EL 25,1. Received 21 December 2005 Revised 31 March 2006 Accepted 7 April 2006



Similar documents
RFID Basics HEGRO Belgium nv - Assesteenweg Ternat Tel.: +32 (0)2/ Fax : +32 (0)2/ info@hegrobelgium.

RFID BASED VEHICLE TRACKING SYSTEM

How To Understand The Power Of An Freddi Tag (Rfid) System

Implementing radio frequency identification technology in libraries: Advantages and disadvantages

The Place of Emerging RFID Technology in National Security and Development

Radio Frequency Identification (RFID) An Overview

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department

Radio Frequency Identification (RFID) Vs Barcodes

WHITE PAPER. ABCs of RFID

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Using RFID Techniques for a Universal Identification Device

Time & Access System An RFID based technology

Radio Frequency Identification (RFID)

rf Technology to automate your BUsiness

SATO RFID White Paper

1-9 August 2003, Berlin

Implementing RFID in Library: Methodologies, Advantages and Disadvantages

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

Study of Logistics Warehouse Management System Based on RFID

Applying RFID in traffic junction monitoring

International Journal of Engineering Research & Management Technology

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

LibRFID: Automation Software for Library Management System Using RFID Technology

Evolving Bar Codes. Y398 Internship. William Holmes

To effectively manage and control a factory, we need information. How do we collect it?

Automated Identification Technologies

The Drug Quality & Security Act

Construction of DBMS for the Warehouse of Textile Enterprise Based on RFID Technology

RFID Design Principles

The Study on RFID Security Method for Entrance Guard System

RF Attendance System Framework for Faculties of Higher Education

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

W.A.R.N. Passive Biometric ID Card Solution

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

The Research and Application of College Student Attendance System based on RFID Technology

Asset Management Services. White Paper

CHAPTER 1 Introduction 1

entigral whitepaper Understanding RFID and Barcode Differences

SOURCE ID RFID Technologies and Data Capture Solutions

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

915MHz RFID State of the Art RFID

RFID Based Centralized Patient Monitoring System and Tracking (RPMST)

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits

Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

Military Usage of Passive RFID 1

RADIO FREQUENCY IDENTIFICATION IN LIBRARIES

Security & Chip Card ICs SLE 44R35S / Mifare

The Potential Implementation of Radio-Frequency Identification Technology for Personal Health Examination and Monitoring Andrew Nguyen*

Using RFID for Supply Chain Management

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Asset and Inventory Management in the Hotel Industry using RFID technology: An Experimental Study with Economic Analysis ABSTRACT

RFID Penetration Tests when the truth is stranger than fiction

Optimal Library Inventory System Using EMID Technology.

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

Strengthen RFID Tags Security Using New Data Structure

Design of Remote data acquisition system based on Internet of Things

Intelligent Fleet Management System Using Active RFID

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?

Data Capture Solutions for Manufacturing Applications

White Paper. An Analysis of Active RFID for Asset Tracking

Automated Meter Reading Frequently Asked Questions. What is AMR?

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

Efficient Asset Tracking: From Manual to Automated

RFID market value vs tag cost : Reality vs Dream. Figure 3.2 Examples of RFID applications and potential applications at different tag prices

RFID Radio Frequency Identification

An Introductory and Elementary Study on RFID & Its Applications

NFC APPLICATIONS IN THE TRACKING SYSTEMS

F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop

The Marriage of Passive and Active Technologies in Healthcare. Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari

WIRELESS INSTRUMENTATION TECHNOLOGY

Design for Management Information System Based on Internet of Things

Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions

Simplifying IT Management and Data Security with RFID

RFID Design Principles

Zigbee-Based Wireless Distance Measuring Sensor System

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Cloud RFID UHF Gen 2

Enabling the secure use of RFID

RFID SECURITY. February The Government of the Hong Kong Special Administrative Region

