🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

The Campus of Tomorrow Industrial & Logistics Engineering Technology Programs IET 2103 Technology Innovation and Integration Instructor: Dr. Hussni Farouk H. Al-Hajjar CLO1 – IET 2103 Technology Innovation and Integration Description Provides the foundation for automatically capturing data in a...

The Campus of Tomorrow Industrial & Logistics Engineering Technology Programs IET 2103 Technology Innovation and Integration Instructor: Dr. Hussni Farouk H. Al-Hajjar CLO1 – IET 2103 Technology Innovation and Integration Description Provides the foundation for automatically capturing data in a system. Topics include automatic identification and data capture systems including bar codes, radio frequency identification, smart cards, biometrics, and the integration of these technologies in problem solving. 2 CLO1 – IET 2103 Technology Innovation and Integration Course Learning Outcomes CLO 1: Describe the theory of Automatic Identification and Data Capture (AIDC) technology, and identify the interrelation between databases and AIDC technology CLO 2: Outline the basics of data carriers, structures, and standards in AIDC applications. CLO 3: Use common AIDC hardware and software in lab activities. CLO 4: Apply obtained skills in a real-life problem. 3 CLO1 – IET 2103 Technology Innovation and Integration Course Assessment Strategy Assessment Tool Weight % FWA Theoretical 20% FWA Practical 10% Midterm 20% Practical 20% Project 15% Quizzes 15% 4 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Definition: It Refers to the Methods of Automatically identifying objects, collecting data about them, and entering them directly into computer systems without human involvement. Also, it refers to convenient types of technologies which used to identify, verify and record data from any objects, image, sound using mathematical algorithms without human involvement. (AIDC Video) 5 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) important Three principles component; • Data encoding - Characters are readable to the machine. • Machine Scanning - Data converted into electric signals. ex:a scanner that scans the code • Data decoding - Transfer electrical signals ex:(0,1) into digital data which converted to Alphanumeric characters. 6 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Where is AIDC used? • Asset tracking, Automotive, Beverage • Chemical, Consumer goods, Electronics • Food, Healthcare, Library • Manufacturing, Medical devices and equipment • Paper, Pharmaceutical, Plastics • Point of sale, Retail • Transportation and logistics • Warehousing and distribution 7 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) How is AIDC used? • Assembly: Verification that the right component is selected for assembly • Order picking: Providing confirmation that the right item and quantity has been picked • Quality control: Directing a worker to a location and/or to perform a task and requiring confirmation • Replenishment: Confirmation that the right items are being restocked in the right locations • Storage: Verification that items are being stored in the correct location 8 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) AIDC Benefits: • Control : Technologies helps to maintain control over inventory from time of receipt through processing and to outbound shipping. • Identification : Easy to identify products or items by stock keeping unit (SKU) number. • Inventory accuracy : Because AIDC enables real-time monitoring of the number of units in a facility, it maintains an accurate count of inventory. 9 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Benefits (Cont.): • Location : Data collected by AIDC yields information about the location of stored products as well as open space available for storage. • Picking accuracy : Confirms the accuracy of items picked to fill orders, AIDC reduces errors. • Picking efficiency : AIDC eliminates paper-based picking, workers can fill more orders faster. • Visibility : AIDC aids in monitoring the completion of a processes. 10 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) AIDC Examples: Barcodes - Barcodes - Magnetic Stripes Voice Recognition RFID - Smart Card - Biometrics - Voice Recognition - Optical Character Recognition AIDC Optical Character Recognition Magnetic Stripes - RFID Biometrics Smart Card 11 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) AIDC Examples: - Barcodes Barcode - Magnetic Stripes - Smart Card Radio Frequency Identification (RFID) Voice Recognition AIDC - Biometrics - Voice Recognition - Optical Character Recognition - RFID Magnetic Stripes Optical Character Recognition Biometrics (Facial Recognition System) Smart Card 12 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) AIDC - Barcodes There are many various barcode symbologies, or languages. Every symbology has its own rules for encoding characters: - Linear or One-Dimensional (1D) Codes Originally barcodes systematically represented data by varying the widths and spacing's of parallel lines. - Matrix/Two-Dimensional (2D) Codes Were later developed, using rectangles, dots, hexagons and other geometric patterns in two dimensions. 