RFID Card
  
Jcop Card&Java Card
bg pic Home      About Us       Products      Application      News      FAQ      Contact Us bg pic
 
Find My Card
RFID Card
- LF 125KHz Card
- HF 13.56Mhz Card
- UHF 860-960Mhz Card
- Rewritbale Surface Card
- RFID Wood Card
- Cashless Payment Systems
- RFID Blocking Cards
RFID Tag
- RFID Keyfob
- RFID Wristbands
- Animal Tag
- RFID Epoxy Keyfob
- Laundry Tag
- Anti-Metal Label
- RFID Tire Tag
- RFID Coin Tag/Disc Tag
- RFID Label With Adhesive
- Self Destructible Label
- RFID Jewelry Label
- UHF Washable Label
- Fragil Anti-tamper Label
- Fabric Laundry Tag
- Polyimide Inlay Tag
- RFID PCB Tag
- FPC RFID Inlay
- Cartoon RFID Tag
- RFID Security Seals
- Brick Tag (Wedge Tag)
- Flexible RFID Tag
- Mifare Metal Tag
UHF Anti-metal Tag
- Flexible UHF Metal Label
- High temperature Metal Tag
- FR4 UHF Metal Tag
- Mini UHF Metal Tag
- UHF Ceramic Tag
- Long Distance UHF Metal Tag
Smart Card
- Contact IC Card
- Java Card/JCOP Card
- EMTG97-3 Card
RFID Inlay
- RFID Prelam Sheet
- Large Format RFID Inlay
- HF Inlay & Antenna
- UHF Inlay & Antenna
NFC Tag
- NFC Smart Ring
RFID Reader
- OPD01 Desktop RFID Reader
- OPD02 Desktop RFID Reader
- OPD03 Desktop RFID Reader
- OPD04 Desktop RFID Reader
- OPD06 Desktop RFID Reader
- OPD07 Desktop RFID Reader
- ISO14443A Reader/Writer
- ISO15693 Reader/Writer
- ACR122U NFC Reader
- ACR38 Smart Card Reader
- OPP9918 Handheld Reader
- OPX10 Handheld Reader
- OPP101 UHF Fixed Reader
- OP401 UHF Fixed Reader
- OP801 UHF Fixed Reader
- OP1601 UHF Fixed Reader
- Industrial Tablet PC
- Industrial PDA OP9908
- 8dpi UHF RFID Reader
- 12dbi UHF RFID Reader
Plastic Card
Cleaning Card
NXP Product Overview
 
Home > RFID News > Industry News

RFID Technology Application in Libraries & RFID library management system

2016-11-10 View:
RFID means Radio frequency identification i.e. the technology that uses radio waves to automatically identify individual items. The objective of any RFID system is to carry data in suitable transponders, generally known as tags and to retrieve data, by machine readable means, at a suitable time and place and to satisfy particular application needs RFID is one of the most technologies being adopted by both industry and academic world. Modern academic library is a place where millions of books advanced; periodicals,CDs, DVDs and other electronic reading materials are contained. It is a challenge to
manage for librarians, managing such type of huge collection.

RFID technology is in use since the 1970s. RFID tags can be active, semi-passive and passive. It is a small device that can store information. Passive tags don't have internal batteries. RFID reader is a device that can receive and transmit a radio signal. It is built to encode data stored in the tag's microprocessor. Because of the higher cost, active and semi-passive RFID tags are used for valuable asset tracking. The passive RFID tags are used in RFID library management systems.

RFID library management, using RFID tags library, is easy and convenient. A RFID library management system consists of books, each attached with an RFID tag, RFID reader, computer network and software. Library staff handle lending, returning, sorting,tagging etc. of books, using RFID tags in this library system. A person can locate RFID library books marked with a RFID tags, using the RFID reader which identifies and locates the book. When the book is carried to the counter, the library staff can either activate or deactivate the electronic article surveillance bit in the book's tag. If a book is borrowed, then the surveillance bit is deactivated.