Localization System for Roulette and other Table Games

RFID IN ASSOCIATION WITH ERP SYSTEMS WITHIN THE MANUFACTURING INDUSTRY TO IMPROVE DATA TRANSFER RELIABILITY

RFID Components, Applications and System Integration with Healthcare Perspective

NFC Based Equipment Management Inventory System

IMPACT OF RFID ON DATA SHARING AND BUSINESS PROCESSES

Field Service Application

Redes y Servicios de Radio. RFID Systems

EPL 657 Wireless Networks

A RFID based Inventory Control System for Nigerian Supermarkets

Wireless Telephone System Product Comparison

INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors

RFID Technology - Potential Of Big Brother

K.Srinivasu Ravi 1, Seema Kalangi 2, Veeraiah Maddu 3

We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in

Gemalto Mifare 1K Datasheet

Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework

Transcription:

The current issue and full text archive of this journal is available at wwwemeraldinsightcom/0264-0473htm EL 54 Received 21 December 2005 Revised 31 March 2006 Accepted 7 April 2006 RFID implementation and benefits in libraries Shien-Chiang Yu Department of Information and Communications, Shin-Hsin University, Taipei, Taiwan, Republic of China Abstract Purpose Radio frequency identification (RFID) applications that provide batch access, storage mass data and reprogramming are better than barcodes Applying RFID can promote operational efficiency and precision The cost is one of the major factors influencing whether or not RFID will be accepted in libraries Although RFID has improved the efficiency of libraries, the essence of the library service has not changed Design/methodology/approach The paper analyzes feasibility studies regarding the structure and application of the RFID system Findings To economize on the expense, the first step to consider is applying RFID to specific collections Employing RFID systems to supply inventory, entrance guard, and to gather reading statistics is possible Further extensions to other collections and all kinds of materials in libraries are likely after the technology develops Originality/value The paper provides an evaluation and a model for implementing RFID solutions in libraries Keywords Libraries, Library automation, Library systems Paper type Research paper The Electronic Library Vol 25 No 1, 2007 pp 54-64 q Emerald Group Publishing Limited 0264-0473 DOI 101108/02640470710729119 Introduction Due to the low cost of barcodes, automation identification (auto-id) systems have been applied to various aspects of daily life In solving the problem of insufficient storage in barcodes, one of the better solutions is the IC chip, such as a memory card or a smart card, to store and identify information These kinds of IC cards must utilize a contact to a power supply and must transmit data by way of a reader Drawbacks include more operational time and wear at the point of contact The contactless IC card technique transmits data between card and reader through radio waves The power also can be converted from a radio wave or built-in batteries in cards Because of the transport of power and information through radio waves, contactless auto-ids are called radio frequency identification (RFID) systems RFID is not a new technique In 1948, Harry Stockman published a paper entitled Communication by means of reflected power that discussed the theory and implementation of RFID (Stockman, 1948) Vernon and Harris published papers entitled Application of the microwave homodyne and Radio transmission systems with modulatable passive responder, respectively (Vernon, 1952; Harris, 1960) After that, the development of RFID continued From 1980 to 1990, RFID systems gradually matured, including use by, for example, the Association of American Railroads and the Container Handling Cooperative Program RFID initiatives simplified the identification and tracing procedures in the process of merchandise delivery As a result the application of RFID soared (Landt, 2001)

Structure and principle As Figure 1 shows, the principles of an RFID system can be divided into three components: (1) the RFID tag (or transponder); (2) the RFID reader (or interrogator); and (3) the application system which is used for the reader to transmit or receive data from a tag (Kern, 2004) RFID implementation and benefits 55 In general, a tag consists of one coupling element (providing the function of antenna) and one electronic chip A reader consists of one RF module (providing the signal process of transmitting or receiving), one control module, and one coupling element, through an input/output interface such as the RS232 or RS285, to connect with applications Another very important feature is the power supply Passive tags do not contain power and all the power for the process must converted from radio waves that are provided by the reader Active tags contain a battery As Table I shows, compared with passive tags, active tags provide more distance for induction, but life still depends on batteries The properties of radio waves are frequency dependent They depend on the frequency of the electromagnetic spectrum RFID can be roughly divided into three categories (Finkenzeller, 2003): Figure 1 The components of RFID system Active tag Passive tag Source of process power Built-in battery Electromagnetic or microwave induction Reaction distance About 5-100 meters Under 3 meters Life About 2-7 years (depending on Over 10 years battery life) Weight Heavier Lighter Size Larger Smaller Technical maturity Lower Higher Table I A comparison of active and passive tags

