Library Monitoring System For Security With Rfid Technology.doc

  • Uploaded by: Abdul Razzak
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Library Monitoring System For Security With Rfid Technology.doc as PDF for free.

More details

  • Words: 4,765
  • Pages: 10
IMPLEMENTATION OF LIBRARY MONITORING SYSTEM FOR SECURITY WITH RFID TECHNOLOGY Mohd Abdul Rahman *1, Ayesha Fatima*2, Zeenath*3 *1 PG Student Dept of ECE(Embedded system), Nawab shah Alam Khan College of Engineering and Technology *2 Assistant Professor, Dept of ECE(Embedded system), Nawab shah Alam Khan College of Engineering and Technology *3 Associate Professor,(HOD) Dept of ECE(Embedded system), Nawab shah Alam Khan College of Engineering and Technology

Abstract: A library is a developing living being. As it develops in size the issues related with the support and security of the records additionally develops. The analysts have dependably helped the bookkeeper in tackling their issues. To take care of the issues of looking records they have given inventorying rules. Scanner tags have served the curators and libraries for quite a while, and now it is gradually getting supplanted by RFID. Radio Frequency Identification (RFID) is another age of Auto Identification and Data gathering innovation which mechanizes business forms and permits distinguishing proof of huge number of labeled articles like books, utilizing radio waves. RFID based Library Management System (LMS) would permit quick exchange stream for the library and will demonstrate prompt and long haul advantages to library in discernibility and security. The proposed framework depends on Ultra High Frequency(UHF) RFID perusers, upheld with reception apparatuses at entryway and exchange areas, and library cards containing RFID-transponders which can electronically store data that can be perused/composed even without the physical contact with the assistance of radio medium. This paper exhibits the innovation usage, includes, the trials led to set up RFID based LMS, conceivable issues of RFID in Library. Keywords: Library, RFID, LMS, UHF, RFID-transponders

I. THE BACKGROUND TO RFID TECHNOLOGY The omnipresent standardized identification, for example, diagrammatically depicted in Figure 1, has been utilized since the late 1960's as a printed methods for recognizing item classifications. The scanner tag framework was successfully institutionalized with the far reaching appropriation in 1973, by clients and gear creators, of the Universal Product Code (UPC) 8 or 14 digit symbology. From that point forward there have created distinctive renditions of this standardized identification innovation (EAN, JAN) enveloping 8 to 14 digit frameworks. Standardized identification innovation keeps on playing out a basic job in stock control and circulation, especially in the purchaser item showcase part, however can be found being used from vehicle make to library stock control. Scanner tags require close filtering with an optical peruser, much like the laser examining perusers found at most general store checkouts. A. Barcodes • Are restricted to the information imprinted on them and can't be refreshed, other than by substitution or staying a mark over them (which might be work concentrated). • Should be considerably fat for solid perusing. • • •

Are ordinarily (however not generally) paper names, or imprinted on paper based bundling, and along these lines inclined to harm. Typically provide inventory data to the level of product category. Are very unlikely to show through which distribution depots and transport means the product arrived at the point of sale.

RFID innovation [1] has existed since the mid 1940s when it was utilized for military airplane distinguishing proof. Later high esteem merchandise stock control applications were determined. In its initial business indications every thing to be labeled had a little electronic get together (a transponder) fitted to it that would react with a burst of radio recurrence (RF) transporter adjusted distinguishing proof information when examined by a RF motion (on an alternate recurrence) from either a hand-held scanner/peruser, or one mounted, state, in an entryway. This burst of distinguishing information was captured by the scanner, decoded and used to both recognize the labeled thing and for it to be checked. The early RFID labeling implies were battery controlled (purported dynamic gadgets). These were exorbitant, as well as generally cumbersome. From that point forward RFID use, and potential, has significantly expanded in vast part because of the unit cost, size and power needs, of the basic 'tag' having diminished by numerous requests [2] [3] [8].

