Professional Documents
Culture Documents
technology
Member: Ho Dac Vu
Nguyen Mai Truong
Nguyen Huu Thanh
Tran Hoang Loc
Group: 10
Presentation Outline
1. Introduction
2. Background
3. Proposals from partner companies
4. Method
5. Results
6. Conclusion
7. Recommendation
8. References
1. Introduction
Evaluating proposals from Bosch, Renesas,
eSilicon.
Introducing our method of evaluation to
select the suitable product.
Representing the most feasible solution for
our company.
2. Background
Vietcombank
building in Danang.
Present situation:
obsolete and unsafe
office doors.
Implementation of
secure and reliable
door locks. Figure 1. Vietcombank Building in Danang
3. Proposals from partner
companies.
Bosch: Fingerprint door lock
Renesas: RFID door lock with passive tag.
eSilicon: RFID door lock with active tag.
3.1 Basic explaination of RFID
technology.
Radio Frequency Identification.
A micro-chip in a label used to transmit
data when the label is exposed to radio
wave.
RFID Reader
Warning light
Connect to your
smartphone
immediately as
illegally intervened
Evaluating criteria:
Comparison in cost between 3 samples
Comparison in time periods of
maintenance between 3 samples.
Comparison in security between 3
samples.
Comparison in efficiency (reaction ability
to external impacts) between 3 samples.
5. Result
0 5 10 15 20 25 30 35 40 45 50 55
0
Maintenance Security Efficiency
Extensive maintaince
Inefficient
Acceptable products: Active RFID and Passive
RFID.
Affordable
Toll-free installation
Popular spare parts.
6. Conclusions
Regarding acceptable the two models:
Active RFID and Passive RFID
Active RFID technology meet superior
criteria:
Higher levels of security and efficiency.
Meeting cost criterion.
Ease of use.
7. Recommendation
Recommending purchasing Active RFID door
locks.
Ensuring the safety of our properties and
employees.
Investing in Active RFID door locks within our
budget (needing $4050 out of $5000)
Being total responsible for our judgement and
selection.
8. References
Avonie.net. (2013). RFID and Privacy Lounge. US: Brian Nutter.
Juho Partanen, Co-founder of Voyantic Ltd. (2015, 2). History of
RFID.
LibBest. (2015, 3 16). System Architecture. Retrieved from
http://www.rfid-library.com/flip/rfid_u500e/index.html
RFID journal. (2012, 3 16). Retrieved from
http://www.rfidjournal.com/articles
techit.net. (2015, 12 26). RFIDJournal.com. Retrieved from
http://www.rfidjournal.com/articles/view?1338
TX-co. (2009, 2 12). Arduino-RFID-Door-Lock. Retrieved 5 12, 2016,
from http://www.instructables.com/id/RFID-8/
Wang, Y. (2013). RFID privacy and Security. US: RSA Laboratoris.