radio detection system for information handling

21
SEMINAR REPORT ON COMPUTERIZED LIBRARY SYSTEM

Upload: shweta-bidhan

Post on 27-Oct-2014

16 views

Category:

Documents


1 download

TRANSCRIPT

SEMINAR REPORT

ON

COMPUTERIZED LIBRARY SYSTEM

SUBMITTED TO: SUBMITTED BY: SIR UMESH VATS NIKHIL

CLASS :- M.C.A 1 ST SEM ROLL NO :- M 04/039

KURUKSHETRA UNIVERSITY KURUKSHETRA

NEMI CHAND COLLEGE OF ENGINEERING (ISRANA) PANIPAT

2

CONTENTS

1. INTRODUCTION2. ISSUES FACED BY LIBRARIES3. COMPONENTS OF RFID SYSTEM4. USE OF RFID SYSTEM5. RFID SYSTEM IN LIBRARIES6. RFID CYCLE AT LIBRARY7. COMPARISON WITH BAR –CODE8. CONCLUSION9. REFRENCES

3

1. INTRODUCTION :

Radio frequency identification (RFID) system is a flexible technology that is convenient, easy to use and well suited for automatic operation. It combines advantages not available with other identification technologies. RFID does not require contact or line of sight to operate, can function under a variety of environmental conditions, and provides a high level of data integrity. In addition, since the technology is difficult to counterfeit, RFID provides a high level of security.

4

2. ISSUES FACED BY LIBRARIES:

Nowadays libraries are facing following issues: Rising labour costs Need to improve customer service Increased material handling time/cost Increasing theft of CDs, DVDs and books Mis-shelved books Poor inventory accuracy Lack of security arrangements

3. COMPONENTS OF RFID SYSTEM:A basic RFID system consists of the following physical components: An RFID device (transponder or tag) that contains data about

an item/bookAntennas or sensors used to transmit the RF signals between reader (server)and the RFID deviceA reader (server) to receive and decode the information ,andTo communicate with automated library system.

5

3.1 Transponder/tag: Historically an RFID device that did not actively transmit to a reader was known as tag . An RFID that actively transmitted information to a reader was known as a transponder (TRANSmitter+resPONDER). However, it has become common within the industry to interchange the terminology and refer to these devices as either tags or transponder. The tags are programmed with data that identifies the item to which the tag is attached. Tags can be read only, volatile read/write, or write once/ read many (worm). It can be either active or passive. RFID comes in variety of shapes and sizes.The active RFID tags are powered by a battery and are typically read/write, tag data can be rewritten and/or modified. Active tag’s memory size varies according application requirements; some system state with up to 1MB of memory. Tag has three memory components: Item identification (bar code) number. Security bit that is turned off and on as the item is checked out or checked

in. Variable memory that can be used for sorting.A typical read/write RFID work in process system, a tag might give a machine a set of instructions, and the machine would then report its performance to tag. This enclosed data would then become the tagged part’s history. The battery-supplied power of an active tag generally gives it a longer read range. Figure shows the front view and back view of an RFID tag. Each passive thin tag contains a microchip with a capacity of least 96 bits .The tags can be permanently activated or they can be read/write. In the former case, the tag usually continues only a unique identifier for the item.With read write tags other information can be stored up to the capacity of the tag . This information can be changed.

6

3.2 ANTENNAS: A typical RFID system includes several different kinds of antennas, also known as sensors, interrogators or reader. These are radio frequency devices designed to detect and read the intelligent tags to obtain the information stored thereon. The antennas generate a field of power to read the tags with in the range. Each tag generates its own signal for its unique data. The antennae can be used for the circulation desk check-out, book return check in and long range walkthrough devices to detect and interrogate an RFID tag passage for purposes of determining whether it is checked or unchecked i.e.(authorized/no alarm or unaut -horised/alarm)event, it is also possible to read a no of items on the shelve for purpose of locating missing or misplaced items using a portable hand hold scanning gun.Circulation desk check out units (equipment to charge and discharge the tags) can be placed on the circulation counter or built in. Discharg -ing can be done on the same units, or on one or more dedicated units away from the service counter. 3.3 server:The server is a heart of the comprehensive RFID system .it is the communication gateway among the various components. It receives the information from the antennas and exchange information with the circu –lation database. Its software should include the application program -ming interface necessary to link it with the automated library system. The server should typically include a transaction database so that the reports can be produced.

7

4 . USE OF RFID SYSTEM : The RFID system reduces the amount of time require to perform the circulation operations.The most significant time savings are attributable to the fact that several items in the stack can be grabbed at the same time.The one problem that remains is of the books on which the tag is not pasted correctly or the data in the tags is not filled correctly .The other time saving realized by the staff modest unless the RFID tags replaces both the bar codes or rf tags (used in older theft detection systems)And bar codes used by the automated library system.the RFID system is a comprehensive system which combines circulation and security appli -cation. Security gate with exit control, work as interface to the circul –ation system that can identify the items moving out of the library.

The greatest advantage of RFID tracking system is their ability to scan books on shelves without tipping them out or removing them Hand held inventory recorder can be moved rapidly across the shelves of books to collect all of the unique identification information from the tags. Using wireless technology, it is possible to not only to update the inventory, but also to identify the items, which are out of order.With the up coming better detector it would be possible to locate the book inside the library by sitting on circulation desk and then guide the user to it.This can in a way, over come the problem of depth classification or shelving of books by call number in a library system as the book can be easily traced from large collection of documents and can be automatically sorted shelved and retrived,as and when desired.

