SlideShare a Scribd company logo
1 of 32
RFID (Radio Frequency Identification)
Dr.P.Padma
Assistant Professor
DOLIS
MKU
Introduction
• The rapid development in an information technology has brought out a
revolutionary change in the field of library system and services.
• The new information technology has changed the manual scenario of library
to computerized automated library.
• The RFID technology is a latest technology for automatic identification
method. RFID technology is in use since the 1970s.
• Today, more and more libraries are adopting RFID (Radio Frequency
Identification) technologies as it streamlines workflow in the area of
self service, book returns, shelf management and inventory.
CONTD
• RFID library management, using RFID tags library, is easy and convenient.
A RFID library management system consists of books, each attached with
an RFID tag, RFID reader, computer network and software.
• In this module we will be studying the basics of RFID technology with
components of RFID, learners will also be provided details on RFID
technologies which can be used in Library, RFID standards and
protocols for libraries, and the potential advantages and disadvantages
of using RFID in libraries.
What is RFID?
 RFID means Radio frequency identification i.e. the technology that uses
radio waves to automatically identify individual items.
 Radio-frequency identification (RFID) is part of family of AIDC
(Automatic Identification and Data Capture) technologies that includes
barcodes and smart cards.
 It is non-contact (wireless) use of radio-frequency electromagnetic fields
to transfer data, for the purposes of automatic identification and tracking of
tags attached to objects.
 The tags contain electronically stored information which can be read. A tag is
constructed of a silicon microchip and is etched with antenna.
Working on the RFID System:
The working of the RFID system is as follows:
 The RFID system consists of a tag and the tag is made up of a microchip
with an antenna and also a reader with an antenna.
 Initially, the reader transmits the electromagnetic waves.
 The tag antenna receives these waves as it is received to turn the waves.
 The passive tag of RFID supplies power to the circuit of the microchip as it
has the feature of extracting the power.
 The chip modulates the waves and after this reader transforms the waves into
digital information.
Components of RFID
RFID system has mainly four components. These components are:
 RFID tags
 RFID readers
 Antennas
 RFID software
RFID Tags
 The RF tags are of various shapes and sizes as per the need of various
applications.
 RFID tag is the heart of the system is the RFID components, which can be
fixed inside a book’s back cover or directly onto CDs and videos. This tag
is equipped with a programmable chip and an antenna.
 The RFID tags are two types and they are as follows:
 Passive tags
 Active tags
Passive tags:
 Passive tags collect energy from a nearby RFID reader’s interrogating radio
waves.
 The on board power is not consumed by the passive tags and these tags possess
unlimited life but have the shorter range.
 The limitations of these tags are that they have low information saving capacity,
low output power and the small range of communication.
Active tags:
 Active tags have a local power source such as a battery and may operate at
hundreds of meters from the RFID reader.
 The active tags are the genuine transmitters of the data; these tags are more costly
than the passive tags. The transmitters tend to decrease the lifetime of the active
tags.
RFID Reader
 A receiver device called as reader detects the signal as soon it enters into its
radio range and decodes the number for interpretation; Reader interrogates the
tags and offers optimum reading performance enabling instant data capture
when passed alongside the items in a continuance movement.
 The devices used within the building are usually called ‘readers’ while the ones
used at building exits are usually called‘ sensors’
 Readers are either fixed or mobile.
 Fixed readers are mounted in specific locations, and are used to track items as
they move from one place to another, functioning kind of like a checkpoint.
CONTD
 Fixed readers offer convenience and consistency, tracking tag movements
automatically, without human involvement.
 Most mobile readers are hand-held. With handheld readers, you can scan
individual items or a pallet of items on the go.
 For taking a quick inventory of a room filled with RFID-tagged items, for
locating a particular asset ID, and for encoding tags or updating tag details
on the spot, handheld readers offer a lot of flexibility.
Antenna
 An antenna acts as a channel between the tag and the transceiver; it also
controls the system’s information acquisition and information exchange.
 To An antenna is connected to the reader to help to process identification of the
items and activate/deactivate the tag antitheft function simultaneously.
 Additional antenna can be added to increase the number of item processed in
case of larger transactions.
 The antenna releases radio signals for the activation of the tag and read and
then write the information to it, each RFID system has minimum one antenna
for the transmission and reception of the RF signals.
 A RFID system may have a single antenna for both the transmission and
reception or different antennas for transmitting and receiving.
 The selection of the antenna is done by depending on the range, if the tag is
close to the antenna then a short range antenna can be satisfied but for the long
ranges, the antenna with a long range is needed.
Software
 Server on which the software that interfaces with the integrated library
software is loaded.
 The server is the heart of comprehensive RFID systems. It is the
communication hub between various components of RFID. It receives
the information from the readers and exchanges information with the
