Tuesday, June 18, 2019

Management of IT, Radio Frequency Identification Essay

Management of IT, Radio Frequency Identification - Essay utilizationRFID stands for Radio Frequency Identification which is a very effective and modern system of finding and identifying objects or even organisms. RFID has a lot of uses and is applied to various(a) fields such as criminology, law enforcement, office application etc. It works by tagging and object with either a passive or brisk tag which can be identified by a RFID reader using radio waves. The tags are powered by the RFID receiver and are scarce activated when the tag is in range of the receiver. An RFID tag consists of a data sequence encased in the tag housing and is responsible for the appellation of the object. The identification sequence starts when the RFID tag comes within the range of the receiver. The receiver will then pick up the tags signal and decode it for look upence. The RFID receiver will then refer the tags data to its database to verify the identity of the tags wearer. Once the tags data (examp le the location of the object, time of verification etc.) is processed and the identity of the object is verified, then the data can be complied in to a larger data set and can be later passed on or processed by another RFID application.(RFiDa.com, n.d.).Figure 1 This diagram explains the basic schematic of all RFID systems.The Tag or Transponder can be either active or passive. It responds to a signal from the Interrogator (reader/ generator/antenna) which in turn sends a signal to the Computer (High Tech Aid, 2006b). An RFID tag is basically composed of an IC. The IC has a small built-in memory (memory graphic symbol for an IC is usually ROM or Read Only Memory) capacity and may be equipped with a small processor. The tag communicates with the receiver via give vent interface, with... This essay approves that the biggest advantage and also the most efficient use seen for RFID system is its potential use in electronic merchandise surveillance. RFID systems avoid the old point-to -point bring in system and instead have the ability t track the product at every point in the merchant operation. RFID tags also make product to product communication possible and even automated product shelves that signal the supervisor when it needs refilling. Human product supervision is still necessary just now effort is significantly reduced through the use of RFIDs. This report makes a conclusion that Radio Frequency Identification is yet another one of humannesss attempts at making life a little more convenient. In its service RFID proves to be a very efficient and effective electronic medium not just for identification and security but for other applications as well. The controversy behind the use of RFIDs is based upon future assumptions and thus remote the system is proves to be very limiting and specific for it to be used as a type of wide range surveillance method. Like any other wireless device RFIDs are still not very much accepted today but it may become as honey oil as mobile phones or personal computers in the future. Already, manufacturers and researchers are working hand-in-hand in improving the characteristics of RFID technology such as range, processing power, data stock etc. The fear of losing ones privacy and the tampering of personal data with the use of RFIDs have no scientific basis and it is best to weigh that however sophisticated RFID devices can get, they will still be hampered by physical limitations as well as laws and regulations that will determine the scope of their use.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.