Solved

Ultra Wide Band and Active RFID

Posted on 2004-08-29
3
357 Views
Last Modified: 2010-05-18
What is Ultra Wide Band ?

How come Ultra Wide Band Active RFID can do better position (http://www.rfidjournal.com/article/articleview/1088/1/1/) ?

Thanks,
Andrew
0
Comment
Question by:andrewyu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 7

Expert Comment

by:LimeSMJ
ID: 11927173
Ultra-wide band is just another way of communication via radio waves.  Instead of using one or serveral frequency channels (cordless phones, cellphones, radio stations), UWB uses a very large block of frequecies at once.

RFID can either be passive or active.  Passive RFID uses the transmitter's radio energy to track... Active RFIDs have batteries that can transmit on their own.

The only advantage that an active RFID would have is that it wouldn't need to be close to a transmitter to send information - which in turn can improve the tracking capabilities in a large environment.
0
 

Accepted Solution

by:
jgt10 earned 35 total points
ID: 11937311
Another major aspect of UWB is very short signal lenth (microseconds or shorter.)

These singals are less likely to interfere with the RF equipment that already resides on frequencies UWB proposes to use.  This makes them very attractive for hospitals since they are unlikely to interfere with all of the other electronic equipment.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question