The document discusses how radio frequency identification (RFID) technology can be used to increase efficiency in logistics and production processes. It provides an overview of RFID fundamentals including components, frequency allocation, tag types, and factors that affect system performance. The document also outlines specific applications of RFID such as fleet management, production tracking, and weighbridge automation. It argues that RFID can help reduce waste and inefficiencies in lean manufacturing by providing real-time visibility of materials and processes.
Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders
A Review on Microstrip Patch Antenna for UHF RFID Tag Applications mounted on...IJEEE
In this paper, we discuss different designs of microstrip patch antennas for UHF RFID Tag applications mounted on metallic surface. We discuss the various requirements of such designs like size, bandwidth, circular polarization. Out of UHF band 860MHz to 960MHz is assigned for RFID applications.
Here is a Whitepaper I wrote way back in 2011 for the the Steel Industry. The industry has only started capitalizing on the RFID Technology for Inventory Tracking and Realtime Location Tracking. I see a lot of potential in exploiting the usage of RFID Technology in our day to day operations.
Happy Reading..!
A Survey: SMS Sending Through RFID SensorsEditor IJMTER
This paper throws light on combined working of RFID sensors along with SMS sending
technique. Paper is based how RFID sensors can sense data. Generally these data needs to be send
through some wired or wireless medium, But sometime we need to send such data in groupings or
indications directly from Sensors.
This presentation includes the discussion of Digital Signal Processing applications such as two band digital corssover system, woofers, sqawkers, tweeters, interference cancellation in ECG, speech noise reduction using FIR/ IIR filters, speech coding and compression, CD recording system
Radio Frequency identification (RFID) technology has become emerging
technique for tracking and items identification. Depend upon the function; various RFID
technologies could be used. Drawback of passive RFID technology, associated to the range
of reading tags and assurance in difficult environmental condition, puts boundaries on
performance in the real life situation [1]. To improve the range of reading tags and
assurance, we consider implementing active backscattering tag technology. For making
mobiles of multiple radio standards in 4G network; the Software Defined Radio (SDR)
technology is used. Restrictions in Existing RFID technologies and SDR technology, can be
eliminated by the development and implementation of the Software Defined Radio (SDR)
active backscattering tag compatible with the EPC global UHF Class 1 Generation 2 (Gen2)
RFID standard. Such technology can be used for many of applications and services.
Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders
A Review on Microstrip Patch Antenna for UHF RFID Tag Applications mounted on...IJEEE
In this paper, we discuss different designs of microstrip patch antennas for UHF RFID Tag applications mounted on metallic surface. We discuss the various requirements of such designs like size, bandwidth, circular polarization. Out of UHF band 860MHz to 960MHz is assigned for RFID applications.
Here is a Whitepaper I wrote way back in 2011 for the the Steel Industry. The industry has only started capitalizing on the RFID Technology for Inventory Tracking and Realtime Location Tracking. I see a lot of potential in exploiting the usage of RFID Technology in our day to day operations.
Happy Reading..!
A Survey: SMS Sending Through RFID SensorsEditor IJMTER
This paper throws light on combined working of RFID sensors along with SMS sending
technique. Paper is based how RFID sensors can sense data. Generally these data needs to be send
through some wired or wireless medium, But sometime we need to send such data in groupings or
indications directly from Sensors.
This presentation includes the discussion of Digital Signal Processing applications such as two band digital corssover system, woofers, sqawkers, tweeters, interference cancellation in ECG, speech noise reduction using FIR/ IIR filters, speech coding and compression, CD recording system
Radio Frequency identification (RFID) technology has become emerging
technique for tracking and items identification. Depend upon the function; various RFID
technologies could be used. Drawback of passive RFID technology, associated to the range
of reading tags and assurance in difficult environmental condition, puts boundaries on
performance in the real life situation [1]. To improve the range of reading tags and
assurance, we consider implementing active backscattering tag technology. For making
mobiles of multiple radio standards in 4G network; the Software Defined Radio (SDR)
technology is used. Restrictions in Existing RFID technologies and SDR technology, can be
eliminated by the development and implementation of the Software Defined Radio (SDR)
active backscattering tag compatible with the EPC global UHF Class 1 Generation 2 (Gen2)
RFID standard. Such technology can be used for many of applications and services.
