• No results found

Proposal for RFID 13-56

N/A
N/A
Protected

Academic year: 2021

Share "Proposal for RFID 13-56"

Copied!
29
0
0

Loading.... (view fulltext now)

Full text

(1)

Technical Proposal

Technical Proposal

For

For

Library Management Software

Library Management Software

For

For

(Client)

(Client)

(2)

HCL PROFILE

HCL PROFILE

HCL PROFILE

HCL PROFILE

HCL Infosystems Limited is one of the pioneers in the Indian IT market, with

HCL Infosystems Limited is one of the pioneers in the Indian IT market, with

its origins in 1976. For over quarter of a century, HCL has developed and

its origins in 1976. For over quarter of a century, HCL has developed and

im

imple

plemen

mented

ted sol

soluti

utions

ons for

for mul

multip

tiple

le mar

market

ket seg

segmen

ments,

ts, acr

across

oss a

a ran

range

ge of 

of 

tec

techno

hnolog

logies

ies in

in Ind

India.

ia. HCL has

HCL has bee

been

n in

in the

the for

forefr

efront

ont in

in int

introd

roduci

ucing

ng new

new

technologies and solutions, now HCL is amongst the top 20 business houses

technologies and solutions, now HCL is amongst the top 20 business houses

in India with 14000+ employees spread across 38 countries and revenue of 

in India with 14000+ employees spread across 38 countries and revenue of 

around 14 billion US dollars.

around 14 billion US dollars.

HCL Infosystems Ltd. is the

HCL Infosystems Ltd. is the Internet Infrastructure initiative of the HCL group,

Internet Infrastructure initiative of the HCL group,

In

Indi

dia’s

a’s pr

prem

emie

ier

r in

info

form

rmati

ation

on te

tech

chno

nolo

logy

gy gr

grou

oup.

p. Th

Thro

roug

ugh

h th

the

e pi

pion

onee

eeri

ring

ng

presence of the HCL group companies the vast experience of the markets,

presence of the HCL group companies the vast experience of the markets,

HC

HCL

L In

Info

fosy

syst

stem

ems

s ha

has

s pr

prop

opel

elle

led

d it

itse

self

lf to

to th

the

e pa

path

th of

of “To

“Tota

tal

l Te

Tech

chno

nolo

logy

gy

Integration”.

Integration”.

HCL Infosystems has established state-of-the-art ATM / Frame-Relay IP based

HCL Infosystems has established state-of-the-art ATM / Frame-Relay IP based

network infrastructure across 43 cities in the country and offers an entire

network infrastructure across 43 cities in the country and offers an entire

range of managed services. Its portfolio of services includes Virtual Private

range of managed services. Its portfolio of services includes Virtual Private

(3)

Networks (VPNs), Broadband Internet access; Hosting Co-location Services;

Networks (VPNs), Broadband Internet access; Hosting Co-location Services;

De

Desi

sign

gnin

ing

g an

and

d de

depl

ploy

oyin

ing

g Di

Disa

sast

ster

er Re

Reco

cove

very

ry so

solu

luti

tion

ons

s an

and

d Bu

Busi

sine

ness

ss

Conti

Continuity

nuity solut

solutions;

ions; Appli

Applicatio

cation

n serv

services;

ices; Manag

Managed

ed Secur

Security

ity serv

services

ices and

and

NOC services.

NOC services.

Al

All

l th

thes

ese

e se

serv

rvic

ices

es ar

are

e de

deli

live

vere

red

d wi

with

th a

a tu

turn

rnke

key

y ap

appr

proa

oach

ch th

that

at in

incl

clud

udes

es

deli

deliveri

vering

ng Infosy

Infosystems

stems’s

’s core services

core services,

, thir

third

d party hardware and

party hardware and netwo

network

rk

provisioning, maintenance activities and project

provisioning, maintenance activities and project management.

management.

HC

HCL

L In

Info

fosy

syst

stem

ems

s co

come

mes

s wi

with

th th

the

e pr

prom

omis

ise

e of

of de

deli

live

veri

ring

ng th

the

e co

comm

mmit

itte

ted

d

‘Qu

‘Quali

ality

ty of

of Ser

Servic

vice’

e’ bac

backed

ked by

by sig

signif

nifica

icant

nt inv

invest

estmen

ments

ts in

in inf

infras

rastr

truct

ucture

ure,,

network management solutions and its round the clock centralized Customer

network management solutions and its round the clock centralized Customer

Support Call Center. This holds even more when we consider the leverage

Support Call Center. This holds even more when we consider the leverage

Inf

Infosy

osyste

stems

ms dra

draws

ws fro

from

m its

its par

parent

ent com

company

pany’s

’s unp

unpara

aralle

lleled

led ex

exper

perien

ience

ce in

in

networking.

networking.

LIBRARY MANAGEMENT SOLUTION

LIBRARY MANAGEMENT SOLUTION

HCL Infosystems Limited is providing one of the leading library management

HCL Infosystems Limited is providing one of the leading library management

software (LMS) in the global market. Our LMS is designed on all international

software (LMS) in the global market. Our LMS is designed on all international

standards like MARC-21, UNICODE, SIP/SIP2, ISO 2709. LMS is completely

standards like MARC-21, UNICODE, SIP/SIP2, ISO 2709. LMS is completely

user-friendly menu driven interface, online help, complete and elaborative

user-friendly menu driven interface, online help, complete and elaborative

he

help

lp do

docu

cume

ment

ntati

ation

on.

. HC

HCL

L is

is al

also

so ca

can

n pr

prov

ovid

ide

e so

solu

luti

tion

ons

s li

like

ke RF

RFID

ID ba

base

sed

d

security and circulation, as well as solutions for Digital Library Management

security and circulation, as well as solutions for Digital Library Management

solution.

(4)

HCL’s Customer Support

HCL’s Customer Support

We have the highest regard for our esteem customers, and to meet this, we

We have the highest regard for our esteem customers, and to meet this, we

have geared up ourselves with following

have geared up ourselves with following services across the country:

services across the country:

We organize customer’s meets all over the country to have the first

We organize customer’s meets all over the country to have the first

hand interaction, which enable us to interact with our customers and

hand interaction, which enable us to interact with our customers and

re

revi

view

ew th

thei

eir

r fe

feed

edbac

back

k on

one

e to

to on

one.

e. We

We al

also

so st

stri

rive

ve to

to im

impr

prov

ove

e ou

ourr

services standards for more customer satisfaction.

services standards for more customer satisfaction.

We have the key-client concept, where in we constantly monitor the

We have the key-client concept, where in we constantly monitor the

upke

upkeep

ep of

of our

our pro

produc

ducts,

ts, bei

being

ng use

used

d for

for ach

achiev

ieving

ing hig

highes

hest

t lev

level

el of 

of 

ser

servic

vice

e sta

standar

ndards.

ds. The

The par

parame

ameter

ters

s gov

govern

erned

ed by

by thi

this

s (vi

(viz.

z. Up-

Up-tim

time,

e,

Preventive Maintenance Schedule etc.) are appraised by specialized

Preventive Maintenance Schedule etc.) are appraised by specialized

team at the regional office and Head office. Further, these clients are

team at the regional office and Head office. Further, these clients are

(5)

provided with an Up Time Certificate authenticated by the respective

provided with an Up Time Certificate authenticated by the respective

user department and these are sent by the

user department and these are sent by the

President & CEO

President & CEO himself.

himself.