Figure.1 Barcode

Subordinate upon the RFID innovation utilized RFID memory does not need to be settled but rather might be altered, broadened/added to, or even eradicated. As will be seen RFID innovation will beat the restrictions of standardized identifications. Be that as it may, as with scanner tags, to increase wide worldwide acknowledgment as the favored means for stock control frameworks there should be open principles for their. Further if RFID innovation is to wind up as omnipresent as standardized identifications in the conveyance chain, at that point the

unit cost of the 'tag' should be significantly as shabby as the printed scanner tags. Apparently, a RFID tag may never progress toward becoming as shoddy as the printed standardized identification fused on the 'oat box bundling', but since of RFID's focal points they may turn into the favored stock control implies for customer durables, and high esteem capital products and so forth [6] [7].

B. Key components of an RFID System an essential RFID framework, four basic segments are required: • A transponder (tag) that is modified with data that interestingly distinguishes itself, therefore the idea of "programmed ID" • A handset (peruser) to deal with radio correspondence through the recieving wires and pass label data to the outside world • An recieving wire connected to the peruser to speak with transponders

over the signs got from the tag into advanced information and sends it to a PC. and sends it to a computer. III TECHNICAL SPECIFICATION

The venture utilizes Workabout Pro UHF RFID handheld peruser fabricated by Psion Teklogix, working at 869.5 MHz. It has Windows Embedded CE 5.0 and full VGA, sunlight comprehensible touch screen show and well spread out illuminated console [9]. This gadget is utilized for seeking Module. The task likewise utilizes the Mercury4 RFID peruser produced by ThingMagic supporting four reception apparatuses, working at UHF scopes of 865-870MHz, 902-928MHz and 950-956MHz [10]. The peruser underpins the exchange of information to a remote PC over a system association. The peruser do bolster label conventions of EPC Class 0, EPC Class

• A peruser interface layer, or middleware, which packs a huge number of label signals into a solitary ID and furthermore goes about as a course between the RFID equipment components to the customer's application programming frameworks, for example, stock, debt claims, transportation, coordinations, etc

Figure.3. RFID Handheld Reader

Figure.4. RFID Reader Figure.2. RFID system components

1. The tag is actuated when it goes through a radio recurrence field, which has been created by a recieving wire connected to a peruser. 2.

The tag conveys a modified reaction.

3. The recieving wire that produced the field initially and is joined to the peruser distinguishes that reaction. 4. The handset (or peruser) sends the information to the middleware. 5. The middleware sends the data contained in the labels to whatever frameworks require that data. II.

HOW RFID WORKS

Each RFID tag has a non-fueled radio reception apparatus which can be imparted to by a controlled recieving wire having a place with a label peruser on a scanner or security door. In spite of the fact that it isn't important that the two radio wires "see" each other as is required with a customary standardized tag, it is vital that they be generally near each other since the wattage utilized by the fueled recieving wire is low for wellbeing and security reasons. The RFID peruser conveys electromagnetic waves and the label reception apparatus is empowered to get these waves. "At the point when the label reception apparatus enters the RF (radio recurrence) field, the label's microchip circuits are controlled by signs from this RF field made by the peruser. The chip at that point balances the waves and the tag sends them back to the peruser. The peruser changes

A. RFID Tags utilized in the task are EPC worldwide Generation2 (Gen2) UHF uninvolved labels which have the 96 bits memory for hexadecimal information stockpiling. It works at Ultra High Frequency (850 MHz to 950 MHz) extend. B. Reasons for choosing UHF in Library Application UHF innovation was decided for library application because of its long perused range, speed of recurrence and minimal effort. The read scope of mercury 4 peruser is up to 2 meters, which is adequate to screen the development of books over the entryways. The read scope of psion-teklogix handheld peruser is up to 30 cms which will be helpful for finding a specific book in a rack. With the new EPC Global Gen 2 standard, more than 1000 labels can be perused every second in applications where they are protected from RF clamor. UHF additionally has the choice to back off the read procedure to 100 labels for each second with high unwavering quality in RF boisterous applications. These advantages make the UHF innovation the perfect decision for Library applications [11] [15]. III. RFID TECHNOLOGY IN LIBRARIES

