Fun with RFID

Fun with RFID

Radio Frequency Identification (RFID) system is an identification system that uses radio waves to retrieve data from a device called a tag or transponder.
RFID surrounds us in our daily lives?in supermarkets, libraries, bookstores, etc. RFID provides a quick and efficient way to collect information, such as taking stock in a warehouse, as well as tracking the whereabouts of items.

In this article, you will learn how to build a Windows application that incorporates RFID technology for data collection. I’ll demonstrate how to use two RFID readers and then I’ll compare their relative pros and cons.

A Quick Introduction to RFID
In its bare minimum, a RFID system consists of two main components:

  • Reader/Writer
  • Tags

An RFID reader/writer contains a scanning antenna and a transceiver. It uses the scanning antenna to send out radio frequency signals in a relative short range. The radio frequency sent out is used to communicate and power tags (also known as transponders) that are within range, which will then transmit the data on the tag back to the reader. The information sent out by the tag is then picked up by the scanning antenna. The data is then interpreted and decoded by the transceiver.

There are two types of RFID tags?active and passive. Active RFID tags have their own power source and hence they can transmit signals that travel farther. In contrast, passive RFID tags have no power source and they have to rely solely on the signal sent from the scanning antenna to power them. Hence the range supported by passive tags is limited. Active tags are bigger in size than passive tags and have a limited life span (until the power source runs out). Passive tags, on the other hand, are much smaller in size and have virtually unlimited life span.

There are two types of RFID tags: active and passive.

RFID systems are categorized by their transmitting frequencies and are broadly grouped into three bands: Low Frequency (LF), High Frequency (HF), and Ultra High Frequency (UFH). Table 1 shows the different frequencies used by the three bands and their characteristics.

Table 11: The table shows the different transmitting frequencies used by RFID systems broadly grouped into three bands.

Frequency Band Common Frequency Typical Communication Range (Maximum) Data Rate Reader Cost
LF 125 to 135 kHz 20cm (100cm) Low Low
HF 13.56 Mhz 10cm (70cm) High Medium
UHF 868 to 928 Mhz 3m (10m) Medium Very High

Each RFID tag has a unique tag ID. Tags carry no more than 2KB of data and can store information such as history, location, etc.

Most common RFID applications use the tag ID transmitted by RFID tags as a key to information stored in databases. For example, an RFID tag attached to an employee passcard only contains an RFID tag ID, which an application can use to retrieve more detailed employee information stored in the organization databases. While read-only RFID applications are cheaper, there are occasions where you might need to write data back to an RFID tag, in which case you’ll use read-write tags. You might find read-write RFID systems in a subway, for example, where you may need to write back information to a tag in stored value cards. Note that some tags can only be written once.

Building Attendance Tracking Application
Now that you have a good understanding of how RFID works, I’ll show you how to build a simple attendance application that registers an employee when he reports for work. Figure 1 shows the user interface of the application.

Figure 1: The attendance system you will build in this article.
Figure 2: Hiding the administrative functions in a deployed environment.

When an employee scans his employee passcard that has an embedded RFID tag, the application that receives the ID from the RFID tag will display the employee information. The application’s administrator can assign an unused tag to an employee by using the buttons on the right of the application. For security reasons, the application will clear the employee information after three seconds. To deploy this application in a real-life setting, you would hide the administrative functions so that the user only sees the necessary information (see Figure 2).

RFID Reader #1: Parallax’s RFID Reader Module
In this example, I’ll show you how to use Parallax’s RFID Reader Module. This low-cost RFID reader ($39) reads passive RFID transponder tags and uses serial communication to transmit the tag IDs. As you can see in Figure 3, the reader has four pins at the bottom (from left to right):

Figure 3: The Parallax’s RFID Reader Module.
  • VCC – +5V DC power
  • /ENABLE – Enable (Ground) or disable (+5V DC) pin
  • SOUT – Serial output
  • GND – Ground

The effective read range of Parallax’s RFID Reader module is between 1?” and 3″ inches (depending on the tag). When the Reader Module acquires a tag ID, it sends data through the serial port using a 12-byte ASCII string. The LF (Line Feed) serves as the start byte and the CR (Carriage Return) serves as the stop byte. The ten digits in between serve as the unique tag ID.

