Analysis of identification technologies and an automatic lock for school lockers

Size: px
Start display at page:

Download "Analysis of identification technologies and an automatic lock for school lockers"

Transcription

1 EUROPEAN JOURNAL FOR YOUNG SCIENTISTS AND ENGINEERS Analysis of identification technologies and an automatic lock for school lockers David Marn Abstract The main objective of the project was the improvement of identification systems in schools, and to find a solution to a specified problem with lockers. The goal has been reached by designing a new locker that is extremely easy to use and comes with an instant unlock mechanism. The designed locker is an improvement from the versions of locks that are currently used while still retaining the low price. The lock, designed for school lockers, is assembled using three modules: the access control module, electro-mechanical module and the power supply module. Because of the modular structure, it is possible to upgrade certain modules when better technologies become available, while leaving the other modules intact. If a lock would become defective for any reason, only the defective module would have to be replaced and the lock would function, which massively reduces the maintaining costs. The ibutton could become the universal identification medium in high schools, as examples of its usage includes: granting access to school s events as a ticket, ordering food in the school cafeteria, noting student s presence at lessons and finally, unlocking their lockers. The ibutton has the potential to be upgraded in the future, when more uses for it will be developed. 1 Introduction Many public high schools have very limited government funding and have to resort to low quality outdated technology. One example of this outdated technology are the school lockers, which affect the quality of the school in the students' eyes. That is why economically-efficient solutions were sought in this project. The main objective of the project is the improvement of identification systems in schools, and to find a solution to a specified problem with lockers. The criteria for the new locker includes the improvement of current locks with regard to simplicity, time consumtion and human factor. Another goal is to implement a new, universal identification technology, which will eventually replace all other mediums of identification, making our lives easier. 2 Outlining the problem Those students in Slovene high schools who even have lockers in their schools are mostly stuck with using combination locks. This technology is robust, but heavily outdated, as the first such lock was invented by Andrew Elliot Rae in Electronic school lockers do exist already, but they do not offer cost effectiveness nor can their key be integrated with other systems, such as ordering the food at school cafeteria, granting access to school s events or installing readers into classrooms, where it would take attendance. The current commercially available 27

2 MARN electronic locks more than double the cost of the locker itself 1. Thus, schools must resort to outdated combination locks. First, current lock systems have to be analyzed, their disadvantages and advantages recognized and the further development plan has to be drafted based on these findings. 2.1 Time efficiency The technology used in the combination lock is not aided by electronic components, which results in relatively high time consumption in unlocking the lock. According to an experiment, it takes always more than five seconds to unlock. In the experiment, various students were asked to open their locker and the required time was measured. Around 20 per cent of the sampled population entered the wrong combination on the first try, which points to the high level of human factor and the mistake added significantly to the result. It is true, on the other hand, that such high percentage may be due to other reasons, such as stress caused by the experiment. Even if we account for these errors, the human factor still exists in negligible amounts. My findings have shown that pupils need 7.8 seconds on average to unlock the locker at once. This means that the pupils who will unlock their locker 9 times a day (a realistic assumption based on the observation of the pupils, who generally unlock the locker between each break and upon entering and before leaving the school) will spend more than a minute of their time per day just for unlocking the locker. Furthermore, because different technologies (such as RFID) are used for different tasks in the same school, more ID tags are needed than necessary. With a unified system, only one ID tag would be necessary and the time needed for authorization would decrease. 2.2 Complexity The design of the combination lock is space friendly due to low security level. The combination, which unlocks the lock, usually consists of three numbers, but only the first two numbers are required in order to get the right combination (because of the spinning mechanism, which allows you to try all the possible digits sequentially). This renders the third number useless and strongly decreases the number of combinations needed for a brute-force attack. The second major weakness is that these locks are not secure due to the tolerance that allows you to unlock the lock if you were close enough (typically, 1 number on each side) to the correct number. A simple mathematical calculation can show that these weaknesses reduce the time required for a brute attack of the combination lock by 99.8% (The calculation is in the appendix) compared to the theoretical time required for a 60 digit lock. 1 According to SchoolLockers ( the price for an electronic lock is 61, whereas the price for the school locker (metal construction) is

