every classroom need technology and in every student and teacher's hand because it is a pen and paper of our time and it's lens through which we experience much of world
every classroom need technology and in every student and teacher's hand because it is a pen and paper of our time and it's lens through which we experience much of world
Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders
Radio frequency identication (RFID) is a rapidly growing technology that
has the potential to make great economic impacts on many industries. While
RFID is a relatively old technology, more recent advancements in chip man-
ufacturing technology are making RFID practical for new applications and
settings. These advancements have the potential to revolutionize supply-
chain management, inventory control, and logistics
Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders
Radio frequency identication (RFID) is a rapidly growing technology that
has the potential to make great economic impacts on many industries. While
RFID is a relatively old technology, more recent advancements in chip man-
ufacturing technology are making RFID practical for new applications and
settings. These advancements have the potential to revolutionize supply-
chain management, inventory control, and logistics
Lapsen ja perheen tilanteen sekä tuen tarpeen arviointiTHL
2.9.2016 Kohti monitoimijaista laadukasta arviointia lapsi- ja perhepalveluissa - lasten, nuorten ja perheiden erityispalveluiden kehittäminen ja matalan kynnyksen palvelut -työpaja Hanna Tulensalo
Apteekkien määrää voitaisiin tiheään asutuilla alueilla vähentää selvästi jo lähivuosina palvelujen saavutettavuuden juurikaan kärsimättä. Edellytyksenä tälle on digitalisaation mahdollisuuksien ja logistiikan kehityksen hyödyntäminen. Tiedot käyvät ilmi Oulun yliopiston maantieteen tutkimusyksikön tuoreista laskelmista.
Jaana Nevalainen: Työllisyyspalvelujen uudet järjestelyt sote-uudistuksen näk...THL
Jaana Nevalainen: Työllisyyspalvelujen uudet järjestelyt sote-uudistuksen näkökulmasta. Esitetty seminaarissa Tete vai Sote? Työllisyyspalvelujen uudet järjestelyt sote-uudistuksessa 12.4.2016.
Radio Frequency Identification(RFID) is one of the most exciting technology that revolutionize the working practices by increasing efficiencies and improving profitability.
UHF RFID (Ultra High Frequency Radio Frequency Identification) Antenna is a type of RFID technology that is used to identify and track objects using radio waves. The UHF RFID Antenna operates at a frequency range of 860 MHz to 960 MHz and can read tags from a distance of up to 10 meters. It is commonly used in various industries for inventory management, asset tracking, and supply chain management. UHF RFID antennas has longer read ranges and faster data transfer speeds compared to other types of RFID antennas.
Some Features of UHF RFID Antenna:
High read rates and accuracy
Longer read ranges, up to 30 feet or more
Faster data transfer speeds
The rapid development in an information technology has brought out a revolutionary change in the field of library system and services.The new information technology has changed the manual scenario of library to computerized automated library.
RFID (Radio Frequency Identification)
Today, more and more libraries are adopting RFID (Radio Frequency Identification) technologies as it streamlines workflow in the area of self service, book returns, shelf management and inventory.
Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader and may be embedded in the tracked object. RFID is one method for Automatic Identification and Data Capture (AIDC).[1]
RFID tags are used in many industries. For example, an RFID tag attached to an automobile during production can be used to track its progress through the assembly line; RFID-tagged pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in livestock and pets allows positive identification of animals.
Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals and people, the possibility of reading personally-linked information without consent has raised serious privacy concerns.[2]
In 2014, the world RFID market is worth $8.89 billion, up from $7.77 billion in 2013 and $6.96 billion in 2012. This includes tags, readers, and software/services for RFID cards, labels, fobs, and all other form factors. The market value is expected to rise to $27.31 billion by 2024.[3]
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas
Background of Radio Frequency Identification (RFID)
Need of RFID
Feasibility and Planning
Check list & Best practices in Deployment
Tendering
Components
How does Library RFID System Work
Major Advantages
Limitations
Barcode vs. RFID; EM vs. RFID; Hybrid Technology
Book ATMs
Impact Study of RFID Implementation @IIT Delhi
RFID Vendors with presence in India and sub-continent
RFID in Indian Libraries
Global Scenario
Conclusion
IN140703 service support technologies 6.10.2016Pirita Ihamäki
6.10.2016 Service support technologies first part go through Virtual Reality, Virtual Prototyping, Component of a Virtual Prototype, Top 5 Virtual Reality Gadget of the Future, Virtual Market Potential.