The Parallax’s RFID Reader Module reads the following tags:

  • 54 mm x 85 mm Rectangle Tag ($2.25 each).
  • 50 mm Round Tag ($2.25 each)

Setting Up the Reader
To connect the reader to your computer, you need to perform a TTL-to-RS-232 level shifting so that the data can be read via a serial port. One way would be to connect the reader to the RS-232 DCE AppMod ($29.00).

For my project, I used the Javeline Demo Board ($119.00) to connect to the reader.

Figure 4: The wiring on the Javeline Demo Board.
Author’s Note: Either board will work well. I just happened to have the Javeline Demo Board, which is the more expensive option. If you are a modder, you can wire up the reader yourself using an RS232 level shifting IC.

Figure 4 shows the wiring on the Javeline Demo Board. After that, you need to:

  • Connect a 5V power source to the power connector
  • Connect your RS-232 serial cable to the serial port at the top of the board.
  • Connect the reader module to board using the pins shown in the diagram

Be sure to use a “straight” serial cable to connect the board to your computer, or you will not be able to get any data from the reader.

Figure 5: The Parallax RFID Reader and the Javeline Demo Board connected and ready to go.

If you do not have a serial port on your computer, you can use a USB-to-serial converter to convert a USB connector into a serial port. You will also need a DB9 straight serial cable.

Figure 5 shows the assembled reader and board.

Building the Application User Interface
Using Visual Studio 2005, create a new Windows application and name it C:Attendance. You will use the Northwind sample database provided by SQL Server 2000 with SQL Express (see the sidebar, “Installing the Sample Database“). To simplify data-binding, you will use the drag-and-drop data-binding feature that is new in Visual Studio 2005.

In addition, you will also add a new TagID field to the Employees table in the Northwind database. To do so:

    • Go to Server Explorer (from the View menu choose Server Explorer).
    • Right-click on Data Connections and select Add Connection?.
    • Select the Microsoft SQL Server (SqlClient) data source and in the server name field, enter .SQLEXPRESS (assuming you have SQL Express installed on your local computer). Select Northwind as the database name and click OK.
Figure 6: Adding a new TagID field to the Employees table.
  • In Server Explorer, expand the Northwind database and then the Tables item. Double-click Employees and add the TagID field (see Figure 6).
Author’s Note: Ensure that the data source selected is “Microsoft SQL Server (SqlClient)”. If it is not, click “Change…” and select Microsoft SQL Server.

First, add a new data source to your project by selecting “Add New Data Source” from the Data menu. In the Data Source Configuration Wizard dialog box, select “Database” and click Next. Click the New Connection button to specify the database to use. You will see the Add Connection dialog box (see Figure 7). As before, enter .SQLEXPRESS as the server name and select Northwind as the database. Click OK.

Figure 7: Adding a new connection to the Northwind database.
Figure 8: Choosing the fields to use in the Employees table.

Back in the Data Source Configuration Wizard, click Next. In the next screen, select the table and fields to use. Expand the Tables and Employees item and then check the following fields (see Figure 8):

  • EmployeeID
  • LastName
  • FirstName
  • Title
  • Photo
  • TagID

From the Data menu, choose “Show Data Sources” to view the newly added data source. Figure 9 shows the Employees data source. By default, the Employees table is bound to a DataGridView control and all its fields (except the Photo field) are bound to TextBox controls. You should change the bindings to those as shown in Table 2.

Table 2: Change the Employees table bindings as shown in this table.

Figure 9: The Employees data source.
Table/Fields Binding
Employees Details
Employee Label
LastName TextBox
FirstName TextBox
Title TextBox
Photo PictureBox
TagID TextBox


Figure 10: The data-bound controls.

The Employees data source should now look like the right side of Figure 9.

Drag the Employees data source onto the default Form1. Figure 10 shows the controls that automatically populate the form. For the PictureBox control, set the Size property to 95,110 and the SizeMode to StretchImage.

Author’s Note: Move the TagID label and its accompanying Label control (on the right) to the top.

Testing the Data Binding

To test that the data-binding works, you can now press F5 to debug the application. Figure 11 shows the application displaying the records in the Employees table.

Figure 11: Testing to ensure that the data-binding works.
Figure 12: Populating the form with the various controls.

Next you’ll add controls to the form to allow an administrator to assign a RFID tag to a user. Figure 12 shows the controls to add.