library automation system database.
 The standard server software includes the SIP/SIP2 (session initiation
protocol), APIs (Application Programming Interface) NCIP or SLNP
necessary to interface it with the integrated library software.
RFID Use in Libraries:
 Libraries around the world have already started to use RFID technologies
for speedy and efficient handling of library object, inventory control, and
checkout, check-in process.
 In general the technology used in libraries is the same technology used in
applications of passive RFID tags.
 The main objectives of application of RFID in libraries is to increase
efficiency and reduced cost.
 Automation of day to day functionalities and self-service can help libraries
for smoother functioning. It also enhances security of library materials.
RFID Tags in Libraries
 Tags can be Read Only (RO), Write Once Read Many (WORM) or
Read Write (RW).
 RO tags are pre-programmed with a unique number like a serial
number (or may be accession number/ ISBN number).
 WORM tags are pre-programmed but additional information can be
added to tags.
 RW tags can be updated dynamically. Most library applications use
RW tags.
 US based National Information Standards Organization (NISO) in its
document “RFID In US Libraries” (NISO-RP-6-2012) released
CONTD
in March 2012 has made following recommendations for RFID tags to be
used in libraries.
 In Libraries, 13.56MHz High Frequency tags should be used.
 RFID tags for library use should be passive.
 The typical read range of tags for library applications should not be
increased substantially beyond the present range of 8-20 inches for
smaller tags in future.
 The system will utilize ISO/IEC 18000-3 Mode 1 tags programmed so that
they should work for identification of items in other libraries.
 The system will use tags that will not interfere with the operation of
security systems in other libraries.
RFID Readers in Libraries
1) Staff Station (Conversion Station)
 Library staff station unit enables library staff to check-in or check-out
items for library circulation operations.
 This unit also enable library staff to tag a particular item (library item or
member card). It can be connected to existing hardware (PC) as a
standalone solution.
2)Self Check-in/Check- out Station
 RFID self-check-in/check-out systems provide facilities for borrowing,
return and renewals of materials via RFID tags.
 RFID self-check systems can safely check-out library items in one easy
step by just putting the material on the station.
 In the station, when the RFID tag is read, a software event occurs which
changes the status of the item either checked-in or checked-out based on the
operation performed. Modern check out stations also prints receipt informing
the user when to return materials to the library.
 Self service station can be used to check in library materials without staff
assistance, where in user can directly put in his/her borrowed material.
3)Exit Sensors (Security Gates)
 Exit sensors or security gates can be used to verify that all material
leaving the library has been checked out.
 Generally a security Gate is composed of two pedestals, additional
pedestals can be added for increased detection surface.
 Each pedestal is standalone and plug into the main power. This exit
sensors can be a standalone solution or may be interfaced with library
management system.
 The gate detection system capable of detecting un authorized tagging items
passing through it.
 It has in built audio visual alert facility for theft detection and minimum read
range of 36 inches.
4)Book-drop Station
 Book-drop stations are used to automatically discharge library materials and
reactivate security.
 This station can be placed anywhere, within or outside the library. Library
user drops the library item (book or any other material) into the slot.
 The reader captures the electronic signature on the RFID tag and sends
to backend system for appropriate action.
 User is also acknowledged by alerting sound, light or printed receipt.
Library user’s record is updated immediately in the library management
system.
5)Sorter and Conveyor
 Sorter and conveyor are combination of automated system for returning material
to proper area of library.
 When the library material is returned by the user by any means, it is usually
placed on a conveyor which carries the item at designated location, a
scanner placed at location reads the tag and decides the exact bin, where it
has to be placed or dropped, when the item reaches to the correct bin it
is automatically dropped to the bin using mechanical system.
 If the item is reserved by someone it will get dropped to a bin designated
for reserved items.
6)Hand-held Reader
 The portable handheld reader can be moved along the items on the shelves
without touching them.
 The data captured by this unit can be stored in the unit itself, which
can be downloaded through a software interface or it can be
transmitted via wireless connection to the server.
 This handheld reader can be used for inventory control (including stock
verification), to locate mis-shelved library item, or tracking of library
material.
RFID Standards For Library
NCIP (National Information Standards Organization
Circulation Interchange Protocol)
 This is a protocol that provides specifications for the exchange of
messages between among computer-based applications to enable them to
perform functions necessary to lend and borrow items, to provide controlled
access to electronic resources, and to facilitate cooperative management of
these functions.
 The first edition of the NCIP (NISO Circulation Interchange Protocol)
standard (version 1.00) was published as ANSI/NISO Z39.83 in 2002.
 It was then revised in 2008 (version 2.00) to include greater extensibility,
improved self-service and error handling, and to address issues that
surrounded the first version of the standard.
