8/3/2019 Rfid Jits Knr
1/18
JYOTHISHMATHI INSTITUTE OF
TECHNOLOGY & SCIENCE (KARIMNAGAR)
A PAPER PRESENTATION ON RADIO FREQUENCY
IDENTIFICATION
DEVICE (RFID) TECHNOLOGY.
SUBMITTED BY:
CH.SARISHMA (Eid: [email protected])
G.USHA RANI (Eid: [email protected])
mailto:[email protected]:[email protected]:[email protected]:[email protected]8/3/2019 Rfid Jits Knr
2/18
CONTENTS:
INTRODUCTION:
WHAT IS RFID?
TECHNOLOGY BEHIND RFID
COMPONENTS IN RFID
RFID TAGS & ITS FEATURES
OPERATION
FREQUENCY RANGE
RFID PRODUCTS
APPLICATIONS OF RFID:
STUDENTS SAFELY ARRIVING/LEAVING MESSAGE
SERVICE SYSTEM
AUTOMATIC VEHICLE IDENTIFICATION (AVI)
1. GUARD AGAINST THEFT NETWORKS BASED ON AVI & GPS
TRAFFIC MANAGEMENT
1. RED LIGHT VIOLATION DETECTION AND RECORDING
2. OVER-SPEED DETECTION AND COUNTING CAR NUMBERS
SOME MORE APPLICATIONS
FEATURES OF RFID
ADVANTAGES OF RFID
FUTURE SCOPE
CONCLUSION
8/3/2019 Rfid Jits Knr
3/18
RADIO FREQUENCY IDENTIFICATION TECHNOLOGY
ABSTRACT:
This paper explores the applications and future commercial impacts of RFID
technology. Its objective is to summarize the ways in which organizations and
academics are thinking about these technologies and to simulate strategy thinking
about there possible uses and implications. It first provides an overview of this
technology. Then it explores the surprisingly wide variety of current applications of
RFID. Next it looks at several classes of potential RFID applications & how there
might after how organizations work.
Finally it examines the cost & implementation considerations of this
technology. The paper concludes that RFID is viable technology with many possible
applications. However, only some of the impacts on organizations &society can be
anticipated at present.
RFID is a wireless communication technology that lets computers read the
identity of inexpensive electronic tags from a distance without requiring a battery in
the tags. As RFID technology matures, it will likely unleash a new way of
applications that will exploit inexpensive & highly available automatic identification.
WHAT IS RFID?
RFID stands for Radio Frequency Identification Information - an inexpensive
chip-based technology that enables identification of a tag by using electromagnetic
waves. RFID is a dedicated short range communication (DSRC) technology which
describes various technologies that use radio waves to automatically identify people
or objects. Radio-frequency identification (RFID) is an automatic identification
method, relying on storing and remotely retrieving data using devices called RFID
tags ortransponders. An RFID tag is an object that can be applied to or incorporated
into a product, animal, or person for the purpose of identification and tracking using
radio waves. Some tags can be read from several meters away and beyond the line of
sight of the reader.
THE TECHNOLOGY BEHIND RFID:
With RFID, the electromagnetic or electrostatic coupling in the RF (radio
frequency) portion of the electromagnetic spectrum is used to transmit signals RFID
http://www.webopedia.com/TERM/R/RFID.htmlhttp://en.wikipedia.org/wiki/Automatic_identification_and_data_capturehttp://en.wikipedia.org/wiki/Transponderhttp://www.webopedia.com/TERM/R/RF.htmlhttp://www.webopedia.com/TERM/R/RFID.htmlhttp://en.wikipedia.org/wiki/Automatic_identification_and_data_capturehttp://en.wikipedia.org/wiki/Transponderhttp://www.webopedia.com/TERM/R/RF.html8/3/2019 Rfid Jits Knr
4/18
technology does not require contact or line of sight for communication. RFID data can
be read through the human body, clothing and non-metallic materials.