RFID (Radio Frequency IDentification) is the most recent innovation to be utilized in library burglary discovery frameworks. In contrast to EM (Electro-Mechanical) and RF (Radio Frequency) frameworks, which have been utilized in libraries for decadesRFID-based frameworks move past security to wind up following frameworks that join security with progressively productive following of materials all through the library, including less demanding and quicker charge and release, reviewing, and materials taking care of [4] [5].RFID is a blend of radio-recurrence based innovation and microchip innovation. The data contained on microchips in the labels joined to library materials is perused utilizing radio recurrence innovation paying little respect to thing introduction or arrangement (i.e., the innovation does not require observable pathway or a settled plane to peruse labels as do customary burglary location frameworks) and separation from the thing is anything but a basic factor aside from on account of additional • wide leave doors. The hallways at the building exit(s) can be as wide as four feet in light of the fact that the labels can be • perused at a separation of up to two feet by every one of two parallel leave sensors. The objectives utilized in RFID frameworks can supplant both EM or RF burglary location • targets and standardized tags. • IV.FEATURES OF RFID LIBRARY MANAGEMENT

Figure.5. Patron Card Process System

2) Key Benefits: Double Side Card Printing will set administrator print supporter card without changing side of card. Library can make benefactor card in fast path and without supporter to bring their very own photograph. It is most ideal approach to serve benefactor. Connect to Integrated Library System Directly (this choice rely upon ILS/LMS framework)

[14].Check out / in Station (Counter Station) The Counter Station is a staff helped station on administrations, for example, advance, return, labeling, arranging and so on. It is stacked with equipping/incapacitating module, labeling module and arranging module. Equipping/Disarming module permits EAS (Electronic Article Surveillance) bit inside the tag of the library material to be set/reset in order to trigger/not trigger the caution of the EAS entryway. Checking of EAS status of library material is simple. The staff puts the thing on the peruser and tap on the view to show the data put away inside the tag and status of EAS. There are additionally highlight of Auto Arming and Auto Disarm. Figure.6. Counter Station

A. Tagging or Patron Card Process System 1) Components: 1. Card Printer (Double Side printing) 2. Digital Webcam & Tripod 3. Mid Range RFID Reader/Writer 4. Capture, Edit & Printing Software 5. Price not include PC & Monitor

Together with dissemination module from Library Management System Software, this station is utilized for the accompanying administrations: • Editing and refreshing of benefactor's record • Add and erasing of patron’s record • Generate advance history for a specific benefactor • Managing of fines incurred by the patron • Arm/Disarm of EAS bit inside the library material • Program of new library material • Sort item in accordance to their branch and category number • The features of this station depend on the module loaded by the Library Management Software.

1) Key Benefits: • Provide the best price-effective Customer Service instead of manual daily routine •

Perform media check-in/-out for those patrons who choose not to use the self service system



Help patron that need assistance from the staff

C. Self Check out / in Station The Patron Self Check-out station is fundamentally a PC with a touch screen and an inherent RFID peruser, in addition to uncommon programming for individual recognizable proof, book and other media dealing with and course. Subsequent to recognizing the supporter with a library ID card, a scanner tag card, or his own ID number (PIN), the benefactor is requested to pick the following activity (registration of one or a few books). In the wake of picking registration , the supporter puts the book(s) before the screen on the RFID peruser and the presentation will demonstrate the book title and its ID number (other discretionary data can be appeared wanted) which have been looked at [12] [13].

o

Easy to use: books can be read in any orientation

o o o

Reduces queuing time Provides patron privacy Encourages patrons to come back

D. Anti-theft Detection

The RFID EAS Gates is the counter robbery part of the Library RFID Management System utilizing the equivalent RFID labels installed in the library things. Every path can follow things of around 1 meter and would trigger the caution framework when an unobtained thing went through them. The caution will sound and lights on the door will streak as benefactor goes through with the un-obtained library material. The EAS Anti-Theft Gates is utilized to distinguish RFID label that is outfitted with EAS (Electronic Article Surveillance). It can distinguish the RFID labels inside 1 meter extend without impedance of attractive things, after recognizing of Armed RFID labels, the caution will sound on the entryway. It has choice to trigger a Camera to record supporters who trigger the alert to the Surveillance Station.