3 ANALYSIS OF IDENTIFICATION TECHNOLOGIES AND AN AUTOMATIC LOCK FOR SCHOOL LOCKERS 2.3 Human factor It should not be forgotten that the students will be operating these locks, so the obvious human factor problem arises as they can miss the correct number and because of the cyclical unlocking mechanism, which is used by the combination lock, they have to start over and the resetting process for the mechanical lock lasts longer. The human factor is almost entirely eliminated when an electronically based lock is used as the human factor can only affects the process of reading the ID tag, which generally has to be scanned by a reader. 3 Criteria for the solution Once the problems were outlined, the criteria which the final prototype should fulfill could be defined further. These criteria will be used for an informed judgment when comparing the pros and cons of different technologies to find the best possible solution. The time consumption is a very important factor, as it represents the greatest improvement from the current combination lock. It is important to use electronic parts as that reduces the human factor, which in part enables the maximum time-efficiency. The time spent unlocking the lock is an essential part of the project, and as such it should be made quick as possible. The use of electronic components will be introduced as they offer almost instant identification and unlocking,and students will be able to spend more time in lessons or preparing for the lessons. The technical functions must remain intact while using large quantities of locking units and ID tags in a small area. Some technologies are known to cause interference with wireless communication. This limits the number of locks per unit volume. A scenario in which the same ID-tag would be near two readers could result in resistance of the tag to its proprietary reader. Therefore technologies based on wireless communication are best to be avoided as they do not offer the best possible cooperation. 4 Overview of available electric identification technologies The technologies that suit the criteria had to be identified, analyzed, tested if necessary, and the most suitable one had to be chosen. The information required for an informed judgment included the technology used, mass reproduction, energy consumption and cost efficiency. 4.1 ibutton The ibutton is a computer chip enclosed in a steel can manufactured by Maxim. The chip contains a unique id, which can be used for identification purposes. A wide variety of ibuttons exist, some contain sensors for measuring temperature, some contain microprocessors, but as these extra functions cost more, a basic ibutton 29

4 MARN should suffice for this project. The energy required for reading and writing is drawn from the reader/writer. The ibuttons itself as well as the readers are very affordable. 4.2 RFID Radio-frequency identification technology uses radio waves to exchange data between a reader and a tag. Unfortunately, such systems are designed for environments where only few readers are needed. The price of a single reader is too high to implement an individual reader for each lock. It is possible, on the other hand, to implement a reader for more lockers (such as a set of 20), but this would not satisfy the time criterion. 4.3 BAR code Bar code scanners emit optical rays of visible light to read the BAR tags that are segments of lines of various-width. Although the tags are very cheap, they are an unacceptable solution for schools because of the requirement of large amounts of scanners, and because the scanning angle, scanning speed and poor contrast affect the identification process. Also, the BAR code readers were not meant to be used in such a way so the final price is quite expensive making barcodes a popular choice only when the ratio between ID-tags and readers is high (such as in supermarkets). 4.4 Magnetic stripe The magnetic stripe has a relatively low data density of the magnetic tape, thus the cards are large and require a lot of plastic to hold the stripe in place. The cards are relatively cheap, but readers cost a lot. The magnetic stripe card could be unified for one s identification as a valid ID, credit card and in schools to unlock the lockers or to be used to order lunch in school cafeteria. Unfortunately, the price of the reader is too high for a single school locker and the magnetic stripes are vulnerable to magnetic fields, which are known to damage or delete data on the card. 4.5 Chip card The chip card is used where a high level of security is required, such as in SIM cards. Such cards are more expensive due to the manufacturing process, which in combination with the price of the reader makes it an uneconomical option. 5 Prototype design The prototype of the locker was segmented into three modules: access control module, which defines the identification process, the electro-mechanical part, which opens the locker once the identity has been confirmed, and the power supply of the locker. A single school locker consists of the access control module and the electromechanical part. A set of lockers consists of several single lockers, connected to a 30

5 ANALYSIS OF IDENTIFICATION TECHNOLOGIES AND AN AUTOMATIC LOCK FOR SCHOOL LOCKERS single power supply module. The whole locker infrastructure consists of several sets of lockers and a master ID tag, which unlocks every locker. 5.1 Access control module In this subchapter, some identification technologies will be compared in order to find the most suitable identification technology. A cross-comparison in table 1 has been constructed for a better overview of different technologies. The parameters are the use of electronic components (which results in the shortest possible time), the price of the ID tag as well as the price of the reader (wh ich influences the choice because of possible mass-production). Please note that the price of electromechanical module stays the same regardless of the identification technology used. The price is around 9 (see table 1). Table 1 Comparison of the prices of identification tehcnologies Identification technology RFID ibutton BAR code Magnetic Stripe Card Chip Card Combination lock Tag price No tag Reader price Total price The ibutton fulfills all the criteria and a probe ibutton reader will be installed into the locker. It will be connected with a circuit within the lock, which will control the mechanical module. Already existing circuits have been found via the Internet. They are a good base for further development and can be easily modified. Leonid Ridiko and Victor Lapitskiy have constructed a similar lock circuit, which has been selected as a base for the new circuit. The improvements to the existing lock circuit were necessary because the existing circuit is not cost effective. In the end, a new, improved version of the existing circuit will be created to drive the mechanical part of the lock. 5.2 Electro-mechanical module The second module of the locker forms the mechanical part of the locker. Granted access by the authorization module has to be converted into mechanical motion that opens the locker. 31

