• Tidak ada hasil yang ditemukan

View of REVIEW ON RADIO FREQUENCY IDENTIFICATION IN LIBRARY SCIENCE

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of REVIEW ON RADIO FREQUENCY IDENTIFICATION IN LIBRARY SCIENCE"

Copied!
4
0
0

Teks penuh

(1)

ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING Peer Reviewed and Refereed Journal, ISSN NO. 2456-1037

Available Online: www.ajeee.co.in/index.php/AJEEE

Vol. 06, Issue 02, February 2021 IMPACT FACTOR: 7.98 (INTERNATIONAL JOURNAL) 50 REVIEW ON RADIO FREQUENCY IDENTIFICATION IN LIBRARY SCIENCE

Dr. Prabhat Singh Thakur

Librarian, Raja Bhoj Government College Katangi, District-Balaghat, (M.P.) Abstract - The first RFID application was the "Identification Friend or Foe" system (IFF) and it was used by the British in the Second World War. This paper presented on radio frequency identification (RFID) technology. Initially RFID tags were developed to eventually replace barcodes in supply chains. Their advantages are that they can be read wirelessly and without line of sight, contain more information than barcodes, and are more robust.

The paper describes the current technology, including the frequency ranges used and standards. With the increasing ubiquity of RFID tags, however, privacy became a concern.

The paper outlines possible attacks that can violate one's privacy and it also describes counter measures. The RFID technology did not stop at item-level tagging. The paper also presents current research that focuses on locating and tracking labeled object that move.

Since the uses for RFID tags are so widespread, there is a large interest in lowering the costs for producing them. It turns out that printing tags might become a viable alternative to traditional production. The paper reviews the current progress.

Keywords: Radio Frequency Identification, RFID Tags, Electronic Product Codes, EPC, Supply Chain Management, Security, Organic Printing, Location and Tracking.

1 INTRODUCTION

The radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID (Radio Frequency Identification) enables identification from a distance, and unlike earlier bar-code technology, it does so without requiring a line of sight. RFID tags support a larger set of unique IDs than bar codes and can incorporate additional data such as manufacturer, product type, and even measure environmental factors such as temperature. Furthermore, RFID systems can discern many different tags located in the same general area without human assistance. In contrast, consider a supermarket checkout counter, where you must orient each bar-coded item toward a reader before scanning it. So why has it taken over 50 years for this technology to become mainstream? The primary reason is cost. For electronic identification technologies to compete with the rock- bottom pricing of printed symbols, they must either be equally low-cost or provide enough added value for an organization to recover the cost elsewhere. RFID isn‘t as cheap as traditional labeling technologies, but it does offer added value and is now at a critical price point that could enable its large-scale adoption for managing consumer retail goods. Here, we introduce the principles of RFID, discuss its primary technologies and applications, and review

the challenges organizations will face in deploying this technology.

RFID is used to automatic data capture allowing contact less identification of objects using radio frequency.

1.1 RFID compared to BAR CODES:

 Similarly - a support tool to automate processes and to improve operations management.

 Reduces labor, eliminates human errors.

 Puts a wealth of data at your fingertips. Different, in that:

 Tags can be embedded and hidden with no need for line-of-sight. They can be read through wood, plastic, cardboard, any material except metal.

 Tags can reprogrammed on-the-fly.

 Applicable in harsh environments, such as outdoors, around chemicals, moisture and high temperatures.

1.2 Origin and Development of RFID The first RFID application was the

"Identification Friend or Foe" system (IFF) and it was used by the British in the Second World War. Transponders were placed into fighter planes and tanks, and reading units could query them to decide whether to attack. Successors of this technology are still used in armies around the world. The first commercial RFID application was the "Electronic Article

(2)

ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING Peer Reviewed and Refereed Journal, ISSN NO. 2456-1037

Available Online: www.ajeee.co.in/index.php/AJEEE

Vol. 06, Issue 02, February 2021 IMPACT FACTOR: 7.98 (INTERNATIONAL JOURNAL) 51 Surveillance" (EAS). It was developed in

the seventies as a theft prevention system. It was based on tags that can store a single bit. That bit was read when the customer left the store and the system would sound alarm when the bit was not unset. In the end-seventies RFID tags made its way into the agriculture for example for animal tagging.

