CHARACTERISTIC
- RFID systems can provide error-free, wireless data transmissions that are both battery-free and maintenance-free.
- They do not require line-of-site scanners for operations.
- The stored data can be altered during sorting or they can capture the workflow or process information.
- RFID systems can usually work effectively even in harsh environments with excessive dirt, dust, moisture, and extremes of temperatures.
- One of the components of RFID consists of tags that are electronically programmed with unique information.
- Each paper-thin tag contains an etched antenna and a microchip with a capacity of at least 64 bits.
- The word bit is a blend of binary and digit.
- A bit is the smallest unit of information storable in a computer or a peripheral device, expressed as 0 or 1. Eight bits make a byte, the common measure of memory or storage capacity.
- A byte is a set of adjacent bits, now commonly a group of eight, used in computing to represent a unit of data such as a number or letter; or a unit of computer memory equal to that needed to store a single character; therefore, 64 bits is the equivalent of "64 characters" (letters and/or numbers).
- Tags are available in one of three types: read-only; write-once, read-many (WORM); and read-write.
- Tags are read-only if the identification is encoded at the time of manufacture and not rewritable.
- This type of tag contains nothing more than item identification.
- It can be used for items acquired after the initial implementation of RFID.
- The WORM tag's main advantage over a read-only tag is that information in addition to the identification number can be added; however, this information must be something that won't need to be changed.
- An example would be a library that includes information about an author or item title if the tag has enough cpacity, but not a library location or circulation status.
- Read-write tags, are chosen by most libraries and can have information changed or added.
- For example, a library might add an identification code for each branch and that information could be changed if the holding location were subsequently changed to another branch of the library.
- In library RFID, usually part of the read-write tag is secured againave placed RFID tags on staff and patron identification cards.
- The tags cn be inserted in the items by a library, a book jobber, or the publisher when the book, etc. is completed.
- Most libraries that have implemented RFID technology have done their own tagging.
- Book jobbers that provide processing services are willing to insert RFID tags at additional cost, but publishers will not do it unless there are enough bookstores and libraries are willing to pay more for books with embedded tags.
- Almost all libraries using RFID have tagged only library materials, but libraries can also tag small pieces of equipment. One academic library has dramatically reduced losses by protecting everything that is not fastened down.
- A few libraries have placed RFID tags on staff and patron identification cards. Not only does that application identify patrons for charging and discharging of library materials, but also for access to restricted areas.
- Generally, as far as RFID is concerned, we need to know more about this new technology which is spreading throughout the world and is playing such an important part in our lives, whether we know it or not and whether we like it or not.

Tiada ulasan:
Catat Ulasan