Upload
hitesh-bansi-ramnathkar
View
220
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Presentation
Citation preview
Strictly Private & Confidential
Corporate Profile
Network.Associate.Evolve
Strictly Private & Confidential
Strictly Private & Confidential
Strictly Private & Confidential
We introduce leading edge RFID solutions to businesses and organizations in order to help them overcome problems associated with tracking of equipment, personnel and inventory. The company is focused on providing complete RFID solutions using our own exclusive middleware and partnering with the best like MOTOROLA in delivering the solution.The engineering team, composed of highly experienced hardware and software engineers from the RFID as well as Software industry, has developed RFID technology that is able to keep track of any activity associated with RFID tagged equipment, personnel and inventory in real time. Our RFID system will identify and keep track of goods located in any place within the warehouse or any other part of the building that the system is installed. The management team consists of young and dynamic professionals with high-tech profile in software, hardware, RF technology, corporate development, and marketing. They have vision and dreams to introduce RFID in every business sector making it more versatile and dynamic technology. We believe in developing a team with blend of innovativeness and experience.Our Team
Strictly Private & Confidential
Solutions Partner
Strictly Private & Confidential
Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna (the chip and the antenna together are called an RFID transponder or an RFID tag). The antenna enables the chip to transmit the identification information to a reader. The reader converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can make use of it.Unlike traditional bar-codes, RFID chips give every tagged object a unique identification code. Companies will soon use RFID to track the billions of objects transported around the world every year in planes, trucks and ships, through ports and warehouses, on to store shelves, and into homes and offices. Accurate tracking will save hundreds of billions of dollars a year by improving the channels of distribution and reducing labor costs, inventory, and theft.About RFID
To review, a comprehensive RFID system consists of three components:RFID Tag: A tag or transponder that consists of a microchip with an antenna that is electronically programmed with unique information. Each paper-thin tag contains an etched antenna and a microchip with a capacity of more than 64 bits of information. There are three types: read only, WORM (Write-Once-Read- Many), and read/write.There are 2 types of tags available;RFID Active Tags: Active Tags are radio frequency identification devices which require batteries for their operation. Active tags have a life of about ten years, due to their batteries. Still, active tags are an interesting option that allows higher data transmission rates and greater distances between tag and reader. They also offer better performance in electro magnetically noisy environments.RFID Passive Tags: Passive tags are radio frequency identification devices that do not have any internal power source. Their energy source is the power emitted from adjacent antennas.About RFID
RFID Reader: A reader or sensor with an antenna that interrogates the tags.The reader sends out electromagnetic waves. The tag antenna is tuned to receive these waves. A passive RFID tag draws power from field created by thereader and uses it to power the microchips circuits. The chip then modulatesthe waves that the tag sends back to the reader and the reader converts the new waves into digital data.Interface Software: A server or docking station on which the software that interfaces with the RFID is loaded. The software can be linked to the readers and sensors.RFID tag read rangeThe read range of passive tags depends on many factors: the frequency of operation, the power of the reader, interference from metal objects or other radio frequency devices. In general, low-frequency tags are read from a foot or less. High frequency tags are read from about three feet and UHF tags are read from 10 to 20 feet. Wherelonger ranges are needed, active tags use batteries to boost read ranges to 300 feet or more. Passive tags are undoubtedly less expensive than active tags and can be disposed of with the products packaging..About RFID
Why RFID
The task of receiving, transporting, sorting and shelving materials has exploded in recent years. RFID provides a solution to automate much of this handling and return staff to the business of customer service.The use of RFID reduces the amount of time required to perform circulation operations. The most significant time savings are attributable to the facts that information can be read from RFID tags much faster than from bar codes and that several items in a stack can be read at the same time.Is RFID better than using bar codes?