6 MARN First, the existing solution was analyzed. A strong pull of the combination lock in one direction pulls the deadbolt into the lock, thus allowing the students to open the locker. This indicates that a lot of kinetic energy is required for unlocking, which is not a valid solution when using electricity as the power source. Thus, a new design has to be found for the lockers. The electro-mechanical part has to be energy-efficient, yet offer secure locking. Because the door will be locked most of the time, the electro-mechanical module must consume zero electricity while it is locked and only a fraction compared to the existing solution while unlocking the lock. Because of the low energy consumption, more lockers can be connected to a single voltage transformer, thus reducing the costs. A solenoid is an example of the electro-mechanical part, but it would only unlock the door, not open it. In this case, a separate system must be installed to automatically detect that the door is unlocked and immediately open it. It is best to use kinetic energy whenever it will have no particular effect on the criteria of the lock. Of that, a spring is a good example. When a spring is installed into the locker, it will spring when the students close the door, preparing it for future use. The final decision on the unlocking mechanism was made according to the parameters regarding availability and low energy consumption. When the availability is good, shipping costs as well as the price of the product itself is low. The solenoid is a better option because it fulfills all the critearia. 5.3 Power supply module The existing circuit scheme by Ridiko and Lapitskiy already includes transformation from the main electricity voltage to the desired voltage of 14V. An array of batteries could be used, but they are not environmentally friendly from the ecological point of view. Also, it is not practical because the batteries have to be checked on regular basis. That is why a transformer from the main voltage will be used. To reduce the cost, a single transformer will be used for a set of lockers. 6 Prototype review When a student wants to open his or her locker, they have to form a contact between their key (in this case the ibutton) and the probe reader, which will be the only visible thing outside the locker. Then, the circuit within the locker will compare the ID from the tag with the ID stored in the memory module of the circuit. If they match, the circuit will unlock the locker. If a student has lost his or her key, the locker can be unlocked using a master key held by the school s caretaker or similar authority, and later reprogrammed for a new slave key. The access control module allows the usage of one master key, which authorizes programming mode and multiple slave keys that cannot program the lock. The programming of the circuit is very easy, as user-friendliness has to be taken into account. 32

7 ANALYSIS OF IDENTIFICATION TECHNOLOGIES AND AN AUTOMATIC LOCK FOR SCHOOL LOCKERS The lockers will be arranged in modules of x lockers, and each module will be powered by a separate voltage transformer. The number of lockers in a single module varies from school to school, as the place available and the maximum number of lockers, which could be powered by a single transformer, have to be taken into account. The scenario of a defect transformer or a general power failure must also be taken into consideration. In that case, the lockers will remain locked until the power is restored. Unfortunately, during the time of the failure, the lockers will not function. However, it is possible to restore the power using batteries. The complete pricing can be seen from table 2. Table 2 Prices of the parts of the prototype. Part Price Microprocessor 1,50 Transistors, resistors, diodes 2.00 LED display 2.00 Memory chip 0.50 ibutton 1.70 Solenoid 3.00 Spring 0.20 Total Conclusion The main objective of the project was to improve the identification systems in schools, and to find a solution to a specified problem with lockers. The goal has been reached as a new locker has been designed. The new locker design offers instant unlocking of the locker, and is extremely easy to use without the interference of the human factor. The new locker is an extensive improvement to the different locks that are currently used while still retaining the low price. The lock, designed to be used in school lockers, is assembled using three modules: the access control module, electro-mechanical module and the power supply module. Because of the modular structure, it is possible to upgrade certain modules when better technologies become available, while leaving the other modules intact. If a lock would become defective for any reason, only the defective module would have to be replaced and the lock would function, which massively reduces the maintaining costs. The ibutton could become the universal identification medium in high schools, as examples of its usage include: granting access to the school s events as a ticket, ordering food in the school cafeteria, noting student s presence at lessons and finally, unlocking their lockers. The ibutton has the potential to be upgraded in the future, when more usages for it will be developed. 33

To effectively manage and control a factory, we need information. How do we collect it?

