SlideShare a Scribd company logo
Automatic Identification And Data Capture
Technology
What is AIDC
•Automatic Identification and Data Capture (AIDC) is a broad category
of technologies used to collect information from an individual, object,
image or sound without manual data entry.
• Some of the technologies are Barcode, RFID, NFC, Biometrics and
many others
• These technologies aims at identifying an entity and ability to read and
process that identity
AUTO-ID
BIOMETRIC
RETINA FINGERPRINT
RFID
NFC
RFID :RADIO FREQUENCY IDENTIFICATION
•Radio-frequency identification (RFID) is the wireless non-contact use of radio-
frequency electromagnetic fields to transfer data for the purposes of
automatically identifying and tracking tags attached to assets.
• RFID is Fast and Reliable
• It does not require a physical line of sight or contact between reader and the
tagged item
COMPONENTS OF RFID:
 RFID Reader/Interrogator
RFID Tag/Transponder
RFID Antenna
RFID READER
• Brain of the RFID system
• Sometimes they are named as interrogator
• Transmit and receive radio waves in order to communicate with
RFID Tags
TYPES OF READERS
Fixed Reader Handheld Reader Integrated Reader
RFID ANTENNAS
•Antennas will allow the reader to transmit and receive signals
from the RFID Tags
• Antennas comes with various size, gain and polarization
•Gain – higher the gain, the more powerful the antenna. A higher
gain antenna will produce a larger field, thus extending read range
farther than a lower gain antenna.
LINEARLY POLARIZED CIRCULARLY POLARIZED
Broadcast electromagnetic waves on a
single plane
in a corkscrew-like fashion.
Horizontal plane/Vertical plane Right/Left hand circularly polarized
Greater read range Lesser read range
RFID tag must be fixed upon the same
plane as the antenna
RFID tag may be found in any
orientation
Polarization (horizontal) Circular Polarization (right-hand)
RFID TAGS
• it comprises of two parts antenna and a chip
• an antenna for transmitting and receiving signals, and an
RFID chip (or integrated circuit) which stores the tag’s ID
and other information.
RFID Tag
ACTIVE RFID PASSIVE RFID
Power Battery Operated No internal power
Communication Range Long Range(100+mtr ) Short Range (>10 mtr)
Tag Size
Varies depending on
application
“Sticker” to credit card
size
Fixed Infrastructure
Costs
Lower – cheaper
interrogators
Higher – fixed readers
Per Asset Variable Costs Higher – see tag cost Lower – see tag cost
Active RFID v/s Passive RFID
OPERATING FREQUENCIES
RFID
LF
( Low Frequency)
Frequency: 125- 134 kHz
HF
(High Frequency)
Frequency: 13.56 MHz
UHF
(Ultra High
Frequency)
Active
433 & 856- 960 MHz
Passive
856- 960 MHz
SHF
(Super High
Frequency)
2.45 GHz
Low Frequency Passive Reader
Operating Frequency: 125 - 134 kHz
Read Range: contact - 10 cm
Examples: Animal tracking, Access Control, Car Key-Fob,
Applications with high volumes of liquids and metals
Pros: work well around liquids and metals, global standards
Cons: very short read range, limited quantity of memory, low data
transmission rate (read very few tags at one one), high production
cost
High Frequency Passive Reader
Operating Frequency: 13.56 MHz
Read Range: contact - 30 cm
Examples: DVD Kiosks, Library Books, Personal ID cards,
Poker/Gaming Chips
Pros: NFC protocol
Cons: short read range, low data transmission rate (read fewer tags at
one time)
Ultra High Frequency Passive Reader
Operating Frequency: 856- 960 MHz
Read Range: near contact - 10+ meters
Examples: Supply Chain, High-volume Manufacturing, Electronic
tolls, Item Tracking, Asset Tracking
Pros: longer read range, lower cost per tag, wide range of tag sizes and
types, global standards, high data transmission rates (read more tags at
one time)
Cons: typically higher associated infrastructure cost, write small
amounts of data, high amount of interference from metal and liquids
Super High Frequency Active Reader
Operating Frequency: 2.45GHz
Read Range: up to 100 Meters
Examples: Vehicle and Cargo Tracking
Pros: Active tags can also be read while moving at 60 miles per
hour or more, with near 100 percent reliability.
Cons: active RFID tags are powered by a battery so will
eventually require replacing
RFID TAGS- on chip Memory
-Memory size varies from vendor to vendor
-Active tags have more memory than passive Tags
-Passive tags Memory size varies from few bits to 64KB
TAG TYPE MEMORY AVAILBLE
Active tags Varies from 16 bytes-128KB
License plate Tags 96 bits/128bits
CryptoRF Family 1k,2k,4k,8k,16k,32k,64k
Fujitsu Metal mount tags 8k
RFID STANDARD
EPCglobal Standards
Out Dated Standards
1)Class 0 2)Class 1
singulation is relatively slow when a large number of
tags are present.
Existing Standards
• Class 1 Gen2 (ISO 18000-6C)
Incompatible to previous Standards
