SlideShare a Scribd company logo
1 of 33
AUTOMATIC IDENTIFICATION TECHNIQUES Frequency Ranges and Radio Licensing Regulations Mr.  Avanish Agarwal [email_address]
Automatic Identification and Data Capture  (AIDC) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Fig 1. overview of the most important AUTO-ID procedure Optical Character Recognition (OCR) Barcode System Biometric Smart Cards RFID Voice Identifi-cation Fingerprint Procedure Auto ID
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],AUTO IDENTIFICATION TECHNIQUES
[object Object],[object Object],[object Object],[object Object],[object Object],Bar Codes
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],EAN code (European Article Number) Barcode systems
Fig 3. Example of the structure of a barcode in EAN Coding Chocolate Rabbit 100g Company name 1 road name 80001 Munich FRG 9 0 5 1 8 0 5 4 3 2 1 0 4 CD Manufacturer’s Item Number Company Identifier Country Identifier
In addition to the EAN code, popular Bar codes are: •  Code Codabar: medical/clinical applications, fields with high safety requirements. •  Code 2/5 interleaved: automotive industry, goods storage, pallets, shipping containers and heavy industry. •  Code 39: processing industry, logistics, universities and libraries.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Optical character recognition (OCR)
[object Object],Biometrics ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Voice identification
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Smart Card Reading Smart cards
 
Cryptographic smart cards used for  digital signature  and secure identification
[object Object],[object Object],[object Object],Vcc RST Vpp Vcc I/O GND Address and Security Logic EEPROM ROM
Microprocessor card In 1977,  Michel Ugon  from  Honeywell Bull  invented the first microprocessor smart card  security sensitive applications. GSM mobile phones and  EC (electronic cash) cards. Vcc RST Vpp Vcc I/O GND ROM (Operating System) CPU RAM EEPROM (Application data)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Advantages Applications ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Drawbacks of Smart card:
Major application in Criminology  since the early twentieth century. Comparison of papillae and dermal ridges of the fingertips,  from the finger itself & from objects that the individual  has touched . A special reader for identification . Fingerprinting   procedures   (dactyloscopy) System compares data with previous references Modern fingerprint ID systems require less than half a second to recognize and check a fingerprint. To prevent violent frauds, fingerprint ID systems have even been developed
No influence Unidirectional --- --- Low Low Influence of Direction and Position No influence --- Possible --- Total Failure Total Failure Influence of (opt.) covering No influence Possible (contacts) --- --- Very High Very High Influence of Dirt/Damp Impossible Impossible Difficult Simple Simple Limited Readability by People Good Good Expensive Expensive Good Good Machine Readability  Very High Very High High High Low Low Data Density 16-64K 16-64K --- --- 1-100 1-100 Typical Data Qty. (bytes) RFID Systems Smart Card Biometry Voice Recog. OCR Barcode System Parameters Comparison of different RFID systems showing there Advantages and Disadvantages Medium  Low Very High Very High Medium Very Low Purchase cost / Reading Electronics No influence Contacts --- --- Limited Limited Degradation/wear
0-5 m  microwave Direct contacts Direct contacts 0-50 cm <1 cm Scanner 0-50 cm Maximum distance between data carrier and reader Very Fast ~0.5s Low  ~4s Very Low  >5 – 10s Very Low  >5s Low  ~3s Low  ~4s Reading speed (including handling of data carrier) Impossible Impossible Impossible Possible (Audio Tape) Slight Slight Unauthorized copying/modification None Medium (contacts) None None Low Low Operating Cost (e.g. Printer) RFID Systems Smart Card Biometry Voice Recog. OCR Barcode System Parameters
Legal classification of RFID as RADIO SYSTEMS (Generation & radiation of Electromagnetic waves ) Probable services affected : Radio, Television, Mobile radio services (including police, security services, industry) Marine radio services, Aeronautical Radio Services and Mobile Telephones  . ISM frequency ranges  (Industrial–Scientific–Medical), world wide accepted for RFID applications.  Due to possibility of working with high magnetic field strengths & with inductively coupled RFID systems in this range . Frequency Ranges and Radio Licensing Regulations   for RFID
[object Object],[object Object],Important  frequency ranges for RFID systems ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Frequency range 6.78 MHz
[object Object],[object Object],[object Object],[object Object],Frequency range 13.56 MHz
[object Object],[object Object],[object Object],[object Object],Frequency range 27.125 MHz
[object Object],[object Object],[object Object],[object Object],Frequency range 40.680MHz
[object Object],Frequency range 433.920 MHz ,[object Object],[object Object]
In 1997 in Europe, the frequency range of 868 – 870 MHz was passed for Short Range Devices (SRDs) in and is thus available for RFID applications in the 43 member states of CEPT.  not available for ISM applications in Europe  USA & Australia 888-889MHz & 902-928MHz used by backscatter(RFID) Systems. Frequency range 915.0 MHz Frequency range 869.0 MHz
The ISM range 2.400 – 2.4835 GHz partially overlaps with the frequency ranges used by amateur radio and radiolocation services.  For this UHF frequency range, buildings and other obstacles behave as good reflectors and damp electromagnetic waves at transmission.  Applications like  backscatter  (RFID) systems, telemetry transmitters and PC LAN systems for the wireless networking of PCs are carried out in this frequency range Frequency range 2.45 GHz
The ISM range 5.725 – 5.875 GHz partially overlaps with the frequency ranges used by amateur radio and radiolocation services. Typical ISM applications for this frequency range include movement sensors, used as door openers or contact less toilet flushing and also for backscatter (RFID) systems. The ISM range 24.00 – 24.25 GHz overlaps partially with the  amateur radio and radio location services and also by earth resources services via satellite. This frequency range is used by movement sensors, directional radio systems for data transmission. Frequency range 24.125 GHz Frequency range 5.8 GHz
[object Object],[object Object],[object Object],[object Object],References
 

