SlideShare uma empresa Scribd logo
1 de 33
Automatic Identification And Data Capture
Technology
What is AIDC
•Automatic Identification and Data Capture (AIDC) is a broad category
of technologies used to collect information from an individual, object,
image or sound without manual data entry.
• Some of the technologies are Barcode, RFID, NFC, Biometrics and
many others
• These technologies aims at identifying an entity and ability to read and
process that identity
AUTO-ID
BIOMETRIC
RETINA FINGERPRINT
RFID
NFC
RFID :RADIO FREQUENCY IDENTIFICATION
•Radio-frequency identification (RFID) is the wireless non-contact use of radio-
frequency electromagnetic fields to transfer data for the purposes of
automatically identifying and tracking tags attached to assets.
• RFID is Fast and Reliable
• It does not require a physical line of sight or contact between reader and the
tagged item
COMPONENTS OF RFID:
 RFID Reader/Interrogator
RFID Tag/Transponder
RFID Antenna
RFID READER
• Brain of the RFID system
• Sometimes they are named as interrogator
• Transmit and receive radio waves in order to communicate with
RFID Tags
TYPES OF READERS
Fixed Reader Handheld Reader Integrated Reader
RFID ANTENNAS
•Antennas will allow the reader to transmit and receive signals
from the RFID Tags
• Antennas comes with various size, gain and polarization
•Gain – higher the gain, the more powerful the antenna. A higher
gain antenna will produce a larger field, thus extending read range
farther than a lower gain antenna.
LINEARLY POLARIZED CIRCULARLY POLARIZED
Broadcast electromagnetic waves on a
single plane
in a corkscrew-like fashion.
Horizontal plane/Vertical plane Right/Left hand circularly polarized
Greater read range Lesser read range
RFID tag must be fixed upon the same
plane as the antenna
RFID tag may be found in any
orientation
Polarization (horizontal) Circular Polarization (right-hand)
RFID TAGS
• it comprises of two parts antenna and a chip
• an antenna for transmitting and receiving signals, and an
RFID chip (or integrated circuit) which stores the tag’s ID
and other information.
RFID Tag
ACTIVE RFID PASSIVE RFID
Power Battery Operated No internal power
Communication Range Long Range(100+mtr ) Short Range (>10 mtr)
Tag Size
Varies depending on
application
“Sticker” to credit card
size
Fixed Infrastructure
Costs
Lower – cheaper
interrogators
Higher – fixed readers
Per Asset Variable Costs Higher – see tag cost Lower – see tag cost
Active RFID v/s Passive RFID
OPERATING FREQUENCIES
RFID
LF
( Low Frequency)
Frequency: 125- 134 kHz
HF
(High Frequency)
Frequency: 13.56 MHz
UHF
(Ultra High
Frequency)
Active
433 & 856- 960 MHz
Passive
856- 960 MHz
SHF
(Super High
Frequency)
2.45 GHz
Low Frequency Passive Reader
Operating Frequency: 125 - 134 kHz
Read Range: contact - 10 cm
Examples: Animal tracking, Access Control, Car Key-Fob,
Applications with high volumes of liquids and metals
Pros: work well around liquids and metals, global standards
Cons: very short read range, limited quantity of memory, low data
transmission rate (read very few tags at one one), high production
cost
High Frequency Passive Reader
Operating Frequency: 13.56 MHz
Read Range: contact - 30 cm
Examples: DVD Kiosks, Library Books, Personal ID cards,
Poker/Gaming Chips
Pros: NFC protocol
Cons: short read range, low data transmission rate (read fewer tags at
one time)
Ultra High Frequency Passive Reader
Operating Frequency: 856- 960 MHz
Read Range: near contact - 10+ meters
Examples: Supply Chain, High-volume Manufacturing, Electronic
tolls, Item Tracking, Asset Tracking
Pros: longer read range, lower cost per tag, wide range of tag sizes and
types, global standards, high data transmission rates (read more tags at
one time)
Cons: typically higher associated infrastructure cost, write small
amounts of data, high amount of interference from metal and liquids
Super High Frequency Active Reader
Operating Frequency: 2.45GHz
Read Range: up to 100 Meters
Examples: Vehicle and Cargo Tracking
Pros: Active tags can also be read while moving at 60 miles per
hour or more, with near 100 percent reliability.
Cons: active RFID tags are powered by a battery so will
eventually require replacing
RFID TAGS- on chip Memory
-Memory size varies from vendor to vendor
-Active tags have more memory than passive Tags
-Passive tags Memory size varies from few bits to 64KB
TAG TYPE MEMORY AVAILBLE
Active tags Varies from 16 bytes-128KB
License plate Tags 96 bits/128bits
CryptoRF Family 1k,2k,4k,8k,16k,32k,64k
Fujitsu Metal mount tags 8k
RFID STANDARD
EPCglobal Standards
Out Dated Standards
1)Class 0 2)Class 1
singulation is relatively slow when a large number of
tags are present.
Existing Standards
• Class 1 Gen2 (ISO 18000-6C)
Incompatible to previous Standards
