Free Essay

Rfid Railway Reservation System

In:

Submitted By rana4568
Words 5315
Pages 22
RFID Based Railway Reservation
System.
SUBMITTED BY: RANA DEBNATH.
REGISTRATION NO: 11504051

ROLL: RD1507A21, SECTION: D1507

SUBMITTED TO: Dr. ANITA KUMARI.

RFID Based Railway Reservation System.
ABSTRACT :
In the New era of technology all system has to be updated, Indian Railway is the 2nd largest Rail
Network in India it is the backbone of public and goods transport in India. Bulk of long distance traffic is carried by the Indian Railway. RFID system at many transport system so we think to implement biometrics in our research and then decided to use fingerprint module also for the add-on for user flexibility using GSM module for Communication purpose of sending and receiving message. In our Project Research we are trying to minimize railway Reservation Fraud and give more facility to traveler and improve society. Also simplify the
Reservation System in that we will take fingerprint of the person who goes for reservation/ticket booking and help a lot humanitarian by this innovative technology. Standalone module which contains Finger Print Module verify the person's identity. Using GSM before the journey message will be send to the user with information.
At time of journey Ticket checker will verify fingerprint with previously stored data using standalone module as a part of verification. By this more number of paper will be saved by that can help Railway in increasing their income by saving cost of paper. No need to carry identity proof. Due to this complicated and bulky reservation and transport system can be corrected.
INTRODUCTION:
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called
RFID tags or transponders. The technology requires some extent of cooperation of an RFID reader and an RFID tag. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves.
Some tags can be read from several meters away and beyond the line of sight of the reader. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. CONTENTS:
1. Abstract
2. Introduction to RFID.
3. Hardware Description.
4. Circuit diagram.
5. Applications.
6.Conclusion.
7.References.
WHAT IS RFID?

A basic RFID system consists of three components:
a)Antenna
b)Transceiver(decoder)
c)A transponder(RFtag)Electronically programmed with unique information. There are many different types of RFID systems out in the market. They are categorized according to there frequency ranges.
Some of the most commonly used RFID kits are as follows: 1) Low-frequency (30 KHz to 500 KHz)
2) Mid-Frequency (900KHz to 1500MHz)
3) High Frequency (2.4GHz to 2.5GHz).
These frequency ranges mostly tell the RF ranges of the tags from low frequency tag ranging from
3m to 5m, mid-frequency ranging from 5m to 17m and high frequency ranging from 5ft to 90ft. The cost of the system is based according to there ranges with low-frequency system ranging from a few hundred dollars to a high-frequency system ranging somewhere near 5000 dollars.
COMPONENTS OF RFID: A basic RFID system consist of three components thare is:
•Antenna
•Transceiver(decoder)
•A transponder (RF tag) electronically programmed with uniquein formation.These are described below: 1.ANTENNA:
The antenna emits radio signals to activate the tag and read and write data to it. They are the conduits between the tag and the transceiver, which controls the system's data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built into a door frame to receive tag data from persons or things passing through the door, or mounted on an interstate tollbooth to monitor traffic passing by on a freeway. The

electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continually. If constant interrogation is not required, asensor device can activate the field.
Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a. interrogator), which can be configured either as a handheld or a fixed-mount device. The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an
RFID tag passes through the electromagnetic zone, it detects the reader's activation signal.
The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing.

the tag manufacturer or distributor. These are generally the least expensive tags because they cannot have any additional information included as they move throughout the supply chain. Any updates to that information would have to be maintained in the application software that tracks
SKU movement and activity. (2) "Write once" tags enable a user to write data to the tag one time in production or distribution processes. Again, this may include a serial number, but perhaps other data such as a lot or batch number. (3) Full "read-write" tags allow new data to be written to the tag as needed—and even written over the original data.
Examples for the latter capability might include the time and date of ownership transfer or updating the repair history of a fixed asset. While these are the most costly of the three tag types and are not practical for tracking inexpensive items, future standards for electronic product codes (EPC) appear to be headed in this direction.

2.TAGS(Transponders):
An RFID tag is comprised of a microchip containing identifying information and an antenna that transmits this data wirelessly to a reader. At its most basic, the chip will contain a serialized identifier, or license plate number, that uniquely identifies that item, similar to the way many bar codes are used today. A key difference, however is that RFID tags have a higher data capacity than their bar code counterparts. This increases the options for the type of information that can be encoded on the tag, including the manufacturer, batch or lot number, weight, ownership, destination and history (such as the temperature range to which an item has been exposed). In fact, an unlimited list of other types of information can be stored on RFID tags, depending on application needs. An RFID tag can be placed on individual items, cases or pallets for identification purposes, as well as on fixed assets such as trailers, containers, totes, etc.
Tags come in a variety of types, with a variety of capabilities. Key variables include: "Read-only" versus "read-write" There are three options in terms of how data can be encoded on tags: (1)
Read-only tags contain data such as a serialized tracking number, which is pre-written onto them by

