ABSTRACT:
RFID technology is a key to automate everthing.It has emerged as a hottest information tracking and identifying technology with tremondous potential applications.The technology also provides significant advantages over traditional object-tracking technologies and is increasingly adopted and deployed in real applications. This paper gives a brief introduction about RFID, followed by a comparision between RFID and other identification technologies. The paper discusses the applications of RFID technology and then a case study that involves RFID technology in library management system with a database developed using visual basics.This case study provides an efficient technique for managing a library with a large amount of books and a lot of readers. In addition to this, the paper also provides a RFID -based technique for theft detection in libraries.
INTRODUCTION:
The term RFID is becoming fairly common in all areas.RFID stands for Radio frequency identification. Radio frequency Identification is a method of capturing data about an object without using a human to read the data.
The concept of using Radio Frequency to identify objects dates back to World War II when the Radio Frequency (RF) was used by the people of England to distinguish between returning English airplanes and the German ones. IFF or Identification Friend or Foe is another area where a device aboard an aircraft is queried by a ground based device.
The returned reply contains a code which identifies the aircraft as a 'friendly' one. If the code is wrong, the ground control system treats the intruding aircraft as potentially hostile. RFID technology captures data using tiny tracking chips that are affixed to products.
RFID applications range from potential areas such as security, manufacturing, logistics, animal tagging, waste management, postal tracking to airline baggage and road toll management.
HISTORY OF RFID:
Radio Frequency Identification (RFID) is an automatic identification method, using handheld reader or another device with which you can read and store remotely and retrieving data. The RFID History starts with energy as the source of RFID.
In 1945 Leon Theremin invented an espionage tool for the Soviet government which retransmitted incident radio waves with audio information. Even though this device was a passive covert listening device, not an identification tag, it has been attributed as the first known device and a predecessor to RFID technology. The technology used in RFID has been around since the early 1920s according to one source (although the same source states that RFID systems have been around just since the late 1960s).
DIFFERENCE BETWEEN BARCODES AND RFID:
The bar codes and RFID both belong to a group of technologies called Automatic Identification and Data Capture. Along with Smart cards, and Magnetic Stripe technology and a host of others, this is a method of automating our need for data, We have all become very aware of bar codes as they have permeated our existence in the last 25 years. In fact, it is tough to buy something in a store that does not use bar codes these days.
But bar codes have four disadvantages that it would be nice to eliminate:
#You are able to see them.
#The bar code cannot be written on or defaced.
#You cannot change the data once they are printed.
#They take up space on the object they are printed.
There are two areas where bar codes do not perform well at all
#Changing data.
#Harsh environments.
Once you have printed a bar code, that’s it you can't change it. You can always print a new one, but you cannot change the first one.
RFID TECHNOLOGY:
A typical RFID system consists of an antenna and transceiver and transponder (RF tag). The transceiver reads the radio frequency and transfers information to a processing device. The transponder or RFID tag is an integrated circuit that contains information to be transmitted. RFID technology uses radio waves for identification. An RFID tag is made up of a chip and antenna. The antenna allows the chip to transmit the information that is used for identification. The reader sends electromagnetic waves, which are received by the tag antenna.
RFID TRANSPONDER:
RFID Tag consists of an integrated circuit and an antenna combined to form a transponder. RFID tags collect the energy to operate from a Radio Frequency (RF) field emitted by a reader device; therefore they do not need a battery.
When energized by a radio signal from a fixed position reader or handheld scanner, the tag returns the stored information in order that the item to which it is attached can be easily located.The chip also has a "multi-read" function, which means that several tags can be read at once.
RFID tags have been specifically designed to be affixed into library media, including books, CDs, DVDs and tapes. It is thin, flexible and thus can be laminated between paper and plastic. With special method to attach to books, patron is totally unaware that the tag is there. The commercially available RFID products using passive RFID tags are thinner than a sheet of paper.
Active RFID tags have their own power source that enables longer range frequency as well as larger memory capacity. This allows it to store additional information. A typical RFID active tag has a battery life of several years. Passive RFID tags are more commonly available on account of their cheaper cost of manufacture.