RFID LIBRARY MANAGEMENT SYSTEM
Using RFID in libraries saves library staff's time by automatizing their tasks. An establishment that uses RFID library management saves a book reader, precious time that he would have been spent, waiting for his turn in a queue for borrowing or returning a book. Taking care of books and making them available to the book readers are important tasks. Most of the library staff's time is spent in recording information of incoming and
outgoing books.Borrowing and returning of books can be fully automatized with the help of self checkin/out
systems. This system involves installation of special software. A person using this system to borrow books, is presented with options on a computer screen. The person has to identify himself with a code, which is preferably a personal identification number, or any form of unique identity code. Books selected by the person are identified by the system's built-in RFID reader. And, the surveillance bit in the book's tag is deactivated by the system. When a book is returned, the check-in/out system activates the surveillance bit.

Application in RFID Library Management System
1. Book Drops: The Book Drops can be located anywhere, within or outside the library. Possible remote locations outside the library include MRT/train stations,shopping centers, schools, etc. This offers unprecedented flexibility and convenience of returning library items at anytime of the day, even when the library is closed.

2. RFID Transponder or Tagging: It is the most important link in any RFID system. It has the ability to store information relating to the specific item to which they are attached, rewrite again without any requirement for contact or line of sight. Data within a tag may provide identification for an item, proof of ownership, original storage location, loan status and history.RFID tags have been specifically designed to be affixed into library media,including books, CDs, DVDs and tapes.

3. Counter Station is a staff assisted station on services such as loan, return,tagging, sorting and etc. It is loaded with arming/disarming module, tagging module and sorting module. Arming/Disarming module allows EAS (Electronic Article Surveillance) bit inside the tag of the library material to be set/reset so as to trigger/not trigger the alarm of the EAS gate.

4. The Patron self check-out station: It is basically a computer with a touch screen and a built-in RFID reader, plus special software for personal identification, book and other media handling and circulation. After identifying the patron with a library ID card, a barcode card, or his personal ID number (PIN), the patron is asked to choose the next action (check-out of one or several books). After choosing check-out , the patron puts the book(s) in front of the screen on the RFID reader and the display will show the book title and its ID number (other optional
information can be shown if desired) which have been checked out.

5. Shelf Management: This solution makes locating and identifying items on the shelves an easy task for librarians. It comprises basically of a portable scanner and a base station.The solution is designed to cover three main requirements:
* Search for individual books requested
* Inventory check of the whole library stock
* Search for books which are miss-helved

6. Anti-theft Detection: RFID EAS Gates is the anti-theft part of the Library RFID Management System using the same RFID tags embedded in the library items.Each lane is able to track items of about 1 meter and would trigger the alarm system when an un-borrowed item passed through them. The alarm will sound and lights on the gate will flash as patron passes through with the un-borrowed library material.

Important points based on RFID Library Management System
1. RFID tags replace both the EM security strips and Barcode.
2. Simplify patron self check-out / check-in.
3. Ability to handle material without exception for video and audio tapes. 
4. Radio Frequency anti-theft detection is innovative and safe.
5. High-speed inventory and identify items which are out of proper order.
6. Long-term development guarantee when using Open Standard.

COMPONENTS OF AN RFID SYSTEM
RFID system has mainly four components:
1. RFID tags / transponder that are electronically programmed with unique information
2. Readers or Sensors to query the tags.
3. Antenna.
4. Server on which the software that interfaces with the integrated library software is loaded.
5. RFID Label Printer
6. Handheld Reader
7. Self Check Unit
8. External Book Return
9. Staff and Conversion Station

1. Tags: RFID tag is the heart of the system is the RFID tag, which can be fixed inside a book’s back cover or directly onto CDs and vidios. This tag is equipped with a programmable chip and an antenna.Each paper thin tag contains an engraved antenna and a microchip with a capacity of at least 64 bits. These are three types of tags ‘read only’, ‘WORM’, and‘read/write’. Tags are read only if the identification is encoded at the time of manufacture and not rewritable ‘WORM’ (write once read many) tags are programmed by the using organization, but without the ability to rewrite them later ‘Read/Write tags’ which are chosen by most libraries, can have information changed or added. In libraries using RFID is common to have part of the read/write tag secured against rewriting e.g. the identification number of the item.

2. Readers: A receiver device called as reader detects the signal as soon it enters into its radio range and decodes the number for interpretation; Reader interrogates the tags and offers optimum reading performance enabling instant data capture when passed alongside the items in a continuance movement. The devices used within
the building are usually called ‘readers’ while the ones used at building exits are usually called ‘sensors’.

