Thursday, September 26, 2019
Management of IT, Radio Frequency Identification Essay
Management of IT, Radio Frequency Identification - Essay Example RFID stands for Radio Frequency Identification which is a very effective and modern system of finding and identifying objects or even organisms. RFID has a lot of uses and is applied to various fields such as criminology, law enforcement, office application etc. It works by 'tagging' and object with either a passive or active tag which can be identified by a RFID reader using radio waves. The tags are powered by the RFID receiver and are only activated when the tag is in range of the receiver. An RFID tag consists of a data sequence encased in the tag housing and is responsible for the identification of the object. The identification sequence starts when the RFID tag comes within the range of the receiver. The receiver will then pick up the tag's signal and decode it for reference. The RFID receiver will then refer the tag's data to its database to verify the identity of the tag's wearer. Once the tag's data (example: the location of the object, time of verification etc.) is processe d and the identity of the object is verified, then the data can be complied in to a larger data set and can be later passed on or processed by another RFID application.(RFiDa.com, n.d.). Figure 1: "This diagram explains the basic schematic of all RFID systems.The Tag or Transponder can be either active or passive. It responds to a signal from the Interrogator (reader/writer/antenna) which in turn sends a signal to the Computer" (High Tech Aid, 2006b). An RFID tag is basically composed of an IC. The IC has a small built-in memory (memory type for an IC is usually ROM or Read Only Memory) capacity and may be equipped with a small processor. The tag communicates with the receiver via air interface, with... This essay approves that the biggest advantage and also the most efficient use seen for RFID system is its potential use in electronic product surveillance. RFID systems avoid the old point-to-point tracking system and instead have the ability t track the product at any point in the merchant operation. RFID tags also make product to product communication possible and even automated product shelves that signal the supervisor when it needs refilling. Human product supervision is still necessary but effort is significantly reduced through the use of RFIDs. This report makes a conclusion that Radio Frequency Identification is yet another one of mankindââ¬â¢s attempts at making life a little more convenient. In its service RFID proves to be a very efficient and effective electronic medium not just for identification and security but for other applications as well. The controversy behind the use of RFIDs is based upon future assumptions and thus far the system is proves to be very limiting and specific for it to be used as a type of wide range surveillance method. Like any other wireless device RFIDs are still not very much accepted today but it may become as common as mobile phones or personal computers in the future. Already, manufacturers and researchers are working hand-in-hand in improving the characteristics of RFID technology such as range, processing power, data storage etc. The fear of losing oneââ¬â¢s privacy and the tampering of personal data with the use of RFIDs have no scientific basis and it is best to think that howe ver sophisticated RFID devices can get, they will still be hampered by physical limitations as well as laws and regulations that will determine the scope of their use.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.