Technical Proposal
Technical Proposal
For
For
Library Management Software
Library Management Software
For
For
(Client)
(Client)
HCL PROFILE
HCL PROFILE
HCL PROFILE
HCL PROFILE
HCL Infosystems Limited is one of the pioneers in the Indian IT market, with
HCL Infosystems Limited is one of the pioneers in the Indian IT market, with
its origins in 1976. For over quarter of a century, HCL has developed and
its origins in 1976. For over quarter of a century, HCL has developed and
im
imple
plemen
mented
ted sol
soluti
utions
ons for
for mul
multip
tiple
le mar
market
ket seg
segmen
ments,
ts, acr
across
oss a
a ran
range
ge of
of
tec
techno
hnolog
logies
ies in
in Ind
India.
ia. HCL has
HCL has bee
been
n in
in the
the for
forefr
efront
ont in
in int
introd
roduci
ucing
ng new
new
technologies and solutions, now HCL is amongst the top 20 business houses
technologies and solutions, now HCL is amongst the top 20 business houses
in India with 14000+ employees spread across 38 countries and revenue of
in India with 14000+ employees spread across 38 countries and revenue of
around 14 billion US dollars.
around 14 billion US dollars.
HCL Infosystems Ltd. is the
HCL Infosystems Ltd. is the Internet Infrastructure initiative of the HCL group,
Internet Infrastructure initiative of the HCL group,
In
Indi
dia’s
a’s pr
prem
emie
ier
r in
info
form
rmati
ation
on te
tech
chno
nolo
logy
gy gr
grou
oup.
p. Th
Thro
roug
ugh
h th
the
e pi
pion
onee
eeri
ring
ng
presence of the HCL group companies the vast experience of the markets,
presence of the HCL group companies the vast experience of the markets,
HC
HCL
L In
Info
fosy
syst
stem
ems
s ha
has
s pr
prop
opel
elle
led
d it
itse
self
lf to
to th
the
e pa
path
th of
of “To
“Tota
tal
l Te
Tech
chno
nolo
logy
gy
Integration”.
Integration”.
HCL Infosystems has established state-of-the-art ATM / Frame-Relay IP based
HCL Infosystems has established state-of-the-art ATM / Frame-Relay IP based
network infrastructure across 43 cities in the country and offers an entire
network infrastructure across 43 cities in the country and offers an entire
range of managed services. Its portfolio of services includes Virtual Private
range of managed services. Its portfolio of services includes Virtual Private
Networks (VPNs), Broadband Internet access; Hosting Co-location Services;
Networks (VPNs), Broadband Internet access; Hosting Co-location Services;
De
Desi
sign
gnin
ing
g an
and
d de
depl
ploy
oyin
ing
g Di
Disa
sast
ster
er Re
Reco
cove
very
ry so
solu
luti
tion
ons
s an
and
d Bu
Busi
sine
ness
ss
Conti
Continuity
nuity solut
solutions;
ions; Appli
Applicatio
cation
n serv
services;
ices; Manag
Managed
ed Secur
Security
ity serv
services
ices and
and
NOC services.
NOC services.
Al
All
l th
thes
ese
e se
serv
rvic
ices
es ar
are
e de
deli
live
vere
red
d wi
with
th a
a tu
turn
rnke
key
y ap
appr
proa
oach
ch th
that
at in
incl
clud
udes
es
deli
deliveri
vering
ng Infosy
Infosystems
stems’s
’s core services
core services,
, thir
third
d party hardware and
party hardware and netwo
network
rk
provisioning, maintenance activities and project
provisioning, maintenance activities and project management.
management.
HC
HCL
L In
Info
fosy
syst
stem
ems
s co
come
mes
s wi
with
th th
the
e pr
prom
omis
ise
e of
of de
deli
live
veri
ring
ng th
the
e co
comm
mmit
itte
ted
d
‘Qu
‘Quali
ality
ty of
of Ser
Servic
vice’
e’ bac
backed
ked by
by sig
signif
nifica
icant
nt inv
invest
estmen
ments
ts in
in inf
infras
rastr
truct
ucture
ure,,
network management solutions and its round the clock centralized Customer
network management solutions and its round the clock centralized Customer
Support Call Center. This holds even more when we consider the leverage
Support Call Center. This holds even more when we consider the leverage
Inf
Infosy
osyste
stems
ms dra
draws
ws fro
from
m its
its par
parent
ent com
company
pany’s
’s unp
unpara
aralle
lleled
led ex
exper
perien
ience
ce in
in
networking.
networking.
LIBRARY MANAGEMENT SOLUTION
LIBRARY MANAGEMENT SOLUTION
HCL Infosystems Limited is providing one of the leading library management
HCL Infosystems Limited is providing one of the leading library management
software (LMS) in the global market. Our LMS is designed on all international
software (LMS) in the global market. Our LMS is designed on all international
standards like MARC-21, UNICODE, SIP/SIP2, ISO 2709. LMS is completely
standards like MARC-21, UNICODE, SIP/SIP2, ISO 2709. LMS is completely
user-friendly menu driven interface, online help, complete and elaborative
user-friendly menu driven interface, online help, complete and elaborative
he
help
lp do
docu
cume
ment
ntati
ation
on.
. HC
HCL
L is
is al
also
so ca
can
n pr
prov
ovid
ide
e so
solu
luti
tion
ons
s li
like
ke RF
RFID
ID ba
base
sed
d
security and circulation, as well as solutions for Digital Library Management
security and circulation, as well as solutions for Digital Library Management
solution.
HCL’s Customer Support
HCL’s Customer Support
We have the highest regard for our esteem customers, and to meet this, we
We have the highest regard for our esteem customers, and to meet this, we
have geared up ourselves with following
have geared up ourselves with following services across the country:
services across the country:
•
•
We organize customer’s meets all over the country to have the first
We organize customer’s meets all over the country to have the first
hand interaction, which enable us to interact with our customers and
hand interaction, which enable us to interact with our customers and
re
revi
view
ew th
thei
eir
r fe
feed
edbac
back
k on
one
e to
to on
one.
e. We
We al
also
so st
stri
rive
ve to
to im
impr
prov
ove
e ou
ourr
services standards for more customer satisfaction.
services standards for more customer satisfaction.
•
•
We have the key-client concept, where in we constantly monitor the
We have the key-client concept, where in we constantly monitor the
upke
upkeep
ep of
of our
our pro
produc
ducts,
ts, bei
being
ng use
used
d for
for ach
achiev
ieving
ing hig
highes
hest
t lev
level
el of
of
ser
servic
vice
e sta
standar
ndards.
ds. The
The par
parame
ameter
ters
s gov
govern
erned
ed by
by thi
this
s (vi
(viz.
z. Up-
Up-tim
time,
e,
Preventive Maintenance Schedule etc.) are appraised by specialized
Preventive Maintenance Schedule etc.) are appraised by specialized
team at the regional office and Head office. Further, these clients are
team at the regional office and Head office. Further, these clients are
provided with an Up Time Certificate authenticated by the respective
provided with an Up Time Certificate authenticated by the respective
user department and these are sent by the
user department and these are sent by the
President & CEO
President & CEO himself.
himself.