For the txtTagID control, set both the ReadOnly and the Multiline properties to True.

In addition, drag a Timer control from the Toolbox onto the form. This control will ensure that the displayed employee record will be cleared after three seconds.

Coding the Application
With the UI of the application out of the way, you can now focus on writing the code to wire up all the controls. Switch to the code-behind of Form1 and import the following namespaces.

   Imports System.Data   Imports System.Data.SqlClient   Imports System.IO

Declare the member variables and constants shown below:

   Public Class Form1      '---serial port to listen to       ' incoming data---      Private WithEvents serialPort As New IO.Ports.SerialPort      '---tag ID read from the reader---      Private tagID As String = String.Empty      '---the time that the tag ID was recorded---      Private timeRecorded As DateTime = Now      '---COM port to listen to---      Const COM As String = "COM3"      '---file name of the log file---      Const FILE_NAME As String = "C:Attendance.csv"      '---the interval before the employee record is cleared       ' from the screen (in seconds)---      Const INTERVAL As Integer = 3

When the form loads, you first clear the displayed employee by setting its filter to a non-existent tag ID. The Timer control clears the displayed employee after a certain amount of time, and in this case you will set it to three seconds (as defined by the Interval constant). That is to say, when an employee is identified using his RFID tag, his information will be cleared from the screen after three seconds.

As the Parallax’s RFID Reader Module uses a serial connection, you will use the SerialPort class to communicate with the reader.

Author’s Note: For this example, I have assumed that you’ll connect the COM3 port to the RFID Reader Module. You need to change it to the correct port number for your own use.

Here’s the code for the Form1_Load event.

   Private Sub Form1_Load(ByVal sender As System.Object, _      ByVal e As System.EventArgs) Handles MyBase.Load      'TODO: This line of code loads data into the NorthwindDataSet.      ' Employees' table. You can move, or remove it, as needed.      Me.EmployeesTableAdapter.Fill(Me.NorthwindDataSet.Employees)         '---Clear the employee when the app is loaded       EmployeesBindingSource.Filter = "TAGID='xxxxxxxxxx'"         '---set the timer interval to clear the employee record       ' convert to milliseconds      Timer1.Interval = INTERVAL * 1000         '---open the serial port connecting to the reader       If serialPort.IsOpen Then         serialPort.Close()      End If      Try         With serialPort            .PortName = COM            .BaudRate = 2400            .Parity = IO.Ports.Parity.None            .DataBits = 8            .StopBits = IO.Ports.StopBits.One            .Handshake = IO.Ports.Handshake.None         End With         serialPort.Open()      Catch ex As Exception         MsgBox(ex.ToString)      End Try   End Sub

To receive incoming data from the SerialPort class, you need to service the DataReceived event. In this case, when incoming data is received, you will update the txtTagID control. Here’s the code for the DataReceived event.

   Private Sub DataReceived(ByVal sender As Object, _      ByVal e As System.IO.Ports.SerialDataReceivedEventArgs) _      Handles serialPort.DataReceived         '---when incoming data is received, update the TagID       ' textbox       txtTagID.BeginInvoke(New myDelegate( _         AddressOf updateTextBox), New Object() {})   End Sub

You need to define a delegate to call a routine to update the txtTagID control. Here, define the myDelegate() delegate and the updateTextBox() subroutine.

   '--- update the Tag ID textbox   Public Delegate Sub myDelegate()   Public Sub updateTextBox()      ' for receiving plain ASCII text      With txtTagID         .AppendText(serialPort.ReadExisting)         .ScrollToCaret()      End With   End Sub

One important point you need to understand about RFID readers (at least for the two RFID readers shown in this article) is that while it’s scanning a tag, it will continuously send the tag ID to the serial connection. For example, suppose a tag with ID of 0F0296AF3C is placed near the reader. In this case, the reader will continuously send the value of 0F0296AF3C to the serial connection. For the Parallax’s reader, each value starts with the line feed character (character 10) and ends with a carriage return character (character 13). To make matters complicated, using the ReadExisting() method of the SerialPort class does not guarantee that you will read the tag ID in its entirety. This is because a value may be sent in four blocks, like this:

   <10>0F   029   6AF3   C<13>

You may be tempted to use the ReadLine() method of the SerialPort class to read incoming data, but that will not work, because the ReadLine() method looks for <13><10> at the end of the line. But because the incoming data does not end with <10>, this will cause the application to go into an infinite loop.