The data rate can vary from 27 to 128 Kbps
ISO STANDARDS
18000–1: Generic parameters for air interfaces for globally
accepted frequencies
18000–2: Air interface for 135 KHz
18000–3: Air interface for 13.56 MHz
18000–4: Air interface for 2.45 GHz
18000–5: Air interface for 5.8 GHz
18000–6: Air interface for 860 MHz to 930 MHz
18000–7: Air interface at 433.92 MHz
Advantages of RFID System
•As no line-of-sight is required, tag placement is less
Constrained
•RFID tags have a longer read range than barcodes
•Tags can have read/write memory capability
•Many tags can be read simultaneously
•RFID tags can be combined with sensors
•Tags can locally store additional information; such
distributed data storage may increase fault tolerance of the
entire system,
• Reduces inventory control and provisioning costs,
APPLICATIONS
Document tracking/Library Management System:
Each document is tagged with a RFID tag and the document ID is
stored in DB, Personnel are also issued with RFID cards for issue and tracking
Readers are placed in entry/exit position and also at the issue desk and
dropdown box
• RTLS (Real Time Location Systems)
In some applications, you need to track the real-time location of assets,
employees, or customers. Whether you’re measuring the efficiency of
worker movements, the effectiveness of a store floor plan, or tracking
the location of valuable resources, RFID systems provide visibility in
any number of locations.
Automated Toll Collection
Electronic toll collection system allows the vehicle drivers to pass the
toll tax booths without stopping at the toll booths. The toll amount is deducted
from the RFID card. This RFID card is rechargeable and account is stored on the
records.
Attendance Tracking:
-helps to gather business intelligence at events like trade shows,
conferences, corporate functions, and other large gatherings.
-Attendee’s are given badges affixed with UHF RFID tags. Appropriately
placed RFID readers and antennas track the location of the RFID badges as
the attendee visits booths, seminars, product demos, and other events.
IT Asset Tracking:
-IT assets such as server blades, laptops, tablets, and other peripherals are
costly investments for any company, not to mention that information stored
on those items could prove detrimental in the wrong hands. IT asset tags
give your IT team the ability to quickly do an inventory count and make sure
everything is in place.
NFC – Near Field Communication
• It is a subset of RFID Technology
• It is a form of contactless communication between 2 devices
which uses RF waves
• operating frequency 13.56 MHz
• read range is about 10cm or less
• Supported data rates: 106, 212 or 424 kbit/s
Three Modes Of NFC
1. Card emulation mode: example e-payment
2. Peer to peer (Bluetooth like communication)
3. Reader/writer mode ex: advertisement (Smart Poster )
1. Card Emulation Mode:
This mode enables NFC-enabled devices to act like smart
cards, allowing users to perform transactions such as purchases,
ticketing, and transit access control with just a touch.
Benefits
- Physical object elimination(Credit cards, debit cards, paper based
tickets, physical keys)
2. Peer To Peer Mode:
Peer-to-peer mode enables two NFC-enabled devices to
communicate with each other to exchange information and share
files, so that users of NFC-enabled devices can quickly share
contact information and other files with a touch. For example, users
can share Bluetooth or WiFi link set-up parameters or exchange
data such as virtual business cards or digital photos.
3.Reader/Writer Mode:
Reader/writer mode enables NFC-enabled devices to read
information stored on inexpensive NFC tags embedded in smart
posters and displays, providing a great marketing tool for companies.
In reader/writer mode, the NFC-enabled device is capable of reading
NFC Forum-mandated tag types, such as a tag embedded in an NFC
smart poster.
NFC Tags-On chip Memory
Tag Type On Chip Memory
MIFARE Mini 320 Bytes
MIFARE 1k 1024 Bytes
MIFARE 4k 496 Bytes
MIFARE Ultralight 192 Bytes
MIFARE Plus 2/4 Kb
Applications
NFC applications can be split into four basic categories.
Touch and Go
•Applications such as access control or transport/event ticketing, where the user
only needs to bring the device storing the ticket or access code close to the reader.
• simple data capture applications, such as picking up an Internet URL from a
smart label on a poster.
Touch and Confirm
-Applications such as mobile payment
-confirm the interaction by entering a password or just
accepting the transaction.
Touch and Connect
Linking two NFC-enabled devices to enable peer to peer
transfer of data such as downloading music, exchanging
images or synchronizing address books.
.
Aidc technology

