Rfid_technology

در نمایش آنلاین پاورپوینت، ممکن است بعضی علائم، اعداد و حتی فونت‌ها به خوبی نمایش داده نشود. این مشکل در فایل اصلی پاورپوینت وجود ندارد.






  • جزئیات
  • امتیاز و نظرات
  • متن پاورپوینت

امتیاز

درحال ارسال
امتیاز کاربر [0 رای]

نقد و بررسی ها

هیچ نظری برای این پاورپوینت نوشته نشده است.

اولین کسی باشید که نظری می نویسد “RFID Technology”

RFID Technology

اسلاید 1: RFID TechnologyWhat is it? Why should you care?www.Rj12.net ©

اسلاید 2: What is RFID? www.Rj12.net ©

اسلاید 3: Radio Frequency IdentificationStand forOperate at different frequencies depending on the application The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. www.Rj12.net ©

اسلاید 4: Three parts to an RFID implementationTag (Transponder)ReaderDatabase & softwareActive RFIDPassive RFIDTag Power SourceInternal to tagEnergy transferred using RF from readerTag BatteryYesNoRequired signal strengthVery LowVery HighRangeUp to 100mUp to 3-5m, usually lessMulti-tag reading1000’s of tags recognized – up to 100mphFew hundred within 3m of readerData StorageUp to 128 Kb or read/ write & search128 bytes of read/writeAn RFID tag is a microchip combined with an antenna in a compact package; the packaging is structured to allow the RFID tag to be attached to an object to be tracked. RFID stands for Radio Frequency Identification.The tags antenna picks up signals from an RFID reader or scanner and then returns the signal, usually with some additional data (like a unique serial number or other customized information).RFID tags can be very small - the size of a large rice grain. Others may be the size of a small paperback book.An RFID reader is a device that is used to interrogate an RFID tag. The reader has an antenna that emits radio waves; the tag responds by sending back its data.A number of factors can affect the distance at which a tag can be read (the read range). The frequency used for identification, the antenna gain, the orientation and polarization of the reader antenna and the transponder antenna, as well as the placement of the tag on the object to be identified will all have an impact on the RFID system’s read range.www.Rj12.net ©

اسلاید 5: Basic Operational PrinciplesNSTAGReaderReaderTAGBackscatterFar field (UHF, microwave): Use backscattering which means reflecting the carrier wave and putting a signal into that reflection. Absorption by non-conductive materials significant problem for microwave frequenciesInductive CouplingNear field (LF, HF): inductive coupling of tag to magnetic field circulating around antenna (like a transformer Varying magnetic flux induces current in tag. Modulate tag load to communicate with readerwww.Rj12.net ©

اسلاید 6: RFID Applications www.Rj12.net ©

اسلاید 7: Human Trackingwww.Rj12.net ©

اسلاید 8: Animals Trackingwww.Rj12.net ©

اسلاید 9: Shops Securitywww.Rj12.net ©

اسلاید 10: Doors and Garages Securitywww.Rj12.net ©

اسلاید 11: Product Monitoring and Controlwww.Rj12.net ©

اسلاید 12: Shoppingwww.Rj12.net ©

اسلاید 13: www.Rj12.net ©

اسلاید 14: Electronic Passportwww.Rj12.net ©

اسلاید 15: Contactless paymentwww.Rj12.net ©

اسلاید 16: Civil liberties groups (among others) have become increasingly concerned about the use of RFIDs to track the movements of individuals. For example, passports will soon be required to contain some sort of RFID device to speed border crossings. Scanners placed throughout an airport, for example, could track the location of every passport over time, from the moment you left the parking lot to the moment you got on your plane. There are also concerns about the fact that, even after you leave the store, any RFID devices in the things you buy are still active. This means that a thief could walk past you in the mall and know exactly what you have in your bags, marking you as a potential victim. A thief could even circle your house with an RFID scanner and pull up data on what you have in your house before he robs it. Military hardware and even clothing make use of RFID tags to help track each item through the supply chain. Some analysts are concerned that, if there are particular items associated with high-level officers, roadside bombs could be set to go off when triggered by an RFID scan of cars going by.There was a recent report revealing clandestine tests at a Wal-Mart store where RFID tags were inserted in packages of lipstick, with scanners hidden on nearby shelves. When a customer picked up a lipstick and put it in her cart, the movement of the tag was registered by the scanners, which triggered surveillance cameras. This allowed researchers 750 miles away to watch those consumers as they walked through the store, looking for related items.Imagine an Internet of things, where everyday objects, rooms, and machines are connected to one another and to the larger digital world.”- Business 2.0www.Rj12.net ©

اسلاید 17: Our Project

اسلاید 18: Radio Frequency Identification (RFID, for short) is similar to barcode technology in that it employs coded labels to communicate information about a specific item (a library book or DVD, for instance) to a central server. However, since RFID uses radio frequencies to communicate with items attendant labels rather than scanning barcodes with a laser, the RFID reader does not require a direct line of sight to the label to read it, can read multiple items at once, and can read through physical tissue such as a book cover or DVD case.www.Rj12.net ©

اسلاید 19: CheckoutRFID technologys ability to read ID tags regardless of position or orientation, as well as detect signals through physical materials, is particularly advantageous for library circulation processes. Since several items can be read at once, checkout procedures can be accomplished much more rapidly than with barcode technology, which requires that each item be handled individually. For these reasons, patrons can accomplish self-checkout much more efficiently, as well.Advantages of RFID in Library SettingsImplementation of RFID in libraries generally leads to greatly-reduced queues at the checkout counter, enhanced customer service, and less repetitive strain injuries for library staff .www.Rj12.net ©