To effectively manage and control a factory, we need information. How do we collect it? Auto-ID 321 Auto-ID Data-collection needs: What is our WIP? What is productivity or assignment of employees? What is utilization of machines? What is progress of orders? What is our inventory? What must

More information

SSPI-APPN OTES: PARALLEL C ONNECTIONS

SSPI-APPN OTES: PARALLEL C ONNECTIONS There are two distinct reasons to connect power supplies in parallel: Current Sharing and Redundancy. Combining of these reasons is common, and there are many ways to implement them. The unique considerations

More information

How Inventory Control Can Benefit Your Business

How Inventory Control Can Benefit Your Business How Inventory Control Can Benefit Your An ACCU-DART White Paper Some effects of inaccuracy can be quantified easily (e.g. the extra delivery costs for supplying when a shortage is discovered). Some are

More information

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings Are You Missing Out On Huge Savings through Better Asset Management? Many schools around the country have implemented wireless networking

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

fleischhauer tickets RFID

fleischhauer tickets RFID fleischhauer tickets RFID RFID solutions tailor-made Tickets for Public Transport Tickets in Motion RFID ticketing revolutionises access systems for mass transit facilities worldwide. Public transport

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

REUSABLE CONTAINER MANAGEMENT & TRACKING

REUSABLE CONTAINER MANAGEMENT & TRACKING REUSABLE CONTAINER MANAGEMENT & TRACKING Why And How To Evaluate An Asset Tracking Program An asset tracking program offers a number of advantages. From increased supply chain visibility to reduced transportation

More information

Asset ID and Tags - Basics

Asset ID and Tags - Basics S E Q U O I A C L U B Duissit vent volorper si endre erat White Paper A PRACTICAL GUIDE FOR TAGGING IT ASSETS Mobile Reach +1 919 336 2500 www.mobilereach.com splitware powered by 1 0 1 3 P a s s p o r

More information

GEARBOX MONITOR MODEL NR. 1.1203 USER MANUAL

GEARBOX MONITOR MODEL NR. 1.1203 USER MANUAL GEARBOX MONITOR MODEL NR. 1.1203 USER MANUAL USER SAFETY Before starting to drive with a mounted gearbox monitor you need to make sure that: the monitor does not limit field of vision of the driver; monitor

More information

A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation

A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation Introduction This document is an introduction to the principles and practice of barcode scanning as it relates to a manufacturing

More information

Best Practices in Mobilizing IT Asset Management

Best Practices in Mobilizing IT Asset Management make IT mobile White Paper Best Practices in Mobilizing IT Asset Management Executive Summary 1 Mobilizing IT Asset Management as a Process Improvement 2 Determining if RFID is Right for Your ITAM Environment

More information

Touch Screen Technology. Taking apart a tablet

Touch Screen Technology. Taking apart a tablet Touch Screen Technology Topics covered: 1) Resistance, Capacitance, Charge, Voltage, and Current 2) Introduction to simple circuits Taking apart a tablet For example, an ipad2 Touchscreen Motherboard Lots

More information

Solitaire Electronic Access Control Systems Access Control with a Magnetic Card

Solitaire Electronic Access Control Systems Access Control with a Magnetic Card Solitaire Electronic Access Control Systems Access Control with a Magnetic Card Discover the Latest in Kaba Technology Meet all your needs with the 5000 SERIES Information is available at www.e-plexlock.com,

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

Innovative Technology in Logistics

Innovative Technology in Logistics Innovative Technology in Logistics Pavla ŘEHOŘOVÁ Abstract In my contribution I deal with RFID technology (Radio Frequency IDentification). Automatization, and with that connected acceleration of production

More information

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,

More information

The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking

The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking By Bill Dussell Director, Integrated Products Trimble Navigation 15-December-2003 1997 2003, Trimble Navigation Limited.

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices

More information

Motherboard- based Servers versus ATCA- based Servers

Motherboard- based Servers versus ATCA- based Servers Motherboard- based Servers versus ATCA- based Servers Summary: A comparison of costs, features and applicability for telecom application hosting After many years of struggling for market acceptance, it

More information

Guardian Home Security System

Guardian Home Security System Guardian Home Security System Project Proposal Bryce Woodland Western Washington University Fall 2011 1 I. Summary The Guardian Home Security System is an integrated security solution designed to be used

More information

ACCESS CONTROL SOLUTIONS

ACCESS CONTROL SOLUTIONS ACCESS CONTROL SOLUTIONS ACCESS CONTROL If you need a high level of control over who is entering your building and want to know when people have entered, our state of the art electronic locking systems

More information

The Drug Quality & Security Act

The Drug Quality & Security Act The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply

More information

Efficient Asset Tracking: From Manual to Automated

Efficient Asset Tracking: From Manual to Automated White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies

More information

Digital Image Formation. Storage Technology

Digital Image Formation. Storage Technology Digital Image Formation Storage Technology Storage Technology Quiz Name one type of data storage?! Storage Technology Data Storage Device is a device for recording (storing) information (data).!! Recording

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control

More information

Lean Kitting: A Case Study

Lean Kitting: A Case Study Lean Kitting: A Case Study Ranko Vujosevic, Ph.D. Optimal Electronics Corporation Jose A. Ramirez, Larry Hausman-Cohen, and Srinivasan Venkataraman The University of Texas at Austin Department of Mechanical