The data rate can vary from 27 to 128 Kbps
ISO STANDARDS
18000–1: Generic parameters for air interfaces for globally
accepted frequencies
18000–2: Air interface for 135 KHz
18000–3: Air interface for 13.56 MHz
18000–4: Air interface for 2.45 GHz
18000–5: Air interface for 5.8 GHz
18000–6: Air interface for 860 MHz to 930 MHz
18000–7: Air interface at 433.92 MHz
Advantages of RFID System
•As no line-of-sight is required, tag placement is less
Constrained
•RFID tags have a longer read range than barcodes
•Tags can have read/write memory capability
•Many tags can be read simultaneously
•RFID tags can be combined with sensors
•Tags can locally store additional information; such
distributed data storage may increase fault tolerance of the
entire system,
• Reduces inventory control and provisioning costs,
APPLICATIONS
Document tracking/Library Management System:
Each document is tagged with a RFID tag and the document ID is
stored in DB, Personnel are also issued with RFID cards for issue and tracking
Readers are placed in entry/exit position and also at the issue desk and
dropdown box
• RTLS (Real Time Location Systems)
In some applications, you need to track the real-time location of assets,
employees, or customers. Whether you’re measuring the efficiency of
worker movements, the effectiveness of a store floor plan, or tracking
the location of valuable resources, RFID systems provide visibility in
any number of locations.
Automated Toll Collection
Electronic toll collection system allows the vehicle drivers to pass the
toll tax booths without stopping at the toll booths. The toll amount is deducted
from the RFID card. This RFID card is rechargeable and account is stored on the
records.
Attendance Tracking:
-helps to gather business intelligence at events like trade shows,
conferences, corporate functions, and other large gatherings.
-Attendee’s are given badges affixed with UHF RFID tags. Appropriately
placed RFID readers and antennas track the location of the RFID badges as
the attendee visits booths, seminars, product demos, and other events.
IT Asset Tracking:
-IT assets such as server blades, laptops, tablets, and other peripherals are
costly investments for any company, not to mention that information stored
on those items could prove detrimental in the wrong hands. IT asset tags
give your IT team the ability to quickly do an inventory count and make sure
everything is in place.
NFC – Near Field Communication
• It is a subset of RFID Technology
• It is a form of contactless communication between 2 devices
which uses RF waves
• operating frequency 13.56 MHz
• read range is about 10cm or less
• Supported data rates: 106, 212 or 424 kbit/s
Three Modes Of NFC
1. Card emulation mode: example e-payment
2. Peer to peer (Bluetooth like communication)
3. Reader/writer mode ex: advertisement (Smart Poster )
1. Card Emulation Mode:
This mode enables NFC-enabled devices to act like smart
cards, allowing users to perform transactions such as purchases,
ticketing, and transit access control with just a touch.
Benefits
- Physical object elimination(Credit cards, debit cards, paper based
tickets, physical keys)
2. Peer To Peer Mode:
Peer-to-peer mode enables two NFC-enabled devices to
communicate with each other to exchange information and share
files, so that users of NFC-enabled devices can quickly share
contact information and other files with a touch. For example, users
can share Bluetooth or WiFi link set-up parameters or exchange
data such as virtual business cards or digital photos.
3.Reader/Writer Mode:
Reader/writer mode enables NFC-enabled devices to read
information stored on inexpensive NFC tags embedded in smart
posters and displays, providing a great marketing tool for companies.
In reader/writer mode, the NFC-enabled device is capable of reading
NFC Forum-mandated tag types, such as a tag embedded in an NFC
smart poster.
NFC Tags-On chip Memory
Tag Type On Chip Memory
MIFARE Mini 320 Bytes
MIFARE 1k 1024 Bytes
MIFARE 4k 496 Bytes
MIFARE Ultralight 192 Bytes
MIFARE Plus 2/4 Kb
Applications
NFC applications can be split into four basic categories.
Touch and Go
•Applications such as access control or transport/event ticketing, where the user
only needs to bring the device storing the ticket or access code close to the reader.
• simple data capture applications, such as picking up an Internet URL from a
smart label on a poster.
Touch and Confirm
-Applications such as mobile payment
-confirm the interaction by entering a password or just
accepting the transaction.
Touch and Connect
Linking two NFC-enabled devices to enable peer to peer
transfer of data such as downloading music, exchanging
images or synchronizing address books.
.
Aidc technology