We have across the country –
We have across the country –
Number of Machines
Number of Machines
50,000
50,000
(A
(Alll
l
pr
prod
oduc
uctts
s
in
inc
clu
ludi
ding
ng
photocopier)
photocopier)
10,000
10,000 (Telecom products alone)
(Telecom products alone)
N
Nu
um
mb
be
er
r
o
of
f
S
So
offttw
wa
arre
e
Solutions
Solutions
1,000
1,000
Number of Professionals
Number of Professionals
14,000
14,000
N
Nu
um
mb
be
er
r
o
of
f
T
Trra
aiin
ne
ed
d
Engineers
Engineers
5,000
5,000
Number of Offices
Number of Offices
170
170 cities
cities
Number of Service Centres
Number of Service Centres
360
360
Customer Satisfaction
Customer Satisfaction
9 out of 10
9 out of 10 *
*
ISO Certification
ISO Certification
ISO 9001:2000
ISO 9001:2000 &
&
ISO 14001:2004
ISO 14001:2004
* Survey done by
* Survey done by
With trained engineers around 360 locations around India, we are able to
With trained engineers around 360 locations around India, we are able to
pr
prov
ovid
ide
e be
bett
tter
er cu
cust
stom
omer
er su
supp
ppor
ort
t an
and
d re
reac
ach
h we
well
ll abo
above
ve th
the
e in
indu
dust
stri
rial
al
c
cu
us
stto
om
me
er
r
s
sa
attiis
sffa
ac
cttiio
on
n
lle
ev
ve
el
l
s
stta
an
nd
da
arrd
ds
s..
HCL is itself synonymous with customer satisfaction, we are proud to offer
HCL is itself synonymous with customer satisfaction, we are proud to offer
the best solutions and
the best solutions and services anywhere in India.
services anywhere in India.
The best in the “
The best in the “
Corporate Users expectation and Satisfaction Survey
Corporate Users expectation and Satisfaction Survey
2003
2003” -
” -
Voice & Data Magazine.
Voice & Data Magazine.
HCL has been
HCL has been
ranked No.5 among India’s Top 5
ranked No.5 among India’s Top 5 groups
groups impacting the
impacting the
dynamics of the IT Industry
-dynamics of the IT Industry -
DataQuest
DataQuest
“
“The Most Responsive Company, 2005
The Most Responsive Company, 2005”– IT Hardware Category by the
”– IT Hardware Category by the
Economic
HCL’s Presence in India
HCL’s Presence in India
HCL’s Presence in India
HCL’s Presence in India
RFID Solution for (Client)
RFID Solution for (Client)
Overview
Overview
Radio Frequency Identification (RFID) is the technology that is slated to replace Radio Frequency Identification (RFID) is the technology that is slated to replace barcodes in library applications. It is a form of identification that is contact-less and barcodes in library applications. It is a form of identification that is contact-less and does not require line of sight. The technology, though new to libraries, has been in does not require line of sight. The technology, though new to libraries, has been in use in other sectors for m
use in other sectors for more than 20 years. ore than 20 years. The RFID tags are placed in books anThe RFID tags are placed in books andd generally covered with a property sticker. Antennas of different sizes, based on generally covered with a property sticker. Antennas of different sizes, based on application, are used to read the tags
application, are used to read the tags and manage the various library functions.and manage the various library functions.
The RFID Solution is a revolutionary application of automatic identification and data The RFID Solution is a revolutionary application of automatic identification and data capture (AIDC) technology. In a library environment, RFID technology resembles a capture (AIDC) technology. In a library environment, RFID technology resembles a traditional barcode system in that it provides a means of assigning an ID to an item traditional barcode system in that it provides a means of assigning an ID to an item and reading that ID to perform circulation transactions or to take inventory. But and reading that ID to perform circulation transactions or to take inventory. But while RFID technology resembles a traditional barcode system in application, the while RFID technology resembles a traditional barcode system in application, the HCL RFID Solution is
HCL RFID Solution is far superior in performance—plus it offers built-in security.far superior in performance—plus it offers built-in security.
How
How
the HCL RFID Solution Works
the HCL RFID Solution Works
HCL has partnered with TAGSYS/Texas Instruments, leading manufacturers of RFID HCL has partnered with TAGSYS/Texas Instruments, leading manufacturers of RFID ha
hardrdwawarere, , to to brbrining g yoyou u ththe e lalatetest st in in RFRFID ID tetechchnonolologygy. . AA standard RFID system consists of four main parts:
standard RFID system consists of four main parts:
•
• RFID TagsRFID Tags - Flexible, paper-thin smart labels that are- Flexible, paper-thin smart labels that are applied directly to library items. Each RFID tag contains applied directly to library items. Each RFID tag contains a tiny chip, which is both readable and writable and can a tiny chip, which is both readable and writable and can store infor
store information to imation to identify itemdentify items in your s in your collection. collection. InIn library applications, it also stores a security bit and if library applications, it also stores a security bit and if needed, information to
needed, information to support sorting systems.support sorting systems.
•
Tags are inactive until the reader’s interrogation signal “wakes” Tags are inactive until the reader’s interrogation signal “wakes” them up
them up
Cheap, but short range onlyCheap, but short range only
•
• Semi-passiveSemi-passive
On-board battery, but On-board battery, but cannot initiate communicationcannot initiate communication
Can serve as sensors, collect information from environment: forCan serve as sensors, collect information from environment: for example, “smart dust” for military
example, “smart dust” for military applicatioapplicationsns
More expensive, longer rangeMore expensive, longer range
•
• ActiveActive
On-board battery, can On-board battery, can initiate communicationinitiate communication
•
• ReadersReaders –– A
A hahandndheheldld o
or r EEAASS Gates
Gates
programmed to capture radio waves signals omitted by the RFID Tags. The programmed to capture radio waves signals omitted by the RFID Tags. The devic
devices es are are respresponsionsible for ble for the the secusecurity and rity and circcirculatiulation on of of resoresourcurces es asas programmed in the server, it will alarm if the resource is taken out without programmed in the server, it will alarm if the resource is taken out without proper process.
proper process. •
• DatabaseDatabase: : all all the the infinforormatmation ion relrelateated d to to RFRFID ID tagtags s and and corcorresresponpondindingg info
informatrmation ion abouabout t the the resoresourceurce/boo/books/meks/member mber is is storstored ed in in the the datadatabasebase which is stored in a centralized location a PC or a Server. The software which is stored in a centralized location a PC or a Server. The software ins
instaltalled led in in the the serserver ver ververifiifies es the tag the tag reareadinding g cacaptuptured red by by the the ReaReaderder (Transceiver).
(Transceiver).
