2. DEFINATION
a) A place in which literary and artistic
materials, such as books, periodicals,
newspapers, pamphlets, prints, records,
and tapes, are kept for
reading, reference, or lending.
b) A collection of such materials, especially
when systematically arranged.
c) A room in a private home for such a collection.
d) An institution or foundation maintaining such a collection.
e) A commercial establishment that lends books for a fee.
f) A series or set of books issued by a publisher.
g) A collection of recorded data or tapes arranged for ease of use.
3. OBJECTIVE OF LIBRARY MANAGEMENT
a) Build and manage library collections in support of
academic programs (Develop collections consistent with funding) .
b) Provide timely access to requested materials .
c) Simplify search/discovery of library resources .
d) Build Digital Library infrastructure .
e) Build the information literacy/library instruction program .
f) Increase library outreach and marketing efforts .
g) Undertake systematic review of reference services designed
both to adapt to changes in facilities and technology and
to improve quality of service delivered .
4. LIBRARY
MANAGEMENT
INDEGINIOUS BAR CODE RFID
METHOD SYSTEM SYSTEM
5. INDEGINIOUS (SELF MADE ) METHOD FOR LIBRARY
MANAGEMENT
1. To make and execute the same we have made certain working excel
sheets and combined them all in a workbook.
2. The whole management can be sub-divided under the following
tasks-
a) Receiving subscriptions from members.
b) Data recording of members.
c) Purchase of books
d) Subscription to newspapers and magazines.
e) Assigning shelves to books (we’ve done it according to ‘genre’)
f) Issuing and managing books.
g) Archiving.
h) Inventory management/valuation.
6.
7.
8. Merits:
a) Can be developed within the convenience of home.
b) Requirement:
1. Hardware = basic computer.
2. software = MS office MS excel (2007 for
enhanced experience).
3. Knowledge = Basic excel and computer usage
knowledge.
c) Almost free of cost.
9. Demerits :
a) Cannot support huge data.
b) Is not a fool-proof solution for library
management.
c) Flexible only to a limited extent.
d) Can and should be used only for experimental
and evaluation purposes.
e) Limited to the knowledge of user/developer.
10. Bar code system for library
management
-A barcode is a series of parallel alternating black and
white patterns that represents a sequence of
numbers or characters.
-A barcode font is a specially designed font that allows
you to specify and generate barcodes on normal
text characters.
-It is extremely easy to use.
11. Bar code system for library
management
-Through Barcode based library management, manual
circulation of resources completely eliminated.
-each and every book, chart is pasted with barcode
labels.
- members are issued barcode enabled membership
cards.
12. -These member cards can have
logo of the institute, photo of the user,
institute address and name and contact
details of
the user on the member library card.
-Library can take the print out of any of the
above any time during the session and any
number of times.
13. INCORPORATING BAR CODE IN
LIBRARIES
THE TYPICAL SEQUENCE WOULD BE
Database creation.
Bar Coding membership cards.
Installation of suitable scanning equipment.
Set different criteria for transactions.
14. Hardware:
1. Label (Polyester)
3. Barcode Printer: The special printer is used to print
the barcode label and
member ID’s for the library.
4. Barcode Software: barcode software is used to generate
the barcode label. The name and address, etc and user
name, id, address can be included in the label.
5. Fixed Barcode Scanner
Barcode scanner will scan the barcode details of the
member, once the account become active, the staff can
scan the barcode label of the book.
6. Wireless Barcode Scanner, is used for the stock taking
of the collection.
The barcode wireless scanner can be taken anywhere
within the shelves, labels can be scanned and the
information will be collected on the PC in the library
anywhere.
15.
16.
17.
18. Benefits of Bar coding (in library
management)
1. Quick and error free entry of access and
membership codes.
2. Ensures total integrity of collected data.
3. No queuing up at check out/check in counters.
4. Avoids piling up of data entry work for counter staff.
5. Aids generation of suitable reminders to delinquent
borrowers.
6. Stock verification made easy
19.
20. RFID (RADIO FREQUENCY IDENTIFICATION) is a
technology that is sparking interest in the
library community because of its applications
that promise to increase efficiency,
productivity and enhance user satisfaction.
RFID is a combination of radio-frequency-
based technology and microchip technology
(works on high frequency = 13.56 MHZ).
RFID TECHNOLOGY = RADIO FREQUENCY
BASED TECHNOLOGY + MICROCHIP
TECHNOLOGY
21. RFID-based systems = tracking systems + security
throughout the library .
including easier and faster ,inventorying, and materials
handling.
In libraries, all the library assets =
books,
manuscripts,
CDS,
DVDs,
videos,
audio cassettes, etc.
have to be embedded with RFID tags.
22. Thus, in a library, an RFID system consists
of:
1. A smart label attached to a library item.
Smart label = memory chip + RF antenna to send
and receive data and can be programmed
2. Hardware =
for interrogating/making connection with the
smart label .