DATA CAPACITY:
The amount of data storage on a tag can vary, as ranging from 16 bits on the low end to as much several thousand bits on the high end. Of course, the greater the storage capacity, the higher the price per tag.
FORMFACTOR:
The tag and antenna structure can come in a variety of physical form factors and can either be selfcontained or embedded as part of a traditional label structure (i.e., the tag is inside what looks like a regular bar code label—this is termed a 'Smart
Label') companies must choose the appropriate form factors for the tag very carefully and should expect to use multiple form factors to suit the tagging needs of different physical products and units of measure. For example, a pallet may have an RFID tag fitted only to an area of protected

placement on the pallet itself. On the other hand, cartons on the pallet have RFID tags inside bar code labels that also provide operators humanreadable information and a back-up should the tag fail or pass through non RFID-capable supply chain links. PASSIVE VERSUS ACTIVE:
“Passive” tags have no battery and "broadcast" their data only when energized by a reader. That means they must be actively polled to send information. "Active" tags are capable of broadcasting their data using their own battery power. In general, this means that the read ranges are much greater for active tags than they are for passive tags— perhaps a read range of 100 feet or more, versus 15 feet or less for most passive tags.
The extra capability and read ranges of active tags, how ever,come with a cost; they are several times more expensive than passive tags. Today, active tags are much more likely to be used for high-value items or fixed assets such as trailers, where the cost is minimal compared to item value, and very long read ranges are required. Most traditional supply chain applications, such as the RFID-based tracking and compliance programs emerging in the consumer goods retail chain, will use the less expensive passive tags.
FREQUENCIES:
Like all wireless communications, there are a variety of frequencies or spectra through which
RFID tags can communicate with readers. Again, there are trade-offs among cost, performance and application requirements. For instance, lowfrequency tags are cheaper than ultra highfrequency (UHF) tags, use less power and are better able to penetrate nonmetallic substances.
They are ideal for scanning objects with high water content,such as fruit, at close range. UHF frequencies typically offer better range and can transfer data faster. But they use more power and are less likely to pass through some materials. UHF tags are typically best suited for use with or near wood, paper, cardboard or clothing products.
Compared to low-frequency tags, UHF tags might be better for scanning boxes of goods as they pass through a bay door into a warehouse. While the tag requirements for compliance mandates may be narrowly defined, it is likely that a variety of tag types will be required to solve specific operational issues. You will want to work with a company that

is very knowledgeable in tag and reader technology to appropriately identify the right mix of RFID technology for your environment and applications.
EPCTags:
EPC refers to "electronic product code," an emerging specification for RFID tags, readers and business applications first developed at the Auto-ID
Center
at the Massachusetts
Institute of Technology. This organization has provided significant intellectual leadership toward the use and application of RFID technology. EPC represents a specific approach to item identification, including an emerging standard for the tags themselves, including both the data content of the tag and open wireless communication protocols. In a sense, the EPC movement is combining the data standards embodied in certain bar code specifications, such as the UPC or UCC128 bar code standards, with the wireless data communication standards that have been developed by ANSI and other groups.
RFTRANSCEIVER:
The RF transceiver is the source of the RF energy used to activate and power the passive RFID tags.
The RF transceiver may be enclosed in the same cabinet as the reader or it may be a separate piece of equipment. When provided as a separate piece of equipment, the transceiver is commonly referred to as an RF module. The RF transceiver controls and modulates the radio frequencies that the antenna transmits and receives. The transceiver filters and amplifies the backscatter signal from a passive
RFIDtag.
TYPICAL APPLICATIONS fOR RFID:
•Automatic-Vehicle-identification
•Inventory-Management
•Work-in-Process
•Container/Management
•Document/tracking
•Monitoring
THE ADVANTAGES OF RFID OVER BAR
CODING:
No "line of sight" requirements: Bar code reads can sometimes be limited or problematic due to the need to have a direct "line of sight" between a scanner and a bar code. RFID tags can be read through materials without line of sight. More automated reading: RFID tags can be read automatically when a tagged product comes past or near a reader, reducing the labor required to scan product and allowing more proactive, real-time

tracking. Improved read rates: RFID tags ultimately offer the promise of higher read rates than bar codes, especially in high-speed operations such as carton sortation. Greater data capacity: RFID tags can be easily encoded with item details such as lot and batch, weight, etc. "Write" capabilities:
Because RFID tags can be rewritten with new data as supply chain activities are completed, tagged products carry updated information as they move throughout the supply chain
.
SOME COMMON PROBLEMS WITH RFID:
Some common problems with RFID are reader collision and tag collision. Reader collision occurs when the signals from two or more readers overlap.
The tag is unable to respond to simultaneous queries. Systems must be carefully set up to avoid this problem. Tag collision occurs when many tags are present in a small area; but since the read time is very fast, it is easier for vendors to develop systems that ensure that tags respond one at a time.
See Problems with RFID for more details.

TRANSFORMER:
A transformer is a device that transfers electrical energy from one circuit to another through inductively coupled conductors—the transformer's coils or "windings".Except forair- the conductors are commonly wound around a single iron-rich core, or around separate but magnetically-coupled cores. A varying current in the first or "primary" winding creates a varying magnetic field in the core
(or cores) of the transformer. This varying magnetic field induces a varying electromotive force (EMF) or "voltage" in the "secondary" winding. This effect is called mutual induction.