Mais conteúdo relacionado

Mais procurados

Computer Integrated Manufacturing
Computer Integrated Manufacturing  Computer Integrated Manufacturing
Computer Integrated Manufacturing suraj_21
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
Flexible manufacturing system(FMS).
Flexible manufacturing system(FMS).Flexible manufacturing system(FMS).
Flexible manufacturing system(FMS).Nitin Patil
 
Manual part programming
Manual part programmingManual part programming
Manual part programmingjntuhcej
 
Introduction to automation - Module 01
Introduction to automation - Module 01Introduction to automation - Module 01
Introduction to automation - Module 01Ameya Nijasure
 
COMPUTER AIDED PROCESS PLANNING (CAPP)
COMPUTER AIDED PROCESS PLANNING (CAPP)COMPUTER AIDED PROCESS PLANNING (CAPP)
COMPUTER AIDED PROCESS PLANNING (CAPP)Victor Al
 
Principles of Metal Cutting
Principles of Metal CuttingPrinciples of Metal Cutting
Principles of Metal Cuttingnmahi96
 
Flexible manufacturing systems
Flexible manufacturing systemsFlexible manufacturing systems
Flexible manufacturing systemsagisanyang dingalo
 
Applications of rfid
Applications of rfidApplications of rfid
Applications of rfidMandar Jagtap
 
Wire electric discharge machining
Wire electric discharge machiningWire electric discharge machining
Wire electric discharge machiningSumaiya Khan
 
Automation 2018
Automation  2018Automation  2018
Automation 2018vcdas
 
Tool changing mechanism in cnc machine
Tool changing mechanism in cnc machineTool changing mechanism in cnc machine
Tool changing mechanism in cnc machineBhaveshChaudhari21
 
Fluid power automation unit 1 introduction
Fluid power automation  unit 1 introductionFluid power automation  unit 1 introduction
Fluid power automation unit 1 introductionDineshS158
 

Mais procurados (20)

Computer Integrated Manufacturing
Computer Integrated Manufacturing  Computer Integrated Manufacturing
Computer Integrated Manufacturing
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Flexible manufacturing system(FMS).
Flexible manufacturing system(FMS).Flexible manufacturing system(FMS).
Flexible manufacturing system(FMS).
 
