- Waste Management -

RFID is now being used by municipalities to monitor waste pickup. Waste Disposal trucks equipped with RFID readers pick up bins marked with RFID tags. The readers then record the exact time and place every time a waste bin is emptied. This permits a new degree of monitoring and control of the waste-disposal process. By installing RFID tags on the trucks, identification is automatic at waste disposal sites and waste weight can be logged into an integrated database that serves the organization.

Tags attached to waste containers let operators monitor sorting quality, track the number of times a container is set out for collection and track the weight of its contents. It also simplifies billing for service and supports the implementation of incentive.

RFID implementation thereby can provide a centralized real-time view of the entire process. The selection of tags can have a huge impact on the success of a waste management initiative. System integrators, bin manufacturers and lift manufacturers expect reliability. Every installed tag must work and keep on working. Waste management equipment’s come in many shapes, materials and sizes, but large or small, metal or plastic, residential or commercial; they are all subject to harsh environments and rough handling. Outdoors they face heat, cold, rain, snow and ice. Even in ordinary use, they are tossed, turned and dropped, either by humans or machines. They may face harsh chemicals, inside or out, and in some applications, the rigors of power-washing as well. In the face of all these challenges, they are often expected to last a decade or more. 

Radio Frequency Identification (RFID) tags are being used for access control and security system for several years. Nowadays, the system of automatic identification has become necessary to overcome the security threats. The RFID based access & security system only allows the authorized person to enter or exit from a certain checkpoint. Authorised people are provided with unique tags, using which they can access that area. RFID based access and security system require the authorized person to take the RFID tag over the reader, then the electromagnetic waves activate the tag and automatically store the data. A reader is installed at a fixed place whenever the authorized person with an RFID tag will be in the electromagnetic waves the reader will automatically collect the data stored on the tag. RFID for access and security is used in various fields like- Parking Management, Library Application, Access Control, Personal Identification, Mobile Payment and Public Transport.