In the eighties RFID technology got a boost when Norway and several US states decided to uses RFID for toll collection on roads. In addition to toll collection the following decade brought a vast number of new applications, such as ski passes, gasoline cards, money cards, etc. In 1999 the Auto-ID Center at MIT was founded. Its task was to develop a global standard for item-level tagging. The Auto-ID was closed in 2003 after completing the work on the Electronic Product Code (EPC). At the same time the newly founded EPCglobal Inc. continues the work. The probably first paper related to RFID technology was the landmark paper by Harry Stockman,

"Communication by Means of Reflected Power" in October 1948. The first patent on RFID was issued in 1973 for a passive radio transponder with memory.

1.3 Components of RFID System:

RFID system are mainly following four components:

Tags: RFID tag is the heart of the system is the RFID tag, which can be fixed inside abook‘s back cover or directly onto CDs and videos. This tag is equipped with a programmable chip and an antenna.Each paper thin tag contains an engraved antenna and a microchip with a capacity of at least 64 bits. These are three types of tags

‗read only‘, ‗WORM‘, and

‗read/write‘. Tags are read only if the identification is encoded at the time of manufacture and not rewritable

‗WORM‘ (write once read many) tags are programmed by the using organization, but without the ability to rewrite them later ‗Read/Write tags‘ which are chosen by most libraries, can have information changed or added. In libraries using RFID is common to have part of the read/write tag secured against

rewriting e.g. the identification number of the item.

Readers: A receiver device called as reader detects the signal as soon it enters into itsradio range and decodes the number for interpretation; Reader interrogates the tags and offers optimum reading performance enabling instant data capture when passed alongside the items in a continuance movement.

The devices used within the building are usually called ‗readers‘ while the ones used at building exits are usually called ‗sensors‘.

Antenna: An antenna is connected to the reader to help to process identification of theitems and activate/deactivate the tag antitheft function simultaneously. Additional antenna can be added to increase the number of item processed in case of larger transactions.

Server: The server is the heart of some comprehensive RFID systems.

It is thecommunication gateway among the various components. It receives the information from one or more of the readers and exchange information with the circulation database. Its software include the SIP/SIP2 (session initiation protocol), APIs (Application Programming Interface) NCIP or SLNP necessary to interface it with the integrated library software and etc.

2 APPLICATION OF RFID LIBRARY 2.1 Management System:

1. Book Drops: The Book Drops can be located anywhere, within or outside thelibrary. Possible remote locations outside the library include MRT/

train stations, shopping centers, schools, etc. This offers unprecedented flexibility and convenience of returning library items at anytime of the day, even when the library is closed.

2. RFID Transponder or Tagging: It is the most important link in any RFIDsystem. It has the ability to store information relating to the specific item to which they are attached, rewrite again without any requirement for contact or line of sight. Data within a tag may provide

(3)

ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING Peer Reviewed and Refereed Journal, ISSN NO. 2456-1037

Available Online: www.ajeee.co.in/index.php/AJEEE

Vol. 06, Issue 02, February 2021 IMPACT FACTOR: 7.98 (INTERNATIONAL JOURNAL) 52 identification for an item, proof of

ownership, original storage location, loan status and history.

RFID tags have been specifically designed to be affixed into library media, including books, CDs, DVDs and tapes.

3. Counter Station is a staff assisted station on services such as loan, return, tagging, sorting and etc. It is loaded with arming/disarming module, tagging module and sorting module. Arming/Disarming module allows EAS (Electronic Article Surveillance) bit inside the tag of the library material to be set/reset so as to trigger/not trigger the alarm of the EAS gate.

4. The Patron self check-out station:

It is basically a computer with a touch screenand a built-in RFID reader, plus special software for personal identification, book and other media handling and circulation. After identifying the patron with a library ID card, a barcode card, or his personal ID number (PIN), the patron is asked to choose the next action (check-out of one or several books). After choosing check-out , the patron puts the book(s) in front of the screen on the RFID reader and the display will show the book title and its ID number (other optional information can be shown if desired) which have been checked out.

5. Shelf Management: This solution makes locating and identifying items on theshelves an easy task for librarians. It comprises basically of a portable scanner and a base station.

The solution is designed to cover three main requirements:

 Search for individual books requested

 Inventory check of the whole library stock

 Search for books which are miss-helved

6. Anti-theft Detection: RFID EAS Gates is the anti-theft part of the Library RFIDManagement System using the same RFID tags embedded in the library items. Each lane is able to track items of about 1 meter and would trigger the alarm system

when an un-borrowed item passed through them. The alarm will sound and lights on the gate will flash as patron passes through with the un- borrowed library material.

