SlideShare a Scribd company logo
1 of 20
Download to read offline
Identify : RFID Ltd.
    Evacuation Tracking System

    Identify Limited
    2012




1          Nov, 2008 | © Copyright 2005, Identify Limited
Who is Identify Ltd?
Identify RFID
 Founded in 2002 with more than 5+ years               Business partner
 in prior RFID experiences
     RFID Ltd., 10M Registered Capital
     Identify Ltd., 1M Registered Capital
 World-class experiences in Technology,
 Implementation and Consultation
          US Governments : USDA, US
          Customs, Dept Homeland
          Security, US Treasury
          Auto-ID Center: Walmart, DHL
          pilot sites                       Identify
                                            99/28 Software Park, Chanwattana Rd
 Our services:                              Pakkred, Klong Grua, Nonthaburi 11120
     One-stop service for all RFID          Thailand
     hardware                               Tel: 662-582-3714-5
     RFID solution provider                 E-mail: info@id.co.th
     RFID consulting service                www.id.co.th
Some of our prestigious client references

                 Manufacturing
Some of our prestigious client references

                   Services
Evacuation Tracking System
Existing Evacuation Process

                              Work Load




               Current
              method to
               handle
What is RFID
  RFID is Radio Frequency Identification
      > Used for automatic identification or data collection (AIDC)
  Similar to bar code in concepts
      > RFID tag stores data ~ barcode label
      > RFID reader ~ barcode scanner
  Radio waves vs. Light waves
  No Line-Of-Sight required
  Read through various environment conditions
  One-way or Two-way (RO or RW)
Benefits of Identify Evacuation Solution
 Increase the safety in tracking people

  > Providing the real-time visibility into the location and identification of workers.

 Increase the efficiency in the evacuation operation.

  > Automatically locate the personnel within the premise

 Eliminate the human error of manual head counts

  > Reducing human intervention on people locating

 Speed up the evacuation process

 Reduce the manual overheads in undertaking evacuating tasks

 Fully integrate with access control system

  > Eliminate the need to operate two different systems.
IT Structure


          On line




               Off line
RFID Tag
           System support both passive and active tag
           Single register for both access control and emergency
           evacuation system.




                                                  Register RFID ID for
                                                  Individual person
IT Structure


          On line




               Off line
Identify Access Control
   Fully answer all access control requirements.


                      -Add/edit employee
                      -Authorized by department
                      -Authorized by door/reader
                      -Authorized by time


                      -Fix holidays and working day



                      -Fix door and reader
                      -Remote open the door
                      -Support both on-line & off line access
                      control
Access control
 Support both on-line and off line access control.
IT Structure


          On line




               Off line
RFID Evacuation
                  Start locating people
RFID Evacuation
                  Handheld
                  reader can
                  automatically
                  locate people
                  in 10-20 M
                  distance.

                  The persons in
                  the reader area
                  will be
                  displayed on
                  the pocket PC.
Benefits of Identify Evacuation Solution
 Fully integrate with access control system

  > Eliminate the need to operate two different systems.




                                                           Register RFID ID for
                                                           Individual person
Benefits of Identify Evacuation Solution
 Increase efficiency and safety in tracking people. Locating people can be done
 automatically.
Thank you

     And wish to have an opportunity
     to Serve you.


     http://www.id.co.th
     sale@id.co.th




20       Nov, 2008 | © Copyright 2005, Identify Limited

More Related Content

What's hot

Rfid parking for chaotic free parking
Rfid parking for chaotic free parkingRfid parking for chaotic free parking
Rfid parking for chaotic free parkingnephsystem
 
Rfid parking solution
Rfid parking solutionRfid parking solution
Rfid parking solutionnephsystem
 
Radio Frequency Identification Chip (RFID)
Radio Frequency Identification Chip (RFID)Radio Frequency Identification Chip (RFID)
Radio Frequency Identification Chip (RFID)kartik shah
 
TEAMLIFTSS_Company Profile current
TEAMLIFTSS_Company Profile currentTEAMLIFTSS_Company Profile current
TEAMLIFTSS_Company Profile currentVenkatesa Prasad
 
RFID integration at Toyota Parts Centre Europe
RFID integration at Toyota Parts Centre EuropeRFID integration at Toyota Parts Centre Europe
RFID integration at Toyota Parts Centre EuropeJurgen Geys
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsFIDO Alliance
 
Worldpay – FIDO-enabled Point of Sale
Worldpay – FIDO-enabled Point of SaleWorldpay – FIDO-enabled Point of Sale
Worldpay – FIDO-enabled Point of SaleFIDO Alliance
 
FIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO Alliance
 
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...FIDO Alliance
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technologyAbdullah Khosa
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
RFID technology
RFID technologyRFID technology
RFID technologyCheryl Lin
 