More Related Content

What's hot

Data acquisition system (DAS)
Data acquisition system (DAS)Data acquisition system (DAS)
Data acquisition system (DAS)
Sumeet Patel
 
Data Acquisition System
Data Acquisition SystemData Acquisition System
Data Acquisition System
Priyanka Goswami
 
Robotics - unit-2-- Drive Systems
Robotics - unit-2-- Drive SystemsRobotics - unit-2-- Drive Systems
Robotics - unit-2-- Drive Systems
Dr.G.Saravanan
 
Supply Chain Traceability Technology Tools
Supply Chain Traceability Technology ToolsSupply Chain Traceability Technology Tools
Supply Chain Traceability Technology Tools
Laura Olson
 
Automated storage and retrieval system
Automated storage and retrieval systemAutomated storage and retrieval system
Automated storage and retrieval system
Prasanna3804
 
Automated material handling
Automated material handlingAutomated material handling
Automated material handling
DINBANDHU SINGH
 
Robot Configuration - 1
Robot Configuration - 1Robot Configuration - 1
Production Planning and Control
Production Planning and ControlProduction Planning and Control
Production Planning and Control
shrinivas kulkarni
 
Data logger
Data loggerData logger
Data logger
Dilip Mathuria
 
Radar Level Transmitters
Radar Level TransmittersRadar Level Transmitters
Radar Level Transmitters
Icon Process Controls
 
Introduction to flexible manufacturing system (fms)
Introduction to flexible manufacturing system (fms)Introduction to flexible manufacturing system (fms)
Introduction to flexible manufacturing system (fms)
Nilraj Vasandia
 
Computer Integrated Manufacturing System
Computer Integrated Manufacturing SystemComputer Integrated Manufacturing System
Computer Integrated Manufacturing System
Saif Eye
 
Warehouse automation
Warehouse automationWarehouse automation
Warehouse automation
Vineet M Srivastav
 
Seminar ppt
Seminar pptSeminar ppt
Seminar ppt
Akash Maurya
 
Automatic storage Retrieval system (ASRS)
Automatic storage Retrieval system (ASRS)Automatic storage Retrieval system (ASRS)
Automatic storage Retrieval system (ASRS)
Nirmal S
 
CONDITION BASED MONITORING PRESENTATION
CONDITION BASED MONITORING PRESENTATIONCONDITION BASED MONITORING PRESENTATION
CONDITION BASED MONITORING PRESENTATIONIgnesias Tsotetsi
 
Thermal Imaging and its Applications
Thermal Imaging and its ApplicationsThermal Imaging and its Applications
Thermal Imaging and its Applications
Priyanka Goswami
 
Components of industrial robotics types of arms and end effectors
Components of industrial robotics types of arms and end effectorsComponents of industrial robotics types of arms and end effectors
Components of industrial robotics types of arms and end effectors
Jayanth Krishna
 

What's hot (20)

Data acquisition system (DAS)
Data acquisition system (DAS)Data acquisition system (DAS)
Data acquisition system (DAS)
 
Vmi1
Vmi1Vmi1
Vmi1
 
Data Acquisition System
Data Acquisition SystemData Acquisition System
Data Acquisition System
 
