PRESENTED BY
KIRAN RASHEED (IQRA
UNIVERSITY)
AAMIR AHSAN (DAWOOD
UNIVERSITY)
ASIF ALI (SINDH UNIVERSITY)
 Automatic Identification Technology
 Uses RADIO WAVES to transfer data between a
reader and moveable item to identify
 Identification is transmitted in the form of SERIAL
NUMBER
 RFID system consists of an ANTENNA, a
TRANSCEIVER and a RF TAG(Transponder)
.
With the same tag Identity (ID)
 PERSONAL IDENTITY IDENTIFICATION
 RECORD ATTENDANCE
 DOOR ACCESS CONTROL AND GATE ENTRY PERMIT
.
.
.
.
 Each vehicle has a passive tag inside the windshield.
 As the vehicle moves into reader area of interrogation
RFID Reader reads the tags affixed on the vehicle.
 If ID is authorized then its number plate will be
automatically displayed on the system software.
 Controlling signal is issued to lift up the boom-barrier
.
 Provides MULTI ACCESS CONTROL with same ID
 Time-attendance management system
 Record IN and OUT timings
 Track Vehicle Identification
 Provide Security
 Unauthorized person or vehicle can not be entered
 An RFID tag can be read without any physical contact
 No line of sight requirement
 Portable database
 RFID tags carry large data capabilities which can be programmed
to the tag
 Once these are set up; it can be run with minimal human
participation.
 RFID tags are read/write devices
 RFID contain high levels of security; data can be encrypted,
password protected
 The tag can stand a harsh environment
 Multiple tag read/write.
 Tracking people, items, and equipment in real time.
 Automatic Vehicle identification
 Inventory Management
 Attendance Management
 Personal Identification
 Work-in-Process
 Container/ Yard Management
 Goods tracking
 Patient Monitoring
 Perform automated attendance
 Generate report of attendees for a particular course
 Error free tag identifier detection
 Easy scalability to incorporate more records
 Integrity and security in data storage
 Very helpful to maintain the attendance of each employee
with door access and gate entry permit system
 By using the same tag, user can access many place and also
as identity
 The tag stored ID and every user registered in a central
database, application software used for registration, check
identity and check the record of attendance
 In terms of performance and efficiency, this project has
provided a convenient method
 This system is also a user friendly system as data
manipulation and retrieval can be done via the interface
 It can be implemented in PIA to enhance the performance of
its current system
PIA Internship P

PIA Internship P

  • 1.
    PRESENTED BY KIRAN RASHEED(IQRA UNIVERSITY) AAMIR AHSAN (DAWOOD UNIVERSITY) ASIF ALI (SINDH UNIVERSITY)
  • 2.
     Automatic IdentificationTechnology  Uses RADIO WAVES to transfer data between a reader and moveable item to identify  Identification is transmitted in the form of SERIAL NUMBER  RFID system consists of an ANTENNA, a TRANSCEIVER and a RF TAG(Transponder)
  • 3.
  • 4.
    With the sametag Identity (ID)  PERSONAL IDENTITY IDENTIFICATION  RECORD ATTENDANCE  DOOR ACCESS CONTROL AND GATE ENTRY PERMIT
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
     Each vehiclehas a passive tag inside the windshield.  As the vehicle moves into reader area of interrogation RFID Reader reads the tags affixed on the vehicle.  If ID is authorized then its number plate will be automatically displayed on the system software.  Controlling signal is issued to lift up the boom-barrier
  • 10.
  • 11.
     Provides MULTIACCESS CONTROL with same ID  Time-attendance management system  Record IN and OUT timings  Track Vehicle Identification  Provide Security  Unauthorized person or vehicle can not be entered
  • 12.
     An RFIDtag can be read without any physical contact  No line of sight requirement  Portable database  RFID tags carry large data capabilities which can be programmed to the tag  Once these are set up; it can be run with minimal human participation.
  • 13.
     RFID tagsare read/write devices  RFID contain high levels of security; data can be encrypted, password protected  The tag can stand a harsh environment  Multiple tag read/write.  Tracking people, items, and equipment in real time.
  • 14.
     Automatic Vehicleidentification  Inventory Management  Attendance Management  Personal Identification  Work-in-Process  Container/ Yard Management  Goods tracking  Patient Monitoring
  • 15.
     Perform automatedattendance  Generate report of attendees for a particular course  Error free tag identifier detection  Easy scalability to incorporate more records  Integrity and security in data storage
  • 16.
     Very helpfulto maintain the attendance of each employee with door access and gate entry permit system  By using the same tag, user can access many place and also as identity  The tag stored ID and every user registered in a central database, application software used for registration, check identity and check the record of attendance
  • 17.
     In termsof performance and efficiency, this project has provided a convenient method  This system is also a user friendly system as data manipulation and retrieval can be done via the interface  It can be implemented in PIA to enhance the performance of its current system