INTRODUCTION According to Automatic Identification and Data Capture

INTRODUCTION
According to Automatic Identification and Data Capture (AIDC), FRID (Radio Frequency identification) is a technology that uses radio waves to transfer data between a reader and an electronic tag which is attached to a particular object. Typical uses are for object identification and tracking.
RFID Tag-An RFID tag is a tiny radio device that is also referred to as transponder, smart tag, smart label, or radio barcode.
Readers and Antenna-The second component in a basic RFID system is the interrogator or reader. Their usual role is to query a tag and receive data from it.
Middleware-Both middleware and software applications are required in an RFID environment. Middleware manages the flow of information between the readers and the backend. It performs functions such as basic filtering and reader integration and control.
Server-It receives the information from one or more readers and checks the information against its own database or exchanges information with the circulation database of the library integrated management system.
APPLICATIONS
Security gates
Security gate/ EAS (Electronic Article Surveillance) is an anti-theft system used by libraries. It plays a crucial role in detecting unborrowed or improperly checked-out library document. Theft detection is an integral feature of the chip within the RFID tag which performs both the item identification and antitheft function.
RFID Tag
The tag is paper thin, flexible and approximately 2″x 2″ in size which allows it to be placed inconspicuously on the inside cover of each book in a library’s collection. It consists of an attached antenna and a tiny chip which stores vital bibliographic data including a unique ID number to identify each item.
Staff works Station
Staff work station is a staff assisted station which is used in a library for charging and discharging documents, programming of new documents, sorting of documents, etc. It consists of a reader and a PC. For doing programming/tagging of a new library document with the help of staff workstation, it is first put on the reader, the accession number of the document is read with the help of barcode scanner and then the data is downloaded from the library management system.
Inventory Control
Inventory and shelf reading can be carried out with a portable reader. The reader transmits identification number to the server, which in turn sends it to library management software and response is returned in real time. Alternatively, information may be downloaded with library management software for inventory control. Shelf Management system makes it easier for the library staff to locate and identify the documents on the shelves.
REFERENCES
Automatic Identification and Data Capture (AIDC). Retrieved from http://www.aidc.org/
Biblio Tech Review. (2001). RFID for libraries. Retrieved from http://www.bibliotech.com/html/rfid.html
FRID: Technology and Applications-IIT… PDFhttps://www.it.iitb.ac.ac›talks›rfid-05
Sarasvathy. P ; Jagadish, M. V. (n.d.).Essential of RFID in library management – a view. Retrieved from:
http://eprints.uni-mysore.ac.in/16129/1/esentialofrfidinlibrarymanagement-aview.pdf
Narayanan A., Sanjay Singh, ; Somasekharan M. (2005). Implementing RFID in Library: Methodologies, Advantages and Disadvantages. Paper presented at the Conference on Recent Advances in Information Technology, IGCAR – Kalpakkam, July 14-15, Kalpakkam. Retrieved from: http://www.igcar.gov.in/igc2004/sird/readit2005.pdf#page=282
Sandhu, G., ; Ukwoma, S. (2012). Awaking Stock taking practice in academic libraries;The Radio Frequency Identification (RFID) technology. Paper presented at the Proceedings of the 12th annual conference on Nigerian Library Association @ 50: driving home the transformation agenda, Enugu, Nigeria. Retrieved from: http://roar.uel.ac.uk/1771/1/Awaking%20Stocktaking%20practices.pdf
Ward, M., Kranenburg, R.V., ; Backhouse, G. (2006). RFID: Frequency, standards, adoption and innovation (JISC Technology and Standard Watch). Retrieved from www.jisc.ac.uk/media/documents/techwatch/tsw0602.doc
Kolarovszki,P ; Dúbravka, V. (2010). The simulation of production line and warehouse management based on RFID technology through 3d modelling and animation. Proceedings of the 10th International Conference “Reliability and Statistics in Transportation and Communication”. Riga, Latvia, p. 426-432. Retrieved from http://www.tsi.lv/sites/default/files/editor/science/Publikacii/RelStat_10/sess_9_kolarovszki_dubravka.pdf
Thornton, Frank (2006). RFID security. Rockland, MA, Syngress. Retrieved from http://www.doko.vn/tai-lieu/rfid-security-1746299.
Boss, R.W. (2011). RFID technology for libraries. Retrieved from
http://www.ala.org/pla/tools/technotes/rfidtechnology

https://www.elprocus.com/aidc-what-is-automatic-identification-and-data-capture-technology/

