF signals to transfer information from the RFID device to the reader/server.
Since RFID device does not require line of sight between the transponder and the reader, these systems overcome the limitations of other automatic identification approaches such as bar coding. The RFID system works effectively in environment where excessive dust, dirt, moisture and /or poor visibility normally hamper and rapid identification. One outstanding benefit of RFID is its ability to read through these environments at remarkable speed –responding in less than hundred milliseconds in most cases. Further more RFID is completely automatic and transparent, eliminating the need to scan and object manually or activate a magnetic tape, reader, or other contact ID technology.
CONCLUSION
Developments in RFID technology continue to yield larger memory capacities, wider reading ranges, and faster processing. The technology has the potential to ultimately replace barcode. Even through with inevitable reduction in raw materials coupled with economics of scale, the integrated circuit in RF tag will never be as cost effective as barcode label but the overall benefits achieved from an RFID will definitely outscore a barcode system. The RFID will continue to grow in its established niches where barcode or other optical technologies are not effective and the spin off benefits from the RFID system is immense.