In addition, if you don’t clear the incoming data buffer fast enough, you may get a series of data queued up like this:

   <10>   0F   029   6AF3   C   <13>   <10>   04   158D   C82B   <13>

Instead of writing elaborate logic to process the incoming data, an easy way is to append all incoming data to a TextBox control (with the Multiline property set to True). Using the data just described, Figure 13 shows what the TextBox control will look like.

Figure 13: Appending incoming data to a TextBox control.
Figure 14: The state of the TextBox control containing the last incomplete tag ID.

The second to the last line will hence always contain the tag ID that you are interested in if the last line is an empty string. In contrast, if the tag ID is only partially received, the state of the TextBox control would be as shown in Figure 14.

As all incoming data is updated in the TextBox control, you can check if the tag ID belongs to an employee whenever there are changes in the content of the TextBox control. You’ll use the TextChanged event (Listing 1) to detect the change.

The TextChanged event first examines if the last line in the txtTagID control is an empty string; if it is, then the scanned tag ID can be found in the second to last line. Using this tag ID, the code checks the time difference between the current time and the last time the tag ID was read. If it is less than three seconds and the tag ID is the same as the last read tag ID, it means that it is reading the same user, so the current tag ID should be ignored. Using this implementation, all users will be ignored for three seconds following an initial tag scan.

Using the tag ID, apply a filter to the EmployeesBindingSource control to look for an employee with a matching tag ID. If an employee is found, an entry will be written to the log file using the WriteToLog() subroutine.

Figure 15: The content of a typical log file.
   Private Sub WriteToLog( _      ByVal employeeID As String, _      ByVal employeeName As String)      '--- write to log file       Dim str As String = employeeID & _         "," & employeeName & ", " & _         Now & Chr(13)      My.Computer.FileSystem. _         WriteAllText(FILE_NAME, str, True)   End Sub

Figure 15 shows the content of a typical log file.

The Timer control will fire the Tick event every three seconds (as determined by the value set in its Interval property). Hence you need to service the Tick event so that every time it fires, you can clear the current employee information that is displayed. Here is the implementation of the Tick event.

   Private Sub Timer1_Tick(ByVal sender As System.Object, _      ByVal e As System.EventArgs) Handles Timer1.Tick      '--- clear the employee       EmployeesBindingSource.Filter = "TAGID='xxxxxxxxxx'"      Timer1.Enabled = False   End Sub

If the tag ID just scanned in does not belong to any user, the administrator can assign the tag ID to an employee. To do so, he can first click the Find button to find the user and then assign the tag ID to that user. Here is the implementation of the Find button.

   Private Sub btnFind_Click(ByVal sender As System.Object, _      ByVal e As System.EventArgs) Handles btnFind.Click      '--- search for employee       If txtEmployeeID.Text = String.Empty Then          EmployeesBindingSource.RemoveFilter()      Else          EmployeesBindingSource.Filter = _             "EmployeeID='" & txtEmployeeID.Text & "'"      End If   End Sub

Basically, you search for a user by applying a filter to the EmployeesBindingSource control. To assign a tag ID to the current employee, copy the tag ID onto the TagIDLabel1 control and then save the changes. Listing 2 shows the implementation of the “Assign Tag to Employee” button.

The “Deassign Tag From Employee” button allows a tag ID to be disassociated from an employee. This is easily accomplished by setting the TagIDLabel1 control to an empty string. Here’s the implementation of the “Deassign Tag From Employee” button.

   Private Sub btnDeassign_Click( _      ByVal sender As System.Object, _      ByVal e As System.EventArgs) _      Handles btnDeassign.Click      If Trim(TagIDLabel1.Text) = String.Empty Then         ToolStripStatusLabel1.Text = _            "Current employee has no tag ID."         Exit Sub      End If      '---deassociate tag ID from employee       TagIDLabel1.Text = String.Empty      '---save the record       Me.Validate()      Me.EmployeesBindingSource.EndEdit()      Me.EmployeesTableAdapter.Update( _         Me.NorthwindDataSet.Employees)      ToolStripStatusLabel1.Text = _         "Tag deassociated from employee."   End Sub

Testing the Application
You are now ready to test the application. Press F5 to debug the application. Take a tag and scan it using the RFID reader. The application should register your tag ID and shows that no employee is found (see Figure 16).

