2. DEFINATION a) A place in which literary and artistic materials, such as books, periodicals, newspapers, pamphlets, prints, records, and tapes, are kept for reading, reference, or lending. b) A collection of such materials, especially when systematically arranged. c) A room in a private home for such a collection. d) An institution or foundation maintaining such a collection.e) A commercial establishment that lends books for a fee.f) A series or set of books issued by a publisher.g) A collection of recorded data or tapes arranged for ease of use.
3. OBJECTIVE OF LIBRARY MANAGEMENTa) Build and manage library collections in support ofacademic programs (Develop collections consistent with funding) .b) Provide timely access to requested materials .c) Simplify search/discovery of library resources .d) Build Digital Library infrastructure .e) Build the information literacy/library instruction program .f) Increase library outreach and marketing efforts .g) Undertake systematic review of reference services designedboth to adapt to changes in facilities and technology andto improve quality of service delivered .
4. LIBRARY MANAGEMENTINDEGINIOUS BAR CODE RFID METHOD SYSTEM SYSTEM
5. INDEGINIOUS (SELF MADE ) METHOD FOR LIBRARYMANAGEMENT1. To make and execute the same we have made certain working excel sheets and combined them all in a workbook.2. The whole management can be sub-divided under the following tasks- a) Receiving subscriptions from members. b) Data recording of members. c) Purchase of books d) Subscription to newspapers and magazines. e) Assigning shelves to books (we’ve done it according to ‘genre’) f) Issuing and managing books. g) Archiving. h) Inventory management/valuation.
6. Merits:a) Can be developed within the convenience of home.b) Requirement: 1. Hardware = basic computer. 2. software = MS office MS excel (2007 for enhanced experience). 3. Knowledge = Basic excel and computer usage knowledge.c) Almost free of cost.
7. Demerits :a) Cannot support huge data.b) Is not a fool-proof solution for library management.c) Flexible only to a limited extent.d) Can and should be used only for experimental and evaluation purposes.e) Limited to the knowledge of user/developer.
8. Bar code system for librarymanagement-A barcode is a series of parallel alternating black and white patterns that represents a sequence of numbers or characters.-A barcode font is a specially designed font that allows you to specify and generate barcodes on normal text characters. -It is extremely easy to use.
9. Bar code system for library management-Through Barcode based library management, manual circulation of resources completely eliminated.-each and every book, chart is pasted with barcode labels.- members are issued barcode enabled membership cards.
10. -These member cards can have logo of the institute, photo of the user, institute address and name and contact details of the user on the member library card.-Library can take the print out of any of the above any time during the session and any number of times.
11. INCORPORATING BAR CODE INLIBRARIES THE TYPICAL SEQUENCE WOULD BE Database creation. Bar Coding membership cards. Installation of suitable scanning equipment. Set different criteria for transactions.
12. Hardware:1. Label (Polyester)3. Barcode Printer: The special printer is used to print the barcode label and member ID’s for the library.4. Barcode Software: barcode software is used to generate the barcode label. The name and address, etc and user name, id, address can be included in the label.5. Fixed Barcode Scanner Barcode scanner will scan the barcode details of the member, once the account become active, the staff can scan the barcode label of the book.6. Wireless Barcode Scanner, is used for the stock taking of the collection. The barcode wireless scanner can be taken anywhere within the shelves, labels can be scanned and the information will be collected on the PC in the library anywhere.
13. Benefits of Bar coding (in librarymanagement) 1. Quick and error free entry of access and membership codes. 2. Ensures total integrity of collected data. 3. No queuing up at check out/check in counters. 4. Avoids piling up of data entry work for counter staff. 5. Aids generation of suitable reminders to delinquent borrowers. 6. Stock verification made easy
14. RFID (RADIO FREQUENCY IDENTIFICATION) is a technology that is sparking interest in thelibrary community because of its applications that promise to increase efficiency, productivity and enhance user satisfaction. RFID is a combination of radio-frequency- based technology and microchip technology (works on high frequency = 13.56 MHZ).RFID TECHNOLOGY = RADIO FREQUENCY BASED TECHNOLOGY + MICROCHIP TECHNOLOGY
15. RFID-based systems = tracking systems + security throughout the library .including easier and faster ,inventorying, and materials handling. In libraries, all the library assets = books, manuscripts, CDS, DVDs, videos, audio cassettes, etc. have to be embedded with RFID tags.
16. Thus, in a library, an RFID system consists of:1. A smart label attached to a library item. Smart label = memory chip + RF antenna to send and receive data and can be programmed2. Hardware = for interrogating/making connection with the smart label .3. Software = controlling the hardware, programming the tags, decoding the responses from smart labels in the interrogation zone (3-5 feet).
