RFID Technology and its Application Areas: A Review Paper
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 1
Abstract
Radio frequency identification is a contactless technique that uses the radio waves to identify the object uniquely. RFID Tag and Reader are major two parts of the RFID System. Tags are used to store the information about the object and Readers read tag’s stored information when tag enters in the range of the Reader. This paper provides the information regarding the current scenario of the RFID Technology. Aside from the introduction of the working of RFID, discussion is made on major types of the RFID tags and Readers, comparison with Bar code as well as current application areas have been presented.
Authors and Affiliations
Gurpreet Singh
Elimination of Stress and Reduction in Switching Time From Mains to Back-Up Power Source in Power Dependent Public Utilities by Automatic Mains and Phase Changer
Most public utilities depend on electric power to function, so it is paramount that a constant power source is available. These public utilities get their supply from the public mains and in the case where the pub...
CLASSIFYING THE STUDENTS AT RISK THROUGH THE PERFORMANCE REFLECTED IN PRE-REQUISITE AND NATURE OF MODULE IN HIGHER EDUCATIONAL SYSTEM
Educational institutions are growing diametrically to stand internationally in providing honorable merit employable graduates. Future prediction should be essential factor in an institute to take additional effort...
3-Level Neutral-Point Clamped Inverters Using Multi Carrier Pulse Width Modulation for FACTS Applications
In this paper, a novel technique used to keep the voltage across the dc split capacitors of neutral point clamped inverter using multi carrier pulse width modulation and also compensate the reactive power. It can...
IMPLEMENTATION OF AES ALGORITHM ON MICROBLAZE SOFT PROCESSOR
The importance of cryptography applied to security in electronic data transactions has acquired an essential relevance during the last few years. In this work, an FPGA-based implementation of the Advanced Encryption St...
NETWORK PERFORMANCE MONITORING USING THRESHOLD CROSSING ALERTS
Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a certain threshold. The timely detection o...