The HCL RFID Solution can be
The HCL RFID Solution can be implemented withimplemented with any any library automation system thatlibrary automation system that us
uses es ththe e StStanandadard rd InInteterfrfacace e PrPrototococol ol (S(SIPIP/S/SIPIP2) 2) fofor r cicircrcululatatioion n trtranansasactctioionsns.. To
Togetgetherher, , HCL HCL and and TATAGSYGSYS/TS/TI I havhave e ininstastallelled d oveover r 2.5 2.5 milmilliolion n tagtags s in in liblibrararieriess worldwide.
Advantages of an RFID System over a Traditional
Advantages of an RFID System over a Traditional
Barcode System
Barcode System
The
The HCL HCL RFID Solution provides numerouRFID Solution provides numerous s advaadvantagntages es over over tradtraditioitional nal barcbarcodeode systems. Here are just a few of the benefits:
systems. Here are just a few of the benefits:
Features
Features RFID RFID BarcodeBarcode
Read more than one item at a time Read more than one item at a time
×
×
Read while item is moving Read while item is moving
×
×
Programmable Programmable
×
×
Line of site read
Line of site read not requirednot required
×
×
Life guarantee (100,000 reads) Life guarantee (100,000 reads)
×
×
Sturdy in harsh environments Might want to Sturdy in harsh environments Might want to consider use of t
consider use of the term “environmentallyhe term “environmentally hardened”, this term is
hardened”, this term is becoming more commonbecoming more common place in USA electronics markets. (I am not
place in USA electronics markets. (I am not certaincertain of global acceptance of this term)
of global acceptance of this term)
×
×
Able to resist water damage Able to resist water damage
×
×
Built‐in security Built‐in security
×
×
Inventory tool without handling items Inventory tool without handling items
×
×
Able to locate specific items on
Able to locate specific items on shelvesshelves
×
×
Use with borrower self checks units Use with borrower self checks units
Use with automated sorting and
Use with automated sorting and handling systemshandling systems
×
×
Particulars
Particulars RFID RFID BarcodeBarcode P
Phhyyssiiccaal l SSiizzee TTaaggs s rraanngge e iin n ssiizze e ffrroom m aa postage stamp to a book. postage stamp to a book. The aspect ratio of a Tag's The aspect ratio of a Tag's
length vs width is very length vs width is very flexible and not a
flexible and not a
significant factor for the significant factor for the Reader.
Reader.
Bar codes are larger than Bar codes are larger than the smallest tag and very the smallest tag and very sensitive to the aspect sensitive to the aspect ratio for presentation to a ratio for presentation to a scanner. The ratio of a bar scanner. The ratio of a bar code's length vs width is code's length vs width is critical to its
L
Liiffeessppaann TTaaggs s hhaavve e nno o mmoovviinng g ppaarrttss and are embedded in
and are embedded in protective material for an protective material for an indestruct
indestructible case ible case andand multi-year lifespan. multi-year lifespan.
Bar Codes have
Bar Codes have unlimitedunlimited shelf life but are subject to shelf life but are subject to degradation with
degradation with handling.
handling. Ha
Harsrsh Eh Envnvirirononmementntss TaTags gs mmay ay be be plplacaced ed inin extreme environments and extreme environments and perform to
perform to specificatiospecification.n. They are very robust to They are very robust to
handling, sensitive to handling, sensitive to
environment, and generally environment, and generally degrade once used, stored degrade once used, stored or handled in a non-office or handled in a non-office environment.
environment. Product Codes
Product Codes
Digital data is stored on
Digital data is stored on
the Tag and provides for
the Tag and provides for
a significant capability to
a significant capability to
encode: 1) Tag originator
encode: 1) Tag originator
2) User data as needed
2) User data as needed
by the segment or
by the segment or
application 3) Serial
application 3) Serial
number as needed by
number as needed by
the segment/application
the segment/application
Major vertical markets
Major vertical markets
like Retail have
like Retail have
standards which are
standards which are
excellent at coding
excellent at coding
product type and
product type and
manufacturer. Additional
manufacturer. Additional
information beyond
information beyond
these basic parameters
these basic parameters
is not feasible because
is not feasible because
the size of the Bar Code
the size of the Bar Code
becomes too large.
becomes too large.
C
Coouunntteerrffeeiittiinngg TTaaggs s aarre e pprroodduucceed d wwiitth h aa unique identity code (UIC) unique identity code (UIC) or serial number from the or serial number from the manufactur
manufacturer. This er. This isis
embedded digitally on the embedded digitally on the microchip and may not be microchip and may not be changed, therefore, making changed, therefore, making them extremely resistant them extremely resistant to counterfeiting.
to counterfeiting.
Bar Codes may easily be Bar Codes may easily be duplicated and attached to duplicated and attached to products and are,
products and are, therefore, easily therefore, easily counterfeited. counterfeited.
Dynamic Updates
Dynamic Updates
Tags may be written to
Tags may be written to
and offer on board
and offer on board
memory to retain
memory to retain
information. This feature
information. This feature
may be used to store a
may be used to store a
product calibration
product calibration
history, preventive
history, preventive
maintenance, etc.
maintenance, etc.
Updates may be made
Updates may be made
within the blink of an eye
within the blink of an eye
and automatically
and automatically
without human
without human
intervention. Once a Bar
intervention. Once a Bar
Code is printed it
Code is printed it
remains frozen. The
remains frozen. The
Code and
Code and
Once a Bar Code is printed Once a Bar Code is printed it remains frozen. The it remains frozen. The Code and the process of Code and the process of attaching the BC is not attaching the BC is not supportive of real time supportive of real time updates. It is a labor updates. It is a labor intensive process to intensive process to
update any information on update any information on a BC once
a BC once printed.printed.
Traceable
Traceable
The combination of UIC
The combination of UIC
(unique identification
(unique identification
code), user data, serial
code), user data, serial
number and on-board
number and on-board
memory makes it
memory makes it
possible to track, recall,
possible to track, recall,
or document the life
or document the life
span of a single item. For
span of a single item. For
example, with livestock
example, with livestock
this means that the
this means that the
birthplace of the animal,
birthplace of the animal,
its vaccine history, feed
its vaccine history, feed
lots, slaughter house,
lots, slaughter house,
processor, etc may all be
processor, etc may all be
tracked. This kind of
tracked. This kind of
information supports a
information supports a
complete pedigree for an
complete pedigree for an
item attached to the Tag.
item attached to the Tag.
BC is limited to an entire BC is limited to an entire class of products and class of products and unable to drill down to a unable to drill down to a unique item. It is not unique item. It is not feasible to recall, track or feasible to recall, track or document a single item. document a single item.
