{"id":1611,"date":"2019-10-04T18:43:14","date_gmt":"2019-10-04T18:43:14","guid":{"rendered":"http:\/\/blogs.uakron.edu\/ida\/?page_id=1611"},"modified":"2019-10-04T18:43:14","modified_gmt":"2019-10-04T18:43:14","slug":"rfid-outline","status":"publish","type":"page","link":"https:\/\/blogs.uakron.edu\/ida\/teaching\/course-outlines\/rfid-outline\/","title":{"rendered":"RFID Outline"},"content":{"rendered":"\n<p><strong>Texts:<\/strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;No text<\/p>\n\n\n\n<p><strong>Time:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/strong>W, 3:15-5:30 PM<\/p>\n\n\n\n<p><strong>Room:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/strong>CH-323<\/p>\n\n\n\n<p>Dr. N. Ida&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;(ASEC N252), e-mail: ida@uakron.edu, TEL: 972-6525<\/p>\n\n\n\n<p><strong>RFID: Outline<\/strong><\/p>\n\n\n\n<p><strong>1. Introduction<\/strong><\/p>\n\n\n\n<p><strong>2. What is RFID<\/strong><\/p>\n\n\n\n<p>History, where did it start, why? when?, what is it?, what can it do? Etc.,&nbsp;Review of RF basics, what is RFID, RFID base system architecture, frequency bands used by RFID, comparison with barcodes.<\/p>\n\n\n\n<p><strong>3. Standards and regulations<\/strong><\/p>\n\n\n\n<p>Global regulatory requirements, regional regulatory requirements, ISO, ETSI, FCC, EPC, safety regulations\/issues.<\/p>\n\n\n\n<p><strong>4. RFID applications<\/strong><\/p>\n\n\n\n<p>Supply chain, asset tracking, theft reduction, retail, access control, tolls, military applications, others<\/p>\n\n\n\n<p><strong>5. Tags<\/strong><\/p>\n\n\n\n<p>Tag features, types of tag, passive and active, chips, read only, read write, affixing tags, selecting location to affix a tag, tag orientation and location, tag stacking, impact of rate of movement, tag data formats.&nbsp;Approaches to RFID tags, the players in the industry (microchip, TI, Phillips, and other smaller companies), active, passive and semi-active tags, antennas, implementation, protocols, etc.<\/p>\n\n\n\n<p><strong>6. RFID readers<\/strong><\/p>\n\n\n\n<p>Reading zones, RFID types, relation to various standards, antennas, read distance tests, multiple readers, synchronization, reading environment effects, collision and anti collision protocols, RFID peripherals.<\/p>\n\n\n\n<p><strong>7. Testing and troubleshooting<\/strong><\/p>\n\n\n\n<p>Read rate problems, improperly tagged items, tag failure.<\/p>\n\n\n\n<p><strong>8. RFID system design<\/strong><\/p>\n\n\n\n<p>Antenna types, interference, antenna location and spacing, multiple antennas, multiple readers, tag types, grounding and ccnsiderations, cabling, site diagrams.<\/p>\n\n\n\n<p><strong>9. Security, safety and privacy<\/strong><\/p>\n\n\n\n<p>Security of RFID tags, safety, issues of privacy and access to tag information, impact on society at large, misuse, fraud.<\/p>\n\n\n\n<p><strong>Grading:&nbsp;<\/strong>Each student will be assigned topics (3-4 during the semester). The student then writes a report and presents it to the class, including a question and answer session. These reports will be graded. The average grade of these reports is the class grade.<\/p>\n\n\n\n<p><strong>Notes:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>This is a new class. It is likely that the order as well as some of the topics will be changed to better fit in the overall scheme.<\/li><li>There are many new books on the topic, most of them non-technical. A list of those that are available in the library as well as others that are useful for overall understanding of the issues involved is provided below.<\/li><li>I am trying to put together some experiments to at least demonstrate the use of RFID. I will update you on progress in this endeavor.<\/li><\/ol>\n\n\n\n<p>Bibliography:<\/p>\n\n\n\n<p>RFID books. The first three in the list are available in the Science library.<\/p>\n\n\n\n<p>1. Simson Garfinkel, Beth Rosenberg, RFID : Applications, Security, and Privacy (Hardcover), Addison-Wesley Professional 2005.<\/p>\n\n\n\n<p>2. Dominique Paret, Roderick Riesco, RFID and Contactless Smart Card Applications, John Wiley &amp; Sons<\/p>\n\n\n\n<p>3. Claus Heinrich, RFID and Beyond: Growing Your Business Through Real World Awareness, John Wiley &amp; Sons<\/p>\n\n\n\n<p>4. Steven Shepard, RFID, McGraw-Hill Professional, 2004<\/p>\n\n\n\n<p>5. Klaus Finkenzeller, RFID Handbook : Fundamentals and Applications in Contactless Smart Cards and Identification, John Wiley &amp; Sons 2nd edition<\/p>\n\n\n\n<p>6. Robert Kleist, RFID Labeling: Smart Labeling Concepts &amp; Applications for the Consumer Packaged Goods Supply Chain, Banta Book Group<\/p>\n\n\n\n<p>7. Nahid Jilovec, EDI, UCCnet &amp; RFID: Synchronizing the Supply Chain, 29th Street Press<\/p>\n\n\n\n<p>8. Manish Bhuptani, Shahram Moradpour, RFID Field Guide : Deploying Radio Frequency Identification Systems, Prentice Hall PTR<\/p>\n\n\n\n<p>9. Sandip Lahiri, RFID Sourcebook, IBM Press<\/p>\n\n\n\n<p>10. Amal Graafstra, RFID Toys : X Cool Projects for Home, Office and Entertainment, Wiley<\/p>\n\n\n\n<p>11. Bill Glover, Himanshu Bhatt, RFID Essentials, O&#8217;Reilly Media, Inc.<\/p>\n\n\n\n<p>12. Anthony Furness; Ian G. Smith, RFID Compendium: The Technology and Where to Use It, Auto ID Service Providers, LTD.<\/p>\n\n\n\n<p>13. Pete Lindstrom, Frank Thornton, RFID Security, Syngress<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Texts:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;No text Time:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;W, 3:15-5:30 PM Room:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CH-323 Dr. N. Ida&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;(ASEC N252), e-mail: ida@uakron.edu, TEL: 972-6525 RFID: Outline 1. Introduction 2. What is RFID History, where did it start, why? when?, what is it?, what can it do? Etc.,&nbsp;Review of RF basics, what is RFID, RFID base system architecture, frequency bands used by RFID, comparison with barcodes. &hellip; <a href=\"https:\/\/blogs.uakron.edu\/ida\/teaching\/course-outlines\/rfid-outline\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">RFID Outline<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3795,"featured_media":0,"parent":203,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-1611","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uakron.edu\/ida\/wp-json\/wp\/v2\/pages\/1611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uakron.edu\/ida\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.uakron.edu\/ida\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ida\/wp-json\/wp\/v2\/users\/3795"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ida\/wp-json\/wp\/v2\/comments?post=1611"}],"version-history":[{"count":1,"href":"https:\/\/blogs.uakron.edu\/ida\/wp-json\/wp\/v2\/pages\/1611\/revisions"}],"predecessor-version":[{"id":1615,"href":"https:\/\/blogs.uakron.edu\/ida\/wp-json\/wp\/v2\/pages\/1611\/revisions\/1615"}],"up":[{"embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ida\/wp-json\/wp\/v2\/pages\/203"}],"wp:attachment":[{"href":"https:\/\/blogs.uakron.edu\/ida\/wp-json\/wp\/v2\/media?parent=1611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}