SlideShare une entreprise Scribd logo
1  sur  3
SEMINAR : RADIO FREQUENCY IDENTIFICATION

What is RFID?
  1. It is a method to automatically identify objects, animals or people by means of
      radio waves.

   2. This means RFID devices (spy-chips) are attached to the object that we wish to
      identify.

   3. In case of objects the RFID device is glued on it.

   4. In case of animals the tag is injected.

   5. In case of humans the wrist-band that a person wears contains RFID device.

Is this only automatic identification technology?
    1. Certainly not, the most commonly used identification technology that all of us
        know, is the barcode.

   2. This is set of funny thick and thin lines that we see on all items, be they computer
      parts or shampoo bottles.

   3. What do they do? They help identify what the item is, who made it and such kind
      of information.

   4. For example, consider your library ID card number that is represented by barcode.
      The barcode scanner scans this barcode and hence the number. The scanner is
      connected to a database and this number points to the rest of information which
      includes name-of-person, date-of-birth, residence etc.


But you must be thinking, even a barcode reader can do same function as RFID
reader, so what is the point?
   1. Well a barcode reader can read a barcode one at a time.
       One RFID reader can identify hundreds of tags in its range within a fraction
       of a second.

   2. Barcode reader requires clear line of sight. Barcodes get dirty and damaged.
      In case of RFID line of sight is not required, even in case of dirtying they are
      still visible to the reader.

Components of a RFID System:
  1. A transponder or tag consisting of a microchip and an antenna. Information to be
     processed is written in microchip. The antenna is used to emit/receive radio
     signals.



                                                                                         1
2. An transceiver or reader consisting of a transceiver, decoder, and antenna. The
      transceiver is used to receive radio signals which are decoded to byte stream by
      decoder. The antenna is used to emit/receive radio signals.

How does a RFID system work?

   1. The object to be tracked is affixed with a RFID tag or transponder. A RFID tag
      can store up to 2000 bits of information
   2. The reader is kept at some distance
   3. When the object containing RFID tag comes within the range of radio signals
      emitted by the reader, the tag is activated and it starts sending the information
      stored in it in the form of radio signals.
   4. The reader captures the radio signals, decodes it to a byte stream, and sends the
      information for further processing to the host system connected to it.

So what is the use of RFID?
These are not the only applications. By studying these applications you can come up with
your own application.

   Animal Identification.
   1. Injectable RFID tags are used for animals today. The number of RFID tag is
      unique and cannot be altered.
   2. These tags were easily read from the distance, with a hand held reader.
   3. The reader is connected to a remote database which correlates the unique RFID
      tag number on the animal with other data like.
           Distinguishing features of the animal.
           Last vaccination done.
           or whether it is a pet animal or wild tiger or endangered species.

   Anti – Theft System.
   1. In past the only anti-theft systems were CCTV ( Closed Circuit TV ) cameras and
      watchful security guards.
   2. Ofcourse cameras are useful. But mostly they are useful only after a theft has
      taken place.
   3. And what if the security guard in the jewelry Shop picks small item (say a
      diamond ring).
   4. RFID technology is used to trigger the alarm when somebody tries to walk off
      through the door antenna with an item without paying for it.

   Luggage Handling
   1. Lost or misplaced luggage takes up large chunk of an airlines headache list.
   2. Ofcourse airline luggage is fixed with barcode tags at the time of luggage check-
      in.
   3. Unfortunately, the reader cannot read all barcode tags because, barcode reader
      requires a clear line of sight, and the luggage article may get bunched together
      because the careless loading of the staff. This makes barcode labels not only
      unreadable and damaged but labels themselves are lost.


                                                                                          2
4. Instead of ordinary barcode labels we can use RFID tags. The RFID readers have
   several advantages over over barcode readers like:
        Many bags can read at one time.
        No problem of misaligned and dirty.


Blood Banks
1. In typical hospital emergency room, the patient himself is asleep or unconscious,
   unable to talk or communicate or talk.
2. Typically patient is not known personally to nurse.
3. The nurse gets confused and hence transfuses the wrong blood or contaminated
   blood. What happens, patient will sleep forever (in other words get killed).
4. The RFID solution is to embed a tag into the blood bag.
5. The nurse who transfuses the blood can scan the bag before transferring;
6. the patient has also wrist-band RFID tag which identifies him uniquely.
7. In case of wrong blood a reader can throw warning.
8. The patient will be grateful to the technology, if he knew what was about to
   happen with him.