We have across the country –

We have across the country –

Number of Machines

Number of Machines

50,000

50,000

(A

(Alll

l

pr

prod

oduc

uctts

s

in

inc

clu

ludi

ding

ng

photocopier)

photocopier)

10,000

10,000 (Telecom products alone)

(Telecom products alone)

N

Nu

um

mb

be

er

r

o

of

f

S

So

offttw

wa

arre

e

Solutions

Solutions

1,000

1,000

Number of Professionals

Number of Professionals

14,000

14,000

N

Nu

um

mb

be

er

r

o

of

f

T

Trra

aiin

ne

ed

d

Engineers

Engineers

5,000

5,000

Number of Offices

Number of Offices

170

170 cities

cities

Number of Service Centres

Number of Service Centres

360

360

Customer Satisfaction

Customer Satisfaction

9 out of 10

9 out of 10 *

*

ISO Certification

ISO Certification

ISO 9001:2000

ISO 9001:2000 &

&

ISO 14001:2004

ISO 14001:2004

* Survey done by 

* Survey done by 

With trained engineers around 360 locations around India, we are able to

With trained engineers around 360 locations around India, we are able to

pr

prov

ovid

ide

e be

bett

tter

er cu

cust

stom

omer

er su

supp

ppor

ort

t an

and

d re

reac

ach

h we

well

ll abo

above

ve th

the

e in

indu

dust

stri

rial

al

c

cu

us

stto

om

me

er

r

s

sa

attiis

sffa

ac

cttiio

on

n

lle

ev

ve

el

l

s

stta

an

nd

da

arrd

ds

s..

HCL is itself synonymous with customer satisfaction, we are proud to offer

HCL is itself synonymous with customer satisfaction, we are proud to offer

the best solutions and

the best solutions and services anywhere in India.

services anywhere in India.

 The best in the “

 The best in the “

Corporate Users expectation and Satisfaction Survey 

Corporate Users expectation and Satisfaction Survey 

2003

2003” -

” -

Voice & Data Magazine.

Voice & Data Magazine.

HCL has been

HCL has been

ranked No.5 among India’s Top 5

ranked No.5 among India’s Top 5 groups

groups impacting the

impacting the

dynamics of the IT Industry

-dynamics of the IT Industry -

DataQuest

DataQuest

“The Most Responsive Company, 2005

The Most Responsive Company, 2005”– IT Hardware Category by the

”– IT Hardware Category by the

Economic

(6)

HCL’s Presence in India

HCL’s Presence in India

HCL’s Presence in India

HCL’s Presence in India

(7)

RFID Solution for (Client)

RFID Solution for (Client)

Overview

Overview

Radio Frequency Identification (RFID) is the technology that is slated to replace Radio Frequency Identification (RFID) is the technology that is slated to replace barcodes in library applications. It is a form of identification that is contact-less and barcodes in library applications. It is a form of identification that is contact-less and does not require line of sight. The technology, though new to libraries, has been in does not require line of sight. The technology, though new to libraries, has been in use in other sectors for m

use in other sectors for more than 20 years. ore than 20 years. The RFID tags are placed in books anThe RFID tags are placed in books andd generally covered with a property sticker. Antennas of different sizes, based on generally covered with a property sticker. Antennas of different sizes, based on application, are used to read the tags

application, are used to read the tags and manage the various library functions.and manage the various library functions.

 The RFID Solution is a revolutionary application of automatic identification and data  The RFID Solution is a revolutionary application of automatic identification and data capture (AIDC) technology. In a library environment, RFID technology resembles a capture (AIDC) technology. In a library environment, RFID technology resembles a traditional barcode system in that it provides a means of assigning an ID to an item traditional barcode system in that it provides a means of assigning an ID to an item and reading that ID to perform circulation transactions or to take inventory. But and reading that ID to perform circulation transactions or to take inventory. But while RFID technology resembles a traditional barcode system in application, the while RFID technology resembles a traditional barcode system in application, the HCL RFID Solution is

HCL RFID Solution is far superior in performance—plus it offers built-in security.far superior in performance—plus it offers built-in security.

How

How

the HCL RFID Solution Works

the HCL RFID Solution Works

HCL has partnered with TAGSYS/Texas Instruments, leading manufacturers of RFID HCL has partnered with TAGSYS/Texas Instruments, leading manufacturers of RFID ha

hardrdwawarere, , to to brbrining g yoyou u ththe e lalatetest st in in RFRFID ID tetechchnonolologygy. . AA standard RFID system consists of four main parts:

standard RFID system consists of four main parts:

• RFID TagsRFID Tags - Flexible, paper-thin smart labels that are- Flexible, paper-thin smart labels that are applied directly to library items. Each RFID tag contains applied directly to library items. Each RFID tag contains a tiny chip, which is both readable and writable and can a tiny chip, which is both readable and writable and can store infor

store information to imation to identify itemdentify items in your s in your collection. collection. InIn library applications, it also stores a security bit and if  library applications, it also stores a security bit and if  needed, information to

needed, information to support sorting systems.support sorting systems.

(8)

  Tags are inactive until the reader’s interrogation signal “wakes” Tags are inactive until the reader’s interrogation signal “wakes” them up

them up

 Cheap, but short range onlyCheap, but short range only

• Semi-passiveSemi-passive

 On-board battery, but On-board battery, but cannot initiate communicationcannot initiate communication

 Can serve as sensors, collect information from environment: forCan serve as sensors, collect information from environment: for example, “smart dust” for military

example, “smart dust” for military applicatioapplicationsns

 More expensive, longer rangeMore expensive, longer range

• ActiveActive

 On-board battery, can On-board battery, can initiate communicationinitiate communication

 

• ReadersReaders –– A

A hahandndheheldld o

or r EEAASS Gates

Gates

programmed to capture radio waves signals omitted by the RFID Tags. The programmed to capture radio waves signals omitted by the RFID Tags. The devic

devices es are are respresponsionsible for ble for the the secusecurity and rity and circcirculatiulation on of of resoresourcurces es asas programmed in the server, it will alarm if the resource is taken out without programmed in the server, it will alarm if the resource is taken out without proper process.

proper process. •

• DatabaseDatabase: : all all the the infinforormatmation ion relrelateated d to to RFRFID ID tagtags s and and corcorresresponpondindingg info

informatrmation ion abouabout t the the resoresourceurce/boo/books/meks/member mber is is storstored ed in in the the datadatabasebase which is stored in a centralized location a PC or a Server. The software which is stored in a centralized location a PC or a Server. The software ins

instaltalled led in in the the serserver ver ververifiifies es the tag the tag reareadinding g cacaptuptured red by by the the ReaReaderder (Transceiver).

(Transceiver).