Figure 16: Scanning a tag that does not belong to any employee.

You can associate the tag ID with an employee by searching for an employee (enter the employee ID in the Textbox and click the Find button or leave it empty and it will return all records). Once you have located the employee you want, click the “Assign Tag to Employee” button to assign the tag ID to the employee.

The next time you scan the same tag, the application will show the employee.

RFID Reader #2: PhidgetRFID
The second RFID reader I will show you how to use is the PhidgetRFID reader ($59.95); (see Figure 17) from Phidgets Inc. The PhidgetRFID is also a read-only RFID reader that can read tags within a four-inch proximity.

Unlike the Parallax’s RFID Reader Module, the PhidgetRFID uses a USB connection, which is actually easier because almost all computers today support USB devices. And because it draws power from the USB connection, you don’t need to provide an external power source. Simply connect the PhidgetRFID to your computer and start scanning.

Figure 17: The PhidgetRFID Reader.

Instead of purchasing the standalone PhidgetRFID reader, I suggest you purchase the PhidgetRFID kit ($79.25), which comes with the following:

  • 6 30mm disc RFID tags
  • 2 credit card-sized RFID tags
  • 2 Keyfob RFID tags
  • USB cable

The PhidgetRFID reads RFID tags that use the EM Marrin protocol, EM4102 (this is a 125kHz read-only protocol).

Author’s Note: The PhidgetRFID also reads the tag I used for the Parallax RFID Reader Module. In fact, the tags described here also works with Parallax’s reader.


Figure 18: Populating the form with the controls.

Building the Sample Application
Rather than modify the application built in the previous section to work with the PhidgetRFID reader (and have a lot of repeating code snippets), I have opted to build a simpler application so that you can learn the fundamentals without being bogged down with the details of the application.

Using Visual Studio 2005, create a new Windows application and populate the default form with the controls as shown in Figure 18.

Using this application, you can view the tag ID that is being scanned and you can also programmatically turn on/off the LED on the reader itself and enable/disable the reader.

Running the PhidgetRFID Web Service
Phidget has made it easy for .NET programmers to use the PhidgetRFID reader. Developers can control the reader by the PhidgetWebService, a component that interacts with your PhidgetRFID reader. You must install and run the PhidgetWebService on the computer that has the PhidgetRFID connected. Once the PhidgetWebService is up and running, your program can then communicate with it in order to control the PhidgetRFID reader. You can obtain the Phidget library (containing the PhidgetWebService) from (go to Downloads then choose Release) and download the PHIDGET.msi file.

Author’s Note: Phidget’s use of the term “WebService” is a little misleading here. PhidgetWebService is not an XML Web service such as most developers are familiar with. Rather, it is a Windows Service that runs in the background.

Once installed, you can find the PhidgetWebService in the C:Program FilesPhidgets directory. You can invoke the PhidgetWebService Manager (a GUI version of the WebService) by running the PhidgetWebServiceManger.exe from this directory. Once it is up and running, you’ll find it in the System Tray (see Figure 19).

Figure 19: The PhidgetWebService Manager in the System Tray.
Figure 20: The PhidgetWebService Manager.

Double-click on the icon to launch the PhidgetWebService Manager. Using the manager, you can change the settings of the WebService as well as manage your Phidget devices (not just the PhidgetRFID reader). As shown in Figure 20, the PhidgetWebService is listening at port 5001 and requires a password (“pass” is the default) to access it. With your PhidgetRFID reader attached to your computer, click Start. My reader has the unique serial number 6207.

Figure 21: The client and the reader need not be on the same computer.

One unique feature of the PhidgetWebService is that your client application need not necessarily be running on the same computer as the one with the reader connected. The client application uses sockets communication to talk to the PhidgetWebService, meaning that you can connect the PhidgetRFID reader to one computer while running the client application on another computer (as long as they can see each other on the network). Figure 21 shows one possible scenario. The advantage of this approach is that your client can be running on mobile platform devices (such as Pocket PC) as long as it can communicate with the host computer using sockets communication.

PhidgetRFID APIs
The PhidgetRFID reader, which is installed when you install the PhidgetWebService, exposes its functionality as APIs located in the PhidgetNET.dll library.

