SlideShare una empresa de Scribd logo
1 de 21
RFID Library Management and Security System
Books and Journals account for the majority of library material
- Databases for catalogue and search have significantly improved
- Automation of materials handling remains in the stone age
• Mis-shelved books, poor inventory accuracy
• Increased material handling time/costs
• Long lines at circulation desks
• Removal of book/tape/CD from the library
• Inefficient use of trained staff
The dilemma – how can librarians spend more time with students when they spend most of
their day coping with the avalanche of materials in transit?
We need a solution, where technology actually buys time and productivity…
TheConcern
The main reasons for considering new technologies are the
potential for cost savings and the management of material flows.
Barcodes
TheSaviour
…simply points at the database
TheSaviour
• We need a technology that …
• Is more efficient than bar codes
• Reduces manual handling time
• Improve inventory process
• Provide security to library items
We need
RFID (Radio Frequency IDentification)
HowRFIDworks ?
Antenna
Reader
Host
Computer
g
g
Ta Chip
Polyethylene Media
Copper coil antenna
@Tag receives signal
and gets charged
O Antenna reads the data
and sends to reader 0 Reader sends data/info to
computer for processing
0 Computer sends event based
data to be stored on tag
O Reader broadcasts
signal through antenna
C)The Charged tag sends identifying
response back to the reader
• Tags for libraries last for the lifetime of the books or other material to
which it is attached
• Electronic information can be over-written repeatedly
• Unlike barcodes, RFID tags can be read;-
– Through desktops and book covers (no line of sight is required)
– In any orientation to the reader/antenna
– While moving
– Several at a time
– From distances of several feet to the antenna
• RFID improves library workflow, staff productivity and customer service
with these attributes
• Ability to conduct inventory counts without removing books from the
shelves, is what really separates RFID from preceding technologies
such as barcodes
• Barcode limitation is no signal feed for anti-theft systems
RFID–Key Attributes
RFIDover Barcodes
Feature RFID Tags Barcodes
Read more than one item at a time Yes No
Read while item is moving Yes No
User Programmable Yes No
Line of site read not required Yes No
Lifetime guarantee Yes No
Sturdy in harsh environments Yes No
Able to resist water damage Yes No
Built-in security Yes No
Inventory without handling items Yes No
Able to locate specific items on shelves Yes No
Use with automatic returns units Yes No
SystemComponents
RFID Tags
• Paper thin label
• Placed inconspicuously on the inside cover of each book
in a library’s collection
• Consists of an etched antenna and a tiny chip which stores vital item
information including a unique ID number
• Provides identification and security in a single tag
• Password protected anti-theft security bit
Specifications
Chip- Philips I-Code SLI-L
13.56 MHz Frequency
ISO 15693, 18000-3
256-2048 bits Read / Write Memory
Maximum Read Range : 1 meter
Anti-collision (Multi-read)
Performance ?
RFID Patron Card
• 13.56 MHz, ISO standard size: 85,7 x 54 mm Laminated PVC (flexi/hard)
• Unique ID eliminates risk of duplicate cards
• Personalized with relevant information about the Library member like
membership No. etc
• Compatible with other auto-id systems – access control, ePayment,
eAttendance etc
Patron Card Printer
• Color dye sublimation and monochrome thermal transfer
• Print speed of 150 cards/hour in color and 1,000 cards/hour in monochrome
• Print head resolution: 300 dpi
• eMedia Card Designer Software Standard Edition for designing
and editing badges
Components contd..
Multipurpose Staff Station
• Versatile unit that operate as a circulation desk or tag encoding station
• Multiple simultaneous checkouts, checkins and renewals
• Arm / Disarm Library items
• Identify the borrower using RFID Patron Cards
• Tagging of new library items
• Programming RFID Patron Cards
Tagging Station
• The Tag Programming Station simplifies the move to rfLiMS
• Convert existing material to RFID quickly and easily; more than 3
items per minute
• Program RFID patron cards and update the information in the ILS
System database
• Processes bar code & RFID Tags
Components contd..
Self Check Station
• Enables library patrons to manage their own transactions easily and efficiently
• Simplifies the checkout, checkin and renewal process