13 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) AIDC – Barcodes Data encoding A barcode reader/scanner uses a laser beam that is sensitive to the reflections from the line and space thickness and variation. The reader translates information from the image to digital data and sends it to the computer for further process. The barcode reader/scanners carry with it an enclosed decoder and means of connection Wired/Wireless that are connected to the pc through compatible ports. It consists of a light-weight supply, a lens and a photograph conductor translating optical impulses into electrical ones. To boot, nearly all barcode readers contain decoder circuit. Advanced readers use laser-scanning technology. 14 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) AIDC - Barcodes at least 3 points from each Advantages: • • • • • • Easy to Set-Up and Use Accurate, enables fast data entry operations with less errors. Considerable Paper-Less Option Provides Real-time Data with the help of Barcode Readers. Low Cost to Implement. Smaller and lighter compare to RFID tags and easy to use. Disadvantages: • • • • Only Machine Readable (not readable by naked eyes) Cannot be used to read text directly (Text is encoded in numerical format). Less secure compare to RFID which can be easily forged. Requires optical line of sight (LOS) scanning. 15 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) AIDC – Barcodes: Examples Numeric-only barcodes • • • • • • • Codabar: Older code often used in library systems, sometimes in blood banks Code 11: Used primarily for labeling telecommunications equipment EAN-13: European Article Numbering international retail product code EAN-8: Compressed version of EAN code for use on small products Interleaved 2 of 5: Compact numeric code, widely used in industry, air cargo MSI: Variation of the Plessey code commonly used in USA Plessey: Older code commonly used for retail shelf marking Alpha-numeric barcodes Dimensional barcodes • • • • • Code 128: Very capable code, excellent density, high reliability; in very wide use world-wide Code 39: General-purpose code in very wide use world-wide Code 93: Compact code similar to Code 39 LOGMARS: Same as Code 39, this is the U.S. Government specification • • • PDF417: Excellent for encoding large amounts of data DataMatrix: Can hold large amounts of data, especially suited for making very small codes Maxicode: Fixed length, used by United Parcel Service for automated package sorting QR Code: Used for material control and order confirmation 16 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Barcodes: Data Matrix Data Matrix is a very efficient, two-dimensional (2D) barcode symbology that uses a small area of square modules with a unique perimeter pattern, which helps the barcode scanner determine cell locations and decode the symbol. Characters, numbers, text and actual bytes of data may be encoded, including Unicode characters and photos. 17 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Barcodes: Data Matrix Advantages: - One of the smallest and most dependable barcode symbologies, Compared to other barcode types, Data Matrix is approximately 30 times smaller than a Code 39 barcode representing the same data. - Suitable for Poor Resolution and Scanning Issues. Disadvantages: - Encoding and Decoding Process is very complex. - There is an overall character limit, so it is impractical for sending longer messages 18 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Barcodes: Quick Response Code (QR Code) A QR code consists of black squares arranged in a square grid on a white background (Matrix of vertical and horizontal lines, which can be read by an imaging device such as a camera, and processed using Reed–Solomon error correction until the image can be appropriately interpreted. A QR code uses four standardized encoding modes: - Numeric (0-9); - Alphanumeric (0-9 A-Z etc); - 8 bit-binary; and - Kanji Characters to efficiently store data; extensions may also be used. The required data is then extracted from patterns that are present in both horizontal and vertical components of the image (http://www.create-qr-codes.org/tools/encoder.html ) 19 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Barcodes: Quick Response Code (QR Code) Advantages: • High capacity encoding: It allows storage of many characters, whereas, a conventional barcode stores up to 20 digits. • Improved efficiency of information storage: It carries information both vertically and horizontally. QR code can store more information as compared to bar codes where information is not stored both ways. • Capabilities to store Kana and Kanji characters which helps QR code to store 20 percent more information in comparison to other means. • Damage resistance: QR codes are damage resistant and it can be restored even if it is dirty because it has error correction capabilities. In a partially damaged QR code, up to 30 percent of information which is represented in Code word which is the unit that constructs the data area. However, in case of extreme damage, the data may not be fully restored. 