Implementation of RFID in Indian Scenario: A Case Study
Ms. Pallavi Kale1, Dr. Mohini T. Bherwani2
1Research Scholar, Shri Binzani City College, Nagpur India
2Librarian, Shri Binzani City College, Nagpur India
*Corresponding Author E-mail:pallavikale291982@yahoo.com, mohinibherwani@gmail.com
ABSTRACT:
Due to influence of information technology revolution on Library and Information Science field, various technologies are being widely used all around for betterment of library and information services. RFID technology is one step ahead to barcode system. RFID technology is being used in Library and Information Centers for security, tracking readers, quick inventory, and self check in and checkout etc. Present paper shows the technical details of RFID implementation in libraries of Indian Institutes of Technology (IIT) in India and also the reasons behind not implementation in education institutes.
KEYWORDS: RFID tag, Cost constraint, Rewritable, Library management software
INTRODUCTION:
Radio FrequencyIdentification is increasingly becoming an integral part of security systems these days. It increases productivity and convenience. RFID is used for hundreds, if not thousands, of application such as preventing theft of automobiles and merchandise, collecting tolls without stopping, managing traffic, gaining entrance to buildings, automating parking, controlling access of vehicles to gated communities, corporate campuses and airports, dispensing goods, proving ski lift access, tracking library books, buying hamburgers, and the growing opportunity to track a wealth of assets in supply chain management. RFID technology is also being pressed into service for use in U.S. homeland Security border crossings and intermodal container shipments while expediting low-risk activities.
Data Collection
Data has been collected from 10 IITs of India. Five of those are using the technology and 05 are not using it. Data was collected through telephonic interview and the results of the findings are as follows:
Table 1: Name of the Educational Institutes under study
Sr. No. |
Name of the Library |
URL |
Establishment Year |
Whether RFID Technology used in the library |
1 |
Indian Institute of Technology, Delhi |
http://www.iitd.ac.in/ |
1961 |
Yes |
2 |
Indian Institute of Technology, Guwahati |
http://www.iitg.ac.in/ |
1994 |
Yes |
3 |
Indian Institute of Technology, Mandi |
https://www.iitmandi.ac.in/ |
2009 |
Yes |
4 |
Indian Institute of Technology, Patna |
2008 |
Yes |
|
5 |
Indian Institute of Technology, Roorkee |
http://www.iitr.ac.in/ |
1847 |
Yes |
6 |
Indian Institute of Technology, Indore |
http://iiti.ac.in/ |
2009 |
No |
7 |
Indian Institute of Technology, Jodhpur |
2008 |
No |
|
8 |
Indian Institute of Technology, Kanpur |
1959 |
No |
|
9 |
Indian Institute of Technology, Mumbai |
1958 |
No |
|
10 |
Indian Institute of Technology, Ropar |
2008 |
No |
Collection of the Library
Sr. No. |
Name of the Library |
Total Collection (Printed Books) |
1 |
Indian Institute of Technology, Delhi |
105200 |
2 |
Indian Institute of Technology, Guwahati |
154564 |
3 |
Indian Institute of Technology, Mandi |
62415 |
4 |
Indian Institute of Technology, Patna |
54123 |
5 |
Indian Institute of Technology, Roorkee |
58613 |
6 |
Indian Institute of Technology, Indore |
12000 |
7 |
Indian Institute of Technology, Jodhpur |
17000 |
8 |
Indian Institute of Technology, Kanpur |
19000 |
9 |
Indian Institute of Technology, Mumbai |
36452 |
10 |
Indian Institute of Technology, Ropar |
21430 |
It was observed that the libraries whose collection was more than 50000, has initiated to install RFID in their libraries. The libraries whose collection is low has not installed RFID in their libraries.
Usage of Library Management Software
Sr. No. |
Name of the Library |
Library Management Software |
1 |
Indian Institute of Technology, Delhi |
Libsys |
2 |
Indian Institute of Technology, Guwahati |
Libsys |
3 |
Indian Institute of Technology, Mandi |
KOHA |
4 |
Indian Institute of Technology, Patna |
Libsys |
5 |
Indian Institute of Technology, Roorkee |
Libsys |
6 |
Indian Institute of Technology, Indore |
SLIM |
7 |
Indian Institute of Technology, Jodhpur |
Libman |
8 |
Indian Institute of Technology, Kanpur |
Soul |
9 |
Indian Institute of Technology, Mumbai |
Libsys |
10 |
Indian Institute of Technology, Ropar |
Libsys |
It was found that Libsys is the most widely used software in IITs whereas SOUL, SLIM, Libman and KOHA are used to some extent.
Frequency Band used
Sr. No. |
Name of the Library |
Frequency Band Used |
1 |
Indian Institute of Technology, Delhi |
High Frequency |
2 |
Indian Institute of Technology, Guwahati |
High Frequency |
3 |
Indian Institute of Technology, Mandi |
High Frequency |
4 |
Indian Institute of Technology, Patna |
High Frequency |
5 |
Indian Institute of Technology, Roorkee |
High Frequency |
In all the cases high frequency band is being used for RFID tags.