Manual part programming
Manual part programmingManual part programming
Manual part programming
 
Introduction to automation - Module 01
Introduction to automation - Module 01Introduction to automation - Module 01
Introduction to automation - Module 01
 
COMPUTER AIDED PROCESS PLANNING (CAPP)
COMPUTER AIDED PROCESS PLANNING (CAPP)COMPUTER AIDED PROCESS PLANNING (CAPP)
COMPUTER AIDED PROCESS PLANNING (CAPP)
 
Principles of Metal Cutting
Principles of Metal CuttingPrinciples of Metal Cutting
Principles of Metal Cutting
 
Flexible manufacturing systems
Flexible manufacturing systemsFlexible manufacturing systems
Flexible manufacturing systems
 
Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
 
FMEA - Electrical Motor
FMEA - Electrical MotorFMEA - Electrical Motor
FMEA - Electrical Motor
 
Robot Configuration - 2
Robot Configuration - 2Robot Configuration - 2
Robot Configuration - 2
 
Welding Robots
Welding RobotsWelding Robots
Welding Robots
 
Capp
CappCapp
Capp
 
Wire electric discharge machining
Wire electric discharge machiningWire electric discharge machining
Wire electric discharge machining
 
RFID
RFIDRFID
RFID
 
Automation 2018
Automation  2018Automation  2018
Automation 2018
 
Digital Manufacturing
Digital ManufacturingDigital Manufacturing
Digital Manufacturing
 
Tool changing mechanism in cnc machine
Tool changing mechanism in cnc machineTool changing mechanism in cnc machine
Tool changing mechanism in cnc machine
 
Robotics or Robot Technology
Robotics or Robot Technology Robotics or Robot Technology
Robotics or Robot Technology
 
Fluid power automation unit 1 introduction
Fluid power automation  unit 1 introductionFluid power automation  unit 1 introduction
Fluid power automation unit 1 introduction
 

Semelhante a Aidc technology

RFID And Application
RFID And ApplicationRFID And Application
RFID And ApplicationFishEyeBox
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.pptSaba651353
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industrybizpresenter
 
Selectingtags Final
Selectingtags FinalSelectingtags Final
Selectingtags FinalSeanWatson
 
Rfid technology
Rfid technologyRfid technology
Rfid technologyDeepak Raj
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentationAkash Maurya
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll taxangel300692
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
My best effort
My best effortMy best effort
My best effortsujataray
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identificationharoonahmed0044
 

Semelhante a Aidc technology (20)

RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And Application
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industry
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Selectingtags Final
Selectingtags FinalSelectingtags Final
Selectingtags Final
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
RFID
RFIDRFID
RFID
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll tax
 
Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
My best effort
My best effortMy best effort
My best effort
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 

Último

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Último (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Aidc technology

