SlideShare a Scribd company logo
JEWELLERY Management using RFID TECHNOLOGY




         www.arumansoft.com                  1
Jewelry management process :




                                         jewelry




   Stock taking                                    Data entry




                                                    Jewelry label
     Billing                           Display
                  www.arumansoft.com                            2
INTRRODUCTION
     A jewelry shop faces a tremendous task of maintaining and accounting of
    thousands of jewelry items in a single store. The high value of jewelry items
    makes the loss of even one item potentially very expensive. since many jewelry
    displays are set up daily and then stored in safes in the evenings, there is ample
    opportunity for loss of product.

  CURRENT SYSTEM

    Currently, most jewelers track inventory on daily or weekly basis. This is often a
    Completely manual process, which is very time consuming, requires handling of
    each Jewelry item, and is error prone. Some jewels are using barcode, which still
    requires line of sight for reading and still leads to additional, unnecessary
    handling of the jewelry items. A jewelry store with thousands of high values
    ornaments find it difficult to know the exact stock of the jewelry in their
    stores, since the current process is manual and time consuming. the need of
    these stores is thus a system that can automate the inventory taking process thus
    reducing manual effort and saving time.
                      www.arumansoft.com                                                 3
TECHNOLOGY

   Radio frequency identification (RFID) is a generic term that is used to describe
  a object or person wirelessly in a tag, using radio waves. Tags are microchips
  with an antenna which have a unique identifier number and memory which
  can be programmable according to the customer requirement




                     www.arumansoft.com                                               4
PROPOSED SOLUTION
Jewelry tagging:
when new items are received, a unique serial number will be generated by
the software for the item.
RFID jewelry tag, encoded with the item code will be then attached to
jewelry item

Billing:
During billing, the RFID tag attached to the item will be read by a desktop
RFID reader.
 Inventory in the application software will be updated

Physical verification tray reading:
A long range RFID reader will be used to read all items in a tray
Tray containing multiple items attached with RFID tag will be shown to the
RFID reader and the all item codes will be read by the reader within a few
seconds time.

                    www.arumansoft.com                                         5
Physical verification hand held reading:
Hand held reader will be moved near the items attached with the RFID tag and
the item code of all items will be captured by the reader.
Captured data will be transferred to the application software.




                     www.arumansoft.com                                         6
Suggested Hardware Equipments
      item                   image        application

      ARU 1002                            It is a RFID reader with
      RFID desktop reader                 reading distance of 0.5
                                          meters. this can be used
                                          for jewelry tag encoding
                                          when new items are
                                          received. this also can
                                          be used for reading
                                          items while billing.
      ARU 1009                            Long range integrative
      Long range                          RFID reader for physical
      integrative RFID                    verification application.
      reader                              A tray with multiple
                                          items can be shown to
                                          the reader to read all
                                          items in the tray.

                     www.arumansoft.com                               7
ARU 1003                              Handheld reader with PDA
Hand held RFID                        for physical verification
reader                                application.




RFID tag                              RFID tag for attaching to
                                      jewelry items




                 www.arumansoft.com                               8
ARUMAN SOFTWARE Technologies Pvt. Ltd
         Email: sales@arumansoft.com


        PRESENTED BY:-saurav suman
       saurav_suman0906@hotmail.com




      www.arumansoft.com                9

More Related Content

What's hot

Rfid technology
Rfid technologyRfid technology
Rfid technology
Publicis Sapient
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
davidtowers
 
Rfid library Management
Rfid library ManagementRfid library Management
Rfid library ManagementKunal Babre
 
RFID in retail sector
RFID in retail sectorRFID in retail sector
RFID in retail sector
sedadoc
 
Library management system using rfid
Library management system using rfidLibrary management system using rfid
Library management system using rfidNaveen Sihag
 
Smart shopping cart (using RFID)
Smart shopping cart (using RFID)Smart shopping cart (using RFID)
Smart shopping cart (using RFID)
Majurageerthan Arumugathasan
 
Automation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDAutomation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFID
Sudher Sun
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
Pravin Shinde
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
Francisco Carabez
 
RFID
RFIDRFID
RFID Technologies for Inventory Management
RFID Technologies for Inventory ManagementRFID Technologies for Inventory Management
RFID Technologies for Inventory Managementsabdulaz
 