More Related Content

What's hot

cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
GSM Architecture.ppt
GSM Architecture.pptGSM Architecture.ppt
GSM Architecture.pptMohammed Amer
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniquesSHUBHA CHATURVEDI
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Sandeep Gupta
 
An optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computingAn optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computingDIGVIJAY SHINDE
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dosvanamali_vanu
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSSVigneshkumar Ponnusamy
 
Cloud computing lab experiments
Cloud computing lab experimentsCloud computing lab experiments
Cloud computing lab experimentsrichendraravi
 
Multiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsMultiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsShahneel Siddiqui
 
First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communicationMuhammad Uzair Rasheed
 

What's hot (20)

cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Web Server Hardening
Web Server HardeningWeb Server Hardening
Web Server Hardening
 
Channel access link
Channel access linkChannel access link
Channel access link
 
GSM Architecture.ppt
GSM Architecture.pptGSM Architecture.ppt
GSM Architecture.ppt
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Security attacks
Security attacksSecurity attacks
Security attacks
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Ch7
Ch7Ch7
Ch7
 
Diretivas de Grupo
Diretivas de GrupoDiretivas de Grupo
Diretivas de Grupo
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
Xmpp presentation
Xmpp   presentationXmpp   presentation
Xmpp presentation
 
An optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computingAn optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computing
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dos
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Cloud computing lab experiments
Cloud computing lab experimentsCloud computing lab experiments
Cloud computing lab experiments
 
Multiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsMultiple input & Multiple Output Systems
Multiple input & Multiple Output Systems
 
First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communication
 

Similar to Automatic ID techniques frequency ranges and radio regulations

Similar to Automatic ID techniques frequency ranges and radio regulations (20)

IntroductionRFID1-EMBA.ppt
IntroductionRFID1-EMBA.pptIntroductionRFID1-EMBA.ppt
IntroductionRFID1-EMBA.ppt
 
RFID Whitepaper for Steel Industry
RFID Whitepaper for Steel IndustryRFID Whitepaper for Steel Industry
RFID Whitepaper for Steel Industry
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Identification systems for industrial production control and mobile machines
Identification systems for industrial production control and mobile machinesIdentification systems for industrial production control and mobile machines
Identification systems for industrial production control and mobile machines
 
Rfid In Brief Ii
Rfid In Brief IiRfid In Brief Ii
Rfid In Brief Ii
 
Identification System Brochure
Identification System BrochureIdentification System Brochure
Identification System Brochure
 
Rfid report
Rfid reportRfid report
Rfid report
 
RFID
RFIDRFID
RFID
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
RFID PPT
RFID PPTRFID PPT
RFID PPT
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 
Rfid Pitch
Rfid PitchRfid Pitch
Rfid Pitch
 
Rfia.word
Rfia.wordRfia.word
Rfia.word
 
Basics Of Rfid Technology
Basics Of Rfid TechnologyBasics Of Rfid Technology
Basics Of Rfid Technology
 
RFID
RFIDRFID
RFID
 
09
0909
09
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 

Recently uploaded

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Automatic ID techniques frequency ranges and radio regulations

