The Library Security System Only

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Introduction

System

The meaning of system can be interpreted as a set of detailed methods, procedures, and routines that is created to handling a specific activity, perform or duty or to solve a problem.

Technology

Application of knowledge to the practical aims of human life or to changing and manipulating the human environment. Technology includes the use of materials, tools, techniques, and sources of power to make life easier or more pleasant and work more productive. Whereas science is concerned with how and why things happen, technology focuses on making things happen. Technology began to influence human endeavor as soon as people began using tools. It accelerated with the Industrial Revolution and the substitution of machines for animal and human labour. Accelerated technological development has also had costs, in terms of air and water pollution and other undesirable environmental effects.

Library

Collection of information resources in print or in other forms that is organized and made accessible for reading or study. The word derives from the Latin liber ("book"). The origin of libraries lies in the keeping of written records, a practice that dates at least to the 3rd millennium BC in Babylonia. The first libraries as repositories of books were those of the Greek temples and those established in conjunction with the Greek schools of philosophy in the 4th century BC. Today's libraries frequently contain periodicals, microfilms, tapes, videos, compact discs, and other materials in addition to books. The growth of on-line communications networks has enabled library users to search electronically linked databases worldwide. [1] 

System Background

About RFID (Radio Frequency IDentification) ( Library )

Figure 2.1 (a): RFID (Radio Frequency IDentification) is the latest technology to

be used in library theft detection systems

RFID is a combination of radio-frequency-based technology and microchip technology. The information contained on microchips in the tags affixed to library materials is read using radio frequency technology regardless of item orientation or alignment (i.e., the technology does not require line-of-sight or a fixed plane to read tags as do traditional theft detection systems) and distance from the item is not a critical factor except in the case of extra-wide exit gates. The corridors at the building exit(s) can be as wide as four feet because the tags can be read at a distance of up to two feet by each of two parallel exit sensors..

(http://www.rfid-library.com/en/default_e.html , 2013)

This organization website also provides contact details about this organization such as address and number phone. It is show that this website is existing and accurate.

Figure 2.1 (a): Contact details about organization.

In Library RFID Management System, they are using four phase of libraries system.

Library Security System Only.

This system is Using RFID Tag replace EM Security Stripe. The targets are Radio Frequency Detection and Replace the EM Anti-theft system to avoid the high volume EM field harm human body and without False Alarm. The equipment needed such as anti-theft Detection Gate. It is detect the RFID tag on Book and Check EAS status, System alarm when the EAS status is ON. Next is Security Processing Station which is turn on or off the EAS setting of the chip. Lastly is RFID tags.

Support Library Circulation

This phase action is using RFID tags replace the barcode in Circulation process. Reading book’s access number from RFID than from barcode to borrow and return the book. The phase target is no line of sight needed. Besides that, it allows to check-out and check-in several items simultaneously. It is also performing both identification and antitheft in one single operation. The equipment needed are counter station and New Integrated Library System function.

Patron Self Check-in/Check-out:

This phase let patron do the check-out and check-in process of books. The phase target is give the benefit to librarians. It will help the librarians to speeds up book check-in and check-out process of books. Besides that, frees staff to better service patrons and better space planning. The benefits to Patrons is easy to use because of books can be read in any orientation. It is also reduces queuing time and provides patron privacy. The equipment needed is self-check station. It will perform patron self-check-out and check-in process and turn on or turn off the EAS status. Next equipment is book-drop ( indoor or outdoor ). After patron drop in the book into this station, book’s id is checked and turned on the EAS simultaneously. Other equipment is remote book-drop which is long distance away from library and it acquires better protection of the Book-drop. Last equipment is sorting station which is process of sorting the return books automotive or manual.

Smart and Quick Inventory

The phase action of this system is search and inventory by reading the RFID using portable reader and portable computer. The phase target are quick inventory, look up the misplace material and search for certain material. The equipment needed is portable RFID reader. Other equipment is portable computer (Notebook PC).

