1. ( Word to PDF Converter - Unregistered ) http://www.Word-to-PDF-Converter.net Application, Implementation & Development of RFID (Radio Frequency Identification) Technology in Modern Libraries Dr. M. ANJAIAH Assistant Professor Dravidian University Kuppam, A. P, India email@example.com VUPPALA. LINGAIAH MA. M Phil., PGDLAN (P h D.) Research scholar & CHIEF LIBRARIAN K G REDDY COLLEGE OF ENGINEERING & TECHNOLOGY, HYDERABADlingaiahphd@gmail.com ,firstname.lastname@example.org www.kgr.ac.in mob:09985554351
2. ABSTRACTThis Paper Discuss About The Application , ImplementationOf Rfid Technology In Modern Libraries ., The RfidTechnology Is A Latest Technology Today Most Of TheLibraries Adopting To Rfid Technology For Their ServicesLike Stock Management , Check In Check Out TheftControlling. The Modern Libraries Are Using ThisTechnology Iit , Iim S , Central Universities RepudiatedUniversities . The Rid Technology Playing Vital Role inAcademic Environment ., the rapid advances in informationprocessing , storage and communication technologies haverevolutionized thr role of world wide libraries indisseminating information services to their users .KEY WORDS : Rfid, modern academic Libraries ,ImplementationIntroduction: RFID Technology is the Latest Technology to be used inlibrary for book identification, for self check out and for sorting and conveying of library
3. books and also for theft detection. The aim of using RFID Technology to increase theefficiency, reduce data entry errors and free up staff to perform more value addedfunctions.RFID is a combination of radio frequency based technology and micro chips in the tagsaffixed to library materials is read using radio frequency technology regardless of itemorientation or alignment (i.e., the technology does not require line –of-sight or a fixedplane to read tags as do traditional theft detentions systems) and distance fro the item isnot a critical factor except in the case of extra wide exit gates. The corridors of thebuilding exit can be as wide as four feet because the tags can be read at a distance of up totwo feet by each of two parallel exit sensorsRapid advances in information processing, storage and communication technologies haverevolutionized the role of world wide libraries in disseminating information services totheir users. libraries are facing new challenges ,new competitors, new demands ,newexpectations and a variety of information services for reconsolidating their positions,redesigning their services, and information products ,incorporating new technologies,upgrading information resources ,training people ,changing information objects modesof communication and information delivery in order to add value to their services ,and tosatisfy the changing information needs of user communityThe technology playing vital role in the libraries now a day theft controlling is verychallenging part in the library the academic libraries have huge collection in university levelDEFINATIONS / origin OF RFID:
4. Radio frequency identification Is a generic term that is used to describe that transmit theidentity of an object of person wirelessly, using radio waves .it is grouped under the broadcategory of automatic identification technologies.RFID was introduced in the early 1980s for item tracking and access control applications.Tracking of materials is done using radio frequency baed technology combined withmicrochip technology, hence designated as RFID. These contact less and wirelessautomatic identification data capturing systems are highly effective in hostile environmentssuch as , industry and logistics , textile and libraries ,where barcode labels cannot serviveand need for inventory control and waste management . Owing to its ability to trackmoving objects RFID has been established it self in livestock identification and automatedvechele identification systems. in recent times , its use has raised to track books , audio /video tapes and other multimedia collection in a library . After realizing the advantages ofRFID technology libraries are considering it, the more productive tool for flow man agentsooner than barcodes and other identification technologiesHistoryRFID technology was first used in World War II to differentiate between friendly andenemy aircraft. Over the years this technology has evolved and been applied to animaltracking and identification, speed pass lanes on toll roads, building security access, and forelectronic payment processing at gas stations. The basic components of any RFID systeminclude:
5. Tags—Also called transponders, these can be either active with their own means of sending a signal, or passive, relying upon the tag reader to provide the power necessary to generate the response signal. The signal could be a simple identification number stored in a read-only tag or a complex data stream that includes additional data stored within the tags memory. These more complex tags could contain such data items as manufacture date, lot number, serial number, or even built-in sensors to track average storage temperatures or other data. Readers—also called interrogators, come in various configurations depending on the location, environment, and scanning area coverage required. A reader is used to identify all tags within its reception coverage area. Readers require some intelligence for aggregating and smoothing the tag data.Information transmitted from the tag can be interpreted by reading the data directly fromthe reader itself or through a software–based interface.RFID tags can come in numerous forms with different capabilities including: Key fobs (active read/write) Bulk metal tags (use-once, passive read-only) Garment disks (reusable, active read-only) Smart Card credit-cards with RFID tags embedded for storing personal information
6. RFID nails that can be driven directly into palettes (passive read-only)Today every RFID implementation is different, and all RFID solutions have to evaluatevarious performances and cost factors including the operating environment, on-tagmemory storage, and signal transmission restrictions. Each of these issues has significantcost impacts on both tags and readers. In addition, RFID solutions in the market today aregenerally proprietary in nature and tags from one vendor cannot generally be read by areader from a different vendor. There are some limited RFID standards in place, but thesestandards are not globally accepted and some even conflict with RFID standards in othercountries.Decades of RFID:Decade Event1940–195 Radar refined and used, major World War II development effort. RFID invented in0 1948.1950–196 Early explorations of RFID technology, laboratory experiments.01960–197 Development of the theory of RFID. Start of application field trials.01970–198 Explosion of RFID development. Tests of RFID accelerate. Very early adopter0 implementations of RFID.1980–199 Commercial applications of RFID enter mainstream.01990–200 Emergence of standards. RFID widely deployed. RFID becomes a part of0 everyday life.a The history of RFID, Association for Automatic Identification and Mobility, October2001, http://www.aimglobal.org.
