PIA Internship P
-
Upload
asif-ali-channa -
Category
Documents
-
view
146 -
download
0
Transcript of PIA Internship P
![Page 1: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/1.jpg)
RFID MULTI ACCESS
CONTROL SYSTEM
PRESENTED BY
KIRAN RASHEED (IQRA UNIVERSITY)AAMIR AHSAN (DAWOOD UNIVERSITY)ASIF ALI (SINDH UNIVERSITY)
![Page 2: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/2.jpg)
Automatic Identification Technology Uses RADIO WAVES to transfer data
between a reader and moveable item to identify
Identification is transmitted in the form of SERIAL NUMBER
RFID system consists of an ANTENNA, a TRANSCEIVER and a RF TAG(Transponder)
RADIO FREQUENCY IDENTIFICATION
![Page 3: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/3.jpg)
.
RFID SYSTEM
![Page 4: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/4.jpg)
With the same tag Identity (ID)
PERSONAL IDENTITY IDENTIFICATION
RECORD ATTENDANCE
DOOR ACCESS CONTROL AND GATE ENTRY PERMIT
RFID MULTI ACCESS CONTROL SYSTEM
USE OF RFID TAG FOR MULTI-PURPOSE ACCESS SYSTEM
![Page 5: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/5.jpg)
.
BLOCK DIAGRAM OF SYSTEM
![Page 6: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/6.jpg)
.
CIRCUIT DIAGRAM OF SYSTEM
![Page 7: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/7.jpg)
.
SYSTEM CONFIGURATION
![Page 8: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/8.jpg)
.
SYSTEM’S ALGORITHM
![Page 9: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/9.jpg)
Each vehicle has a passive tag inside the windshield.
As the vehicle moves into reader area of interrogation RFID Reader reads the tags affixed on the vehicle.
If ID is authorized then its number plate will be automatically displayed on the system software.
Controlling signal is issued to lift up the boom-barrier
VEHICLE IDENTIFICATION
![Page 10: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/10.jpg)
.
VEHICLE IDENTIFICATION
![Page 11: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/11.jpg)
Provides MULTI ACCESS CONTROL with same ID
Time-attendance management system
Record IN and OUT timings
Track Vehicle Identification Provide Security
Unauthorized person or vehicle can not be entered
BENEFITS OF SYSTEM
![Page 12: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/12.jpg)
An RFID tag can be read without any physical contact
No line of sight requirement
Portable database
RFID tags carry large data capabilities which can be programmed to the tag
Once these are set up; it can be run with minimal human participation.
ADVANTAGES OF RFID
![Page 13: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/13.jpg)
RFID tags are read/write devices
RFID contain high levels of security; data can be encrypted, password protected
The tag can stand a harsh environment
Multiple tag read/write.
Tracking people, items, and equipment in real time.
ADVANTAGES OF RFID
![Page 14: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/14.jpg)
Automatic Vehicle identification Inventory Management Attendance Management Personal Identification Work-in-Process Container/ Yard Management Goods tracking Patient Monitoring
APPLICATIONS OF RFID
![Page 15: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/15.jpg)
Perform automated attendance
Generate report of attendees for a particular course
Error free tag identifier detection
Easy scalability to incorporate more records
Integrity and security in data storage
SCOPE OF SYSTEM WITH RESPECT TO PIA
![Page 16: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/16.jpg)
Very helpful to maintain the attendance of each employee with door access and gate entry permit system
By using the same tag, user can access many place and also as identity
The tag stored ID and every user registered in a central database, application software used for registration, check identity and check the record of attendance
CONCLUSION
![Page 17: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/17.jpg)
In terms of performance and efficiency, this project has provided a convenient method
This system is also a user friendly system as data manipulation and retrieval can be done via the interface
It can be implemented in PIA to enhance the performance of its current system
CONCLUSION
![Page 18: PIA Internship P](https://reader035.fdocuments.in/reader035/viewer/2022062311/58edd3e21a28aba6418b46cf/html5/thumbnails/18.jpg)