  • 1. AUTOMATIC IDENTIFICATION TECHNIQUES Frequency Ranges and Radio Licensing Regulations Mr. Avanish Agarwal [email_address]
  • 2.
  • 3. Fig 1. overview of the most important AUTO-ID procedure Optical Character Recognition (OCR) Barcode System Biometric Smart Cards RFID Voice Identifi-cation Fingerprint Procedure Auto ID
  • 4.
  • 5.
  • 6.
  • 7. Fig 3. Example of the structure of a barcode in EAN Coding Chocolate Rabbit 100g Company name 1 road name 80001 Munich FRG 9 0 5 1 8 0 5 4 3 2 1 0 4 CD Manufacturer’s Item Number Company Identifier Country Identifier
  • 8. In addition to the EAN code, popular Bar codes are: • Code Codabar: medical/clinical applications, fields with high safety requirements. • Code 2/5 interleaved: automotive industry, goods storage, pallets, shipping containers and heavy industry. • Code 39: processing industry, logistics, universities and libraries.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.  
  • 14. Cryptographic smart cards used for digital signature and secure identification
  • 15.
  • 16. Microprocessor card In 1977, Michel Ugon from Honeywell Bull invented the first microprocessor smart card security sensitive applications. GSM mobile phones and EC (electronic cash) cards. Vcc RST Vpp Vcc I/O GND ROM (Operating System) CPU RAM EEPROM (Application data)
  • 17.
  • 18.
  • 19. Major application in Criminology since the early twentieth century. Comparison of papillae and dermal ridges of the fingertips, from the finger itself & from objects that the individual has touched . A special reader for identification . Fingerprinting procedures (dactyloscopy) System compares data with previous references Modern fingerprint ID systems require less than half a second to recognize and check a fingerprint. To prevent violent frauds, fingerprint ID systems have even been developed
  • 20. No influence Unidirectional --- --- Low Low Influence of Direction and Position No influence --- Possible --- Total Failure Total Failure Influence of (opt.) covering No influence Possible (contacts) --- --- Very High Very High Influence of Dirt/Damp Impossible Impossible Difficult Simple Simple Limited Readability by People Good Good Expensive Expensive Good Good Machine Readability Very High Very High High High Low Low Data Density 16-64K 16-64K --- --- 1-100 1-100 Typical Data Qty. (bytes) RFID Systems Smart Card Biometry Voice Recog. OCR Barcode System Parameters Comparison of different RFID systems showing there Advantages and Disadvantages Medium Low Very High Very High Medium Very Low Purchase cost / Reading Electronics No influence Contacts --- --- Limited Limited Degradation/wear
  • 21. 0-5 m microwave Direct contacts Direct contacts 0-50 cm <1 cm Scanner 0-50 cm Maximum distance between data carrier and reader Very Fast ~0.5s Low ~4s Very Low >5 – 10s Very Low >5s Low ~3s Low ~4s Reading speed (including handling of data carrier) Impossible Impossible Impossible Possible (Audio Tape) Slight Slight Unauthorized copying/modification None Medium (contacts) None None Low Low Operating Cost (e.g. Printer) RFID Systems Smart Card Biometry Voice Recog. OCR Barcode System Parameters
  • 22. Legal classification of RFID as RADIO SYSTEMS (Generation & radiation of Electromagnetic waves ) Probable services affected : Radio, Television, Mobile radio services (including police, security services, industry) Marine radio services, Aeronautical Radio Services and Mobile Telephones . ISM frequency ranges (Industrial–Scientific–Medical), world wide accepted for RFID applications. Due to possibility of working with high magnetic field strengths & with inductively coupled RFID systems in this range . Frequency Ranges and Radio Licensing Regulations for RFID
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. In 1997 in Europe, the frequency range of 868 – 870 MHz was passed for Short Range Devices (SRDs) in and is thus available for RFID applications in the 43 member states of CEPT. not available for ISM applications in Europe USA & Australia 888-889MHz & 902-928MHz used by backscatter(RFID) Systems. Frequency range 915.0 MHz Frequency range 869.0 MHz
  • 30. The ISM range 2.400 – 2.4835 GHz partially overlaps with the frequency ranges used by amateur radio and radiolocation services. For this UHF frequency range, buildings and other obstacles behave as good reflectors and damp electromagnetic waves at transmission. Applications like backscatter (RFID) systems, telemetry transmitters and PC LAN systems for the wireless networking of PCs are carried out in this frequency range Frequency range 2.45 GHz
  • 31. The ISM range 5.725 – 5.875 GHz partially overlaps with the frequency ranges used by amateur radio and radiolocation services. Typical ISM applications for this frequency range include movement sensors, used as door openers or contact less toilet flushing and also for backscatter (RFID) systems. The ISM range 24.00 – 24.25 GHz overlaps partially with the amateur radio and radio location services and also by earth resources services via satellite. This frequency range is used by movement sensors, directional radio systems for data transmission. Frequency range 24.125 GHz Frequency range 5.8 GHz
  • 32.
  • 33.