To use the PhidgetRFID, first import the PhidgetNET.dll library into your application. Right-click on the project name in Solution Explorer and then select “Add Reference?.” In the Browse tab, navigate to C:Program FilesPhidgets and select PhidgetNET.dll.

Coding the Application
Switch to the code-behind of Form1 and first declare a member variable representing the PhidgetRFID reader:

   Public Class Form1   Dim WithEvents RFIDReader As PhidgetsNET.PhidgetRFID

When the form is loaded, instantiate the PhidgetReader variable and open a connection to the computer running the PhidgetWebService. The Form1_Load event code below accomplishes that:

   Private Sub Form1_Load(ByVal sender As System.Object, _      ByVal e As System.EventArgs) Handles MyBase.Load      RFIDReader = New PhidgetsNET.PhidgetRFID      RFIDReader.OpenRemoteIP("localhost", 5001, -1, "pass")      ToolStripStatusLabel1.Text = "Not Connected"   End Sub
Author’s Note: Notice that I used localhost as my reader connected to my local computer. The 5001 parameter corresponds to the port number entered in the PhidgetWebService Manager (see Figure 20). The -1 parameter value refers to the first device that is found in the PhidgetWebService. Alternatively, you can use 6207 (the device serial number). The “pass” is the password (also set in the PhidgetWebService Manager).

For the PhidgetRFID, you need to service four important events:

  • Attach. Fired when a PhidgetRFID reader is attached to the computer running the PhidgetWebService.
  • Detach. Fired when a PhidgetRFID reader is detached from the computer running the PhidgetWebService.
  • Error. Fired when there is an error with the PhidgetRFID reader.
  • Tag. Fired when a tag is scanned using the PhidgetRFID reader.

In the Attach event, when a reader is connected, you will turn on the LED on the reader as well as enable the reader by using the SetOutputState() method of the PhidgetRFID class:

   Private Sub RFIDReader_Attach(ByVal sender As Object, _      ByVal e As PhidgetsNET.AttachEventArgs) _      Handles RFIDReader.Attach      '--- display the status      ToolStripStatusLabel1.Text = "Phidget RFID Reader Connected"      '--- Enable onboard LED       chkTurnOnLED.Checked = True       RFIDReader.SetOutputState(2, True)      '--- Enable RFID Reader       chkEnableReader.Checked = True      RFIDReader.SetOutputState(3, True)   End Sub

When you detach the reader, you simply update its status in the status bar.

   Private Sub RFIDReader_Detach(ByVal sender As Object, _      ByVal e As PhidgetsNET.DetachEventArgs) _      Handles RFIDReader.Detach      '--- display the status       ToolStripStatusLabel1.Text = _         "Phidget RFID Reader Not Connected"   End Sub

The same goes for the Error event.

   Private Sub RFIDReader_Error(ByVal sender As Object, _      ByVal e As PhidgetsNET.ErrorEventArgs) _      Handles RFIDReader.Error      '--- display the error       ToolStripStatusLabel1.Text = _      e.getError   End Sub

For the Tag event, you will invoke a delegate to display the tag ID.

   Private Sub RFIDReader_Tag(ByVal sender As Object, _      ByVal e As PhidgetsNET.TagEventArgs) _      Handles RFIDReader.Tag      '--- when incoming data is       '--- received, update the       '--- TagID textbox       txtTagID.BeginInvoke(New myDelegate( _        AddressOf updateTextBox), New Object() {e.getTag})   End Sub

The delegate and the subroutine to update the textbox with the tag ID is defined as follows:

   '--- update the Tag ID textbox    Public Delegate Sub myDelegate(ByVal str As String)   Public Sub updateTextBox(ByVal str As String)      '--- update the textbox control       With txtTagID         .Text = str      End With   End Sub

You can also turn on/off the LED on the reader during run time. This is serviced by the CheckChanged event of the chkTurnOnLED control.

   Private Sub chkTurnOnLED_CheckedChanged( _      ByVal sender As System.Object, ByVal e As System.EventArgs) _      Handles chkTurnOnLED.CheckedChanged      '--- Enable/Disable onboard LED       RFIDReader.SetOutputState(2, chkTurnOnLED.Checked)   End Sub
Figure 22: A tag scanned successfully.

Similarly, you can enable/disable the reader by servicing the CheckChanged event of the chkEnableReader control.

