SlideShare uma empresa Scribd logo
1 de 31
BARCODE
& RFID
TECHNOLOGY
DEFINITION OF BARCODE TECHNOLOGY
A barcode is series of bars and spaces arranged to
a set of rules that determines how data is to be
represented. Different bars and spaces patterns are
used to express different symbols. These symbols
are readable only by a scanner. In fact, barcode
technology is an identification tool that provides an
accurate and timely support of the data requirement
for proper management systems.
FUNDAMENTAL REQUIREMENTS
 The fundamental requirements of
Barcode technology can be
categorized
 Hardware requirements
 Software requirements
HARDWARE REQUIREMENTS
 The following hardware will be required for
implementing barcode technology:
 i)Scanner: is required for reading and scanning the
information.
 ii)Printers: Three categories of the barcode printers
are available, which are as follows: Laser printers,
Thermal printers and Impact printers.

 Each technology is suited for certain kinds of
applications, and no one technology is best for all.
 iii)Decoder
 iv)Data entry terminal
SOFTWARE REQUIREMENTS
◊ The following software will be
required to implement the barcode
technology :
a) Application software
b) System software
USE AND APPLICATION OF BARCODE TECHNOLOGY
Member identification :
The barcode can be useful for checking
the authorized user of the library. A
barcode reader can be installed at the
gate of the information institutions to give
permit to the valid user of the information
institution or library. The computer will
provide the alarm and thus restricts the
entry of the illegal user.
USE AND APPLICATION OF BARCODE TECHNOLOGY
Circulation:
In barcode environment, the tedious process
of issue and return can be avoided. The
information user can submit his/her identity
cards to activate the borrowing status. This
step, computer scan the documents for
accession number and is issues to the user.
USE AND APPLICATION OF BARCODE TECHNOLOGY
User statistics
The barcode facilitates in preparing the list
of the user who are using of the library and
their arrival and departure time and can
avoid doing entries in the register manually.
USE AND APPLICATION OF BARCODE TECHNOLOGY
Checking the gate :
When user leaves the library with the
documents library with the documents , the
accession number of that document can be
scanned by the scanner informed whether it
is issued or not.
USE AND APPLICATION OF BARCODE TECHNOLOGY
Issue of no due certificate:
When a member leaves the organization, his
membership is cancelled and the information
institutions no due certificate. This
processes is time consumed than traditional
systems.
USE AND APPLICATION OF BARCODE TECHNOLOGY
Stock verification:
Weeding out of the resources and updating of
records also become simpler through this
process. This technology helps to verify the
stock of the information institutions
systematically, quickly and accurately.
MERITS OF BARCODE TECHNOLOGY
Professional efficiency and quality of
services-
Barcode technology improves the
efficiency of the information
professionals and the quality of the
information services.
MERITS OF BARCODE TECHNOLOGY
Accelerate the functions/operations-
It increases the operations of information
services.
Space saved-
The space of preserving the borrowers
card and the catalogue card can be saved.
.
MERITS OF BARCODE TECHNOLOGY
Increase the accuracy of services-
It increases and ensures the accuracy of
information services.
Time saved-
Save the time of the users as well as
information professionals.
MERITS OF BARCODE TECHNOLOGY
Data integrity-
It ensures data integrity and data
consistency.
Creates positive user attitude-
It creates and establishes positive user
attitudes towards the information institutions.
DEMERITS OF BARCODE TECHNOLOGY
Lack of consciousness among the users-
The user may not press the barcode identity
card on the scanner kept on the main gate. One
staff has to be deputed at the gate for checking
whether users are pressing their identity card or
not.
In case of violation of law, one employee needed-
If any user violate any rule, one employee has
to be there for instant checking.
DEMERITS OF BARCODE TECHNOLOGY
Problems of internet and electricity-
At the circulation section, the network systems
and electricity problems should not come in this
process otherwise these weakness decrease the
efficiency of the system.
Problems of pasting barcode labels-
To paste the barcode labels and to scan the
barcodes from the documents is time consuming.
DEMERITS OF BARCODE TECHNOLOGY
Problems of software-
If the library automation software is not efficient,