EL 56 (1) 30-300 khz (low frequency, LF); (2) 3-30 MHz (high frequency, radio frequency HF/RF); and (3) 300 MHz-3 GHz (ultra high frequency, UHF) or over 3 GHz (micro wave) Governments tightly license users of radio transmitters, with the exception of the industrial, scientific and medical (ISM) bands which were established by the International Telecommunication Union Radio Communication Sector (ITU-R) (International Telecommunication Union, 2005) Transmitters using these bands do not require government licensing Therefore, the spectrums of RFID cover the bandwidth of industrial and scientific requirements The advantages and disadvantages of these are shown in Table II Bands below 135 khz are the most mature for RFID production The 1356M Hz band performs various applications The RFID production of this band is often used for commodity management The RFID production using bands of 245 GHz and UHF have similar characters, but UHF provides longer distances for induction (Kleist et al, 2004) Just as the structure of memory cards or smart cards depend on the mode of memory and structure, RFID can be divided into four major types: (1) read only can only read data, used to record object s identification number; (2) read/write similar to memory cards, chips built-in EEPROM or write-once, read-many (WORM) in RFID can be erasable and programmable; (3) built-in process chip similar to smart cards, chips in RFID include operation system (OS) and programming, for high security use; and (4) built-in sensor products such as temperature and pressure sensors An RFID system provides diversified frequency bands, transmittal modes, and internal structure It not only covers the functions of traditional auto-id, such as the information record by memory card, but also includes security management by smart card, sensor control by magnetic card, and detects identification number by barcode It also processes speedier reaction time than the barcode, and provides a contactless means of communication Frequency Advantage Disadvantage Table II The advantages and disadvantages of using RFID bands Low frequency (125-134 khz) Popular deployment Lower reaction range (under 15 m) Lower interference by metal High frequency (1356 MHz) Popular deployment Lower interference by mist Lower reaction range (under 15 m) Higher interference by metal Ultra-high frequency (UHF; 860-960 MHz) Popular deployment Higher scope of signal communication Higher interference by mist Tag and tag too close Maybe exerts detuning Microwave (245 GHz) Higher reaction range Not popular Implementation more complex and without standardization

Operation mode The application of RFID is similar to the application of barcodes Barcodes get information encoded and pasted on an object, use specific scanners with an infrared ray or laser beam to detect the information encoded, and then transmit these signals from scanner to computer An RFID system employs a specific reader use radio frequency to transmit information to multiple readings from or to the tag One bit is the smallest unit in information The simplest RFID tag only processes a one-bit control status The function is similar to the electromagnetic strip that was used in libraries to provide on/off signals to achieve the management goal of electronic article surveillance (EAS) Complex RFID is no different than a smart card Chips in the tags can store information, process operation, or exchange information with the reader Depending on the frequency, the mode of power generation in a passive tag will differ Passive RFID tags use a frequency below or at 1356 MHz The mode of power generation is a magnetic alternating field The principle is similar to an electromagnet transferring power via magnetic force, but RFID reverses the process to transform magnetic force into a power source As Figure 2 shows, the electric current passes the coil of the reader to generate an alternating magnetic field The antenna of the tag then transfers the power to provide an internal operation As shown in Figure 3, RFID can use UHF and 245 GHz to adopt microwave methods to convert electric waves into power The design of the antenna depends on magnetic or microwave reaction The antenna design for magnetic reaction is a coil, but microwaves adopt a dipole antenna to be the medium for electronic wave transmitting and receiving Generally, radio frequency is lower, the conduction distance longer, and the penetration weaker For this reason, the signal communication RFID implementation and benefits 57 Figure 2 Operating principle of electromagnetic induction Figure 3 Operating principle of microwave induction

