RFID for Library Management The Educated Choice - PowerPoint PPT Presentation

1 / 26
About This Presentation
Title:

RFID for Library Management The Educated Choice

Description:

... system, which shall full automate the checkin procedure ... Self check machines are very user friendly. Multiple items can be checked out at the same time. ... – PowerPoint PPT presentation

Number of Views:71
Avg rating:3.0/5.0
Slides: 27
Provided by: tier9
Category:

less

Transcript and Presenter's Notes

Title: RFID for Library Management The Educated Choice


1
RFID for Library Management The Educated Choice
  • Friday 22nd March, 2002

2
Making the decision to change
  • The majority of top UK libraries have some form
    of security and automation system. Today
    Libraries are often faced with two choices.
  • Staying with the benefits of their legacy system
    say something like the RF technology, or
    introducing new RF.
  • Changing to alternative technology EM, or
    introducing new EM.

3
Making the decision to change
  • Even though both technologies have been very
    effective in the functional side of library
    management, they have become restrictive for the
    future.
  • Staying with RF restricts the use of self issue
  • Staying with EM has additional deactivation/reacti
    vation tasks.
  • Deciding for a change to EM/RF mean s the
    re-handling of stock for retrospective stock
    treatment.

4
Making the decision to change
  • As usual Libraries are faced with weighing up the
    pros and cons of each scenario. Now Checkpoint
    has the third option with the ILS and are able to
    deliver a complete solution combining Identifying
    (brand it), Circulation (track it) and Security
    (secure it) functions into one operation, by
    using RFID-Radio Frequency Identification

5
The Intelligent Library System
  • System Components
  • Circulation Circuit
  • Intelligent Sensors
  • Staff Station Reader
  • Self Check-Out Station
  • Inventory Wand
  • ILS Application Controller

6
Circulation Circuit
  • Write Once-Read Many (WORM) tag (13.56MHz)
  • Low cost etched tag
  • 96 bits of user-definable data
  • Anti-collision capability
  • Passive technology (no battery)
  • Tag size 2 x 2 (5cm) x 0.03 (0.07cm) thk
  • Contact programmable by Checkpoint or on-site

7
Intelligent Sensors
  • Transceiver antenna 13.56MHz
  • Two antennas provide 8 (2.4m) coverage 0.6m
    ltgt 1.2m ltgt 0.6m
  • Designed to protect exit/entry doorway or portals
  • Reads multiple tags simultaneously
    (anti-collision)
  • Communicates with application server via ethernet
    (TCP/IP)
  • Integrated sound and lamp alarm
  • Optional voice alarm via SoundBlaster?

8
Operational Specifications
  • Intelligent Sensors
  • Recommended aisle width is 1m - 1.2m
  • Detection/pick rate 95 or better
  • Tag must be at least 1cm from metal for operation
  • One power supply required for each sensor
  • One communication cable (CAT5 with RJ45
    termination) required for each sensor

9
Staff Station Reader
  • Offers 12 (30cm) read range capability
  • Allows for under or above counter mount
  • Visible (LED) good read signal
  • Compact design offers application flexibility
  • Reads multiple tags simultaneously
    (anti-collision)
  • Communicates with application server via ethernet
    (TCP/IP)
  • One communication cable (CAT5 with RJ45
    termination) required for each reader
  • One power supply per unit

10
Staff Station Read (Cont.)
  • Configurable as circulation terminal or checkin
    type reader
  • Circulation Terminal Mode
  • Circulation Reader output to the terminal is
    RS232
  • Connection to the terminal emulates a barcode
    scanner
  • Supports a barcode scanner interface as a backup
    reader
  • Barcode scanner interface to the circulation
    reader is RS232
  • Check-in Mode (can be mounted into return slots
    or boxes)
  • Automatically updates item status to checked in
    at the automated circulation system (ACS)
  • Connects to the ILS application servers network
  • Uses the SIP 1 and 2 Library Protocol to checkin
    the item

11
Self-Checkout Station
  • Complete desktop self checkout capability
    w/receipt printer
  • Offers 10 (25 cm) read range capability
  • Menu-driven, touch screens
  • Compatible with most patron cards including
    barcode, magnetic stripe, smart card
  • Communicates with application server via ethernet
    (TCP/IP)
  • One communication cable (CAT5 with RJ45
    termination) required for each sensor
  • Reads multiple tags simultaneously
    (anti-collision)
  • One power supply per unit

12
Intelligent Wand
  • Mobile inventory capability
  • Read range of 8 (20cm)
  • Visible (LED) good read signal
  • Stores up to 100K items IDs
  • Data output to host PC via link docking
    station/wireless
  • Reads multiple tags simultaneously
    (anti-collision)
  • Battery powered (up to 5 hrs.)
  • Screen display for tag counts and memory capacity
    level

13
Intelligent Wand
  • Inventory Wand Enhancements
  • Shelf order-the ability to indicate when an item
    is out of order on the shelf or not in the shelf
    order list.
  • Alerts enabled and call number or title displayed
    on PPT
  • Item search-ability to indicate when an item is
    found
  • alerts and displays the call number or the title
    on PPT
  • Improved operating speed and more memory
    available for inventory files
  • Inventory over wireless LAN also available.
  • 16mb of RAM and ROM memory on the PPT 2700 data
    capture unit.