IN140703 service support technologies 4.10.2016Pirita Ihamäki
4.10.2016 Service support technologies second part we go through the Augmented Reality, Historical Overview of the Augmented Reality, Augmented Reality Games, Augmented Reality with Tourist Services, Augmented Reality Instructions, Augmented Reality in Automotive Industry, The Future of Augmented Reality and Workshop.
IN140703 service support technologies 29.9.2016 part 2Pirita Ihamäki
29.9.2016 Service support technologies lecture go through at second part the Cyporg, Cyporg - Nest, Transhumanism, Transhumanists judge "improvement of the human condition", biotechnology, The Term "human clogning", Cyporg - Movies.
IN140703 service support technologies 26.9.2016Pirita Ihamäki
26.9.2016 Service support technologies lecture go through Internet of Things, Definition of Internet of Things, Overlap of the Internet of Things with field of research, Opportunities and motivations of the Internet of things, Internet of Things - Do-it Yourself (DiY).
IN140703 service support technologies 22.9.2016Pirita Ihamäki
22.9.2016 Service support technologies lecture go through smart technologies, smart technologies and new business opportunities, smart materials, smart structures, smart environments and smart home application.
IN140703 service support technologies 8.9.2016Pirita Ihamäki
Service support technologies 8.9.2016 go through the Mobile Device Management, Mobile Strategy, Mobile Application Design, Network - Enables Mobile Applications, Key Factors of Strong Mobile Applications, Workshop.
Service support technologies 6.9.2016 go through service definition, service systems depend on value co-creation, service definition in technology context, Service Life Cycle Strategy, Service-Oriented life cycle strategy disiciplines and summary.
Geokätköilyä - välineitä opetukseen ja matkailuunPirita Ihamäki
Geokätköily on aarteenetsintää, jossa käytetään GPS –paikannusta apuna ja etsitään aarteita erilaisista maastoista.
Geokätköilyn virallisena sivustona pidetään Geocaching.com
Geokätkentää harrastetaan 180 eri maassa ja geokätköjä on tällä hetkellä 2,7 miljoonaa ympäri maaiilmaa. Geokätköilijöitä on rekisteröitynyt 10 miljoonaa Geocaching.com –sivustolle.
Digiajan aarteen metsästystä http://www.youtube.com/watch?v=c-3rOu5VguQ&feature=youtu.be
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Hivelance Technology
Cryptocurrency trading bots are computer programs designed to automate buying, selling, and managing cryptocurrency transactions. These bots utilize advanced algorithms and machine learning techniques to analyze market data, identify trading opportunities, and execute trades on behalf of their users. By automating the decision-making process, crypto trading bots can react to market changes faster than human traders
Hivelance, a leading provider of cryptocurrency trading bot development services, stands out as the premier choice for crypto traders and developers. Hivelance boasts a team of seasoned cryptocurrency experts and software engineers who deeply understand the crypto market and the latest trends in automated trading, Hivelance leverages the latest technologies and tools in the industry, including advanced AI and machine learning algorithms, to create highly efficient and adaptable crypto trading bots
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
Tim Combridge from Sensible Giraffe and Salesforce Ben presents some important tips that all developers should know when dealing with Flows in Salesforce.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Your Digital Assistant.
Making complex approach simple. Straightforward process saves time. No more waiting to connect with people that matter to you. Safety first is not a cliché - Securely protect information in cloud storage to prevent any third party from accessing data.
Would you rather make your visitors feel burdened by making them wait? Or choose VizMan for a stress-free experience? VizMan is an automated visitor management system that works for any industries not limited to factories, societies, government institutes, and warehouses. A new age contactless way of logging information of visitors, employees, packages, and vehicles. VizMan is a digital logbook so it deters unnecessary use of paper or space since there is no requirement of bundles of registers that is left to collect dust in a corner of a room. Visitor’s essential details, helps in scheduling meetings for visitors and employees, and assists in supervising the attendance of the employees. With VizMan, visitors don’t need to wait for hours in long queues. VizMan handles visitors with the value they deserve because we know time is important to you.
Feasible Features
One Subscription, Four Modules – Admin, Employee, Receptionist, and Gatekeeper ensures confidentiality and prevents data from being manipulated
User Friendly – can be easily used on Android, iOS, and Web Interface
Multiple Accessibility – Log in through any device from any place at any time
One app for all industries – a Visitor Management System that works for any organisation.