EL 58 distance of UHF will be further than the product of 245 GHz, even using the same antenna design The actual communication distance rather than the frequency or the antenna design matters Electric wave intensity and power consumption of the RFID tag are the major influences Active tags do not generate power by magnetic or microwave, so the communication distance of the active model is further than passive models The maximum distance of communication is only about two meters when using magnetic methods, but the microwave is over ten meters Also, metal absorbs electric waves to generate magnetic power and to interfere with the magnetic field around the RFID systems RFID that uses higher frequencies is not suitable for use with metal objects In contrast, the frequency of electric waves below 135 khz provided with circuitous characteristics prevents less interference with metal because electronic waves of lower frequency are more easily turned in their course (IDTechEx, 2002) Based on the fact that the majority of library collections are made of paper and plastics, RFID using 1356 MHz is now the norm in libraries In actual operation, RFID systems not only have interference, but they also have multi-access When readers start a reaction, maybe more than one tag exists in the communication scope of this reader If all of the tags respond after receiving the signal sent from the reader, there will be a collision (Sarma et al, 2001) The common solution for anti-collision is to adopt the Aloha algorithm and use the binary tree splitting algorithm (Hush and Wood, 1998) The Aloha algorithm applies time division/demand multiple access (TDMA), which was designed for wireless digital service Each tag generates a random time interval to communicate with a reader in order to avoid concurrent communication problems Using the binary tree algorithm, the reader assigns a specific bit in proper sequence Tags can only communicate with readers when the ID matches the specific bit If more than one tag corresponds with the specific bit, the tag will depend on the binary order to communicate Tags suspend after accomplishing communication with the reader Therefore, systems can communicate one by one with all of the tags using one reader Middleware RFID systems can not only heighten information storage, but also provide reprogramming functions not offered by barcodes The patron, book and periodical can all be integrated with RFID systems to extend various applications Each application must be integrated with the library automation system Just as general applications are integrated with peripherals, middleware takes charge of the RFID systems and automation systems Automation systems called application interfaces (API) are provided by middleware to communicate with RFID readers, and then by way of the reader, access information from tags Middleware handles the coordination operations, which are a part of the message-oriented middleware (MOM) among readers and automation systems Besides using messages to pass requests/responses, the middleware also includes security, data broadcast, filtration, route, and error correction to ensure information accuracy and transparency No matter how library automation systems are enhanced or replaced by other systems, increase or exchange readers, systems also operate continually without any modification Depending on the scope of application, RFID middleware includes the categories described below

Application middleware The development of application middleware is to integrate or connect with readers in the initial stages The majority of this middleware is provided by reader manufacturers and only offers simple API functions to communicate with systems and readers This middleware has two drawbacks: one is its exclusive character, which will lead to interoperation among other RFID systems The other is higher handling costs, which causes insufficient benefits of development and implementation RFID implementation and benefits 59 Infrastructure middleware The application of RFID is extending continually, prompting various companies such as Sun, TIBCO, and IBM to go into operation and development They not only develop server products, but also supply adapter software interfaces, such as Oracle and Manhattan Associates, and also cooperate with reader factories to provide specific API solutions for quick entrance into the RFID market These kinds of middleware not only include basic functions of data collection and filtration, but also possess the connection requirements of devices to applications, and even provide platform management and manipulation Solution middleware Solution middleware provides the communication interface among automation systems, readers and RFID In accordance with different application situations, factories also create various innovative functions, and use solution-oriented application models to offer legacy systems integrated with RFID Applications in libraries RFID was invented in 1948, although a crude version was used during the Second World War by the British to identify friendly aircraft through their Identification Friend or Foe system Radar pulses drove the transponder, which was installed in aircraft to respond to coded messages (Ollivier, 1995) RFID techniques were complex and devices were enormous during that time, and thus were unsuitable for general industry during this primary stage Techniques were developed enabling the integration of various circuits and radio transistors into single chips The major applications of RFID extended to various industries, including farm produce tracing, vehicle identification, entrance guards, and trade control (Kern, 1999) RFID tags were flexible and could be pasted onto curved surfaces; however, conventional RFID tags were too thick to replace barcodes for collections management and security control At present, the major applications of RFID implementation in libraries are limited to information management, circulation, and inventory Information management Barcodes, book cards, and magnetic strips can all be integrated into one RFID tag (Chachra, 2003) This type of RFID tag provides memory to record information and to supply the system The memory not only stores bibliographic records and circulation status, but the system also traces the location of the specific collection material Depending on this service, the system can offer assistance in tracing service when looking for particular material in libraries