• Double return bin option provides item separation at return
• SIP2 circulation protocol
• Integrated touch screen and receipt printer
Components contd..
Self Check-In Drop Box
The Book Drop Station can be placed at any convenient location to enable patrons to return their
items anytime, even after the library is closed. The loans are instantaneously cancelled, patrons may
immediately borrow again.
• SIP2 circulation protocol
• Reactivates security bit
• Provides return receipts
• Depressible Receiving Cart
Components contd..
Wireless Inventory Management System
Cordless RFID reader and mobile computer (PDA) combines convenience with versatility and
provides advanced capabilities -
• Fast, efficient inventory
• Locates misplaced volumes
• Arm / disarm item (optional)
• Unique feature of marking items for bindery during inventory
• Individual and Multiple item search with audio-visual signal
Specifications:
Microsoft Windows CE 5.0
FCC regulations Compliant
IP55 Environmental Sealing
20-hour battery life
4’ drop threshold
Components contd..
Security Gates
Most modern detection algorithm that constantly detects any unauthorized
item removal.
• Covers approximately 1 meter wide pathway with no orientation limits
• Variable gate width of up to 1.80 m (2 x 90 cm)
• Visual and audible alarms at unauthorized item being taken out
• Anti-collision feature
Components contd..
Security Station
Placed at the exit gates, provides an alternate solution for
security using RFID tags.
• Manned Station at the library exit gates
• Quick and easy detection of item circulation status
• Provides fool-proof security
Components contd..
RFID Server
Central Control Unit for all the RFID stations in the local network.
• Primary database server
• Acts as a backup server in case of LMS connection failure
• Web based Admin Console
• Monitor and configure RFID workstations, view inventory reports etc.
• Define Access Control Levels to the users of Multipurpose Staff Station etc.
Sorting Station
Improve service for patrons and simplify work for library staff
by automating material handling tasks.
• Automated round the clock check-in
• Automated Materials Sorting by shelving locations
• Expandable due to modular structure
• Reduces turnaround time of item shelving
for library management andstaff
• Reduced time and labor for checking-in and checking-out materials
• Significant reduction in time spent doing inventory and stock verification
• Stock verification without closing the library
• Reduced time and labor spent searching for misplaced / lost items
• Increased circulation through self-check, leaving staff for more meaningful value-added services
• Lesser staff at the circulation desk during a busy period
• Less number and value of lost items for a specified time period
• Less maintenance cost due to lifetime guarantee of RFID tags
Benefits
for library users
• Faster, easier and convenient to use
• Shorter waiting time at circulation desk
• Higher availability of library items due to faster book turnover
• 24-hours return facility of library items
• Faster and accurate re-shelving; patrons can find items where they should be, hence quicker and
more satisfying service
• Better library experience; more frequent visits
Benefits
Standards
The main standards pertaining to library RFID are
• SIP2 (Standard Interchange Protocol V2) / NCIP
• ISO 15693 and 18000-3
SIP2/ NCIP manages the communication between the RFID system and the library software
ISO 15693 defines the physical characteristics, air interface, and communication protocol
which
will be employed with the 13.56 MHz RFID tags used in libraries
Benefits
SIP2/NCIP makes interfacing with the library software fast and seamless
ISO tags are available from a range of suppliers; not locked into purchasing from a single
supplier
Scalable solution to realize the full potential of fast-evolving RFID technology
Grandes Mentes brings the key elements of the whole solution
together to provide end-to-end solution for your libraries
• Project Management / Co-ordination
• Integration to LMS
• System Installation
• Testing & commissioning
• Item Conversion
• Patron Cards Printer, on demand printer rolls
• 12 months warranty with onsite support personnel
Services &Support
Company Overview
Application research based company, developing identification, security
and tracking solutions, empowered with RFID technology.
We value Strategic Focus, Disciplined Execution and Best
Customized Solution
Sales Contact- 777-494-0375
Sales Email- sales@grandes-mentes.com
https://grandes-mentes.com/

