Wednesday, December 11, 2019

Radio Frequency Identification-Free-Samples -Myassignementhelp

Question: Evaluate the use of Radio Frequency Identification (RFID) technology. Answer: Introduction Radio Frequency Identification is a wireless technology which enables us to gather data about a certain item without needing to touch that object; the information is gathered through the use of inductive coupling or electromagnetic waves. A RFID system can be divided into three components; a scanning antenna, transceiver and a transponder (the tags). The data or information is carried in a microchip attached to the antenna (together called transponder or tag) and the transceiver helps to send the data back to the scanner, and from there that information is sent to a host computer. Every tag has its own read and writes memory which allows the RFID system to detect the objects and perform work on it. The antenna is used to sends short bursts of radio signals and by doing this; it provides a way of communication with the transponder and gives the RFID tag to communicate back with that energy This report shows us the advantages of RFID technology and the practical use of this technology (Zhu, Mukhopadhyay Kurata, 2012). Technical Problems RFID has Overcome: - RFID is used for automatic identification of products or people; the main advantage of an RFID system over traditional methods such as bar codes is that it does not require physical contact or proper line of sight for the technology to work. It is also used for tracking and tracing items automatically. RFID system implementation adds intelligence and minimizes human intervention to the process of item identification and processing those products using electronic tags. RFID tags does not need a battery; so they can used for longer periods of time as they would not run out of juice (Mayordomo et al., 2013). Some libraries use RFID technology for peoples convenience which allows them to take books out or return them. It can be also helpful for finding missing books and finding misfiled books, by using a hand held battery operated RFID reader (Dwivedi et al., 2013). Sub-dermal tags are implanted under the skin of peoples or animals. It is mainly used for tracking animals and keeping a count of the animals. It is mainly used for studding the migration pattern of fish, by tagging them and keeping track of them at regular intervals. This technology can also be used for accessing secure computers without using a username or password, just by simply implanting a tag under their palm and waving their hand in front of the monitor (Hill, 2012). Many access controlled devices uses smart cards, which need to be swiped in a reader. When an individual uses a smart card for entering into an authorized room, an unauthorized person slips behind him without the system knowing of it. However, when using RFID, a person with a tag comes into range, the scanner or reader detects the person automatically (Chen et al., 2012). Technological limitations of RFID:- Radio Frequency Identification technology has been applied effectively, it has some technical barriers that need to be optimized for application. Some of those limitations are discussed below. Collisions: - When attempting to read several tag at a time the signals from different readers results in collision, and data loss happens. To prevent collisions from happening anti-collision algorithms are put in the readers (Jia et al., 2012). Jamming: - RFID systems use the electromagnetic spectrum; they can be very easily jammed, using the right high frequency signals. This could cause problems in stores and be highly disruptive to the environment, and can be disastrous in places like hospitals and military fields where RFID is largely used (Avanco et al., 2015). Tag collisions: - It happens when many tags are present in a small area, to overcome this sort of problem vendors can make systems that responds to tags one at a time (Yang et al., 2013). New Problems Created by RFIDs Limitations:- RFID tags cannot differ between one reader and another. Its scanners are very portable and they could be read from far, which in allows anyone with a portable RFID Some RFID tags are very small and very difficult for consumers to remove them; some of them are even hidden or embedded in the product where consumers cannot see them. RFID systems are designed in a way that tags and readers are kept at a minimum distance for them to work. However, a high-gain antenna could be used to read tags from far distances, resulting in privacy problem (Metzger et al., 2013). Products have unique bar codes, when those products are sold to consumers and paid with credit cards the RFID tag of that particular item can be associated with that credit card number. That can be unsecure for the consumers and thus it becomes a hindrance to RFID technology. Implementation of RFID Technology in an Organization:- Companies from all over the world are using RFID technology for supply chain management. Wall-Mart implements RFID technology for managing inventory more efficiently, reduce data entry error and human labor