More information

Voltage/current converter opamp circuits

Voltage/current converter opamp circuits Voltage/current converter opamp circuits This worksheet and all related files are licensed under the Creative Commons Attribution License, version 1.0. To view a copy of this license, visit http://creativecommons.org/licenses/by/1.0/,

More information

How 2D Scanning Can Benefit your Business

How 2D Scanning Can Benefit your Business How 2D Scanning Can Benefit your Business BarcodesInc www.barcodesinc.com 1.800.351.9962 What You'll Learn in this ebook 2D scanning vs. traditional laser scanning - what are the advantages? How 2D scanners

More information

The self-starting solar-powered Stirling engine

The self-starting solar-powered Stirling engine The self-starting solar-powered Stirling engine This project began at the request of an artist who had proposed a Stirling-engine-powered sculpture to a client. The engine only had to run, not really produce

More information

3 SOFTWARE AND PROGRAMMING LANGUAGES

3 SOFTWARE AND PROGRAMMING LANGUAGES 3 SOFTWARE AND PROGRAMMING LANGUAGES 3.1 INTRODUCTION In the previous lesson we discussed about the different parts and configurations of computer. It has been mentioned that programs or instructions have

More information

PROFESSIONAL HOME ALARM SYSTEM. Important! Please read these instructions carefully.

PROFESSIONAL HOME ALARM SYSTEM. Important! Please read these instructions carefully. WIRELESS AUTODIAL HOME ALARM SYSTEM AM2000 Instructions for use Important! Please read these instructions carefully. IMPORTANT 1 IDENTIFICATION PLEASE CONTACT BEFORE RETURNING THIS PRODUCT TO THE RETAILER

More information

Major Risks and Recommended Solutions

Major Risks and Recommended Solutions Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major

More information

Wires & Connections Component Circuit Symbol Function of Component. Power Supplies Component Circuit Symbol Function of Component

Wires & Connections Component Circuit Symbol Function of Component. Power Supplies Component Circuit Symbol Function of Component Lista Dei Simboli Dei Circuiti Per i Componenti Elettronici Wires & Connections Wire Wires joined Wires not joined To pass current very easily from one part of a circuit to another. A 'blob' should be

More information

4 LEAD DEDICATED SINGLE PHASE LIMA MAC GENERATOR MODELS 250MSL1185 AND 250MSL1152

4 LEAD DEDICATED SINGLE PHASE LIMA MAC GENERATOR MODELS 250MSL1185 AND 250MSL1152 4 LEAD DEDICATED SINGLE PHASE LIMA MAC GENERATOR MODELS 250MSL1185 AND 250MSL1152 SERVICE PROCEDURE ELECTRICAL COMPONENT TESTING HI POTENTIAL TETS None of the windings, either rotating or stationary should

More information

WHITE PAPER. ABCs of RFID

WHITE PAPER. ABCs of RFID WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,

More information

GSM ALARM SYSTEM GCM 8

GSM ALARM SYSTEM GCM 8 GSM ALARM SYSTEM GCM 8 GCM8 is a universal alarm system. It can be used as alarm system in vehicles, apartments, houses etc. Also GCM8 can be used for opening garage doors. GCM8 is designed to work with

More information

How To Power A Power Control On An Ip40 (Ipl) With A Power Supply (Iplug) With An Ip20 Controller (Iphones) With Power Control (Power Control) With No Antenna) With The Ip20 (Power)

How To Power A Power Control On An Ip40 (Ipl) With A Power Supply (Iplug) With An Ip20 Controller (Iphones) With Power Control (Power Control) With No Antenna) With The Ip20 (Power) MODEL NUMBER: ISC910-1-0-GB-XX ISC911-5-0-GB-XX IXP20 CONTROLLER SPECIFICATIONS Working Environment Plastic Housing... Power ImproX IXP20 Controller INSTALLATION MANUAL Designed to work in an indoor (dry)

More information

Enova X-Wall LX Frequently Asked Questions

Enova X-Wall LX Frequently Asked Questions Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,

More information

Tire pressure monitoring

Tire pressure monitoring Application Note AN601 Tire pressure monitoring 1 Purpose This document is intended to give hints on how to use the Intersema pressure sensors in a low cost tire pressure monitoring system (TPMS). 2 Introduction

More information

Subminiature Load Cell Model 8417

Subminiature Load Cell Model 8417 w Technical Product Information Subminiature Load Cell 1. Introduction... 2 2. Preparing for use... 2 2.1 Unpacking... 2 2.2 Using the instrument for the first time... 2 2.3 Grounding and potential connection...