7. R F I D in academic libraries:
8. Radio Frequency Identification is a technology that facilitates non line of sightidentification of items. Basic elements of a comprehensive RFID System for library kind ofenvironment are tags, readers & library management systemImplementing RFID system in libraries will aid tasks such as circulation, re – shelving &theft detection, and it as several other important advantages.It can either replace or supplement existing library bar code system. When the costs oflabor taken into consideration for tasks such as check out , check -in , inventory holds,lists miss shelved items etc., RFID can prove to be very efficient when compared totraditional bar codes .The RFID Technology using academic Libraries in Hyderabad Central University,Moulana Azad National Urdu University, Hyderabad. And K G Reddy college ofEngineering & Technology Hyderabad. Academic institutions using this technology forlibrary services like house keeping operations theft controlling.IMPLIMENTATION OF RFID IN LIBRARIES:The RFID Management System in Libraries Can be implemented in following for ways 1. library Security System 2. Library circulation Counter 3. Self Check in and Check out 4. smart and quick inventory
9. KEY COMPONETS OF RFIDSource: www.rfid-Library.com
10. LIBRARY SECURITY SYSTEM:The Library Security system through RFID can be ensured through Electronic ArticleSurveillance (EAC) Gate, which is the anti- theft part of the RFID Librarymanagement system using the same RFID tags embedded in the Library items . eachlane is able to track items of one meter or more would trigger the alarm system whenan unbar barrowed item passes through them .The alarm will sound and lights on the gate will flash as patron passes through with thelibrary material. The EAS anti theft gate has option to trigger a Camera to recordpatrons who trigger the alarm to the Surveillance Station. Theft detection is anintegral feature of the chip within the tag. It is a stand-alone technology, whichoperates independently of the library databases. Security Gate Theft ControlRFID Circulation Counter:RFID Counter System is a staff assisted station mainly to help to support librarycirculation functions such as issue, return, tagging, sorting of documents etc. TheCounter system is loaded with alarming and disalarming module, tagging module,
11. sorting module. The library circulation staff puts the library materials on the readerand can view the information stored inside the tag and status of the EAS and performthe transaction function accordingly. There are also provisions for auto issues andreturn of library materials.Self Check in and Check OutThe self-check out station is basically a computer with a normally touch screen, a builtin RFID reader and special software for personal identification and materialidentification. During self-check out, the user first is asked to identify with a libraryID Card, a barcode card or his personal ID number (PIN). Then he/she is asked tochoose next action i.e check out of one or more books.After choosing check out the next step which is to place the book in front of thescreen on the RFID reader and the display will show the book title and its ID numberwhich have been check out. After confirmation by the user the check out process isfinished and a receipt is printed showing which books have been borrowed and the duedate. The same time the RFID tag in the book is set on quite so that no alarm will gooff at the EAS gate. Thee process is same as in case return of books. But after returnthe RFID tag is reset: if the books are taken through the gate, an alarm will sound.The main benefit of the self check out/and c heck in system is increase in libraryproductivityBook Drop.
12. This is specifically meant for self-check in of library materials. The Book Drops canbe located anywhere, within or outside the library. This offers unprecedentedflexibility and convenience of returning library materials at anytime of the day evenwhen library is closed. In this process, the user inserts the library materials into thebook drop and the RFID reader captures the electronic signatures and sends backendsystem for loan cancellation. The check in is acknowledged by beeping sound andflashlight. The users” transaction record is updated immediately. The design of theBook Drops is such that items cannot be retrieved back once deposited.Smart and Quick InventoryThe smart and quick inventory system helps in locating and identifying librarymaterials on the shelves, which make the inventory tasks easy for library professionals.It basically comprises a portable scanner and a base station. The primary functionsperformed by this system are search for individual books requested, inventory check ofthe whole library stock and stock rectification.These functions are performed by sweeping the portable scanner across the spines ofthe books on the shelves to gather information on them. In an inventory checksituation, this information is compared with the database and a discrepancy reported isgenerated. In situation where search for a particular item is required the information isfirst entered into the portable scanner of the base station. When a mismatch item isfound on the shelves a beep sound alerts the librarian. /
13. Communication Flow, Protocols & Standards :ReviewofLiterature:Literature is the basic foundation of any subject .It presents a record of achievements ofhuman race. Today, literature is diverse, complex and multilingual in nature. Knowledgeabout Literature Is Diverse, Complex and Multi Lingual in Nature, Knowledge aboutliterature is a prerequisite for conducting meaning full information search or literature
14. search and doing fulfill research in any field of discourse . Hence, it necessary for a user tohave a basic knowledge about literature ,regarding method of organization of information, various type of search methods , search strategies etc., available for effectiveinformation search.Objectives of the Study:For the present study, the fallowing objectives are made: 1. to know the application of RFID in libraries 2. to know the Implementation of RFID in academic libraries 3. to examine the RFID university libraries in Andhra Pradesh 4. to know the development of the RFID Technology 5. Careful investigation of Library Automation with RFID in libraries services 6. to find out the library services ( Theft Control ) through RFID 7. the contractive Suggestions are madeREFERENCES / BIBLIOGRAPHY:1 Finkenzeller, Klaus RFID Hand Book 2nd ed.2 T Nagaseshulu applications of RFID Technology in Academic Libraries (managementof E resources in Academic libraries)
15. 3 Cooney Elaine M, The complete review of RFID Cengage Publications4., Dr. Dibyendu Paul : RFID Technology is the Revolution in Library automation System:5. www.rfid-Library.com6. Vuppala Lingaiah, implementation of RFID technology in Libraries Project Reportsubmitted for Refresher Course on Library Automation & Digitization Conducted by UGC– ASC JNT University Hyderabad