 The HCL RFID Solution can be

 The HCL RFID Solution can be implemented withimplemented with any any library automation system thatlibrary automation system that us

uses es ththe e StStanandadard rd InInteterfrfacace e PrPrototococol ol (S(SIPIP/S/SIPIP2) 2) fofor r cicircrcululatatioion n trtranansasactctioionsns..   To

  Togetgetherher, , HCL HCL and and TATAGSYGSYS/TS/TI I havhave e ininstastallelled d oveover r 2.5 2.5 milmilliolion n tagtags s in in liblibrararieriess worldwide.

(9)

Advantages of an RFID System over a Traditional

Advantages of an RFID System over a Traditional

Barcode System

Barcode System

  The

  The HCL HCL RFID Solution provides numerouRFID Solution provides numerous s advaadvantagntages es over over tradtraditioitional nal barcbarcodeode systems. Here are just a few of the benefits:

systems. Here are just a few of the benefits:

Features

Features RFID RFID BarcodeBarcode

Read more than one item at a time Read more than one item at a time

×

×

Read while item is moving Read while item is moving

×

×

Programmable Programmable

×

×

Line of site read

Line of site read not requirednot required

×

×

Life guarantee (100,000 reads) Life guarantee (100,000 reads)

×

×

Sturdy in harsh environments Might want to Sturdy in harsh environments Might want to consider use of t

consider use of the term “environmentallyhe term “environmentally hardened”, this term is

hardened”, this term is becoming more commonbecoming more common place in USA electronics markets. (I am not

place in USA electronics markets. (I am not certaincertain of global acceptance of this term)

of global acceptance of this term)

×

×

Able to resist water damage Able to resist water damage

×

×

Built‐in security Built‐in security

×

×

Inventory tool without handling items Inventory tool without handling items

×

×

Able to locate specific items on

Able to locate specific items on shelvesshelves

×

×

Use with borrower self checks units Use with borrower self checks units

Use with automated sorting and

Use with automated sorting and handling systemshandling systems

×

×

Particulars

Particulars RFID RFID BarcodeBarcode P

Phhyyssiiccaal l SSiizzee TTaaggs s rraanngge e iin n ssiizze e ffrroom m aa postage stamp to a book. postage stamp to a book.  The aspect ratio of a Tag's  The aspect ratio of a Tag's

length vs width is very length vs width is very flexible and not a

flexible and not a

significant factor for the significant factor for the Reader.

Reader.

Bar codes are larger than Bar codes are larger than the smallest tag and very the smallest tag and very sensitive to the aspect sensitive to the aspect ratio for presentation to a ratio for presentation to a scanner. The ratio of a bar scanner. The ratio of a bar code's length vs width is code's length vs width is critical to its

(10)

L

Liiffeessppaann TTaaggs s hhaavve e nno o mmoovviinng g ppaarrttss and are embedded in

and are embedded in protective material for an protective material for an indestruct

indestructible case ible case andand multi-year lifespan. multi-year lifespan.

Bar Codes have

Bar Codes have unlimitedunlimited shelf life but are subject to shelf life but are subject to degradation with

degradation with handling.

handling. Ha

Harsrsh Eh Envnvirirononmementntss TaTags gs mmay ay be be plplacaced ed inin extreme environments and extreme environments and perform to

perform to specificatiospecification.n.  They are very robust to  They are very robust to

handling, sensitive to handling, sensitive to

environment, and generally environment, and generally degrade once used, stored degrade once used, stored or handled in a non-office or handled in a non-office environment.

environment. Product Codes

Product Codes

Digital data is stored on

Digital data is stored on

the Tag and provides for

the Tag and provides for

a significant capability to

a significant capability to

encode: 1) Tag originator

encode: 1) Tag originator

2) User data as needed

2) User data as needed

by the segment or

by the segment or

application 3) Serial

application 3) Serial

number as needed by

number as needed by

the segment/application

the segment/application

Major vertical markets

Major vertical markets

like Retail have

like Retail have

standards which are

standards which are

excellent at coding

excellent at coding

product type and

product type and

manufacturer. Additional

manufacturer. Additional

information beyond

information beyond

these basic parameters

these basic parameters

is not feasible because

is not feasible because

the size of the Bar Code

the size of the Bar Code

becomes too large.

becomes too large.

C

Coouunntteerrffeeiittiinngg TTaaggs s aarre e pprroodduucceed d wwiitth h aa unique identity code (UIC) unique identity code (UIC) or serial number from the or serial number from the manufactur

manufacturer. This er. This isis

embedded digitally on the embedded digitally on the microchip and may not be microchip and may not be changed, therefore, making changed, therefore, making them extremely resistant them extremely resistant to counterfeiting.

to counterfeiting.

Bar Codes may easily be Bar Codes may easily be duplicated and attached to duplicated and attached to products and are,

products and are, therefore, easily therefore, easily counterfeited. counterfeited.

(11)

Dynamic Updates

Dynamic Updates

 Tags may be written to

 Tags may be written to

and offer on board

and offer on board

memory to retain

memory to retain

information. This feature

information. This feature

may be used to store a

may be used to store a

product calibration

product calibration

history, preventive

history, preventive

maintenance, etc.

maintenance, etc.

Updates may be made

Updates may be made

within the blink of an eye

within the blink of an eye

and automatically

and automatically

without human

without human

intervention. Once a Bar

intervention. Once a Bar

Code is printed it

Code is printed it

remains frozen. The

remains frozen. The

Code and

Code and

Once a Bar Code is printed Once a Bar Code is printed it remains frozen. The it remains frozen. The Code and the process of  Code and the process of  attaching the BC is not attaching the BC is not supportive of real time supportive of real time updates. It is a labor updates. It is a labor intensive process to intensive process to

update any information on update any information on a BC once

a BC once printed.printed.

 Traceable

 Traceable

 The combination of UIC

 The combination of UIC

(unique identification

(unique identification

code), user data, serial

code), user data, serial

number and on-board

number and on-board

memory makes it

memory makes it

possible to track, recall,

possible to track, recall,

or document the life

or document the life

span of a single item. For

span of a single item. For

example, with livestock

example, with livestock

this means that the

this means that the

birthplace of the animal,

birthplace of the animal,

its vaccine history, feed

its vaccine history, feed

lots, slaughter house,

lots, slaughter house,

processor, etc may all be

processor, etc may all be

tracked. This kind of 

tracked. This kind of 

information supports a

information supports a

complete pedigree for an

complete pedigree for an

item attached to the Tag.

item attached to the Tag.

BC is limited to an entire BC is limited to an entire class of products and class of products and unable to drill down to a unable to drill down to a unique item. It is not unique item. It is not feasible to recall, track or feasible to recall, track or document a single item. document a single item.

S

Sccaannnniinngg RRFFIID D - - OOffffeerrs s a a rraanngge e ffrroomm inches to hundreds of feet inches to hundreds of feet and does not require line of  and does not require line of  sight. This means that

sight. This means that individual Tags placed individual Tags placed

within a carton, packed in a within a carton, packed in a box and stored on a pallet box and stored on a pallet may be read. You do not may be read. You do not have to open each box and have to open each box and present the individual item. present the individual item. BC - Offers a range over BC - Offers a range over inches and requires line of  inches and requires line of 

 The Bar Code must be  The Bar Code must be

presented to the scanner presented to the scanner in an orientation and in an orientation and distance that is very distance that is very

limited. Individual reading limited. Individual reading requires that each box on requires that each box on a pallet be opened and the a pallet be opened and the item pulled for

item pulled for presentation to the presentation to the scanner.

