Tuesday, May 5, 2020

Benefits of RFID technology-Free-Samples-Myassignmenthelp.com

Questions: 1.Explain how RFID technology works. 2.Explane the Business as well as technical problem that the technology is designed to solve. 3.Identifiy of RFID limitation. 4.Evaluation of one Organizations Implementation of the technology. 5.Assessment of the technologys prospects for success in the Marketplace. Answers: 1.RFID technology works RFID or radio frequency identification is one of the technologies that generally help in incorporating the utilization of electrostatic or electromagnetic coupling in the portion of radio frequency of electromagnetic spectrum that uniquely helps in identifying person, animal as well as object. RFID technology is mainly associated with a group of technologies that are known as Automatic identification and Data Capture (Amendola et al., 2014). It is identified that AIDC methods automatically helps in identifying objects, collecting data and entering tem into the computer system with or without appropriate human intervention. The method of RFID technology generally utilizes radio waves and it generally consists of three types of components that include an RFID tag or smart label, an antenna as well as an RFID reader. The RFID tags generally consists of an antenna as well as integrated circuit that are generally utilized for transmitting data to the RFID reader which is known as interrogator. The reader helps in converting the radio waves properly to more usable form of data (Fan et al., 2014). The information that is collected with the help of the tags in then transferred with the help of communication interface for hosting a computer system where the data can be stored appropriately within the database and can be utilized later. It is identified that RFID systems can operate in low frequency, high frequency as well as ultra high frequency. Low Frequency RFID: The low frequency generally helps in covering frequencies that include 30KHz. The low frequency RFID applications generally include livestock tracking as well as access control. High Frequency RFID: The high frequency band generally ranges from 3 to 30 MHz. High frequency RFID technology is generally utilized for payment, ticketing, as well as for transferring data applications. Ultra high frequency RFID: The ultra high frequency band generally helps in covering the range of 300MHz to 3 GHz. 2.Explanation of the business as well as technical problem that the technology is designed to solve The RFID technology is mainly designed in order to solve number of business as well as technical problems that include: Helps in solving the problems associated with barcode: It is identified that barcode scanner requires a direct line of sight in order to read. They also does not provide appropriate security and are very much labor intensive (Singh Kaur, 2016). In order to resolve all this issue, the RFID technology is designed. Supply chain management related problems: It is identified that the technology of RFID is generally utilized in closed loop supply chains in order to resolve problems that the organizations faces due to absence of automating parts within the supply chain of the company. The technology not only helps in resolving the issue of automation only, but also assists in reducing shipping related errors. Manufacturing associated problems: RFID technology is generally designed for also utilizing in the manufacturing plants. It generally helps in resolving the problems that organization mainly faces due to absence of proper tracking procedure (Nainan, Parekh Shah, 2013). With the implementation of RFID technology, various work procedure related with manufacturing is tracked that helps in reducing defects as well as assists in managing production at different versions. 3.Identification of RFID limitation It is identified that RFID technology faces number of limitations that include: Attack that effect RFID edge hardware: It generally comprises of RFID physical as well as touchable devices. It is identified that in the RFID system, there are two major types of physical devices, which include tag as well as reader (Oliveira et al., 2015). Due to improper security, weaknesses in this type of devices, tampering vulnerability are seen. Attacks that generally affect the communication part: In the communication part, different types of attacks are generally pointed to various radio links. The attackers generally attack in order to make some modifications within the signal. The possible attacks that are mainly done on the data support part of the RFID technology include tempering with data, denial of service, repudiation, spoofing identity as well as looming of privilege. Cost: It is identified that RFID needs much more costly equipments whether it be hardware or software (Hou, Verdirame Welch, 2015). Costly equipments are generally needed in order to maintain the RFID throughout the lifecycle. RFID collision course: It is identified that while working with the technology of RFID, the workers mainly came across different types of tag as well as reader collision. With the reader collision, the workers face problems due to the interference that came from another reader. It generally occurs when numbers of tags are reflected within a signal due to which the reader