Vendor

Vendor is a person or a business entity that sells something. Large retail stores generally have a list of vendors from which they purchase goods (at wholesale) to sell (at retail) to their customers. Vendors can also sell directly to the customer, as seen with street vendors.

Vendor of RFID system.

The vendor of RFID system is Bibliotheca. This company is the world’s leading provider of technology solutions to the library market.

Figure 3.1 (a): Vendor of RFID system and technology.

3.1 Vendor company background.

Based on Bibliotheca which is cited in their website http://www.bibliotheca.com/1/index.php/us/, this company can be found around the globe with central office at Australia, Canada, France and many more. This company strong heritage and history extends well beyond 20 years. In order to deliver the best possible, focused service to our customers, they have established a 5-part vision statement that their company delivers on. These parts collectively represent the vision for Bibliotheca which is leadership, focus, technology, sustainable, and investment. These companies are expert in supply system and technology to their customer and client. There are a lot of product in term of software and technologies offered to library by this company such as self-service, materials handling, security, and staff solution.

Need of system.

Nowadays, accordance with advances in computer technology and science, majority of company and agencies especially information agencies has upgrade their services with latest technology and system. From this transformation, it will help the agencies staff itself and also user to improve the efficiency of the service. It is compulsory to upgrade the service in term of system and technology because user needs the change and latest technologies such as library.

The library staff especially in cataloging department needs an automated cataloging standard that allows the process of cataloging more systematic and fast. Besides that, in a security side, the system can identify any user that brings the book or other collection in library without permission or loan from the library. It will help the library itself to prevent their collection and check the user that already loan or not. All data is already key in by library staff on system and it will detect on anti-theft detection gates.

Functionality / Efficiency.

Counter station.

The LibBest™ Counter Station is a staff assisted station on services such as loan, return, tagging, sorting and etc. It is loaded with arming/disarming module, tagging module and sorting module. Arming/Disarming module allows EAS (Electronic Article Surveillance) bit inside the tag of the library material to be set/reset so as to trigger/not trigger the alarm of the EAS gate. Checking of EAS status of library material is easy. The staff puts the item on the reader and click on the view to display the information stored inside the tag and status of EAS. There are also feature of Auto Arming and Auto Disarm. Auto Arm/Disarm will automatic arm/disarm library material that is within the Reader range.

Together with circulation module from Library Management System Software, this station is used for the following services:

Editing and updating of patron’s record

Add and deleting of patron’s record

Generate loan history for a particular patrons

Managing of fines incurred by the patron

Arm/Disarm of EAS bit inside the library material

Program of new library material

Sort item in accordance to their branch and category number

The features of this station depend on the module loaded by the Library Management  Software.

Book-drop

The Book Drops can be located anywhere, within or outside the library. Possible remote locations outside the library include MRT/train stations, shopping centers, schools, etc.This offers unprecedented flexibility and convenience of returning library items at anytime of the day, even when the library is closed.

Patron inserts the library item into the slot. The reader captures the electronic signature and sends to backend system for loan cancellation. Patron is acknowledged by beeping sound and flashlight. Patron’s record is updated immediately. This is possible due to the seamless link between LibBest Library RFID Management System and the host computer system. As such, users who have reached their loan quota can start borrowing items once they have returned them through the Book Drop.

Shelf management sytem

The LibBestTM Shelf Management Solution makes locating and identifying items on the shelves an easy task for librarians. It comprises basically of a portable scanner and a base station.

The solution is designed to cover three main requirements:

Search for individual books requested

Inventory check of the whole library stock

Search for books which are miss-helved

All these functions are performed by sweeping the portable scanner across the spines of the books on the shelves to gather their identities. In an inventory check situation, the identities collected are compared with the database and a discrepancy report could be generated.

In situations when search function is required, whether for a particular item or an item category, the information is first entered into the portable scanner from the base station, and when a foreign item is found on the shelves, a built-in beeper sound to alert the librarians.