COMPONENTS:
A basic RFID system consists of three components:
1. Antenna or coil
2. A transceiver (with decoder)
3. A transponder (RF tag) electronically programmed with unique
information
RFID TAGS:
RFID tags come in three general varieties:-
1. Passive tags
2. Active tags
3. Semi-passive (also known as battery-assisted).
PASSIVE TAGS:
Passive RFID tags have no internal power supply. The minute electrical
current induced in the antenna by the incoming radio frequency signal provides just
enough power for the CMOSintegrated circuitin the tag to power up and transmit a
response. Most passive tags signal bybackscattering the carrier wave from the reader.
This means that the antenna has to be designed both to collect power from the
incoming signal and also to transmit the outbound backscatter signal.
S.NO FIELDS DISTANCE RANGE TECHNIQUE TO REACH
LONG DISTANCES
1 NEAR FIELD 11cm (4 inches) Backscattering
2 FAR FIELD 10 meters (33 feet) Load modulation
When these are combined with phased array can reach up to 600 feet (183 m).
http://en.wikipedia.org/wiki/CMOShttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Backscatterhttp://en.wikipedia.org/wiki/Carrier_wavehttp://en.wikipedia.org/wiki/CMOShttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Backscatterhttp://en.wikipedia.org/wiki/Carrier_wave8/3/2019 Rfid Jits Knr
5/18
FEATURES:
In passive tags the power level to power up the circuitry must be 100 times
stronger than with active or semi-active tags, also the time consumption for collecting
the energy is omitted and the response comes with shorter latency time.
ACTIVE TAGS:
Active RFID tags have their own internal power source, which is used to
power the integrated circuits and to broadcast the response signal to the reader.
Communications from these to readers is more reliable due to the ability for active
tags to conduct a "session" with a reader.
FEATURES:
1. More reliable
2. Transmits at higher power levels & operational range up to 100s of
meters
3. Bigger in size (due to battery size) & large memory
4. More expensive due to price of the battery
5. Battery life up to 10 years
Special active RFID tags may include specialized sensors to record
temperature, humidity, shock/vibration, light, nuclear radiation, pressure and
concentrations of gases such as ethylene.
http://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Session_(computer_science)http://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Session_(computer_science)8/3/2019 Rfid Jits Knr
6/18
SEMI-PASSIVE TAGS:
Semi-passive tags have their own power source, but the battery only powers
the microchip and does not power the broadcasting of a signal. The response is
usually powered by means ofbackscattering the RF energy from the reader, where
energy is reflected back to the reader as with passive tags. An additional application
for the battery is to power data storage.
FEATURES:
1. Greater sensitivity
2. Longer battery life & can perform active actions under their own power
OPERATION: The antenna emits radio signals to activate the tag and to read and
write data to it. Antennas are the conduits between the tag and the transceiver, which
controls the system's data acquisition and communication. Antennas are available in a
variety of shapes and sizes; they can be built into a door frame to receive tag data
from persons or things passing through the door, or mounted on an interstate toll
booth to monitor traffic passing by on a freeway. The electromagnetic field produced
by an antenna can be constantly present when multiple tags are expected continually.
If constant interrogation is not required, the field can be activated by a sensor device.
Often the antenna is packaged with the transceiver and decoder to become a
reader (a.k.a. interrogator), which can be configured either as a handheld or a fixed-
mount device. The reader emits radio waves in ranges of anywhere from one inch to
100 feet or more, depending upon its power output and the radio frequency used.
When an RFID tag passes through the electromagnetic zone, it detects the reader's
activation signal. The reader decodes the data encoded in the tag's integrated circuit
(silicon chip) and the data is passed to the host computer for processing.