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

What is a Smart Card?

What is a Smart Card? An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types

More information

White Paper. The Checklist

White Paper. The Checklist We have built a lot of business software over the years. This has required us to get under the hood of our customers and learn about the inner workings of their business. We ve worked for companies in

More information

White Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now

White Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now Invensys is now White Paper Wonderware Mobile Solutions RFID Technology Author: Don Frieden, VP Mobile Solutions, Invensys What s Inside: 1. Radio Frequency Identification (RFID) 2. The Wonderware Tracking

More information

Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003)

Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003) CN2HK LIMITED Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003) User Manual Please read this manual before operating this product. After you finish reading this manual,

More information

PUF Physical Unclonable Functions

PUF Physical Unclonable Functions Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication

More information

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker

More information

AD-Series. Selection Guide

AD-Series. Selection Guide AD-Series Selection Guide The first step in our design process: Listening. We wanted to know exactly what you needed in a security solution. So we asked. We asked hundreds of questions and received thousands

More information

Distributed versus centralized power backup strategies

Distributed versus centralized power backup strategies Distributed versus centralized power backup strategies Choosing the right UPS deployment architecture for your data center By Ed Spears Product Manager, Eaton Power Quality Solutions Operation Eaton Corporation

More information

WHITE PAPER Server Innovations: Examining DC Power as an Alternative for Increasing Data Center Efficiency and Reliability

WHITE PAPER Server Innovations: Examining DC Power as an Alternative for Increasing Data Center Efficiency and Reliability Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Server Innovations: Examining DC Power as an Alternative for Increasing Data Center Efficiency

More information

Can RFID Tags Work Inside Metal?

Can RFID Tags Work Inside Metal? Can RFID Tags Work Inside Metal? If you build it, they will come Inventory management takes time. This costs companies money, both directly in labor costs and indirectly by interrupting normal operations.

More information

13.10: How Series and Parallel Circuits Differ pg. 571

13.10: How Series and Parallel Circuits Differ pg. 571 13.10: How Series and Parallel Circuits Differ pg. 571 Key Concepts: 5. Connecting loads in series and parallel affects the current, potential difference, and total resistance. - Using your knowledge of

More information

BCST-20 Barcode Scanner. Instruction Manual. www.inateck.com

BCST-20 Barcode Scanner. Instruction Manual. www.inateck.com BCST-20 Barcode Scanner Instruction Manual www.inateck.com IMPORTANT NOTICE Safety Precaution * DO NOT disassemble the scanner, or place foreign matter into the scanner causing a short circuit or circuit

More information

Active RFID Solutions for Asset Tracking and Inventory Management

Active RFID Solutions for Asset Tracking and Inventory Management Active RFID Solutions for Asset Tracking and Inventory Management Introduction RFID (Radio Frequency Identification) technology is fast replacing ScanCode technology for asset tracking and inventory management.

More information

Copyright 2005 Digital Enterprise Research Institute. The DERI Studio. All rights reserved.

Copyright 2005 Digital Enterprise Research Institute. The DERI Studio. All rights reserved. Trade-off: Specialization Gains vs. Cost of Coordination Business Information Systems Unit 4 Input and Output Devices: RFID Further increase in specialization is limited by level of transaction costs (cost

More information

Alliance System Ordering Guide

Alliance System Ordering Guide Alliance System Ordering Guide Multiple Technologies Versatile Hardware Powerful Software One family of parts and accessories Version 12-Nov-03 Alliance System Ordering Guide Table of Contents Controllers

More information

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security

More information

Warehouse Management System

Warehouse Management System Warehouse Management System Solvo's WMS is an application suite designed to optimize warehouse operations. Solvo's solutions manage the entire warehouse operation cycle in a real time mode. The System

More information

Energy Harvesting Powered Wireless Sensor Node and Asset Tracking Solutions in Random Vibration Environments

Energy Harvesting Powered Wireless Sensor Node and Asset Tracking Solutions in Random Vibration Environments White Paper Energy Harvesting Powered Wireless Sensor Node and Asset Tracking Solutions in Random Vibration Environments by Anurag Kasyap, Ph.D. April 2009 Copyright 2009 AdaptivEnergy LLC. All rights

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

Eðlisfræði 2, vor 2007

Eðlisfræði 2, vor 2007 [ Assignment View ] [ Print ] Eðlisfræði 2, vor 2007 30. Inductance Assignment is due at 2:00am on Wednesday, March 14, 2007 Credit for problems submitted late will decrease to 0% after the deadline has

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

Slide 1 / 26. Inductance. 2011 by Bryan Pflueger

Slide 1 / 26. Inductance. 2011 by Bryan Pflueger Slide 1 / 26 Inductance 2011 by Bryan Pflueger Slide 2 / 26 Mutual Inductance If two coils of wire are placed near each other and have a current passing through them, they will each induce an emf on one

