Translate

Tuesday, September 24, 2013

Radio Frequency Identification

RFID Technology


        Radio-frequency identification(RFID) is an Advance technology that uses radio-frequency waves to transfer   data between a reader and a movable item to identify, categorize, tracking.
        RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item.

- Requires a transceiver(Reader), antenna, and transponder(Tags).


Why RFID is Replace to Barcode on Library(RFID VS Barcode)


                                                   Barcode Vs RFID

Barcode Reader Require Direct Line of sight, using the laser technology.

Scan and read one tag at a time .
RFID does not require line of sight.

Scan and read Multiple tags Simultaneously.
Reading by Barcode takes much more Time. .
Reader can read tags much faster, appx. 20 Tags per seconds.
Human Intervention is required to scan a barcode .
Human intervention is overcome by RFID Tech..
Barcode can be affected by dirt, Moisture and packaging.
RFID tags are not affected by those conditions.
Less read range in comparisons to RFID
RFID tags have longer range than Barcode
Less Expensive
More Expensive
Barcode don’t have read/write memory
RFID have Read/Write memory



RFID Applications:--
 -            E-Passports(Ist introduce in Malaysia-1998) 
 For toll booths (or any “pay for entry” system)
 Tracking Books in Libraries
 Car keys, wireless entry and ignition
 Animals Identification--  Hospital Patients 
Standard RFID Operating Frequencies:-
 -ISO 18000-2
-<135 KHz(LHF)
  - Animal identification, factory data collection.
Unaffected by presence of water.
Fairly costly because of coil in transponder.
n-ISO 18000-3
n13.56 MHZ(HF)
      -  Smart cards, In Library for identifying a Books.
   
n-ISO 18000-4
n2.45 GHz(Microvave)
- 802.11 WLAN, Bluetooth standards
n-ISO 18000-6
n860-960 MHz(UHF)
  - EAN, various standards
 Long range 2-5 meters.

n-ISO 18000-7
n-433 MHZ (UHF)
 - Defence applications.
Different Operational frequencies









   











  Why  RFID Need in Libraries:-



Libraries have used RFID to replace the barcodes on library items. The tag can contain identifying information or may just be a key into a database. An RFID system may replace or supplement bar codes and may offer another method of inventory management and self-service checkout by patrons. It can also act as a security device, taking the place of the more traditional electromagnetic security strip.

    
       RFID tags can be read through an item, there is no need to open a book cover or DVD case to scan an item, and a stack of books can be read simultaneously. Book tags can be read while books are in motion on a conveyor belt, which reduces staff time. This can all be done by the borrowers themselves, reducing the need for library staff assistance. With portable readers, inventories could be done on a whole shelf of materials within seconds.There are followings reason why rfid for library:-

•  Fastest, easiest, most efficient way to track, locate & manage library materials
•  Efficient Book circulation management.
•  Automatic Check-in and Check-out.
•  Library inventory tracking in minutes instead of hours.
•  Multiple books can be read simultaneously.

        •  human intervention is overcome by this technology.

•  Automated material handling using conveyor & sorting systems

                     
How does RFID Works in Libraries:-

1) Firstly items-tag are scanned by reader;
 2) Secondly in backend transmitted data coming through antenna (RF-wave) are being recognized by RFID-based system PC. It acts as a middleware communication gateway among items, reader and system database;
 And at the end it filters out and store data in RFID-databases for checking the data fault and relevant operation.

Four Key Components for RFID In Library
1)Tags 2)Reader 3)Antenna 4)Software


See this Video  




Tags

(1) Tags (Transponder):-

- Consists of microchip (Silicon) that stores data and antenna.


 -  An Electronic Product Code (EPC) is one common type of data stored in a tag.
fig 1.2 Smart Labels

  

Tags are three types:-  And take brief idea of tags in   given below Fig 1.3

1) Passive
2) Active
3) Semi- passive


      The tag's information is stored electronically in a non-volatile memory.

      The RFID tag includes a small RF transmitter and receiver. 

       An RFID reader transmits an encoded radio signal to interrogate the tag.

           The tag receives the message and responds  with its  identification information.