http://en.wikipedia.org/wiki/Backscatteringhttp://en.wikipedia.org/wiki/Backscatteringhttp://en.wikipedia.org/wiki/Backscattering8/3/2019 Rfid Jits Knr
7/18
FREQUENCIES:
S.NO GENERIC BAND
NAME
FREQUENCY
RANGE
APPLICATIONS
1 Low frequency 30KHz-500KHz Security access
Asset tracking
Animal identification
2 High frequency 850KHz-950KHz Railroad car tracking
Automate toll
connection
3 Ultra high frequency 2.4GHz-2.5GHz Warehouse &
distribution chain
Fast Bluetooth & Wi-
Fi systems
RFID Products include
APPLICATIONS:
8/3/2019 Rfid Jits Knr
8/18
1. STUDENTS SAFELY ARRIVING/LEAVING MESSAGE SERVICE
SYSTEM:
FUNCTION:
-- Send message to inform parents their kids have safely arrived or left school
Arriving: each student wears a tag with unique ID. When he enter the gate, reader nearby
detect tag ID immediately and upload information to system to inform his parents
Leaving: When student leave school, the reader nearby detect tag ID immediately and
upload information to system to inform his parents
--Student attendance checking
Students dont have to stop to slide card one by one and the system automatically
record all attendance information.
--through message system, teachers and parents can communicate conveniently
School notice: teachers can inform them parent meeting, payment, etc.
Student status notification: teachers send evaluation of students, such as behaviour in
class, homework, behaviour comments, exam grades, recent status to parents
Notes from parents: parents send message to teachers in charge of class or school
principals
--assistant mobile office
Meeting notice: send message to teachers through message inside school
Personal reminding: customize personal time message to remind in time
2. AUTOMATIC VEHICLE IDENTIFICATION (AVI)
8/3/2019 Rfid Jits Knr
9/18
Our complete RFID solution finally solves most problems rising in automatic
vehicle identification (AVI) and city traffic management. Example functions include
vehicle registration, annually check, traffic statistic (counting car numbers and
measuring speed), anti-theft, police supervision, over-speed check, traffic light
violation control, etc.
Considering two types of products are involved in this application and they have
different functional emphasis, the solution will be focused on automatic vehicle
identification, each vehicle having one unique ID tag, on traffic management, wireless
vehicle detector applied here to check speed, count car number and work with camera
monitoring system to realize required functions.
The whole system would be very flexible and more and more functions can be
added on with the same hardware. Do not be restricted by the functions listed below
since we just show partial standard functions of the system and give customers some
concepts about this application. Please notice RFID technology is always customer
oriented. We are open to work with customers to build most suitable and complete
and cost effective solutions to meet your specific requirements.
In the aspect of vehicle guard against theft, GPS was one of the main
selectable technologies. GPS anti stealing is an active network system, a large system.
Service men in the supervising centre can provide 7x24 hours instant service,
including preparing works before alarming and assigning police men.
But GPS can not be widespread due to the high cost. It costs RMB 6000~7000
Yuan to install one set of GPS without screen and another thousand Yuan for the
service fee which the service provider requires. Under these situations, RFID
technology can be applied to reduce the cost. Nowadays, AVI systems tend to use
active RFID technology. AVI system can be installed at the entrance/exit of the road
or street in the city, as the fixed AVI base station. It also can be installed on the top of
the police vehicle, as a mobile AVI station. Mobile AVI system is one of the effective
ways to solve the problems above. It can move to the assigned conference entrance,
road side, checkpoints and toll stations. It can reliably collect data and information
from the vehicles passing by (or stop) in real time, on which active RFID tags are
installed. By using long range RFID technology, the collected data can be identified,
transmitted to the vehicle control centre via (GSM/GPRS/CDMA) and then compared
8/3/2019 Rfid Jits Knr
10/18
with the saved information in the database of the centre to judge whether the vehicle
is illegal, or has disobeyed traffic laws or even stolen. The results of comparison will
feed back to the AVI system to determine the disposure for the vehicle. For those
blacklisted vehicles, the police man can alarm and hold up at once, or inform the
check points ahead via communication equipments to hold up them.