Anti-theft Detection

The LibBest™ RFID EAS Gates is the anti-theft part of the  Library  RFID Management System using the same RFID tags embedded in the library items. Each lane is able to track items of about 1 meter and would trigger the alarm system when an un-borrowed item passed through them. The alarm will sound and lights on the gate will flash as patron passes through with the un-borrowed library material.

The EAS Anti-Theft Gates is used to detect RFID tag that is equipped with EAS (Electronic Article Surveillance). It can detect the RFID tags within 1 meter range without interference of magnetic items, Upon detecting of Armed RFID tags, the alarm will sound on the gate. It has option to trigger a Camera to record patrons who trigger the alarm to the Surveillance Station.

Theft detection is an integral feature of the chip within the tag. It is a stand-alone technology, which operates independently of the library database.

FEATURES:

Detect EAS Armed RFID tags

Multi-item detection

Able to integrate camera with the gate (Option)

Gale to integrate with Surveillance Station (Option)

Advantages and Disadvantages.

Rapid check-out / check-in

The use of RFID reduces the amount of time required to perform circulation operations. The most significant time savings are attributable to the facts that information can be read from RFID tags much faster than from barcodes and that several items in a stack can be read at the same time. While initially unreliable, the anti-collision algorithm that allows an entire stack to be check-out or check-in now appears to be working well.

Simplified patron self check-out / check-in

For patrons using self check out, there is a marked improvement because they do not have to carefully place materials within a designated template and they can check out several items at the same time.

Patron self check-in shifts that work from staff to patrons. Staff is relieved further when readers are installed in book-drops.

High-speed inventorying

A unique advantage of RFID systems is their ability to scan books on the shelves without tipping them out or removing them. A hand-held inventory reader can be moved rapidly across a shelf of books to read all of the unique identification information. Using wireless technology, it is possible not only to update the inventory, but also to identify items which are out of proper order.

System Background

CCTV stands for Closed Circuit Television or it also known by the acronym CCTV. Video that contain in CCTV only can be viewed by restricted specific group of individuals. Systems can range in size from being within a single building, to a complex of buildings, to large campuses and city centers, and can even span across a continent. Such monitoring of areas and/or activities may be used for security, safety, industrial, or private purposes. The visual images created by a CCTV system may be viewed while an event is happening or recorded for ‘after-the-fact’ review either on-site or off-site. Review is done via the use of VHS videotapes, CD, DVD, and/or other such tape or computer based mediums. Such reviews of prerecorded visual information may also be done ‘remotely’ through the use of telephone lines, fiber optics, microwave, the internet, or a host of other such transmission methods according to the design and complexity of the CCTV system. CCTV is a visual surveillance technology designed for monitoring a variety of environments and activities all at the same time. CCTV systems typically involve a dedicated communications link between cameras in the field and monitors at one or more control centers. Systems can be made up of technically mature analog cameras and image storage devices, or newly developed digital cameras and image storage devices, or a mix of the two technologies.

A CCTV system usually involves a linked system of cameras able to be viewed and operated from a series of control rooms and/or a central point of operation. Cameras come in many configurations, but can be classified under two general categories; stationary and moving. Stationary cameras are pointed at a specific scene of interest, such as a hallway, and broadcast that one scene to the control site 100% of the time. Stationary cameras can be adjusted to compensate for the specific lighting conditions of that scene. Stationary cameras can be fully exposed, or contained within a large variety of enclosures designed to meet the specific requirements of that site, such as discreteness or vandal resistance. Moving cameras, commonly called PTZ (for pan, tilt, zoom) allow a system operator to move the camera by remote control to follow an object of interest, such as a person or a car, over a large area of interest. This is typically done by use of a joystick in the control center that provides side to side (pan), up and down (tilt) and zoom control. PTZ devices can also be programmed to move in user-defined PTZ sequences to provide general surveillance of areas of interest. PTZ devices can be further programmed to automatically move to areas of interest, such as when a door or gate opens, or when motion is detected. Because the camera can be aimed at scenes with different lighting conditions, these cameras typically have many automated adjustments, such as auto focus and auto iris to keep the image optimized for accurate viewing.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now