Office printers and cartridges.
1. Have you faced a problem when your printer gave you an ink low alarm, and you
   spent a lot of time searching which new print cartridge could be compatible with
   your “out of ink” printer.
2. The RFID solution is to embed RFID tags inside both print cartridges and the
   printers.
3. Before opening the seal, the printers RFID reader senses the cartridges RFID tag
   and displays the message on PC which is attached to the printer. The message
   could be a warning like “STOP This Cartridge is not suitable for me”




                                                                                       3

Contenu connexe

Tendances

Simple Introduction about RFID
Simple Introduction about RFIDSimple Introduction about RFID
Simple Introduction about RFIDYudhi Irawan
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
No Barcodes? No Problem!
No Barcodes? No Problem!No Barcodes? No Problem!
No Barcodes? No Problem!Barcoding, Inc.
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid applicationPriyanka Singh
 
FINAL YEAR PAPER
FINAL YEAR PAPERFINAL YEAR PAPER
FINAL YEAR PAPERDiwakar Jha
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance systemA.k. Goverdhan
 
Rfid in retail(kapil)
Rfid in retail(kapil)Rfid in retail(kapil)
Rfid in retail(kapil)isme
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentationAkash Maurya
 
Using rfid technology to develop an attendance system and avoid traffic 1
Using rfid technology to develop an attendance system and avoid traffic 1Using rfid technology to develop an attendance system and avoid traffic 1
Using rfid technology to develop an attendance system and avoid traffic 1Baghya Lakshmi
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance SystemAtiq Shaikh
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraqmontaser185
 
RFID in Apparel Industry
RFID in Apparel Industry RFID in Apparel Industry
RFID in Apparel Industry iaitoinfotech
 

Tendances (20)

Simple Introduction about RFID
Simple Introduction about RFIDSimple Introduction about RFID
Simple Introduction about RFID
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
RFID and Barcode
RFID and BarcodeRFID and Barcode
RFID and Barcode
 
No Barcodes? No Problem!
No Barcodes? No Problem!No Barcodes? No Problem!
No Barcodes? No Problem!
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid application
 
FINAL YEAR PAPER
FINAL YEAR PAPERFINAL YEAR PAPER
FINAL YEAR PAPER
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance system
 
Rfid in retail(kapil)
Rfid in retail(kapil)Rfid in retail(kapil)
Rfid in retail(kapil)
 
What is RFID and Barcode
What is RFID and BarcodeWhat is RFID and Barcode
What is RFID and Barcode
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
Using rfid technology to develop an attendance system and avoid traffic 1
Using rfid technology to develop an attendance system and avoid traffic 1Using rfid technology to develop an attendance system and avoid traffic 1
Using rfid technology to develop an attendance system and avoid traffic 1
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance System
 
RFID
RFIDRFID
RFID
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)
 
RFID in Apparel Industry
RFID in Apparel Industry RFID in Apparel Industry
RFID in Apparel Industry
 

En vedette

Negro plaintiff factual asset summary ii on harry c. arthur esq. et al
Negro plaintiff factual asset summary ii on harry c. arthur esq. et alNegro plaintiff factual asset summary ii on harry c. arthur esq. et al
Negro plaintiff factual asset summary ii on harry c. arthur esq. et alLouis Charles Hamilton II
 
Hist 142 Pp by David Diaz
Hist 142 Pp by David DiazHist 142 Pp by David Diaz
Hist 142 Pp by David Diazdavidpdiaz
 
To: Live and Die in LDS Mormon..."Salt Lake City" Utah
To: Live and Die in LDS Mormon..."Salt Lake City" UtahTo: Live and Die in LDS Mormon..."Salt Lake City" Utah
To: Live and Die in LDS Mormon..."Salt Lake City" UtahLouis Charles Hamilton II
 
Cmdr. bluefin (usn) 2015 “great pirate race”, “special report (india).
Cmdr. bluefin (usn) 2015 “great pirate race”, “special report (india).Cmdr. bluefin (usn) 2015 “great pirate race”, “special report (india).
Cmdr. bluefin (usn) 2015 “great pirate race”, “special report (india).Louis Charles Hamilton II
 

En vedette (6)

Child faces 2
Child faces 2Child faces 2
Child faces 2
 
Negro plaintiff factual asset summary ii on harry c. arthur esq. et al
Negro plaintiff factual asset summary ii on harry c. arthur esq. et alNegro plaintiff factual asset summary ii on harry c. arthur esq. et al
Negro plaintiff factual asset summary ii on harry c. arthur esq. et al
 
