Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
RFID Based Security System
Transcript of RFID Based Security System
Chan, Jilson Jade
Toribio, Jean Rose RFID (Radio Frequency Identification)
BASED SECURITY SYSTEM CHAPTER I:
Introduction -Main Components of RFID 1. RFID Tag STATEMENT OF THE PROBLEM a.What is an RFID security system?
b.What are the components and capabilities of the RFID security system?
c.What are the costs for making this research paper? SIGNIFICANCE OF THE STUDY a.This research will be beneficial to our university in a way that this would secure its assets.
b.This research study could be the basis of future innovations on wireless security.
c.It will provide sample in discussing how to conduct a research study.
d.It helps the school or organization to lessen labor to hire more guards to monitor the assets.
e.It serves as a tool to get necessary information in making a research paper for RFID security system. Radio Frequency
Identification (RFID) RFID AS A REPLACEMENT FOR THE TRADITIONAL SECURITY SYSTEM. SCENARIO: Computer Laboratory -How RFID works? A. BACKGROUND OF THE STUDY -Main Components of RFID 1. RFID Tag
2. RFID Reader
3. Middleware/Host Passive Tag 2. RFID Reader 3. Middleware Advantages of RFID System •Touch free data exchange
•Parallel identification of multiple objects
•No line of sight required for data acquisition
•No maintenance required
•Data may be complemented/edited
•Easy to use and tags can be simply installed
•Tags cannot be easily replicated
•Reliability in tough environments OBJECTIVE OF THE STUDY Detection of unauthorized movement of assets SCOPES AND DELIMITATION a.To write a research paper for RFID based security system.
b.The system can detect the tagged item within the range of approximately 4-8 meters.
c.The system will make an audible alarm when a tagged item is not detected in the pre-defined zone.
d.The system is set to cover only a room size and not an entire building. Chapter II: Theoretical Framework Review of related literature 1.SanthakumarChanrasekaram, Mats Oustad, “Securing Assets with RFID”, May 2008
2.M. A. Meor Said et al, “Wireless Security Car Using RFID System”, July 2012 A. THEORIES THAT HAVE BEARING ON THE PROBLEM 1.Barcode system
2.Passive infrared detectors
3.Ultrasonic Detector Conceptual Framework Chapter III: Research Design METHODOLOGY DESCRIPTION OF THE SOURCES OF DATA CHAPTER IV: Project Timetable (Duration of the Research) CHAPTER V: Statement of Expenses (Budget Estimation) A. Transportation - P50
B. Materials and Supplies - P150
C. Miscellaneous - P100
Total - P300 Antenna