 In 2012, a new revision (version 2.02) was approved and published.
 This protocol defines a collection of messages and associated rules of
syntax and semantics for use by applications; to perform the functions
necessary to lend items; to provide controlled access to electronic resources;
and to facilitate co-operative management of these functions.
ISO 180003- Mode 1
 This is an ISO standard for parameters for air interface communications
at13.56 MHz (High Frequency), based on which RFID hardware is being
developed for usage in Library.
 The standard defines communication parameters on which the tag and reader
communicates with each other.
ISO 28560-1:2011
 This is a set of Information and documentation — Data model for use of
radiofrequency identifier (RFID) in libraries.
 ISO 28560-1:2011 specifies a model for the use of radio frequency
identification (RFID) tags for items appropriate for the needs of all types
of libraries, including academic, public, corporate, special and school.
 This standard provides the framework to ensure interoperability between
libraries in exchange of library items with RFID tags, the freedom of the
library to acquire or renew equipment or library items from different
vendors.
 A single RFID application from the vendor's perspective’s ISO28560-
1:2011 specifies a set of data elements and general guidelines for
implementation, to meet the needs for circulation, acquisition, Inter library
loan process, data requirements of publishers, printers and other suppliers of
library items; inventory and stock checking of items.
 ISO 285601:2011 gives guidelines for item security, profiles, privacy,
implementation, migration, label design and location of the RFID label.
SIP2 Protocol
 SIP2 Protocol is a communication protocol that provides a standard
interface between Library Management System (LMS) and library
automation devices (For Example, staff station, check-out and check-in
devices).
 The protocol can be used by any application that has a need to retrieve
information from an LMS or process circulation transactions via the
ILS.
 There are two versions of SIP, version 1.0 and 2.0. SIP2 is based on a
proprietary protocol, but has been opened for use by all parties providing
systems for library circulation.
Advantages of RFID in Libraries
1)Reduction of Manpower Requirement:
 Use of RFID technology in a library can drastically reduce the time,
being spent on circulation tasks, as RFID technology enables reading of
more than one tag at a time.
 Self service station can also attribute to free up man hours from this tasks.
 The stock verification and other inventory control operation using RFID
based handheld reader can be finished in very less time compared to
traditional approach.
2) Reliability:
 Correctly operating readers and tags can have near 100% detection rates.
 The high reliability is especially important when RFID is used in theft
detection.
3)Security:
 RFID security and the tracking of materials throughout the library overcomes
the problem of theft in the library
4)Better Inventory Control:
 As stated earlier, RFID systems are having ability to scan library items on the
shelves without tipping them out or removing them. A hand-held reader can be
moved rapidly across a shelf of books to read all of the unique identification
information.
 Using wireless technology, it is possible not only to update the inventory,
but also to identify items which are out of proper order.
5) Tag life and appearance:
 RFID tag life is said to be 100,000 transactions or at least 10 years. These
tags do not interfere with the appearance of the book, and can even be
made to appear as a bookplate.
 RFID technology is better than bar codes as it cannot be easily replicated and
therefore, it increases the security of the product. RFID tags are placed inside
the books and an alarm is installed at the exit doors.
 The RFID tags can store data up to 2 KB whereas; the bar code has the
ability to read just 10-12digits.
Disadvantages of RFID in Libraries
1)Cost:
 The major disadvantage of RFID technology is its cost. RFID is not an
inexpensive technology.
 Apart from tags for each library item one also needs to consider costs of
self-service stations, staff readers, security gates, and hand held devices as
well as cost of implementation in terms of fixing of RFID tags for each
item as well as installation and integration of all equipment etc.
2) Vulnerability:
 It is possible to tamper an RFID system by wrapping the metal (or
aluminium) foil to block the radio signal.
 It is also possible to compromise an RFID system by placing two items
against one another so that one tag overlaps another, this May nullify the
signals. This requires careful alignment while tagging.
3) Removal RFID Tags:
 The RFID tags usually cannot be concealed in spine of the books and
are exposed for removal.
 A library can also imprint the RFID tags with its logo and make them
appear to be bookplates, or it can put a printed cover label over each
tag.
4) Maintenance:
 Maintenance of RFID devices is very sophisticated.
 Proper ventilation and controlling of moisture need to be maintained in the
libraries.
Conclusion
 We have learnt basics of RFID technology along with components,
standards and protocols related to implementation of the same in the
library. It is quite clear from the above discussion that an RFID system
may be a comprehensive system that addresses both the security and
materials tracking needs of a library.
 RFID in the library is not a risk, if the standards are followed
religiously, RFID speeds up circulation operations of a library along
with faster in-house operations related to inventory handling and frees the
library staff to do more productive work.
 It is important to educate library staff and library users about RFID
technology before implementing RFID System in the library.
THANKYOU