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. ProfileDolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profilenileshirathod
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsFIDO Alliance
 
Opportunity Lies in Threat
Opportunity Lies in ThreatOpportunity Lies in Threat
Opportunity Lies in ThreatSurajit Paul
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO Alliance
 
Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)FIDO Alliance
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyFIDO Alliance
 

What's hot (20)

Rfid parking for chaotic free parking
Rfid parking for chaotic free parkingRfid parking for chaotic free parking
Rfid parking for chaotic free parking
 
Rfid parking solution
Rfid parking solutionRfid parking solution
Rfid parking solution
 
Radio Frequency Identification Chip (RFID)
Radio Frequency Identification Chip (RFID)Radio Frequency Identification Chip (RFID)
Radio Frequency Identification Chip (RFID)
 
TEAMLIFTSS_Company Profile current
TEAMLIFTSS_Company Profile currentTEAMLIFTSS_Company Profile current
TEAMLIFTSS_Company Profile current
 
RFID integration at Toyota Parts Centre Europe
RFID integration at Toyota Parts Centre EuropeRFID integration at Toyota Parts Centre Europe
RFID integration at Toyota Parts Centre Europe
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
 
Worldpay – FIDO-enabled Point of Sale
Worldpay – FIDO-enabled Point of SaleWorldpay – FIDO-enabled Point of Sale
Worldpay – FIDO-enabled Point of Sale
 
FIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and Recommendations
 
RFID PPT
RFID PPTRFID PPT
RFID PPT
 
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technology
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
RFID technology
RFID technologyRFID technology
RFID technology
 
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. ProfileDolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profile
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
 
RFID
RFIDRFID
RFID
 
Opportunity Lies in Threat
Opportunity Lies in ThreatOpportunity Lies in Threat
Opportunity Lies in Threat
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
 
Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 

Similar to RFID Emergency Evacuation

Digital Identification Systems, pune, Security Solutions
Digital Identification Systems, pune, Security SolutionsDigital Identification Systems, pune, Security Solutions
Digital Identification Systems, pune, Security SolutionsIndiaMART InterMESH Limited
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Onyebuchi nosiri
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Onyebuchi nosiri
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxKondiVinay
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontrollerrajkanakaraj007
 
RFID based object detection
RFID based object detectionRFID based object detection
RFID based object detectionshahsamkit73
 
Input and output devices 2015
Input  and output devices 2015Input  and output devices 2015
Input and output devices 2015angelavalmont
 
12208914‐pss7
12208914‐pss712208914‐pss7
12208914‐pss7ka312312
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutionsashtopustech
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfidEcwayt
 

Similar to RFID Emergency Evacuation (20)

RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Digital Identification Systems, pune, Security Solutions
Digital Identification Systems, pune, Security SolutionsDigital Identification Systems, pune, Security Solutions
Digital Identification Systems, pune, Security Solutions
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
 
Rfid complete
Rfid completeRfid complete
Rfid complete
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
 
Rfid In IoT Development Services
Rfid In IoT Development Services Rfid In IoT Development Services
Rfid In IoT Development Services
 
RFID based object detection
RFID based object detectionRFID based object detection
RFID based object detection
 
PIA Internship P
PIA Internship PPIA Internship P
PIA Internship P
 
POXO RFID Access control ppt.pptx
POXO RFID Access control ppt.pptxPOXO RFID Access control ppt.pptx
POXO RFID Access control ppt.pptx
 
Input and output devices 2015
Input  and output devices 2015Input  and output devices 2015
Input and output devices 2015
 
Vrfid Asset Management
Vrfid Asset ManagementVrfid Asset Management
Vrfid Asset Management
 
RFID based Attendance System
RFID based Attendance SystemRFID based Attendance System
RFID based Attendance System
 
12208914‐pss7
12208914‐pss712208914‐pss7
12208914‐pss7
 
Avi solution2
Avi solution2Avi solution2
Avi solution2
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfid
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 

More from wn393

RFID Intelligent Cabinet
RFID Intelligent CabinetRFID Intelligent Cabinet
RFID Intelligent Cabinetwn393
 
Identify RFID Logistics
Identify RFID Logistics Identify RFID Logistics
Identify RFID Logistics wn393
 
Epc auto idtrackingcarbonemissions2-1
Epc auto idtrackingcarbonemissions2-1Epc auto idtrackingcarbonemissions2-1
Epc auto idtrackingcarbonemissions2-1wn393
 
Epc auto idtrackingcarbonemissions2-1
Epc auto idtrackingcarbonemissions2-1Epc auto idtrackingcarbonemissions2-1
Epc auto idtrackingcarbonemissions2-1wn393
 
Autoidlabs wp-bizapp-032
Autoidlabs wp-bizapp-032Autoidlabs wp-bizapp-032
Autoidlabs wp-bizapp-032wn393
 
