SlideShare a Scribd company logo
1 of 4
D E S C R I PT I O N O F K E Y W O R D S


A
Automatic Identification A broad term that covers methods of collecting data and
entering it directly into computer systems without human involvement.
Addressability The ability to write data to different fields, or blocks of memory, in the
microchip in an RFID transponder.
Agile reader A generic term that usual refers to an RFID reader that can read tags
operating at different frequencies or using different methods of communication between
the tags and readers.
Air interface protocol The rules that govern how tags and readers communicate.


B
Bar code A standard method of identifying the manufacturer and product category of a
particular item Barcodes’ main drawbacks are they don’t identify unique items and
scanners have to have line of sight to read them.


C
Carrier frequency The main frequency of a transmitter, or RFID reader, such as 915
MHz. The frequency is then changed, or modulated, to transmit information.
Checksum A code added to the contents of a block of data stored on an RFID
microchip that can be checked before and after data is transmitted from the tag to the
reader to determine whether the data has been corrupted or lost. The cyclic redundancy
check is one form of checksum.
Closed-loop systems RFID tracking systems set up within a company. Since the tracked
item never leaves the company's control, it does not need to worry about using
technology based on open standards.
Cyclic redundancy check (CRC) A method of checking data stored on an RFID tag to
be sure that it hasn't been corrupted or some of it lost.




                                            Page A
D
Data field An area of memory on an RFID microchips that is assigned to a particular
type of information.
Decibel (dB) A measure of the gain of an antenna.
Duplex A channel capable of transm itting data in both directions at the same time.


E
Electromagnetic interferance (EMI) Interference caused when the radio waves of one
device distort the waves of another. Cells phones, wireless computers and even robots in
factories can produce radio w aves that interfere with RFID tags.
Electronic Product Code: (EPC) A serial, created by the Auto -ID Center, that will
complement barcodes. The EPC has digits to identify the manufacturer, product category
and the individual item.
Error correcting protocol A set of rules used by readers to interpret data correctly
from the tag.
eXtensible markup language (XML) A widely accepted way of sharing information
over the Internet in a way that computers can use, regardless of their operating system.


F
Frequency hopping A technique used to prevent readers from interfering with one
another.


H
Harvesting A term sometimes used to describe the way passive tags gather energy from
an RFID reader antenna.


M
Microwave tags A term that is some time used to refer to RFID tags that operate at 5.8
GHz. They have very high transfer rates and can be read from as far as 30 feet away.




                                          Page B
N
Nominal range The read range at which the tag can be read reliably.
Null spot Area in the reader field that doesn't receive radio waves. This is essentially
the reader's blind spot. It is a phenomenon common to UHF systems.


P
Phantom read (also called a phantom transaction or false read) When a reader
reports the presence of a tag that doesn't exist.
Programming a tag: Writing data to an RFID tag. This is sometimes called
quot;commissioning a tag.quot;
Protocol A set of rules that govern communications systems.
Proximity sensor A device that detects the presence of an object and signals another
device. Proximity sensors are o ften used on manufacturing lines to alert robots or routing
devices on a conveyor to the presence of an object. They can be used in RFID systems to
turn on readers.


R
Reader (also called an interrogator) The reader communicates with the RFID tag via
radio waves and passes the information in digital form to a computer system.
Reader field The area of coverage. Tags outside the reader field do not receive radio
waves and can't be read.
Read-only tags Tags that contain data that cannot be changed unles s the microchip is
reprogrammed electronically.
Read-write tag An RFID tag that can store new information on its microchip. These
tags are often used on reusable containers and other assets. When the contents of the
container are changed, new information is written to the tag. Read-write tags are more
expensive than read-only tags.




                                            Page C
S
Scanner An electronic device that can send and receive radio waves. When combined
with a digital signal processor that turns the waves into bits of information, the sc anner is
called a reader or interrogator.
Sensor A device that responds to a physical stimulus and produces an electronic signal.
Sensors are increasingly being combined with RFID tags to detect the presence of a
stimulus at an identifiable location.
Smart label A generic term that usually refers to a barcode label that contains an RFID
transponder. It's considered quot;smartquot; because it can store information, such as a unique
serial number, and communicate with a reader.
Synchronization Timing readers or reader antennas near one another so that they don't
interfere with one another.