HARDWARE DESCRIPTION

If a load is connected to the secondary circuit, electric charge will flow in the secondary winding of the transformer and transfer energy from the primary circuit to theload in the secondary circuit.
The secondary induced voltage VS, of an ideal transformer, is scaled from the primary VP by a factor equal to the ratio of the number of turns of wire in their respective windings:

POWERSUPPLY:
Power supply is a reference to a source of electrical power. A device or system that supplies electrical or other types of energy to an output load or group of loads iscalled a power supply unit or
PSU. The term is most commonly applied to electrical energy supplies, less often to mechanical ones, and rarely to others. Here in our application we need a 5v DC power supply for all electronics involved in the project. This requires step down transformer, rectifier, voltage regulator, and filter circuit for generation of 5v DC power. Here a brief description of all the components are given as follows: By appropriate selection of the numbers of turns, a transformer thus allows an alternating voltage to be stepped up — by making NS more than NP — or stepped down, by making it
BASIC PARTS OF A TRANSFORMER
In its most basic form a transformer consists of:
•A primary coilor winding.
•A secondary coil or winding.
•A core that supports the coils or windings.
Refer to the transformer circuit in figure as you read the following explanation: Theprimary winding is connected to a 60-hertz ac voltage

source. The magnetic field (flux) builds up (expands) and collapses (contracts) about the primary winding. The expanding and contracting magnetic field around the primary winding cuts the secondary winding and induces an alternating voltage into the winding.
This voltage causes alternating current to flow through the load. The voltage may be stepped up or down depending on the design of the primary and secondary windings.

THE COMPONENTS OF A TRANSFORMER:
Two coils of wire (called windings) are wound on some type of core material. In some cases the coils of wire are wound on a cylindrical or rectangular cardboard form. In effect, the core material is air and the transformer is called an AIR-CORE
TRANSFORMER. Transformers used at low frequencies, such as 60 hertz and 400 hertz, require a core of low-reluctance magnetic material, usually iron. This type of transformer is called an IRONCORE
TRANSFORMER.
Most power transformers are of the iron core type. The principle parts of a transformer and their functions are:
• The CORE, which provides a path for the magnetic line sofflux.
• The PRIMARY WINDING, which receives energy from the ac source.
• The SECONDARY WINDING, which receives energy from the primary winding and deliver it to the load.

• The ENCLOSURE, which protects the above components from dirt, moisture, and mechanical damage. BRIDGE RECTIFIER:
A bridge rectifier makes use of four diodes in a bridge arrangement to achieve full-wave rectification. This is a widely used configuration,

both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally.
BASIC OPERATION:
According to the conventional model of current flow originally established by Benjamin Franklin and still followed by most engineers today, current is assumed to flow through electrical conductors from the positive to the negative pole. In actuality, free electrons in a conductor nearly always flow from the negative to the positive pole. In the vast majority of applications, however, the actual direction of current flow is irrelevant. Therefore, in the discussion below the conventional model is retained. In the diagrams below, when the input connected to the left corner of the diamond is positive, and the input connected to the right corner is negative, current flows from the upper supply terminal to the right along the red (positive) path to the output, and returns to the lower supply terminal via the blue (negative) path.

When the input connected to the left corner is negative, and the input connected to the right corner is positive, current flows from the lower supply terminal to the right along the red path to the output, and returns to the upper supply terminal via the blue path.

In each case, the upper right output remains positive and lower right output negative. Since this is true whether the input is AC or DC, this circuit not only produces a DC output from an AC input, it can also provide what is sometimes called "reverse polarity protection". That is, it permits normal functioning of DC-powered equipment when batteries have been installed backwards, or when the leads (wires) from a DC power source have been reversed, and protects the equipment from

potential damage caused by reverse polarity. Prior to availability of integrated electronics, such a bridge rectifier was always constructed from discrete components. Since about 1 950, a single four-terminal component containing the four diodes connected in the bridge configuration became a standard commercial component and is now available with various voltage and current ratings.
OUTPUT SMOOTHING
For many applications, especially with single phase
AC where the full-wave bridge serves to convert an
AC input into a DC output, the addition of a capacity or maybe desired because the bridge alone supplies an output of fixed polarity but continuously varying or "pulsating" magnitude (see diagram above).

The function of this capacitor, known as a reservoir capacitor (or smoothing capacitor) is to lessen the variation in (or 'smooth') the rectified AC output voltage waveform from the bridge. One explanation of 'smoothing' is that the capacitor provides a low impedance path to the AC component of the output, reducing the AC voltage across, and AC current through, the resistive load.
In less technical terms, any drop in the output voltage and current of the bridge tends to be canceled by loss of charge in the capacitor. This charge flows out as additional current through the load. Thus the change of load current and voltage is reduced relative to what would occur without the capacitor Increases of voltage correspondingly store excess charge in the capacitor, thus moderating the change in output voltage / current.
The simplified circuit shown has a well-deserved reputation for being dangerous, because, in some applications, the capacitor can retain a lethal charge after the AC power source is removed. If supplying a dangerous voltage, a practical circuit should include a reliable way to safely discharge the capacitor. If the normal load cannot be guaranteed to perform this function, perhaps because it can be disconnected, the circuit should include a bleeder resistor connected as close as practical across the capacitor. This resistor should consume a current