Feature of RFID Tag
Sr. No. |
Name of the Library |
Feature of RFID Tag |
||
Lockable |
Rewritable |
Theft Detection |
||
1 |
Indian Institute of Technology, Delhi |
Yes |
Yes |
Yes |
2 |
Indian Institute of Technology, Guwahati |
Yes |
Yes |
Yes |
3 |
Indian Institute of Technology, Mandi |
Yes |
Yes |
Yes |
4 |
Indian Institute of Technology, Patna |
Yes |
Yes |
Yes |
5 |
Indian Institute of Technology, Roorkee |
Yes |
Yes |
Yes |
It was found that RFID tag used in these libraries have all the features like those are rewritable, lockable and theft detection feature.
Reasons for Implementation of RFID in Libraries
Sr. No. |
Name of the Library |
Reasons for Implementation of RFID in Libraries |
|||
Theft Detection |
To reduce workload at circulation |
For proper shelving of books |
To provide prompt and timely service |
||
1 |
Indian Institute of Technology, Delhi |
Yes |
Yes |
Yes |
Yes |
2 |
Indian Institute of Technology, Guwahati |
Yes |
Yes |
Yes |
Yes |
3 |
Indian Institute of Technology, Mandi |
Yes |
Yes |
Yes |
Yes |
4 |
Indian Institute of Technology, Patna |
Yes |
Yes |
Yes |
Yes |
5 |
Indian Institute of Technology, Roorkee |
Yes |
Yes |
Yes |
Yes |
Sr. No. |
Name of the Library |
Reasons for Implementation of RFID in Libraries |
|||
To reduce manpowerr |
Better use of emerging technology |
Better stock verification |
Self check in and self check out |
||
1 |
Indian Institute of Technology, Delhi |
Yes |
Yes |
Yes |
Yes |
2 |
Indian Institute of Technology, Guwahati |
Yes |
Yes |
Yes |
Yes |
3 |
Indian Institute of Technology, Mandi |
Yes |
Yes |
Yes |
Yes |
4 |
Indian Institute of Technology, Patna |
Yes |
Yes |
Yes |
Yes |
5 |
Indian Institute of Technology, Roorkee |
Yes |
Yes |
Yes |
Yes |
Reasons for not implementing RFID in Libraries
Sr. No. |
Name of the Library |
Reasons for not Implementing of RFID in Libraries |
|||||
Higher cost constraint |
Non reliability on technology |
Attitude of staff |
Shortage of staff |
Lack of Awareness |
No need felt |
||
1 |
Indian Institute of Technology, Delhi |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
2 |
Indian Institute of Technology, Guwahati |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
3 |
Indian Institute of Technology, Mandi |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
4 |
Indian Institute of Technology, Patna |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
5 |
Indian Institute of Technology, Roorkee |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
FINDINGS:
Collection
It was observed that the libraries that have installed RFID have collection more than 50000.
Library Management Software
Study was carried out to find the name of Library Management Software for RFID Technology and it was found that Libsys 7 is the most used software (60%); followed by Koha, VTLS-VIRTUA, Libman, SLIM, and Soul (10%).
Objective of using RFID Technology
It was found that 24 (92.31%) libraries are using it for self check out, 26 (100.00%) are using it for reducing the work at circulation section, 23 (88.46%) for upgrading the knowledge of library staff, 23 (88.46%) use it so that the books can be returned to their proper place quickly, 25 (96.15%) use it to increase security and reduce theft, 24 (92.31%) use it because of reliability on new technology; and better inventory control, 21 (80.77%) use it for processing of new material, 20 (76.92%) use it to reduce overall cost of library staff and 23 (88.46%) use it for stock verification.
Feature of RFID Tag
23 (88.46%) have lockable section for item verification; 24 (92.31%) have re- writable section for library specific use and 26 (100.00%) has security function for item anti theft.
RFID Standardization
According to 15 (57.69%) librarians ISO is relevant standardization wheras 4 (15.38%) believe that ITU is relevant while 7 (26.92%) say that EPC is the relevant standard.
Type of RFID Tag
Tracking
Believe that it can be used for
Change in the number of library staff
15 (57.69%) felt no need for change in the number of staff, 2 (7.69%) felt increase in the no. of staff and 9 (34.61%) felt decrease in the no. of staff.
Reusability of RFID Tags
26(100%) librarians said that RFID tags can be re-used. The cost of RFID tags can be reduced because library books/items are taken out and returned many times.
Technical Issues
Technical issues include abnormal signals resulting from environmental differences, higher energy of electromagnetic waves in transient transmission while driving tags by RFID readers, consistency between different suppliers of RFID readers and tags.
Interference
Accuracy in the transmission process is influenced by real-time efficiency of the application. The problem is the detection of a signal. (96.15%) said that this problem occurs because of interference from metal or fog, the distance between the reader and the tag, and the antenna direction. (80.77%) believe that possibility of nearby devices interfering with security gates, the transmission of the security gates may also interfere with other nearby devices while (100%) say that interference occurs due to reader collision. Reader collision occurs because the signal from one reader can interfere with the signal from another where coverage overlaps. Once this happens, it is likely that the RFID reader is transmitting incorrect information.