20 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Barcodes: Quick Response Code (QR Code) Advantages: omni:(in all directions) • Omni-directional encoding: The encoded form of QR codes is readable from various directions, which means that it’s omni-directional, it allows high speed reading. The QR codes can accomplish great tasks through position detection patterns which are located in 3 corners of the picture and the position detection system ensures fast reading and also reduces the effect of background interference. • Multiple data areas: QR codes are patterns which can be divided into many data areas and the information of QR codes can be designed into a single data structure. The data symbol can be divided into 16 symbols and it also allows printing the pattern on a narrow area. 21 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Magnetic Stripes Magnetic striped Card is a plastic card with a magnetic strip attached on its surface. This stripe is made of tiny iron-based components whose magnetism can be modified in different directions by a device that produces a strong magnetic field, encodes the required information onto the stripe which is then pasted on a plastic card, therefore information can be stored. It is sometimes called Swipe Card or Magistrate. Magnetic Stripes 22 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Magnetic Stripes Magnetic stripe technology allows data to be stored on a conventional plastic card by magnetically charging tiny bits within a magnetic stripe on one side of the card. This type of technology has largely built the new credit and debit card model, which has, to a certain extent, replaced cash transactions around the world. Magnetic Stripes 23 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Smart Card A smart card is a security token that has an embedded chip. They connect to a reader either by direct physical contact (also known as chip and dip) or through a short-range wireless connectivity standard such as Near Field Communication (NFC). The smart card is powered by an external source, usually a Smart Card Reader. Smart Card 24 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Smart Card A smart card can store much more data than a magnetic stripe card. It can be loaded with data, used for: • Telephone calling; • Electronic cash payments; • Accessing services, and other applications. The card can be refreshed for reuse. Some smart cards can include programming and support multiple applications. 25 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Smart Card Smart-Card Features that Protect Privacy • Authentication. Smart cards provide ways to authenticate others who want to gain access to the card. • Secure data storage. Smart cards provide a way to securely store data on the card. • Encryption. • Strong device security. • Secure communications. • Personal device. 26 CLO1 – IET 2103 Technology Innovation and Integration 27 Automatic Identification and Data Capture (AIDC) Smart Card: Advantages • Larger memory. • Represent liquidity • High levels of security and Privacy • Ensuring economic operations, Falling costs • Reduced fraud, 100% effective theft-proof. • Organized information • Reliability for operators and users. • Specific standards ISO 7810, 7811, 9992, 10536. • Information Security • Multiservice smart cards. • User comfort and ease of use without need for • Administration and control over cash connections online or via telephone payments. CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Smart Card: Disadvantages • A more powerful virus. • Discomfort to retrieve information from a stolen card. • For its size can be easily misled. • The card must be recharged. • Increased cost of production. • Dependence of electrical energy for use. • Vulnerable to fluids. • Bank fees associated with credit card. • We need a smart card reader. 28 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Optical Character Recognition (OCR) OCR technology refers to the recognition of printed or written text using ASCII code/ language characters by a computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing. On other words, any scanned document can be transformed into an editable and searchable document. Optical Character Recognition 29 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Optical Character Recognition (OCR) OCR processing • The scanned-in image or bitmap is analyzed for light and dark areas in order to identify each alphabetic letter or numeric digit. • Once a character is recognized, it is converted into an ASCII code (Special circuit boards and computer chips designed expressly for OCR are used to speed up the recognition process). • American Standard Code for Information Interchange (ASCII) Optical Character Recognition 30 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Optical Character Recognition (OCR) OCR is being used by libraries to digitize and preserve their holdings. OCR is also used to process checks and credit card slips and sort the mail. Billions of magazines and letters are sorted every day by OCR