  • 1. Automatic Identification And Data Capture Technology
  • 2. What is AIDC •Automatic Identification and Data Capture (AIDC) is a broad category of technologies used to collect information from an individual, object, image or sound without manual data entry. • Some of the technologies are Barcode, RFID, NFC, Biometrics and many others • These technologies aims at identifying an entity and ability to read and process that identity
  • 4. RFID :RADIO FREQUENCY IDENTIFICATION •Radio-frequency identification (RFID) is the wireless non-contact use of radio- frequency electromagnetic fields to transfer data for the purposes of automatically identifying and tracking tags attached to assets. • RFID is Fast and Reliable • It does not require a physical line of sight or contact between reader and the tagged item
  • 5. COMPONENTS OF RFID:  RFID Reader/Interrogator RFID Tag/Transponder RFID Antenna
  • 6. RFID READER • Brain of the RFID system • Sometimes they are named as interrogator • Transmit and receive radio waves in order to communicate with RFID Tags TYPES OF READERS Fixed Reader Handheld Reader Integrated Reader
  • 7. RFID ANTENNAS •Antennas will allow the reader to transmit and receive signals from the RFID Tags • Antennas comes with various size, gain and polarization •Gain – higher the gain, the more powerful the antenna. A higher gain antenna will produce a larger field, thus extending read range farther than a lower gain antenna.
  • 8. LINEARLY POLARIZED CIRCULARLY POLARIZED Broadcast electromagnetic waves on a single plane in a corkscrew-like fashion. Horizontal plane/Vertical plane Right/Left hand circularly polarized Greater read range Lesser read range RFID tag must be fixed upon the same plane as the antenna RFID tag may be found in any orientation Polarization (horizontal) Circular Polarization (right-hand)
  • 9. RFID TAGS • it comprises of two parts antenna and a chip • an antenna for transmitting and receiving signals, and an RFID chip (or integrated circuit) which stores the tag’s ID and other information. RFID Tag
  • 10. ACTIVE RFID PASSIVE RFID Power Battery Operated No internal power Communication Range Long Range(100+mtr ) Short Range (>10 mtr) Tag Size Varies depending on application “Sticker” to credit card size Fixed Infrastructure Costs Lower – cheaper interrogators Higher – fixed readers Per Asset Variable Costs Higher – see tag cost Lower – see tag cost Active RFID v/s Passive RFID
  • 11. OPERATING FREQUENCIES RFID LF ( Low Frequency) Frequency: 125- 134 kHz HF (High Frequency) Frequency: 13.56 MHz UHF (Ultra High Frequency) Active 433 & 856- 960 MHz Passive 856- 960 MHz SHF (Super High Frequency) 2.45 GHz
  • 12. Low Frequency Passive Reader Operating Frequency: 125 - 134 kHz Read Range: contact - 10 cm Examples: Animal tracking, Access Control, Car Key-Fob, Applications with high volumes of liquids and metals Pros: work well around liquids and metals, global standards Cons: very short read range, limited quantity of memory, low data transmission rate (read very few tags at one one), high production cost
  • 13. High Frequency Passive Reader Operating Frequency: 13.56 MHz Read Range: contact - 30 cm Examples: DVD Kiosks, Library Books, Personal ID cards, Poker/Gaming Chips Pros: NFC protocol Cons: short read range, low data transmission rate (read fewer tags at one time)
  • 14. Ultra High Frequency Passive Reader Operating Frequency: 856- 960 MHz Read Range: near contact - 10+ meters Examples: Supply Chain, High-volume Manufacturing, Electronic tolls, Item Tracking, Asset Tracking Pros: longer read range, lower cost per tag, wide range of tag sizes and types, global standards, high data transmission rates (read more tags at one time) Cons: typically higher associated infrastructure cost, write small amounts of data, high amount of interference from metal and liquids
  • 15. Super High Frequency Active Reader Operating Frequency: 2.45GHz Read Range: up to 100 Meters Examples: Vehicle and Cargo Tracking Pros: Active tags can also be read while moving at 60 miles per hour or more, with near 100 percent reliability. Cons: active RFID tags are powered by a battery so will eventually require replacing
  • 16. RFID TAGS- on chip Memory -Memory size varies from vendor to vendor -Active tags have more memory than passive Tags -Passive tags Memory size varies from few bits to 64KB TAG TYPE MEMORY AVAILBLE Active tags Varies from 16 bytes-128KB License plate Tags 96 bits/128bits CryptoRF Family 1k,2k,4k,8k,16k,32k,64k Fujitsu Metal mount tags 8k
  • 17. RFID STANDARD EPCglobal Standards Out Dated Standards 1)Class 0 2)Class 1 singulation is relatively slow when a large number of tags are present. Existing Standards • Class 1 Gen2 (ISO 18000-6C) Incompatible to previous Standards The data rate can vary from 27 to 128 Kbps