Privacy Issues
An RFID system can detect all activities or transactions performed by users using an RFID reader. However, this raises the issue of users’ and staff members’ privacy . Because of this, some libraries have chosen not to implement an RFID system. All user activities in a library such as reading and browsing, can be easily detected by the RFID reader . Some users may object to an RFID related system due to the perceived invasion of privacy.
Data management
The implementation of RFID technology enhances the efficiency and effectiveness of data management in libraries. All the librarians have said that, implementation of RFID technology automates library management and is very efficient for data management.
Stock Verification
14 (53.84%) out of 26 library do the stock verification every year. They are doing this with the help of RFID wand and they find it convenient to do it with the help of RFID wand.
IT Skill
20 (76.92%) librarians believe that the staff needs IT skill for implementation of RFID Technology; 17 (65.38%) said that the staff has sufficient IT skill to work with RFID Technology. 21 (80.77%) say that the staff must be given special training to work with RFID Technoloogy and 25 (96.15%) said that the training was given to staff by the supplier.
CONCLUSIONS:
1. RFID technology can be applied best in middle or larger size libraries.
2. RFID offers considerable advantages in library management as compared to conventional bar codes and magnetic stripes.
3. It provides more intelligent library management which in turn means better service quality for the clientele.
4. RFID technology supports tracking of library materials, reduces threats to the library collection, improves accuracy of data collection, and reduces the amount of time required to perform the circulation operations of check-in, check-out, inventory control and shelf-management.
5. RFID applications lead to significant savings in staff costs, enhance service and provide efficient results, which leads to fool proof security and access control.
6. RFID) technology does not require contact for line of sight for communication. RFID data can be read through the human body, clothing and non-metallic materials.
7. It is possible to compromise an RFID system by wrapping the household foil to block the radio signal. It is also possible to compromise an RFID system by placing two items against one another so that one tag overlays another. That may cancel out the signals. This requires knowledge of the technology and careful alignment.
8. The RFID Tags cannot be concealed in either spine or gutter of the books and are exposed for removal. If a library wishes, it can insert the RFID tags in the spines of all except thin books; however, not all RFID tags are flexible enough. A library can also imprint the RFID tags with its logo and make them appear to be bookplates, or it can put a printed cover label over each tag.
9. Compatibility between tags and readers is important, along with the required frequency and other parameters.
10. The lack of technology experts, integration with current systems or processes and difficulty in integrating with existing library automation systems are barriers to RFID systems.
11. Developments in RFID technology continue to yield larger memory capacities, wider reading ranges, and faster processing.
12. RFID tags last longer than barcodes because nothing comes into contact with them.
SUGGESTIONS:
1. Cost constraint is the basic reason behind not implementing RFID technology, if the cost of implementation will be reduced then even the small libraries will also be able to implement the technology.
2. Library users and staff should be educated about RFID technology so they can have a better understanding of the benefits and privacy issues. Once they realize that RFID technology can improve data security and reduce transaction errors, they will be more inclined to use RFID technology.
3. The other reason behind its avoidance is the fear of accepting the technology, if more workshops and seminars for library staff on the use of technology will be arranged, this fear can be removed.
4. The overall system at the checkout performs well, but the cost can be reduced if the number of servers increased.
5. Most libraries use RFID for a security function. RFID technology provides security through its ability to detect whether or not a book is checked-out. However, users with ill intent may exploit the non-line-of-sight operation and other weaknesses in a library’s RFID system resulting in theft and loss of library material. Such threats may be addressed by employing non-tag based security as well.
6. The library also presents unique challenges for RFID adoption, including technological constraints, cost concerns and privacy concerns. Hence, researchers in different fields should leverage their expertise to address these challenges, including the high cost of development of an RFID project, market degeneration and unnecessary development, and the development of an international standard.
7. Privacy is a subject of contention as all activities performed by users can be detected easily by RFID readers. Legal issues concerning users’ consent to data tracking need to be addressed.
8. Libraries would be more inclined to adopt RFID technology if privacy concerns are addressed through advancements in technology and legislation safeguarding user privacy.
REFERENCES:
1. Chelliah, John, Suresh Sood, and Sally Scholfield. "Realising the strategic value of RFID in academic libraries: a case study of the University of Technology Sydney." The Australian Library Journal 64.2 (2015): 113-127.
2. Edwards, E. O., and P. E. Orukpe. "Development of a RFID based library management system and user access control." Nigerian Journal of Technology 33.4 (2014): 574-584.
3. Lijuan, Liu Shaorong Du Yeli Zhang. "The Analysis of the Implementation of RFID Technology in Library [J]." Journal of Academic Libraries 1.9 (2011): 023.
4. Roberts, Chris M. "Radio frequency identification (RFID)." Computers and security 25.1 (2006): 18-26.
5. Shahid, Syed Md. "Use of RFID technology in libraries: A new approach to circulation, tracking, inventorying, and security of library materials." (2005).
Received on 07.05.2017 Accepted on 09.06.2017 © EnggResearch.net All Right Reserved Int. J. Tech. 2017; 7(1): 51-55. DOI:10.5958/2231-3915.2017.00010.4 |
|