Active RFID tags are used to track high-value goods that need scanning over long ranges. A read-only RFID tag does not allow for any change to the information stored on it. Read-write RFID tag allows additional information to be added on to it.
Advantages:
● No line of sight needed
● Allows to check-out and check-in several items simultaneously
● Information directly attached to product
● Performing both identification and antitheft in one single operation
● Different shape and sizes available
● Able to tag almost anything
● Accelerate scanning and identifying
RFID tags have the capability to have the data changed on them many times depending on the specific type. You can store information and update it as a tag moves through a process, keeping the important information with the tag (and the item) and so making it available at any point in its life.
Now some items do not need information changed frequently and this may well be an example of when a bar code will do the job needed.
ILLUSTRATION:
Let’s consider an operation where an item is moved through a series of processes along a "conveyer belt" system. At each station, the item is taken off the belt and an operation is performed on the item. It is then returned to the belt to move on to the next station. The item has a bar code on it, and at each station the bar code is read as it enters the station and again as it leaves. The work done is recorded on the central database system. The operator has to move the item to the reader (or the reader to the item) twice at each station.
Now let’s think about an RFID system in this situation. The items all have a tag attached instead of a bar code label. The reader is setup to cover the access to the belt, such that the operator must remove the item through the reader’s window when it is removed and replaced.
Because the reader is able to sense the tag in any orientation, it is not necessary for the operator to swivel the item to get a good read. As the item is replaced on the belt, the tag is updated with the latest information about the work in progress.
Think about the time savings alone when the operator does not have to manipulate the item to a scanner. Think about the benefits of using a portable reader to interrogate the work in progress at any time.Now coming to the harsh environment. The same tag will work in most situations, hot, cold, dirty etc. where a standard bar code label might have problems (direct thermal printed labels don’t like the heat too much) and so give the flexibility needed to incorporate into a total system.
APPLICATION OF RFID TECHNOLOGY:
Manufacturing:
RFID technology provides an easy way to manage a huge and laborious manufacturing process.
It offers all the benefits of small production parts to batch, processes and manufacturing.This type of process helps in better analysis, reduce and eliminate bottlenecks, reduced time in locating parts and products and production process based sensors can be installed to alert any anomalies.
Aerospace:
Aerospace industry and Department of Defense have a lot to gain from RFID integration into their production and process lines. Boeing and airbus, according to the direction of US Federal Aviation Administration, make it mandatory to put an appropriate tracking mechanism to track the aircraft parts.
Asset Tracking:
Static or in-motion assets tracking or locating, like a health care facility, wheelchairs or IV pumps in, laptops in a corporation and servers in a data center, was not so easy task. User can instantly determine the general location of tagged assets anywhere within the facility with the help of active RFID technology.
People Tracking:
People tracking system are used in hospitals and jails. Hospital uses RFID tags for tracking their special patients. In emergency patient and other essential equipment can easily track.It will be every useful in mental care hospitals where doctors can track each andevery activity of the patient.
Hospitals also use these RFID tags for locating and tracking all the activities of the newly born babies. The best use of the people tracking system will be in jails. It becomes an easy tracking system to track their inmates. Many jails of different US states like Michigan, California, and Arizona are already using RFID-tracking systems to keep a close eye on jail inmates.
Government Library:
Many government libraries use barcode and electromagnetic strips to track various assets. RFID technology uses for reading these barcodes unlike the self-barcode reader RFID powered barcode reader can read multiple items simultaneously.
This reduces queues and increases the number of customers using self-check, which in turn will reduce the staff necessary at the circulation desks.
CASE STUDY
LIBRARY MANAGMENT SYSTEM:
RFID is the latest technology to be used in library theft detection systems. Unlike EM (Electro-Mechanical) and RF (Radio Frequency) systems, which have been used in libraries for decades, RFID based systems move beyond security to become tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster charge and discharge, inventorying, and materials handling. RFID is a combination of radio-frequency based technology and microchip technology.