Stress-free Sign-up
Visitor is registered and checked-in by the Receptionist
Host gets a notification, where they opt to Approve the meeting
Host notifies the Receptionist of the end of the meeting
Visitor is checked-out by the Receptionist
Host enters notes and remarks of the meeting
Customizable Components
Scheduling Meetings – Host can invite visitors for meetings and also approve, reject and reschedule meetings
Single/Bulk invites – Invitations can be sent individually to a visitor or collectively to many visitors
VIP Visitors – Additional security of data for VIP visitors to avoid misuse of information
Courier Management – Keeps a check on deliveries like commodities being delivered in and out of establishments
Alerts & Notifications – Get notified on SMS, email, and application
Parking Management – Manage availability of parking space
Individual log-in – Every user has their own log-in id
Visitor/Meeting Analytics – Evaluate notes and remarks of the meeting stored in the system
Visitor Management System is a secure and user friendly database manager that records, filters, tracks the visitors to your organization.
"Secure Your Premises with VizMan (VMS) – Get It Now"
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
1. IN140703 Service support
technologies 20.9.2016
Pirita Ihamäki Phd. Mc.S.
pirita.ihamaki@samk.fi
Satakunta University of Applied Sciences, Unit Rauma
2. Content
• Basics of RFID
• RFID
• Functional Classification of RFID Tranponders
• RFID Generations
• Applications and Frequency Selection
• Commonly Used Frequency Band for RFID Systems
• How does an RFID system work?
• RFID business
• Active versus passive tags
• Active tags
• Passive tags
• Workshop
Satakunta University of Applied Sciences, Unit Rauma
3. Basics of RFID
• RFID = Radiofrequency identification
• RFID systems use radio waves
• RFID systems have two main elements, which
are the device used to carry this information
and the equipment used to automatically
capture or retrieve the information.
• The devices that store and carry the
information are called trasponders or tags.
Satakunta University of Applied Sciences, Unit Rauma
5. Basics of RFID
• Industry commonly referred to RFID as tags
mainly due to their physical shape and the fact
that they are mostly used to tag pallets or cases
of goods, the name transponder reflects better
the function of these devices.
• The device that is used to capture and transfer
information is commonly called a reader, because
in earlier RFID systems they were only able to
read the information sen by the transponders.
Satakunta University of Applied Sciences, Unit Rauma
6. Functional Classification of
RFID Tranponders
• A functional classification of RFID
transponders is based on their electronic
product code (EPC) class.
• EPC is the application of specific type of RFID
technology within the consumer package
goods industry. Within this classification, RFID
transponders are divided into different classes
and generations.
Satakunta University of Applied Sciences, Unit Rauma
7. RFID Generations
• Generation 1., Class 0: Passive tags with read-
only functionality. These are also called write
one, read many (WORM) transponders. These
transponders are programmed at the factory
with their unique identification number. The
user is not able to change it or include
additional information.
Satakunta University of Applied Sciences, Unit Rauma
8. RFID Generations
• Generation 1., Class 0+: These are also WORM
transponders. They differ from Generation 1,
Class 0 transponders in that it is the user who
programs them. After they have been
programmed by the user, no further
programming or changing of data is allowed.
Satakunta University of Applied Sciences, Unit Rauma
9. RFID Generations
• Generation 1., Class1: These transponders were similar
to Generation 1 Class 0 or =+ transponders, but could
be read by interrogators from other companies.
Generation 1, Class 1 transponders have evolved into
the different transponders from Generation 2.
• Generation 1 transponders employ proprietary data
structures and can be read only by interrogators
manufactured by the same vendor.
• This means the elimination of duplicate reads within
the read range.
Satakunta University of Applied Sciences, Unit Rauma
10. RFID Generations
• Generation2, Class 1: These transponders are
WORM transponders. They are also
programmed at the factory, but they can be
read with equipment from different vendors,
support the higher rates, and have more noise
immunity than the Generation 1
transponders.
Satakunta University of Applied Sciences, Unit Rauma
11. RFID Generations
• Generation2, Class 2: These transponders are
rewritable transponders. They can be written
several times by the user using equipment
differently from the vendor’s equipment.
• Generation 2, Class 3: These transponders are
the semipassive or battery-assisted
transponders.