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

http://www.ala.org/PrinterTemplate.cfm?ContentID=68138;Section=technotes;Template=/ContentManagement/HTMLDisplay.cfm

http://2cqr.in/solutions/rfid-technology-for-libraries.html

Difference Between RFID and Bluetooth

https://www.elprocus.com/aidc-what-is-automatic-identification-and-data-capture-technology/

https://slideplayer.com/slide/5146354/

INTRODUCTION
According to Automatic Identification and Data Capture (AIDC), FRID (Radio Frequency identification) is a technology that uses radio waves to transfer data between a reader and an electronic tag which is attached to a particular object. Typical uses are for object identification and tracking.
RFID Tag-An RFID tag is a tiny radio device that is also referred to as transponder, smart tag, smart label, or radio barcode.
Readers and Antenna-The second component in a basic RFID system is the interrogator or reader. Their usual role is to query a tag and receive data from it.
Middleware-Both middleware and software applications are required in an RFID environment. Middleware manages the flow of information between the readers and the backend. It performs functions such as basic filtering and reader integration and control.
Server-It receives the information from one or more readers and checks the information against its own database or exchanges information with the circulation database of the library integrated management system.
APPLICATIONS
Security gates
Security gate/ EAS (Electronic Article Surveillance) is an anti-theft system used by libraries. It plays a crucial role in detecting unborrowed or improperly checked-out library document. Theft detection is an integral feature of the chip within the RFID tag which performs both the item identification and antitheft function.
RFID Tag
The tag is paper thin, flexible and approximately 2″x 2″ in size which allows it to be placed inconspicuously on the inside cover of each book in a library’s collection. It consists of an attached antenna and a tiny chip which stores vital bibliographic data including a unique ID number to identify each item.
Staff works Station
Staff work station is a staff assisted station which is used in a library for charging and discharging documents, programming of new documents, sorting of documents, etc. It consists of a reader and a PC. For doing programming/tagging of a new library document with the help of staff workstation, it is first put on the reader, the accession number of the document is read with the help of barcode scanner and then the data is downloaded from the library management system.
Inventory Control
Inventory and shelf reading can be carried out with a portable reader. The reader transmits identification number to the server, which in turn sends it to library management software and response is returned in real time. Alternatively, information may be downloaded with library management software for inventory control. Shelf Management system makes it easier for the library staff to locate and identify the documents on the shelves.
REFERENCES
Automatic Identification and Data Capture (AIDC). Retrieved from http://www.aidc.org/
Biblio Tech Review. (2001). RFID for libraries. Retrieved from http://www.bibliotech.com/html/rfid.html
FRID: Technology and Applications-IIT… PDFhttps://www.it.iitb.ac.ac›talks›rfid-05
Sarasvathy. P & Jagadish, M. V. (n.d.).Essential of RFID in library management – a view. Retrieved from:
http://eprints.uni-mysore.ac.in/16129/1/esentialofrfidinlibrarymanagement-aview.pdf
Narayanan A., Sanjay Singh, & Somasekharan M. (2005). Implementing RFID in Library: Methodologies, Advantages and Disadvantages. Paper presented at the Conference on Recent Advances in Information Technology, IGCAR – Kalpakkam, July 14-15, Kalpakkam. Retrieved from: http://www.igcar.gov.in/igc2004/sird/readit2005.pdf#page=282
Sandhu, G., & Ukwoma, S. (2012). Awaking Stock taking practice in academic libraries;The Radio Frequency Identification (RFID) technology. Paper presented at the Proceedings of the 12th annual conference on Nigerian Library Association @ 50: driving home the transformation agenda, Enugu, Nigeria. Retrieved from: http://roar.uel.ac.uk/1771/1/Awaking%20Stocktaking%20practices.pdf
Ward, M., Kranenburg, R.V., & Backhouse, G. (2006). RFID: Frequency, standards, adoption and innovation (JISC Technology and Standard Watch). Retrieved from www.jisc.ac.uk/media/documents/techwatch/tsw0602.doc
Kolarovszki,P & Dúbravka, V. (2010). The simulation of production line and warehouse management based on RFID technology through 3d modelling and animation. Proceedings of the 10th International Conference “Reliability and Statistics in Transportation and Communication”. Riga, Latvia, p. 426-432. Retrieved from http://www.tsi.lv/sites/default/files/editor/science/Publikacii/RelStat_10/sess_9_kolarovszki_dubravka.pdf
Thornton, Frank (2006). RFID security. Rockland, MA, Syngress. Retrieved from http://www.doko.vn/tai-lieu/rfid-security-1746299.
Boss, R.W. (2011). RFID technology for libraries. Retrieved from
http://www.ala.org/pla/tools/technotes/rfidtechnology

https://www.elprocus.com/aidc-what-is-automatic-identification-and-data-capture-technology/

http://www.ala.org/PrinterTemplate.cfm?ContentID=68138&Section=technotes&Template=/ContentManagement/HTMLDisplay.cfm

http://2cqr.in/solutions/rfid-technology-for-libraries.html

Difference Between RFID and Bluetooth

https://www.elprocus.com/aidc-what-is-automatic-identification-and-data-capture-technology/

https://slideplayer.com/slide/5146354/