it may create problems to use barcode technology.
Costly-
To make the infrastructure for barcode
technology, it will require adequate funds. So
barcode technology is costly.
DEFINITION OF RFID
RFID is an automatic identification
technology that can be used to provide
electronic identity to an item object.
A typical RFID system consists of
transponders (tags ), readers(s), antennas
and host (computer to process the data).
RFID MIDDLEWARE
Radio Frequency Identification (RFID)
middleware is a new class of software which
facilities data and information communication
between automatic identification physical layer
and enterprise applications. It provides a
distributed environment to process the data
form tags read by the readers, translates the
data where necessary and routes it to a variety
of backend applications using suitable
technologies such as WEB, remote and
Windows Services.
BENEFITS OF RFID:
 Automatic monitoring without the staff
realize.
 No need enforcement
 Low cost due to the less number of controller
and reader.
 More coverage- Cover wider area
 Less maintenance
RFID ARCHITECTURE:
HOW IT WORKS:
 It provides a distributed environment to
 process the data form tags read by the
readers
 Translates the data where necessary
 Routs it to a variety of backend applications
using suitable technologies such as Web,
Remote and Windows Service.
WHY IT IS IMPORTANT
 Towards this end , industry is looking for a
new paradigm which can provide
 Real time visibility for most of the activities to
the collaborating partners involved
 Activities which are in the forefront of this
plan, are management and tracking theft
prevention access restrictions and security
hazardous material management and others.
UNIQUENESS OF RFID:
 RFID does not require line of sight access to
communicate
 Without requiring physical contact
 Multiple tags can be identified
 Tags mounted on products of consignments
can survive in harsh environments such as
extreme temperatures, moisture and tough
handling.
RFID FEATURES :
The strong interest shown by industry in RFID is
mainly on account of the following features which
potentially would lead to better business and
workflow process:
 Tags can store or archive data which can be updated
during various stages of the process
 Automation of data collection at a huge rate
climinating the need for manual scanning
 Accurate data collection hence less problems due to
erroneous data for decision making.
 Less handling of goods and hence less labor required
simultaneously identification of multiple tagged items
in the read area.
RECOMMENDATION :
 To install REFID system at strategic location
 Comprehensive Design to ensure the full
coverage
 Embedded exiting staff card with RFID Chip.
BARCODE VS RFID TECHNOLOGY
What is it?
A barcode is a visual representation of data
that is scanned and interpreted for
information. Each barcode contains a certain
code which works as a tracking technology
for products.
Radio Frequency-Identification technology
(RFID) involves a tag affixed to a product
which identifies and tracks the product via
radio waves.
Barcode RFID
A barcode is a visual
representation of data
that is scanned and
interpreted for
information. Each
barcode contains a
certain code which
works as a tracking
technology for
products.
.
Radio Frequency-
Identification technology
(RFID) involves a tag
affixed to a product which
identifies and tracks the
product via radio waves.
BARCODE VS RFID TECHNOLOGY
 advantage
 Barcodes have less security than RFID; as
they can be more easily reproduced or
forged
Barcode RFID
Barcodes have less
security than RFID; as they
can be more easily
reproduced or forged
Much smaller and lighter
than RFID tags and
therefore easier to use.
The security system of RFID
is better than barcodes.
Can read RFID tags from a
greater distance than
barcodes.
BARCODE VS RFID TECHNOLOGY
Barcode RFID
B-Less expensive than RFID
tags; as barcodes are directly
printed onto plastic or paper
materials
Barcodes have only reading
capabilities
In many cases; barcode
accuracy has been said to be
the same or even better than
RFID tags.
RFID technology is more expensive
than barcode technology.
RFID tags are read/write devices
On the other hand, RFID tags are
less accurate than barcode
technology in some cases.
BARCODE VS RFID TECHNOLOGY
 Disadvantages
Barcode RFID
Barcode scanners need a
direct line of sight to the
barcode to be able to
read.
In order to read the
barcode, the barcode
scanner needs to be quite
close; around no more
than 15ft
Can read RFID tags from a
greater distance than
barcodes.
. RFID tags don’t need to
be positioned in a line of
sight with the scanner.