T
Transceiver A device that both transmits and receives radio waves.


U
Universal Product Code (UPC) The barcode standard used in North America. It is
administered by the Uniform Code Council.


W
WORM Write once, read many. A tag that can be written to only once by the user.
Thereafter, the tag can only be read.


X
XML Query Language (XQL) A method of searching a database based on the
extensible markup language (XM L). Files created using the Auto -ID Center’s Physical
Markup Language can be searched using XQL.




                                           Page D

More Related Content

Viewers also liked

Five elements of sia’s successful hr power point
Five elements of sia’s successful hr power pointFive elements of sia’s successful hr power point
Five elements of sia’s successful hr power pointpulocksimongomes123
 
Abstract and List of Charts for Vehicle Tracking and Ticketing System Using ...
Abstract  and List of Charts for Vehicle Tracking and Ticketing System Using ...Abstract  and List of Charts for Vehicle Tracking and Ticketing System Using ...
Abstract and List of Charts for Vehicle Tracking and Ticketing System Using ...Hari
 
آموزش طراحی برد‌ مدار چاپی به کمک نرم‌افزار Altium Designer
آموزش طراحی برد‌ مدار چاپی به کمک نرم‌افزار Altium Designerآموزش طراحی برد‌ مدار چاپی به کمک نرم‌افزار Altium Designer
آموزش طراحی برد‌ مدار چاپی به کمک نرم‌افزار Altium Designerfaradars
 
The People of Proverbs (Part 3): The Sluggard
The People of Proverbs (Part 3): The SluggardThe People of Proverbs (Part 3): The Sluggard
The People of Proverbs (Part 3): The SluggardDavid Turner
 

Viewers also liked (6)

Shilling wv
Shilling wvShilling wv
Shilling wv
 
Portfolio.pdf 1
Portfolio.pdf 1Portfolio.pdf 1
Portfolio.pdf 1
 
Five elements of sia’s successful hr power point
Five elements of sia’s successful hr power pointFive elements of sia’s successful hr power point
Five elements of sia’s successful hr power point
 
Abstract and List of Charts for Vehicle Tracking and Ticketing System Using ...
Abstract  and List of Charts for Vehicle Tracking and Ticketing System Using ...Abstract  and List of Charts for Vehicle Tracking and Ticketing System Using ...
Abstract and List of Charts for Vehicle Tracking and Ticketing System Using ...
 
آموزش طراحی برد‌ مدار چاپی به کمک نرم‌افزار Altium Designer
آموزش طراحی برد‌ مدار چاپی به کمک نرم‌افزار Altium Designerآموزش طراحی برد‌ مدار چاپی به کمک نرم‌افزار Altium Designer
آموزش طراحی برد‌ مدار چاپی به کمک نرم‌افزار Altium Designer
 
The People of Proverbs (Part 3): The Sluggard
The People of Proverbs (Part 3): The SluggardThe People of Proverbs (Part 3): The Sluggard
The People of Proverbs (Part 3): The Sluggard
 

More from Hari

Table of Contents Vehicle Tracking and Ticketing System Using RFID Project (S...
Table of Contents Vehicle Tracking and Ticketing System Using RFID Project (S...Table of Contents Vehicle Tracking and Ticketing System Using RFID Project (S...
Table of Contents Vehicle Tracking and Ticketing System Using RFID Project (S...Hari
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
Vehicle Tracking and Ticketing System Using RFID Project - Circuit Block Diagram
Vehicle Tracking and Ticketing System Using RFID Project - Circuit Block DiagramVehicle Tracking and Ticketing System Using RFID Project - Circuit Block Diagram
Vehicle Tracking and Ticketing System Using RFID Project - Circuit Block DiagramHari
 
Keywords Explanation To Rfid Project Annexure
Keywords Explanation To Rfid Project  AnnexureKeywords Explanation To Rfid Project  Annexure
Keywords Explanation To Rfid Project AnnexureHari
 
Abstract Of The Rfid Project I
Abstract Of The Rfid Project IAbstract Of The Rfid Project I
Abstract Of The Rfid Project IHari
 