Figure.7. Self Check out / in Station Figure.8. Anti-theft Detection System

1) The benefactor at that point affirms that he has

completed the registration procedure and a receipt is printed, demonstrating which books have been obtained and the arrival date. The RFID tag in the book is determined to calm thus no alert will go off at the EAS entryways. It is likewise conceivable to utilize the station for Check (consequently) of books. For this situation the supporter recognizes herself, picks return and afterward puts one book or a heap of books onto the peruser. She will get a receipt. In the event that the books were to be taken through the entryway now, an alert would sound. One essential point for library profitability is that the entire procedure is altogether less tedious than with standardized tag and attractive strip framework; accordingly long queues are maintained a strategic distance from and less stations are required for a similar procedure. 2) Key Benefits: 1. To Librarian: o Speeds up book check-in / check-out o Frees staff to better service patrons o Better space planning o Increases membership rate 2. To Patrons:

Theft detection is an integral feature of the chip within the tag. It is a stand-alone technology, which operates independently of the library database. 1) Features: • Detect EAS Armed RFID tags • Multi-item detection • Able to integrate camera with the gate (Option) • Gale to integrate with Surveillance Station (Option) 2) Key Benefits: • Single technology is required for both inventory and theft management of the library. • Library staff is alerted immediately when unborrowed items pass through the theft detection gates. • Would-be thieves are deterred by the physical presence of the gates. •

Number of patrons passing through the gates is captured by a counter on the gates Alarm volume can be easily controlled.

E. Book-Drop (Return Station) The Book Drops can be found anyplace, inside or outside the

library. Conceivable remote areas outside the library incorporate MRT/train stations, strip malls, schools; etc. This offers extraordinary adaptability and accommodation of returning library things at whenever of the day, notwithstanding when the library is shut.

The Shelf Management Solution makes locating and identifying items on the shelves an easy task for librarians. It comprises basically of a portable scanner and a base station [16]. The solution is designed to cover three main requirements: • Search for individual books requested • Inventory check of the whole library stock • Search for books which are miss-helved 1) Every one of these capacities are performed by clearing the versatile scanner over the spines of the books on the racks to accumulate their characters. In a stock check circumstance, the characters gathered are contrasted and the database and a disparity report could be produced. In circumstances when look work is required, regardless of whether for a specific thing or a thing classification, the data is first gone into the versatile scanner from the base station, and when a remote thing is found on the racks, an inherent beeper sound to alarm the curators.

Figure.9. Book Drop

Supporter embeds the library thing into the space. The peruser catches the electronic mark and sends to backend framework for credit dropping. Benefactor is recognized by blaring sound and electric lamp. Supporter's record is refreshed promptly. This is conceivable because of the consistent connection between Library RFID Management System and the host PC framework. All things considered, clients who have achieved their credit standard can begin acquiring things once they have returned them through the Book Drop.

2) Key Benefits: (a) Changes inventory process: • No more book handling: just pass the reader across shelved books to perform an instant inventory. • Accuracy: book identification numbers are registered in the Shelf-Management Reader. The data is then downloaded to the central database. • The fastest inventory you have ever made: 20 books per second. • Notification: books to be pulled are up-loaded to the reader for quick identification. (b) User friendly: • Light weight • Wand allows easy reading of high and low shelves (c) Saves time and resources: • Implementers indicate a 75% reduction in human resources required for shelf management activities.

Figure.10. Return Station

1) Key Benefits: • The ability to return books during off hours. • Loans for the returned items will be instantaneously cancelled so that patron may immediately borrow again. • Curators can apportion more opportunity to client benefit, as they are free from the work concentrated advance abrogation action related with standardized identification framework. • Display the return status and printing receipt. • The design of the Book Drops is such that items cannot be retrieved back once deposited. F. Shelf Management System

Figure.11.RFID Scanner

V. RFID INTEGRATION MODULES So as to furnish RFID mix with LMS, three modules in particular - Transaction Module, Monitoring Module and Searching Module were produced. Their functionalities are depicted beneath.

A. Transaction Module

book no, book name, writer name and distributer name.