AVI (Automatic Vehicle Identification-AVI), based on active RFID
technology, includes
1. Car RF tags
2. Fixed AVI base station system
3. Mobile AVI base station system
4. Simplized mobile check equipment
GUARD AGAINST THEFT NETWORKS BASED ON AVI & GPS:
The system is consisted of fixed AVI, mobile AVI and GPS locating and
guiding system, DDN data transmission and exchange system and GSM mobile
communication system. As the diagram below:
Once the owners who use RFID tags found their car stolen, they can give an
alarm to the police. While the police receive the alarm, they are giving command
to every fixed AVI station to check the passing vehicles, reading the RFID tags of
8/3/2019 Rfid Jits Knr
11/18
the cars passing by and comparing with the target vehicles information. If the
present car is the target car, then send the cars ID, location of the AVI station and
time information to the police via DDN.
After receiving the signal, the police can send SMS to the police cars which
are equipped with mobile AVI and GPS via GSM. When the police car confirms
the message, they will find the best route by using route optimization via GPS
locating and guiding system. After confirmation and route optimization for several
times and sending its own GPS location to other police cars, the stolen car will be
hold up and criminals will be caught. The whole process for the return of the
stolen car is as below:
Besides guard against theft function, for the cars equipped with GPS, the system
can also provide road location and vehicle location inquiry function. Under the
8/3/2019 Rfid Jits Knr
12/18
assurance of guard against theft, by using RFID tech, the system has greatly
reduce the cost, which is acceptable for most people. It has also saved the police
force and enhanced the reaction velocity, especially has potential market for wide
spreading in taxi industry. Meanwhile, the system can be combined with ETC,
AEI and GAI system to be the vital parts of the intelligent transportation system.
The application is also fit able for military and police vehicle anti-fake
distinguishing field.
3. TRAFFIC MANAGEMENT:
8/3/2019 Rfid Jits Knr
13/18
1. RED LIGHT VIOLATION DETECTION AND RECORDING:
Three elements when capturing running a red light: stop line, red light signal and
license number.
According to the electromagnetic induction method, when an object of metal
passes through an electromagnetic field, it will change the magnetic flux of the field
and will lead to a change of return circuit of the field. By imbedding a wireless
terrestrial magnetism detector beyond the stop line at the crossroad, the detector will
generate an electromagnetic field which is vertical with the road surface. When
vehicles pass through the detector, it just equals as a metal object cutting the
8/3/2019 Rfid Jits Knr
14/18
electromagnetic field, as a result the magnetic flux of the field changes, and lead to a
change of return circuit of the wireless terrestrial magnetism detector.
8/3/2019 Rfid Jits Knr
15/18
When the vehicle detector installed at the crossroad receives the return circuit
of the wireless terrestrial magnetism detector, it will transform the current signal into
an output high-low frequency signal. On the other hand, when the signal converter
installed at the crossroad receive a current signal of the signal light at the same time, it
will convert the current signal into an output high-low frequency signal. If the control
software can detect the signal converters red light signal and the signal from the
vehicle detector saying there a vehicle passes through at the same moment, then the
controller will send a signal of capture to the camera and flashlight and the camera
will capture the disobeying situation when vehicle pass beyond the stop line during
red light. If the light at the crossroad is inadequate, the control system will start
flashlight automatically to light the environment.
The disobeying information captured include stop line, red light signal,
license number, type of the vehicle, colour of the vehicle, disobeying date and time,
disobeying lane . The control software of system cannot send a capture signal to
camera and flashlight until it simultaneously detect the converted red light signal
and the passing signal from the vehicle detector. Both of the signals should be got.
For instance, if the signal light is green, then the signal detected by the signal detector
is green light, even if there is a vehicle passing through, the controller will not send a
capture signal to camera and flashlight.
If the signal light is multi-directional, as left-turning, right-turning and straight
movement, then detecting coils can be imbedded in different lanes to avoid
mistakenly capturing and lost capturing for different lanes and to maintain the justice
and accuracy for enforcement.
2. OVER-SPEED DETECTION AND COUNTING CAR NUMBERS:
Two wireless vehicle detectors will be put closely along the road, at the point
speed needs to be checked. If over-speed is detected, attached camera monitoring
system will start to work to catch pictures of the vehicle. The system is also used for
normal vehicle speed checking with good precision level. Besides, we use such
detectors to calculate traffic flow at any points need to monitor. Based on those data,
traffic management can be much more effective and efficient.