costs are reduced in the distribution hub of the company. Wall-Mart uses the data collected from RFID system to keep track of the stock and check whether the stock is running low and reduces labor costs. Wall-Mart can track the movement of the inventory which increases inventory standards and speeds up the physical aspects of the inventory process, products can be shipped and received faster, and it becomes easy for the organization to predict product demand. RFID helps shoppers to save time when shopping, products does not go out of stock as the system is constantly tracking every development. Implementation of RFID gets shoppers better deals as the systems are becoming more efficient, reducing inventory of obsolete products, the correct products are available at the right places in the stores and reduces thefts, misplacement and better placement of data sensitive inventory, all of these factors effectively boosts sales of the products (Zelbst et al., 2012). RFID Technologys Prospects in the Market Place:- Major limitations to associate RFID technology are explained below. There are no RFID standards for implementation. The demand for this technology should also have driven down its prices. Many organizations dont use RFID because of its price range. RFID technology cannot read through liquid and metals. Some items read rates can be very low. So RFID tags respond late and have a delayed response which in slows the whole process. Interruption to RFID chips signals could happen because of other RFs signals or conveyor belts present in the organization. To effectively implement RFID technology the warehouse and vehicles have to be fitted with readers and they need to be connected to the organizations computer network for information exchange. All of these changes results in increase of expenses. There is no standardization of software, hardware and network protocols. Better RFID systems with much low cost and privacy issues are to be used. If possible to overcome the above problems, unify the industry with standards and convince users of this technologys benefits then RFIDs future looks favorable (Reddy, 2012). Conclusion Therefore from the above discussion it can be concluded that even with many shortcoming and issues that obstructs the global application of RFID, it can be seen that organizations with complex supply chain management process benefits from its application, once the difficulties of its applications are dealt with. If organization incorporates this RFID technology it reduces human errors, increase tasks accuracy and improve safety. Although sole usage of RFID cannot have advantage if we want proper results we have to incorporate it with organizations supply chain management References Avanco, L., Guelfi, A. E., Pontes, E., Silva, A. A., Kofuji, S. T., Zhou, F. (2015, October). An effective intrusion detection approach for jamming attacks on RFID systems. InRFID Technology (EURFID), 2015 International EURASIP Workshop on(pp. 73-80). IEEE. Chen, Y. Y., Huang, D. C., Tsai, M. L., Jan, J. K. (2012). A design of tamper resistant prescription RFID access control system.Journal of medical systems,36(5), 2795-2801. Coustasse, A., Tomblin, S., Slack, C. (2013). Impact of radio-frequency identification (RFID) technologies on the hospital supply chain: a literature review.Perspectives in Health Information Management, (Fall). Dwivedi, Y. K., Kapoor, K. K., Williams, M. D., Williams, J. (2013). RFID systems in libraries: An empirical examination of factors affecting system use and user satisfaction.International Journal of Information Management,33(2), 367-377. Hill, N. P. R. (2012).U.S. Patent No. 8,240,085. Washington, DC: U.S. Patent and Trademark Office. Jia, X., Feng, Q., Fan, T., Lei, Q. (2012, April). RFID technology and its applications in Internet of Things (IoT). InConsumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on(pp. 1282-1285). IEEE. Mayordomo, I., Drger, T., Spies, P., Bernhard, J., Pflaum, A. (2013). An overview of technical challenges and advances of inductive wireless power transmission.Proceedings of the IEEE,101(6), 1302-1311. Metzger, C., Thiesse, F., Gershwin, S., Fleisch, E. (2013). The impact of false-negative reads on the performance of RFID-based shelf inventory control policies.Computers Operations Research,40(7), 1864-1873. Reddy, M. V. R. (2012). Status of supply chain management in India.International Journal of Emerging Technology and Advanced Engineering,2(7), 429-432. Yang, P., Wu, W., Moniri, M., Chibelushi, C. C. (2013). Efficient object localization using sparsely distributed passive RFID tags.IEEE transactions on industrial electronics,60(12), 5914-5924. Zelbst, P. J., Green, K. W., Sower, V. E., Reyes, P. M. (2012). Impact of RFID on manufacturing effectiveness and efficiency.International Journal of Operations Production Management,32(3), 329-350. Zhu, X., Mukhopadhyay, S. K., Kurata, H. (2012). A review of RFID technology and its managerial applications in different industries.Journal of Engineering and Technology Management,29(1), 152-167.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.