RFID Shopping System
RFID Shopping SystemRFID Shopping System
RFID Shopping System
Aayush Tuladhar
 
Warehouse management and operations rfid
Warehouse management and operations rfidWarehouse management and operations rfid
Warehouse management and operations rfid
Sopagna Chan
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
Davide Del Monte
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFID
EcoTrackSystemsETSRF
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply Chain
Existco Pty Ltd
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
Anal Mandal
 

What's hot (20)

Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Rfid library Management
Rfid library ManagementRfid library Management
Rfid library Management
 
RFID in retail sector
RFID in retail sectorRFID in retail sector
RFID in retail sector
 
Library management system using rfid
Library management system using rfidLibrary management system using rfid
Library management system using rfid
 
Smart shopping cart (using RFID)
Smart shopping cart (using RFID)Smart shopping cart (using RFID)
Smart shopping cart (using RFID)
 
Automation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDAutomation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFID
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID
RFIDRFID
RFID
 
RFID Technologies for Inventory Management
RFID Technologies for Inventory ManagementRFID Technologies for Inventory Management
RFID Technologies for Inventory Management
 
RFID Shopping System
RFID Shopping SystemRFID Shopping System
RFID Shopping System
 
Warehouse management and operations rfid
Warehouse management and operations rfidWarehouse management and operations rfid
Warehouse management and operations rfid
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFID
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply Chain
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
 

Viewers also liked

project on visual basic 6.0 ' Jewellery Shop Management'
project on visual basic 6.0 ' Jewellery Shop Management' project on visual basic 6.0 ' Jewellery Shop Management'
project on visual basic 6.0 ' Jewellery Shop Management'
Anitha Krishnappa
 
Jewellery ppt
Jewellery pptJewellery ppt
Jewellery ppt
IP Dome
 
Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Dinesh Jogdand
 
Final ppt of marketing research on jwellery industry
Final ppt of marketing research on jwellery industryFinal ppt of marketing research on jwellery industry
Final ppt of marketing research on jwellery industry
ptaakash
 
marketing strategies of jewellery new product launch
marketing strategies of jewellery new product launchmarketing strategies of jewellery new product launch
marketing strategies of jewellery new product launch
Rohit Agarwal
 
Project report on mobile shop management
Project report on mobile shop managementProject report on mobile shop management
Project report on mobile shop management
Dinesh Jogdand
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
Nitesh Kumar
 
Presentation on Jewllery of Marketing For Business Studies 12th class
Presentation  on Jewllery of Marketing For Business Studies 12th classPresentation  on Jewllery of Marketing For Business Studies 12th class
Presentation on Jewllery of Marketing For Business Studies 12th class
Deepanshu Agarwal
 
College Stationery Management System VB 6.0 and Microsoft Access Project
College Stationery Management System VB 6.0  and Microsoft Access ProjectCollege Stationery Management System VB 6.0  and Microsoft Access Project
College Stationery Management System VB 6.0 and Microsoft Access Project
Tushar Soni
 
The Art of Jewellery
The Art of JewelleryThe Art of Jewellery
The Art of Jewellery
The Modern Story
 
Oliver Koch-Pahl "Product Placement"
Oliver Koch-Pahl "Product Placement"Oliver Koch-Pahl "Product Placement"
Oliver Koch-Pahl "Product Placement"
Filmteractive
 
E Card Ppt
E Card PptE Card Ppt
E Card Ppt
Prashant Priyam
 
Interactive Ads presentation for MIT Sloan project for CISCO Systems
Interactive Ads presentation for MIT Sloan project for CISCO SystemsInteractive Ads presentation for MIT Sloan project for CISCO Systems
Interactive Ads presentation for MIT Sloan project for CISCO Systemsmturilin
 
Jewellery Retail Software
Jewellery Retail SoftwareJewellery Retail Software
Jewellery Retail Software
Cetas Information Technology Pvt Ltd
 
iDTV in Belgium : Strategic opportunities, consumer’s behavior and business m...
iDTV in Belgium : Strategic opportunities, consumer’s behavior and business m...iDTV in Belgium : Strategic opportunities, consumer’s behavior and business m...
iDTV in Belgium : Strategic opportunities, consumer’s behavior and business m...
Cleverwood Belgium
 