2.2 Limitation of RFID

Although many RFID implementation cases have been reported, the widespread diffusion of the technology and the maximum exploitation of its potential still require technical, process and security issues to be solved ahead of time. Today‘s limitations of the technology are foreseen to be overcome and specialists are already working on several of these issues:

Standardization: Though the characteristics of the application and the environment of use determine the appropriate tag, the sparse standards still leave much freedom in the choice of communication protocols and the format and amount of information stored in the tag. Companies transcending a closed-loop solution and wishing to share their application with others may encounter conflicts as cooperating partners need to agree in

standards concerning

communication protocols, signal modulation types, data transmission rates, data encoding and frames, and collision handling algorithms.

Cost: The cost of tags depends on their type. In the 2003 report

‗RFID Systems in the Manufacturing Supply Chain‘, ARC This predicted decrease is still deemed insufficient, as economic use of tags—taking the associated 5–35% decrease of labor costs and zero tag information generation costs into account as well—would require a maximum of 25 cents per tag for high-end products, and 5 cents for common item- level tagging.

Collision: Attempting to read several tags at a time may result in signal collision and ultimately to data loss. To prevent this, anti- collision algorithms (most of them are patented or patent pending) can be applied at an extra cost.

The development ofthese methods,

(4)

ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING Peer Reviewed and Refereed Journal, ISSN NO. 2456-1037

Available Online: www.ajeee.co.in/index.php/AJEEE

Vol. 06, Issue 02, February 2021 IMPACT FACTOR: 7.98 (INTERNATIONAL JOURNAL) 53 aimed at reducing overall read

time and maximizing the number of tags simultaneously read etc., 3 CONCLUSION

The paper gave an overview of the current state and trends of RFID technology. Even though numerous limitations and unresolved issues still hinder the widespread application of RFID. Despite these challenges, RFID continues to make inroads into inventory control systems, and it‘s only a matter of time before the component costs fall low enough to make RFID an attractive economic proposition.

Furthermore, extensive engineering efforts are under way to overcome current technical limitations and to build accurate and reliable tag reading systems.

We might also start to see economic pressure from the larger distributors to modify product packaging and its associated materials to more effectively integrate RFID. Finally, at this delicate stage, while major corporations are trialing the technology, media reaction and outspoken privacy groups can influence the rules by which we use the technology.

RFID‘s potential benefits are large, and we‘re sure to see many novel applications n the future-some of which we can‘t even begin to imagine. The components that go into RFID readers and tags are simple radio communications, but their smaller size and broad deployment enhance the power of the technology and raise concerns about the privacy effects of RFID deployment. These concerns are often

premised on unlikely assumptions about where the technology will go and how it will be used.

REFERENCES

1. Ayre, L.B. (2010). The Galecia Group Position paper: RFID and Libraries. Retrieved at : http://www.galecia.com/weblog/mt/arcieves /cat.rfidandwireless.php

2. Boss, Richord W. (2009). RFID Technology for

Libraries. at

:http://www.ala.org/ala/pla/plapubs/techno tes/rfidtechnology

3. Finkelzeller, K. (2003). The RFID Handbook, 2nd ed., New Jersey: John Wiley & Sons.

4. Firke, Yogaraj S. (2010). RFID Technology for library security. In Emerging technology and changing dimensions of libraries and information service by Sanjay Kataria and others. New Delhi, KBD Publication.

5. Juels, A., Rivest, R.L. and Szydlo, M. (2003).

―The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy,‖ Proc. 8thACM Conf. Computer and Comm. Secu-rity, ACM Press, pp. 103–111.

6. Kindberg, T. et al. (2002), ―People, Places, and Things: Web Presence of the Real World,‖

ACM Mobile Networks & Applications J., pp.

365–376.

7. Lindquist, M.G.( 2003). RFID in libraries- Introduction to the issues. In world library and information congress paper presented at 69th IFLA general conference and council.

Berlin.1-9 August available at http://ifla.queenslibrary.org/IV/ifla69/paper s

8. Ranawella,T.C., (2006). An introduction to a library material management and security control system-Radio Frequency Identification technology. Journal of the University Librarian Association of Srilanka.10,2006.

9. Syed, S. (2005). Use of RFID Technology in libraries: a new approach to circulation, tracking, inventorying and security of library materials. Library Philosophy and Practice.

8(1), 15-21.

10. http://www.sljol.info/index.php/JULA/articl e/viewPDFInterestitial/316/359accessed

Referensi

Dokumen terkait

In this paper radio frequency receiver of radio-frequency long-term evolution (RF-LTE) is design and simulated using MATLAB Simulink, where the design based on

In order to investigate the properties of radio relics and the connection with radio halos in galaxy cluster, and then analyse their correlation with non-thermal phenomena, it’s