Wednesday, December 11, 2019

Business Information System Analysis

Questions: Evaluate the use of Radio Frequency Identification (RFID) technology.Your evaluative report should include the following: a) Briefly explain how the technology works. b) Explain the business or technical problem the technology is designed to solve. c) Identify the technologys limitations. Does it create any new problems? d) Evaluate at least one organizations implementation of the technology. e) Assessment of the technologys prospects for success in the marketplace. Answers: Introduction RFID is the Automatic Radio Frequency Identification technology that uses the radio frequency electromagnetic fields in order to identify the objects that consist of tags when it comes to the reader. It is similar to the bar code identification (Jung, 2013). The advantage of RFID is that it does not need any straight contact as well as a line of sight scanning. The report reflects on the working of the RFID system. It also discusses the technical problems the technology is designed for with the limitation of RFID system. It evaluates the organizational implementation of the technology with assessing its success in the marketplace. 1.0 Working of Radio Frequency Identification System RFID consists of three components such as an antenna, transceiver as well as transponder. With the use of radio frequency wave, the antenna can transmit the signal which activates the transponder (Ahn, 2013). After the activation, the transponder transmits the data reverse to the antenna. The transmitted information is utilized to illuminate the programmable logic controller that the activity happens. The data that gathers from the transponder is moved all through the correspondence interface to the host PC framework where the information is put away inside the database and in addition it is examined. Active RFID system uses the battery-powered RFID tags to broadcast the signal. It is used to track the actual time location of the high-speed situation including tolling (Vanitha Sheba Rajakumari, 2015). Active tags have much more readable range as compared to the passive tags, but the active tags are more expensive. Passive RFID system uses the tags with no such internal power source. The system uses the electromagnetic energy that is transmitted from the RFID reader to power it. It uses the applications such as accessing organize, tracking of file, supply chain management as well as smart labels. The lower cost point per tag formulates the passive RFIS system cost-effective for the industries. 2.0 Explanation of the business or technical problem the RFID technology is designed to solve Within the business, the RFID system is used to improve the IT asset utilization by tracking the servers. It also improves the document management by tracking the location as well as a status of the document. It reduces the inventory as well as improves the accuracy of inventory by providing a proper image of the existing inventory with reducing the labor required (Dhal Sengupta, 2012). The most important are that it eliminates repetitive entry of the data by entering the data into the database of the computer. The RFID system helps the manufacturers to customize their products for the customers. Customization increases the complication of the supply chain; though it creates the process easier by giving with precise information about the objects by tracking it (Song Li, 2012). It also reduces the cost of labor as well as time, by automatically recording the information about the items received into the computer system. As per the comparison between RFID as well as a bar code, RFID is not better than barcodes, but the only advantage of RFID system is that it does not need any line of sight. The RFID tags can be interpret as long as it is in the range of the reader. Therefore, the tags are read at a greater distance as well as the group of tags are read all at once (Jung, 2013). In order to read the barcode, the reader can orient the bar code towards the scanner to read it. 3.0 Limitations of the RFID system with possible solutions The following are the limitations of the RFID system with its possible solutions: Collision: At the time of attempting several tags result in a collision of a signal as well as it causes loss of data. In order to prevent it, anti-collision algorithms are used to be applied at additional cost (Dhal Sengupta, 2012). Due to a development of this technique, it aims to reduce the entire read time as well as maximize the total number of tags to read. Security and privacy issues: Depend on the field of application; the use of tag sometimes causes security as well as privacy issues. The unauthorized person can read as well as write the data stored as well as transmitted from the tags (Gu et al. 2015). In order to prevent these limitations, encryption should be used to ensure that all the data should be authorized use. It should be intercepted as well as transmitted by the tag reader as well as reader host communication. Increase in expenses: Within the business, the supplier can equip the warehouses as well as transport the vehicles with the readers. The readers are connected with the computer networks to exchange the information. Therefore, it requires additional costs to hire technical consultants as well as additional hardware (Wang, 2012). The business invests in the sophisticated system in order to process the data. Due to the use of this technology, it reduces the cost of labor as well as zero tag information generation into account. Therefore, the business can use this labor cost for the development of the system. Accurate read rate: Sometimes, the smart tag technology does not function properly, and the reader are unable to read the accurate rate on the items as it is low. It also disrupts the transmission of the tags within the warehouse (Prakashe Rathor, 2014). The solution is that the system should be maintained properly by the IT Consultant of the business so that the reader can read the data accurately. 