1 / 10

RF-ID in Library

RF-ID in Library. Lucio Campanelli Jihee Beak Hohyon Ryu. Agenda. Definition Introduction Active/Passive RF-ID What’s inside the chip? Strength Weakness RF-ID in Libraies. Definition. Radio Frequency Identification

qamar
Download Presentation

RF-ID in Library

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RF-ID in Library LucioCampanelli Jihee Beak HohyonRyu

  2. Agenda • Definition • Introduction • Active/Passive RF-ID • What’s inside the chip? • Strength • Weakness • RF-ID in Libraies

  3. Definition • Radio Frequency Identification • Technology that uses low-powered radio transmitters to read data stored in a transponder(tag).(Internet Grossary) • An RFID tag is a small, low-cost device that can hold a limited amount of data and report that data when queried over radio by a reader. (Molnar et al., 2004) • There are no strict definitions (Robertson et al., 2003)

  4. Introduction DC power consumption determines: Size of data storage Speed of information transfer Tx/Rx range Cost Size

  5. Typical RF-ID System

  6. Applications for RF ID Tagging • Keyless entry and smart tickets • Document identification and smart stamps • Animal identification • Automatic tolling • Offender tagging

  7. Library RFID Applications • Collection Management • Item-level tagging • Library Automation • Remote Resource Locator • Efficient for both users and librarians • Easy to loan and return (Self-checkout machine) • Easy to find lost books

  8. Library RFID Applications (Con’t) • User ID • Customized service • Easy security control process • Temporary user ID service • Easily identify abuse of resources

  9. Library Automation

  10. References • Molnar, D. & Wagner, D. (2004). Privacy and Security in Library RFID Issues, Practices, and Architectures. • Robertson, I. D. & Jalaly,I. (2003). Rf Id Tagging Explained, Communications Engineer. • Juels, A. (2005) RFID Security and Privacy: A Research Survey.

More Related