   Private Sub chkEnableReader_CheckedChanged( _      ByVal sender As System.Object, ByVal e As System.EventArgs) _      Handles chkEnableReader.CheckedChanged      '--- Enable RFID Reader       RFIDReader.SetOutputState(3, chkEnableReader.Checked)   End Sub

Testing the Application
That’s it! You can now press F5 to test the application. Ensure you’ve used PhidgetWebService Manager to enable your PhidgetRFID reader. Figure 22 shows a tag scanned successfully.

Comparing the Two RFID Readers
You have seen the two types of RFID readers and so which one should you go for? Here are some factors you can consider.

In terms of cost, the Parallax RFID reader is very affordable at $39. However, you need to factor in the additional cost of wiring up the unit. You need to buy a power adapter (output 5V DC), a serial cable, as well as the additional hardware needed to convert the signal to serial output. In contrast, the PhidgetRFID kit costs about $58 and includes everything you need.

Ease of Use
In terms of use, the PhidgetRFID is truly plug and play. Just make sure you download the PhidgetWebService and you can start coding straight away. The Parallax RFID Reader Module takes some effort to set up, especially if you are not familiar with electronics and worry about causing damage to the unit.

If you simply want to connect an RFID reader to your computer, then the PhidgetRFID is clearly an easy option. However, the beauty of the Parallax RFID Reader Module is that it allows you to connect the unit to devices other than a PC, such as an embedded controller. Using the Parallax RFID Reader Module, you can embed it in a door and write your own code to authenticate users.

While at the moment, you can’t really use the .NET Framework (or the .NET Compact Framework) to write code for an embedded controller, I am really looking forward to the new .NET Micro Framework to allow me to do the job in the near future.

Both readers are similar in size, and are flat enough to be hidden from view.

To sum up, you have seen how RFID works and then learned to build a Windows application that uses two RFID readers-one from Parallax and one from Phidget. Depending on your needs, both low-cost readers offer a lot of exciting possibilities for integrating RFID capabilities into your projects. If you have not tried RFID yet, this is a good time to begin!



Share the Post:
Chinese 5G Limitation

Germany Considers Limiting Chinese 5G Tech

A recent report has put forth the possibility that Germany’s Federal Ministry of the Interior and Community may consider limiting the use of Chinese 5G

Modern Warfare

The Barak Tank is Transforming Modern Warfare

The Barak tank is a groundbreaking addition to the Israeli Defense Forces’ arsenal, significantly enhancing their combat capabilities. This AI-powered military vehicle is expected to

AI Cheating Growth

AI Plagiarism Challenges Shake Academic Integrity

As generative AI technologies like ChatGPT become increasingly prevalent among students and raise concerns about widespread cheating, prominent universities have halted their use of AI

US Commitment

US Approves Sustainable Battery Research

The US Department of Energy has revealed a $325 million commitment in the research of innovative battery types, designed to enable solar and wind power

Netanyahu Musk AI

Netanyahu and Musk Discuss AI Future

On September 22, 2023, Israeli Prime Minister Benjamin Netanyahu met with entrepreneur Elon Musk in San Francisco prior to attending the United Nations. In a

Chinese 5G Limitation

Germany Considers Limiting Chinese 5G Tech

A recent report has put forth the possibility that Germany’s Federal Ministry of the Interior and Community may consider limiting the use of Chinese 5G technology by local network providers

Modern Warfare

The Barak Tank is Transforming Modern Warfare

The Barak tank is a groundbreaking addition to the Israeli Defense Forces’ arsenal, significantly enhancing their combat capabilities. This AI-powered military vehicle is expected to transform the way modern warfare

AI Cheating Growth

AI Plagiarism Challenges Shake Academic Integrity

As generative AI technologies like ChatGPT become increasingly prevalent among students and raise concerns about widespread cheating, prominent universities have halted their use of AI detection software, such as Turnitin’s

US Commitment

US Approves Sustainable Battery Research

The US Department of Energy has revealed a $325 million commitment in the research of innovative battery types, designed to enable solar and wind power as continuous, 24-hour energy sources.