Building a Linux IPv6 DNS Server Anims (Promo)
Building a Linux IPv6 DNS Server Anims (Promo)Building a Linux IPv6 DNS Server Anims (Promo)
Building a Linux IPv6 DNS Server Anims (Promo)Hari
 
List Of Figures and Diagrams for Building Linux IPv6 DNS Server
List Of Figures and Diagrams for Building Linux IPv6 DNS ServerList Of Figures and Diagrams for Building Linux IPv6 DNS Server
List Of Figures and Diagrams for Building Linux IPv6 DNS ServerHari
 
Table Of Contents for Building Linux IPV6 DNS Server
Table Of Contents for Building Linux IPV6 DNS ServerTable Of Contents for Building Linux IPV6 DNS Server
Table Of Contents for Building Linux IPV6 DNS ServerHari
 
Source Code of Building Linux IPv6 DNS Server (Complete Sourcecode)
Source Code of Building Linux IPv6 DNS Server (Complete Sourcecode)Source Code of Building Linux IPv6 DNS Server (Complete Sourcecode)
Source Code of Building Linux IPv6 DNS Server (Complete Sourcecode)Hari
 
Screen Shots of Building IPv6 DNS Server (Screen shots)
Screen Shots of Building IPv6 DNS Server (Screen shots)Screen Shots of Building IPv6 DNS Server (Screen shots)
Screen Shots of Building IPv6 DNS Server (Screen shots)Hari
 
List Of Acronym in Building Linux IPV6 DNS Server
List Of Acronym in Building Linux IPV6 DNS ServerList Of Acronym in Building Linux IPV6 DNS Server
List Of Acronym in Building Linux IPV6 DNS ServerHari
 
Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Hari
 
Abstract of the Vehicle Tracking and Ticketing System (VTTS) using RFID
Abstract of the Vehicle Tracking and Ticketing System (VTTS) using RFIDAbstract of the Vehicle Tracking and Ticketing System (VTTS) using RFID
Abstract of the Vehicle Tracking and Ticketing System (VTTS) using RFIDHari
 
Bottom Line of Building Linux IPv6 DNS Server Project
Bottom Line of Building Linux IPv6 DNS Server ProjectBottom Line of Building Linux IPv6 DNS Server Project
Bottom Line of Building Linux IPv6 DNS Server ProjectHari
 
Software Design Specification For Smart Internet Cafe
Software Design Specification For Smart Internet CafeSoftware Design Specification For Smart Internet Cafe
Software Design Specification For Smart Internet CafeHari
 
Software Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeSoftware Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeHari
 
Building Linux IPv6 DNS Server (Draft Copy)
Building Linux IPv6 DNS Server (Draft Copy)Building Linux IPv6 DNS Server (Draft Copy)
Building Linux IPv6 DNS Server (Draft Copy)Hari
 
Building Linux IPv6 DNS Server (Complete Presentation)
Building Linux IPv6 DNS Server (Complete Presentation)Building Linux IPv6 DNS Server (Complete Presentation)
Building Linux IPv6 DNS Server (Complete Presentation)Hari
 
Screen Shots of Building Linux IPv6 DNS Server
Screen Shots of Building Linux IPv6 DNS Server Screen Shots of Building Linux IPv6 DNS Server
Screen Shots of Building Linux IPv6 DNS Server Hari
 
Building Linux IPv6 DNS Server (Third Review)
Building Linux IPv6 DNS Server (Third Review)Building Linux IPv6 DNS Server (Third Review)
Building Linux IPv6 DNS Server (Third Review)Hari
 

More from Hari (20)

Table of Contents Vehicle Tracking and Ticketing System Using RFID Project (S...
Table of Contents Vehicle Tracking and Ticketing System Using RFID Project (S...Table of Contents Vehicle Tracking and Ticketing System Using RFID Project (S...
Table of Contents Vehicle Tracking and Ticketing System Using RFID Project (S...
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Vehicle Tracking and Ticketing System Using RFID Project - Circuit Block Diagram
Vehicle Tracking and Ticketing System Using RFID Project - Circuit Block DiagramVehicle Tracking and Ticketing System Using RFID Project - Circuit Block Diagram
Vehicle Tracking and Ticketing System Using RFID Project - Circuit Block Diagram
 