Figure.12. Interaction of Transaction Module

The association of exchange module is given in (fig. 12).The RFID interface is given in the exchange frames like issue, reissue, return and fine status shapes. The Manual intercession is limited as the programmed recognizable proof of books and library individuals will be accomplished in light of RFID. The books and worker ID cards ought to be set close to the recieving wire. The labels will be checked by the peruser and the book id and the worker id will be transmitted to the s/w module running in the custodian's PC and which thus will store the exchange data in database with timestamp. B. Monitoring Module The Monitoring System (fig.13) will be introduced at the entryways of the library to screen the approaching/active packs persistently. The System will speak with the Mercury 4 RFID peruser through attachment utilizing RQL. The peruser examines the RFID labels joined with the books and library part cards and will send the label IDs to the checking framework which thus will spare that data in database with timestamp. The framework separates the book IDs and library part IDs by checking the organization of the ID esteem. There is a moment show framework which will constantly show the development of approaching/active books/library-individuals. The System alerts the curators at whatever point there is a development at the entryways without earlier issue.

Figure.14. Interaction of Searching Module

In the event that the book no. is straightforwardly given as a seeking parameter, the customer s/w will begin finding the book quickly. The blare sound will be given when the specific book is recognized. On the off chance that different parameters like book name, writer name and distributer names are given as a looking condition, at that point the customer s/w speaks with the server program to get the required book id from database by coordinating those parameters. On the off chance that more than one book, are fulfilling the inquiry condition, the curator will be requested to choose a specific book among those books. The principle advantage is that books can be checked rapidly utilizing a handheld peruser, lessening the stocktaking time from weeks to a large portion of multi day. VI. EXPERIMENTS ON POSITION OF TAGS IN BOOKS A. The principle thought process of utilizing RFID innovation is to diminish the time utilization of each undertaking and to get 100% lucidness of labels. To accomplish this, best label position must be recognized to ensure that none of the labels gets bargained with peruser as far as getting covered up by the human body while conveying the books. Thus, extraordinary label positions have been thought about and have been checked for its intelligibility. Despite the fact that there are a few alternatives to trade off the peruser by concealing the label purposely utilizing aluminum material or any sort of metals and so on., our thought process is to augment the clarity of labels in ordinary conditions. Distinctive conceivable label positions in a book are shown in figure15. B. Test results of Monitoring Module

Figure.13. Interaction of Monitoring Module

C. Searching Module The connection of seeking module is given in fig.14. When a client has found an asset inside the list, they should then use navigational direction to recover the asset physically; a procedure that might be helped through RFID labeling. Utilizing RFID labels to follow library books could build security and simplicity difficult stock takes. The RFID label connected with the books contains the book number. The books will be sought with the assistance of the RFID handheld books will be looked with the assistance of the peruser utilizing any of the parameters like

Test size of 60 books of various sizes was taken and checked with all the label positions in the earth of single reception apparatus kept at the stature of 1.5 meters from the beginning. Reenactment test was led to discover the level of books identified by RFID peruser when individuals were made to move by holding the books in various routes over the entryways. The result is as shown in the table I.

TABLE.I TAG POSITION - MONITORING MODULE

Tag Position

Total Books

Read%

Avg. Distance (Cms)

1 2 3 4

60 60 60 60

63 77 85 65

86 76 91 71

5 6 7 8 9

Figure.15. Different Tag Positions

60 60 60 60 60

80 77 87 55 40

65 65 87 70 60

At the point when same test was led with 2 radio wires at the opposite sides of the entryway, 100% recognition was found for the label position - 7, and 98% identification was found for the label position-3, both with the normal greatest read separation of 1.5 meters. The execution of the product has been tuned to peruse the labels inside 2 seconds which is the time ordinarily individuals take to cross the 1.5 meters separate in library. C. Test results of Searching Module

The books of various sizes kept in 8 racks have been checked with the distinctive label positions to discover the level of labels identified by the handheld peruser. The outcome is as appeared in the tableII The outcomes demonstrated that label position 1, 2, 5 and 9 gave most extreme level of 92%, 90%, 89% and 96% individually. Be that as it may, these positions didn't hold useful for the checking module as these positions are inclined to be covered up by human hand or body while conveying the books in the entryway locale of library. In view of composite outcomes from Table I and Table II, Tag position 7 is distinguished for the last organization of the task. RFID labels will be stuck in all books in this position. TABLE.II TAG POSITION SEARCHING MODULE

