Wednesday, May 6, 2020

Annotated Bibliography On Security System Using Rfid...

Career Episode 3 Introduction Title: SECURITY SYSTEM USING RFID TECHNOLOGY Date: January 2013 – July 2013 Duration: 7 academic weeks Location: Balkumari, Lalitpur Organization: Nepal College of information Technology Position: Student Project Supervisor: Professor Hari Raj Aryal CE 3.1 Background This project was made for the project exhibition organized by the Nepal College of Information Technology under the supervision of the Professor Hari Raj Aryal in-group of two members to present in the project exhibition. CE 3.2 Nature of Project The goal of the system I have designed is to manage and secure our working place and home using the radio frequency identification (RFID). RFID stores and retrieves using the RFID tags. It†¦show more content†¦CE 3.5 Organization chart The organizational chart for the accomplished of the project as below: CE 3.6 Engineering Knowledge and Skills The basic block diagram of the RFID based security system is as follows: In this system radio frequency identification plays the major role in the security purpose all other hardware components plays the secondary roles. I used the RFID tags that’s provides unique identification number whenever it read the card, then it send this information to the microcontroller and find out whether card is genuine or fake. If the card matches with the original information, I allow the user to enter the room else the security alarm will be on. Radio Frequency Identification The radio frequency identification is the system, which uses the radio wave to read the information the tag. The system consist of three main components RFID tag or transponder, which identify the data carrier in RFID, RFID tag reader or transceiver, which read data from and write to transponder and data processing subsystem, which use the data obtained from the transceiver. The transmitters and responders have electronic microchip that stores data and coupling elements like coiled antenna, used to communicate via radio frequency waves. Transponders might be active or passive. Active transponders have an on-tagShow MoreRelatedUses and Abuses of Biochip Technology1704 Words   |  7 PagesTopic: Biochip Technology; Uses and Abuses Working Hypothesis: What is the correlation between the prophecy of the mark of the beast, and current trends in biochip technology? Intro/Thesis statement: Technology is chipping away at our personal freedoms. In the New Testament, Revelations 13 warns He also forced everyone, small and great, rich and poor, free and slave, to receive a mark on his right hand or forehead, so that no one could buy or sell unless he had the mark, which isRead MoreEvidence and Examples of the Four Learning Outcomes2455 Words   |  10 Pagesan â€Å"Interview and Ethnography Assignment†. In the â€Å"Group Report In-Class Presentation† My objective was to describe a concept that was new to many called Radio-Frequency Identification. I described Radio-Frequency by using terminology that I felt my audience would understand. Using the Microsoft PowerPoint program I was able to use different styles of genres. I not only was able to use written communication I was able to use other conventions such as pictures to introduce the concept and its uses

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.