Copy of tanishq presentation
Copy of tanishq presentationCopy of tanishq presentation
Copy of tanishq presentationkadavadkar
 
Online computer shop 111 35-181
Online computer shop 111 35-181Online computer shop 111 35-181
Online computer shop 111 35-181
Daffodil International University
 
Tanishq
TanishqTanishq
Tanishq
Ankit Ranjan
 
Wedding invite powerpoint
Wedding invite powerpointWedding invite powerpoint
Wedding invite powerpointcharlesmusyoki
 
TYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CLTYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CL
WE-IT TUTORIALS
 

Viewers also liked (20)

project on visual basic 6.0 ' Jewellery Shop Management'
project on visual basic 6.0 ' Jewellery Shop Management' project on visual basic 6.0 ' Jewellery Shop Management'
project on visual basic 6.0 ' Jewellery Shop Management'
 
Jewellery ppt
Jewellery pptJewellery ppt
Jewellery ppt
 
Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)
 
Final ppt of marketing research on jwellery industry
Final ppt of marketing research on jwellery industryFinal ppt of marketing research on jwellery industry
Final ppt of marketing research on jwellery industry
 
marketing strategies of jewellery new product launch
marketing strategies of jewellery new product launchmarketing strategies of jewellery new product launch
marketing strategies of jewellery new product launch
 
Project report on mobile shop management
Project report on mobile shop managementProject report on mobile shop management
Project report on mobile shop management
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
Presentation on Jewllery of Marketing For Business Studies 12th class
Presentation  on Jewllery of Marketing For Business Studies 12th classPresentation  on Jewllery of Marketing For Business Studies 12th class
Presentation on Jewllery of Marketing For Business Studies 12th class
 
College Stationery Management System VB 6.0 and Microsoft Access Project
College Stationery Management System VB 6.0  and Microsoft Access ProjectCollege Stationery Management System VB 6.0  and Microsoft Access Project
College Stationery Management System VB 6.0 and Microsoft Access Project
 
The Art of Jewellery
The Art of JewelleryThe Art of Jewellery
The Art of Jewellery
 
Oliver Koch-Pahl "Product Placement"
Oliver Koch-Pahl "Product Placement"Oliver Koch-Pahl "Product Placement"
Oliver Koch-Pahl "Product Placement"
 
E Card Ppt
E Card PptE Card Ppt
E Card Ppt
 
Interactive Ads presentation for MIT Sloan project for CISCO Systems
Interactive Ads presentation for MIT Sloan project for CISCO SystemsInteractive Ads presentation for MIT Sloan project for CISCO Systems
Interactive Ads presentation for MIT Sloan project for CISCO Systems
 
Jewellery Retail Software
Jewellery Retail SoftwareJewellery Retail Software
Jewellery Retail Software
 
iDTV in Belgium : Strategic opportunities, consumer’s behavior and business m...
iDTV in Belgium : Strategic opportunities, consumer’s behavior and business m...iDTV in Belgium : Strategic opportunities, consumer’s behavior and business m...
iDTV in Belgium : Strategic opportunities, consumer’s behavior and business m...
 
Copy of tanishq presentation
Copy of tanishq presentationCopy of tanishq presentation
Copy of tanishq presentation
 
Online computer shop 111 35-181
Online computer shop 111 35-181Online computer shop 111 35-181
Online computer shop 111 35-181
 
Tanishq
TanishqTanishq
Tanishq
 
Wedding invite powerpoint
Wedding invite powerpointWedding invite powerpoint
Wedding invite powerpoint
 
TYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CLTYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CL
 

Similar to Jewellery management using rfid

Rfid library management
Rfid library managementRfid library management
Rfid library management
Saurav Suman
 
Retail management using rfid
Retail management using rfidRetail management using rfid
Retail management using rfid
Saurav Suman
 
Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
EnCStore Private Limited
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturers
POXO RFID AUTOMATION
 
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptxdevzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
Kashinathvpillai
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
Akash Maurya
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
ashtopustech
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in libraries
Shivashish Verma
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
KondiVinay
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
Akash Maurya
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
musicalmood
 
