University Institute Of management Sciences. Usman Fazal Usman Fazal Usman Azhar Usman Azhar Syed Nabeel Hussain Zaidi Syed Nabeel Hussain Zaidi.

Slides:



Advertisements
Similar presentations
Wi-Pow! A Smart Solar Wireless Charger Katrina Maranon | Erika Aggarao | Nilda Flores | Angelo Sulit BUSINESS AND PROFESSIONAL DISCOURSE – S38 Wire-free.
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
Objectives Overview Differentiate between storage and memory
RFID Radio Frequency IDentification By Özcan Tunalılar 27 th March 2008.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Supply Chain Management Managing the between all of the parties directly and indirectly involved in the procurement of a product or raw material.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
Presentation by Erik Stevenson Librarian Plainfield Public Library.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
SCIENCE IN THE NEWS. In the Near Future, YOU might be an alternative fuel source…
ECEN 4610 Capstone Laboratory Spring 2010 PokerTech Erik Morrisey | Electrical Engineering Chris Weigel | Electrical Engineering Ho Yun Chan | Electrical.
Sixth Sense Jyothi Priyanka Mudumala. Intro... Ever wondered taking a photo with just the fingers. Ever wondered calling home with just the hands and.
RFID Radio frequency identification,or RFID,is an Auto-ID technology that uses radio waves to identify a physical object. Tags ReaderAntenna.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
Supply Chain Management
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
DBS Institute of Technology
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Overview  What is RFID?  How to use it?  Relevant links  Future Trends  Bibliography.
Applied Communications Technology n.a.shulver, March 2012 updated March 2013 RFID identification 1.What is RFID? 2.Some examples 3.How does it work? 4.Industrial.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
IofT 1910 W Fall 2006 Week 4 Plan for today:  discuss questions asked in writeup  talk about approaches to building intelligence  talk about the lab.
Unit 3- Input, Output, & Peripherals.  Identify & describe input devices  Identify & describe output devices  Connect input & output devices to a computer.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Energy Lesson Goal: Explain the different forms of energy that are present while on a roller coaster and what those forms of energy turn into. At the.
Yokogawa Indonesia < Document Number> Copyright © 2004, Yokogawa Indonesia Inspection PDA Patrol System.
Submitted by:- Vinay kr. Gupta Computer Sci. & Engg. 4 th year.
CES Consumer Electronics Show Session Notes. Overview  “Long term” is now months  Battle for control of the Connected Consumer is really the theme.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
“A mobile market researcher wants a smartphone capable of shooting quality video, playing their music, browsing the web and running a range of applications”.
The Before….. And After Story The first prototype of magnetic stripe card created by IBM in the late 1960s Today’s Cards.
Radio Frequency Identification (RFID)
Computing Fundamentals
Information Management System based on RFID technology in District Court in Warsaw Warsaw 2015.
By Jack Stewart. Cloud computing, or something being in the cloud, is a colloquial expression used to describe a variety of different types of computing.
Chapter 2b- Peripherals & Ports.  Identify & describe input devices  Identify & describe output devices  Connect input & output devices to a computer.
A new ‘green’ school is being built. Solar panels Triple-glazed windows Rainwater harvesting Recycling bins Wind turbine How do these features help it.
Mrs. Wharton’s Science Class.  The energy possessed by an object due to its motion or its stored energy of position.  Mechanical energy can be either.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
Brandon Halleran.  The power supply for your personal computer gives your machine all the different voltages it needs to operate properly. It is able.
ITS Infrastructure Utilities RFID’s Are Not Just For Tolling RFID’s Are Not Just For Tolling.
CONTENTS Introduction Description Advantages Applications Conclusion
The Electromagnetic Induction Torch. -Never need new batteries or a new bulb -Kinetic energy – electric energy - Handy and always working source for light.
Yes? Or No?. Radio-frequency identification is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product,
Created by: Samantha Conrad.  What is an RFID?  Where did they come from?  Active tags vs. Passive tags  RFID Systems  Who uses these?  What’s in.
The wireless charge will convert the RF signal at 900MHz frequencies into a DC signal,and then store the power into a mobile battery.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Information Systems in Organizations 4.1 Supply Chain Management Systems.
Magnetic Interconnection
Unit 2 Technology Systems
Wireless Charging for Mobile Phones.
Discovering Computers 2012: Chapter 2-7
Technologies in everyday’s life
COMPANIONTM Radio Flashlight
English for Advance Learners I
Arduino BASED RFID Device Access
Designing a Production Plan
Radio Frequency Identification (RFID)
CHAPTER 2 CONT..
Radio Frequency IDentification
MOBILE COMPUTING Jitendra Patel ROLL NO :- 38 TY MSC(CA & IT)
How can you fix Kindle critical battery error?
OCR GCSE ICT Data capture methods.
Chapter 17 Inventories.
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

University Institute Of management Sciences.