اسلاید 20: CheckinRFID can be equally advantageous for checkin processes. In addition to being able to check in multiple items simultaneously, RFID readers can be affixed to book return slots, effectively checking in items as they pass through the slot. A conveyor carries items past an RFID reader, which checks them in and then sorts them by category into bins or onto carts.The time saving potential of an RFID implementation can be substantial.www.Rj12.net ©

اسلاید 21: InventoryRFID also has had a significant impact on inventory processes in libraries. With a full hand-held wand which is passed alongside the books on the shelves; by tagged collection, inventory can be taken with a portable, he reader picks up the individual signals from each items tag, without needing to remove or even tip the books outward from the shelves. With “RFID “ not only does the cost of doing an inventory in the library go down, the odds of actually completing regular inventories goes up. Inventory with RFID has also proven to be extremely useful and cost-effective in terms of locating lost or miss helved items. Even Searching for books by just typing its name on the Reader . www.Rj12.net ©

اسلاید 22: SecurityItem security is another area in which RFID technology can benefit a library. RFID tags can be enabled with a theft-detection bit that is deactivated upon proper checkout, allowing the materials to which they have been affixed to pass freely through an RFID-powered security gate. As the items pass an RFID reader upon being checked back in, the security bits are reactivated.www.Rj12.net ©

اسلاید 23: What Can we do ?

اسلاید 24: How it works? – Simple Example -The transponder could be really simple, like those in clothing price tags, consisting of just an antenna and diode. When irradiated, the diode rectifies the incoming carrier and the frequency-doubled signal is radiated back to the reader which responds with an alarm if you try to leave the store without paying for the product.T1 = 1/2 T2 f1 = 2 f2T1T2 www.Rj12.net ©

اسلاید 25: www.Rj12.net ©

اسلاید 26: Tags transmissionEssentially, tag data transmission is achieved by switching a low resistance across the antenna coil. Loading the coil in this way causes a corresponding dip in the peak voltage across the readers coil. In other words, the change in voltage across the tags coil is reflected back to the readers coil. This is often referred to as backscatter.The serial data stream from ROM (and/or EEPROM/FRAM) memory does not directly drive the coil-loading switch. Instead, the switch is driven by a low-frequency clock source. This effectively superimposes a weaker subcarrier on the main carrier signal. Modulating this subcarrier performs actual data transmission.Without going into lengthy technical discussions, we can tell you that the modulation method may be ASK (amplitude shift keying), PSK (phase shift keying) or FSK (frequency shift keying). Serial data is typically Bi-phase, Manchester or Miller-encoded before transmission.TagsFirst :www.Rj12.net ©

اسلاید 27: How passive systems workPassive tags usually consist of just a single IC and an antenna (coil). Currently, most passive tags operate below 100MHz and rely on the magnetic field produced by the reader for both power and communication. The reader generates a carrier signal and this induces a voltage across the coil of the tag. This voltage is rectified and filtered to become the power supply for the IC. Some tags also divide down the carrier signal and use it as the clock for on-board logic, whereas others generate their own clock signal.We will work withPassive tags www.Rj12.net ©

اسلاید 28: Reader receptionIn order to receive tag data transmissions, the readers antenna signal is first processed by analog front-end circuitry. Its main functions are to remove the carrier signal and then amplify the (much) smaller sub-carrier.The resultant signal from the envelope detection, filtering and amplifying stages is cleaned up with a Schmitt trigger and pumped into a digital logic block, where the original data is reconstructed through a demodulation and/or decoding process.Typically, all of these functions are performed by a single IC, supported by a few external (passive) components and perhaps an antenna power amplifier. Higher level functions, such as data encryption/decryption, collision detection and host interfacing are usually performed by a microcontroller, which is interfaced to the reader IC via a simple serial or parallel interface.Second :ReaderReader to tag transmissionFor two-way (read/write) systems, the reader must also be able to transmit data to the tag (to update the EEPROM/FRAM). This is typically achieved by amplitude, pulse-width or pulse-position modulation of the carrier signal.In its simplest form, transmission to the tag is performed by switching the carrier signal on and off (100% amplitude modulation). A gap detect circuit in the tag serialises and demodulates the gaps and no gaps to reconstruct the original data.Once a complete data frame is received, it is checked for validity (using a CRC polynomial). If sufficient power is available, it is then committed to memory.In some systems, the carrier is not switched on and off but is modulated at a particular depth (about 10%). This makes more power available for tag use, extending range and enables smaller tag antennas to be used.www.Rj12.net ©

اسلاید 29: www.Rj12.net ©

اسلاید 30: www.Rj12.net ©

اسلاید 31: www.Rj12.net ©

اسلاید 32: Thank You..Questionswww.Rj12.net ©

16,000 تومان

خرید پاورپوینت توسط کلیه کارت‌های شتاب امکان‌پذیر است و بلافاصله پس از خرید، لینک دانلود پاورپوینت در اختیار شما قرار خواهد گرفت.

در صورت عدم رضایت سفارش برگشت و وجه به حساب شما برگشت داده خواهد شد.

در صورت نیاز با شماره 09353405883 در واتساپ، ایتا و روبیکا تماس بگیرید.

افزودن به سبد خرید