Rfid in retail(kapil)
Rfid in retail(kapil)Rfid in retail(kapil)
Rfid in retail(kapil)isme
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid application
Priyanka Singh
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
lisbala
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
Rbalasubramani
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
Hristo Borislavov Kolev
 
LISYS PRESENTATION
LISYS PRESENTATIONLISYS PRESENTATION
LISYS PRESENTATIONSunil Nair
 

Similar to Jewellery management using rfid (20)

Rfid library management
Rfid library managementRfid library management
Rfid library management
 
Retail management using rfid
Retail management using rfidRetail management using rfid
Retail management using rfid
 
Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturers
 
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptxdevzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in libraries
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Rfid in retail(kapil)
Rfid in retail(kapil)Rfid in retail(kapil)
Rfid in retail(kapil)
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid application
 
Rfid seminar
Rfid seminarRfid seminar
Rfid seminar
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
 
RFID-SECURITY_Vatsalya
RFID-SECURITY_VatsalyaRFID-SECURITY_Vatsalya
RFID-SECURITY_Vatsalya
 
LISYS PRESENTATION
LISYS PRESENTATIONLISYS PRESENTATION
LISYS PRESENTATION
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Jewellery management using rfid

  • 1. JEWELLERY Management using RFID TECHNOLOGY www.arumansoft.com 1
  • 2. Jewelry management process : jewelry Stock taking Data entry Jewelry label Billing Display www.arumansoft.com 2
  • 3. INTRRODUCTION A jewelry shop faces a tremendous task of maintaining and accounting of thousands of jewelry items in a single store. The high value of jewelry items makes the loss of even one item potentially very expensive. since many jewelry displays are set up daily and then stored in safes in the evenings, there is ample opportunity for loss of product. CURRENT SYSTEM Currently, most jewelers track inventory on daily or weekly basis. This is often a Completely manual process, which is very time consuming, requires handling of each Jewelry item, and is error prone. Some jewels are using barcode, which still requires line of sight for reading and still leads to additional, unnecessary handling of the jewelry items. A jewelry store with thousands of high values ornaments find it difficult to know the exact stock of the jewelry in their stores, since the current process is manual and time consuming. the need of these stores is thus a system that can automate the inventory taking process thus reducing manual effort and saving time. www.arumansoft.com 3
  • 4. TECHNOLOGY Radio frequency identification (RFID) is a generic term that is used to describe a object or person wirelessly in a tag, using radio waves. Tags are microchips with an antenna which have a unique identifier number and memory which can be programmable according to the customer requirement www.arumansoft.com 4
  • 5. PROPOSED SOLUTION Jewelry tagging: when new items are received, a unique serial number will be generated by the software for the item. RFID jewelry tag, encoded with the item code will be then attached to jewelry item Billing: During billing, the RFID tag attached to the item will be read by a desktop RFID reader.  Inventory in the application software will be updated Physical verification tray reading: A long range RFID reader will be used to read all items in a tray Tray containing multiple items attached with RFID tag will be shown to the RFID reader and the all item codes will be read by the reader within a few seconds time. www.arumansoft.com 5
  • 6. Physical verification hand held reading: Hand held reader will be moved near the items attached with the RFID tag and the item code of all items will be captured by the reader. Captured data will be transferred to the application software. www.arumansoft.com 6
  • 7. Suggested Hardware Equipments item image application ARU 1002 It is a RFID reader with RFID desktop reader reading distance of 0.5 meters. this can be used for jewelry tag encoding when new items are received. this also can be used for reading items while billing. ARU 1009 Long range integrative Long range RFID reader for physical integrative RFID verification application. reader A tray with multiple items can be shown to the reader to read all items in the tray. www.arumansoft.com 7
  • 8. ARU 1003 Handheld reader with PDA Hand held RFID for physical verification reader application. RFID tag RFID tag for attaching to jewelry items www.arumansoft.com 8
  • 9. ARUMAN SOFTWARE Technologies Pvt. Ltd Email: sales@arumansoft.com PRESENTED BY:-saurav suman saurav_suman0906@hotmail.com www.arumansoft.com 9