More Related Content

Similar to RFID ppt2.pptx

Wnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupamWnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupamKishor Satpathy
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersPOXO RFID AUTOMATION
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industrybizpresenter
 
DIGITAL ERA OF RFID IN LIBRARY AUTOMATION
DIGITAL ERA OF RFID IN LIBRARY AUTOMATIONDIGITAL ERA OF RFID IN LIBRARY AUTOMATION
DIGITAL ERA OF RFID IN LIBRARY AUTOMATIONIAEME Publication
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
My best effort
My best effortMy best effort
My best effortsujataray
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentationAkash Maurya
 
RFID for Modern libraries
RFID for Modern libraries RFID for Modern libraries
RFID for Modern libraries K L universityH
 
Rfid & its Implentation
Rfid & its ImplentationRfid & its Implentation
Rfid & its ImplentationSonal Tiwari
 
Library management system using rfid
Library management system using rfidLibrary management system using rfid
Library management system using rfidNaveen Sihag
 
Rfid for library management system printronix
Rfid for library management system printronixRfid for library management system printronix
Rfid for library management system printronixBlaze_Hyd
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 

Similar to RFID ppt2.pptx (20)

Wnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupamWnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupam
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturers
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industry
 
DIGITAL ERA OF RFID IN LIBRARY AUTOMATION
DIGITAL ERA OF RFID IN LIBRARY AUTOMATIONDIGITAL ERA OF RFID IN LIBRARY AUTOMATION
DIGITAL ERA OF RFID IN LIBRARY AUTOMATION
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
My best effort
My best effortMy best effort
My best effort
 
Rfid3
Rfid3Rfid3
Rfid3
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
RFID
RFIDRFID
RFID
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
RFID for Modern libraries
RFID for Modern libraries RFID for Modern libraries
RFID for Modern libraries
 
Rfid & its Implentation
Rfid & its ImplentationRfid & its Implentation
Rfid & its Implentation
 
RFID In LMS
RFID In LMSRFID In LMS
RFID In LMS
 
Library management system using rfid
Library management system using rfidLibrary management system using rfid
Library management system using rfid
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
RFID
RFIDRFID
RFID
 