More information

Hello and welcome to this training module for the STM32L4 Liquid Crystal Display (LCD) controller. This controller can be used in a wide range of

Hello and welcome to this training module for the STM32L4 Liquid Crystal Display (LCD) controller. This controller can be used in a wide range of Hello and welcome to this training module for the STM32L4 Liquid Crystal Display (LCD) controller. This controller can be used in a wide range of applications such as home appliances, medical, automotive,

More information

HOTEL INFORMATION SYSTEMS. Chapter 6

HOTEL INFORMATION SYSTEMS. Chapter 6 HOTEL INFORMATION SYSTEMS Chapter 6 "The good news is that the PMS market has seldom seen such a variety of different approaches to solving your property's automation needs. Jon Inge, Hotel Systems Consultant

More information

Electronics course for in-service teachers of engineering and technology

Electronics course for in-service teachers of engineering and technology World Transactions on Engineering and Technology Education Vol.10, No.1, 2012 2012 WIETE Electronics course for in-service teachers of engineering and technology Gorazd Šantej & Slavko Kocijancic University

More information

Wireless power meter monitoring with power theft detection and intimation system using GSM and Zigbee networks

Wireless power meter monitoring with power theft detection and intimation system using GSM and Zigbee networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 6, Ver. I (Nov - Dec. 2014), PP 04-08 Wireless power meter monitoring with power

More information

Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify

More information

Project Plan. Project Plan. May13-06. Logging DC Wattmeter. Team Member: Advisor : Ailing Mei. Collin Christy. Andrew Kom. Client: Chongli Cai

Project Plan. Project Plan. May13-06. Logging DC Wattmeter. Team Member: Advisor : Ailing Mei. Collin Christy. Andrew Kom. Client: Chongli Cai Project Plan May13-06 Logging DC Wattmeter Team Member: Ailing Mei Andrew Kom Chongli Cai Advisor : Collin Christy Client: Garmin International David Hoffman Qiaoya Cui Table of Contents Need Statement...

More information

Data Capture Solutions for Manufacturing Applications

Data Capture Solutions for Manufacturing Applications Manufacturing Data Capture Solutions for Manufacturing Applications Create a Non-Stop Production Line and Cost-Effective Solutions for Manufacturing The growing complexity of manufacturing requires an

More information

Automated Identification Technologies

Automated Identification Technologies Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT

More information

Mini Portable Reader (MPR) Model HS 5900L F

Mini Portable Reader (MPR) Model HS 5900L F Mini Portable Reader (MPR) Model HS 5900L F TABLE OF CONTENTS Chapter 1: Mini Portable Reader (MPR) Basics 1 1.1 Preparing for Operation 1 1.2 Installing/Changing Batteries 1 1.3 Scanning with the Mini

More information

Welcome to My E-Book

Welcome to My E-Book Welcome to My E-Book I decided to write this e-book as a response to the many questions that I get from business owners about data backup solutions. I have seen first-hand that business owners are very

More information

Practice final for Basic Physics spring 2005 answers on the last page Name: Date:

Practice final for Basic Physics spring 2005 answers on the last page Name: Date: Practice final for Basic Physics spring 2005 answers on the last page Name: Date: 1. A 12 ohm resistor and a 24 ohm resistor are connected in series in a circuit with a 6.0 volt battery. Assuming negligible

More information

Technical White Paper. Symantec Backup Exec 10d System Sizing. Best Practices For Optimizing Performance of the Continuous Protection Server

Technical White Paper. Symantec Backup Exec 10d System Sizing. Best Practices For Optimizing Performance of the Continuous Protection Server Symantec Backup Exec 10d System Sizing Best Practices For Optimizing Performance of the Continuous Protection Server Table of Contents Table of Contents...2 Executive Summary...3 System Sizing and Performance

More information

SMARTair TM. It s time to change!

SMARTair TM. It s time to change! SMARTair TM » Changing to SMARTair was the best decision I made, it makes my job so much easier. «Facilities Manager Sometimes the best solution is also the simplest Why is SMARTair the best choice? Easy

More information

VEHICLE THEFT/SECURITY SYSTEM

VEHICLE THEFT/SECURITY SYSTEM PL VEHICLE THEFT/SECURITY SYSTEM 8Q - 1 VEHICLE THEFT/SECURITY SYSTEM TABLE OF CONTENTS page DESCRIPTION AND OPERATION INTRODUCTION...1 VEHICLE THEFT/SECURITY SYSTEM (VTSS)... 1 (SKIS)... 2 SENTRY KEY

