Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Construction Engineering and Management

PDF

Series

2007

Identification

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Radio Frequency Identification (Rfid) Tag, Purdue Ect Team Jan 2007

Radio Frequency Identification (Rfid) Tag, Purdue Ect Team

ECT Fact Sheets

For the receipt and tracking of pipe supports material at construction jobsites, the proprietary electronic identification tags, RFID (Radio Frequency Identification) was designed and manufactured by SAT Corporation. A RFID system consist of two major components (reader and the tag) which work together to provide the user with a non-contact solution to uniquely identify people, assets, and locations.


Rp-1 Polymer Identification System : Recycler Of Plastics, Purdue Ect Team Jan 2007

Rp-1 Polymer Identification System : Recycler Of Plastics, Purdue Ect Team

ECT Fact Sheets

It has been noticed that one of the primary obstacles in recycling is the lack of sufficient means to avoid cross contamination during collection. In particular, the new method to quickly and easily identify materials has been demanded in plastic industry due to the dramatic acceleration of plastic consumption in the last forty years. SpectraCode's new technology enables the instant point-and-shoot identification of black plastics, extracting a definitive signature from most black plastics in half a second or less. This speed is achieved through a modified probe that uses a sampling technique SpectraCode calls distributed focusing. This technology, when used …


New Access Control Technologies: Biometric Identification, Purdue Ect Team Jan 2007

New Access Control Technologies: Biometric Identification, Purdue Ect Team

ECT Fact Sheets

Biometrics are computerized methods of recognizing people based on physical or behavioral characteristics. The main biometric technologies include face recognition, fingerprint, hand geometry, iris, palm prints, signature and voice. Biometric technologies can work in two modes – authentication (one-to-one matching) and identification (one-to-many) matching. However, only three biometrics are capable of the latter – face, finger and iris.