The information contained on microchips in the tags affixed to library materials is read using radio frequency technology regardless of item orientation or alignment and distance from the item is not a critical factor except in the case of extra-wide exit gates.
The corridors at the building exit can be as wide as four feet because the tags can be read at a distance of up to two feet by each of two parallel exit sensors.
The targets used in RFID systems can replace both EM or RF theft detection targets and barcodes.
Reason for RFID in libraries:
● RFID tags replace both the EM security strips and Barcode.
● Simplify patron self check-out / check-in.
● Ability to handle material without exception for video and audio tapes.
● Radio Frequency anti-theft detection is innovative and safe.
● High-speed inventory and identify items which are out of proper order.
● Long-term development guarantee when using Open Standard.
Four Phases of Library RFID Management System:
● Library Security System Only.
● Support Library Circulation
● Patron Self Check-in/Check-out
● Smart and Quick Inventory
Library Security System Only:
This phase uses RFID Tag to replace EM Security Stripe.It involves Radio Frequency Detection and replacement of the EM Anti-theft system to avoid the high volume EM field harm human body and without False Alarm.
Support Library Circulation:
This phase uses an RFID tag which replaces the barcode in Circulation process.It involves reading book’s access number from RFID than from barcode to borrow and return the book. No line of sight is needed.Also allows to check-out and check-in several items simultaneously .In addition to this it performing both identification and antitheft in one single operation
Patron Self Check-in/Check-out:
This phase allows the patron to do the check-out and check-in process of books.
Benefit to Librarian:
● Speeds up book check-in / check-out
● Frees staff to better service patrons
● Better space planning.
Benefit to patron:
● Easy to use: books can be read in any orientation
● Reduces queuing time
● Provides patron privacy
Smart and Quick Inventory: This phase searches by reading the RFID using portable reader and portable computer.The key functions of this phase are
• Quick inventory
• Look up the misplace material
• Search for certain material
Counter Station:
The Counter Station is a staff assisted station on services such as loan, return, tagging, sorting and etc. It is loaded with arming or disarming module, tagging module and sorting module. Arming orDisarming module allows EAS (Electronic Article Surveillance) bit inside the tag of the library material to be set/reset so as to trigger/not trigger the alarm of the EAS gate. Checking of EAS status of library material is easy. The staff puts the item on the reader and click on the view to display the information stored inside the tag and status of EAS.
Together with circulation module from Library Automation Software, this station is used for the following services:
● Editing and updating of patron’s record
● Add and deleting of patron’s record
● Generate loan history for a particular patrons
● Managing of fines incurred by the patron
● Arm/Disarm of EAS bit inside the library material
● Program of new library material
● Sort item in accordance to their branch and category number
The features of this station depend on the module loaded by the Library Automation Software.
Self check out / in Station:
The Patron Self Check-out station is basically a computer with a touch screen and a built-in RFID reader, plus special software for personal identification, book and other media handling and circulation. After identifying the patron with a library ID card, a barcode card, or his personal ID number (PIN), the patron is asked to choose the next action (check-out of one or several books). After choosing check-out , the patron puts the book(s) in front of the screen on the RFID reader and the display will show the book title and its ID number (other optional information can be shown if desired) which have been checked out.
The patron then confirms that he has finished the check-out process and a receipt is printed, showing which books have been borrowed and the return date. The RFID tag in the book is set on quiet as a result no alarm will go off at the EAS gates. It is also possible to use the station for Check-In (return) of books. In this case the patron identifies herself, chooses return and then puts one book or a stack of books onto the reader. She will receive a receipt. If the books were to be taken through the gate now, an alarm would sound.
Advantages:
To Librarian:
● Speeds up book check-in / check-out
● Frees staff to better service patrons
● Better space planning
● Increases membership rate
To Patrons:
● Easy to use: books can be read in any orientation
● Reduces queuing time
● Provides patron privacy
● Encourages patrons to come back
Book Drop:
The Book Drops can be located anywhere, within or outside the library.This offers unprecedented flexibility and convenience of returning library items at anytime of the day, even when the library is closed. Patron inserts the library item into the slot. The reader captures the electronic signature and sends to backend system for loan cancellation.