(12)

sight to read the code. sight to read the code.

Simultaneous Simultaneous Scanning Scanning

RFID - Standards have

RFID - Standards have

algorithms to support

algorithms to support

simultaneous reading of 

simultaneous reading of 

 Tags at one time.

 Tags at one time.

Limited to one bar code at Limited to one bar code at a time. Unable to

a time. Unable to supportsupport simultaneous reads.

simultaneous reads. Cost

Cost

High volume Tags are

High volume Tags are

currently 25 cents each

currently 25 cents each

with the potential to

with the potential to

continue to drop per the

continue to drop per the

experience curve. High

experience curve. High

volume bar codes are

volume bar codes are

less then a penny. In this

less then a penny. In this

scenario the labor

scenario the labor

savings from items like

savings from items like

physical counts, etc. give

physical counts, etc. give

RFID greater feasibility.

RFID greater feasibility.

 This is a clear

 This is a clear

advantage for BC unless

advantage for BC unless

you expand cost to be

you expand cost to be

fully loaded.

fully loaded.

R

Reeuussaabbllee YYeess

No

No

RFID System Components and

RFID System Components and

Applicatio

Applicatio

ns

ns

RFID Tags

RFID Tags

An RFID tag is the

An RFID tag is the most important link in any RFID system. It has most important link in any RFID system. It has the ability to storethe ability to store information relating to the specific item to which they are attached, rewrite again information relating to the specific item to which they are attached, rewrite again without any requirement for contact or line of sight. Data within a tag may provide without any requirement for contact or line of sight. Data within a tag may provide identification for an item, proof of ownership, original storage location, loan status identification for an item, proof of ownership, original storage location, loan status and history.

and history.

RFID Tag consists of an integrated circuit and an antenna combined to form a RFID Tag consists of an integrated circuit and an antenna combined to form a transponder. RFID tags collect the energy to operate from a Radio Frequency (RF) transponder. RFID tags collect the energy to operate from a Radio Frequency (RF) fie

field ld emiemittetted d by by a a reareader devicder device; e; thetherefrefore they ore they do do nonot t neneed ed a a batbattertery. y. WhWhenen energized by a radio signal from a fixed position reader or handheld scanner, the energized by a radio signal from a fixed position reader or handheld scanner, the

(13)

tag returns the stored information in order that the item to which it is attached can tag returns the stored information in order that the item to which it is attached can be easily located.

be easily located.

 The chip also has a "multi-read" function, which means that several tags can

 The chip also has a "multi-read" function, which means that several tags can

be read at once.

be read at once.

RFID tags have been

RFID tags have been specifically designed to be affixed into library media, includingspecifically designed to be affixed into library media, including books, CDs, DVDs and tapes.

books, CDs, DVDs and tapes.

It is thin,

It is thin, flexible and thus can be flexible and thus can be laminated between paper and plastic. With speciallaminated between paper and plastic. With special method to attach to books, patron is

method to attach to books, patron is totally unaware that the tag is totally unaware that the tag is there.there.

KEY BENEFITS:

KEY BENEFITS:

1.

1. No No linline oe of sf sighight nt needeededed 2.

2. AlloAllows to check-ows to check-out and checut and check-in severk-in several items sial items simultmultaneouaneouslysly 3.

3. InfoInformatrmation diion directrectly attly attacheached to pd to produroductct 4.

4. Performing Performing both idboth identification entification and anand antitheft in titheft in one sone single oingle operationperation 5.

5. DiffDifferent erent shapshape ane and sd sizes izes availavailableable 6.

6. AblAble to te to tag aag almolmost ast anytnythinhingg 7.

7. AcceAcceleralerate scte scannianning ang and ind identidentifyingfying

P

P

atron Self

atron Self

Check-in/Check-out:

Check-in/Check-out:

Phase Action:

Phase Action:

1.

1. Let patLet patron do thron do the checke check-out an-out and checd check-in prk-in procesocess of boos of books.ks.

Phase Target:

Phase Target:

1.

1. BenBenefiefit t to to LibLibrarrarianian:: 2.

2. SpeedSpeeds up s up book book checcheck-in k-in / ch/ check-oeck-outut 3.

3. Frees Frees stafstaff to f to bettebetter ser servicrvice pate patronsrons 4.

4. BetBetter ter spspace ace plaplanninningng 5.

5. BeBenenefifit to Pt to Patatroronsns:: 6.

6. Easy tEasy to use: bo use: books cooks can be rean be read in aad in any oriny orientaentationtion 7.

7. RedReduceuces s quequeuinuing g timtimee 8.

8. ProProvidvides es patpatroron pn privrivacyacy

Equipment & parts needed:

Equipment & parts needed:

1.

1. Self ChecSelf Check Station k Station - Perform - Perform patron spatron self check-out elf check-out and checand check-in procesk-in process ands and turn off or turn off

turn off or turn off the EAS status.the EAS status. 2.

2. Book-Drop - InBook-Drop - Indoor or Oudoor or Outdoor. After tdoor. After patron dropatron drop in the p in the book into tbook into this statiohis station,n, book’s id is checked and

book’s id is checked and turned on the EAS simultaneously.turned on the EAS simultaneously. 3.

3. RemoRemote Book-drte Book-drop - Long distaop - Long distance away fronce away from librarm library, Acquiy, Acquire betterre better protection of the Book-drop.

protection of the Book-drop. 4.

(14)

Smart and Quick Inventory:

Smart and Quick Inventory:

Phase Action:

Phase Action:

1.

1. Search anSearch and Inventord Inventory by reay by reading the ding the RFID usRFID using portaing portable reader ble reader and portand portableable computer.

computer.

Phase Target:

Phase Target:

1.

1. QuQuicick k ininveventntororyy 2.

2. LoLook up tok up the mihe mispsplaclace mate materierialal 3.

3. SeaSearcrch for ch for certertain ain matmaterierialal

Equipment & parts needed:

Equipment & parts needed:

1.

1. PoPortrtabable RFle RFID reID readaderer 2.

2. PortPortable able CompComputer uter - Not- Notebooebook PC k PC or PDor PDAA 3.

3. InvInvententorory & y & SeaSearcrchinhing softg softwarwaree

Circulation Counter

Circulation Counter

Counter Station is a staff assisted station on services such as loan, return, tagging, Counter Station is a staff assisted station on services such as loan, return, tagging, sorting and etc. It is loaded with arming/disarming module, tagging module and sorting and etc. It is loaded with arming/disarming module, tagging module and so

sortrtining g mmododulule. e. ArArmimingng/D/Disisararmiming ng momodudule le alallolows ws EAEAS S (E(Elelectctroroninic c ArArtiticlclee Sur

Surveiveillallancence) ) bit insibit inside de the tag the tag of of the librthe library materary material to ial to be be setset/re/reset so set so as as toto trigger/not trigger the alarm of the EAS gate. Checking of EAS status of library trigger/not trigger the alarm of the EAS gate. Checking of EAS status of library material is easy. The staff puts the item on the reader and click on the view to material is easy. The staff puts the item on the reader and click on the view to display the information stored inside the tag and status of EAS. There are also display the information stored inside the tag and status of EAS. There are also fe

feataturure e of of AuAuto to ArArmiming ng anand d AuAuto to DiDisasarmrm. . AuAuto to ArArm/m/DiDisasarm rm wiwill ll auautotomamatiticc arm/disar

arm/disarm library material that m library material that is within the is within the Reader range.Reader range.