machines, considerably speeding up mail delivery. Optical Character Recognition 31 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Biometrics: “Biometrics are humans most unique physical (and behavioral) features that can be practically sensed and recognized by devices and interpreted by computers to reflect and to be used as proxies of our physical selves in the digital realm. Digital data and identity are bonded with permanency, consistency, and unambiguity, and can be retrieved using computers in a rapid and automated fashion.” Biometrics 32 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Biometrics: Facial Recognition Systems (FRS) A facial recognition system is a computer application capable of identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by Biometrics comparing selected facial features from the image and a face database. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems. Recently, it has also become popular as a commercial identification and marketing tool. FRS 33 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Biometrics: Facial Recognition Systems (FRS) nothing important Features: • Fast face processing: it preforms fast and accurate, where it can identify or detect the face quickly which save time. • Live face detection: the face recognition system can differentiate between a face in a photo and in real life. As it shows in the figure below, the system recognizes the person’s features for identification. • Multiple samples of the same face: face recognition system can recognize the person with different face expressions and positions. Biometrics 34 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Biometrics: Eyes – Iris Recognition Systems (ERS) Eyes - Iris Recognition is an automated method of biometric identification that uses mathematical pattern- Biometrics recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance. ERS 35 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Biometrics: Eyes – Iris Recognition Systems (ERS) Eyes - Iris Recognition Features: • Eye recognition (iris in particular) have high accuracy. • Eye (Iris) recognition counters low percentage of errors. • Eye (Iris) recognition systems are capable of handling a large number of people at high speed. It is recognized as fast and safe. • Eye (Iris) recognition systems search through huge databases. • Eye (Iris) recognition is stable and does not change with age. Biometrics 36 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Biometrics: Fingerprint Recognition System (FPRS) One of the fingerprint recognition system features is that it has high accuracy. As it shows in the figure below, that a scanner runs Biometrics through the finger that recognizes a pattern which identify the person. •It can search in large existing databases. •It has been proven that the fingerprint recognition is easy to use and performs well. •It is reliable an affordable. FPRS 37 CLO1 – IET 2103 Technology Innovation and Integration 38 Automatic Identification and Data Capture (AIDC) Biometrics: Advantages • Ease of use: It only takes a second to recognize a fingerprint and allow a user to access. • The hacker has to be near you: Hacker has to be physically near in order to collect the information required to avoid the login. Biometrics • Security: The provide different types of solutions which are nearly impossible to hack unlike passwords. • Accuracy: It works with users’ physical traits such as fingerprints, palm vein, retina amongst others that will always serve you accurately. • Accountability: It needs user direct interactions to login or pass the security system. • Flexibility: They are the most flexible security solution. User carries own security credentials without any need to create and memorize any complex password. • Save Time: They are highly time conserving as only placing a finger on the device or looking at a retina device is required to pass the system. CLO1 – IET 2103 Technology Innovation and Integration 39 Automatic Identification and Data Capture (AIDC) Biometrics: Disadvantages • You cannot revoke the fingerprint/iris/voice print remotely: You have to be physically near the device to change its initial, secure data set. • Biometrics last a lifetime: Modification is not an option for iris, retina or fingerprint. Once a working Biometrics copy of these is available there’s not much a user can do to stay safe, other than switching to passwords or using another finger. • Physical Traits Are Not Changeable: Most of the biometric forms work with physical unchangeable traits such as fingerprint, iris, palm vein, etc. • Error Rate: Biometric machines are less than perfect, and mistakes can happen. The error rate in some cases are so high that it creates great chaos for the entire security system. CLO1 – IET 2103 Technology Innovation and Integration 40 Automatic Identification and Data Capture (AIDC) Biometrics: Disadvantages (Cont.) • Cost: The cost of biometric devices are higher than other traditional security devices. Biometrics • Scanning Difficulty: Some biometric modalities like iris scan can go through scanning difficulties. It happens