Keywords Explanation To Rfid Project Annexure
Keywords Explanation To Rfid Project  AnnexureKeywords Explanation To Rfid Project  Annexure
Keywords Explanation To Rfid Project Annexure
 
Abstract Of The Rfid Project I
Abstract Of The Rfid Project IAbstract Of The Rfid Project I
Abstract Of The Rfid Project I
 
Building a Linux IPv6 DNS Server Anims (Promo)
Building a Linux IPv6 DNS Server Anims (Promo)Building a Linux IPv6 DNS Server Anims (Promo)
Building a Linux IPv6 DNS Server Anims (Promo)
 
List Of Figures and Diagrams for Building Linux IPv6 DNS Server
List Of Figures and Diagrams for Building Linux IPv6 DNS ServerList Of Figures and Diagrams for Building Linux IPv6 DNS Server
List Of Figures and Diagrams for Building Linux IPv6 DNS Server
 
Table Of Contents for Building Linux IPV6 DNS Server
Table Of Contents for Building Linux IPV6 DNS ServerTable Of Contents for Building Linux IPV6 DNS Server
Table Of Contents for Building Linux IPV6 DNS Server
 
Source Code of Building Linux IPv6 DNS Server (Complete Sourcecode)
Source Code of Building Linux IPv6 DNS Server (Complete Sourcecode)Source Code of Building Linux IPv6 DNS Server (Complete Sourcecode)
Source Code of Building Linux IPv6 DNS Server (Complete Sourcecode)
 
Screen Shots of Building IPv6 DNS Server (Screen shots)
Screen Shots of Building IPv6 DNS Server (Screen shots)Screen Shots of Building IPv6 DNS Server (Screen shots)
Screen Shots of Building IPv6 DNS Server (Screen shots)
 
List Of Acronym in Building Linux IPV6 DNS Server
List Of Acronym in Building Linux IPV6 DNS ServerList Of Acronym in Building Linux IPV6 DNS Server
List Of Acronym in Building Linux IPV6 DNS Server
 
Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)
 
Abstract of the Vehicle Tracking and Ticketing System (VTTS) using RFID
Abstract of the Vehicle Tracking and Ticketing System (VTTS) using RFIDAbstract of the Vehicle Tracking and Ticketing System (VTTS) using RFID
Abstract of the Vehicle Tracking and Ticketing System (VTTS) using RFID
 
Bottom Line of Building Linux IPv6 DNS Server Project
Bottom Line of Building Linux IPv6 DNS Server ProjectBottom Line of Building Linux IPv6 DNS Server Project
Bottom Line of Building Linux IPv6 DNS Server Project
 
Software Design Specification For Smart Internet Cafe
Software Design Specification For Smart Internet CafeSoftware Design Specification For Smart Internet Cafe
Software Design Specification For Smart Internet Cafe
 
Software Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeSoftware Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet Cafe
 
Building Linux IPv6 DNS Server (Draft Copy)
Building Linux IPv6 DNS Server (Draft Copy)Building Linux IPv6 DNS Server (Draft Copy)
Building Linux IPv6 DNS Server (Draft Copy)
 
Building Linux IPv6 DNS Server (Complete Presentation)
Building Linux IPv6 DNS Server (Complete Presentation)Building Linux IPv6 DNS Server (Complete Presentation)
Building Linux IPv6 DNS Server (Complete Presentation)
 
Screen Shots of Building Linux IPv6 DNS Server
Screen Shots of Building Linux IPv6 DNS Server Screen Shots of Building Linux IPv6 DNS Server
Screen Shots of Building Linux IPv6 DNS Server
 
Building Linux IPv6 DNS Server (Third Review)
Building Linux IPv6 DNS Server (Third Review)Building Linux IPv6 DNS Server (Third Review)
Building Linux IPv6 DNS Server (Third Review)
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Description Of Keywords in Vehicle Tracking and Ticketing System Using RFID Project (Stage-1)