 Together with circulation module from Library Automation Software, this station is  Together with circulation module from Library Automation Software, this station is

used for the following services: used for the following services:

1.

1. EditEditing aing and upnd updatindating of pg of patroatron’s rn’s recorecordd 2.

2. Add Add and dand deletieleting of ng of patrpatron’s on’s recorecordrd 3.

3. GenerGenerate loate loan hisan history ftory for a paor a particrticular pular patroatronsns 4.

4. ManaManaging oging of finf fines ines incurcurred by red by the pathe patrontron 5.

5. ArmArm/Disa/Disarm of EArm of EAS bit insS bit inside the lide the libraibrary matery materialrial 6.

6. ProProgragram of new lim of new librabrary mary materterialial 7.

(15)

 The features of this station depend on the module loaded by

 The features of this station depend on the module loaded by the Library

the Library

Automation Software.

Automation Software.

KEY BENEFITS:

KEY BENEFITS:

1.

1. ProvProvide Value Adide Value Added Custded Customer Seromer Service insvice instead of mantead of manual dailual daily routiny routinee 2.

2. Perform mPerform media checedia check-in/-out for k-in/-out for those pathose patrons whtrons who choose o choose not to not to use the use the self self  service system

service system 3.

3. Help pHelp patroatron that nn that need aseed assistsistance france from thom the stafe staff f 

Patron Self Check-out Station

Patron Self Check-out Station

 The Patron Self Check-out station is basically a computer with a touch screen and a  The Patron Self Check-out station is basically a computer with a touch screen and a

built-in RFID reader, plus

built-in RFID reader, plus special software for personal identification, book and special software for personal identification, book and otherother media handling and circulation. After identifying the patron with a library ID card, a media handling and circulation. After identifying the patron with a library ID card, a barcode card, or his personal ID number (PIN), the patron is asked to choose the barcode card, or his personal ID number (PIN), the patron is asked to choose the next action (check-out of one or several books). After choosing check-out , the next action (check-out of one or several books). After choosing check-out , the patron puts the book(s) in front of the screen on the RFID reader and

patron puts the book(s) in front of the screen on the RFID reader and the display willthe display will show the book title and its ID number (other optional information can be shown if  show the book title and its ID number (other optional information can be shown if  desired) which have been checked out.

desired) which have been checked out.

 The patron then confirms that he has finished the check-out  The patron then confirms that he has finished the check-out process and a receipt is printed, showing which books have process and a receipt is printed, showing which books have been borrowed and the return date. The RFID tag in the book been borrowed and the return date. The RFID tag in the book is set on quiet as a result no alarm will go off at the EAS is set on quiet as a result no alarm will go off at the EAS gates.

gates.

It is also possible to use the station for Check-In (return) of  It is also possible to use the station for Check-In (return) of 

books. In this case the patron identifies herself, chooses return and then puts one books. In this case the patron identifies herself, chooses return and then puts one book or a stack of books onto the reader. She will receive a receipt. If the books book or a stack of books onto the reader. She will receive a receipt. If the books were to be

were to be taken through the gate now, an taken through the gate now, an alarm would sound.alarm would sound.

One important point for

One important point for library productivity is that the library productivity is that the whole process is significantlywhole process is significantly less time consuming than with barcode and magnetic strip system; therefore long less time consuming than with barcode and magnetic strip system; therefore long lines are avoided and fewer stations are needed for

lines are avoided and fewer stations are needed for the same process.the same process.

KEY BENEFITS:

KEY BENEFITS:

 To

(16)

1.

1. SpeedSpeeds up s up book book checcheck-in k-in / ch/ check-oeck-outut 2.

2. Frees Frees stafstaff to f to bettebetter ser servicrvice pate patronsrons 3.

3. BetBetter ter spspace ace plaplanninningng 4.

4. IncIncreareases mses mememberbershiship ratp ratee  To Patrons:

 To Patrons: 1.

1. Easy tEasy to use: bo use: books cooks can be rean be read in aad in any oriny orientaentationtion 2.

2. RedReduceuces s quequeuinuing g timtimee 3.

3. ProProvidvides es patpatroron pn privrivacyacy 4.

4. EncoEncouragurages pes patroatrons ns to to comcome bae backck

Book Drop Box

Book Drop Box

 The Book Drops can be located anywhere, within or outside the library. Possible  The Book Drops can be located anywhere, within or outside the library. Possible remote locations outside the library include MRT/train stations, shopping centers, remote locations outside the library include MRT/train stations, shopping centers, scho

schools, ols, etc. etc. This offers This offers unprunprecedeecedented nted flexflexibiliibility ty and and convconvenienenience ce of of returreturningning library items at anytime of the

library items at anytime of the day, even when the day, even when the library is closed.library is closed.

Patr

Patron on inseinserts the rts the librlibrary item ary item into the into the slotslot. . The reader capturThe reader captures es the electrothe electronicnic si

signgnataturure e anand d sesendnds s to to babackckenend d sysyststem em fofor r loloan an cacancncelellalatitionon. . PaPatrtron on isis ac

acknknowowleledgdged ed by by bebeepepining g sosounund d anand d flflasashlhligightht. . PaPatrtronon’s ’s rerecocord rd is is upupdadatetedd immediately. This is possible due to the seamless link between RFID Management immediately. This is possible due to the seamless link between RFID Management System and the host computer system. As such, users who have reached their loan System and the host computer system. As such, users who have reached their loan quota can start borrowing items once they have returned them through the Book quota can start borrowing items once they have returned them through the Book Drop.

Drop.

KEY BENEFITS:

KEY BENEFITS:

1.

1. The abThe abilitility to rety to return burn books dooks durinuring off hg off hoursours.. 2.

2. Loans foLoans for the r the returned ireturned items witems will be ill be instantaneousnstantaneously cancellely cancelled so td so that patrohat patronn may immediately borrow again.

may immediately borrow again. 3.

3. Librarians Librarians are able are able to allocto allocate more ate more time to time to customer customer service, aservice, as they s they areare free from the

free from the labor-intensivlabor-intensive loan e loan cancellation activity associated with bar-cancellation activity associated with bar-code system.

code system. 4.

4. DispDisplay the lay the returreturn statn status and pus and printrinting reing receipceipt.t. 5.

5. The desigThe design of n of the Book the Book Drops is Drops is such thasuch that items t items cannot be cannot be retrieved retrieved backback once deposited.

once deposited.

OPTIONS:

OPTIONS:

1.