due to several reasons including eyelashes, eyelids, lens and reflections from the cornea. • Environment and Usage Matters: Environment and usage can affect the overall measurements taken. Especially in highly cold areas, the error rate is higher which creates unnecessary chaos and disappointments over the whole system. CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Voice Recognition System (VRS) Voice or Speech recognition refers to the ability of a machine or program to receive and interpret dictation, or to understand and carry out spoken commands. In general, it functions as follows: • The user speaks some words by invoking voice recognition on a mobile app. • The spoken words are processed by the recognition software and converted to text. • The converted text is then provided as input to the search mechanism, which returns the results. Voice Recognition 41 CLO1 – IET 2103 Technology Innovation and Integration Automatic Identification and Data Capture (AIDC) Biometrics: Voice Recognition Systems face the following difficulties: - Use of Microphones Biometrics - Environmental Noise - Poor Network Connection - Different Accents - Devices : Voice is converted from Analog into Digital Formats for Processing 42 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) 43 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) RFID refers to one commonly used method of Automatics Identification and Data Capture (AIDC). RFID is a form of automatic identification system that uses wireless networking to conduct communication between the system and a preidentified tag that can be attached to an object. It is a technology that works with Radiofrequency Waves to transmit signals to automatically communicate with, identify, categorize, and track any known object within its’ readers range. 44 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) RFID system has two components, RFID Reader and RFID Tag. RFID tag can come in different types Active Tag, Passive Tag, and Semi Passive power source(batter) no power source semi power source Tag. 45 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) RFID Tag Types 46 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) the purpose of the batter range between the reader and the tag can be larger distance Passive RFID systems use tags with no internal power source. They are powered by the electromagnetic energy transmitted from an RFID reader. Passive RFID tags are used for applications such as access control, file tracking, race timing, supply chain management, smart labels, and more. The lower price point per tag makes employing passive RFID systems economical for many industries. communication Active RFID systems use battery-powered RFID tags that continuously broadcast their own signal. Active RFID tags are commonly used as “beacons” to accurately track the real-time location of assets or in high-speed environments such as tolling. Active tags provide a much longer read range than passive tags, but they are also much more expensive. batter helps in two things to communicate with the reader and send information Semi Passive RFID systems are similar to Active RFID in being battery-powered for communication with RFID readers while depending on Electromagnetic Energy transmitted from an RFID reader to send required information. batter is only for communication send info using electromagnetic waves (like the passive) 47 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) Important RFID System • Passive RFID Tags RIFD Reader RIFD Antenna RIFD Tags • Tag’s Antenna • Microchip / Integrated Circuit • Active RFID Tags • Tag’s Antenna • Microchip / Integrated Circuit • Battery (Communication/Send) • Semi Passive RFID Tags • Tag’s Antenna • Microchip / Integrated Circuit • Battery (Communication) 48 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) Passive Tags Functionality -Waits for a signal from an RFID reader. -The reader sends energy to an antenna which converts that energy into an RF wave that is sent into the read zone. -Once the tag is read within the read zone, the RFID tag’s internal antenna draws in energy from the RF waves. -The energy moves from the tag’s antenna to the IC and powers the chip which generates a signal back to the RF system. This is called backscatter. -The backscatter, or change in the electromagnetic or RF wave, is detected by the reader (via the antenna), which interprets the information. 49 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) Passive RFID tags exist on the market, but all tags generally fall into two categories: Soft, basic structure is commonly referred to as RFID Inlay Hard RFID tags are durable and made of plastic, metal, ceramic and even rubber. 