Hist 142 Pp by David Diaz
Hist 142 Pp by David DiazHist 142 Pp by David Diaz
Hist 142 Pp by David Diaz
 
To: Live and Die in LDS Mormon..."Salt Lake City" Utah
To: Live and Die in LDS Mormon..."Salt Lake City" UtahTo: Live and Die in LDS Mormon..."Salt Lake City" Utah
To: Live and Die in LDS Mormon..."Salt Lake City" Utah
 
Router bridge
Router bridgeRouter bridge
Router bridge
 
Cmdr. bluefin (usn) 2015 “great pirate race”, “special report (india).
Cmdr. bluefin (usn) 2015 “great pirate race”, “special report (india).Cmdr. bluefin (usn) 2015 “great pirate race”, “special report (india).
Cmdr. bluefin (usn) 2015 “great pirate race”, “special report (india).
 

Similaire à Rfid seminar

RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) Chetan Pandey
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in librariesShivashish Verma
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identificationRavi Teja
 
Retail Experience - RFID in Retail
Retail Experience - RFID in RetailRetail Experience - RFID in Retail
Retail Experience - RFID in RetailHershey Desai
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptxlisbala
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technologyAbdullah Khosa
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxKondiVinay
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 
Radio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfRadio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfarchiesgallery
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Liz Sims
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersPOXO RFID AUTOMATION
 

Similaire à Rfid seminar (20)

RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
6 - Barcodes and RFID
6  - Barcodes and RFID6  - Barcodes and RFID
6 - Barcodes and RFID
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in libraries
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
Retail Experience - RFID in Retail
Retail Experience - RFID in RetailRetail Experience - RFID in Retail
Retail Experience - RFID in Retail
 
RFID
RFID RFID
RFID
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technology
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
 
Rfid sourya cse
Rfid sourya cseRfid sourya cse
Rfid sourya cse
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid
RfidRfid
Rfid
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Radio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfRadio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdf
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturers
 

Plus de Mir Majid

Use case diagrams
Use case diagramsUse case diagrams
Use case diagramsMir Majid
 
Dfd and flowchart
Dfd and flowchartDfd and flowchart
Dfd and flowchartMir Majid
 
.Net framework interview questions
.Net framework interview questions.Net framework interview questions
.Net framework interview questionsMir Majid
 
My sql technical reference manual
My sql technical reference manualMy sql technical reference manual
My sql technical reference manualMir Majid
 
Holographic memory
Holographic memoryHolographic memory
Holographic memoryMir Majid
 
Simulation programs
Simulation programsSimulation programs
Simulation programsMir Majid
 
8086 assembly language
8086 assembly language8086 assembly language
8086 assembly languageMir Majid
 
Compiler Design
Compiler DesignCompiler Design
Compiler DesignMir Majid
 
Lessons from life_2
Lessons from life_2Lessons from life_2
Lessons from life_2Mir Majid
 
Time management
Time managementTime management
Time managementMir Majid
 
Lest weforget
Lest weforget Lest weforget
Lest weforget Mir Majid
 
E hospital manager
E hospital managerE hospital manager
E hospital managerMir Majid
 

Plus de Mir Majid (18)

Use case diagrams
Use case diagramsUse case diagrams
Use case diagrams
 
Dfd and flowchart
Dfd and flowchartDfd and flowchart
Dfd and flowchart
 
.Net framework interview questions
.Net framework interview questions.Net framework interview questions
.Net framework interview questions
 
My sql technical reference manual
My sql technical reference manualMy sql technical reference manual
My sql technical reference manual
 
Dotnet basics
Dotnet basicsDotnet basics
Dotnet basics
 
Holographic memory
Holographic memoryHolographic memory
Holographic memory
 
Data recovery
Data recoveryData recovery
Data recovery
 
Simulation programs
Simulation programsSimulation programs
Simulation programs
 
8086 assembly language
8086 assembly language8086 assembly language
8086 assembly language
 
Compiler Design
Compiler DesignCompiler Design
Compiler Design
 
Assembler
AssemblerAssembler
Assembler
 
Lessons from life_2
Lessons from life_2Lessons from life_2
Lessons from life_2
 
Time management
Time managementTime management
Time management
 
Lest weforget
Lest weforget Lest weforget
Lest weforget
 
E hospital manager
E hospital managerE hospital manager
E hospital manager
 
Crypt
CryptCrypt
Crypt
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Rfid
RfidRfid
Rfid
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Rfid seminar