Mais conteúdo relacionado

Mais procurados

APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIANAPPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIANKartika Mahajan
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology pptNeeta Chavare
 
Electronic Toll Collection System
Electronic Toll Collection SystemElectronic Toll Collection System
Electronic Toll Collection SystemRajan Bairasriya
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
Library management system using rfid
Library management system using rfidLibrary management system using rfid
Library management system using rfidNaveen Sihag
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareMuhammed Afsal Villan
 
RFID for Modern libraries
RFID for Modern libraries RFID for Modern libraries
RFID for Modern libraries K L universityH
 
seminar-on-barcodes
seminar-on-barcodesseminar-on-barcodes
seminar-on-barcodesalibefkani
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identificationbansarirajani
 
Automation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDAutomation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDSudher Sun
 
Barcode latest technology1
Barcode latest technology1Barcode latest technology1
Barcode latest technology1dhananajay95
 
Smart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controllingSmart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controllingPranav Veerani
 

Mais procurados (20)

APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIANAPPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology ppt
 
RFID
RFIDRFID
RFID
 
Electronic Toll Collection System
Electronic Toll Collection SystemElectronic Toll Collection System
Electronic Toll Collection System
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Library management system using rfid
Library management system using rfidLibrary management system using rfid
Library management system using rfid
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and Hardware
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Bar code technology
Bar code technologyBar code technology
Bar code technology
 
Barcode
BarcodeBarcode
Barcode
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
RFID for Modern libraries
RFID for Modern libraries RFID for Modern libraries
RFID for Modern libraries
 
seminar-on-barcodes
seminar-on-barcodesseminar-on-barcodes
seminar-on-barcodes
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
Automation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDAutomation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFID
 
Barcode latest technology1
Barcode latest technology1Barcode latest technology1
Barcode latest technology1
 
RFID
RFIDRFID
RFID
 
Smart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controllingSmart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controlling
 

Destaque

Technology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesTechnology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesHoueida Kammourié
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013JASON WOODHOUSE
 
Barcode history and Future
Barcode history and Future Barcode history and Future
Barcode history and Future Maruf Alom
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainExistco Pty Ltd
 
Barcode technology
Barcode technologyBarcode technology
Barcode technologyPRANJAL SONI
 
Documentation on barcode technology
Documentation on barcode technologyDocumentation on barcode technology
Documentation on barcode technologybhupathi vikas
 
Barcode scanner
Barcode scannerBarcode scanner
Barcode scanneryanie88
 
Regulatory aspect of barcode technology
Regulatory aspect of barcode technologyRegulatory aspect of barcode technology
Regulatory aspect of barcode technologyDeveshDRA
 
Bedside Barcoding1
Bedside  Barcoding1Bedside  Barcoding1
Bedside Barcoding1ctheisen
 
vrushabh sahare barcoding presentation
vrushabh sahare   barcoding presentationvrushabh sahare   barcoding presentation
vrushabh sahare barcoding presentationAkash Maurya
 
Informatics Infrastructure at the start of the Second Decade of DNA Barcoding
Informatics Infrastructure at the start of the Second Decade of DNA BarcodingInformatics Infrastructure at the start of the Second Decade of DNA Barcoding
Informatics Infrastructure at the start of the Second Decade of DNA Barcodingsratnasi
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readersadil529
 
barcodes [Recovered]
barcodes [Recovered]barcodes [Recovered]
barcodes [Recovered]dherendra dev
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFIDDevnology
 
Power line communication
Power line communicationPower line communication
Power line communicationAhmad AL CHAMI
 
"The Barcode" Presentation
 "The Barcode" Presentation  "The Barcode" Presentation
"The Barcode" Presentation sh94880
 

Destaque (19)

Technology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesTechnology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. Barcodes
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013
 