50 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) High Temperature – Certain industries, like healthcare, track the number of cycles that instruments undergo in punishing autoclaves. Specific passive RFID tags are designed to withstand extreme temperatures and accommodate for those types of applications, among others. where it can be damaged Rugged – Applications in outdoor environments or tough warehouses need a tag that can withstand snow and ice, dust and debris, or even the crushing forces felt under a tractor wheel. For these applications, a highly rugged passive tag is needed to make the application successful 51 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) Active RFID Reader or Interrogator Antenna Tag. Active RFID tags possess their own power source – an internal battery that enables them to have extremely long read ranges as well as large memory banks. Active RFID tags are powered by a battery that will last between 3 – 5 years, but when the battery fails, the active tag will need to be replaced but replaceable batteries will be a cost saving option. 52 CLO1 – IET 2103 Technology Innovation and Integration 53 Radio Frequency Identification (RFID) Essentially, two different types of active RFID tags are available – transponders and beacons. Transponders – In a system that uses an active transponder tag, the reader (like passive systems) will send a signal first, and then the active transponder will send a signal back with the relevant information. Transponder tags are very efficient Source: https://learn.sparkfun.com/tutorials/rfidbecause they conserve battery life when the tag is out of range of the reader. Active basics/all RFID transponders are commonly used in secure access control and in toll booth and send information when receive the electromagnetic wave from the reader payment systems. respond the reader sends a signal to the active RFID tag and when it recieve it becomes active and starts to work Beacons – In a system that uses an active beacon tag, the tag will not wait to hear the reader’s signal. Instead, true to its name, the tag will ‘beacon’, or send out its specific information every 3 – 5 seconds. Beacon tags are very common in the oil and gas industry, as well as mining and cargo tracking applications. Active tag’s beacons can be read hundreds of meters away, but, in order to conserve battery life, they may be set to a lower transmit power in order to reach around 100 meters doesn’t wait for the electromagnetic wave to respond, it sends information every 3-5 read range. secs. Thats why we use it in important industry CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) Active Tags Features: Usually encased in a rugged shell due to environmental conditions such as extreme temperatures and moisture. Usually are much larger than passive tags due to the size of the enclosed battery, circuitry, and bulk of a durable exterior. Some Active tags are equipped with on-board sensors that track environmental parameters (tracking moister levels, temperature, and key identifiers) More expensive when compared to Passive Tags. 54 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) Functionality: It is a technology that works with Radio Waves that can automatically identifies an object such as a book in a library, a product in a shop, a box in a storage room, a car in the road, or live stocks. An RFID reader sends radio waves continuously and once it detects an object within its range, this object will start sending its information to the reader. It is similar to barcode technology, but in barcode technology the product and the reader needs to be insight of each other while in our case. The object can be identified as long as it is within the range of the reader and it is able to send its information back to the reader. This technology can track multiple objects at the same time. Source: http://smartt-tags.com/#home 55 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) Usage of RFID with Live Species • Identifying lost pets and Animal tracking tags • Identifying lost pets: One of the earliest domestic uses of RFID was to ‘chip’ pet dogs and cats.. If the pet is found far from home after going missing, authorities can just scan the chip and find the owner’s contact information. • Animal tracking tags: Identification of livestock is essential to modern farming and successful farm management. • Various methods and types of identification for application under different circumstances have been developed. • Animal owners developed sophisticated systems in the earliest times. 56 CLO1 – IET 2103 Technology Innovation and Integration 57 Radio Frequency Identification (RFID) Usage of RFID with Live Species These tags can be used for identifying sick animals, vaccination schedules, location, food management, breeding, blood groups, health history, DOB etc. It save the weight body ,condition score of animal. Many tribes used identification system include skin colour and patterns. Developed systems in recent times have used in order to animal identify also track food products. its pedigree and medical information. RFID tags have a memory chip installed allowing storage of an item’s; location, serial number, manufacturer, photo, use history, a maintenance schedule and much more. The speed of this data capture using an RFID system is less than 5% of the time taken in a manual process. Each tag contains a minimum of an integrated circuit and an antenna. RFID tags are used to label various assets with a unique electronic signature that can be encoded and read by other RFID equipment. This information is stored in non-volatile memory. ‫معلومات ال تطاير‬ CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) Different Usage of RFID 1. Logistics & Supply Chain Visibility. 