S
Sccaannnniinngg RRFFIID D - - OOffffeerrs s a a rraanngge e ffrroomm inches to hundreds of feet inches to hundreds of feet and does not require line of and does not require line of sight. This means that
sight. This means that individual Tags placed individual Tags placed
within a carton, packed in a within a carton, packed in a box and stored on a pallet box and stored on a pallet may be read. You do not may be read. You do not have to open each box and have to open each box and present the individual item. present the individual item. BC - Offers a range over BC - Offers a range over inches and requires line of inches and requires line of
The Bar Code must be The Bar Code must be
presented to the scanner presented to the scanner in an orientation and in an orientation and distance that is very distance that is very
limited. Individual reading limited. Individual reading requires that each box on requires that each box on a pallet be opened and the a pallet be opened and the item pulled for
item pulled for presentation to the presentation to the scanner.
sight to read the code. sight to read the code.
Simultaneous Simultaneous Scanning Scanning
RFID - Standards have
RFID - Standards have
algorithms to support
algorithms to support
simultaneous reading of
simultaneous reading of
Tags at one time.
Tags at one time.
Limited to one bar code at Limited to one bar code at a time. Unable to
a time. Unable to supportsupport simultaneous reads.
simultaneous reads. Cost
Cost
High volume Tags are
High volume Tags are
currently 25 cents each
currently 25 cents each
with the potential to
with the potential to
continue to drop per the
continue to drop per the
experience curve. High
experience curve. High
volume bar codes are
volume bar codes are
less then a penny. In this
less then a penny. In this
scenario the labor
scenario the labor
savings from items like
savings from items like
physical counts, etc. give
physical counts, etc. give
RFID greater feasibility.
RFID greater feasibility.
This is a clear
This is a clear
advantage for BC unless
advantage for BC unless
you expand cost to be
you expand cost to be
fully loaded.
fully loaded.
R
Reeuussaabbllee YYeess
No
No
RFID System Components and
RFID System Components and
Applicatio
Applicatio
ns
ns
RFID Tags
RFID Tags
An RFID tag is the
An RFID tag is the most important link in any RFID system. It has most important link in any RFID system. It has the ability to storethe ability to store information relating to the specific item to which they are attached, rewrite again information relating to the specific item to which they are attached, rewrite again without any requirement for contact or line of sight. Data within a tag may provide without any requirement for contact or line of sight. Data within a tag may provide identification for an item, proof of ownership, original storage location, loan status identification for an item, proof of ownership, original storage location, loan status and history.
and history.
RFID Tag consists of an integrated circuit and an antenna combined to form a RFID Tag consists of an integrated circuit and an antenna combined to form a transponder. RFID tags collect the energy to operate from a Radio Frequency (RF) transponder. RFID tags collect the energy to operate from a Radio Frequency (RF) fie
field ld emiemittetted d by by a a reareader devicder device; e; thetherefrefore they ore they do do nonot t neneed ed a a batbattertery. y. WhWhenen energized by a radio signal from a fixed position reader or handheld scanner, the energized by a radio signal from a fixed position reader or handheld scanner, the
tag returns the stored information in order that the item to which it is attached can tag returns the stored information in order that the item to which it is attached can be easily located.
be easily located.
The chip also has a "multi-read" function, which means that several tags can
The chip also has a "multi-read" function, which means that several tags can
be read at once.
be read at once.
RFID tags have been
RFID tags have been specifically designed to be affixed into library media, includingspecifically designed to be affixed into library media, including books, CDs, DVDs and tapes.
books, CDs, DVDs and tapes.
It is thin,
It is thin, flexible and thus can be flexible and thus can be laminated between paper and plastic. With speciallaminated between paper and plastic. With special method to attach to books, patron is
method to attach to books, patron is totally unaware that the tag is totally unaware that the tag is there.there.
KEY BENEFITS:
KEY BENEFITS:
1.
1. No No linline oe of sf sighight nt needeededed 2.
2. AlloAllows to check-ows to check-out and checut and check-in severk-in several items sial items simultmultaneouaneouslysly 3.
3. InfoInformatrmation diion directrectly attly attacheached to pd to produroductct 4.
4. Performing Performing both idboth identification entification and anand antitheft in titheft in one sone single oingle operationperation 5.
5. DiffDifferent erent shapshape ane and sd sizes izes availavailableable 6.
6. AblAble to te to tag aag almolmost ast anytnythinhingg 7.
7. AcceAcceleralerate scte scannianning ang and ind identidentifyingfying
P
P
atron Self
atron Self
Check-in/Check-out:
Check-in/Check-out:
Phase Action:
Phase Action:
1.
1. Let patLet patron do thron do the checke check-out an-out and checd check-in prk-in procesocess of boos of books.ks.
Phase Target:
Phase Target:
1.
1. BenBenefiefit t to to LibLibrarrarianian:: 2.
2. SpeedSpeeds up s up book book checcheck-in k-in / ch/ check-oeck-outut 3.
3. Frees Frees stafstaff to f to bettebetter ser servicrvice pate patronsrons 4.
4. BetBetter ter spspace ace plaplanninningng 5.
5. BeBenenefifit to Pt to Patatroronsns:: 6.
6. Easy tEasy to use: bo use: books cooks can be rean be read in aad in any oriny orientaentationtion 7.
7. RedReduceuces s quequeuinuing g timtimee 8.
8. ProProvidvides es patpatroron pn privrivacyacy
Equipment & parts needed:
Equipment & parts needed:
1.
1. Self ChecSelf Check Station k Station - Perform - Perform patron spatron self check-out elf check-out and checand check-in procesk-in process ands and turn off or turn off
turn off or turn off the EAS status.the EAS status. 2.
2. Book-Drop - InBook-Drop - Indoor or Oudoor or Outdoor. After tdoor. After patron dropatron drop in the p in the book into tbook into this statiohis station,n, book’s id is checked and
book’s id is checked and turned on the EAS simultaneously.turned on the EAS simultaneously. 3.
3. RemoRemote Book-drte Book-drop - Long distaop - Long distance away fronce away from librarm library, Acquiy, Acquire betterre better protection of the Book-drop.
protection of the Book-drop. 4.
Smart and Quick Inventory:
Smart and Quick Inventory:
Phase Action:
Phase Action:
1.
1. Search anSearch and Inventord Inventory by reay by reading the ding the RFID usRFID using portaing portable reader ble reader and portand portableable computer.
computer.
Phase Target:
Phase Target:
1.
1. QuQuicick k ininveventntororyy 2.
2. LoLook up tok up the mihe mispsplaclace mate materierialal 3.
3. SeaSearcrch for ch for certertain ain matmaterierialal
Equipment & parts needed:
Equipment & parts needed:
1.