Barcode history and Future
Barcode history and Future Barcode history and Future
Barcode history and Future
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply Chain
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Documentation on barcode technology
Documentation on barcode technologyDocumentation on barcode technology
Documentation on barcode technology
 
Barcode scanner
Barcode scannerBarcode scanner
Barcode scanner
 
Regulatory aspect of barcode technology
Regulatory aspect of barcode technologyRegulatory aspect of barcode technology
Regulatory aspect of barcode technology
 
Bedside Barcoding1
Bedside  Barcoding1Bedside  Barcoding1
Bedside Barcoding1
 
vrushabh sahare barcoding presentation
vrushabh sahare   barcoding presentationvrushabh sahare   barcoding presentation
vrushabh sahare barcoding presentation
 
Informatics Infrastructure at the start of the Second Decade of DNA Barcoding
Informatics Infrastructure at the start of the Second Decade of DNA BarcodingInformatics Infrastructure at the start of the Second Decade of DNA Barcoding
Informatics Infrastructure at the start of the Second Decade of DNA Barcoding
 
Uses of Special Airspace
Uses of Special AirspaceUses of Special Airspace
Uses of Special Airspace
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readers
 
barcodes [Recovered]
barcodes [Recovered]barcodes [Recovered]
barcodes [Recovered]
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFID
 
Silchar paper final
Silchar paper finalSilchar paper final
Silchar paper final
 
Power line communication
Power line communicationPower line communication
Power line communication
 
"The Barcode" Presentation
 "The Barcode" Presentation  "The Barcode" Presentation
"The Barcode" Presentation
 
Google Glass
Google GlassGoogle Glass
Google Glass
 

Semelhante a Bar code VS RFID

RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINOIJMTST Journal
 
RFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationRFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationIRJET Journal
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisSMO Clicks
 
-How does RFID work and differentiate with bar coding. Also what is .pdf
-How does RFID work and differentiate with bar coding. Also what is .pdf-How does RFID work and differentiate with bar coding. Also what is .pdf
-How does RFID work and differentiate with bar coding. Also what is .pdfAKSHATELECTRICALGHAT
 
SUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRY
SUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRYSUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRY
SUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRYSyed Nizamudeen
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
How does RFID work and differentiate with bar coding. Also what is th.pdf
 How does RFID work and differentiate with bar coding. Also what is th.pdf How does RFID work and differentiate with bar coding. Also what is th.pdf
How does RFID work and differentiate with bar coding. Also what is th.pdfakcopier1
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and ArduinoIRJET Journal
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemlaharipothula
 

Semelhante a Bar code VS RFID (20)

Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
RFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationRFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket Automation
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | Identis
 
-How does RFID work and differentiate with bar coding. Also what is .pdf
-How does RFID work and differentiate with bar coding. Also what is .pdf-How does RFID work and differentiate with bar coding. Also what is .pdf
-How does RFID work and differentiate with bar coding. Also what is .pdf
 
SUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRY
SUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRYSUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRY
SUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRY
 
Avi solution2
Avi solution2Avi solution2
Avi solution2
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
Rfid
RfidRfid
Rfid
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
How does RFID work and differentiate with bar coding. Also what is th.pdf
 How does RFID work and differentiate with bar coding. Also what is th.pdf How does RFID work and differentiate with bar coding. Also what is th.pdf
How does RFID work and differentiate with bar coding. Also what is th.pdf
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and Arduino
 
Report
ReportReport
Report
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing system
 

Mais de Mubassira Mahmuda Supty (9)

Service innovation
Service innovationService innovation
Service innovation
 
Resource discovery tools
Resource discovery toolsResource discovery tools
Resource discovery tools
 
Data Flow Diagram or DFD
Data Flow Diagram  or DFDData Flow Diagram  or DFD
Data Flow Diagram or DFD
 
Undergraduate research
Undergraduate researchUndergraduate research
Undergraduate research
 
Communication
CommunicationCommunication
Communication
 
organizational structure of a library
organizational structure of a libraryorganizational structure of a library
organizational structure of a library
 