Robotics - unit-2-- Drive Systems
Robotics - unit-2-- Drive SystemsRobotics - unit-2-- Drive Systems
Robotics - unit-2-- Drive Systems
 
Supply Chain Traceability Technology Tools
Supply Chain Traceability Technology ToolsSupply Chain Traceability Technology Tools
Supply Chain Traceability Technology Tools
 
Sensors
SensorsSensors
Sensors
 
Automated storage and retrieval system
Automated storage and retrieval systemAutomated storage and retrieval system
Automated storage and retrieval system
 
Automated material handling
Automated material handlingAutomated material handling
Automated material handling
 
Robot Configuration - 1
Robot Configuration - 1Robot Configuration - 1
Robot Configuration - 1
 
Production Planning and Control
Production Planning and ControlProduction Planning and Control
Production Planning and Control
 
Data logger
Data loggerData logger
Data logger
 
Radar Level Transmitters
Radar Level TransmittersRadar Level Transmitters
Radar Level Transmitters
 
Introduction to flexible manufacturing system (fms)
Introduction to flexible manufacturing system (fms)Introduction to flexible manufacturing system (fms)
Introduction to flexible manufacturing system (fms)
 
Computer Integrated Manufacturing System
Computer Integrated Manufacturing SystemComputer Integrated Manufacturing System
Computer Integrated Manufacturing System
 
Warehouse automation
Warehouse automationWarehouse automation
Warehouse automation
 
Seminar ppt
Seminar pptSeminar ppt
Seminar ppt
 
Automatic storage Retrieval system (ASRS)
Automatic storage Retrieval system (ASRS)Automatic storage Retrieval system (ASRS)
Automatic storage Retrieval system (ASRS)
 
CONDITION BASED MONITORING PRESENTATION
CONDITION BASED MONITORING PRESENTATIONCONDITION BASED MONITORING PRESENTATION
CONDITION BASED MONITORING PRESENTATION
 
Thermal Imaging and its Applications
Thermal Imaging and its ApplicationsThermal Imaging and its Applications
Thermal Imaging and its Applications
 
Components of industrial robotics types of arms and end effectors
Components of industrial robotics types of arms and end effectorsComponents of industrial robotics types of arms and end effectors
Components of industrial robotics types of arms and end effectors
 

Similar to Aidc technology

RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
Positive Hack Days
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And Application
FishEyeBox
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
Saba651353
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
SpaceCycles, LLP
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industry
bizpresenter
 
Selectingtags Final
Selectingtags FinalSelectingtags Final
Selectingtags Final
SeanWatson
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
Deepak Raj
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
Akash Maurya
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
Publicis Sapient
 
RFID
RFIDRFID
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
Mouhanad Alkhaldi
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll taxangel300692
 
Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
EnCStore Private Limited
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
IJERA Editor
 
RFID
RFIDRFID
My best effort
My best effortMy best effort
My best effort
sujataray
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
liuyingxi971017
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
Francisco Carabez
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 

Similar to Aidc technology (20)

RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And Application
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industry
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Selectingtags Final
Selectingtags FinalSelectingtags Final
Selectingtags Final
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID
RFIDRFID
RFID
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll tax
 
Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
RFID
RFIDRFID
RFID
 
My best effort
My best effortMy best effort
My best effort
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Aidc technology