Patron is acknowledged by beeping sound and flashlight. Patron’s record is updated immediately. This is possible due to the seamless link between RFID Management System and the host computer system. As such, users who have reached their loan quota can start borrowing items once they have returned them through the Book Drop.
Advantage:
● The ability to return books during off hours.
● Loans for the returned items will be instantaneously cancelled so that patron may immediately borrow again.
● Librarians are able to allocate more time to customer service, as they are free from the labor-intensive loan cancellation activity associated with bar-code system.
● Display the return status and printing receipt.
● The design of the Book Drops is such that items cannot be retrieved back once deposited.
Shelf management system:
The Shelf Management system makes locating and identifying items on the shelves an easy task for librarians. It comprises basically of a portable scanner and a base station.
The system is designed to cover three main requirements:
● Search for individual books requested
● Inventory check of the whole library stock
● Search for books which are miss-helved
All these functions are performed by sweeping the portable scanner across the spines of the books on the shelves to gather their identities. In an inventory check situation, the identities collected are compared with the database and a discrepancy report could be generated.
In situations when search function is required, whether for a particular item or an item category, the information is first entered into the portable scanner from the base station, and when a foreign item is found on the shelves, a built-in beeper sound to alert the librarians.
Advanteges:
1. Changes inventory process:
● No more book handling: just pass the reader across shelved books to perform an instant inventory.
● Accuracy: book identification numbers are registered in the Shelf-Management Reader. The data is then downloaded to the central database.
● The fastest inventory you have ever made: 20 books per second.
● Notification: books to be pulled are up-loaded to the reader for quick identification.
2. User friendly:
● Light weight
● Wand allows easy reading of high and low shelves
3.Saves time and resources:
● Implementers indicate a 75% reduction in human resources required for shelf management activities.
ANTI THEFT MANAGMENT:
The RFID EAS Gate is the anti-theft part of the RFID Library Management System using the same RFID tags embedded in the library items. Each lane is able to track items of 1 meter or more and would trigger the alarm system when an un-borrowed item passed through them.
The alarm will sound and lights on the gate will flash as patron passes through with the library material.
The EAS Anti-Theft Gate is used to detect RFID tag that is equipped with EAS (Electronic Article Surveillance). It can detect the RFID tags within 1 meter range without interference of magnetic items, upon detecting of Armed RFID tags, the alarm will sound on the gate. It has option to trigger a Camera to record patrons who trigger the alarm to the Surveillance Station.
Advantages:
● Single technology is required for both inventory and theft management of the library.
● Library staffs are alerted immediately when un-borrowed items passes through the theft detection gates.
● Would-be thieves are deterred by the physical presence of the gates.
● Number of patrons passing through the gantry is captured by a counter on the gates Alarm volume can be easily controlled.
Patron Card Process System:
Advantages:
● Double Side Card Printing will set librarian print patron card without changing side of card.
● Library can make patron card in quick way and without patron to bring their own photo.
● It is best way to serve patron.
● Connect to Integrated Library System Directly (this option depend on ILS system)
CONCLUSION:
RFID is a technology that has achieved its time. It’s real, it works, and it’s making never-before processes possible. Organizations that find ways to explore RFID, and at the same time create benefits, will be in the best position to leap ahead of their competitors as the systems mature and costs drop even further. Therein lays the danger the crisis presents. At the same time moving too quickly can mean investments in dead-end technology solutions, applied to processes that don’t give clear benefits. Finding the proper balance between speed and caution is at the root of the crisis executives face with RFID.
Also in addition to the applications cited in this paper there are many more applications such as campus management,lab management and so on.Finally to conclude the technologies are for the people to use .So it lies in the hands of people ,we should make the RFID technology to reach its peak.tThe young techno-wizard will make this poosible!..............
0 comments:
Post a Comment