4.0 Organizational Implementation of the RFID technology Within Singapore, the mass transit system is the nice thing. EZ-Link card is the smart card that depends on the Sony Felica, it is a smart card technology that is utilized for the payment of people in general transportation charges inside Singapore. The card consists of IC chip as well as an antenna that are built. The card, as well as the reader, uses the radio wave via the wireless communication (Lei, Yong, Yi-feng, 2013). The sensing distance between the card as well as the transit reader is 10 cm. It cannot contain any batter, but it operates from the electromagnetic energy that is received from the reader. It consists of secured as well as fast transmission of the data. A strong encryption technique is used to prevent the fraud. It also helps into the integrity of the transaction information captured (Jung, 2013). It also consists of Manchester bit coding scheme for the noise tolerance alongside the variation of distance among the card as well as a reader, and it implements a strong algorithm for security as well as privacy purpose (Weijun Changqing, 2012). Therefore, RFID system is used as the public transportation system in the form of smart cards. These cards are used to store a value such that the public can take their transport as well as pay using it. 5.0 Assessment of the technology's prospect for success in the marketplace Transportation: RFID technology is used as the public transportation system in the form of the smart cards (Dhal Sengupta, 2012). The card is used to store value so that the individuals can able to take public transport as well as pay their fare with the use of the smart card technology. Medical: In the hospital of Singapore, RFID temperature monitoring tag on the abdomen is used for the patients. With the use of this technology, the hospital can be able to monitor the body temperature of the patient as well as detect infections without waking them (Wang, 2014). The system also reduces the time of the staff members to spend time on finding the equipment. It informs when the doctor attends the patients. High-density RFID readers are installed in the ceilings of the room, and the patients are receiving the RFID wristbands at the time of registration. Supply Chain Management: RFID tags are used to tag the goods into the organizations those are involved in supply chain, retail as well as logistics. With the use of a line of sight, the good is scanned; it means that the inventory updates it quickly as well as properly (Kadubek, 2015). The handlings of the goods are automated. It also reduces the amount of the manpower that is required. RFID uses radio waves to identify the goods of the individuals in the supply chain. The supplier is the provider of the RFID tag. Conclusion It is concluded that RFID technology is used within the organization to increase the efficiency, reduces the errors as well as improving the quality. As compared the RFID technology with the bar code, it is seen that the bar code relies on the visual scan in order to transmit the data. The RFID relies on the radio waves and therefore it does not need any line of sight to read the data. Apart from its benefits, RFIS technology has some limitations such as collision, an increase in expenses, security and privacy issues as well as accurate read rate. References Ahn, H. (2013). Robust RFID Distance-Bounding Protocol based on Mutual Authentication.Korea Institute Of Information Technology Review,11(7). Dhal, S. Sengupta, I. (2012). A New Authentication Protocol for Multi-tag RFID Applicable to Passive Tag.Procedia Technology,6, 880-888. Gu, Y., Gao, B., Wang, J., Yin, M., Zhang, J. (2015). A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers.IJUNESST,8(1), 155-164. Jung, J. (2013). Analysis on the Importance of the Introduction Factor of RFID Applications.Korea Institute Of Information Technology Review,11(4). Kadubek, M. (2015). On Analysis of RFID Technology Application in Warehouses.AMM,795, 115-122. Lei, H., Yong, G., Yi-feng, Y. (2013). RFID Tag Ownership Transfer Protocol with Backtracking Authorization Ability.Information Technology J.,12(24), 8269-8274. Prakashe, V. Rathor, K. (2014). RFID technology: A performance differentiator.Lib. Her.,52(1), 67. Song, W. Li, M. (2012). Localization in Supermarket Based on RFID Technology.Procedia Engineering,29, 3779-3782. Vanitha Sheba, M. Rajakumari, B. (2015). RFID Enabled Smart Billing System.Indian Journal Of Science And Technology,8(32). Wang, C. (2014). RFID Technology Applied in Medicine Distribution Center.AMM,651-653, 2040-2044. Wang, L. (2012). RFID-based information technology and management in agriculture and food supply chains.International Journal Of Information Technology And Management,11(3), 225. Weijun, Z. Changqing, C. (2012). To achive a Campus Interchangeable Card Based on RFID Technology.Energy Procedia,17, 293-298.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.