17. • The three main system components can be further separated into six more sub-components: – A smart label or a tag – A reader – An encoder or a printer – A middleware – An application software – A host system or a server• RFID middleware is software that connects: data coming in from tags + to the library management system.RFID hardware operations----- RFID middleware --- existing library management system.
18. Server (communication gateway) : Is the heart of an RFID application system. Communication gateway among the various components of the system, it receives information from one or more of the readers and exchanges information with the library databases. SERVER LIBRARY READER DATABASE
19. • The applications software: Would have the APIs• (API: Applications Programming Interface) necessary to connect the RFID system with the server, etc. so as to achieve library system.• RFID application software is generally a browser-based for centralized monitoring.• The software enables : - safe, - secure and - highly efficient movement of library items by asset tracking and prevents loss or tampering.RFID HARDWARE-----APPLICATION SOFTWARE-----LIBRARY DATABASE
20. PROCESS OF RFID MANAGEMENT1. AUTOMATED CHECK IN -AFFIXING TAGS(HARDWARE: RFID TAG + HANDHELD SCANNER)2. OPTIMISING SEARCH (HARDWARE:BIBLIOTENNA)3. AUTOMATED CHECK OUT (HARDWARE:X-TENNA)4. AUTOMATED RETURN OF MATERIAL (HARDWARE:BIBLIOTENNA+2 X-TENNA)5. RE-SHELVING RETURNED BOOKS(HARDWARE:SPRING LOADED CART+HANHELD SCANNER)
21. 1.Automated check ina) Affixing tagsAn RFID tag/smart label containing – memory chip +RF antenna ,is attached to each item of inventory that is intended to be monitored , searched easily without consuming any considerable time.
22. 2.Optimising searchThis stage is completed in few simple steps-a) The patron (user) goes to the bibliotenna ,puts in his ID card and types in his search.b) bibliotenna routes the above search to the library database and the availability of book is confirmed immediately.c) If available: the patron is given the option to choose the book and routes the info. of book (its exact location in library) to a handheld scanner.d) Using this handheld scanner user goes to the shelf and the handheld scanner beeps as soon as it comes in the RFID tag of that specific book.e) User can collect the book.
23. 3.Automated check outa) Once books are collected ,patron proceeds to self check out counter.b) X-tenna will read info. on students ID card and automatically associates books with him and gives a receipt for a record of the same.c) While leaving the library, mounted X-tenna verifies that the book leaving the library has been checked out.d) Book that hasn’t been checked out is instantly detected thus minimizing chances of theft.
24. 4. Automated return of materiala) Bibliotenna also has a drop box function and is fitted with 2 X-tenna’s that record every single book that is returned.b) 1st X-tenna = senses the book and kick starts an automated roller that collects the book.c) 2nd X-tenna reads and confirms that book is deposited as soon as the book falls into the spring fitted cart.d) once function of X-tenna1 + X-tenna2 = complete bibliotenna prints out a receipt for a record.e) ASAP the next student on the waiting list is informed of the availability of the book through SMS and E-mail.
25. 5. Re-shelving returned booksa) Each returned book in the cart can be identified using a handheld scanner and the very exact location can be ascertained (shelf, row, quadrant).b) It is convenient to the extent that he librarian need not even bend to collect the books from the cart as it is fitted with a spring.
26. Critical analysis of RFIDBenefits:1.To library library management• Uncompromised security within the library .• Efficient collection management system (can be located suitably and made 24x7) .• Higher customer/patron satisfaction levels.• Improved inter-library cooperation .• Better preservation of inventory because of less handling by staff.• Same security and labeling formats for all items such as books, CDs and DVDs, hence better management of databases.
27. 2.To patrons (users)• Self check-in and self check-out facilities.• Quicker service such as payment of fees, fines, etc.• Better reservation facilities, etc.• Faster and accurate re-shelving means quicker and more satisfying service.• Height adjustable self check-in/out tables are convenient for children and physically disabled persons who use the library .
28. Possible problems: -RFID continuously communicates with the library database, the real danger of merging this technology is in letting secure ILS database be contacted/updated/opened several times and thereby make them prone to hackers. – RFID tags are not hidden and affixed to the inside back cover and are exposed to physical tamper. – Some interference from metallic material in book covers, CDs and DVDs does occur and tag reading may not be correct . – RFID tags are easy to shield from readers by ordinary aluminum foils and may not serve the purpose of being anti- theft tools . – RFID reading accuracy declines if many items are read simultaneously (although collision avoidance air interface protocol may be used to minimize this effect) . – RFID reader range depends on its power and antenna size .
29. ACKNOWLEDGEMENTSGOOGLE.COMWIKIPEDIA.COMGMAIL.COMIMMENSE SUPPORT FROM TEACHERS COLLECTIVELY PREPARED BY- RAHUL DIWAN SANDEEP JHAMTANI MD. WAQAR SYED MUZZAFAR ALI RAAGHAV BHATIA