Más contenido relacionado

Similar a GrandesMentes_Library AutomationSolution.pptx

RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management Systemrabeena tasleem
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency IdentificationNadeem Raza
 
School library automation
School library automationSchool library automation
School library automationKuldeep Swami
 
RFID Part-19
RFID Part-19RFID Part-19
RFID Part-19Techvilla
 
03 internet-of-things-rfid-systems-and-applications
03 internet-of-things-rfid-systems-and-applications03 internet-of-things-rfid-systems-and-applications
03 internet-of-things-rfid-systems-and-applicationsJohn Soldatos
 
Technology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesTechnology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesHoueida Kammourié
 
RFID: What is it? Where is it going? Is it right for you library?
RFID: What is it?  Where is it going? Is it right for you library?RFID: What is it?  Where is it going? Is it right for you library?
RFID: What is it? Where is it going? Is it right for you library?loriayre
 
Mobile Apps or Else
Mobile Apps or ElseMobile Apps or Else
Mobile Apps or ElseOAUGNJ
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And ApplicationFishEyeBox
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in librariesShivashish Verma
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptxlisbala
 

Similar a GrandesMentes_Library AutomationSolution.pptx (20)

RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
School library automation
School library automationSchool library automation
School library automation
 
RFID Part-19
RFID Part-19RFID Part-19
RFID Part-19
 
Bibliotheca the best library
Bibliotheca  the best libraryBibliotheca  the best library
Bibliotheca the best library
 
Rfid&digitization service
Rfid&digitization serviceRfid&digitization service
Rfid&digitization service
 
RFID In LMS
RFID In LMSRFID In LMS
RFID In LMS
 
03 internet-of-things-rfid-systems-and-applications
03 internet-of-things-rfid-systems-and-applications03 internet-of-things-rfid-systems-and-applications
03 internet-of-things-rfid-systems-and-applications
 
Technology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesTechnology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. Barcodes
 
RFID: What is it? Where is it going? Is it right for you library?
RFID: What is it?  Where is it going? Is it right for you library?RFID: What is it?  Where is it going? Is it right for you library?
RFID: What is it? Where is it going? Is it right for you library?
 
Mobile Apps or Else
Mobile Apps or ElseMobile Apps or Else
Mobile Apps or Else
 
RFID MIND MAPS.pdf
RFID MIND MAPS.pdfRFID MIND MAPS.pdf
RFID MIND MAPS.pdf
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And Application
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in libraries
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