1. AccAccept ept spspeciecial al desdesignign 2.

(17)

Shelf Management

Shelf Management

Shelf Management Solution makes locating and identifying items on the shelves an Shelf Management Solution makes locating and identifying items on the shelves an easy task for librarians. It comprises basically of a

easy task for librarians. It comprises basically of a portable scanner and a base station.

portable scanner and a base station.

 The solution is designed to cover three main

 The solution is designed to cover three main

requirements:

requirements:

1.

1. SearSearch foch for inr individdividual bual books ooks requrequestedested 2.

2. InvenInventory tory checcheck of thk of the whoe whole lible library rary stocstockk 3.

3. SearSearch foch for bor books woks which hich are are missmiss-helv-helveded Al

All l ththesese e fufuncnctitionons s arare e peperfrforormemed d by by swsweepeepining g ththee

portable scanner across the spines of the books on the shelves to gather their portable scanner across the spines of the books on the shelves to gather their identities. In an inventory check situation, the identities collected are compared identities. In an inventory check situation, the identities collected are compared with the database and a

with the database and a discrepancdiscrepancy report could be y report could be generated.generated.

In situations when search function is required, whether for a particular item or an In situations when search function is required, whether for a particular item or an item category, the information is first entered into the portable scanner from the item category, the information is first entered into the portable scanner from the base station, and when a foreign item is found on the shelves, a built-in beeper base station, and when a foreign item is found on the shelves, a built-in beeper sound to alert the librarians.

sound to alert the librarians.

KEY BENEFITS:

KEY BENEFITS:

1.

1. ChaChangenges ins invenventortory proy procescess:s: 2.

2. No more No more book hanbook handling: jusdling: just pass t pass the reader the reader across sacross shelved boohelved books to pks to performerform an instant inventory.

an instant inventory. 3.

3. AccuAccuracy: booracy: book identifk identificatication numbion numbers are regers are registeistered in the Shelred in the Shelf- f-Management Reader. The data is then downloaded to the

Management Reader. The data is then downloaded to the central database.central database. 4.

4. The fasThe fastest intest inventoventory you hary you have ever mve ever made: 20 boade: 20 books per soks per seconecond.d. 5.

5. NotiNotificatfication: booion: books to be pullks to be pulled are up-led are up-loadeoaded to the readed to the reader for quir for quickck identification.

identification. 6.

6. UsUser fer fririenenddlyly:: 7.

7. LiLighght t weweigightht 8.

8. Wand aWand allowllows easy rs easy readieading of hing of high and gh and low slow shelvehelvess 9.

9. SavSaves tes timime ane and red resosourcurces:es:

10.Implementers indicate a 75% reduction in human resources required for shelf  10.Implementers indicate a 75% reduction in human resources required for shelf 

management activities. management activities.

EAS Gates

(18)

RFID EAS Gate is the anti-theft part of the RFID Library Management System using RFID EAS Gate is the anti-theft part of the RFID Library Management System using the same RFID tags embedded in the library items. Each lane is able to track items the same RFID tags embedded in the library items. Each lane is able to track items of 1 meter or more and would trigger the alarm system when an un-borrowed item of 1 meter or more and would trigger the alarm system when an un-borrowed item passed through them. The alarm will sound and lights on the gate will flash as passed through them. The alarm will sound and lights on the gate will flash as patron passes through with the

patron passes through with the library material.library material.

  Th

  The e EAEAS S AntAnti-Ti-Thefheft t GatGate e is used to is used to detdetect RFID ect RFID tag that is tag that is equequippipped ed witwith h EASEAS (Electronic Article Surveillance). It can detect the RFID tags within 1 meter range (Electronic Article Surveillance). It can detect the RFID tags within 1 meter range without interference of magnetic items, Upon detecting of Armed RFID tags, the without interference of magnetic items, Upon detecting of Armed RFID tags, the alarm will sound on the gate. It has option to trigger a Camera to record patrons alarm will sound on the gate. It has option to trigger a Camera to record patrons who trigger the alarm to the

who trigger the alarm to the Surveillance Station.Surveillance Station.

 Theft detection is an integral feature of the chip within the tag. It is a stand-alone  Theft detection is an integral feature of the chip within the tag. It is a stand-alone

technology, which operates independently of the library

technology, which operates independently of the library database.database.

FEATURES:

FEATURES:

1.

1. DetDetect ect EAS EAS ArmArmed Red RFID FID tagtagss 2.

2. MulMultiti-it-item em detdetectectionion 3.

3. Able tAble to inteo integratgrate camee camera witra with the gh the gate (Opate (Optiontion)) 4.

4. Gale to inGale to integrategrate with Ste with Surveurveillanillance Statce Station (Opion (Option)tion)

KEY BENEFITS:

KEY BENEFITS:

1.

1. Single tecSingle technology is hnology is required frequired for both or both inventory inventory and theft and theft management management of theof the library.

library. 2.

2. Library Library staff staff are alerare alerted immted immediately ediately when uwhen un-borrowed n-borrowed items items passespasses through the theft detection gates.

through the theft detection gates. 3.

3. WoulWould-be thid-be thieves are deeves are deterrterred by the physed by the physical prical presencesence of the gatese of the gates.. 4.

4. Number oNumber of patronf patrons passis passing througng through the gh the gantry is antry is captured bcaptured by a cy a counter onounter on the gates Alarm volume can be

the gates Alarm volume can be easily controlled.easily controlled.

Library Security System Only:

Library Security System Only:

Phase Action:

Phase Action:

1.

1. UsinUsing RFIg RFID Tag D Tag replareplace EM Sce EM Securecurity Strity Stripeipe

Phase Target:

Phase Target:

1.

1. RadRadio Fio Freqrequenuency Dcy Deteetectictionon 2.

2. ReplaReplace the EM Antce the EM Anti-thei-theft systft system to avoid them to avoid the high vole high volume EM fieume EM field harmld harm human body and without False Alarm.

human body and without False Alarm.

Equipment & parts needed:

Equipment & parts needed:

(19)

1.

1. Anti-Anti-theftheft Detectt Detection Gate - Detion Gate - Detect the RFIect the RFID Tag on Book and ChD Tag on Book and Check EASeck EAS Status, System alarm when the EAS status is ON.

Status, System alarm when the EAS status is ON. 2.

2. SecurSecurity Proity Processcessing Stating Station - Turn On or Ofion - Turn On or Off the EAS Settf the EAS Setting of the Ching of the Chipip 3

3.. RRFFIID TD Taaggss

Support Library Circulation:

Support Library Circulation:

Phase Action:

Phase Action:

1.

1. Using RUsing RFID tags FID tags replace threplace the barcoe barcode in Cide in Circulation rculation process. process. Reading boReading book’sok’s access number from RFID than from barcode to borrow and return the book. access number from RFID than from barcode to borrow and return the book.

Phase Target:

Phase Target:

1.

1. No No linline oe of sf sighight nt needeededed 2.

2. AlloAllows to check-ows to check-out and checut and check-in severk-in several items sial items simultmultaneouaneouslysly 3.

3. Performing Performing both idboth identification entification and anand antitheft in titheft in one sone single oingle operationperation

Equipment & parts needed:

Equipment & parts needed:

1.