3. Antenna: An antenna is connected to the reader to help to process identification of the items and activate/deactivate the tag antitheft function simultaneously. Additional antenna can be added to increase the number of item processed in case of larger transactions.

4. Server: The server is the heart of some comprehensive RFID systems. It is the communication gateway among the various components. It receives the information from one or more of the readers and exchange information with the circulation database. Its software include the SIP/SIP2 (session initiation protocol), APIs (Application Programming Interface) NCIP or SLNP necessary to interface it with the integrated library software

5. RFID Label Printer: Used to Print the labels

6. Handheld reader: It can be moved along the items on the shelves without touching them. It used in stock verification, used in search for book-misshelved, search for individual book on request.

7. Shelf Check Unit: Users identification is done with an RFID-ID card. Users can put item onto the reader surface in front of the self check unit to be registered under particular user’s name. Multiple items can be checked out at the same time.

8. External Book Return/book Drop Station: Libraries can offer a distinct service, such as ability to return the books when library is closed. It is machine with a slot with a chip RFID Reader integrated into a wall. User identifies him or her then puts the Books into the Slot. Upon Completion of return, user gets a Receipt showing how
many and which books are returned.

9. Staff and Conversion Station: Staff station consists of antenna, electronic Module and power supply. There are additional software windows Integrated into library management Systems.

Benefits of RFID use in Library
* RFID improves library workflow by
* reducing non-value added work processes
* Improves staff productivity
* Improves customer service
* Assist inventory check with ease.
* Easy book identification for shelving process
* Assist traceability of book allocation
* Enhance book return processes by full automation of check-in, EAS activation and system updates completed simultaneously in the self-return chute
* Allow better accuracy in book collection management, resulting in reduced book purchase
* More than one item can be checked out or checked in at the same time.
* Items can be placed on reader without careful placement that it is required for line of sight system (bar code scanner)
* Faster inventory process.
* Ability to locate specific items.

Advantages of RFID in Libraries:
The use of RFID reduces the amount of time required to perform Circulation operations. The most significant time saving with bootable to the fact that information can be read from RFID tags much faster than form barcodes and that served items in the stack can be read at the same time.
* Self charging discharging
* Reliability
* Streamlined Inventory Management
* Longitivity of Tag life
* Faster Circulation
 Reduction in workplace injuries
* Automated materials handling
* Easy stock verification
* Theft reduction
* High level of security
* Mis-shelve easy identification
* External Book Return
* Improved tracking of high value items
* Reduce Shrinkage errors
* Technology standards to drive down cost
* Reduce materials cost and handling
* Automated issue/return
* Automated sorting of books on return
* Inventory visibility accuracy and efficiency
* Improved Production planning
* Ability to manage the expenses over a number of years.
* RFID tags are very simple to install/inject inside the body of animals, thus helping to keep a track on them. This is useful in animal husbandry and on poultry farms.
* RFID technology is better than bar codes as it cannot be easily replicated and therefore, it increases the security of the product.
* Barcode scanners have repeatedly failed in providing security to books and journals in libraries. But nowadays, RFID tags are placed inside the books and an alarm is installed at the exit doors.
* The RFID tags can store data up to 2 KB whereas, the bar code has the ability to read just 10-12 digits.

Disadvantages of RFID in Libraries:
* High Cost
* Frequency Block
* Chances of removal of exposed tags exit gate sensor problems
* User Privacy concern
* Reader collision
* Tag collision
* Interoperability

 
     
        Copyright | Privacy Statement | RFID Solution | RFID Knowledge | RFID products Shop | Sitemap
German Spanish French Greek Italia Japanese Dutch Polish Portuguese Russian English facebook googleplus twitter
        A smart card is a small plastic card containing a computer chip. People use smart cards along with personal identification numbers (PINs) to log on to a network, a computer, or a device. Using a smart card is more secure than using a password because it's more difficult for someone to steal a smart card and learn your PIN than to learn your password.Smart cards are generally issued by information technology (IT) departments in large organizations. To use a smart card, you also need a smart card reader—a device that’s installed in or connected to your computer and that can read the information stored on a smart card.