large enough to discharge the capacitor in a reasonable time, but small enough to minimize unnecessary power waste. Because a bleeder sets a minimum current drain, the regulation of the circuit, defined as percentage voltage change from minimum to maximum load, is improved. However in many cases the improvement is of insignificant magnitude. The capacitor and the load resistance have a typical time constant τ = RC where C and R are the capacitance and load resistance respectively.
As long as the load resistor is large enough so that this time constant is much longer than the time of one ripple cycle, the above configuration will produce a smoothed DC voltage across the load. In some designs, a series resistor at the load side of the capacitor is added. The smoothing can then be improved by adding additional stages of capacitor– resistor pairs, often done only for sub-supplies to critical high-gain circuits that tend to be sensitive to supply voltage noise. The idealized waveforms shown above are seen for both voltage and current when the load on the bridge is resistive. When the load includes a smoothing capacitor, both the voltage and the current waveforms will be greatly changed. While the voltage is smoothed, as described above, current will flow through the bridge only during the time when the input voltage is greater than the capacitor voltage. For example, if the load draws an average current of n Amps, and the diodes conduct for 10% of the time, the average diode current during conduction must be 10n
Amps. This non-sinusoidal current leads to harmonic distortion and a poor power factor in the
AC supply. In a practical circuit, when a capacitor is directly connected to the output of a bridge, the bridge diodes must be sized to withstand the current surge that occurs when the power is turned on at the peak of the AC voltage and the capacitor is fully discharged. Sometimes a small series resistor is included before the capacitor to limit this current, though in most applications the power supply transformer's resistance is already sufficient. Output can also be smoothed using a choke and second capacitor. The choke tends to keep the current (rather than the voltage) more constant. Due to the relatively high cost of an effective choke compared to a resistor and capacitor this is not employed in modern equipment. Some early console radios created the speaker's constant field with the current from the high voltage ("B +") power supply, which was then routed to the consuming circuits, (permanent

magnets were then too weak for good performance) to create the speaker's constant magnetic field. The speaker field coil thus performed 2 jobs in one: it acted as a choke, filtering the power supply, and it produced the magnetic field to operate the speaker.
REGULATOR IC (78XX)
It is a three pin IC used as a voltage regulator. It converts unregulated DC current into regulated DC current. Normally we get fixed output by connecting the voltage regulator at the output of the filtered DC
(see in above diagram). It can also be used in circuits to get a low DC voltage from a high DC voltage (for example we use 7805 to get 5V from
12V). There are two types of voltage regulators 1. fixed voltage regulators (78xx, 79xx) 2. variable voltage regulators (LM317) In fixed voltage regulators there is another classification 1. +ve voltage regulators 2. -ve voltage regulators
POSITIVE VOLTAGE REGULATORS This include 78xx voltage regulators. The most commonly used ones are 7805 and 7812. 7805 gives fixed 5V DC voltage if input voltage is in
(7.5V, 20V).
The CAPACITOR FILTER:

When this filter is used, the RC charge time of the filter capacitor (C1) must be short and the RC discharge time must be long to eliminate ripple action. In other words, the capacitor must charge up fast, preferably with no discharge at all. Better filtering also results when the input frequency is high; therefore, the full-wave rectifier output is easier to filter than that of the half-wave rectifier because of its higher frequency. For you to have a better understanding of the effect that filtering has on
Eavg, a comparison of a rectifier circuit with a filter and one without a filter is illustrated in views
A and B of figure 4-16. The output waveforms in figure 4-16 represent the unfiltered and filtered outputs of the half-wave rectifier circuit.
Current pulses flow through the load resistance
(RL) each time a diode conducts. The dashed line indicates the average value of output voltage. For the half-wave rectifier, Eavg is less than half (or approximately 0.318) of the peak output voltage.
This value is still much less than that of the applied voltage. With no capacitor connected across the output of the rectifier circuit, the waveform in view
A has a large pulsating component (ripple) compared with the average or dc component. When a capacitor is connected across the output (view B), the average value of output voltage (Eavg) is increased due to the filtering action of capacitorC1.

UNFILTERED
The simple capacitor filter is the most basic type of power supply filter. The application of the simple

capacitor filter is very limited. It is sometimes used on extremely highvoltage, lowcurrent power supplies for cathode ray and similar electron tubes, which require very little load current from the supply. The capacitor filter is also used where the power-supply ripple frequency is not critical; this frequency can be relatively high. The capacitor (C1) shown in figure 4-15 is a simple filter connected across the output of the rectifier in parallel with the load.