EL 60 Circulation RFID systems provide efficient operation processing Librarians do not need to scan barcodes one by one Patrons can simultaneously process check in/out, verification, and entrance guard control with RFID reader equipment Videotapes and diskettes are unable to use magnetic strips to enforce entrance guard because demagnetization will destroy the data on the material Because RFID tags do not use demagnetization to modify data, they can use tags to manage magnetic materials the same as the books Library cards will include RFID tags Readers will detect and fetch information from library cards when patrons enter a library, and it will be transmitted to a backend system process After that, the front desk shows loans, overdues, reserves, and other circulation status on the monitor about this patron Librarians depend on these messages to provide service Inventory Batch processing can also apply to libraries to perform inventory or shelf-reading Take hand-held readers to sweep shelves, for instance readers can immediately detect all of the collection within this range, including abnormal situations such as books put on the wrong shelf To conclude from the above discussion, libraries can use RFID to replace barcodes and obtain several advantages (Kern, 2004) They can: reduce queues at the front desk; decrease repeatable tasks; increase interaction with patrons; extend internal security; lower the cost of manipulating and managing collections; procure collections, checking and accepting automation; and raise the efficiency of inventory and arrangement These advantages qualify RFID to replace barcodes and integrate with the RFID quick response Durable characters promote operational efficiency and precision, while the cost is one of the major factors influencing acceptance of novel technology in libraries This will stretch the budget and the schedule for implementation of RFID solutions difficult because some libraries hold enormous collections Although RFID can improve efficiency, the essence of service will not change Therefore, innovating services is an essential factor for libraries Assistance in searching and orientation The application of RFID in industrial circles (Bhuptani and Moradpour, 2005), provides material flow management similar to library circulation It also develops services such as assistance in searching and orientation based on detectable characters of RFID One drawback of open-shelf libraries is that materials are easy to put on the wrong shelf or to be unaccounted for Library automation systems can only query once about check in/out situations, but not where material is if it is not on the correct shelf If a reader is installed on each gate in the library, as soon as a patron takes one material and enters another room, the system will detect who took it and where it is This information will pass to the automation system to record the position of this material