  • 1. D E S C R I PT I O N O F K E Y W O R D S A Automatic Identification A broad term that covers methods of collecting data and entering it directly into computer systems without human involvement. Addressability The ability to write data to different fields, or blocks of memory, in the microchip in an RFID transponder. Agile reader A generic term that usual refers to an RFID reader that can read tags operating at different frequencies or using different methods of communication between the tags and readers. Air interface protocol The rules that govern how tags and readers communicate. B Bar code A standard method of identifying the manufacturer and product category of a particular item Barcodes’ main drawbacks are they don’t identify unique items and scanners have to have line of sight to read them. C Carrier frequency The main frequency of a transmitter, or RFID reader, such as 915 MHz. The frequency is then changed, or modulated, to transmit information. Checksum A code added to the contents of a block of data stored on an RFID microchip that can be checked before and after data is transmitted from the tag to the reader to determine whether the data has been corrupted or lost. The cyclic redundancy check is one form of checksum. Closed-loop systems RFID tracking systems set up within a company. Since the tracked item never leaves the company's control, it does not need to worry about using technology based on open standards. Cyclic redundancy check (CRC) A method of checking data stored on an RFID tag to be sure that it hasn't been corrupted or some of it lost. Page A
  • 2. D Data field An area of memory on an RFID microchips that is assigned to a particular type of information. Decibel (dB) A measure of the gain of an antenna. Duplex A channel capable of transm itting data in both directions at the same time. E Electromagnetic interferance (EMI) Interference caused when the radio waves of one device distort the waves of another. Cells phones, wireless computers and even robots in factories can produce radio w aves that interfere with RFID tags. Electronic Product Code: (EPC) A serial, created by the Auto -ID Center, that will complement barcodes. The EPC has digits to identify the manufacturer, product category and the individual item. Error correcting protocol A set of rules used by readers to interpret data correctly from the tag. eXtensible markup language (XML) A widely accepted way of sharing information over the Internet in a way that computers can use, regardless of their operating system. F Frequency hopping A technique used to prevent readers from interfering with one another. H Harvesting A term sometimes used to describe the way passive tags gather energy from an RFID reader antenna. M Microwave tags A term that is some time used to refer to RFID tags that operate at 5.8 GHz. They have very high transfer rates and can be read from as far as 30 feet away. Page B
  • 3. N Nominal range The read range at which the tag can be read reliably. Null spot Area in the reader field that doesn't receive radio waves. This is essentially the reader's blind spot. It is a phenomenon common to UHF systems. P Phantom read (also called a phantom transaction or false read) When a reader reports the presence of a tag that doesn't exist. Programming a tag: Writing data to an RFID tag. This is sometimes called quot;commissioning a tag.quot; Protocol A set of rules that govern communications systems. Proximity sensor A device that detects the presence of an object and signals another device. Proximity sensors are o ften used on manufacturing lines to alert robots or routing devices on a conveyor to the presence of an object. They can be used in RFID systems to turn on readers. R Reader (also called an interrogator) The reader communicates with the RFID tag via radio waves and passes the information in digital form to a computer system. Reader field The area of coverage. Tags outside the reader field do not receive radio waves and can't be read. Read-only tags Tags that contain data that cannot be changed unles s the microchip is reprogrammed electronically. Read-write tag An RFID tag that can store new information on its microchip. These tags are often used on reusable containers and other assets. When the contents of the container are changed, new information is written to the tag. Read-write tags are more expensive than read-only tags. Page C
  • 4. S Scanner An electronic device that can send and receive radio waves. When combined with a digital signal processor that turns the waves into bits of information, the sc anner is called a reader or interrogator. Sensor A device that responds to a physical stimulus and produces an electronic signal. Sensors are increasingly being combined with RFID tags to detect the presence of a stimulus at an identifiable location. Smart label A generic term that usually refers to a barcode label that contains an RFID transponder. It's considered quot;smartquot; because it can store information, such as a unique serial number, and communicate with a reader. Synchronization Timing readers or reader antennas near one another so that they don't interfere with one another. T Transceiver A device that both transmits and receives radio waves. U Universal Product Code (UPC) The barcode standard used in North America. It is administered by the Uniform Code Council. W WORM Write once, read many. A tag that can be written to only once by the user. Thereafter, the tag can only be read. X XML Query Language (XQL) A method of searching a database based on the extensible markup language (XM L). Files created using the Auto -ID Center’s Physical Markup Language can be searched using XQL. Page D