Satakunta University of Applied Sciences, Unit Rauma
12. RFID Generations
• Generation2, Class 4: This refers to active
transponders.
• Generation 2, Class 5: These transponders are
essentially interrogators. Transponders that
follow Generation , Class 5 must be able to do
power other transponders.
Satakunta University of Applied Sciences, Unit Rauma
13. Applications and Frequency
Selection
• RFID systems come in different flavors from the
point of view of the frequency they use.
Selecting the most adequate frequency is a
function of two variables: the technological
developments of systems at the different
operating frequencies – directly related to the
cost of systems – as well as the properties of
electromagnetic waves at those different
frequencies.
Satakunta University of Applied Sciences, Unit Rauma
14. Commonly Used Frequency
Band for RFID Systems
Frequency Band Frequency Range Tyoical Frequencies Used in
RFID Systems
Low Frequency (LF) 100kHz-500 kHz 125 kHz, 134,2 kHz
High FreQuency (HF) 10 MHz -15 MHz 13,56MHz
Ultra High Frequency (UHF) 400 MHz-950mHz 866 Mhz Europe, 915 MHz
United States
Microwaves (ųW) 2.4 GHz-6.8 Ghz 2.45 Ghz, 3.0 Ghz
Satakunta University of Applied Sciences, Unit Rauma
15. How does an RFID system
work?
• The RFID system uses a tag, which is a paper and
metallic label, composed of a microchip with a
coiled dipolar antenna.
• The label combination may be covered with a
plastic protective cover, which can be transparent
or not.
• The RFID label or tag is affixed onto a container or
package or onto an item, such as a book or CD.
Satakunta University of Applied Sciences, Unit Rauma
16. How does an RFID system
work?
• Today these RFID tags and bar codes are being used
together.
• When you get your luggage tag to the airport, check it
out carefully. Actually, the luggage tag will probably
have five copies of the bar code on the outside of the
luggage tag; if an RFID is also used, there will be one
passive RFID tag in the middle of that label.
• It may be a sandwich of two pieces of paper, with the
inside filling a passive RFID tag and the outside a
standard bar code.
Satakunta University of Applied Sciences, Unit Rauma
17. RFID business
• RFID business or experiment with this technology it is not
that costly.
• The price for a complete kit with a reader, antenna, and
sample tags runs from several hundred dollars.
• The RFID technology is more about data, the business
process, and systems thinking than it is about the
technology.
• Just purchasing the equipment is one small part of a
multiple set of solutions with RFID. The other part of the
solution set is to analyze and examine your business
process of the manufacturing or movements of goods.
Satakunta University of Applied Sciences, Unit Rauma
18. Active versus passive tags
• RFID tags are either active or passive.
• Active tags have a battery for a source of power to store
data or to transmit a radio signal with the data.
• As such, they perform similar to your portable radio and
can be read over a great distance, with a limit of over 100
feet (30 meters).
• Active tags are significantly more costly than passive tags.
• The active tag is usually encased in a hard shell for
protection, because these tags are used in rugged
environments.
Satakunta University of Applied Sciences, Unit Rauma
19. Active tags
• Active tags are used usually encased in a hard shell for
protection, because these tags are used in rugged
environments.
• These active tags are used for a variety of purposes,
such as tracking the time and temperature of fresh
Alaskan salmon. The tags are placed in a box an of
Salomon that is to be kept at a constant temperature
near freezing for the journey from the ship to a carried
of transportation systems: a barge, truck or airfreight.
• Other active tags might be attached to boxes of cargo
destined for a war zone for the military.
Satakunta University of Applied Sciences, Unit Rauma
20. Passive tags
• The passive tag needs to be closer to the reader
than the active tag. The passive tag has no
battery.
• Passive tag very attractive for containers of
products, but not necessarily on each individual
item on the container.
• One of the key areas in logistics where active tags
are being used is the shipping of cargo entering
marine ports.
Satakunta University of Applied Sciences, Unit Rauma
22. WorkShop
• The divided groups of 5 people.
• Design system concept of using RFID
technology.
• ”The flow of ideas from one field into another
often takes curious and ambivalent paths”.
Satakunta University of Applied Sciences, Unit Rauma
23. Results
• Groups make presentations and present for
result for other groups.
• What kind of systems concepts of using RFID
you have designed?
Satakunta University of Applied Sciences, Unit Rauma