Introducing RFID system in BRAC University Library
Group Members Shahreen Shabnam ID# Md. Rabiul Awal ID# Taniya Nashin ID# Taskin Ara OrniID#
Presentation Highlights Overview of Current Library Management Systems in BRAC University Introduction of the RFID Proposed system Components and workings of the RFID System ( Hardware and Software ) How the RFID system works in Library Benefits of RFID for Library Management Criticisms of the proposed system Recommendations Conclusions
Barcode technology in use Manual operation Staff intensive Elaborate routine procedures Difficult for searching a specific book Card based issue of books Current Library Management System
Drawbacks of Barcode Technology: Barcode readers use laser technology, hence direct line-of-sight. Human intervention is required to scan barcodes. Allows scanning & reading one tag at a time, which is time consuming. Barcodes should be visible on the product for scanning. Readability of the barcode can be impaired by dirt, moisture, abrasion, any obstacle, packaging etc. Minimal reading range with holding capacity of fixed / limited data. No provision for read/write memory. Old and outdated technology Current Library Management System contd..
RFID BASICS… Non line-of-sight technology for identification of objects Bidirectional communication Long reading range Bulk detection capability Efficient inventory management Robust and reliable in tough environments Minimum vulnerability to damage Faster return on investment (ROI)
Components of RFID Library Management System
Components of RFID… RFID tags / transponder that are electronically programmed with unique information Readers or Sensors to query the tags. Antenna. Server on which the software that interfaces with the integrated library software is loaded. Other Supporting Components: 5. RFID Label Printer 6. Handheld Reader 7. Self Check Unit 8. External Book Return 9. Staff and Conversion Station
Basic RFID implementation for BRAC University Library RFID Tag for Insertion Database Server Handheld Reader for verification & Issuing Purpose Key Components
RFID LBMS Process Flow
Key components RFID Tag for Insertion Database Server Handheld Reader for verification & IssuingAnti-Theft Detection Door Advanced RFID based Library Management System for Medium sized Libraries
Process Flow
Key components RFID Tag for Insertion Database Server Surveillance Camera Handheld Reader for verification & Issuing Kiosk with PC Anti-Theft Detection Door
Process Flow
Components of RFID System ( Hardware and Software ) APPLICATION S APPLICATION
RFID TAGS RRHFT01 are rewritable passive HF Tags working on MHz frequency. Available in various types and form factors these are used for tagging library materials to uniquely identify particular tagged items using the RFID based automated library management system.
RFID Hand Held reader - Integrated with long distance laser barcode scanner and provides with handwriting input, support signature capture function A compact and light weight hand held device Comfortable to use High storage capacity Multi Functional (such as shelving, sorting, searching, weeding and reading) Enhanced Security. HARDWARE – RFID Hand held Reader
AN 480- Contains Single Port, offers maximum performance and flexibility. The antenna offers the environmental sealing required to enable indoor and outdoor use Wide frequency range Low axial ratio is nearly 50 percent lower and delivering a more uniform gain and better performance. HARDWARE – RFID Fixed reader Antenna
Security Alarm System 100% wireless configuration and installation Automatic dialing of 8 pre-set phone numbers Alarming detection area cue tone for remote monitoring Digital high-fidelity voice message recording, Interactive Monitoring Convenient operation by remote control HARDWARE – Security Alarm Systems
ERP solution + Database Maintenance A low cost ERP solution will be chosen to manage the books in an efficient way with proper maintenance of database. Software for Handheld reader This software is used to search the books, issue the books and for the audit of the books. Software for Fixed reader This software is used for theft detection and the alarm goes ON if any such case of theft detected. App for Sequence tag generation with encryption facility (EPC Generation) This software generates EPC and prints the same onto the labels. SOFTWARE
Digital surveillance DVR kit - Contains DVR, 4 cameras and a Monitor with cables. Long time recording of the data Break-ins and Theft Interactive Monitoring It provides necessary protection and security to the university library HARDWARE – CCTV surveillance and DVR
How it works? Reading the information, it is sent to the conversion unit In conversion unit code is divided into material id and use rid. However conversion unit is a software which is capable of reading data from the tag through the reader and write the data into the tag from the database. Then conversion unit decrypts the code the information regarding the user and the material will be invoked Lastly depending on the transactions made by the user, the information in the tag will be modified.
Algorithm The information of tag contains Material id and User id Reader reads the information from the tag User id will be decrypted by using a relevant decryption algorithm The database checks the user is authorized or not The corresponding transaction will be made After the transaction is completed the user id is encrypted and is read into the tag
Transactions Three cases arise, which are dealt as follows: If the material is to be returned to the library… If the material is to be retained by the old user, then no change is to be made in the user id part If the material is to be issued to a new user then the user id should be updated
BENEFITS OF USING RFID IN LBMS Library: Stock management Flexibility and modularity Library Staff: Reduction of staff duties Reduction of staff injuries Patrons: Will spend less time RFID enabled patron cards allows for easy patron identification
Limitations of RFID in Library use Inadequate expertise and professional advice Unreliable power supply Reader collision Tag collision Lack of Standard High Set-up Costs. Security Issues Susceptibility of tags Perceived Invasion of Patron Privacy
Recommendations on the implementation of RFID in library Considering system’s lifetime for cost and pricing Using reusable active RFID tags Integration among stakeholder RFID Standards and appropriate software and hardware Training of staff Process planning Privacy concerns of patrons Finally Leads to Best Practices for Libraries……
RFID technology is taking off in libraries at an increasingly rapid pace. It is easy to envision that, the RFID tag contents will increase in power, prices are expected to decline and tag will dramatically improve its efficiency, security and accuracy. CONCLUSION