1. PoPortrtabable RFle RFID reID readaderer 2.
2. PortPortable able CompComputer uter - Not- Notebooebook PC k PC or PDor PDAA 3.
3. InvInvententorory & y & SeaSearcrchinhing softg softwarwaree
Circulation Counter
Circulation Counter
Counter Station is a staff assisted station on services such as loan, return, tagging, Counter Station is a staff assisted station on services such as loan, return, tagging, sorting and etc. It is loaded with arming/disarming module, tagging module and sorting and etc. It is loaded with arming/disarming module, tagging module and so
sortrtining g mmododulule. e. ArArmimingng/D/Disisararmiming ng momodudule le alallolows ws EAEAS S (E(Elelectctroroninic c ArArtiticlclee Sur
Surveiveillallancence) ) bit insibit inside de the tag the tag of of the librthe library materary material to ial to be be setset/re/reset so set so as as toto trigger/not trigger the alarm of the EAS gate. Checking of EAS status of library trigger/not trigger the alarm of the EAS gate. Checking of EAS status of library material is easy. The staff puts the item on the reader and click on the view to material is easy. The staff puts the item on the reader and click on the view to display the information stored inside the tag and status of EAS. There are also display the information stored inside the tag and status of EAS. There are also fe
feataturure e of of AuAuto to ArArmiming ng anand d AuAuto to DiDisasarmrm. . AuAuto to ArArm/m/DiDisasarm rm wiwill ll auautotomamatiticc arm/disar
arm/disarm library material that m library material that is within the is within the Reader range.Reader range.
Together with circulation module from Library Automation Software, this station is Together with circulation module from Library Automation Software, this station is
used for the following services: used for the following services:
1.
1. EditEditing aing and upnd updatindating of pg of patroatron’s rn’s recorecordd 2.
2. Add Add and dand deletieleting of ng of patrpatron’s on’s recorecordrd 3.
3. GenerGenerate loate loan hisan history ftory for a paor a particrticular pular patroatronsns 4.
4. ManaManaging oging of finf fines ines incurcurred by red by the pathe patrontron 5.
5. ArmArm/Disa/Disarm of EArm of EAS bit insS bit inside the lide the libraibrary matery materialrial 6.
6. ProProgragram of new lim of new librabrary mary materterialial 7.
The features of this station depend on the module loaded by
The features of this station depend on the module loaded by the Library
the Library
Automation Software.
Automation Software.
KEY BENEFITS:
KEY BENEFITS:
1.
1. ProvProvide Value Adide Value Added Custded Customer Seromer Service insvice instead of mantead of manual dailual daily routiny routinee 2.
2. Perform mPerform media checedia check-in/-out for k-in/-out for those pathose patrons whtrons who choose o choose not to not to use the use the self self service system
service system 3.
3. Help pHelp patroatron that nn that need aseed assistsistance france from thom the stafe staff f
Patron Self Check-out Station
Patron Self Check-out Station
The Patron Self Check-out station is basically a computer with a touch screen and a The Patron Self Check-out station is basically a computer with a touch screen and a
built-in RFID reader, plus
built-in RFID reader, plus special software for personal identification, book and special software for personal identification, book and otherother media handling and circulation. After identifying the patron with a library ID card, a media handling and circulation. After identifying the patron with a library ID card, a barcode card, or his personal ID number (PIN), the patron is asked to choose the barcode card, or his personal ID number (PIN), the patron is asked to choose the next action (check-out of one or several books). After choosing check-out , the next action (check-out of one or several books). After choosing check-out , the patron puts the book(s) in front of the screen on the RFID reader and
patron puts the book(s) in front of the screen on the RFID reader and the display willthe display will show the book title and its ID number (other optional information can be shown if show the book title and its ID number (other optional information can be shown if desired) which have been checked out.
desired) which have been checked out.
The patron then confirms that he has finished the check-out The patron then confirms that he has finished the check-out process and a receipt is printed, showing which books have process and a receipt is printed, showing which books have been borrowed and the return date. The RFID tag in the book been borrowed and the return date. The RFID tag in the book is set on quiet as a result no alarm will go off at the EAS is set on quiet as a result no alarm will go off at the EAS gates.
gates.
It is also possible to use the station for Check-In (return) of It is also possible to use the station for Check-In (return) of
books. In this case the patron identifies herself, chooses return and then puts one books. In this case the patron identifies herself, chooses return and then puts one book or a stack of books onto the reader. She will receive a receipt. If the books book or a stack of books onto the reader. She will receive a receipt. If the books were to be
were to be taken through the gate now, an taken through the gate now, an alarm would sound.alarm would sound.
One important point for
One important point for library productivity is that the library productivity is that the whole process is significantlywhole process is significantly less time consuming than with barcode and magnetic strip system; therefore long less time consuming than with barcode and magnetic strip system; therefore long lines are avoided and fewer stations are needed for
lines are avoided and fewer stations are needed for the same process.the same process.
KEY BENEFITS:
KEY BENEFITS:
To
1.
1. SpeedSpeeds up s up book book checcheck-in k-in / ch/ check-oeck-outut 2.
2. Frees Frees stafstaff to f to bettebetter ser servicrvice pate patronsrons 3.
3. BetBetter ter spspace ace plaplanninningng 4.
4. IncIncreareases mses mememberbershiship ratp ratee To Patrons:
To Patrons: 1.
1. Easy tEasy to use: bo use: books cooks can be rean be read in aad in any oriny orientaentationtion 2.
2. RedReduceuces s quequeuinuing g timtimee 3.
3. ProProvidvides es patpatroron pn privrivacyacy 4.
4. EncoEncouragurages pes patroatrons ns to to comcome bae backck
Book Drop Box
Book Drop Box
The Book Drops can be located anywhere, within or outside the library. Possible The Book Drops can be located anywhere, within or outside the library. Possible remote locations outside the library include MRT/train stations, shopping centers, remote locations outside the library include MRT/train stations, shopping centers, scho
schools, ols, etc. etc. This offers This offers unprunprecedeecedented nted flexflexibiliibility ty and and convconvenienenience ce of of returreturningning library items at anytime of the
library items at anytime of the day, even when the day, even when the library is closed.library is closed.
Patr
Patron on inseinserts the rts the librlibrary item ary item into the into the slotslot. . The reader capturThe reader captures es the electrothe electronicnic si
signgnataturure e anand d sesendnds s to to babackckenend d sysyststem em fofor r loloan an cacancncelellalatitionon. . PaPatrtron on isis ac
acknknowowleledgdged ed by by bebeepepining g sosounund d anand d flflasashlhligightht. . PaPatrtronon’s ’s rerecocord rd is is upupdadatetedd immediately. This is possible due to the seamless link between RFID Management immediately. This is possible due to the seamless link between RFID Management System and the host computer system. As such, users who have reached their loan System and the host computer system. As such, users who have reached their loan quota can start borrowing items once they have returned them through the Book quota can start borrowing items once they have returned them through the Book Drop.
Drop.
KEY BENEFITS:
KEY BENEFITS:
1.
1. The abThe abilitility to rety to return burn books dooks durinuring off hg off hoursours.. 2.
2. Loans foLoans for the r the returned ireturned items witems will be ill be instantaneousnstantaneously cancellely cancelled so td so that patrohat patronn may immediately borrow again.
may immediately borrow again. 3.