3. Software =
controlling the hardware,
programming the tags,
decoding the responses from smart labels in the
interrogation zone (3-5 feet).
23. • The three main system components can be further
separated into six more sub-components:
– A smart label or a tag
– A reader
– An encoder or a printer
– A middleware
– An application software
– A host system or a server
• RFID middleware is software that connects:
data coming in from tags + to the library management system.
RFID hardware operations----- RFID middleware --- existing library
management system.
24. Server (communication gateway) : Is the heart
of an RFID application system.
Communication gateway among the various
components of the system, it receives
information from one or more of the readers
and exchanges information with the library
databases.
SERVER
LIBRARY
READER
DATABASE
25. • The applications software: Would have the APIs
• (API: Applications Programming Interface) necessary to connect
the RFID system with the server, etc. so as to achieve library
system.
• RFID application software is generally a browser-based for
centralized monitoring.
• The software enables :
- safe,
- secure and
- highly efficient movement
of library items by asset tracking and prevents
loss or tampering.
RFID HARDWARE-----APPLICATION SOFTWARE-----LIBRARY DATABASE
26. PROCESS OF RFID MANAGEMENT
1. AUTOMATED CHECK IN
-AFFIXING TAGS
(HARDWARE: RFID TAG + HANDHELD SCANNER)
2. OPTIMISING SEARCH (HARDWARE:BIBLIOTENNA)
3. AUTOMATED CHECK OUT (HARDWARE:X-TENNA)
4. AUTOMATED RETURN OF MATERIAL
(HARDWARE:BIBLIOTENNA+2 X-TENNA)
5. RE-SHELVING RETURNED BOOKS
(HARDWARE:SPRING LOADED CART+HANHELD SCANNER)
27.
28.
29. 1.Automated check in
a) Affixing tags
An RFID tag/smart label containing – memory chip +RF
antenna ,is attached to each item of inventory that is
intended to be monitored , searched easily without
consuming any considerable time.
30. 2.Optimising search
This stage is completed in few simple
steps-
a) The patron (user) goes to the bibliotenna ,puts in
his ID card and types in his search.
b) bibliotenna routes the above search to the
library database and the availability of book is
confirmed immediately.
c) If available: the patron is given the option to
choose the book and routes the info. of book
(its exact location in library) to a handheld
scanner.
d) Using this handheld scanner user goes to the
shelf and the handheld scanner beeps as soon
as it comes in the RFID tag of that specific
book.
e) User can collect the book.
31. 3.Automated check out
a) Once books are collected ,patron proceeds to self
check out counter.
b) X-tenna will read info. on students ID card and
automatically associates books with him and gives a
receipt for a record of the same.
c) While leaving the library, mounted X-tenna verifies
that the book leaving the library has been checked
out.
d) Book that hasn’t been checked out is instantly
detected thus minimizing chances of theft.
32. 4. Automated return of material
a) Bibliotenna also has a drop box function and is fitted with
2 X-tenna’s that record every single book that is
returned.
b) 1st X-tenna = senses the book and kick starts an
automated roller that collects the book.
c) 2nd X-tenna reads and confirms that book is deposited as
soon as the book falls into the spring fitted cart.
d) once function of X-tenna1 + X-tenna2 = complete
bibliotenna prints out a receipt for a record.
e) ASAP the next student on the waiting list is informed of
the availability of the book through SMS and E-mail.
33. 5. Re-shelving returned books
a) Each returned book in the cart can be identified using a
handheld scanner and the very exact location can be
ascertained (shelf, row, quadrant).
b) It is convenient to the extent that he librarian need not
even bend to collect the books from the cart as it is
fitted with a spring.
34. Critical analysis of RFID
Benefits:
1.To library library management
• Uncompromised security within the library .
• Efficient collection management system (can be located suitably
and made 24x7) .
• Higher customer/patron satisfaction levels.
• Improved inter-library cooperation .
• Better preservation of inventory because of less handling by
staff.
• Same security and labeling formats for all items such as books,
CDs and DVDs, hence better management of databases.
35. 2.To patrons (users)
• Self check-in and self check-out facilities.
• Quicker service such as payment of fees, fines, etc.
• Better reservation facilities, etc.
• Faster and accurate re-shelving means quicker and more
satisfying service.
• Height adjustable self check-in/out tables are convenient
for children and physically disabled persons who use the
library .
36. Possible problems:
-RFID continuously communicates with the library database, the
real danger of merging this technology is in letting secure ILS
database be contacted/updated/opened several times and thereby
make them prone to hackers.
– RFID tags are not hidden and affixed to the inside back cover
and are exposed to physical tamper.
– Some interference from metallic material in book covers, CDs
and DVDs does occur and tag reading may not be correct .
– RFID tags are easy to shield from readers by ordinary
aluminum foils and may not serve the purpose of being anti-
theft tools .
– RFID reading accuracy declines if many items are read
simultaneously (although collision avoidance air interface
protocol may be used to minimize this effect) .
– RFID reader range depends on its power and antenna size .