The two are different technologies and have different applications, which sometimes overlap. The big difference between the two is bar codes are line-of-sight technology. That is, a scanner has to "see" the bar code to read it, which means people usually have to orient the bar code toward a scanner for it to be read. Radio frequency identification, by contrast, doesn't require line of sight. RFID tags can be read as long as they are within range of a reader. Bar codes have other shortcomings as well. If a label is ripped or soiled or has fallen off, there is no way to scan the item, and standard bar codes identify only the manufacturer and product, not the unique item. The bar code on one milk carton is the same as every other, making it impossible to identify which one might pass its expiration date firstAbout RFID
Strictly Private & Confidential
Core Solutions
Embedded Systems Design
GPS based Asset Tracking (mobile and non-mobile assets)
Non-GPS based, low cost vehicle location and security technology.
GSM/GPRS based security systems for Power companies and Households.
Smart card enabling Technologies in Asset Tracking and User authentication.
Real time Telematics solutions like On board temperature, Tire Pressure, fuel pilferage etc in vehicles.
Embedded Software Systems and Mobile applications development Industrial Automation Solutions
Skill sets
8/16/32 bit Microprocessor based circuit design
Strong ARM processor design on RTOS platform like Linux C , QNx Flash Memory /SRAM/DRAM interfaces to host design SCADA / RS232 communication protocols for automation Assembly language and C/VC ++ programming
Microprocessor based /Secure chip card, magnetic card profiling and systems design
Strictly Private & Confidential
EducationHospitals & HealthCareLibrariesMuseumsCorporates
Strictly Private & Confidential
Strictly Private & Confidential
Strictly Private & Confidential
Strictly Private & Confidential
Strictly Private & Confidential
Smart Campus Initiative- Solution Scope
Strictly Private & Confidential
eTechSchool Solution Scalability
Strictly Private & Confidential
Strictly Private & Confidential
Portals of eTECH SchoolStrictly Private & Confidential
Strictly Private & Confidential
Strictly Private & Confidential
The Deployment Scenario
Strictly Private & Confidential
Strictly Private & Confidential
Traxi GPS
Strictly Private & Confidential
Fleet Tracking:How does it work?
Strictly Private & Confidential
Traxi Features & Benefits
Strictly Private & Confidential
ReportsDaily Report Daily Report Idling Report Hours Worked Report Red Flag Report Location Report State Mileage Report Activity Report Customer System Usage Report Fleet Summary Report Costing Report
Strictly Private & Confidential
Golden Eye
A complete Jewellery Store Solution
Strictly Private & Confidential
Key FEATURESFast and error free countingAutomatic updation of the Inventory DatabaseNo repetition of countingReusable tagsDetects theft attempts instantlyEasy to use, One time InvestmentSaves hours of Manual Counting EffortEasy to use software Anti-Theft Gate ScannersHandheld Scanner RFID tagsGOLDENEYE APPLICATION SOFTWARE
Strictly Private & Confidential
RFID Hospital Management
Strictly Private & Confidential
RFID Baby Tagging RFID Staff, visitor Patient Tracking System RFID Asset / Equipment Tracking RFID Inventory Management & Control RFID Blood Administration RFID Vehicle Access Control Benefits Of RFID Hospital Management
Strictly Private & Confidential
Smart Paper Anti-counterfeiting of Documents
Strictly Private & Confidential
SOLUTION OBJECTIVES
Strictly Private & Confidential
ADVANTAGES OF Smart paper substrate Very tough resistant surface , several times better than laminated paper Resistant to water, heat , solvents, wear and tear Lifelong preservation without getting defaced or worn out. Looks rich and whiter compared to the normal or laminated paper, hence gives a good brand feel to the student and the university management. Comes in various thicknesses for different application, custom sizes. No special Infrastructure needed for printing on this substrate, offset or Indigo printing machines would do the job. Paper comes in 105/75/56/42.5 GSM depending on the type of document needed to be protected. Ordinary Ball-pen or gel pen can be used to mark on these documents once printed on smart paper.
Strictly Private & Confidential
Contact Us
Thank You
For More Clarifications, Please feel free to speak to
Sudesh Paul+91 - 9930732007