RFID library management system solution
[ad_1]
1. Overview of the RFID library project
1.1 Introduction to RFID Library Project
RFID (Radio Frequency Identification System) is a “radio frequency identification system”, a non-contact automatic identification technology, which uses radio waves to identify the mark on the target to perform wireless data identification and obtain related information.
The library RFID system is the application of RFID technology to the management of the library to help the library realize the functions of rapid borrowing, rapid return, rapid inventory data inventory, automatic book shelf arrangement, shelf reversal, and security and anti-theft.
1.2 The role of RFID libraries
For many years, the management and staff of the library have been plagued by problems such as book borrowing and returning, quick inventory, searching, and sorting out books in disorder. Relying on strong RFID technical strength, Chuangyi Technology has formed a series of library supporting equipment after years of research and development efforts, which greatly improves management methods, increases work efficiency, reduces the labor intensity of management personnel, and provides a complete solution for the library application field plan.
Build an RFID library. The RFID system is used to identify, track, and protect all library materials, and realize the intelligentization of book borrowing and returning, ordering, searching, and inventory inventory. The purpose is to greatly improve the efficiency of library materials processing.
Through the connection of Beijing Chuangyi RFID radio frequency technology and the existing library automation system, the self-service system can be smoothly and smoothly connected to it, to realize the automation of the management of books and materials, speed up the inventory of books, and increase the circulation rate of books, which is more effective Give full play to the information transmission function of books and materials.
The construction of the library’s RFID system will simplify the reader’s borrowing process, improve circulation efficiency, greatly reduce the workload of book inventory and search, and liberate library staff from the complicated and repetitive work, which is more effective and targeted. Provide personalized services for readers and improve the quality of library services.
1.3 RFID library system content and structure
The construction content of this project mainly includes two aspects: the installation and commissioning of Chuangyi RFID system equipment and the planning and implementation of RFID system supporting software. These two aspects are combined with each other, guaranteed by a scientific and reasonable management mechanism, and building a world-leading level The RFID library application system strives to build a modern library with rich digital resources, advanced management, diverse service types, innovative service methods, convenient use by readers, safe and reliable systems, and strong scalability.
The library RFID system is composed of RFID hardware, computer integrated equipment, and software. The RFID hardware is connected to the computer integrated equipment through a standard serial port or USB interface to form the terminal of the library RFID system. The RFID system terminal is connected to the library management system service center through the terminal software. Connection, its physical connection is network connection or data copy exchange. The connection between the terminal software and the library management system service center complies with the relevant protocols in the library industry and computer network protocols.
1.4 Configuration of RFID library
This program selects the internationally renowned Chuangyi RFID tag, and provides a complete set of hardware solutions around the RFID tag: RFID librarian workstation, RFID tag conversion station, fast loan and return system equipment, RFID handheld checker, security door system equipment ( RFID).
1.5 RFID library design principles
Openness
All products of Chuangyi shall have open standard interfaces, APIs or communication protocols, and the system structure, resource construction and service design shall adhere to the principle of openness.
Standard
The various technologies of the system follow international standards, national standards, industry and related regulations.
scientific
The adjustment and design of various performance indicators adhere to the principles of scientificity and operability.
reliability
System construction strives to adopt advanced and reliable network technologies, application platforms and development tools to enable network systems, software and hardware systems to have a long life cycle, and to ensure the high performance and stability of the system.
safety
The system design fully considers various security risks to ensure the safe operation of the library.
1.6 Innovations Brought by RFID System
Simplify the process of borrowing and returning books
Although the existing book borrowing and returning process introduces a barcode scanning system, it still needs to manually open the book’s title page and find the position of the barcode before scanning the barcode. Such an operation process is relatively cumbersome, and the efficiency of borrowing and returning books is low. At the same time, the barcode is easy to break, and it often happens that the barcode cannot be read and the barcode needs to be replaced. This will not only affect the efficiency of borrowing and returning books, but also affect the reader’s satisfaction with the library. Therefore, it is urgent to introduce advanced reading and writing technology to realize the intelligent book borrowing and returning process, improving the security of information storage, the reliability of information reading and writing, and the speed and speed of borrowing and returning books.
Reduce the workload of inventory and search
Relying on manual book inventory work, the workload is large and the efficiency is low. Administrators have to classify, place and record books based on their own memory, which is time-consuming and difficult to achieve. It is necessary to introduce advanced technology to realize the intelligentization of book inventory.
Improve the security of the anti-theft system
The accuracy of the existing library magnetic stripe anti-theft system is low, and the magnetic stripe is easily weakened, so the probability of false alarms and false alarms is high. Therefore, it is necessary to improve the existing book anti-theft system and adopt more reliable anti-theft technology.
Change the disconnection between borrowing management and security and anti-theft
The library anti-theft system is still an isolated system. Books must be magnetized before being returned and put on shelves, and demagnetized when they are loaned out. The workload is heavy, which directly affects the efficiency of book circulation and management. It is impossible to record the information of the stolen books while discovering the theft, which has a great impact on the daily inventory and replenishment of books. Therefore, it is necessary to improve the existing management system, link the anti-theft system with the book circulation management system, and record the historical record of each book in and out of the library, so that it can be matched with the historical record of borrowing and returning books.