  • 1. Automatic Identification And Data Capture Technology
  • 2. What is AIDC •Automatic Identification and Data Capture (AIDC) is a broad category of technologies used to collect information from an individual, object, image or sound without manual data entry. • Some of the technologies are Barcode, RFID, NFC, Biometrics and many others • These technologies aims at identifying an entity and ability to read and process that identity
  • 4. RFID :RADIO FREQUENCY IDENTIFICATION •Radio-frequency identification (RFID) is the wireless non-contact use of radio- frequency electromagnetic fields to transfer data for the purposes of automatically identifying and tracking tags attached to assets. • RFID is Fast and Reliable • It does not require a physical line of sight or contact between reader and the tagged item
  • 5. COMPONENTS OF RFID:  RFID Reader/Interrogator RFID Tag/Transponder RFID Antenna
  • 6. RFID READER • Brain of the RFID system • Sometimes they are named as interrogator • Transmit and receive radio waves in order to communicate with RFID Tags TYPES OF READERS Fixed Reader Handheld Reader Integrated Reader
  • 7. RFID ANTENNAS •Antennas will allow the reader to transmit and receive signals from the RFID Tags • Antennas comes with various size, gain and polarization •Gain – higher the gain, the more powerful the antenna. A higher gain antenna will produce a larger field, thus extending read range farther than a lower gain antenna.
  • 8. LINEARLY POLARIZED CIRCULARLY POLARIZED Broadcast electromagnetic waves on a single plane in a corkscrew-like fashion. Horizontal plane/Vertical plane Right/Left hand circularly polarized Greater read range Lesser read range RFID tag must be fixed upon the same plane as the antenna RFID tag may be found in any orientation Polarization (horizontal) Circular Polarization (right-hand)
  • 9. RFID TAGS • it comprises of two parts antenna and a chip • an antenna for transmitting and receiving signals, and an RFID chip (or integrated circuit) which stores the tag’s ID and other information. RFID Tag
  • 10. ACTIVE RFID PASSIVE RFID Power Battery Operated No internal power Communication Range Long Range(100+mtr ) Short Range (>10 mtr) Tag Size Varies depending on application “Sticker” to credit card size Fixed Infrastructure Costs Lower – cheaper interrogators Higher – fixed readers Per Asset Variable Costs Higher – see tag cost Lower – see tag cost Active RFID v/s Passive RFID
  • 11. OPERATING FREQUENCIES RFID LF ( Low Frequency) Frequency: 125- 134 kHz HF (High Frequency) Frequency: 13.56 MHz UHF (Ultra High Frequency) Active 433 & 856- 960 MHz Passive 856- 960 MHz SHF (Super High Frequency) 2.45 GHz
  • 12. Low Frequency Passive Reader Operating Frequency: 125 - 134 kHz Read Range: contact - 10 cm Examples: Animal tracking, Access Control, Car Key-Fob, Applications with high volumes of liquids and metals Pros: work well around liquids and metals, global standards Cons: very short read range, limited quantity of memory, low data transmission rate (read very few tags at one one), high production cost
  • 13. High Frequency Passive Reader Operating Frequency: 13.56 MHz Read Range: contact - 30 cm Examples: DVD Kiosks, Library Books, Personal ID cards, Poker/Gaming Chips Pros: NFC protocol Cons: short read range, low data transmission rate (read fewer tags at one time)
  • 14. Ultra High Frequency Passive Reader Operating Frequency: 856- 960 MHz Read Range: near contact - 10+ meters Examples: Supply Chain, High-volume Manufacturing, Electronic tolls, Item Tracking, Asset Tracking Pros: longer read range, lower cost per tag, wide range of tag sizes and types, global standards, high data transmission rates (read more tags at one time) Cons: typically higher associated infrastructure cost, write small amounts of data, high amount of interference from metal and liquids
  • 15. Super High Frequency Active Reader Operating Frequency: 2.45GHz Read Range: up to 100 Meters Examples: Vehicle and Cargo Tracking Pros: Active tags can also be read while moving at 60 miles per hour or more, with near 100 percent reliability. Cons: active RFID tags are powered by a battery so will eventually require replacing
  • 16. RFID TAGS- on chip Memory -Memory size varies from vendor to vendor -Active tags have more memory than passive Tags -Passive tags Memory size varies from few bits to 64KB TAG TYPE MEMORY AVAILBLE Active tags Varies from 16 bytes-128KB License plate Tags 96 bits/128bits CryptoRF Family 1k,2k,4k,8k,16k,32k,64k Fujitsu Metal mount tags 8k
  • 17. RFID STANDARD EPCglobal Standards Out Dated Standards 1)Class 0 2)Class 1 singulation is relatively slow when a large number of tags are present. Existing Standards • Class 1 Gen2 (ISO 18000-6C) Incompatible to previous Standards The data rate can vary from 27 to 128 Kbps
