Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Human ID implant report
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Human ID implant

[attachment=49087]

INTRODUCTION

As time is progressing life is becoming more and more complex. As each day unfolds, man is tied up with a huge no: of constraints. Though the electronic era has attempted to reduce this mishap, the same developments have added to the hardships.
Electronic cards have become a part and parcel of our lives. Where ever we go we have to carry with us a dozen no: of cards for the various transactions that needs to be carried out. Debit cards, credit cards and ATM cards for financial transactions, identity cards for various legal and identity purposes, hall tickets and admit cards for examinations and other functions, driver's license for driving purposes, passports for immigration and emigration purposes and the list continues.
The tracking and locating system present today is weak to meet the high end requirements. Tracking frauds kidnaps, livestock monitoring etc needs a more efficient technological solution.
As a solution to all these aspects, a new technology named RFID has emerged .RFID stands for Radio Frequency Identification Devices.
RFID is an old inventory control technology that is quietly being deployed throughout business and industry to track everything from pets to people and products. This technology is helping optimize inventory and business systems and is making consumers' lives more convenient. RFID uses electronic tags for storing data and identifying items. RFID is a catchall term for a broad array of technologies that includes everything from battery-powered "active" tags, such as those used in highway toll booths, to "passive" RFID tags that measure a fraction of a millimeter in each dimension, not counting the antenna in the device.

The IMPLANTABLE CHIP OR RFID

The chip to be implanted resembles a glass pill; much the same size and shape as a vitamin capsule.The cyberpill contains three silicon chips and an electromagnetic coil to power them, which is activated by radiowaves from intelligent devices dotted about the cybernetics building. (An effect discovered by Michael Farraday many years ago.) The chip transmits a 64-bit signal.In the short term, it's a cost-saving device, a security tag and an ID card, all rolled into one innocuous-looking capsule.

What is RFID?

RFID tags are miniscule microchips, which some manufacturers have managed to shrink to half the size of a grain of sand. They listen for a radio query and respond by transmitting a unique ID code, typically a 64-bit identifier yielding about 18 thousand trillion possible values. Most RFID tags have no batteries. They use the power from the initial radio signal to transmit their response.
RFID uses wireless technology operating with the 50 kHz to 2.5Ghz frequency range. A RFID system consists of a RFID tag or transponder that contains data about the tagged item/object, and antenna, a RF transceiver to generate RF signals, and a RFID reader used for collecting RFID data, which it passes to a host system for processing. RFID does not require line-of-sight to operate for communications between a tagged object (which could be almost anything including a car, merchandise, package, etc.) and a reader (an electronic device used to capture the RFID signal).

How does RFID work?

An RFID system may consist of several components: tags, tag readers, tag programming stations, circulation readers, sorting equipment, and tag inventory wands. Security can be handled in two ways. Security gates can query the ILS (Integrated Logic System) to determine its security status or the tag may contain a security bit which would be turned on and off by circulation or self-check reader stations.
The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, color, date of purchase, etc. The use of RFID in tracking and access applications first appeared during the 1980s. RFID quickly gained attention because of its ability to track moving objects. As the technology is refined, more pervasive—and invasive—uses for RFID tags are in the works.In a typical RFID system, individual objects are equipped with a small, inexpensive tag. The tag contains a transponder with a digital memory chip that is given a unique electronic product code. The interrogator, an antenna packaged with a transceiver and decoder, emits a signal activating the RFID tag so it can read and write data to it. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing.
Take the example of books in a library. Security gates can detect whether or not a book has been properly checked out of the library. When users return items, the security bit is re-set and the item record in the ILS is automatically updated. In some RFID solutions a return receipt can be generated. At this point, materials can be roughly sorted into bins by the return equipment. Inventory wands provide a finer detail of sorting. This tool can be used to put books into shelf-ready order.

TYPES OF RFID

There are three types of RFID: high frequency (850-950 MHz and 2.4-5 GHz), intermediate frequency (10-15 MHz) and low frequency (100-500kHz). Low-frequency tags are used for applications such as security access and asset management, which require shorter read ranges. High-frequency systems are used for applications such as toll-collection and railroad car tracking, which require longer read ranges. While high-frequency tags transmit data faster and can be read from farther away, they also consume more power and are more expensive than low-frequency tags.

RFID tags can be either

1. Active
2. Passive.

ACTIVE TAGS

RFID tags, on the other hand, have an internal power source, and may have longer range and larger memories than passive tags, as well as the ability to store additional information sent by the transceiver. At present, the smallest active tags are about the size of a coin. Many active tags have practical ranges of tens of metres, and a battery life of up to several years.

PASSIVE TAGS

RFID tags have no internal power supply. The minute electrical current induced in the antenna by the incoming radio frequency signal provides just enough power for the tag to transmit a response. Due to limited power and cost, the response of a passive RFID tag is brief — typically just an ID number (GUID). Lack of an onboard power supply means that the device can be quite small: commercially available products exist that can be embedded under the skin. As of 2005, the smallest such devices commercially available measured 0.4 mm × 0.4 mm, which is thinner than a sheet of paper; such devices are practically invisible. Passive tags have practical read distances ranging from about 10 mm up to about 6 metres.

RFID vs. OTHER TECHNIQUES (Bar Codes)

While Universal Product Codes (UPC) used with bar coding systems have provided many benefits, EPC’s used with RFID systems are poised to provide increased efficiency and productivity by way of automatic identification and tracking.
Unlike bar code systems, which use a reader and code labels that are attached to the object, RFID uses an electronic tag on the reader to acquire a RF signal at a RFID reader. Information in transferred via optical signal with bar codes as apposed to RF signals with RFID.
Unlike bar codes, which need to be scanned manually and read individually (you have to actually see a bar code in order to read it), radio ID tags do not require line-of-sight for reading. Within the field of a wireless reading device, it is possible to automatically read hundreds of tags a second.
Bar codes and RFID tend to be used for different applications. The fact that RFID does not depend on line-of-sight, makes it particularly useful for applications, such as package management, in which the item must be handled many times. Being that standard bar codes typically only contain information about the manufacturer or originator of an item and basic information about the object itself, RFID is particularly useful for applications in which the item must be identified uniquely.