Rfid for library management system printronix
Rfid for library management system printronixRfid for library management system printronix
Rfid for library management system printronix
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 

More from lisbala

SOULppt.pptx
SOULppt.pptxSOULppt.pptx
SOULppt.pptxlisbala
 
DDS.pptx
DDS.pptxDDS.pptx
DDS.pptxlisbala
 
KOHA.pptx
KOHA.pptxKOHA.pptx
KOHA.pptxlisbala
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptxlisbala
 
alerting services.pptx
alerting services.pptxalerting services.pptx
alerting services.pptxlisbala
 
MARC -21.pptx
MARC -21.pptxMARC -21.pptx
MARC -21.pptxlisbala
 
Z39.50.pptx
Z39.50.pptxZ39.50.pptx
Z39.50.pptxlisbala
 
Boolean operator.pptx
Boolean operator.pptxBoolean operator.pptx
Boolean operator.pptxlisbala
 
MGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxMGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxlisbala
 
ISO 2709.pptx
ISO 2709.pptxISO 2709.pptx
ISO 2709.pptxlisbala
 
Bibliography Services.pptx
Bibliography Services.pptxBibliography Services.pptx
Bibliography Services.pptxlisbala
 
LIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptxLIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptxlisbala
 
House keeeping operations .pptx
House keeeping operations .pptxHouse keeeping operations .pptx
House keeeping operations .pptxlisbala
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxlisbala
 
Evaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptxEvaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptxlisbala
 

More from lisbala (15)

SOULppt.pptx
SOULppt.pptxSOULppt.pptx
SOULppt.pptx
 
DDS.pptx
DDS.pptxDDS.pptx
DDS.pptx
 
KOHA.pptx
KOHA.pptxKOHA.pptx
KOHA.pptx
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
alerting services.pptx
alerting services.pptxalerting services.pptx
alerting services.pptx
 
MARC -21.pptx
MARC -21.pptxMARC -21.pptx
MARC -21.pptx
 
Z39.50.pptx
Z39.50.pptxZ39.50.pptx
Z39.50.pptx
 
Boolean operator.pptx
Boolean operator.pptxBoolean operator.pptx
Boolean operator.pptx
 
MGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxMGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptx
 
ISO 2709.pptx
ISO 2709.pptxISO 2709.pptx
ISO 2709.pptx
 
Bibliography Services.pptx
Bibliography Services.pptxBibliography Services.pptx
Bibliography Services.pptx
 
LIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptxLIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptx
 
House keeeping operations .pptx
House keeeping operations .pptxHouse keeeping operations .pptx
House keeeping operations .pptx
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
Evaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptxEvaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptx
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