1. CoCoununteter r StStatatioionn 2.

2. New IntegrNew Integrated Librated Library System ary System functions functions - read - read from Rfrom RFID and FID and set the set the EASEAS status.

status.

RFID Process RFID Process

Perhaps the most difficult and disliked function in libraries is inventory control and Perhaps the most difficult and disliked function in libraries is inventory control and shelf managem

shelf management. ent. This functioThis function becomes extremely simpn becomes extremely simple with RFID technologyle with RFID technology and associated software from the ILS system.

(20)

 The components necessar

 The components necessary for inventory management consist of a y for inventory management consist of a Reader and aReader and a Wand with an IPAQ (hand

Wand with an IPAQ (hand-held personal dig-held personal digital assistant) at the end. ital assistant) at the end. The ReaderThe Reader weighs only 607 grams (0.6 kgs) and the

weighs only 607 grams (0.6 kgs) and the Wand 435 grams (0.4 kg), making theWand 435 grams (0.4 kg), making the weight of the entire unit ap

weight of the entire unit approximately one kilogproximately one kilogram. ram. A shelf can be inventorieA shelf can be inventoried ind in a matter of a few minutes as th

a matter of a few minutes as the units can read up to 20 tags a secone units can read up to 20 tags a second. d. The systemThe system allows for two different

allows for two different methods for taking inventory.methods for taking inventory.

  The f

  The first mirst methoethod for tad for taking inking inventventory is tory is to run tho run the Wand e Wand acroacross the sss the shelf. helf. ThisThis process captures the RFID data to the

process captures the RFID data to the IPAQ unit, which can store data IPAQ unit, which can store data for more thanfor more than 6 million boo

6 million books. ks. This data is uploaThis data is uploaded, throded, through wired or wireleugh wired or wireless conness connectioctions, tons, to the ILS system, where the software program performs the inventory management the ILS system, where the software program performs the inventory management functions.

functions.

 The second method involves a pre-processing step where data is downloaded from  The second method involves a pre-processing step where data is downloaded from

the ILS syst

the ILS system to the Reader. em to the Reader. This method is This method is more effective wmore effective when there is a nhen there is a needeed to search for spec

to search for specific books or to identify mific books or to identify miss-shelved or misiss-shelved or missing books. sing books. The unitThe unit comes with an audible alarm to provide appropriate feedback to the

comes with an audible alarm to provide appropriate feedback to the user.user.

All in all, this technology converts the otherwise tedious task of

All in all, this technology converts the otherwise tedious task of managing inventormanaging inventoryy to a

to a convenient technique for helping libraries gain control over convenient technique for helping libraries gain control over their collections.their collections.

Specificat

Specificat

ions for

ions for

RFID-based Library Management System

RFID-based Library Management System

 The RFID Tags

 The RFID Tags provided have following specifications:provided have following specifications:

•  The RFID chip  The RFID chip have the have the following characterfollowing characteristics:istics: •

• Frequency Support: 13.56 MHzFrequency Support: 13.56 MHz •

• Standard: ISO 15693 compliantStandard: ISO 15693 compliant •

•  Type: iCode2 compliant Type: iCode2 compliant •

• Memory Capacity: 1024 bitsMemory Capacity: 1024 bits •

(21)

• Data retention: >10 years for Data retention: >10 years for each writeeach write •

• Anti-collision for Multi readAnti-collision for Multi read •

• Anti-theft security bitAnti-theft security bit

• ReadRead//WriteWrite capability with data locking optioncapability with data locking option

• Size of square tag (for Size of square tag (for books): 50mm x 50mmbooks): 50mm x 50mm •

• Size of rectangle tag (for Size of rectangle tag (for Tapes): 150mm x 15mmTapes): 150mm x 15mm •

• Size of square tag (fSize of square tag (for CD/DVD): or CD/DVD): Diameter 40Diameter 40mmmm

The membership cards have

The membership cards have

the following characteristics:

the following characteristics:

• Operating Frequency: 13.56 MHzOperating Frequency: 13.56 MHz •

• Standard: ISO 15693-Vicinity CardsStandard: ISO 15693-Vicinity Cards •

• Memory (User Programmable): 2K bitsMemory (User Programmable): 2K bits •

• Organized into 64x32 bit blocksOrganized into 64x32 bit blocks •

•  Typical Programmin Typical Programming cycles (at 25 g cycles (at 25 C): 100,000C): 100,000 •

• Simultaneous IdentificSimultaneous Identification of Tags: ation of Tags: Upto 50Upto 50 •

• tags per Second (Reader/Antenntags per Second (Reader/Antenna dependent)a dependent) •

• Data Retention time (at 25C): > 10 YearsData Retention time (at 25C): > 10 Years •

• Case Material: PVC (Polyvinyl Chloride), WhiteCase Material: PVC (Polyvinyl Chloride), White •

• Surface Finish: GlossySurface Finish: Glossy •

• Dimensions: 85.6 (L) x 54 Dimensions: 85.6 (L) x 54 (W) x 0.76(W) x 0.76 •

• (Thickness) mm (ISO 7810)(Thickness) mm (ISO 7810) •

• Weight: 5 gmsWeight: 5 gms •

• Printability: Thermal transfer (Dye Sublimation preferred), Silk screen TampPrintability: Thermal transfer (Dye Sublimation preferred), Silk screen Tamp

on (Pad on) on (Pad on)

It consist of -

It consist of - RFID Reader and Antenna with multiple Read/Write facilityRFID Reader and Antenna with multiple Read/Write facility

• Barcode ReaderBarcode Reader •

• High Speed slip printerHigh Speed slip printer •

(22)

Hardware

Hardware

Above system requires CPU with

Above system requires CPU with following minimum specsfollowing minimum specs

• Processor: Intel Pentium 4 (2.4 GHz)Processor: Intel Pentium 4 (2.4 GHz) •

• Hard disk: 40 GB or higherHard disk: 40 GB or higher •

• Memory: 256 MB DDR RAMMemory: 256 MB DDR RAM •

• Display: 15” TFT LCD MonitorDisplay: 15” TFT LCD Monitor •

• Network: motherboard with built inNetwork: motherboard with built in •

• Audio/Video/Ethernet 100 Audio/Video/Ethernet 100 MbpsMbps •

• Drive: DVD Combo driveDrive: DVD Combo drive

o

o RFID Antenna and ReaderRFID Antenna and Reader o

o Barcode ReaderBarcode Reader o

o  Thermal Slip Printer Thermal Slip Printer

Specificat

Specificat

ions for RFID Reader and

ions for RFID Reader and

antenna with multiple read

antenna with multiple read

/write facility

/write facility

Firmware protocol: The firmware should be ISO 15693 compliant and should be Firmware protocol: The firmware should be ISO 15693 compliant and should be upgradeable to comply with future ISO 18000 RFID chips

upgradeable to comply with future ISO 18000 RFID chips

• Antenna: Capability to multiple readAntenna: Capability to multiple read •

• Operating frequency: 13.56 MHzOperating frequency: 13.56 MHz •

• Chip compatibility: ICode2 and ISO 15693 chipsChip compatibility: ICode2 and ISO 15693 chips •

• Accompanied with the Accompanied with the necessary software Communication interface: serialnecessary software Communication interface: serial

RS232 RS232

Application software:

Application software:

• Windows 2000 Professional or higherWindows 2000 Professional or higher •

• Borrowing software (based on SIP2)Borrowing software (based on SIP2) •

• Arm/Disarm softwarArm/Disarm software for e for EAS security bitEAS security bit •

(23)

• Reading distance: 0 – Reading distance: 0 – 25 cm25 cm •

• Language: Multi-lingual support using UnicodeLanguage: Multi-lingual support using Unicode •

• Membership card type support: Barcode, Magnetic, Membership card type support: Barcode, Magnetic, Smart card, RFID cardSmart card, RFID card

multiple item loan: should be configurable from 1 to X multiple item loan: should be configurable from 1 to X nos.nos.