14
ILS Application Controller
  • Provides control and communications link between
    RFID readers and host computer
  • Communicates via ethernet (TCP/IP)
  • Runs application software
  • Windows NT operating system
  • Provides full log book capability
  • Allows for control of RFID system independent of
    host
  • Provides reporting features

15
The Intelligent Library System
  • System Overview

16
ILS Systems Diagram
Relay Output to VCR (if applicable) Use
22AWG shielded
Self-Checkout
Circulation Terminal
Tag Pad
Self-Checkout
Application Server
Book Drop
Host Computer
IR Interface Linking station
RFID NIC, 10BaseT Network
Host NIC, 10BaseT Network
Dedicated Phone line
RS232/Keyboard Wedge Connection
17
The Intelligent Library System
  • Tag Programming

18
Linking Tag IDs
  • Method 1, Tag are supplied but not programmed
  • Program tags onsite
  • Recommended method to tag a collection with
    existing barcode data
  • Does not require any interaction with the ACS
  • Less costly and a faster method for tagging the
    collection
  • Method 2 , Tags are pre-programmed
  • Link pre-programmed tags to the circulation
    system through the libraries technical services
    department
  • Used for collections that have no existing
    database or for tagging new material to be added
    to a collection
  • Most Libraries see this as a high risk method for
    collections with existing barcodes that are
    currently linked

19
Tag ProgrammingOn-site
  • Programming Flowchart
  • Programmer designed to be mobile (small
    footprint)
  • Checkpoint recommends moving the programmer
    through the collection shelves.
  • Equipment
  • Programmer
  • Barcode Reader RS232 interface only
  • Computer (laptop recommended)

Program Tag
Scan Item Barcode
Remove item from shelf
Start
Affix tag to item
Apply Cover Label
Return item to shelf
End
20
Tag ProgrammingPre-Programmed
  • Programming Flowchart
  • Recommended for new material processing
  • Equipment
  • Barcode Label Printer
  • Circulation Staff Reader
  • Circulation Terminal

Retrieve Item to be tagged
Open item record in circ. terminal
Scan Item ID to update circ. record
Start
Apply Cover Label
Item ready to shelve
Print Barcode on cover label
Affix tag to item
End
21
Tag Programmer
  • Circulation Circuit is placed in fixture
  • Programming head is positioned on the circulation
    circuits programming pads
  • Item Barcode is scanned
  • Circulation Circuit is programmed
  • Circulation Circuit is read to have the label
    affixed

22
Tag Data Format
  • The circulation circuit has three general fields
  • The LID, Location ID Field
  • XXXX four characters, 16 bits, used to
    identify an item that belongs to the library, any
    circulation circuit read with a different LID is
    ignored
  • The IID, Item ID Field
  • This is the barcode ID and is typically 14
    characters, 56 bits
  • The BID, Batch ID Field
  • XXXXXX, six characters, 24 bits, used to track
    manufacturing information
  • Example

LID IID BID 1902 32918000110024
999165 48 characters, 96 bits
23
Evaluating needs for a system
  • In order to evaluate the system on offer often a
    performance criteria is made
  • The system had to simplify the returns and issue
    procedures for staff, increasing efficiency, and
    minimise repetitive stress motion.
  • It had to have a self checkout facility that was
    easy for borrowers to use.
  • Need to secure magnetic media videos and
    cassettes, wanted to treat the circulation the
    same as books.
  • A link between the security section of the system
    and the library bibliographic record-Libraries
    needed to know what has been caught going through
    the system.
  • Need for a smooth interface between the security
    /self check system and the Automation System.
  • Efficient inventory check, search, shelf order
    system.
  • Flexibility that this technology could be cross
    compatible with future systems like sorting
    equipment.

24
  • In the majority of cases Checkpoint fits the
    performance criteria. Even though some libraries
    have concerns as they evaluate the system.
  • RFID is a new technology and that someone needs
    to be the first to implement it, we have that in
    Keble College now.
  • The overall cost of labour and materials to
    convert a collection, is a major consideration
    (however, Libraries realised that any switch in
    technology or introduction of just security
    systems would require handling of each item) ILS
    promised to give the library a lot more.
  • The size of the RFID tag and cover label was
    fairly large. Concern was mainly for AV material.

25
  • Why choose the Checkpoint ILS
  • It is new technology with tremendous potential
    for multiple applications in the future
  • It is flexible technology, which combines
    security and item identification into a single
    tag
  • It is designed to work efficiently with a
    materials sorting system, which shall full
    automate the checkin procedure
  • Self check machines are very user friendly.
    Multiple items can be checked out at the same
    time.
  • Inventory checks, sorting and finding those
    miss-shelved books, are made much more simpler.
  • There is no need to align the books to read/scan
    stock through the self issue or staff issue
    points.
  • Best of all, combining Checkpoint RFID technology
    at the circulation desk, self check machines and
    eventually the returns sorting systems will free
    circulation staff to perform direct Users
    Information Services, both in person and by
    phone, rather than performing repetitive
    circulation transactions.

26
  • Thank You
  • Questions please
Write a Comment
User Comments (0)
About PowerShow.com