Usman Fazal Usman Fazal Usman Azhar Usman Azhar Syed Nabeel Hussain Zaidi Syed Nabeel Hussain Zaidi

University Institute Of management Sciences.

Designed by French designer Josselin No Meaning of Zero In Normal Routine Working of Phone – Phone have two color combinations – Virtual Interface University Institute Of management Sciences.

Advantages – User Friendly – Long Life – Simple & Nice Design University Institute Of management Sciences.

A Rechargeable Solar Power LED Emergency Light Small Yet Powerful Enough to Emit Light University Institute Of management Sciences.

How it Activated University Institute Of management Sciences.

Mobile that Follows You, not U follow mobile Perfect Phone for Young Generation Technology Used – Liquid Battery – Speech Recognition – Flexible Touch Screen University Institute Of management Sciences.

Advantages – Flexible – Easy to Use – User Friendly University Institute Of management Sciences.

Design Created by Lady Gilli Transformation of Hand Bag into Trolley Project is environment oriented and aims to minimize the use of plastic bags University Institute Of management Sciences.

Designed by Luis Luna. Manufactured by Decreases a tiny amount of CO2 generated by your computer Based on “green thinking’ and ‘life style’ by having a decorative piece to eliminate the abundant visual noise that regular pc’s create University Institute Of management Sciences.

Plant based CPU Biodegradable skin composed of polymers based on cornstarch and bamboo University Institute Of management Sciences.

Use kinetic energy in order to charge the battery A person just needs to shake his/her body for recharging the battery. University Institute Of management Sciences.

To charge the battery, you put on the hold button, and then any movement (running, shaking, jumping up and down) The use of kinetic energy to charge the battery not only solves an environmental issue, but also a more personal one University Institute Of management Sciences.

An electromagnetic coil is connected to the battery, converting kinetic energy into electrical energy that charges the battery. The player connects to the computer via a USB cable through the headphone jack, facilitating the transfer of songs as well as the conventional method of charging. Energy generation technology developed by a company “M2E Power”. Micro-generator technology delivers 300% to 700% more power than existing kinetic energy solutions This technology allows Shake to charge even in the user’s pocket while he/her is walking around. University Institute Of management Sciences.

Mark is a thin and flexible sheet made out of embedded FOLEDs (flexible organic LEDs) which can glow to help you read each pages in the book in the dark MARK will provide you the light Can also place it between pages as ordinary book mark The light intensity can be controlled according to the user requirement. University Institute Of management Sciences.

Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves University Institute Of management Sciences.

HOW IT WORKS – The technology requires some extent of cooperation of an RFID reader and an RFID tag. RFID Tag on A Product RFID Reader University Institute Of management Sciences.

Some Features – Read & Write Capabilities – Track on Stocking & Merchandising – Ability to store data is so efficiently – Still to Expensive to use on Large scale University Institute Of management Sciences.

Types of RFID Tags – Active – Semi Active – Passive Storage Types of RFID Tags – Read Write – Read Only – WORM University Institute Of management Sciences.

USES – Passports – Transportation payments – Product tracking – Transportation and logistics – Animal & Human Chipping – Libraries – Museums University Institute Of management Sciences.

 PRODUCT TRACKING

Criticism – Human Chipping May become Mandatory Citywatcher.com in 2006 – (Solution) – Control of Govt on Spending Habbits Govt and Companies may have track on purchasing power of people – Hackers Disable RFID anti theft features Changing price of the Product – (Solution) – Security RFID security could make human security checkpoints lazy & ineffective University Institute Of management Sciences.

When It Comes To The Future, There Will Three Kinds Of People: Those Who Let It Happen, Those Who Make It Happen, & Those Who Wonder What Happened 1

University Institute Of management Sciences.