  • 18. ISO STANDARDS 18000–1: Generic parameters for air interfaces for globally accepted frequencies 18000–2: Air interface for 135 KHz 18000–3: Air interface for 13.56 MHz 18000–4: Air interface for 2.45 GHz 18000–5: Air interface for 5.8 GHz 18000–6: Air interface for 860 MHz to 930 MHz 18000–7: Air interface at 433.92 MHz
  • 19. Advantages of RFID System •As no line-of-sight is required, tag placement is less Constrained •RFID tags have a longer read range than barcodes •Tags can have read/write memory capability •Many tags can be read simultaneously •RFID tags can be combined with sensors •Tags can locally store additional information; such distributed data storage may increase fault tolerance of the entire system, • Reduces inventory control and provisioning costs,
  • 20. APPLICATIONS Document tracking/Library Management System: Each document is tagged with a RFID tag and the document ID is stored in DB, Personnel are also issued with RFID cards for issue and tracking Readers are placed in entry/exit position and also at the issue desk and dropdown box
  • 21. • RTLS (Real Time Location Systems) In some applications, you need to track the real-time location of assets, employees, or customers. Whether you’re measuring the efficiency of worker movements, the effectiveness of a store floor plan, or tracking the location of valuable resources, RFID systems provide visibility in any number of locations.
  • 22. Automated Toll Collection Electronic toll collection system allows the vehicle drivers to pass the toll tax booths without stopping at the toll booths. The toll amount is deducted from the RFID card. This RFID card is rechargeable and account is stored on the records.
  • 23. Attendance Tracking: -helps to gather business intelligence at events like trade shows, conferences, corporate functions, and other large gatherings. -Attendee’s are given badges affixed with UHF RFID tags. Appropriately placed RFID readers and antennas track the location of the RFID badges as the attendee visits booths, seminars, product demos, and other events.
  • 24. IT Asset Tracking: -IT assets such as server blades, laptops, tablets, and other peripherals are costly investments for any company, not to mention that information stored on those items could prove detrimental in the wrong hands. IT asset tags give your IT team the ability to quickly do an inventory count and make sure everything is in place.
  • 25. NFC – Near Field Communication • It is a subset of RFID Technology • It is a form of contactless communication between 2 devices which uses RF waves • operating frequency 13.56 MHz • read range is about 10cm or less • Supported data rates: 106, 212 or 424 kbit/s
  • 26. Three Modes Of NFC 1. Card emulation mode: example e-payment 2. Peer to peer (Bluetooth like communication) 3. Reader/writer mode ex: advertisement (Smart Poster )
  • 27. 1. Card Emulation Mode: This mode enables NFC-enabled devices to act like smart cards, allowing users to perform transactions such as purchases, ticketing, and transit access control with just a touch. Benefits - Physical object elimination(Credit cards, debit cards, paper based tickets, physical keys)
  • 28. 2. Peer To Peer Mode: Peer-to-peer mode enables two NFC-enabled devices to communicate with each other to exchange information and share files, so that users of NFC-enabled devices can quickly share contact information and other files with a touch. For example, users can share Bluetooth or WiFi link set-up parameters or exchange data such as virtual business cards or digital photos.
  • 29. 3.Reader/Writer Mode: Reader/writer mode enables NFC-enabled devices to read information stored on inexpensive NFC tags embedded in smart posters and displays, providing a great marketing tool for companies. In reader/writer mode, the NFC-enabled device is capable of reading NFC Forum-mandated tag types, such as a tag embedded in an NFC smart poster.
  • 30. NFC Tags-On chip Memory Tag Type On Chip Memory MIFARE Mini 320 Bytes MIFARE 1k 1024 Bytes MIFARE 4k 496 Bytes MIFARE Ultralight 192 Bytes MIFARE Plus 2/4 Kb
  • 31. Applications NFC applications can be split into four basic categories. Touch and Go •Applications such as access control or transport/event ticketing, where the user only needs to bring the device storing the ticket or access code close to the reader. • simple data capture applications, such as picking up an Internet URL from a smart label on a poster.
  • 32. Touch and Confirm -Applications such as mobile payment -confirm the interaction by entering a password or just accepting the transaction. Touch and Connect Linking two NFC-enabled devices to enable peer to peer transfer of data such as downloading music, exchanging images or synchronizing address books. .