Tag Position 1 2 3 4 5 6 7 8 9

Total Books 100 100 100 100 100 100 100 100 100

Read% 92 90 76 56 89 86 88 67 96

VII. POSSIBLE PROBLEMS RFID innovation will persistently speak with the library database, the genuine peril of consolidating this innovation is in letting secure coordinated library framework (ILS) database be reached/refreshed/opened a few times and along these lines make them inclined to programmers [3]. A portion of the innovative issues that may happen with RFID applications in libraries are: • RFID labels are not covered up since these labels are ordinarily appended to within back cover and are presented to vandalism. • Some impedance from metallic material in book spreads, CDs and DVDs does happen and label perusing may not be right. • RFID labels are anything but difficult to shield from perusers by standard aluminum thwarts and may not effectively be hostile to robbery devices. • RFID perusing exactness decreases if numerous things are perused at the same time. • RFID reader range depends on its power and antenna size. Notwithstanding these specialized issues, there might be different challenges in executing RFID frameworks in libraries. A portion of these are: • Privacy issues. • Forward (future) similarity and between library tasks because of contrasts in labels or programming. • Limitations in reorganization of library spaces. • Metal shelves may hinder operations of readers and sensors. • Operational challenges, for example, establishment of return chutes, arrangement of intensity supply close to oneself registration/registration work areas or chutes. • Spending confinements for innovation upgradation as RFID labels are more costly than scanner tags and security strips. VIII. CONCLUSION Supporter fulfillment has turned into a critical issue for curators. Despite the fact that the one of a kind preferences and adaptability of RFID is the uplifting news, the innovation is still not yet generally comprehended or introduced in the library condition. RFID, its application, institutionalization, and development are continually evolving. Its appropriation is still moderately new and consequently there are numerous highlights of the innovation that are not surely knew by the general masses. Advancements in RFID innovation keep on yielding bigger memory limits, more extensive perusing ranges, and quicker preparing. RFID is expanding in prevalence among libraries, as the early adopters of this innovation have appeared, it bodes well, both for substantial and little libraries.

IX.

REFERENCES

[1] J. Bohn, “Prototypical implementation of locationaware services based on a middleware architecture for super-distributed RFID tag infrastructures”, Pers Ubiquit computing, (2008) Journal 12:155-166. [2] Klaus Finkenzeller, “RFID Handbook, 2nd Edn” translated by Rachel Warrington. John Wiley, 2003. [3] Steve Lewis, “A Basic introduction to RFID Technology and its use in the supply Chain”. White paper by LARAN RFID Jan 2004. [4] RFID in Libraries site at http://www.libraryrfid.net/wordpress/index.php?cat=6 [5] “RFID for Libraries” at URL: http://www.bibliotech.com/html/rfid.html. [6] “RFID Survival” at URL: http://www.rfidsurvival.com/contact.html [7] Karen Coyle, “Management of RFID in Libraries” , Preprint version of article published in the Journal of Academic Librarianship, v. 31, n. 5, pp. 486-489 [8] www.wikipedia.org - Library [9] Psion Teklogix handheld reader manual – www.psionteklogix.com [10] Mercury 4 RFID reader manual – www.thingmagic.com [11] UHF RFID – Libraries taking the next step into the future – www.Adilam.com. [12] “RFID Library” at http://www.rfidlibrary.com/en/default_e.html

Authors Profile Mr. Mohd Abdul Rahman, M.Tech student in Embedded System from Nawab Shah Alam Khan College Of Engineering & Technology, Hyderabad. Ms. Ayesha Fatima ,ASSISTANT PROFESSOR Dept. of Electronics and Communication Engineering From Nawab Shah Alam Khan College Of Engineering & Technology, Hyderabad. Ms. ZEENATH received M.Tech in Digital Systems and Computer Electronics (DSCE) Engineering from Asifia College of Engineering and Technology JNTUH University & B.Tech ECE from Shadan Womens College Of Engineering & Technology. Presently She is an Associate Professor and HOD in Department of Electronics and Communication Engineering From Nawab Shah Alam Khan College Of Engineering & Technology(NSAKCET) Malakpet, Hyderabad. Her interests include Digital Image Processing. She has contributed many technical papers in International Journals and Conferences.

Related Documents


More Documents from ""