8

5 LIBRARIES RFID SYSTEM IN : The RFID system in libraries can have three components: Labels and hard tags- electronic sensors that are attached to the

documents. Equipments/gadget to deactivate and detach- used at the circulation table

to electronically deactivate labels as books are issued or detach tag if needed ; and

Detectors that create surveillance zone at exits or checkout aisles.

The surveillance begins by attaching labels or hard tags to the document. When a book is issued, the label is deactivated.However, if document with an active label or hard tag carried past the detector security gate, an alarm sounds.

5.1 TAG FUNCTIONALITY: Some tags can only be written to once that is, once the tag is programmed, the information stored in the tag’s memory can’t be changed. Alternatively, information stored in the memory of read/write tags can be used as required & these are the tags suitable for library uses for regular automated circulation job pooled with security. Almost all RFID tags of the recent time in the library market are also available with the feature of anti collision i.e.the reader has the ability to read several tags simultaneously. However, the performance of tags varies depending upon speed at which this can be performed by server and the total no. Of tags can be read.

9

5.2 ELECTRONIC DOCUMENT SURVEILLANCE MECHANISM:

As motioned, RFID system can be used to prevent theft in the library. The security mechanism may be integrated into the chip itself, or security gates may be linked to a separate server, which interrogates the database to conclude whether an alarm to be triggered. Electronic documents surveillance is a system that protects books, CDs, micro filmsEtc. , from undesirable social activities , such as theft hiding of books , or dislocation from their proper shelf . The physics of a particular tag & resultant surveillance technology determines which frequency range is used to create the surveillance area.The system ranges from very low frequencies through the radio frequency range.

6 RFID CYCLE AT LIBRARY:

6.1 . TAGGING IN BOOK:

The RFID tags is sticks on the book & scan by the equipment at tagging station which intern captures the data about the book from the library data base & security will automatically be activated. Then book is placed on the shelf.6.2 CHECK OUT BY STAFF:The books can also be issued by library staff just by putting the book on the equipment that will deactivate & database will be updated.

6.3. CIRCULATION STATION:

10

If there is no one available on the circulation counter to issue the books there can be an optional device ‘self check out station’, on which library materials placed in any orientation may be checked out one at a time or books stacked upto 6’’ high may be checked out all at the same time. Data base gets automatically updated.Tag’s security bit is deactivated.6.4. SECURITY GATES:For theft detection security gates will sound an alarm if any tag is not deactivated & passed through it, security system does not require a link to the central database.6.5. MATERIAL RETURN : To return the book, if the staff is not available at the circulation counter the book can be just dropped in the drop box equipment, which will activate the security bit of tag, & the database, will be automatically updated.6.6. STOCK VERIFICATION:For verifying the books in library, a light weight handled device can read tags embedded on the books just as they are on shelves at a rate of 12 per second .The server attached with the scanner can be programmed to search for missing book.

7.COMPARISON WITH BAR-CODE: The RFID system is similar in concept to bar coding. Bar code system use a reader and coded labels that are attached to an item, whereas RFID uses a reader and special RFID device/tag which is attached to an item. Bar coded uses an optical signals to transfer information from the labels to the reader; RFID uses RF signals to transfer information from the RFID device to the reader/server. Since RFID device does not require line of sight between the transponder and the reader, these systems overcome the limitations of other automatic identification approaches such as bar coding. The RFID system works

11

effectively in environment where excessive dust, dirt, moisture and /or poor visibility normally hamper and rapid identification. One outstanding benefit of RFID is its ability to read through these environments at remarkable speed –responding in less than hundred milliseconds in most cases. Further more RFID is completely automatic and transparent, eliminating the need to scan and object manually or activate a magnetic tape, reader, or other contact ID technology. The advantages of RFID over traditional bar code are shown in table:Table1. Advantages of the RFIDCHARACTERISTICS BAR CODE RFID

LINE OF SIGHT REQUIRED NOT REQUIREDORIENTATION SPECIFIC ANYWHILE MOVING NOT SUPPORT POSSIBLESEVERAL AT A TIME NOT POSSIBLE POSSIBLEDISTANCES IN CMS. METERSSCANNING DONE MANNUALLY AUTOMATICDATA ENTRY CAN BE AUTOMATIC AUTOMATICSCAN SPEED FAST FASTER THAN

BAR CODE

The RFID system improves library workflow, staff productivity and customer service with these attributes. However the ability to conduct inventory counts without removing a single book from the shelves is what really separates RFID from preceding technologies such as bar codes.

12

CONCLUSION

Developments in RFID technology continue to yield larger memory capacities, wider reading ranges, and faster processing. The technology has the potential to ultimately replace barcode. Even through with inevitable reduction in raw materials coupled with economics of scale, the integrated circuit in RF tag will never be as cost effective as barcode label but the overall benefits achieved from an RFID will definitely outscore a barcode system. The RFID will continue to grow in its established niches where barcode or other optical technologies are not effective and the spin off benefits from the RFID system is immense.

13

REFERENCES:

1. Finkenzeller, Kalus, RFID handbook-fundamentals and applications in contactless smart cards & identification, 2003.

2. http://www.aimglobal.org/technologies/rfid

3. http://archive.pla.org/publications/technotes/technotes_rfid.html2 . *********************

14

ACKNOWLEDGEMENT

This seminar report would not have been possible for me without the contribution of many friends, teachers and cousins I would like to acknowledge the help of those people who helped in getting this report completed.

First of all I would like to thank my GOD who had given me the inspiration at all the times and was with me in every difficulty I faced.

I would like to convey my thanks to Head of the Comp. Department Mr. R.K TUTEJA & Mr. Umesh vats N.C. COLLEGE, Panipat for his kind guidance.

NIKHIL

15