RFID Automatic Bicycle Lock Students: 張納堂, 曾奕智, 許祐群.

Slides:



Advertisements
Similar presentations
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
Advertisements

RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Copyright © 2011 Learning Well AB Page 1March 2011 Myths, Facts and Limitations of RFID Gunnar Ivansson
Given Connections Solution
10/23/06 Bell Work Reading/Writing What are RFIDsWhat are RFIDs Mathematics If a RFID receivers can read tags every second. How many tags can you.
Lecture Notes #7 Radio Frequency Identification (RFID)
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
Automated Home Access Using RFID
上海交通大学 自动化系 FROZEN FOOD Case : Cool-Chain of RFID.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
RFID Technology & It’s Uses Presented by: Ron Abdy 3 rd July 2013.
LIBRARY AUTOMATION Academic Resource Center, MSU Suntiparp Plienchote
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
RFID in the Military Rana, Mohammed,Trandel, Ahmed.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
RFID Last Update Copyright Kenneth M. Chipps Ph.D.
RFID (RADIO FREQUENCY IDENTIFICATION) Presented by Sreenesh Shenoy GM RFID & Software Stallion Systems and Solutions P Ltd.
RFID Pet Door Andrew Parr Conner Rocole Ben Peetz Eric Sturm EE 494, Fall 2006.
Novel Sensing Networks for Intelligent Monitoring (Newton) Z Q Lang, H Chen, T Dodd Department of Automatic Control & Systems Engineering University of.
A C JOSHI LIBRARY A C Joshi Library is considered to be one of the best libraries of India: Annual budget approx 5 Crores Annual budget approx 5 Crores.
RFID Privacy Concerns and Possible Solutions Jason Fritts SDC II – October 2, 2007.
Tire tracking overview AN ALL IN ONE SOLUTION TIRE TRACKING, IDENTIFICATION AND STOCK KEEPING.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
RFID (RADIO FREQUENCY IDENTIFICATION)
Copyright © 2007 Wavetrend (US) Inc. 1 A World Leader in the Deployment of Active RFID (Radio Frequency Identification) Solutions.
Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.
PRESENTATION In a modern society there are different types of surveillance systems from cctv cameras to biometric readers. In this power point presentation.
Project On:- Prepaid Energy Meter Made by:- Melvin j roopith Puneeth Satish Sri vibu ramanujam.
GS1 System Thomas Bikeev B2B Group Manager, GS1 Oasis Adoption Forum, London 17 October 2005.
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
IntroductionBuilding processRFIDPossibilities RFID in the construction process Glenco Jansen TU/e – Ballast Nedam.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Introduction to RFID Technology By: Vahid Bagher Poor 1.
Operating Systems Inter-Process Communications. Lunch time in the Philosophy Department. Dining Philosophers Problem (1)
Computer Asset Management System Project Feasibility CS 410, Fall 2005 Semester October 20, 2005.
Emerging/Converging Technologies in the Solid Waste Industry By Pat Fahey, Pacific Systems.
Information Systems in Organizations 4.1 Supply Chain Management Systems.
Radio Frequency Identification (RFID)
Where in the world is my PSP? RFID Triangulation Stuart Lenz North Star High School.
Information Management System based on RFID technology in District Court in Warsaw Warsaw 2015.
Team 9 - myRoom Software Design Considerations. Team 9 - myRoom Customizable control system Interfaces with household appliances –Light –TV –DVD player.
Security Device using RFID Reader Alex Gerard & Joe Nevin.
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
Memory Aid For Seniors Team Destiny Many seniors suffer from the problem of memory loss. Based on the enormity of the problem, our team has chosen.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
IMPROVED ASSET UTILIZATION Lack of visibility of assets and devices results in low equipment utilization rates, excess equipment purchasing and sometimes.
Poka yoke Japanese term for process improvements striving to make the desired outcome of a process inevitable, largely by preventing mistakes. Click here.
Andon Japanese term for a signaling system announcing problems encountered and assistance requested, often implemented as sets of lights over workstations.
Tag! You’re It! UNLV’s Experience with RFID Tom Boone UNLV Wiener-Rogers Law Library Jennifer Fabbi UNLV Curriculum Materials Library Bobbie Studwell UNLV.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
RADIO FREQUENCY IDENTIFICATION TECHNOLOGY. By Twesige Richard.
Автоматизация деятельности библиотек на основе радиочастотной идентификации Качина Наталия Ивановна Директор Департамента по работе с библиотеками и вузами.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
RFID (RADIO FREQUENCY IDENTIFICATION) Presented by Sreenesh Shenoy GM RFID & Software Stallion Systems and Solutions P Ltd.
Using Radio Frequency Identification in Agent- Based Manufacturing Control Systems By: Lamar Alston ASQ Student Member.
Unit 2 Technology Systems
By: Tarun Sharma Chinta Rahul SCSE VIT University
PARKING AUTOMATION SYSTEM
Describe direct data entry and associated devices, e. g
Outline : Introduction Project objectives RFID basics and applications
RFID Technology & It’s Uses
CIS 210 Innovative Education-- snaptutorial.com
یا حقّ.
Radio-Frequency Identification (RFID)
RFID SOCCER BALL IMPACT: PROBLEM: APPROACH:
ارائه دهنده: محمود امین طوسی
IoTs (Internet of Things)
Presentation transcript:

RFID Automatic Bicycle Lock Students: 張納堂, 曾奕智, 許祐群

What is the Problem? Time Wasting: -The Average NTU students spends 7.3 hours a year locking/unlocking their bicycle according to our small experiment Annoying -Let’s face it, it is annoying to lock and unlock your bicycle many times a day for a whole year not to mention it will get you dirty countless times.

Our Experiment We polled 15 random NTU students on campus and found out that: They lock/unlock their bicycles 12 times per school day on average. By experimentation we found out that we: Spend average of 9.74 s locking Spend average of 7.22 s unlocking Results: Considering those times and using them for 5 days a week for a whole year then the average NTU student spends 7.3 hours a year locking and unlocking their bicycle!

What is our Solution? RFID (Radio Frequency Identification) We can automate the locking and unlocking process of a bicycle using RFID which is basically communication between a tag and a reader. Reader (interrogator)Tag (label)

How do we Plan to Make this Work? Materials The materials we will use to implement our idea are: a programmable/writable RFID tag, RFID Card Copier/Duplicator, RFID reader and a mountable lock for bicycles which closes automatically depending on the detection status of the reader. Implementation Fixed RFID reader RFID Reader connected to lock Supplying power to the RFID reader and lock