Application of RFID Technology in Libraries
Keywords:
Library, RFID, Radio Waves, Security, TagAbstract
Librarians are recognized for being early adopter’s technologies, but they've begun to use RFID to deliver more efficient as well as effective circulation services, as well as to protect library assets. Despite the fact that RFID adoption in libraries has increased significantly in recent years, the expense of the technology, the lack of standards, as well as privacy protection remain key hurdles to additional libraries adopting it. In terms of budgetary restrictions, if libraries adopt such technologies, the increases the quality of "Return on Investments" might be obtained, as it would speed up the circulating process by allowing employees to engage in the other user behavior. Libraries that wish to utilize RFID need to use ISO 28560 compatible RFID tags in combination to ISO 15693, ISO 18000-3, as well as other NISO-established worldwide guidelines due to the absence of standardization. Libraries should follow industry standards and keep no personal information on RFID tags to preserve users' privacy. Whether or whether libraries utilize RFID technology now, they won't be able to escape it in the future since book wholesalers offer publications which have already been identified for free. RFID is the newest technology used in library theft detection methods (Radio Frequency Identification). Apart from EM (Electro-Mechanical) and RF (Radio Frequency) systems, which have long been used in libraries, RFID-based systems go beyond security to be become traceability capable of integrating security with much more efficient resources monitoring all through the library, such as easier and quicker charge as well as discharge, inventory, and handling of materials.
Downloads
References
N. K. Singh and P. Mahajan, “Application of RFID technology in libraries,” Int. J. Libr. Inf. Stud., 2014. [2] X. Wang, H. Pan, and R. Ou, “Library’s Smart Bookshelf and Book Positioning System Based on ultra-high frequency RFID Technology,” 2017, doi: 10.2991/msmee-17.2017.45.
N. K. Singh and P. Mahajan, “APPLICATION OF RFID TECHNOLOGY IN LIBRARIES International Journal of Library and Information Studies,” Int. J. Libr. Inf. Stud., 2014.
P. Pandey and K. D. Mahajan, “Application of RFID Technology in Libraries and Role of Librarian,” 12th MANLIBNET Conv. 2010, 2010.
N. K. Singh and P. Mahajan, “Application of radio frequency identification technology in libraries and information centres: An Indian perspective,” Libr. Philos. Pract., 2017.
A. Chanda and M. K. Sinha, “Exploring RFID Technology application for managing Library and Information Services in University and Institutional Libraries of North East India: An Overview,” Int. J. Inf. Sources Serv., 2014.
P. K. Goswami and G. Goswami, “Machine learning supervised antenna for software defined cognitive radios,” Int. J. Electron., 2021, doi: 10.1080/00207217.2021.1969447.
P. K. Goswami and G. Goswami, “A corner truncated fractal slot ultrawide spectrum sensing antenna for wireless cognitive radio sensor network,” Int. J. Commun. Syst., 2021, doi: 10.1002/dac.4710.
Y. C. Luo, J. J. Cao, and J. F. Qian, “Exploration and construction of smart library based on RFID technology,” 2013, doi: 10.4028/www.scientific.net/AMR.765-767.1743.
F. Hamdani, “PENERAPAN RFID ( RADIO FREQUENCY IDENTIFICATION ) DI PERPUSTAKAAN : KELEBIHAN DAN KEKURANGANNYA,” Penerapan RFID (Radio Freq. Identification) di Perpust. Kelebihan dan Kekurangan, 2014.
“Aplikasi Sistem Parkir dengan Automatisasi Pembiayaan Berbasis RFID (Radio Frequency Identification),” TRANSMISI, 2011, doi: 10.12777/transmisi.13.3.108-113.
D. Lucien, “Smart Library,” Georg. South. Univ. Res. Symp. 95. 16 April 2016, Statesboro, Georg. United States, 2016.
[13]V. D. Kadam, G. R. Changule, S. H. Choudhary, and L. P. Gade, “Glandular odontogenic cyst in a young Indian female: A rare case report with review of literature,” J. Indian Acad. Oral Med. Radiol., 2020, doi: 10.4103/jiaomr.jiaomr_34_20.
S. Choudhary, L. Kale, S. Mishra, N. Supe, N. Zaidi, and N. Pandey, “Modified occlusal technique using intraoral periapical film: An alternative approach,” J. Indian Acad. Oral Med. Radiol., 2018, doi: 10.4103/jiaomr.jiaomr_68_17.
L. Taneja, V. Arya, A. Gupta, and M. K. Sunil, “Adenomatoid Odontogenic Tumor: Intraosseous Variant-A Case Series and Review of Literature,” Journal of Indian Academy of Oral Medicine and Radiology. 2017, doi: 10.4103/jiaomr.JIAOMR_40_16.
R. Garg, B. Fernandes, and M. Sunil, “Unusual radiopacities spotted in a dental radiograph: Case report,” J. Indian Acad. Oral Med. Radiol., 2017, doi: 10.4103/jiaomr.JIAOMR_118_16.
R. Sharma, A. K. Agarwal, and P. K. Singh, “Transaction security in RFID credit card by polynomial arithmetic along with Euclidean parameters,” Int. J. Eng. Technol., 2015.
R. Vaddi, R. P. Agarwal, S. Dasgupta, and T. T. Kim, “Design and analysis of double-gate MOSFETs for ultra-low power radio frequency identification (RFID): Device and circuit co-design,” J. Low Power Electron. Appl., 2011, doi: 10.3390/jlpea1020277.
K. Sharma and L. Goswami, “RFID based Smart Railway Pantograph Control in a Different Phase of Power Line,” 2020, doi: 10.1109/ICIRCA48905.2020.9183202.
D. Singh, “Robust controlling of thermal mixing procedure by means of sliding type controlling,” Int. J. Eng. Adv. Technol., 2019, doi: 10.35940/ijeat.F1303.0986S319.
V. Anand, “Photovoltaic actuated induction motor for driving electric vehicle,” Int. J. Eng. Adv. Technol., 2019, doi: 10.35940/ijeat.F1298.0986S319.
P. Choudhary and R. K. Dwivedi, “A novel algorithm for traffic control using thread based virtual traffic light,” Int. J. Inf. Technol., 2021, doi: 10.1007/s41870-021-00808-6.
S. Tyagi, R. K. Dwivedi, and A. K. Saxena, “A novel PDF steganography optimized using segmentation technique,” Int. J. Inf. Technol., 2020, doi: 10.1007/s41870-019-00309-7.
R. K. Jindal, A. K. Agarwal, and A. K. Sahoo, “Envisaging the road accidents using regression analysis,” Int. J. Adv. Sci. Technol., 2020.
R. Naaz, A. K. Saxena, and D. Ather, “A framework for implementing blockchain with enhanced e2e encryption on ethereum 2.0,” Int. J. Adv. Sci. Technol., 2019.