3. Librarians Librarians are able are able to allocto allocate more ate more time to time to customer customer service, aservice, as they s they areare free from the
free from the labor-intensivlabor-intensive loan e loan cancellation activity associated with bar-cancellation activity associated with bar-code system.
code system. 4.
4. DispDisplay the lay the returreturn statn status and pus and printrinting reing receipceipt.t. 5.
5. The desigThe design of n of the Book the Book Drops is Drops is such thasuch that items t items cannot be cannot be retrieved retrieved backback once deposited.
once deposited.
OPTIONS:
OPTIONS:
1.
1. AccAccept ept spspeciecial al desdesignign 2.
Shelf Management
Shelf Management
Shelf Management Solution makes locating and identifying items on the shelves an Shelf Management Solution makes locating and identifying items on the shelves an easy task for librarians. It comprises basically of a
easy task for librarians. It comprises basically of a portable scanner and a base station.
portable scanner and a base station.
The solution is designed to cover three main
The solution is designed to cover three main
requirements:
requirements:
1.
1. SearSearch foch for inr individdividual bual books ooks requrequestedested 2.
2. InvenInventory tory checcheck of thk of the whoe whole lible library rary stocstockk 3.
3. SearSearch foch for bor books woks which hich are are missmiss-helv-helveded Al
All l ththesese e fufuncnctitionons s arare e peperfrforormemed d by by swsweepeepining g ththee
portable scanner across the spines of the books on the shelves to gather their portable scanner across the spines of the books on the shelves to gather their identities. In an inventory check situation, the identities collected are compared identities. In an inventory check situation, the identities collected are compared with the database and a
with the database and a discrepancdiscrepancy report could be y report could be generated.generated.
In situations when search function is required, whether for a particular item or an In situations when search function is required, whether for a particular item or an item category, the information is first entered into the portable scanner from the item category, the information is first entered into the portable scanner from the base station, and when a foreign item is found on the shelves, a built-in beeper base station, and when a foreign item is found on the shelves, a built-in beeper sound to alert the librarians.
sound to alert the librarians.
KEY BENEFITS:
KEY BENEFITS:
1.
1. ChaChangenges ins invenventortory proy procescess:s: 2.
2. No more No more book hanbook handling: jusdling: just pass t pass the reader the reader across sacross shelved boohelved books to pks to performerform an instant inventory.
an instant inventory. 3.
3. AccuAccuracy: booracy: book identifk identificatication numbion numbers are regers are registeistered in the Shelred in the Shelf- f-Management Reader. The data is then downloaded to the
Management Reader. The data is then downloaded to the central database.central database. 4.
4. The fasThe fastest intest inventoventory you hary you have ever mve ever made: 20 boade: 20 books per soks per seconecond.d. 5.
5. NotiNotificatfication: booion: books to be pullks to be pulled are up-led are up-loadeoaded to the readed to the reader for quir for quickck identification.
identification. 6.
6. UsUser fer fririenenddlyly:: 7.
7. LiLighght t weweigightht 8.
8. Wand aWand allowllows easy rs easy readieading of hing of high and gh and low slow shelvehelvess 9.
9. SavSaves tes timime ane and red resosourcurces:es:
10.Implementers indicate a 75% reduction in human resources required for shelf 10.Implementers indicate a 75% reduction in human resources required for shelf
management activities. management activities.
EAS Gates
RFID EAS Gate is the anti-theft part of the RFID Library Management System using RFID EAS Gate is the anti-theft part of the RFID Library Management System using the same RFID tags embedded in the library items. Each lane is able to track items the same RFID tags embedded in the library items. Each lane is able to track items of 1 meter or more and would trigger the alarm system when an un-borrowed item of 1 meter or more and would trigger the alarm system when an un-borrowed item passed through them. The alarm will sound and lights on the gate will flash as passed through them. The alarm will sound and lights on the gate will flash as patron passes through with the
patron passes through with the library material.library material.
Th
The e EAEAS S AntAnti-Ti-Thefheft t GatGate e is used to is used to detdetect RFID ect RFID tag that is tag that is equequippipped ed witwith h EASEAS (Electronic Article Surveillance). It can detect the RFID tags within 1 meter range (Electronic Article Surveillance). It can detect the RFID tags within 1 meter range without interference of magnetic items, Upon detecting of Armed RFID tags, the without interference of magnetic items, Upon detecting of Armed RFID tags, the alarm will sound on the gate. It has option to trigger a Camera to record patrons alarm will sound on the gate. It has option to trigger a Camera to record patrons who trigger the alarm to the
who trigger the alarm to the Surveillance Station.Surveillance Station.
Theft detection is an integral feature of the chip within the tag. It is a stand-alone Theft detection is an integral feature of the chip within the tag. It is a stand-alone
technology, which operates independently of the library
technology, which operates independently of the library database.database.
FEATURES:
FEATURES:
1.
1. DetDetect ect EAS EAS ArmArmed Red RFID FID tagtagss 2.
2. MulMultiti-it-item em detdetectectionion 3.
3. Able tAble to inteo integratgrate camee camera witra with the gh the gate (Opate (Optiontion)) 4.
4. Gale to inGale to integrategrate with Ste with Surveurveillanillance Statce Station (Opion (Option)tion)
KEY BENEFITS:
KEY BENEFITS:
1.
1. Single tecSingle technology is hnology is required frequired for both or both inventory inventory and theft and theft management management of theof the library.
library. 2.
2. Library Library staff staff are alerare alerted immted immediately ediately when uwhen un-borrowed n-borrowed items items passespasses through the theft detection gates.
through the theft detection gates. 3.
3. WoulWould-be thid-be thieves are deeves are deterrterred by the physed by the physical prical presencesence of the gatese of the gates.. 4.
4. Number oNumber of patronf patrons passis passing througng through the gh the gantry is antry is captured bcaptured by a cy a counter onounter on the gates Alarm volume can be
the gates Alarm volume can be easily controlled.easily controlled.
Library Security System Only:
Library Security System Only:
Phase Action:
Phase Action:
1.
1. UsinUsing RFIg RFID Tag D Tag replareplace EM Sce EM Securecurity Strity Stripeipe
Phase Target:
Phase Target:
1.
1. RadRadio Fio Freqrequenuency Dcy Deteetectictionon 2.
2. ReplaReplace the EM Antce the EM Anti-thei-theft systft system to avoid them to avoid the high vole high volume EM fieume EM field harmld harm human body and without False Alarm.
human body and without False Alarm.
Equipment & parts needed:
Equipment & parts needed:
1.
1. Anti-Anti-theftheft Detectt Detection Gate - Detion Gate - Detect the RFIect the RFID Tag on Book and ChD Tag on Book and Check EASeck EAS Status, System alarm when the EAS status is ON.
Status, System alarm when the EAS status is ON. 2.