Agent Quest: The BEST Possible Way to Launch and Build YOUR Real Estate Career?Royal LePage Wolstencroft
With a mix of personal advising, real world guidance and simple and effective systems, we'll help you create an easy to follow roadmap for every aspect of your realty business.
Fedex Business Model And Competitor AlsoShantam Vaish
In this presentation I would like to explain about the history of Fedex and also the supply chain management of fedex.Then after I explained that Who is the competitor of Fedex and SWOT analysis of Fedex.There so many facts and figure about fedex and ups. Some good images also catch the attention of audience.
RFID and its implementations in different fields like logistics, animal keeping. Details regarding how it works and what the various components of rfid.
Asset management on RFID (Radio Frequency Identification) is the process of tracking and managing physical assets using RFID technology. RFID tags are attached to assets, and RFID readers and antennas are used to communicate with the tags and collect data about the assets.
RFID tags are attached to assets, and each tag contains a unique identifier. RFID readers and antennas are placed at strategic locations, such as entry and exit points, to detect the tags as they move through the facility. The tag responds with its unique identity once the reader delivers a signal to it. The reader then sends this data to a central database, where it is used to track the location and status of the asset.
My presentation explores how RFID system works and describes briefly about history of RFID, active & passive tags, modes of transmission of data and applications
Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader and may be embedded in the tracked object. RFID is one method for Automatic Identification and Data Capture (AIDC).[1]
RFID tags are used in many industries. For example, an RFID tag attached to an automobile during production can be used to track its progress through the assembly line; RFID-tagged pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in livestock and pets allows positive identification of animals.
Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals and people, the possibility of reading personally-linked information without consent has raised serious privacy concerns.[2]
In 2014, the world RFID market is worth $8.89 billion, up from $7.77 billion in 2013 and $6.96 billion in 2012. This includes tags, readers, and software/services for RFID cards, labels, fobs, and all other form factors. The market value is expected to rise to $27.31 billion by 2024.[3]
Electronic Toll Collection System Using RFID seminar.pptxnirdeshmucha1
This presentation gives a brief explanation of the toll collection used by governments to collect toll tax all across the world. And also explains the usage of the RFID (Radio Frequency Identification) system. Demerits of the RFID toll collection system.
The solution is using RFID technology to support hand free person tracking. This solution can work with access control to avoid contamination by reading card at the close reading distance.
We, Identify, has combines short range rfid, long range rfid and cloud technology into our RFID Intelligent Cabinet. This cabinet is designed to facilitate medical consignment product. It can enhance product visibility and reduce cost.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
3. RFID : ABSS Logistic Event
What is RFID
RFID is Radio Frequency Identification
> Used for automatic identification or data collection (AIDC)
Similar to bar code in concepts
> RFID tag stores data ~ barcode label
> RFID reader ~ barcode scanner
Radio waves vs. Light waves
No Line-Of-Sight required
Read through various environment conditions
One-way or Two-way (RO or RW)
4. RFID : ABSS Logistic Event
RFID basic components
Tags Antenna Reader Host Computer
• Device made up of an • Receives and • Communicates with • Reads/writes data
electronic circuit and transmits the radio the tag via antenna from/to the tags
an integrated antenna frequency signals through the reader
• Receives
• RF used to transfer • Wireless data transfer commands from • Stores and evaluates
data between the tag application software obtained data
and the antenna • May be integrated in
the reader for short • Interprets radio • Links the transceiver
• Portable memory range applications or waves into digital to an applications,
structural for information e.g. ERP
• Read-only or warehouse
read/write applications • Provides power
supply to passive
• Active or passive tags
• Usually attached to
specific items
5. RFID : ABSS Logistic Event
RFID Components
Read Zone RF Module Control
Module
Antenna
RS232/RS422/RS485
TCP/IP, WAN, Internet
Transponder/ Tag
6. RFID : ABSS Logistic Event
RFID Tag / Transponder
7. RFID : ABSS Logistic Event
RFID Allocation (Thailand)
MW
Low HF, VHF UHF
< 135 KHz
125-134 KHz 13.56 MHz 433 MHz 868, 902-928 MHz 2.45 GHz
• Read up to 18 in. • Read up to 3 ft. • Active RFID • Read up to 10 ft. • Read range 1-2 ft.