Improve the satisfaction of library staff
Due to the repetitive work of the library staff over the years and the heavy work of the library itself, it is easy for the library staff to have certain negative thoughts about the work of the library; due to the flaws in the management, the library management The readers are also very troubled, and the readers are also dissatisfied with the library, resulting in a decrease in the satisfaction of library staff with the work of the library. Through the technical transformation of the library management system, technical means can be used to make up for the shortcomings in management, and at the same time liberate the staff from the heavy daily work of the library.
Improve readers’ satisfaction with borrowing and returning books
Readers often feel dissatisfied with the library. The main reasons are as follows:
1) The efficiency of borrowing and returning books is low, the waiting time in line is too long, and the unnecessary waste of time leads to dissatisfaction of readers;
2) The bar code of the borrowed and returned book cannot be read, which increases the waiting time of the reader and causes the reader to be dissatisfied;
3) Since the library does not have an effective means to inventory books, readers found a certain book in the collection through the query system, but it took a long time to find it. The reason may be that the book was stolen, but because of management The system does not have accurate records, and as a result, readers are dissatisfied with the library;
Through the above analysis, it can be concluded that many problems in current library management and many inconveniences for readers in borrowing and returning books are caused by the defects of the barcode technology currently used. If RFID is used, many functions that cannot be achieved by barcode technology can be realized, thereby improving the function and system reliability of the library’s management system.
2. RFID system solution
2.1 Equipment list
2.2 Overall design
This solution is based on the advanced and complete RFID system architecture, and makes full use of the readable and writable, high reliability, high storage capacity, and customizable characteristics of RFID technology. It satisfies the actual needs of customers and guarantees the existing infrastructure. , Taking full account of the scalability and openness of the system, using RFID book electronic tags as the information carrier and RFID system middleware as the bridge, the organic integration of the RFID system and the library management system is realized, which simplifies the book management process and improves Improve the efficiency of book management, and provide readers with more humane and convenient book borrowing and returning services.
In the system architecture, we propose a complete RFID system level, including the RFID device layer, middleware and management application layer. Among them, the RFID device layer is the level where the RFID information collection is realized, and the reading and writing operations of the electronic tags of the books are completed at this layer; middleware is the link between the RFID system and other management systems, and the middleware shields the application layer software interface, data, etc. Difference; the management application layer is related to the specific operation process and business.
2.3 System structure
The library RFID system is composed of RFID hardware, computer integrated equipment, and software. The RFID hardware is connected to the computer integrated equipment through a standard serial port or USB interface to form the terminal of the library RFID system. The RFID system terminal is connected to the library management system service center through the terminal software. Connection, its physical connection is network connection or data copy exchange. The connection between the terminal software and the library management system service center complies with the relevant protocols in the library industry and computer network protocols.
2.4 Interface standards and protocols
The RFID system is an integral part of the library. It is a new generation of intelligent library management system attached to the library management system. Therefore, the system must be connected with the library’s business system to exchange data.
Currently, the attached communication protocols and standards are
1) TCP/IP protocol
TCP/IP (abbreviation for Transmission Control Protocol/Internet Protocol, Chinese translated as Transmission Control Protocol/Internet Protocol) protocol is the most basic protocol of the Internet, TCP/IP is a combination of two network basic protocols: IP protocol and TCP protocol name . The development of the TCP/IP protocol began in the 1970s. It is an important protocol for network interconnection, including:
Internet Protocol IP: A common communication protocol that makes the Internet a network that allows the connection of different types of computers and different operating systems. To enable two computers to communicate with each other, the two computers must use the same “language”. The communication protocol is just like the common language used by two computers to exchange information. It stipulates the agreement that the two parties should abide by in the communication.
Transmission Control Protocol TCP: Although the computer can ensure that data can be sent and received between computers by installing IP software, the IP protocol cannot solve the problems that may occur during the transmission of data packets. Therefore, in order to solve the possible problems, the computer connected to the Internet also needs to install the TCP protocol to provide reliable and error-free communication services.
2.5 RFID application software system design
The application software platform of the RFID system is the basic software platform for the operation of the entire RFID system. Through this platform, various RFID application hardware devices are assembled into a unified whole and perform corresponding functions.
2.5.1 Application Software Architecture
RFID system software can be divided into hardware layer, hardware access layer, hardware application layer, data layer, data access layer, business layer, user layer, etc. according to the software architecture:
1) Hardware layer: various basic equipment units that make up RFID equipment hardware, RFID tags, printers, etc.
2) Hardware access layer: software support platform and controls used to access various hardware devices.
3) Hardware application layer: This layer integrates a variety of hardware structures to form a combination of logic units of various RFIDs.
4) Data access layer: system software that connects business applications and basic data platforms in software mode.
5) Business application layer: the software system unit that completes a specific task of the library.
6) User layer: Show the software to users through a variety of logical combinations.