RFID ppt2.pptx

  • 1. RFID (Radio Frequency Identification) Dr.P.Padma Assistant Professor DOLIS MKU
  • 2. Introduction • The rapid development in an information technology has brought out a revolutionary change in the field of library system and services. • The new information technology has changed the manual scenario of library to computerized automated library. • The RFID technology is a latest technology for automatic identification method. RFID technology is in use since the 1970s. • Today, more and more libraries are adopting RFID (Radio Frequency Identification) technologies as it streamlines workflow in the area of self service, book returns, shelf management and inventory.
  • 3. CONTD • RFID library management, using RFID tags library, is easy and convenient. A RFID library management system consists of books, each attached with an RFID tag, RFID reader, computer network and software. • In this module we will be studying the basics of RFID technology with components of RFID, learners will also be provided details on RFID technologies which can be used in Library, RFID standards and protocols for libraries, and the potential advantages and disadvantages of using RFID in libraries.
  • 4. What is RFID?  RFID means Radio frequency identification i.e. the technology that uses radio waves to automatically identify individual items.  Radio-frequency identification (RFID) is part of family of AIDC (Automatic Identification and Data Capture) technologies that includes barcodes and smart cards.  It is non-contact (wireless) use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatic identification and tracking of tags attached to objects.  The tags contain electronically stored information which can be read. A tag is constructed of a silicon microchip and is etched with antenna.
  • 5. Working on the RFID System: The working of the RFID system is as follows:  The RFID system consists of a tag and the tag is made up of a microchip with an antenna and also a reader with an antenna.  Initially, the reader transmits the electromagnetic waves.  The tag antenna receives these waves as it is received to turn the waves.  The passive tag of RFID supplies power to the circuit of the microchip as it has the feature of extracting the power.  The chip modulates the waves and after this reader transforms the waves into digital information.
  • 6. Components of RFID RFID system has mainly four components. These components are:  RFID tags  RFID readers  Antennas  RFID software
  • 7. RFID Tags  The RF tags are of various shapes and sizes as per the need of various applications.  RFID tag is the heart of the system is the RFID components, which can be fixed inside a book’s back cover or directly onto CDs and videos. This tag is equipped with a programmable chip and an antenna.  The RFID tags are two types and they are as follows:  Passive tags  Active tags
  • 8. Passive tags:  Passive tags collect energy from a nearby RFID reader’s interrogating radio waves.  The on board power is not consumed by the passive tags and these tags possess unlimited life but have the shorter range.  The limitations of these tags are that they have low information saving capacity, low output power and the small range of communication. Active tags:  Active tags have a local power source such as a battery and may operate at hundreds of meters from the RFID reader.  The active tags are the genuine transmitters of the data; these tags are more costly than the passive tags. The transmitters tend to decrease the lifetime of the active tags.
  • 9. RFID Reader  A receiver device called as reader detects the signal as soon it enters into its radio range and decodes the number for interpretation; Reader interrogates the tags and offers optimum reading performance enabling instant data capture when passed alongside the items in a continuance movement.  The devices used within the building are usually called ‘readers’ while the ones used at building exits are usually called‘ sensors’  Readers are either fixed or mobile.  Fixed readers are mounted in specific locations, and are used to track items as they move from one place to another, functioning kind of like a checkpoint.
  • 10. CONTD  Fixed readers offer convenience and consistency, tracking tag movements automatically, without human involvement.  Most mobile readers are hand-held. With handheld readers, you can scan individual items or a pallet of items on the go.  For taking a quick inventory of a room filled with RFID-tagged items, for locating a particular asset ID, and for encoding tags or updating tag details on the spot, handheld readers offer a lot of flexibility.
  • 11. Antenna  An antenna acts as a channel between the tag and the transceiver; it also controls the system’s information acquisition and information exchange.  To An antenna is connected to the reader to help to process identification of the items and activate/deactivate the tag antitheft function simultaneously.  Additional antenna can be added to increase the number of item processed in case of larger transactions.  The antenna releases radio signals for the activation of the tag and read and then write the information to it, each RFID system has minimum one antenna for the transmission and reception of the RF signals.  A RFID system may have a single antenna for both the transmission and reception or different antennas for transmitting and receiving.  The selection of the antenna is done by depending on the range, if the tag is close to the antenna then a short range antenna can be satisfied but for the long ranges, the antenna with a long range is needed.
  • 12. Software  Server on which the software that interfaces with the integrated library software is loaded.  The server is the heart of comprehensive RFID systems. It is the communication hub between various components of RFID. It receives the information from the readers and exchanges information with the library automation system database.  The standard server software includes the SIP/SIP2 (session initiation protocol), APIs (Application Programming Interface) NCIP or SLNP necessary to interface it with the integrated library software.