8/3/2019 Rfid Jits Knr
16/18
FEATURES:
1. High precision: the magnetic field of earth is invariable in several kilometres,
but large magnetic material object can influent the earths magnetic field
greatly, the terrestrial magnetism detector can identify 1/6000 variation of the
earth magnetic field. While the influence caused by vehicles on earth magnetic
can be strong enough to use the terrestrial magnetism detector to detect
vehicles, which has extremely high sensitivity.
2. Convenient for installation and maintenance, not need to block off the street,
little damage to the surface. When eFlux is installed on suspension bracket or
on profile, theres no need to destroy the road surface, just inspect the
terrestrial magnetism detector when maintaining. The detect point is not easy
to be damaged, no influence by movement of the road surface.
3. Not influent by the climate, as the terrestrial magnetism detector can detect the
variation of magnetic field when metal material objects pass through.
4. LONG RANGE: easily read within 10 meters. Due to the practical need of
Gate-ban, the reading range should not be too long. Users have not to
approach the reader or pass through the appointed area to be detected by the
reader. The identifying process is full automatic, which can avoid the problem
that driver must open the window to punch the card in bad weathers. This
advantage can effectively relieve the jam caused by massive entering and
exiting vehicles in rash hours.
5. STABLE RUNNING : active cards have stable reading range and not influent
by the environment. Moreover, active cards can effectively avoid the shielding
effect of the vehicles anti-explosion metal net, exchanging data with the
reader successfully.
6. High speed data exchange between reader and tags, the speed of readable
cards can reach 200km/hours.
8/3/2019 Rfid Jits Knr
17/18
7. Bi-directional High speed data exchange between detector and receiver
8. High reliability, working temperature -40~85 centigrade, waterproof,
shockproof and dustproof.
9. Anti-jamming capability, tolerance of interfering sources at the scene
10. Global free ISM microwave frequency band, no need to apply and pay
11. Ultra-low power consumption, safer and healthier
SOME MORE APPLICATIONS ARE:
1. Parcel tracking
2. Airline baggage tag
3. Access control
4. Retail stock keeping / inventory management
5. Document management
ADVANTAGES USING RFID PRODUCTS:
1. Highest automation of item scanning process
2. Capable of read and / or write. Replacement of barcode
3. Reprogram chip memory many times without contacting or replacing smart
tag / label
4. No line-of-sight necessary5. Capable of processing multiple items simultaneously
6. Suitable for harsh environment
7. Information directly attached to product
8/3/2019 Rfid Jits Knr
18/18
FUTURE SCOPE:
In commercial & government applications the deployment of tracking
technologies is done. RFID tags are incorporated into all new mobiles. Bar codes are
removed from consumer product packaging as they are replaced by RFID tags.
Improvements in standardization have already occurred, with several
additional standards under development. Improvements in tag life expectancy and
durability have improved substantially in the past few years. RFID providers should
carefully review their plans and start to develop policies to ensure the future adoption
of the technology.
CONCLUSION:Even though the technology still hasnt matured, the opportunity for
immediate and dramatic improvements in customer service and productivity outweigh
the negatives.
The benefits of RFID technology cannot be ignored in todays stuffing. RFID
could conceivably grow more quickly over the next few years in closed loop. As the
technology continues to evolve, increasing numbers of customers across all markets
will choose to implement RFID because of the unique capabilities it can deliver that
drive efficiencies into their operations.
Finally, we must remember that Change is easy.improvement is far more
difficult. It is just the beginning. Look out for more innovations in RFID technology
in the future.
REFERENCES:
Electronics for you: Oct 2007
www.superrfid.net
Electronics today: Sept 2007
www.rfidinc.com
http://www.superrfid.net/http://www.rfidinc.com/http://www.superrfid.net/http://www.rfidinc.com/