FILTERED

The value of the capacitor is fairly large
(several microfarads), thus it presents a relatively low reactance to the pulsating current and it stores a substantial charge.
The rate of charge for the capacitor is limited only by the resistance of the conducting diode, which is relatively low. Therefore, the
RC charge time of the circuit is relatively short. As a result, when the pulsating voltage is first applied to the circuit, the capacitor charges rapidly and almost reaches the peak value of the rectified voltage within the first few cycles. The capacitor attempts to charge to the peak value of the rectified voltage anytime a diode is conducting, and tends to retain its charge when the rectifier output falls to zero. (The capacitor cannot discharge immediately.) The capacitor slowly discharges through the load resistance (RL) during the time the rectifier is nonconducting.
The rate of discharge of the capacitor is determined by the value of capacitance and the value of the load resistance. If the capacitance and load-resistance values are large,the RC discharge time for the circuit is relatively long.A comparison of the wave forms shown in figure 4-16
(view A and view B) illustrates that the addition of
C1 to the circuit results in an increase in the average of the output voltage (Eavg) and a reduction in the amplitude of the ripple component
(Er) which is normally present across the load resistance. Now, let's consider a complete cycle of operation using a half-wave rectifier, a capacitive filter (C1), and a load resistor (RL). As shown in view A of figure 4-17, the capacitive filter (C1) is assumed to be large enough to ensure a small reactance to the pulsating rectified current. The resistance of RL is assumed to be much greater than the reactance of C1 at the input frequency.
When the circuit is energized, the diode conducts on the positive half cycle and current flows through the circuit, allowing C1 to charge. C1 will charge to approximately the peak value of the input voltage. (The charge is less than the peak value because of the voltage drop across the diode (D1)).
In view A of the figure, the heavy solid line on the waveform indicates the charge on C1. As illustrated in view B, the diode cannot conduct on the negative half cycle because the anode of D1 is negative with respect to the cathode. During this interval, C1

discharges through the load resistor (RL). The discharge of C1 produces the downward slope as indicated by the solid line on the waveform in view
B. In contrast to the abrupt fall of the applied ac voltage from peak value to zero, the voltage across C1 (and thus across RL) during the discharge period gradually decreases until the time of the next half cycle of rectifier operation. Keep in mind that for good filtering, the filter capacitor should charge up as fast as possible and discharge as little as possible.

And

Since practical values of C1 and RL ensure a more or less gradual decrease of the discharge voltage, a substantial charge remains on the capacitor at the time of the next half cycle of operation. As a result, no current can flow through the diode until the rising ac input voltage at the anode of the diode exceeds the voltage on the charge remaining on
C1. The charge on C1 is the cathode potential of the diode. When the potential on the anode exceeds the potential on the cathode (the charge on C1), the diode again conducts, and C1 begins to charge to approximately the peak value of the applied voltage. After the capacitor has charged to its peak value, the diode will cut off and the capacitor will start to discharge. Since the fall of the ac input voltage on the anode is considerably more rapid than the decrease on the capacitor voltage, the cathode quickly become more positive than the anode, and the diode ceases to conduct. Operation of the simple capacitor filter using a full-wave rectifier is basically the same as that discussed for the half-wave rectifier. Referring

to figure 4-18, you should notice that because one of the diodes is always conducting on. either alternation, the filter capacitor charges and discharges during each half cycle. (Note that each diode conducts only for that portion of time when the peak secondary voltage is greater than the charge a cross the capacitor.)
Full-wave

rectifier

(with

capacitor

filter).

Conclusion: Preliminary research and discussion on the application of RFID technology in railway ticket system put forward RFID one-way ticket, long-term ticket stored-value and card three business models. With the further development of
RFID technology, the popularity of RFID applications and the leap of railway passenger capacity in recent years, RFID technology will play an active role in the field of railway passenger.
7.References:

Another thing to keep in mind is that the ripple component (E r) of the output voltage is an ac voltage and the average output voltage (Eavg) is the dc component of the output.
Since the filter capacitor offers relatively low impedance to ac, the majority of the ac component flows through the filter capacitor. The accomponent is there fore by passed(shunted) around the load resistance, and the entire dc component (or
Eavg)
flows through the load resistance. This statement can be clarified by using the formula for XC in a halfwave and fullwave rectifier. First, you must establish some values for the circuit.CIRCUIT DIAGRAM OF
POWERSUPPLY

CIRCUIT DIAGRAM OF THE PROJECT

APPLICATION:
Now here we will be attach all component those are give above with theSpecific value connect through the given circuit diagram and in this manner
Our RFID BASED RAIL RESERVATION system project will be complete.









www.wikipedia.com www.Google.com www.datasheetcatalog.com www.triindia.co.in www. hbeonlabs.com www.ieeexplore.ieee.org www.atmel.com

Similar Documents

Premium Essay

Ưefrwe

...and explain its role as a market mechanism. 9. Discuss competition in the digital economy. 10. Describe the impact of e-marketplaces on organizations and industries. CHAPTER Content How Blue Nile Inc. Is Changing the Jewelry Industry 2.1 E-Marketplaces 2.2 Types of E-Marketplaces: From Storefronts to Portals 2.3 Transactions, Intermediation, and Processes in E-Commerce 2.4 Electronic Catalogs and Other Market Mechanisms 2.5 Auctions as EC Market Mechanisms 2.6 Bartering and Negotiating Online 2.7 E-Commerce in the Wireless Environment: M-Commerce and L-Commerce 2.8 Competition in the Digital Economy and Its Impact on Industries 2.9 Impacts of EC on Business Processes and Organizations Managerial Issues Real-World Case: Wal-Mart Leads RFID Adoption Appendix 2A: Build-to-Order Production ISBN: 0-558-13856-X 42 Electronic Commerce 2008: A Managerial Perspective, by Efraim Turban, David King, Judy McKay, Peter Marshall, Jae Lee, and Dennis Viehland. Published by Prentice Hall. Copyright © 2008 by Pearson Education, Inc. M02_TURB3315_05_SE_C02.QXD 9/4/07 7:54 PM Page 43 EC Application HOW BLUE NILE INC. IS CHANGING THE JEWELRY INDUSTRY Blue Nile Inc. (bluenile.com), a pure-play...