  • 13. RFID Use in Libraries:  Libraries around the world have already started to use RFID technologies for speedy and efficient handling of library object, inventory control, and checkout, check-in process.  In general the technology used in libraries is the same technology used in applications of passive RFID tags.  The main objectives of application of RFID in libraries is to increase efficiency and reduced cost.  Automation of day to day functionalities and self-service can help libraries for smoother functioning. It also enhances security of library materials.
  • 14. RFID Tags in Libraries  Tags can be Read Only (RO), Write Once Read Many (WORM) or Read Write (RW).  RO tags are pre-programmed with a unique number like a serial number (or may be accession number/ ISBN number).  WORM tags are pre-programmed but additional information can be added to tags.  RW tags can be updated dynamically. Most library applications use RW tags.  US based National Information Standards Organization (NISO) in its document “RFID In US Libraries” (NISO-RP-6-2012) released
  • 15. CONTD in March 2012 has made following recommendations for RFID tags to be used in libraries.  In Libraries, 13.56MHz High Frequency tags should be used.  RFID tags for library use should be passive.  The typical read range of tags for library applications should not be increased substantially beyond the present range of 8-20 inches for smaller tags in future.  The system will utilize ISO/IEC 18000-3 Mode 1 tags programmed so that they should work for identification of items in other libraries.  The system will use tags that will not interfere with the operation of security systems in other libraries.
  • 16. RFID Readers in Libraries 1) Staff Station (Conversion Station)  Library staff station unit enables library staff to check-in or check-out items for library circulation operations.  This unit also enable library staff to tag a particular item (library item or member card). It can be connected to existing hardware (PC) as a standalone solution.
  • 17. 2)Self Check-in/Check- out Station  RFID self-check-in/check-out systems provide facilities for borrowing, return and renewals of materials via RFID tags.  RFID self-check systems can safely check-out library items in one easy step by just putting the material on the station.  In the station, when the RFID tag is read, a software event occurs which changes the status of the item either checked-in or checked-out based on the operation performed. Modern check out stations also prints receipt informing the user when to return materials to the library.  Self service station can be used to check in library materials without staff assistance, where in user can directly put in his/her borrowed material.
  • 18. 3)Exit Sensors (Security Gates)  Exit sensors or security gates can be used to verify that all material leaving the library has been checked out.  Generally a security Gate is composed of two pedestals, additional pedestals can be added for increased detection surface.  Each pedestal is standalone and plug into the main power. This exit sensors can be a standalone solution or may be interfaced with library management system.  The gate detection system capable of detecting un authorized tagging items passing through it.  It has in built audio visual alert facility for theft detection and minimum read range of 36 inches.
  • 19. 4)Book-drop Station  Book-drop stations are used to automatically discharge library materials and reactivate security.  This station can be placed anywhere, within or outside the library. Library user drops the library item (book or any other material) into the slot.  The reader captures the electronic signature on the RFID tag and sends to backend system for appropriate action.  User is also acknowledged by alerting sound, light or printed receipt. Library user’s record is updated immediately in the library management system.
  • 20. 5)Sorter and Conveyor  Sorter and conveyor are combination of automated system for returning material to proper area of library.  When the library material is returned by the user by any means, it is usually placed on a conveyor which carries the item at designated location, a scanner placed at location reads the tag and decides the exact bin, where it has to be placed or dropped, when the item reaches to the correct bin it is automatically dropped to the bin using mechanical system.  If the item is reserved by someone it will get dropped to a bin designated for reserved items.
  • 21. 6)Hand-held Reader  The portable handheld reader can be moved along the items on the shelves without touching them.  The data captured by this unit can be stored in the unit itself, which can be downloaded through a software interface or it can be transmitted via wireless connection to the server.  This handheld reader can be used for inventory control (including stock verification), to locate mis-shelved library item, or tracking of library material.
  • 22. RFID Standards For Library NCIP (National Information Standards Organization Circulation Interchange Protocol)  This is a protocol that provides specifications for the exchange of messages between among computer-based applications to enable them to perform functions necessary to lend and borrow items, to provide controlled access to electronic resources, and to facilitate cooperative management of these functions.  The first edition of the NCIP (NISO Circulation Interchange Protocol) standard (version 1.00) was published as ANSI/NISO Z39.83 in 2002.  It was then revised in 2008 (version 2.00) to include greater extensibility, improved self-service and error handling, and to address issues that