  • 1. SEMINAR : RADIO FREQUENCY IDENTIFICATION What is RFID? 1. It is a method to automatically identify objects, animals or people by means of radio waves. 2. This means RFID devices (spy-chips) are attached to the object that we wish to identify. 3. In case of objects the RFID device is glued on it. 4. In case of animals the tag is injected. 5. In case of humans the wrist-band that a person wears contains RFID device. Is this only automatic identification technology? 1. Certainly not, the most commonly used identification technology that all of us know, is the barcode. 2. This is set of funny thick and thin lines that we see on all items, be they computer parts or shampoo bottles. 3. What do they do? They help identify what the item is, who made it and such kind of information. 4. For example, consider your library ID card number that is represented by barcode. The barcode scanner scans this barcode and hence the number. The scanner is connected to a database and this number points to the rest of information which includes name-of-person, date-of-birth, residence etc. But you must be thinking, even a barcode reader can do same function as RFID reader, so what is the point? 1. Well a barcode reader can read a barcode one at a time. One RFID reader can identify hundreds of tags in its range within a fraction of a second. 2. Barcode reader requires clear line of sight. Barcodes get dirty and damaged. In case of RFID line of sight is not required, even in case of dirtying they are still visible to the reader. Components of a RFID System: 1. A transponder or tag consisting of a microchip and an antenna. Information to be processed is written in microchip. The antenna is used to emit/receive radio signals. 1
  • 2. 2. An transceiver or reader consisting of a transceiver, decoder, and antenna. The transceiver is used to receive radio signals which are decoded to byte stream by decoder. The antenna is used to emit/receive radio signals. How does a RFID system work? 1. The object to be tracked is affixed with a RFID tag or transponder. A RFID tag can store up to 2000 bits of information 2. The reader is kept at some distance 3. When the object containing RFID tag comes within the range of radio signals emitted by the reader, the tag is activated and it starts sending the information stored in it in the form of radio signals. 4. The reader captures the radio signals, decodes it to a byte stream, and sends the information for further processing to the host system connected to it. So what is the use of RFID? These are not the only applications. By studying these applications you can come up with your own application. Animal Identification. 1. Injectable RFID tags are used for animals today. The number of RFID tag is unique and cannot be altered. 2. These tags were easily read from the distance, with a hand held reader. 3. The reader is connected to a remote database which correlates the unique RFID tag number on the animal with other data like.  Distinguishing features of the animal.  Last vaccination done.  or whether it is a pet animal or wild tiger or endangered species. Anti – Theft System. 1. In past the only anti-theft systems were CCTV ( Closed Circuit TV ) cameras and watchful security guards. 2. Ofcourse cameras are useful. But mostly they are useful only after a theft has taken place. 3. And what if the security guard in the jewelry Shop picks small item (say a diamond ring). 4. RFID technology is used to trigger the alarm when somebody tries to walk off through the door antenna with an item without paying for it. Luggage Handling 1. Lost or misplaced luggage takes up large chunk of an airlines headache list. 2. Ofcourse airline luggage is fixed with barcode tags at the time of luggage check- in. 3. Unfortunately, the reader cannot read all barcode tags because, barcode reader requires a clear line of sight, and the luggage article may get bunched together because the careless loading of the staff. This makes barcode labels not only unreadable and damaged but labels themselves are lost. 2
  • 3. 4. Instead of ordinary barcode labels we can use RFID tags. The RFID readers have several advantages over over barcode readers like:  Many bags can read at one time.  No problem of misaligned and dirty. Blood Banks 1. In typical hospital emergency room, the patient himself is asleep or unconscious, unable to talk or communicate or talk. 2. Typically patient is not known personally to nurse. 3. The nurse gets confused and hence transfuses the wrong blood or contaminated blood. What happens, patient will sleep forever (in other words get killed). 4. The RFID solution is to embed a tag into the blood bag. 5. The nurse who transfuses the blood can scan the bag before transferring; 6. the patient has also wrist-band RFID tag which identifies him uniquely. 7. In case of wrong blood a reader can throw warning. 8. The patient will be grateful to the technology, if he knew what was about to happen with him. Office printers and cartridges. 1. Have you faced a problem when your printer gave you an ink low alarm, and you spent a lot of time searching which new print cartridge could be compatible with your “out of ink” printer. 2. The RFID solution is to embed RFID tags inside both print cartridges and the printers. 3. Before opening the seal, the printers RFID reader senses the cartridges RFID tag and displays the message on PC which is attached to the printer. The message could be a warning like “STOP This Cartridge is not suitable for me” 3