• Great penetration • Good penetration • Fast data rate (passive)
• Slow data rate • Most applicable WW • Simultaneous read • Very fast data rate
• Costlier antennas • Simultaneous read @50 tags
• No anti-collision @50 tags • Emerging standards
• Most progress on
standard setting
(ISO-15693)
THAI No license No license No license No license No license
REG < 135 KHz 13.55- 13.56MHz 4335-434 MHz 920-925 MHz 2.4-2.5 GHz
< 150mW EIRP < 10mW EIRP < 10mW EIRP < 0.5 W EIRP < 100mW
< 4W EIRP (need
license)
8. RFID : ABSS Logistic Event
Tag Power Source
Passive
> Power by energy from reader
> Backscatter technology
> Smaller, Lighter, less expensive
> Almost unlimited life
> Shorter range
> Requires higher power from reader
Active
> On-board battery power source
> On-board transmitter
> Greater range but higher cost
> Requires less power from reader
> Finite life
9. RFID : ABSS Logistic Event
Tag Power Source
Semi-Active or Battery Assisted Passive
> On-board battery power source
> Uses Passive Technology (no transmitter)
> Greater range but higher cost (less than active)
> Requires less power from reader
> Finite life (but longer than active)
> Not create RF pollution
10. RFID : ABSS Logistic Event
Read vs. Read/Write
Read Only
> Information can only be read from an RFID device – Programmed at
manufacture
User Programmable
> WORM – Write Once Read Many, Ability to initialize an RFID device
outside of the RFID manufacturer’s facility after manufacture
Read/Write
> Information can be read from or written to an RFID transponder during
the time it is presented to a reader/writer
> Typically asymmetric read and write operating range
12. RFID : ABSS Logistic Event
Factors Effecting System Performance
Distance (free space signal propagation)
> Reader/receiver: transmit power, frequency, and range.
> Antenna: transmit and receiving gain, pattern
> Linear polarization
> Circular polarization
14. RFID : ABSS Logistic Event
Factors Effecting System Performance
Distance (free space signal propagation)
> Reader/receiver: transmit power, frequency, and range.
> Antenna: transmit and receiving gain, pattern
> Linear polarization
> Circular polarization
Interference
> Other signal
> Reader to reader interference
> Adjacent channel
Material in or near the signal path and device
15. RFID : ABSS Logistic Event
RF Properties
Radio Lucent or Radio Friendly
> lets radio waves at this frequency pass through it without any
substantial loss of energy
Radio Absorbent
> blocks, reflects, and scatters RF waves.
Radio Opaque
> A material can allow the radio waves to propagate through it
but with substantial loss of energy
> The RF-absorbent or RF-opaque property of a material is
relative, because it depends on the frequency
17. RFID : ABSS Logistic Event
Factors Effecting System Performance
RFID Tag
Passive or active power
Antenna design
Integrated circuit design
Reliable fabrication and deployment
19. RFID : ABSS Logistic Event
Factors Effecting System Performance
RFID Tag
Passive or active power
Antenna design
Integrated circuit design
Reliable fabrication and deployment
Tag position
23. RFID : ABSS Logistic Event
RFID Fleet management
RFID Production Process
24. RFID : ABSS Logistic Event
Technology comparison
GPS
GPS
-Cannot accurately
identify the right truck
on the weighbridge.