  • 23. surrounded the first version of the standard.  In 2012, a new revision (version 2.02) was approved and published.  This protocol defines a collection of messages and associated rules of syntax and semantics for use by applications; to perform the functions necessary to lend items; to provide controlled access to electronic resources; and to facilitate co-operative management of these functions. ISO 180003- Mode 1  This is an ISO standard for parameters for air interface communications at13.56 MHz (High Frequency), based on which RFID hardware is being developed for usage in Library.  The standard defines communication parameters on which the tag and reader communicates with each other.
  • 24. ISO 28560-1:2011  This is a set of Information and documentation — Data model for use of radiofrequency identifier (RFID) in libraries.  ISO 28560-1:2011 specifies a model for the use of radio frequency identification (RFID) tags for items appropriate for the needs of all types of libraries, including academic, public, corporate, special and school.  This standard provides the framework to ensure interoperability between libraries in exchange of library items with RFID tags, the freedom of the library to acquire or renew equipment or library items from different vendors.  A single RFID application from the vendor's perspective’s ISO28560- 1:2011 specifies a set of data elements and general guidelines for implementation, to meet the needs for circulation, acquisition, Inter library loan process, data requirements of publishers, printers and other suppliers of library items; inventory and stock checking of items.  ISO 285601:2011 gives guidelines for item security, profiles, privacy, implementation, migration, label design and location of the RFID label.
  • 25. SIP2 Protocol  SIP2 Protocol is a communication protocol that provides a standard interface between Library Management System (LMS) and library automation devices (For Example, staff station, check-out and check-in devices).  The protocol can be used by any application that has a need to retrieve information from an LMS or process circulation transactions via the ILS.  There are two versions of SIP, version 1.0 and 2.0. SIP2 is based on a proprietary protocol, but has been opened for use by all parties providing systems for library circulation.
  • 26. Advantages of RFID in Libraries 1)Reduction of Manpower Requirement:  Use of RFID technology in a library can drastically reduce the time, being spent on circulation tasks, as RFID technology enables reading of more than one tag at a time.  Self service station can also attribute to free up man hours from this tasks.  The stock verification and other inventory control operation using RFID based handheld reader can be finished in very less time compared to traditional approach. 2) Reliability:  Correctly operating readers and tags can have near 100% detection rates.
  • 27.  The high reliability is especially important when RFID is used in theft detection. 3)Security:  RFID security and the tracking of materials throughout the library overcomes the problem of theft in the library 4)Better Inventory Control:  As stated earlier, RFID systems are having ability to scan library items on the shelves without tipping them out or removing them. A hand-held reader can be moved rapidly across a shelf of books to read all of the unique identification information.  Using wireless technology, it is possible not only to update the inventory, but also to identify items which are out of proper order.
  • 28. 5) Tag life and appearance:  RFID tag life is said to be 100,000 transactions or at least 10 years. These tags do not interfere with the appearance of the book, and can even be made to appear as a bookplate.  RFID technology is better than bar codes as it cannot be easily replicated and therefore, it increases the security of the product. RFID tags are placed inside the books and an alarm is installed at the exit doors.  The RFID tags can store data up to 2 KB whereas; the bar code has the ability to read just 10-12digits.
  • 29. Disadvantages of RFID in Libraries 1)Cost:  The major disadvantage of RFID technology is its cost. RFID is not an inexpensive technology.  Apart from tags for each library item one also needs to consider costs of self-service stations, staff readers, security gates, and hand held devices as well as cost of implementation in terms of fixing of RFID tags for each item as well as installation and integration of all equipment etc. 2) Vulnerability:  It is possible to tamper an RFID system by wrapping the metal (or aluminium) foil to block the radio signal.  It is also possible to compromise an RFID system by placing two items against one another so that one tag overlaps another, this May nullify the signals. This requires careful alignment while tagging.
  • 30. 3) Removal RFID Tags:  The RFID tags usually cannot be concealed in spine of the books and are exposed for removal.  A library can also imprint the RFID tags with its logo and make them appear to be bookplates, or it can put a printed cover label over each tag. 4) Maintenance:  Maintenance of RFID devices is very sophisticated.  Proper ventilation and controlling of moisture need to be maintained in the libraries.
  • 31. Conclusion  We have learnt basics of RFID technology along with components, standards and protocols related to implementation of the same in the library. It is quite clear from the above discussion that an RFID system may be a comprehensive system that addresses both the security and materials tracking needs of a library.  RFID in the library is not a risk, if the standards are followed religiously, RFID speeds up circulation operations of a library along with faster in-house operations related to inventory handling and frees the library staff to do more productive work.  It is important to educate library staff and library users about RFID technology before implementing RFID System in the library.