This kind of service provides a more convenient management mode and improves the tracing of different locations (reference books, exhibits, featured collections) of put material on wrong shelves, as well as other unaccounted-for problems Consider the detection scope among readers and tags When we need to detect the latest position of material that was taken and placed incorrectly by a patron The detection scope of 900 MHz or 245 GHz tags are longer than 1356 MHz tags, but the price is also higher A compromise is not to provide assistance in searching and orientation to all of the collection, but only part of the collection RFID implementation and benefits 61 Utilization statistics for serials There is no proper and accurate method to calculate the reading rate of magazines and that which are on the periodical rack Systems do not record when they are used in open shelves and read in libraries Patron response is uncertain if questionnaires are pasted onto magazines Utilizing the detection scope of RFID, it is possible to collocate materials from the periodical rack and readers If readers remain undetected on one tag for a while, this shows that the magazine was taken off shelf and is being read Guiding and personal service Besides implementing RFID tags in a collection, utilizing frequencies of about 900 MHz UHF provides more detection scope to embed library cards and locations into RFID tags Combined with patron data, environment position data, and collection data, process time and service mode completely record and manage information about people, events, times, places, and objects When someone enters the library, the system identifies the patron s status, depending on the RFID tag in the library card Thus, the library immediately acquires information about this patron and supplies appropriate personal service The library can be supplied with hand-held guiding equipment (reader and display device) for patrons to recognize the library environment The system can automatically verify patron categories to decide the guiding scope, and is always detecting tags and fetching information to show on screen at each position, such as at copy machines Audio-visual materials can depend on being detected and recorded onto the tag in the library card Combining charges and fines to a single payment mode can also be implemented Systems can create more service models than discussed above when applying the mode of RFID wireless detection and combining it with different frequency and detection scope The problems of implementation are cost and operation in coordination with suppliers Therefore, when constructing a complete solution, planning the necessary accessories must be done with the supplier Issues and barriers Not all the applications of technology and product are perfect in every way, especially RFID which utilizes radio frequencies to transmit signals The interference and detected accuracy in the transmitted process influences actual efficiency of the application The interference with metal and fog, the distance between reader and tag, and the antenna direction are factors lead to lose detection Consequently, actual detecting efficiency must test and adjust to be optimized on the spot Furthermore, RFID will face many issues such as cost, access rate, privacy, security, and patent

EL 62 Cost The cost is one of the major factors influencing acceptance of RFID, although the production costs of RFID have reduced and Alien Technology has cut the tag price to less than $US020 (Collins, 2004) However, the retail price is far higher than this price For library collections with over 100,000 items, it will be hugely expensive to implement RFID completely Plus, the costs for the reader, peripheral equipment and application software will be even more of a burden This will stretch the budget and the schedule for implementation of an RFID solution will be hard because libraries hold enormous collections Access rate Not only do metal, mist, and distance influence the read/write efficiency of RFID, incorrect positioning of antennas also causes failure even if the tag and the reader are very close together Besides, too close a distance among tags may produce interference between tags or erroneous access For example, if one patron is taking books to initiate the loan process under self-check in/out equipment (RFID reader), and another patron is standing too close to the first patron, the reader doing the self check in/out may detect the tags of books which are held by the wrong patron Libraries that emphasize patron services might not be able to sustain such check in/out errors Even with extremely strict requirements for baggage identification in airports, the identification rate is still not 100 percent (Gilbert, 2004) Therefore, how to implement multiple transceiver readers or plan the arrangement of readers is a considerable issue Privacy The privacy issue is also a subject of debate in the application of RFID technology All patron activities such as reading, browsing, and action behavior will be detected by readers which are installed in libraries These observing operations are similar to surveillance and may be a privacy problem for the patron Such issues and concerns about privacy may prevent the application of active services in libraries Security The structure of RFID chips is the same as IC smart cards made with complementary metal-oxide semiconductors (CMOS) Therefore, methods of cracking smart cards also apply to RFID chips Moreover, the character of RFID wireless communication can also catch transmitted data through intercepted wireless signals For this reason, RFID must encrypt information to prevent eavesdropping, modification/replacement, and misuse Besides various business issues, interference from wireless equipment, stability, international standards, size, and material of RFID tags still present various problems that need to be solved The key factor for application in libraries is system integration, and this issue relies on coordination with libraries and system factors to accumulate more experience and know-how Conclusion RFID tags provided with the characteristics of batch access, storage mass data, and the capability to be reprogrammed are better than barcodes and can help libraries