(E) service marketing triangle
(E) service marketing triangle(E) service marketing triangle
(E) service marketing triangle
 
secondary storage devices
secondary storage devicessecondary storage devices
secondary storage devices
 
output, processing, communication devices
output, processing, communication devicesoutput, processing, communication devices
output, processing, communication devices
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Bar code VS RFID

  • 2. DEFINITION OF BARCODE TECHNOLOGY A barcode is series of bars and spaces arranged to a set of rules that determines how data is to be represented. Different bars and spaces patterns are used to express different symbols. These symbols are readable only by a scanner. In fact, barcode technology is an identification tool that provides an accurate and timely support of the data requirement for proper management systems.
  • 3. FUNDAMENTAL REQUIREMENTS  The fundamental requirements of Barcode technology can be categorized  Hardware requirements  Software requirements
  • 4. HARDWARE REQUIREMENTS  The following hardware will be required for implementing barcode technology:  i)Scanner: is required for reading and scanning the information.  ii)Printers: Three categories of the barcode printers are available, which are as follows: Laser printers, Thermal printers and Impact printers.   Each technology is suited for certain kinds of applications, and no one technology is best for all.  iii)Decoder  iv)Data entry terminal
  • 5. SOFTWARE REQUIREMENTS ◊ The following software will be required to implement the barcode technology : a) Application software b) System software
  • 6. USE AND APPLICATION OF BARCODE TECHNOLOGY Member identification : The barcode can be useful for checking the authorized user of the library. A barcode reader can be installed at the gate of the information institutions to give permit to the valid user of the information institution or library. The computer will provide the alarm and thus restricts the entry of the illegal user.
  • 7. USE AND APPLICATION OF BARCODE TECHNOLOGY Circulation: In barcode environment, the tedious process of issue and return can be avoided. The information user can submit his/her identity cards to activate the borrowing status. This step, computer scan the documents for accession number and is issues to the user.
  • 8. USE AND APPLICATION OF BARCODE TECHNOLOGY User statistics The barcode facilitates in preparing the list of the user who are using of the library and their arrival and departure time and can avoid doing entries in the register manually.
  • 9. USE AND APPLICATION OF BARCODE TECHNOLOGY Checking the gate : When user leaves the library with the documents library with the documents , the accession number of that document can be scanned by the scanner informed whether it is issued or not.
  • 10. USE AND APPLICATION OF BARCODE TECHNOLOGY Issue of no due certificate: When a member leaves the organization, his membership is cancelled and the information institutions no due certificate. This processes is time consumed than traditional systems.
  • 11. USE AND APPLICATION OF BARCODE TECHNOLOGY Stock verification: Weeding out of the resources and updating of records also become simpler through this process. This technology helps to verify the stock of the information institutions systematically, quickly and accurately.
  • 12. MERITS OF BARCODE TECHNOLOGY Professional efficiency and quality of services- Barcode technology improves the efficiency of the information professionals and the quality of the information services.
  • 13. MERITS OF BARCODE TECHNOLOGY Accelerate the functions/operations- It increases the operations of information services. Space saved- The space of preserving the borrowers card and the catalogue card can be saved. .
  • 14. MERITS OF BARCODE TECHNOLOGY Increase the accuracy of services- It increases and ensures the accuracy of information services. Time saved- Save the time of the users as well as information professionals.
  • 15. MERITS OF BARCODE TECHNOLOGY Data integrity- It ensures data integrity and data consistency. Creates positive user attitude- It creates and establishes positive user attitudes towards the information institutions.
  • 16. DEMERITS OF BARCODE TECHNOLOGY Lack of consciousness among the users- The user may not press the barcode identity card on the scanner kept on the main gate. One staff has to be deputed at the gate for checking whether users are pressing their identity card or not. In case of violation of law, one employee needed- If any user violate any rule, one employee has to be there for instant checking.
  • 17. DEMERITS OF BARCODE TECHNOLOGY Problems of internet and electricity- At the circulation section, the network systems and electricity problems should not come in this process otherwise these weakness decrease the efficiency of the system. Problems of pasting barcode labels- To paste the barcode labels and to scan the barcodes from the documents is time consuming.