Words: 28842 - Pages: 116

Free Essay

Tourism Industry: Ict Adoption and E-Business Activity

...Sector Report No. 8 / 2006 ICT and e-Business in the Tourism Industry ICT adoption and e-business activity in 2006 European Commission Tourism About e-Business W@tch and this report The European Commission, Enterprise & Industry Directorate General, launched the e-Business W@tch to monitor the growing maturity of electronic business across different sectors of the economy in the enlarged European Union, EEA and Accession countries. Since January 2002, the e-Business W@tch has analysed e-business developments and impacts in manufacturing, construction, financial and service sectors. All results are available on the internet and can be accessed or ordered via the Europa server or directly at the e-Business W@tch website (http://ec.europa.eu/comm/enterprise/ict/policy/watch/index.htm, www.ebusiness-watch.org). This document is a sector study by e-Business W@tch, focusing on the tourism industry. Its objective is to describe how companies in this industry use ICT for conducting business, to assess the impact of this development for firms and for the industry as a whole, and to indicate possible implications for policy. Analysis is based on literature, interviews, case studies and a survey among decision-makers in European enterprises from the tourism industry about the ICT use of their company. Disclaimer Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of the following information...

Words: 80447 - Pages: 322

Premium Essay

Ggggggg

...Retailing in the 21st Century Manfred Krafft ´ Murali K. Mantrala (Editors) Retailing in the 21st Century Current and Future Trends With 79 Figures and 32 Tables 12 Professor Dr. Manfred Krafft University of Muenster Institute of Marketing Am Stadtgraben 13±15 48143 Muenster Germany mkrafft@uni-muenster.de Professor Murali K. Mantrala, PhD University of Missouri ± Columbia College of Business 438 Cornell Hall Columbia, MO 65211 USA mantralam@missouri.edu ISBN-10 3-540-28399-4 Springer Berlin Heidelberg New York ISBN-13 978-3-540-28399-7 Springer Berlin Heidelberg New York Cataloging-in-Publication Data Library of Congress Control Number: 2005932316 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2006 Printed in Germany The use of general descriptive names, registered names, trademarks, etc. in this publication does not...

Words: 158632 - Pages: 635

Free Essay

Economic Sectors

...Twelfth Five Year Plan (2012–2017) Economic Sectors Volume II Copyright © Planning Commission (Government of India) 2013 All rights reserved. No part of this book may be reproduced or utilised in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage or retrieval system, without permission in writing from the publisher. First published in 2013 by SAGE Publications India Pvt Ltd B1/I-1 Mohan Cooperative Industrial Area Mathura Road, New Delhi 110 044, India www.sagepub.in SAGE Publications Inc 2455 Teller Road Thousand Oaks, California 91320, USA SAGE Publications Ltd 1 Oliver’s Yard, 55 City Road London EC1Y 1SP, United Kingdom SAGE Publications Asia-Pacific Pte Ltd 33 Pekin Street #02-01 Far East Square Singapore 048763 Published by Vivek Mehra for SAGE Publications India Pvt Ltd, Phototypeset in 11/13pt Minion Pro by RECTO Graphics, Delhi and printed at Saurabh Printers, New Delhi. Library of Congress Cataloging-in-Publication Data Available ISBN: 978-81-321-1131-3 (PB) The SAGE Team: Rudra Narayan, Archita Mandal, Rajib Chatterjee and Dally Verghese Twelfth Five Year Plan (2012–2017) Economic Sectors Volume II Planning Commission Government of India Thank you for choosing a SAGE product! If you have any comment, observation or feedback, I would like to personally hear from you. Please write to me at contactceo@sagepub.in —Vivek Mehra, Managing Director and CEO, SAGE Publications India Pvt...

Words: 131771 - Pages: 528

Free Essay

Aadhaar - India's Unique Indetification

...Aadhaar: India’s ‘Unique Identification’ System In our politics, we have yet to tap into our new language of hope. For this to be mirrored in our political institutions it requires us to imagine an India that rests not on the struggles of our past, but on the promise and challenges of the future. It requires us to shape systems and policies that give people the ability to travel in search of work, to educate their children and to tap into economic growth.1 — Nandan Nilekani Nandan Nilekani, chairman of the Unique Identification Authority of India (UIDAI), sipped his coffee while thinking about how to reply to the journalist badgering him and his core team about UIDAI’s challenges. “Will you actually be able to deliver ‘unique identification’ to every Indian resident?” asked the journalist. It was August 30, 2012, three years after the government of India (GoI) had approved the UIDAI project plan. In that time, UIDAI had chalked up some victories. 190 million people had been enrolled within two years of the initial rollout in September 2010. The Australian and Indonesian governments were studying the UIDAI system to adapt it for themselves. Yet some were skeptical that UIDAI would meet its interim goal to cover 600 million of India’s 1.2 billion residents by 2014, and whether the time, cost, and effort were justified. Nilekani responded, “175 million Indians have received a letter in the post giving them a 12-digit number.” India had the largest number of post offices...