More information

Remote Monitoring of Livestock Wireless and the Wii Improving Livestock Welfare

Remote Monitoring of Livestock Wireless and the Wii Improving Livestock Welfare Remote Monitoring of Livestock Wireless and the Wii Improving Livestock Welfare Ian McCauley Greg Cronin Michelle Watt Samantha Borg Future Farming Systems Research, DPI Vic Outline Wireless Technologies

More information

Radio Frequency Identification (RFID) An Overview

Radio Frequency Identification (RFID) An Overview Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify

More information

PhoneWatch Smart Security System User Manual - Domonial

PhoneWatch Smart Security System User Manual - Domonial PW0002 10/13 Customer Support: 1850 753 753 PhoneWatch Ltd., Unit 3/4, Sandyford Park, Burton Hall Rd, Sandyford Industrial Estate, Dublin 18. Email: info@phonewatch.ie PhoneWatch Smart Security System

More information

IT Asset Management enterprise visibility

IT Asset Management enterprise visibility An Executive White Paper IT Asset Management enterprise visibility Contents The Challenge... 2 Business Goals of ITAM... 3 ITAM Capability Maturity Model... 4 Stage 1: No Process in Place... 5 Stage 2:

More information

GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM.

GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. Introduction: The Proposed design is cost-effective, reliable and has the function of accurate tracking. When large object or vehicles were spread out

More information

EDI Distributor Control Interface Wiring and Setup Instructions

EDI Distributor Control Interface Wiring and Setup Instructions Universal I/O EDI Distributor Control Interface Wiring and Setup Instructions EDI UNIVERSAL I/O INTERFACE MODULE The only interface needed for EDI-V5 controls Network compatible with all older EDI controls

More information

Wireless in the Data Centre becomes best practice!

Wireless in the Data Centre becomes best practice! Wireless in the Data Centre becomes best practice! Mobile computing has made wireless networking essential almost everywhere. Until recently the Data Centre was excluded from this advance but this is now

More information

Using Ohm s Law to Build a Voltage Divider

Using Ohm s Law to Build a Voltage Divider Using Ohm s Law to Build a Voltage Provided by TryEngineering - Lesson Focus Students will design, build, and characterize one of the basic circuits of electrical engineering, the voltage divider. These

More information

Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel

Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel Strengths and Weaknesses of Access Control Systems Eric Schmiedl and Mike Spindel Choosing a System Error rate Environment Cost Physical Vulnerability Additional Constraints Error Rate False Reject Rate

More information

CHAPTER 1 Introduction 1

CHAPTER 1 Introduction 1 Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation

More information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved

More information

New Energy Lab. Experiment Guide. New Energy Lab - Experiment Guide 1

New Energy Lab. Experiment Guide. New Energy Lab - Experiment Guide 1 New Energy Lab Experiment Guide New Energy Lab - Experiment Guide 1 NEW ENERGY LAB Experiment Guide Version 1.5 August 2013 Heliocentris Academia GmbH Rudower Chaussee 29 12489 Berlin Germany All rights

More information

Quantity/potential-related elementary concepts in primary school teacher education

Quantity/potential-related elementary concepts in primary school teacher education Quantity/potential-related elementary concepts in primary school teacher education Federico Corni, Enrico Giliberti, Cristina Mariani Faculty of Education, University of Modena and Reggio Emilia, Italy

More information

Typical ECM/PCM Inputs

Typical ECM/PCM Inputs Typical ECM/PCM Inputs The computer system components fall into two categories: sensors (inputs) and controlled components (outputs). Each system has sensors. Not every system has all the ones listed,

More information

entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200

entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200 entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200 Understanding RFID and Barcode Differences Don t misuse RFID with applications built for Barcodes Radio Frequency

More information

Final Design Report 19 April 2011. Project Name: utouch

Final Design Report 19 April 2011. Project Name: utouch EEL 4924 Electrical Engineering Design (Senior Design) Final Design Report 19 April 2011 Project Name: utouch Team Members: Name: Issam Bouter Name: Constantine Metropulos Email: sambouter@gmail.com Email:

More information

Semester 2. Final Exam Review

Semester 2. Final Exam Review Semester 2 Final Exam Review Motion and Force Vocab Motion object changes position relative to a reference point. Speed distance traveled in a period of time. Velocity speed in a direction. Acceleration

More information

UNIVERSITY OF SASKATCHEWAN Department of Physics and Engineering Physics

UNIVERSITY OF SASKATCHEWAN Department of Physics and Engineering Physics UNIVERSITY OF SASKATCHEWAN Department of Physics and Engineering Physics Physics 111.6 MIDTERM TEST #4 March 15, 2007 Time: 90 minutes NAME: (Last) Please Print (Given) STUDENT NO.: LECTURE SECTION (please

More information