confuses. The possible solutions that help in resolving the above challenges that are faced by RFID technology include: Kill the tag: The first as well as easiest solution is to kill the tag. It is identified that each tag has an unique password that is mainly programmed within the production time. Block a tag: It is identified that if more than one tag helps in responding an inquiry that is sent by the reader, it helps in figuring out a collision (Torres et al., 2013). This method is generally utilized within the protocol like tree walking protocols. Solid cage method: In this particular method, tags are generally isolated from various types of electromagnetic waves. This is generally achieved with the help of the container that is built of metal mesh or foil which is generally impermeable with the help of radio signals. Classic cryptographic: Cryptography algorithms are generally utilized for rewritable memory, public key encryption for keeping the system much more secure. No, RFID technology does not help in creating new problems. 4.Evaluation of one organizations implementation of the technology RFID technology is implemented by Walmart. The technology is utilized by the company as a new tracking technology that involves small tags which helps in emitting distinct type of signals. The organization mainly utilizes remote scanners for reading the RFID tags on various products in order to enable them to record appropriate variety of information as well as data related with the product (Smiley, 2017). The RFID tags helps in providing real time monitoring of various stocks that is present within Walmart. The efficiency that is provided by the technology helps the markets in ensuring that various types of products are in proper supply in order to meet various demands as well as needs of the consumer. It is identified that Walmart stores have increased their sales by $287 million after fixing small portion of various inventory problems utilizing RFID technology 6.Assessment of the technologys prospects for success in the marketplace It is identified that active wave system generally utilizes RFID technology. It is mainly used for transmitting as well receiving various types of information without wires. ActiveWave RFID solutions generally utilize modern technologies that help the business in tracking both inventory as well as equipment (Shakiba et al., 2016).The system generally composed of proper RFID reader, standard windows that are based on PC, RFID tags as well as RFID transponders. It is identified that the RFID helps in providing information about location to the reader along with appropriate ID. The tags can be easily read and it is utilized for both securities as well as attendance purpose. The three examples of RFID technology prospects for achieving success in the marketplace include: Example 1: Walmart raises their sales by $287 million after fixing small portion off various inventory problems utilizing RFID technology (Smiley, 2017). Example 2: BJC Healthcare stated that by using RFID technology, they minimize the amount of stock on hand by 23%, which means buying less number of equipment. Earlier the organization faces problems due to miscounts (Nystedt Service, 2017). Example 3: Inditex is utilizing RFID technology for managing the supply chain management and they achieve success. References Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., Marrocco, G. (2014). RFID technology for IoT-based personal healthcare in smart spaces.IEEE Internet of Things Journal,1(2), 144-152. Fan, T. J., Chang, X. Y., Gu, C. H., Yi, J. J., Deng, S. (2014). Benefits of RFID technology for reducing inventory shrinkage.International Journal of Production Economics,147, 659-665. Hou, L., Verdirame, M., Welch, K. C. (2015). Automated tracking of wild hummingbird mass and energetics over multiple time scales using radio frequency identification (RFID) technology.Journal of Avian Biology,46(1), 1-8. Nainan, S., Parekh, R., Shah, T. (2013). RFID technology based attendance management system.arXiv preprint arXiv:1306.5381. Nystedt, D., Service, I. (2017).Wal-Mart Eyes $287 Million Benefit From RFID.PCWorld. Retrieved 17 June 2017, from https://www.pcworld.com/article/138391/article.html Oliveira, R. R., Cardoso, I. M., Barbosa, J. L., da Costa, C. A., Prado, M. P. (2015). An intelligent model for logistics management based on geofencing algorithms and RFID technology.Expert Systems with Applications,42(15), 6082-6097. Shakiba, M., Zavvari, A., Aleebrahim, N. and Singh, M.J., 2016. Evaluating the academic trend of RFID technology based on SCI and SSCI publications from 2001 to 2014.Scientometrics,109(1), pp.591-614. Singh, M., Kaur, G. (2016). Intelligent Bus Stand Fees Management System Using RFID.International Journal of Advanced Research in Computer Science,7(6). Smiley, S. (2017).4 Companies Using RFID for Supply Chain Management - RFID Insider.RFID Insider. Retrieved 17 June 2017, from https://blog.atlasrfidstore.com/4-companies-using-rfid-for-supply-chain-management Torres, R. L. S., Ranasinghe, D. C., Shi, Q., Sample, A. P. (2013, April). Sensor enabled wearable RFID technology for mitigating the risk of falls near beds. InRFID (RFID), 2013 IEEE International Conference on(pp. 191-198). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.