Such a design framework comprehensively considers library business needs and changes in IT technology development, adopts a modular approach, decomposes user needs into business function modules, organizes through software applications and hardware applications, and builds equipment and systems that meet user needs , Complete the design function. feature is:
Modular design, through abstract physical device interface, associating user needs and hardware devices, combining hardware and software resources according to business logic, the system can be combined and constructed according to different requirements of users to meet changing needs.
The open and independent hardware layer and the general hardware access layer conform to the IT market operation law, and configure the underlying hardware in accordance with general standards and structures to avoid the risk of end users being tied up or even kidnapped because the system is not open.
The system hardware and software are independent, and new RFID system equipment can be derived as needed in the future.
2.5.2 Hardware layer
Make up the basic hardware module of RFID equipment, apply the way of module combination, construct corresponding equipment and software that accord with business demand.
In the RFID system equipment, the hardware composition is mainly based on the business logic to configure and combine the hardware, and coordinate to complete the required functions through software scheduling.
2.5.3 Hardware Access Layer
It is an important level that connects the hardware foundation and business logic, and controls the underlying hardware layer to work through software controls and related drivers.
2.5.4 Hardware application layer
On this layer, complete the combination of various RFID equipment hardware systems, such as self-service card terminal, RFID self-service loan and return system equipment, librarian workstation and other equipment.
The hardware application layer is mainly driven by the business logic requirements and the combined hardware access layer to drive the hardware layer to achieve the required functions. Through the adjustment and changes of the business logic, combined with the corresponding hardware devices, a variety of different RFID special devices can be derived And the system, such a modular architecture design, is the most valuable feature of RFID system design: everything is user-oriented, and products are guided by demand.
2.5.5 Data layer
The corresponding software functional modules are mainly composed of the data layer and the data application layer. The data layer includes various basic data such as the underlying database system, library business system, and reader authentication platform.
2.5.6 Data Application Layer
The data application layer is the key layer between business logic and data. It connects the network and the underlying data through a variety of interfaces and controls to achieve business logic requirements and complete system functions.
The data application layer, together with the hardware application layer and the hardware access layer, drives the underlying hardware devices through software and hardware methods in accordance with the business logic required by users, accesses relevant data, and realizes system functions.
2.5.7 Business layer
This layer is to decompose users’ needs, combine or disassemble multiple functions into separate business application modules according to the software and hardware methods implemented by computers, and complete data read and write and hardware actions through the data application layer and hardware application layer to drive the device. Realize the function.
2.5.8 User layer
Through the system, users can realize the required functions, and the corresponding functions are realized by the combination of business logic units of different business layers.
According to the needs of users, the user layer can be completed by changing combinations or updating business function modules on the premise that the business layer remains unchanged.
3. Introduction of Chuangyi Library RFID Products
3.1 RFID tags
RFID tag is a passive low-current integrated circuit product with antenna and chip. It can write and read basic information of books and media in the storage chip multiple times. It is used as a label for books and multimedia CD-ROM data. Recognition, the various labels we provide are described below. Just like a barcode, the intelligent library system uses a set of data stored in the label to “point to” the corresponding bibliographic record of each book material in the library’s circulation automation system database. Taking into account many privacy protection issues, the title and other details of any books are not stored in the label. The smart circulation tag provides 512bit programmable information for each book, and can be quickly read through a simple UHF radio frequency (840-960MHz) in the industry’s widest channel of 1.2 meters. Because in the process of borrowing and returning, do not copy the information of the smart circulation label, so the processing time of the procedures is greatly reduced. Through advanced anti-collision algorithms, error detection and error correction methods, it allows multiple tags to be read at the same time. The smart circulation label is designed as a label dedicated to books, with good concealment, and its anti-theft performance is equivalent to that of a magnetic stripe.
3.2 Level label (book shelf label, shelf label)
Book RFID layer label (size can be customized)
Figure (4.3) Book RFID shelf label (size can be customized)
Product Description
Anti-electromagnetic shielding special label for precise positioning of books
3.3 RFID library card
Library RFID library card
Product Description
The RFID library card uses a card with an embedded RFID tag, which can write and read the reader’s basic information multiple times in the storage chip of the RFID tag, and is used for readers’ circulation borrowing and returning operations, readers’ identity recognition operations, etc. .
3.4 Security Access Control System
The security detection door is a system equipment that can scan and securely identify the circulation data pasted with RFID tags. It is used for the security control of the circulation data by the circulation department to achieve the purpose of anti-theft and monitoring. The equipment system determines whether the alarm message sounds by judging the book borrowing status. The equipment is required to be safe, reliable, durable, and beautiful.
3.5 Collection inventory system
API interface and corresponding dynamic link library (DLL) based on MS Windows and PDA operating system. Provides collection inventory processing software based on Pocket PC operating system, which can save the inventory results in a certain format and transmit them to other library application management software for further analysis and processing. Provides software for searching, ordering, and whole shelves of books on shelf.
The RFID inventory device is connected to the PDA or laptop through a standard USB interface, and the corresponding processing is performed by running the relevant software. It is divided into two parts: the PDA mobile book cart and the handheld antenna.
4. Central Management Software
4.1 Central Management Software Architecture
4.2 Central Management Software Function
[ad_2]