2. SecurSecurity Proity Processcessing Stating Station - Turn On or Ofion - Turn On or Off the EAS Settf the EAS Setting of the Ching of the Chipip 3
3.. RRFFIID TD Taaggss
Support Library Circulation:
Support Library Circulation:
Phase Action:
Phase Action:
1.
1. Using RUsing RFID tags FID tags replace threplace the barcoe barcode in Cide in Circulation rculation process. process. Reading boReading book’sok’s access number from RFID than from barcode to borrow and return the book. access number from RFID than from barcode to borrow and return the book.
Phase Target:
Phase Target:
1.
1. No No linline oe of sf sighight nt needeededed 2.
2. AlloAllows to check-ows to check-out and checut and check-in severk-in several items sial items simultmultaneouaneouslysly 3.
3. Performing Performing both idboth identification entification and anand antitheft in titheft in one sone single oingle operationperation
Equipment & parts needed:
Equipment & parts needed:
1.
1. CoCoununteter r StStatatioionn 2.
2. New IntegrNew Integrated Librated Library System ary System functions functions - read - read from Rfrom RFID and FID and set the set the EASEAS status.
status.
RFID Process RFID Process
Perhaps the most difficult and disliked function in libraries is inventory control and Perhaps the most difficult and disliked function in libraries is inventory control and shelf managem
shelf management. ent. This functioThis function becomes extremely simpn becomes extremely simple with RFID technologyle with RFID technology and associated software from the ILS system.
The components necessar
The components necessary for inventory management consist of a y for inventory management consist of a Reader and aReader and a Wand with an IPAQ (hand
Wand with an IPAQ (hand-held personal dig-held personal digital assistant) at the end. ital assistant) at the end. The ReaderThe Reader weighs only 607 grams (0.6 kgs) and the
weighs only 607 grams (0.6 kgs) and the Wand 435 grams (0.4 kg), making theWand 435 grams (0.4 kg), making the weight of the entire unit ap
weight of the entire unit approximately one kilogproximately one kilogram. ram. A shelf can be inventorieA shelf can be inventoried ind in a matter of a few minutes as th
a matter of a few minutes as the units can read up to 20 tags a secone units can read up to 20 tags a second. d. The systemThe system allows for two different
allows for two different methods for taking inventory.methods for taking inventory.
The f
The first mirst methoethod for tad for taking inking inventventory is tory is to run tho run the Wand e Wand acroacross the sss the shelf. helf. ThisThis process captures the RFID data to the
process captures the RFID data to the IPAQ unit, which can store data IPAQ unit, which can store data for more thanfor more than 6 million boo
6 million books. ks. This data is uploaThis data is uploaded, throded, through wired or wireleugh wired or wireless conness connectioctions, tons, to the ILS system, where the software program performs the inventory management the ILS system, where the software program performs the inventory management functions.
functions.
The second method involves a pre-processing step where data is downloaded from The second method involves a pre-processing step where data is downloaded from
the ILS syst
the ILS system to the Reader. em to the Reader. This method is This method is more effective wmore effective when there is a nhen there is a needeed to search for spec
to search for specific books or to identify mific books or to identify miss-shelved or misiss-shelved or missing books. sing books. The unitThe unit comes with an audible alarm to provide appropriate feedback to the
comes with an audible alarm to provide appropriate feedback to the user.user.
All in all, this technology converts the otherwise tedious task of
All in all, this technology converts the otherwise tedious task of managing inventormanaging inventoryy to a
to a convenient technique for helping libraries gain control over convenient technique for helping libraries gain control over their collections.their collections.
Specificat
Specificat
ions for
ions for
RFID-based Library Management System
RFID-based Library Management System
The RFID Tags
The RFID Tags provided have following specifications:provided have following specifications:
•
• The RFID chip The RFID chip have the have the following characterfollowing characteristics:istics: •
• Frequency Support: 13.56 MHzFrequency Support: 13.56 MHz •
• Standard: ISO 15693 compliantStandard: ISO 15693 compliant •
• Type: iCode2 compliant Type: iCode2 compliant •
• Memory Capacity: 1024 bitsMemory Capacity: 1024 bits •
•
• Data retention: >10 years for Data retention: >10 years for each writeeach write •
• Anti-collision for Multi readAnti-collision for Multi read •
• Anti-theft security bitAnti-theft security bit
•
• ReadRead//WriteWrite capability with data locking optioncapability with data locking option
•
• Size of square tag (for Size of square tag (for books): 50mm x 50mmbooks): 50mm x 50mm •
• Size of rectangle tag (for Size of rectangle tag (for Tapes): 150mm x 15mmTapes): 150mm x 15mm •
• Size of square tag (fSize of square tag (for CD/DVD): or CD/DVD): Diameter 40Diameter 40mmmm
The membership cards have
The membership cards have
the following characteristics:
the following characteristics:
•
• Operating Frequency: 13.56 MHzOperating Frequency: 13.56 MHz •
• Standard: ISO 15693-Vicinity CardsStandard: ISO 15693-Vicinity Cards •
• Memory (User Programmable): 2K bitsMemory (User Programmable): 2K bits •
• Organized into 64x32 bit blocksOrganized into 64x32 bit blocks •
• Typical Programmin Typical Programming cycles (at 25 g cycles (at 25 C): 100,000C): 100,000 •
• Simultaneous IdentificSimultaneous Identification of Tags: ation of Tags: Upto 50Upto 50 •
• tags per Second (Reader/Antenntags per Second (Reader/Antenna dependent)a dependent) •
• Data Retention time (at 25C): > 10 YearsData Retention time (at 25C): > 10 Years •
• Case Material: PVC (Polyvinyl Chloride), WhiteCase Material: PVC (Polyvinyl Chloride), White •
• Surface Finish: GlossySurface Finish: Glossy •
• Dimensions: 85.6 (L) x 54 Dimensions: 85.6 (L) x 54 (W) x 0.76(W) x 0.76 •
• (Thickness) mm (ISO 7810)(Thickness) mm (ISO 7810) •
• Weight: 5 gmsWeight: 5 gms •
• Printability: Thermal transfer (Dye Sublimation preferred), Silk screen TampPrintability: Thermal transfer (Dye Sublimation preferred), Silk screen Tamp
on (Pad on) on (Pad on)
It consist of -
It consist of - RFID Reader and Antenna with multiple Read/Write facilityRFID Reader and Antenna with multiple Read/Write facility
•
• Barcode ReaderBarcode Reader •
• High Speed slip printerHigh Speed slip printer •
Hardware
Hardware
Above system requires CPU with
Above system requires CPU with following minimum specsfollowing minimum specs
•
• Processor: Intel Pentium 4 (2.4 GHz)Processor: Intel Pentium 4 (2.4 GHz) •
• Hard disk: 40 GB or higherHard disk: 40 GB or higher •
• Memory: 256 MB DDR RAMMemory: 256 MB DDR RAM •
• Display: 15” TFT LCD MonitorDisplay: 15” TFT LCD Monitor •
• Network: motherboard with built inNetwork: motherboard with built in •
• Audio/Video/Ethernet 100 Audio/Video/Ethernet 100 MbpsMbps •
• Drive: DVD Combo driveDrive: DVD Combo drive
o
o RFID Antenna and ReaderRFID Antenna and Reader o
o Barcode ReaderBarcode Reader o
o Thermal Slip Printer Thermal Slip Printer
Specificat
Specificat
ions for RFID Reader and
ions for RFID Reader and
antenna with multiple read
antenna with multiple read
/write facility
/write facility
Firmware protocol: The firmware should be ISO 15693 compliant and should be Firmware protocol: The firmware should be ISO 15693 compliant and should be upgradeable to comply with future ISO 18000 RFID chips
upgradeable to comply with future ISO 18000 RFID chips
•
• Antenna: Capability to multiple readAntenna: Capability to multiple read •
• Operating frequency: 13.56 MHzOperating frequency: 13.56 MHz •
• Chip compatibility: ICode2 and ISO 15693 chipsChip compatibility: ICode2 and ISO 15693 chips •
• Accompanied with the Accompanied with the necessary software Communication interface: serialnecessary software Communication interface: serial
RS232 RS232
Application software:
Application software:
•
• Windows 2000 Professional or higherWindows 2000 Professional or higher •
• Borrowing software (based on SIP2)Borrowing software (based on SIP2) •
• Arm/Disarm softwarArm/Disarm software for e for EAS security bitEAS security bit •
•
• Reading distance: 0 – Reading distance: 0 – 25 cm25 cm •
• Language: Multi-lingual support using UnicodeLanguage: Multi-lingual support using Unicode •
• Membership card type support: Barcode, Magnetic, Membership card type support: Barcode, Magnetic, Smart card, RFID cardSmart card, RFID card
multiple item loan: should be configurable from 1 to X multiple item loan: should be configurable from 1 to X nos.nos.