Collision Problems in tags :-



How does collision occurs in tags


How to overcome this collision Problem in Tags
"Slotted ALOHA", which introduced discrete timeslots and increased the maximum throughput.A station can send only at the beginning of a timeslot, and thus collisions are reduced. In this case, we only need to worry about the transmission-attempts within 1 frame-time and not 2 consecutive frame-times, since collisions can only occur during each timeslot. Thus, the probability of there being zero 
If more than one station transmits packets in the same slot, there is a collision, and the Reader
cannot receive the Tags information correctly. Successful transmission happens only when there is exactly one tags.transmitted in a slot. If no tags is transmitted in a slot, the slot is called idle.
A,B,C,D are Tags

Reader

 2) Reader(Transceiver):-


                                       Basically Readers are Three types--

            1)Passive Reader Active Tag(PRAT)
            2)Active Reader Passive Tag)(ARPT)
            3)Active Reader Active Tag(ARAT)
           

Passive Reader Active Tag (PRAT) system has a passive reader which only receives radio signals from active tags.





      How does work Tags and reader in environments:

The reader surrounds itself with an electromagnetic field

 

                  Reader Ã³Tag Data Exchange
The reader sends commands to the tag via pulse amplitude modulation
The tag sends responses to the reader via back-scatter modulation.

Antenna



In backend transmitted data coming through antenna (RF-wave) are being recognized by RFID based system PC. It acts as a middleware communication gateway among items, reader and system database
Antenna  Back-end  Process 



Antenna video



























NFC


Near Field Communication (NFC)


Near Field Communication (NFC) is an exciting Short-range wireless connectivity technology that dramatically simplifies the way in which consumer devices interact with one another, helping people speed up connections, receive and share information, and make fast and secure payments.
               NFC LOGO
                                               - 2006 Nokia 6131 was the first NFC phone 

Diff. B/W NFC(Near-field communication) and RFID

NFC is now available in the majority of mobile phones and this is perhaps the most important difference between NFC and RFID. 
                                                              NFC VS RFID
NFC is capable of two way communication and can therefore be used for more complex interactions such as card emulation and peer-to-peer (P2P) sharing. 

NFC is limited to communication at close proximitaround 5cm or less

Only a single NFC tag can be scanned at one time. 

RFID such as one way communication and the ability to communicate without a direct line of sight.


RFID tags can be scanned at distances of up to 100  meters .

Multiple RFID Tags can be scanned at Single time.



How does work NFC in mobiles   See this video



Barcode

barcode is an optical machine-readable representation of data relating to the object to which it is attached. Originally barcodes systematically represented data by varying the widths and spacings of parallel lines, and may be referred to as linear or one-dimensional (1D). Later they evolved into rectangles, dots, hexagons and other geometric patterns in two dimensions (2D). Although 2D systems use a variety of symbols, they are generally referred to as barcodes as well. Barcodes originally were scanned by special optical scanners called barcode readers. Later, scanners and interpretive software became available on devices including desktop printers and smartphones.

                       Barcode In library


lEFFECTIVE LIBRARY NEEDS EACH DOCUMENT BAR CODED
lTWO LABELS PREFERABLY
lLABEL TO CONTAIN
–Accession number equivalent Bar Code
–Call number
–Institution logo advantageous

lISBN BAR CODE COULD BE USED




lDATABASE PROGRAM LINKS THE BAR CODE TO BIBLIOGRAPHIC DETAILS OF DOCUMENTS
lAUTHORISED ID CARD INCLUDES BAR CODE
–Card could be used by library
–Institutional ID card
–Social security number
lBAR CODE READER INTERFACED TO COMPUTER
lTRACKING OF BOOKS

Friday, September 13, 2013

Biometrics

Biometrics (or biometric authentication)refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control.[2] It is also used to identify individuals in groups that are under surveillance.[www.wikipedia.org]
Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals.

 Examples  fingerprintface recognitionDNAPalm print, hand geometry, iris recognitionretina and odour/scent. 

Fingerprint:-




Colleges and Schools  have over the last few years begun to use automated fingerprint
identification systems (AFIS) for registration, library book borrowing and cashless catering. Fingerprints are not essential to the applications but unlike swipe cards they cannot be lost, and this has been given as a reason for using them. A subset of the unique features of the fingerprint are extracted from a scanned image and converted into a biometric “template”. This template, a binary number, is checked  against the template generated each time a person places his finger on the scanner.






Face Recognition:-

Recognizing people by their facial features is the oldest identification mechanism of all, going back at least to our early primate ancestors. Biologists believe that a significant part of our cognitive function evolved to provide efficient ways of recognizing other people’s facial features and expressions. For example, we are extremely good at detecting whether another person is looking at us or not. In theory,  humans ‘ability to identify people by their faces appears to be very much better than any automatic system produced to date. The human ability to recognize faces is also important to the security engineer because of the widespread reliance placed on photo Ids.