GrandesMentes_Library AutomationSolution.pptx

  • 1. RFID Library Management and Security System
  • 2. Books and Journals account for the majority of library material - Databases for catalogue and search have significantly improved - Automation of materials handling remains in the stone age • Mis-shelved books, poor inventory accuracy • Increased material handling time/costs • Long lines at circulation desks • Removal of book/tape/CD from the library • Inefficient use of trained staff The dilemma – how can librarians spend more time with students when they spend most of their day coping with the avalanche of materials in transit? We need a solution, where technology actually buys time and productivity… TheConcern
  • 3. The main reasons for considering new technologies are the potential for cost savings and the management of material flows. Barcodes TheSaviour …simply points at the database
  • 4. TheSaviour • We need a technology that … • Is more efficient than bar codes • Reduces manual handling time • Improve inventory process • Provide security to library items We need RFID (Radio Frequency IDentification)
  • 5. HowRFIDworks ? Antenna Reader Host Computer g g Ta Chip Polyethylene Media Copper coil antenna @Tag receives signal and gets charged O Antenna reads the data and sends to reader 0 Reader sends data/info to computer for processing 0 Computer sends event based data to be stored on tag O Reader broadcasts signal through antenna C)The Charged tag sends identifying response back to the reader
  • 6. • Tags for libraries last for the lifetime of the books or other material to which it is attached • Electronic information can be over-written repeatedly • Unlike barcodes, RFID tags can be read;- – Through desktops and book covers (no line of sight is required) – In any orientation to the reader/antenna – While moving – Several at a time – From distances of several feet to the antenna • RFID improves library workflow, staff productivity and customer service with these attributes • Ability to conduct inventory counts without removing books from the shelves, is what really separates RFID from preceding technologies such as barcodes • Barcode limitation is no signal feed for anti-theft systems RFID–Key Attributes
  • 7. RFIDover Barcodes Feature RFID Tags Barcodes Read more than one item at a time Yes No Read while item is moving Yes No User Programmable Yes No Line of site read not required Yes No Lifetime guarantee Yes No Sturdy in harsh environments Yes No Able to resist water damage Yes No Built-in security Yes No Inventory without handling items Yes No Able to locate specific items on shelves Yes No Use with automatic returns units Yes No
  • 8. SystemComponents RFID Tags • Paper thin label • Placed inconspicuously on the inside cover of each book in a library’s collection • Consists of an etched antenna and a tiny chip which stores vital item information including a unique ID number • Provides identification and security in a single tag • Password protected anti-theft security bit Specifications Chip- Philips I-Code SLI-L 13.56 MHz Frequency ISO 15693, 18000-3 256-2048 bits Read / Write Memory Maximum Read Range : 1 meter Anti-collision (Multi-read) Performance ?
  • 9.
  • 10. RFID Patron Card • 13.56 MHz, ISO standard size: 85,7 x 54 mm Laminated PVC (flexi/hard) • Unique ID eliminates risk of duplicate cards • Personalized with relevant information about the Library member like membership No. etc • Compatible with other auto-id systems – access control, ePayment, eAttendance etc Patron Card Printer • Color dye sublimation and monochrome thermal transfer • Print speed of 150 cards/hour in color and 1,000 cards/hour in monochrome • Print head resolution: 300 dpi • eMedia Card Designer Software Standard Edition for designing and editing badges Components contd..
  • 11. Multipurpose Staff Station • Versatile unit that operate as a circulation desk or tag encoding station • Multiple simultaneous checkouts, checkins and renewals • Arm / Disarm Library items • Identify the borrower using RFID Patron Cards • Tagging of new library items • Programming RFID Patron Cards Tagging Station • The Tag Programming Station simplifies the move to rfLiMS • Convert existing material to RFID quickly and easily; more than 3 items per minute • Program RFID patron cards and update the information in the ILS System database • Processes bar code & RFID Tags Components contd..
  • 12. Self Check Station • Enables library patrons to manage their own transactions easily and efficiently • Simplifies the checkout, checkin and renewal process • Double return bin option provides item separation at return • SIP2 circulation protocol • Integrated touch screen and receipt printer Components contd..
  • 13. Self Check-In Drop Box The Book Drop Station can be placed at any convenient location to enable patrons to return their items anytime, even after the library is closed. The loans are instantaneously cancelled, patrons may immediately borrow again. • SIP2 circulation protocol • Reactivates security bit • Provides return receipts • Depressible Receiving Cart Components contd..
  • 14. Wireless Inventory Management System Cordless RFID reader and mobile computer (PDA) combines convenience with versatility and provides advanced capabilities - • Fast, efficient inventory • Locates misplaced volumes • Arm / disarm item (optional) • Unique feature of marking items for bindery during inventory • Individual and Multiple item search with audio-visual signal Specifications: Microsoft Windows CE 5.0 FCC regulations Compliant IP55 Environmental Sealing 20-hour battery life 4’ drop threshold Components contd..
  • 15. Security Gates Most modern detection algorithm that constantly detects any unauthorized item removal. • Covers approximately 1 meter wide pathway with no orientation limits • Variable gate width of up to 1.80 m (2 x 90 cm) • Visual and audible alarms at unauthorized item being taken out • Anti-collision feature Components contd.. Security Station Placed at the exit gates, provides an alternate solution for security using RFID tags. • Manned Station at the library exit gates • Quick and easy detection of item circulation status • Provides fool-proof security
  • 16. Components contd.. RFID Server Central Control Unit for all the RFID stations in the local network. • Primary database server • Acts as a backup server in case of LMS connection failure • Web based Admin Console • Monitor and configure RFID workstations, view inventory reports etc. • Define Access Control Levels to the users of Multipurpose Staff Station etc. Sorting Station Improve service for patrons and simplify work for library staff by automating material handling tasks. • Automated round the clock check-in • Automated Materials Sorting by shelving locations • Expandable due to modular structure • Reduces turnaround time of item shelving
  • 17. for library management andstaff • Reduced time and labor for checking-in and checking-out materials • Significant reduction in time spent doing inventory and stock verification • Stock verification without closing the library • Reduced time and labor spent searching for misplaced / lost items • Increased circulation through self-check, leaving staff for more meaningful value-added services • Lesser staff at the circulation desk during a busy period • Less number and value of lost items for a specified time period • Less maintenance cost due to lifetime guarantee of RFID tags Benefits
  • 18. for library users • Faster, easier and convenient to use • Shorter waiting time at circulation desk • Higher availability of library items due to faster book turnover • 24-hours return facility of library items • Faster and accurate re-shelving; patrons can find items where they should be, hence quicker and more satisfying service • Better library experience; more frequent visits Benefits
  • 19. Standards The main standards pertaining to library RFID are • SIP2 (Standard Interchange Protocol V2) / NCIP • ISO 15693 and 18000-3 SIP2/ NCIP manages the communication between the RFID system and the library software ISO 15693 defines the physical characteristics, air interface, and communication protocol which will be employed with the 13.56 MHz RFID tags used in libraries Benefits SIP2/NCIP makes interfacing with the library software fast and seamless ISO tags are available from a range of suppliers; not locked into purchasing from a single supplier Scalable solution to realize the full potential of fast-evolving RFID technology
  • 20. Grandes Mentes brings the key elements of the whole solution together to provide end-to-end solution for your libraries • Project Management / Co-ordination • Integration to LMS • System Installation • Testing & commissioning • Item Conversion • Patron Cards Printer, on demand printer rolls • 12 months warranty with onsite support personnel Services &Support
  • 21. Company Overview Application research based company, developing identification, security and tracking solutions, empowered with RFID technology. We value Strategic Focus, Disciplined Execution and Best Customized Solution Sales Contact- 777-494-0375 Sales Email- sales@grandes-mentes.com https://grandes-mentes.com/