The Multi-purpose Counter Station have

The Multi-purpose Counter Station have

the following specifications.

the following specifications.

It

It coconsnsisists ts of of RFRFID ID CoCoununteter r StStatatioion n fofor r ReReadad/W/Wririte te OnOne e ititem em at at a a titime me wiwithth specifications as below:

specifications as below:

• Read/Write /Antitheft programminRead/Write /Antitheft programming should be g should be done in one done in one single operation.single operation. •

•  The programming station should be interfaced with  The programming station should be interfaced with the Library Managementthe Library Management

Software. Software.

• Programming time should be 1 second or lessProgramming time should be 1 second or less •

• Must be able to read ISO 15693 compliant tagsMust be able to read ISO 15693 compliant tags •

• SIP2 client software should be providedSIP2 client software should be provided

Hardware required

Hardware required

• CPU with following minimum specsCPU with following minimum specs •

• Processor: Intel Pentium 4 (2.4 GHz)Processor: Intel Pentium 4 (2.4 GHz) •

• Memory: 256 MB DDR RAMMemory: 256 MB DDR RAM •

• Hard disk: 40GB or higherHard disk: 40GB or higher •

• Drive: DVD Combo driveDrive: DVD Combo drive •

• Display: 15” Color MonitorDisplay: 15” Color Monitor

o

o RFID Antenna and ReaderRFID Antenna and Reader o

o Barcode ReaderBarcode Reader o

o  Thermal Slip Printer Thermal Slip Printer

Application software

(24)

• MS Windows 2000 Professional or MS Windows 2000 Professional or higherhigher •

• RFID RFID Tagging/ProgTagging/Programming softwareramming software •

• Borrowing software (based on SIP2)Borrowing software (based on SIP2) •

• Returning software (based on SIP2)Returning software (based on SIP2) •

• Arm/Disarm softwarArm/Disarm software for e for EAS security bitEAS security bit •

• Frequency Support: 13.56 MHzFrequency Support: 13.56 MHz •

• Reading distance: 0 – Reading distance: 0 – 25 cm25 cm •

• Language: Multi-lingual support using UnicodeLanguage: Multi-lingual support using Unicode •

• Membership card type support: Barcode,Membership card type support: Barcode, •

• Magnetic, Smart card, RFID cardMagnetic, Smart card, RFID card •

• Multiple item loans: should be configurable from 1 to X Multiple item loans: should be configurable from 1 to X nos.nos.

The Single-lane EAS Security Gantry have the

The Single-lane EAS Security Gantry have the

following

following

specifications.

specifications.

Library EAS Security Gantry Arrangement with Provision for

Library EAS Security Gantry Arrangement with Provision for CameraCamera

 The single-lane gantry should consist of

 The single-lane gantry should consist of Two Pedestals: Each pedestal is Two Pedestals: Each pedestal is standalonestandalone and plug and play to the main power

and plug and play to the main power

Standalone: The Security Gates need not be linked to the library database, and Standalone: The Security Gates need not be linked to the library database, and should still operate even when

should still operate even when the Integrated Library Management Software Systemthe Integrated Library Management Software System is down or under maintenance.

is down or under maintenance.

• Frequency Support: 13.56 MHzFrequency Support: 13.56 MHz

o

o Controllable Volume for AlarmControllable Volume for Alarm o

o Strobe lightStrobe light o

o Alarm CountAlarm Count o

o Patron Traffic CounterPatron Traffic Counter

• Options for: Integrating with security camera Options for: Integrating with security camera Integrating with Access ControlIntegrating with Access Control

System System

Shelf Inventory Management System

(25)

  Th

  This is conconsissists ts of of HanHandhedheld ld RFRFID ID reareader der aloalong ng witwith h necnecessessary ary cocommmmuniunicatcationion software as per specs below:

software as per specs below:

• Operating frequency: 13.56 MHzOperating frequency: 13.56 MHz •

• Chip Compliance: ISO 15693 SIP2 client softwareChip Compliance: ISO 15693 SIP2 client software

o

o RFID Handheld AntennaRFID Handheld Antenna o

o RFID Portable ReaderRFID Portable Reader o

o iPAQ Pocket PC 64 MB RAM Model 5500 or latest model along withiPAQ Pocket PC 64 MB RAM Model 5500 or latest model along with necessary application software compatible for use with the handheld necessary application software compatible for use with the handheld reader

reader

Carry case for the entire

Carry case for the entire Shelf Management SystemShelf Management System

 The Shelf Management System supports following functions:  The Shelf Management System supports following functions:

• Item search (single/mulItem search (single/multiple)tiple) •

• Stock verificationStock verification •

• Arm/disarm itemsArm/disarm items •

• Locate misplaced itemsLocate misplaced items

 The system provides web-based reports for

 The system provides web-based reports for the following purposes:the following purposes:

• Stock taking reportStock taking report •

• Missing items reportMissing items report •

(26)

Deliverables

Deliverables

N N o o P

Paarrttiiccuullaarrss QQuuaannttiittyy 1. 1. 2. 2. 3. 3. 4. 4. 5. 5. 6. 6.

(27)

• •

Commercial Proposal

Commercial Proposal

For

For

Library Management Software

Library Management Software

For

For

(Client)

(Client)

References

Related documents

We found that all students supported by scaffolds acquired more metacognitive knowledge to regulate future learning, and that triads in the problematizing condition also improved

Then to establish the network swerve table and set the time of vehicle turning, create resource center table and set those nodes of existed fire stations locations as centers,

Taking into account that AhR expression promotes differentiation in different cell types ( Esser and Rannug, 2015; Mulero-Navarro and Fernandez-Salguero, 2016 ), and

In terms of the Keynesian growth model s > r , saving exceeds planned investment.. The situation can be

The following diagnostic procedures were compared for sensitivity and specificity with cytology alone: TRAP assay alone; cytology and TRAP assay in parallel, with

But in an ever-lasting economy, the migrants, by supplying work and helping the fi nancing the pension bene fi t of period zero to native born retirees, are a boon to the the

Whilst a full discussion of the nature of the state and role of local authorities were beyond the scope of this research, local authorities currently had a statutory duty to

A model is proposed whereby a high level of interpersonal schizotypal traits relate to a lower quality of life (QOL), such as a poor ability to engage in personal relationships or