  • 18. DEMERITS OF BARCODE TECHNOLOGY Problems of software- If the library automation software is not efficient, it may create problems to use barcode technology. Costly- To make the infrastructure for barcode technology, it will require adequate funds. So barcode technology is costly.
  • 19. DEFINITION OF RFID RFID is an automatic identification technology that can be used to provide electronic identity to an item object. A typical RFID system consists of transponders (tags ), readers(s), antennas and host (computer to process the data).
  • 20. RFID MIDDLEWARE Radio Frequency Identification (RFID) middleware is a new class of software which facilities data and information communication between automatic identification physical layer and enterprise applications. It provides a distributed environment to process the data form tags read by the readers, translates the data where necessary and routes it to a variety of backend applications using suitable technologies such as WEB, remote and Windows Services.
  • 21. BENEFITS OF RFID:  Automatic monitoring without the staff realize.  No need enforcement  Low cost due to the less number of controller and reader.  More coverage- Cover wider area  Less maintenance
  • 23. HOW IT WORKS:  It provides a distributed environment to  process the data form tags read by the readers  Translates the data where necessary  Routs it to a variety of backend applications using suitable technologies such as Web, Remote and Windows Service.
  • 24. WHY IT IS IMPORTANT  Towards this end , industry is looking for a new paradigm which can provide  Real time visibility for most of the activities to the collaborating partners involved  Activities which are in the forefront of this plan, are management and tracking theft prevention access restrictions and security hazardous material management and others.
  • 25. UNIQUENESS OF RFID:  RFID does not require line of sight access to communicate  Without requiring physical contact  Multiple tags can be identified  Tags mounted on products of consignments can survive in harsh environments such as extreme temperatures, moisture and tough handling.
  • 26. RFID FEATURES : The strong interest shown by industry in RFID is mainly on account of the following features which potentially would lead to better business and workflow process:  Tags can store or archive data which can be updated during various stages of the process  Automation of data collection at a huge rate climinating the need for manual scanning  Accurate data collection hence less problems due to erroneous data for decision making.  Less handling of goods and hence less labor required simultaneously identification of multiple tagged items in the read area.
  • 27. RECOMMENDATION :  To install REFID system at strategic location  Comprehensive Design to ensure the full coverage  Embedded exiting staff card with RFID Chip.
  • 28. BARCODE VS RFID TECHNOLOGY What is it? A barcode is a visual representation of data that is scanned and interpreted for information. Each barcode contains a certain code which works as a tracking technology for products. Radio Frequency-Identification technology (RFID) involves a tag affixed to a product which identifies and tracks the product via radio waves. Barcode RFID A barcode is a visual representation of data that is scanned and interpreted for information. Each barcode contains a certain code which works as a tracking technology for products. . Radio Frequency- Identification technology (RFID) involves a tag affixed to a product which identifies and tracks the product via radio waves.
  • 29. BARCODE VS RFID TECHNOLOGY  advantage  Barcodes have less security than RFID; as they can be more easily reproduced or forged Barcode RFID Barcodes have less security than RFID; as they can be more easily reproduced or forged Much smaller and lighter than RFID tags and therefore easier to use. The security system of RFID is better than barcodes. Can read RFID tags from a greater distance than barcodes.
  • 30. BARCODE VS RFID TECHNOLOGY Barcode RFID B-Less expensive than RFID tags; as barcodes are directly printed onto plastic or paper materials Barcodes have only reading capabilities In many cases; barcode accuracy has been said to be the same or even better than RFID tags. RFID technology is more expensive than barcode technology. RFID tags are read/write devices On the other hand, RFID tags are less accurate than barcode technology in some cases.
  • 31. BARCODE VS RFID TECHNOLOGY  Disadvantages Barcode RFID Barcode scanners need a direct line of sight to the barcode to be able to read. In order to read the barcode, the barcode scanner needs to be quite close; around no more than 15ft Can read RFID tags from a greater distance than barcodes. . RFID tags don’t need to be positioned in a line of sight with the scanner.