Ayu 20110320 id
Ayu 20110320 idAyu 20110320 id
Ayu 20110320 idwn393
 
Identfiy wip monitoring_20110322_id
Identfiy wip monitoring_20110322_idIdentfiy wip monitoring_20110322_id
Identfiy wip monitoring_20110322_idwn393
 
Identify RFID Trailer Tracking
Identify  RFID Trailer TrackingIdentify  RFID Trailer Tracking
Identify RFID Trailer Trackingwn393
 

More from wn393 (8)

RFID Intelligent Cabinet
RFID Intelligent CabinetRFID Intelligent Cabinet
RFID Intelligent Cabinet
 
Identify RFID Logistics
Identify RFID Logistics Identify RFID Logistics
Identify RFID Logistics
 
Epc auto idtrackingcarbonemissions2-1
Epc auto idtrackingcarbonemissions2-1Epc auto idtrackingcarbonemissions2-1
Epc auto idtrackingcarbonemissions2-1
 
Epc auto idtrackingcarbonemissions2-1
Epc auto idtrackingcarbonemissions2-1Epc auto idtrackingcarbonemissions2-1
Epc auto idtrackingcarbonemissions2-1
 
Autoidlabs wp-bizapp-032
Autoidlabs wp-bizapp-032Autoidlabs wp-bizapp-032
Autoidlabs wp-bizapp-032
 
Ayu 20110320 id
Ayu 20110320 idAyu 20110320 id
Ayu 20110320 id
 
Identfiy wip monitoring_20110322_id
Identfiy wip monitoring_20110322_idIdentfiy wip monitoring_20110322_id
Identfiy wip monitoring_20110322_id
 
Identify RFID Trailer Tracking
Identify  RFID Trailer TrackingIdentify  RFID Trailer Tracking
Identify RFID Trailer Tracking
 

Recently uploaded

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Recently uploaded (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

RFID Emergency Evacuation

  • 1. Identify : RFID Ltd. Evacuation Tracking System Identify Limited 2012 1 Nov, 2008 | © Copyright 2005, Identify Limited
  • 3. Identify RFID Founded in 2002 with more than 5+ years Business partner in prior RFID experiences RFID Ltd., 10M Registered Capital Identify Ltd., 1M Registered Capital World-class experiences in Technology, Implementation and Consultation US Governments : USDA, US Customs, Dept Homeland Security, US Treasury Auto-ID Center: Walmart, DHL pilot sites Identify 99/28 Software Park, Chanwattana Rd Our services: Pakkred, Klong Grua, Nonthaburi 11120 One-stop service for all RFID Thailand hardware Tel: 662-582-3714-5 RFID solution provider E-mail: info@id.co.th RFID consulting service www.id.co.th
  • 4. Some of our prestigious client references Manufacturing
  • 5. Some of our prestigious client references Services
  • 7. Existing Evacuation Process Work Load Current method to handle
  • 8. What is RFID RFID is Radio Frequency Identification > Used for automatic identification or data collection (AIDC) Similar to bar code in concepts > RFID tag stores data ~ barcode label > RFID reader ~ barcode scanner Radio waves vs. Light waves No Line-Of-Sight required Read through various environment conditions One-way or Two-way (RO or RW)
  • 9. Benefits of Identify Evacuation Solution Increase the safety in tracking people > Providing the real-time visibility into the location and identification of workers. Increase the efficiency in the evacuation operation. > Automatically locate the personnel within the premise Eliminate the human error of manual head counts > Reducing human intervention on people locating Speed up the evacuation process Reduce the manual overheads in undertaking evacuating tasks Fully integrate with access control system > Eliminate the need to operate two different systems.
  • 10. IT Structure On line Off line
  • 11. RFID Tag System support both passive and active tag Single register for both access control and emergency evacuation system. Register RFID ID for Individual person
  • 12. IT Structure On line Off line
  • 13. Identify Access Control Fully answer all access control requirements. -Add/edit employee -Authorized by department -Authorized by door/reader -Authorized by time -Fix holidays and working day -Fix door and reader -Remote open the door -Support both on-line & off line access control
  • 14. Access control Support both on-line and off line access control.
  • 15. IT Structure On line Off line
  • 16. RFID Evacuation Start locating people
  • 17. RFID Evacuation Handheld reader can automatically locate people in 10-20 M distance. The persons in the reader area will be displayed on the pocket PC.
  • 18. Benefits of Identify Evacuation Solution Fully integrate with access control system > Eliminate the need to operate two different systems. Register RFID ID for Individual person
  • 19. Benefits of Identify Evacuation Solution Increase efficiency and safety in tracking people. Locating people can be done automatically.
  • 20. Thank you And wish to have an opportunity to Serve you. http://www.id.co.th sale@id.co.th 20 Nov, 2008 | © Copyright 2005, Identify Limited