2. Item level inventory tracking. 3. Race timing. 4. Attendee Tracking. 5. Materials management. 6. Access Control. 7. IT Asset Tracking. 8. Tool Tracking. 9. Kiosks. 10. Library Systems. 11. Laundry Management. 12. Interactive Marketing. 58 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) Types of information School and universities : • Manage equipment • Inventory • Time • Capital • Tools • Number of students/teachers/workers Libraries: • • • • • • Tagging Book info: Title of the book Author Date of publish Shelf check in/out Animals tracking : • Monitor heart rates • Blood types • ear infection Museums : • Visitor log • Allowed access • Ticket Type • Respiratory rate • Animal being tagged 59 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) RFID features for different business 1. Unique Identity 2. Automatic Identification 3. Wireless Connectivity. 4. Rugged 5.No power. 6. No limit Shelf life. 7. Multiple tag reading. SALK (reads foe multiple cars at the same time) 1. Unique Identity 2. Automatic Identification 3. Wireless Connectivity. 4. Rugged 5.No power. 6. No limit Shelf life. 7. Multiple tag reading. 60 CLO1 – IET 2103 Technology Innovation and Integration 61 Radio Frequency Identification (RFID) IMPORTANCE OF RFID RFID makes your business efficient: It doesn’t require line-of-sight scanning to read tags, meaning that multiple tags can be read at once. Less monitoring and a simpler process, the employees are free to handle important tasks and focus on productive efforts. Overall, goods and information are handled much more efficiently. RFID technology prevents errors: Lessens the risk of human error that typically comes with data logging and product replenishment. By cutting out manual processes and replacing them with automated technology, companies often see more accurate results. RFID provides real-time data: RFID technology has the ability to track and provide real-time data about inventory and products. This capability is attractive to any industry, especially in today’s world of datadriven decision making. Whether you are tracking warehouse inventory or individual retail products, your company can benefit from the automatic, real-time data collection and analysis that RFID offers. RFID offers insights that lead to better decision making: Allows companies to become better and more accurately informed at all times. Having hard data and insights leads to better decision making, which business owners and managers can turn into actions that improve the business CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) RFID systems can be broken down by the frequency band within which they operate: low frequency, high frequency, and ultra-high frequency. (https://www.idtechex.com/de/research-article/rfid-frequencybands/40 ) RFID system working principle depends on the Frequency of Operation. For both LF and HF RFID Tags, working principle is Inductive Coupling (Near Field Coupling) while for UHF RFID Tags Electromagnetic Coupling (Far Field Coupling) is used. 62 CLO1 – IET 2103 Technology Innovation and Integration Radio Frequency Identification (RFID) 3 or 4 points Advantages of RFID • • • • • • • • • • • • LOS: line of sight RFID tag and reader should not be in LOS to make the system work. RFID tags are easy to install & handle more amount of data. Accurate system and eliminates error. Large number of RFID “tags” can be read at once. Security on the product, RFID technology cannot be easily replicated and therefore, it increases the security of the product. The RFID tags can store data up to 2 KB. RFID systems can be integrated with other internal systems or processes can be used as sub system RFID tags can be extremely durable against impact and environmental factors RFID tag data is encrypted and can also be locked for extra security ability to decode past information It is transportable over long distances It is quick, nearly the speed of light 63 CLO1 – IET 2103 Technology Innovation and Integration 64 Radio Frequency Identification (RFID) Disadvantages of RFID • High cost special when batteries are considered as in Active RFID. • Its hard for the RFID reader to read a information if the tags are in liquid and metal surfaces because tags become unreadable. • Need more time to programmed RFID devices. • Privacy is a concern with the use of RFID on products as it can be easily tapped or intercepted. • RFID signal frequencies around the world are non united. • Use of RFID technology at inventory control and for other such applications lead to loss of jobs for unskilled laborer. • RFID technology has been referred to as invasive technology. • Many countries have different range of frequency that allow RFID tags to function. • Technology deployment risks • can be dangerous technology if not properly managed. Thank You 800 MyHCT (800 69428) www.hct.ac.ae

Use Quizgecko on...
Browser
Browser