-GPS is not designed for
associating information
with objects.
25. RFID : ABSS Logistic Event
Technology comparison
CCTV
Weight
Program
CCTV
CCTV can double
work for staff at
weight station.
26. RFID : ABSS Logistic Event
Efficiency in identifying
With the limitation of existing technology, the increase in the
identifying vehicle identity can result in the lower of efficiency.
Efficiency Identifying
RFID is the
technology can
can increase both
efficiency and
Level of
identification.
28. RFID : ABSS Logistic Event
Benefits – Increase efficiency
Normal process
Key in Print Data
Key in Key in Search Pre Search Post
vehicle picking Print DN entry
plate no. shipment plate no weight plate no. weight
details slip record
Repetition process
RFID process
Reduce from 10 steps to 5 steps
Data entry Print
Pre weight Post weight Print DN
shipment picking slip
29. RFID : ABSS Logistic Event
Benefits –reduce error
Data entry on plate number and weight can be automated.
30. RFID : ABSS Logistic Event
Benefits: Reduction on paperwork
Manual documents 4,000
trips per months :
Shipping document
Courier invoice, and
Weight report
Increase accuracy : no
human intervention
31. RFID : ABSS Logistic Event
RFID Fleet management
RFID Production Process
32. RFID : ABSS Logistic Event
Lean Production
Type of wastes:
1. Overproduction: excessive lead and
storage times
2. Waiting: unproductive equipment
usage.
3. Transport : non-value adding for
product move
4. Inappropriate processing: system
too complex than necessary
Lean manufacturing involves resulting in the excessive transport
identifying and eliminating non and poor quality
value adding activities (waste)
and focuses on the start-to-end 5. Unnecessary inventory
value streams rather than the 6. Unnecessary motion
idea of optimising individual
7. Defects : waste of raw material and
departments in isolation.
production time.
33. RFID : ABSS Logistic Event
Waste in production
Source: Toyota production system types of wastage reduction through RFID
34. RFID : ABSS Logistic Event
Why RFID
Can reduce production waste
Key functions Bar code RFID
Be able to store product history, and process in
off line manner
Be able to write information to support
individual station validation
Sustain harsh environment such as wet, high
temperature, chemical resistance.
Validate individual station control
Reusable tag
35. RFID : ABSS Logistic Event
Why RFID
Data memory feature
Key functions Business benefits
Product Material Monitor material variations.
Recipe (BOM) Ensure the right raw material is
used for production
Labor Improve labor utilization
Tools Determine impact of tool
variance, improve tool utilization.
Station Track material location and
enforce process validations
Process Optimize routing
All data -Quickly determine root cause of
product failure
-Greater product traceability
36. RFID : ABSS Logistic Event
Why RFID
Harsh environment
Not many technologies can withstand this environment.
RFID Tag on RFID Reader in
Pallet Box
37. RFID : ABSS Logistic Event
Why RFID
Tag validation
Automate data collection
> Reduce waste on unnecessary motion movement : bar code
scanning and manual data entry
> Reduce waste on unnecessary transport: move product for
scanning
Automate data association
> Help to ensure that the right product is on the manufacturing
process.
> As a result of reducing human data entry/error, RFID can reduce
waste on defects, overproduction, or unnecessary inventory,
38. RFID : ABSS Logistic Event
Why RFID
Tag validation
Production visibility in real time manner
> Average time spent on work in each step
> Average time spent on transportation on each step
> Total time a single item takes to complete the entire process.
> Know where the waste is, and which action takes to reduce the waste
> Reduce overproduction
> Unnecessary inventory
39. RFID : ABSS Logistic Event
Conclusion
Type of wastes RFID Strength
Overproduction Increase production visibility
Waiting Increase production visibility
Transport in production Reduce movement on products for data
scanning
Inappropriate processing Reduce human data entry or bar code
scanning
Unnecessary inventory Increase production visibility
Unnecessary motion Reduce human data entry or bar code
scanning
Defects Increase production visibility