Words: 8626 - Pages: 35

Premium Essay

Managing Information Technology (7th Edition)

...The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO CASE STUDY II-2 Real-Time Business Intelligence at Continental Airlines CASE STUDY II-3 Norfolk Southern Railway: The Business Intelligence Journey CASE STUDY II-4 Mining Data to Increase State Tax Revenues in California CASE STUDY II-5 The Cliptomania™ Web Store: An E-Tailing Start-up Survival Story CASE STUDY II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy CASE STUDY III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc. CASE STUDY III-2 A Make-or-Buy Decision at Baxter Manufacturing Company CASE STUDY III-3 ERP Purchase Decision at Benton Manufacturing Company, Inc. CASE STUDY III-4 The Kuali Financial System: An Open-Source Project CASE STUDY III-5 NIBCO’s...

Words: 239887 - Pages: 960

Premium Essay

Business

...SC Response to Terrorism Project MIT Center for Transportation and Logistics “Supply Chain Response to Terrorism: Creating Resilient and Secure Supply Chains” Supply Chain Response to Terrorism Project Interim Report of Progress and Learnings August 8, 2003 This report was pre pared by James B. Rice, Jr. of the MIT Center for Transportation and Logistics (CTL) and Federico Caniato of Politecnico di Milano for the Supply Chain Response to Terrorism Project team with contributions from team members Jonathan Fleck, Deena Disraelly, Don Lowtan, Reshma Lensing and Chris Pickett. This work was conducted under the direction of Professor Yossi Sheffi, CTL Director. Please contact James B. Rice, Jr. of CTL (jrice@mit.edu or 617.258.8584) if you have any questions or if you would like to discuss this report. 08/12/2003 1 SC Response to Terrorism Project Supply Chain Response to Terrorism Project: Interim Report of Progress and Learnings 1 2 Executive summary........................................................................................................... 4 Research introduction and background ............................................................................. 6 2.1 Introduction................................................................................................................ 6 2.2 Background Research ................................................................................................ 6 2.3 Project...

Words: 28274 - Pages: 114

Premium Essay

Week 1 Df

...[pic] Student Guide for Performance Based Service Acquisition And The Seven Step Process (ACQ 265) Nov 2009 Table of Contents UNIT 1 Introduction UNIT 2 Form the Team, Review Current Strategy, Market Research Step 1: Form the Team Step 2: Review the Current Strategy Step 3: Market Research UNIT 3 An Industry Perspective: Approaching an Acquisition UNIT 4 Requirements Definition Step 4: Requirements Definition UNIT 5 Develop your Sourcing Strategy Step 5: Sourcing Strategy UNIT 6 Execute the Strategy Step 6: Execute the Strategy UNIT 7 Performance Management Step 7: Manage Performance Appendices I Acronym List II Glossary | | | |Course Title |Performance Based Service Acquisition (ACQ 265) | | | | | | | |Lesson Title | Course Introduction | | ...

Words: 44891 - Pages: 180

Free Essay

Maglev

...PRODUCTION OPERATIONS (2003 Course) Time : 3 Hours Max. Marks : 100 Instructions : 1) Question Nos. 1 and 5 are compulsory. Out of the remaining attempt 2 questions from Section I and 2 questions from Section II. 2) Answers to the two Sections should be written in separate books. 3) Neat diagrams must be drawn wherever necessary. 4) Black figures to the right indicate full marks. 5) Use of Logarithmic Tables, Slide Rule, Mollier Charts, Electronic Pocket Calculator and Steam Tables is allowed. 6) Assume suitable data, if necessary. SECTION – I 1. What are different systems on a drilling rig ? Explain any one in detail with suitable diagramme. 18 2. a) Calculate Bottom hole pressure if well depth is 2500 m and mud weight is 1.2 gm/cc. b) Calculate mud weight if mud gradient is 0.87 psi/ft. ′ c) Calculate volume bbl/meter for drill pipe O.D. = 5′ inch and I.D. = 4.276 inch. 2 2 2 10 8 8 16 d) Draw circulation system on a drilling rig. 3. a) Discuss IADC classification of a bit in details. b) Discuss different factors affecting rate of penetration in details. 4. Write short note on : i) Coring ii) Fishing tools iii) BOP iv) Directional well P.T.O. [3963] – 103 -2- *3963103* SECTION – II 5. a) Discuss different types of casings and function of the casings in brief. b) Discuss different types of well completion techniques. 6. a) Discuss primary cementation process with suitable sketch. b) Discuss different perforation methods in brief. 7. a) What are different types...

