Tags: Essay On Advantages And Disadvantages Of Salaried SThe Essay The Of The Author Is Written ByColumbia Mba Essay Analysis 2014Business Succession PlanMental Health EssayMotivational Speaker Business PlanSample Of Review Of Related Literature In ResearchFlowers For Algernon EssaysEssay Prompts For 5th GradeEssay On Why Not To Be Disrespectful
However, challenges are many and are pointed out as those of tracking and hot listing.
There are some cases, however where there is only one tag for a particular reader.
Thus RFID systems are of two types – one to one and many to one. The electrical energy required for the tag current is derived from the radio waves emitted by the reader. They have an internal battery that is used for transmission of data as well as for transmission of the signal.
This combined with a weak gate sensor, makes risk of item getting stolen quite high. Syed Md Shahid (2005) considers RFID applications in circulation, tracking, inventorying and security of library materials as well as discusses on the various components of the RFID system in details followed by its installation features.
At the same time, he states that it is important to educate library staff and library users about RFID technology before implementing a program. Serge Vaudenay (2001) deals in preparing a model based purely on the security and privacy of the RFID tags and assumes a powerful adversary who can control all communications mandating the use of some public key cryptography techniques while discussing on tag corruptions and availability of side channels. In a research project, David Alexander Molnar studies the security and privacy in deployments of RFID technology and propose novel mechanism for improving RFID privacy for library books and electronic passport and deals with private authentication.
These tags are the smallest and cheapest, and thus are the most widely used. As a result of the increased power, they can transmit data over a much larger range compared to passive tags.
However, their relatively high cost means widespread use is not possible. A typical microwave RFID system operates either at 2.45 GHz or 5.8 GHz, although the former is more common.The main purpose of RFID is automated identification of products and people.One of the biggest advantages of RFID over conventional systems such as bar codes is that neither line of sight nor physical contact is required for an object with an RFID tag to be identified, as is the case with bar codes where line of sight is required and smart cards, where contact is required and it is hoped to replace all techniques of optical identification.He also discuss broadly on the different eavesdropping ranges, repetitive stress injuries, streamline mechanism and RFID as an enabler for automatic sorting on book check-in.Seema Vasistha (2009) aims at extending RFID applications in an academic library keeping in view the scantiness of funds and scarcity of supporting staff.Moreover it is considered important for controlling management problems such as increasing theft, monopolizing reading materials, poor inventory accuracy, inadequate security control. A. particularly studies the technical and scientific aspects of RFID system with in depth discussion on microchips, anti-collisions as well as tag classes that can be applied in library oriented RFID system and giving importance on its implementation in retrospective conversion and reader usage. Dhanalaxmi M and Uppala Mamatha (2009) describes the different RFID modules that provide integration with Library Management System along with the positioning of the tags on the document that gives 100% readability of tags thus reducing time consumption.Therefore, an RFID compliant library is no exception with a large number of readers thronging in and out of it in need of books possessed by the library.The RFID technology is a pervasive technology because leakage of information is a major defect that occurs when data sent by tags reveal sensitive information about the labeled items.It bears the information that identifies the person or object, and is carried or implanted.The information is usually in the form of an alphanumeric word.Library and information Professionals of the present decade have adopted and borrowed the characteristics those of the technologists and software professionals in the competition to conquer the sophistications of offline and online content providers as well as quest for existence in the digital milieu.This ultimately has enhanced their user service standards blended with auto service system on the part of the users.