  • 18. ISO STANDARDS 18000–1: Generic parameters for air interfaces for globally accepted frequencies 18000–2: Air interface for 135 KHz 18000–3: Air interface for 13.56 MHz 18000–4: Air interface for 2.45 GHz 18000–5: Air interface for 5.8 GHz 18000–6: Air interface for 860 MHz to 930 MHz 18000–7: Air interface at 433.92 MHz
  • 19. Advantages of RFID System •As no line-of-sight is required, tag placement is less Constrained •RFID tags have a longer read range than barcodes •Tags can have read/write memory capability •Many tags can be read simultaneously •RFID tags can be combined with sensors •Tags can locally store additional information; such distributed data storage may increase fault tolerance of the entire system, • Reduces inventory control and provisioning costs,
  • 20. APPLICATIONS Document tracking/Library Management System: Each document is tagged with a RFID tag and the document ID is stored in DB, Personnel are also issued with RFID cards for issue and tracking Readers are placed in entry/exit position and also at the issue desk and dropdown box
  • 21. • RTLS (Real Time Location Systems) In some applications, you need to track the real-time location of assets, employees, or customers. Whether you’re measuring the efficiency of worker movements, the effectiveness of a store floor plan, or tracking the location of valuable resources, RFID systems provide visibility in any number of locations.
  • 22. Automated Toll Collection Electronic toll collection system allows the vehicle drivers to pass the toll tax booths without stopping at the toll booths. The toll amount is deducted from the RFID card. This RFID card is rechargeable and account is stored on the records.
  • 23. Attendance Tracking: -helps to gather business intelligence at events like trade shows, conferences, corporate functions, and other large gatherings. -Attendee’s are given badges affixed with UHF RFID tags. Appropriately placed RFID readers and antennas track the location of the RFID badges as the attendee visits booths, seminars, product demos, and other events.
  • 24. IT Asset Tracking: -IT assets such as server blades, laptops, tablets, and other peripherals are costly investments for any company, not to mention that information stored on those items could prove detrimental in the wrong hands. IT asset tags give your IT team the ability to quickly do an inventory count and make sure everything is in place.
  • 25. NFC – Near Field Communication • It is a subset of RFID Technology • It is a form of contactless communication between 2 devices which uses RF waves • operating frequency 13.56 MHz • read range is about 10cm or less • Supported data rates: 106, 212 or 424 kbit/s
  • 26. Three Modes Of NFC 1. Card emulation mode: example e-payment 2. Peer to peer (Bluetooth like communication) 3. Reader/writer mode ex: advertisement (Smart Poster )
  • 27. 1. Card Emulation Mode: This mode enables NFC-enabled devices to act like smart cards, allowing users to perform transactions such as purchases, ticketing, and transit access control with just a touch. Benefits - Physical object elimination(Credit cards, debit cards, paper based tickets, physical keys)
  • 28. 2. Peer To Peer Mode: Peer-to-peer mode enables two NFC-enabled devices to communicate with each other to exchange information and share files, so that users of NFC-enabled devices can quickly share contact information and other files with a touch. For example, users can share Bluetooth or WiFi link set-up parameters or exchange data such as virtual business cards or digital photos.
  • 29. 3.Reader/Writer Mode: Reader/writer mode enables NFC-enabled devices to read information stored on inexpensive NFC tags embedded in smart posters and displays, providing a great marketing tool for companies. In reader/writer mode, the NFC-enabled device is capable of reading NFC Forum-mandated tag types, such as a tag embedded in an NFC smart poster.
  • 30. NFC Tags-On chip Memory Tag Type On Chip Memory MIFARE Mini 320 Bytes MIFARE 1k 1024 Bytes MIFARE 4k 496 Bytes MIFARE Ultralight 192 Bytes MIFARE Plus 2/4 Kb
  • 31. Applications NFC applications can be split into four basic categories. Touch and Go •Applications such as access control or transport/event ticketing, where the user only needs to bring the device storing the ticket or access code close to the reader. • simple data capture applications, such as picking up an Internet URL from a smart label on a poster.
  • 32. Touch and Confirm -Applications such as mobile payment -confirm the interaction by entering a password or just accepting the transaction. Touch and Connect Linking two NFC-enabled devices to enable peer to peer transfer of data such as downloading music, exchanging images or synchronizing address books. .