Words: 172166 - Pages: 689

Premium Essay

Book

...The fourteenth edition of Purchasing and Supply Management focuses on decision making throughout the supply chain. Based on the conviction that supply managers, in concert with suppliers and distributors, have to contribute to organizational goals and strategies, this edition continues to focus on how to make that mission a reality. Fourteenth Edition Highlights of the Fourteenth Edition: More than 40 real-life supply chain cases afford the opportunity to apply of the acquisition process. Criteria for supply decisions have been organized into three categories: (1) strategic, (2) operational, and (3) additional. In this third category, new factors such as balance sheet and income statement considerations, dimensions of risk, and environmental and social considerations are considered. Visit the text’s Online Learning Center at www.mhhe.com/Johnson14e Michiel R. Leenders, D.B.A., PMAC Fellow Professor of Purchasing Management Emeritus Richard Ivey School of Business The University of Western Ontario Anna E. Flynn, Ph.D., C.P.M. Formerly Clinical Associate Professor Supply Chain Management Thunderbird School of Global Management Formerly Associate Professor Institute for Supply Management TM Johnson Leenders Flynn Purchasing and Supply Management Johnson Leenders Flynn MD DALIM #1093963 06/05/10 BLUE GREEN P. Fraser Johnson, Ph.D. Leenders Purchasing Management Association of Canada Chair Associate Professor, Operations Management ...

Words: 188430 - Pages: 754

Premium Essay

Purchasing and Supply Management

...The fourteenth edition of Purchasing and Supply Management focuses on decision making throughout the supply chain. Based on the conviction that supply managers, in concert with suppliers and distributors, have to contribute to organizational goals and strategies, this edition continues to focus on how to make that mission a reality. Fourteenth Edition Highlights of the Fourteenth Edition: More than 40 real-life supply chain cases afford the opportunity to apply of the acquisition process. Criteria for supply decisions have been organized into three categories: (1) strategic, (2) operational, and (3) additional. In this third category, new factors such as balance sheet and income statement considerations, dimensions of risk, and environmental and social considerations are considered. Visit the text’s Online Learning Center at www.mhhe.com/Johnson14e Michiel R. Leenders, D.B.A., PMAC Fellow Professor of Purchasing Management Emeritus Richard Ivey School of Business The University of Western Ontario Anna E. Flynn, Ph.D., C.P.M. Formerly Clinical Associate Professor Supply Chain Management Thunderbird School of Global Management Formerly Associate Professor Institute for Supply Management TM Johnson Leenders Flynn Purchasing and Supply Management Johnson Leenders Flynn MD DALIM #1093963 06/05/10 BLUE GREEN P. Fraser Johnson, Ph.D. Leenders Purchasing Management Association of Canada Chair Associate Professor, Operations Management ...

Words: 188430 - Pages: 754

Premium Essay

Six Sigma

...IIBM Institute of Business Management Marketing Management www.iibmindia.in Subject: MARKETING MANAGEMENT Credits: 4 SYLLABUS Concepts of Marketing Management: Definition and Concepts: Definitions of Marketing, Scope of Marketing; Core Marketing Concepts: Concept of Demand and Supply; Transaction; Major Marketing Management Philosophy; Social Marketing Marketing Environment - Internal & External Marketing Environment Forces; Macro Environment; Micro and Internal Environment; Factors Influencing Consumer Buyer Behavior; Buyer Decision Process; Inputs for Buying Decision Process; Consumer Trends; Market Segmentation Process. Developing Market Strategies and the Offerings Part –I Positioning and Differentiation: Concept, Positioning according to Ries and Trout, Various Tools of Differentiation; Product Decisions and Strategies; Product Mix; Product Life Cycle; Brand Positioning; Brand Identity; Equity and Packaging. Developing Market Strategies and the Offerings - Part II: Introduction to Service Marketing; Differentiating Services; Product and Service Price; Response to Change in Price; Pricing Strategies. Delivering Marketing Programs – Part I Marketing through Channel Partners; Wholesalers and Retailers: Current Trend; Channel Management. Delivering Marketing Programs – Part II Market Communication, Process for Effective Communication; Advertising; Different Advertising Media; Sales Promotion; Public Relations; Direct Marketing; Personal Selling:...

Words: 96487 - Pages: 386

Premium Essay

Philosophy and Design

...Philosophy and Design Pieter E. Vermaas • Peter Kroes Andrew Light • Steven A. Moore Philosophy and Design From Engineering to Architecture Pieter E. Vermaas Delft University of Technology Delft the Netherlands Andrew Light University of Washington Seattle USA Peter Kroes Delft University of Technology Delft the Netherlands Steven A. Moore University of Texas Austin USA ISBN 978-1-4020-6590-3 e-ISBN 978-1-4020-6591-0 Library of Congress Control Number: 2007937486 © 2008 Springer Science + Business Media B.V. No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written permission from the Publisher, with the exception of any material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Printed on acid-free paper. 9 8 7 6 5 4 3 2 1 springer.com Contents List of Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Design in Engineering and Architecture: Towards an Integrated Philosophical Understanding . . . . . . . . . . . . . . . . . Peter Kroes, Andrew Light, Steven A. Moore, and Pieter E. Vermaas Part I Engineering Design ix 1 Design, Use, and the Physical and Intentional Aspects of Technical Artifacts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 165744 - Pages: 663

Premium Essay

Marketing Channel Distribution

...Vendor: Integra Software Services Pvt. Ltd. Full Service Project Manager: Anandakrishnan Natarajan/Integra Software Services Printer/Binder: Courier/Westford Cover Printer: Lehigh-Phoenix Text Font: 10/12, ITC Garamond Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text (or on page xix). Copyright © 2015 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or...

Words: 236095 - Pages: 945