accurately manage collections and extend their services Issues about reliability, interference from noise, high implementation costs, and lack of a killer application in RFID systems remain to be resolved Consequently, they currently have only limited applications in small libraries and only provide a few operations RFID involves various techniques that over-exceed the ability of librarians and library factories RFID will not attract attention if it is only used to replace the barcode Given insufficient funds, totally implementing RFID and replacing barcodes does not fulfill the economic requirements Therefore, the first procedure to consider when applying RFID is to supply inventory, entrance guards, and gather reading statistics Further extension will have to wait until all kinds of materials in the library can be used Integrating both patrons and collections with RFID functions will extend various applications, such as assistance in searching and orientation, utilization statistics for serials, guidance and personal service Replacing barcodes and magnetic strips with RFID has the advantages of self check-in/out, theft detection, rapid inventory, and finding incorrectly shelved materials Not only will RFID realize precise collections management, but will also achieve real-time services RFID implementation and benefits 63 References Bhuptani, M and Moradpour, S (2005), RFID Field Guide: Deploying Radio Frequency Identification Systems, Sun Microsystems/Prentice-Hall, Upper Saddle River, NJ Chachra, V (2003), Experiences in implementing the VTLS RFID solution in a multi-vendor environment, paper presented at World Library and Information Congress: 69th IFLA General Conference and Council, available at wwwiflaorg/iv/ifla69/papers/132e-chachra pdf (accessed 21 March 2005) Collins, J (2004), Alien cuts tag price, RFID Journal, available at wwwrfidjournalcom/article/ articleview/857/1/1/ Finkenzeller, K (2003), RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed, Wiley, Chichester Gilbert, A (2004), Patent problems plague RFID, available at wwwzdnetcomau/insight/ hardware/0,39023759,39159309,00htm Harris, DB (1960), Radio transmission systems with modulatable passive responder, US Patent 2,927,321 Hush, DR and Wood, C (1998), Analysis of tree algorithms for RFID arbitration, Proceedings of the IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, August 16-21, p 107 IDTechEx (2002), RFID in Japan special report from IDTechEx Asia tour, Smart Labels Analyst, No 21, available at wwwidtechexcom/documents/en/slaasp?documentid ¼ 62 International Telecommunication Union (2005), Frequently asked questions, available at www ituint/itu-r/terrestrial/faq/indexhtml Kern, C (1999), RFID technology recent development and future requirements, Proceedings of the European Conference on Circuit Theory and Design ECCTD99, Stresa, 29 August-2 September, Vol 1, pp 25-8, available at wwwx-identcom/pdf/development_rfidpdf Kern, C (2004), Radio-frequency-identification in libraries, The Electronic Library, Vol 22 No 4, pp 317-24 Kleist, RA, Chapman, T, Sakai, D and Jarvis, B (2004), RFID Labeling: Smart Labeling Concepts & Applications for the Consumer Packaged Goods Supply Chain, Printronix, Irvine, CA

EL 64 Landt, J (2001), Shrouds of time: the history of RFID, AIM, Inc, Pittsburgh, PA, available at: wwwaimglobalorg/technologies/rfid/resources/shrouds_of_timepdf Ollivier, M (1995), RFID enhances materials handling, Sensor Review, Vol 15 No 1, pp 36-9 Sarma, SE, Brock, D and Engels, DW (2001), Radio frequency identification and the electronic product code, IEEE Micro, Vol 21 No 6, pp 50-4 Stockman, H (1948), Communication by means of reflected power, Proceedings of the IRE, Vol 36 No 10, pp 1196-204 Vernon, FL Jr (1952), Application of the microwave homologue, IRE Transactions on Antennas and Propagation, Vol AP-4, p 110 Further reading Feder, BJ (2005), Companies in radio tag business broaden legal dispute, New York Times, Business/Financial Desk, p3 About the author Shien-Chiang Yu joined the Department of Information and Communications at Shin-Hsin University in Taiwan as an Associate Professor in 2003 and has been serving as the Director of the University Library since 2004 He received an MS degree in Library and Information Science from Fu-Jen Catholic University and a PhD degree in Information Management from National Chiao-Tung University in 1997 and 2003, respectively His research interests include spatial databases, electronic commerce, information retrieval, and metadata Shien-Chiang Yu can be contacted at: ysc@ccshuedutw To purchase reprints of this article please e-mail: reprints@emeraldinsightcom Or visit our web site for further details: wwwemeraldinsightcom/reprints