The Multi-purpose Counter Station have
The Multi-purpose Counter Station have
the following specifications.
the following specifications.
It
It coconsnsisists ts of of RFRFID ID CoCoununteter r StStatatioion n fofor r ReReadad/W/Wririte te OnOne e ititem em at at a a titime me wiwithth specifications as below:
specifications as below:
•
• Read/Write /Antitheft programminRead/Write /Antitheft programming should be g should be done in one done in one single operation.single operation. •
• The programming station should be interfaced with The programming station should be interfaced with the Library Managementthe Library Management
Software. Software.
•
• Programming time should be 1 second or lessProgramming time should be 1 second or less •
• Must be able to read ISO 15693 compliant tagsMust be able to read ISO 15693 compliant tags •
• SIP2 client software should be providedSIP2 client software should be provided
Hardware required
Hardware required
•
• CPU with following minimum specsCPU with following minimum specs •
• Processor: Intel Pentium 4 (2.4 GHz)Processor: Intel Pentium 4 (2.4 GHz) •
• Memory: 256 MB DDR RAMMemory: 256 MB DDR RAM •
• Hard disk: 40GB or higherHard disk: 40GB or higher •
• Drive: DVD Combo driveDrive: DVD Combo drive •
• Display: 15” Color MonitorDisplay: 15” Color Monitor
o
o RFID Antenna and ReaderRFID Antenna and Reader o
o Barcode ReaderBarcode Reader o
o Thermal Slip Printer Thermal Slip Printer
Application software
•
• MS Windows 2000 Professional or MS Windows 2000 Professional or higherhigher •
• RFID RFID Tagging/ProgTagging/Programming softwareramming software •
• Borrowing software (based on SIP2)Borrowing software (based on SIP2) •
• Returning software (based on SIP2)Returning software (based on SIP2) •
• Arm/Disarm softwarArm/Disarm software for e for EAS security bitEAS security bit •
• Frequency Support: 13.56 MHzFrequency Support: 13.56 MHz •
• Reading distance: 0 – Reading distance: 0 – 25 cm25 cm •
• Language: Multi-lingual support using UnicodeLanguage: Multi-lingual support using Unicode •
• Membership card type support: Barcode,Membership card type support: Barcode, •
• Magnetic, Smart card, RFID cardMagnetic, Smart card, RFID card •
• Multiple item loans: should be configurable from 1 to X Multiple item loans: should be configurable from 1 to X nos.nos.
The Single-lane EAS Security Gantry have the
The Single-lane EAS Security Gantry have the
following
following
specifications.
specifications.
Library EAS Security Gantry Arrangement with Provision for
Library EAS Security Gantry Arrangement with Provision for CameraCamera
The single-lane gantry should consist of
The single-lane gantry should consist of Two Pedestals: Each pedestal is Two Pedestals: Each pedestal is standalonestandalone and plug and play to the main power
and plug and play to the main power
Standalone: The Security Gates need not be linked to the library database, and Standalone: The Security Gates need not be linked to the library database, and should still operate even when
should still operate even when the Integrated Library Management Software Systemthe Integrated Library Management Software System is down or under maintenance.
is down or under maintenance.
•
• Frequency Support: 13.56 MHzFrequency Support: 13.56 MHz
o
o Controllable Volume for AlarmControllable Volume for Alarm o
o Strobe lightStrobe light o
o Alarm CountAlarm Count o
o Patron Traffic CounterPatron Traffic Counter
•
• Options for: Integrating with security camera Options for: Integrating with security camera Integrating with Access ControlIntegrating with Access Control
System System
Shelf Inventory Management System
Th
This is conconsissists ts of of HanHandhedheld ld RFRFID ID reareader der aloalong ng witwith h necnecessessary ary cocommmmuniunicatcationion software as per specs below:
software as per specs below:
•
• Operating frequency: 13.56 MHzOperating frequency: 13.56 MHz •
• Chip Compliance: ISO 15693 SIP2 client softwareChip Compliance: ISO 15693 SIP2 client software
o
o RFID Handheld AntennaRFID Handheld Antenna o
o RFID Portable ReaderRFID Portable Reader o
o iPAQ Pocket PC 64 MB RAM Model 5500 or latest model along withiPAQ Pocket PC 64 MB RAM Model 5500 or latest model along with necessary application software compatible for use with the handheld necessary application software compatible for use with the handheld reader
reader
Carry case for the entire
Carry case for the entire Shelf Management SystemShelf Management System
The Shelf Management System supports following functions: The Shelf Management System supports following functions:
•
• Item search (single/mulItem search (single/multiple)tiple) •
• Stock verificationStock verification •
• Arm/disarm itemsArm/disarm items •
• Locate misplaced itemsLocate misplaced items
The system provides web-based reports for
The system provides web-based reports for the following purposes:the following purposes:
•
• Stock taking reportStock taking report •
• Missing items reportMissing items report •
Deliverables
Deliverables
N N o o PPaarrttiiccuullaarrss QQuuaannttiittyy 1. 1. 2. 2. 3. 3. 4. 4. 5. 5. 6. 6.
• •