Netanyahu Musk AI

Netanyahu and Musk Discuss AI Future

On September 22, 2023, Israeli Prime Minister Benjamin Netanyahu met with entrepreneur Elon Musk in San Francisco prior to attending the United Nations. In a live-streamed discussion, Netanyahu lauded Musk

Urban Gardening

Creating Thriving Cities Through Urban Gardening

The rising popularity of urban gardening is receiving increased recognition for its numerous advantages, as demonstrated in a recent study featured in the Environmental Research Letters journal. Carried out by

What You Need to Know About Cloud Security Strategies

What You Need to Know About Cloud Security Strategies

Today, many businesses are adopting cloud computing services. As a result, it’s important to recognize that security measures for data in the cloud are different from those in traditional on-premises

Romanian Energy Security

Eastern Europe is Achieving Energy Security

Canada and Romania have solidified their commitment to energy security and independence from Russian energy exports by signing a $3-billion export development agreement. The deal is centered on constructing two

Seamless Integration

Unlocking Seamless Smart Home Integration

The vision of an intelligently organized and interconnected smart home that conserves time, energy, and resources has long been desired by many homeowners. However, this aspiration has often been hindered

New Algorithm

MicroAlgo’s Groundbreaking Algorithm

MicroAlgo Inc. has revealed the creation of a knowledge-augmented backtracking search algorithm, developed through extensive research in evolutionary computational techniques. The algorithm is designed to boost problem-solving effectiveness, precision, and

Poland Energy Future

Westinghouse Builds Polish Power Plant

Westinghouse Electric Company and Bechtel have come together to establish a formal partnership in order to design and construct Poland’s inaugural nuclear power plant at the Lubiatowo-Kopalino site in Pomerania.

EV Labor Market

EV Industry Hurting For Skilled Labor

The United Auto Workers strike has highlighted the anticipated change towards a future dominated by electric vehicles (EVs), a shift which numerous people think will result in job losses. However,

Soaring EV Quotas

Soaring EV Quotas Spark Battle Against Time

Automakers are still expected to meet stringent electric vehicle (EV) sales quotas, despite the delayed ban on new petrol and diesel cars. Starting January 2023, more than one-fifth of automobiles

Affordable Electric Revolution

Tesla Rivals Make Bold Moves

Tesla, a name synonymous with EVs, has consistently been at the forefront of the automotive industry’s electric revolution. The products that Elon Musk has developed are at the forefront because

Sunsets' Technique

Inside the Climate Battle: Make Sunsets’ Technique

On February 12, 2023, Luke Iseman and Andrew Song from the solar geoengineering firm Make Sunsets showcased their technique for injecting sulfur dioxide (SO₂) into the stratosphere as a means

AI Adherence Prediction

AI Algorithm Predicts Treatment Adherence

Swoop, a prominent consumer health data company, has unveiled a cutting-edge algorithm capable of predicting adherence to treatment in people with Multiple Sclerosis (MS) and other health conditions. Utilizing artificial

Personalized UX

Here’s Why You Need to Use JavaScript and Cookies

In today’s increasingly digital world, websites often rely on JavaScript and cookies to provide users with a more seamless and personalized browsing experience. These key components allow websites to display

Geoengineering Methods

Scientists Dimming the Sun: It’s a Good Thing

Scientists at the University of Bern have been exploring geoengineering methods that could potentially slow down the melting of the West Antarctic ice sheet by reducing sunlight exposure. Among these

why startups succeed

The Top Reasons Why Startups Succeed

Everyone hears the stories. Apple was started in a garage. Musk slept in a rented office space while he was creating PayPal with his brother. Facebook was coded by a

Bold Evolution

Intel’s Bold Comeback

Intel, a leading figure in the semiconductor industry, has underperformed in the stock market over the past five years, with shares dropping by 4% as opposed to the 176% return

Semiconductor market

Semiconductor Slump: Rebound on the Horizon

In recent years, the semiconductor sector has faced a slump due to decreasing PC and smartphone sales, especially in 2022 and 2023. Nonetheless, as 2024 approaches, the industry seems to

Elevated Content Deals

Elevate Your Content Creation with Amazing Deals

The latest Tech Deals cater to creators of different levels and budgets, featuring a variety of computer accessories and tools designed specifically for content creation. Enhance your technological setup with

Learn Web Security

An Easy Way to Learn Web Security

The Web Security Academy has recently introduced new educational courses designed to offer a comprehensible and straightforward journey through the intricate realm of web security. These carefully designed learning courses