- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1011 Articles for Digital Electronics
5K+ Views
Both Magnetic Tape and Magnetic Disk are the type of non-volatile magnetic memory and used to store the data. On the basis of architecture and features we can distinguish between both Magnetic Tape Memory and Magnetic Disk Memory. Following are the important differences between Magnetic Tape Memory and Magnetic Disk Memory.Sr. No.KeyMagnetic Tape MemoryMagnetic Disk Memory1DefinitionMagnetic tape is type of non-volatile memory uses thin plastic ribbon is used for storing data and as data use to be stored on ribbon so data read/write speed is slower due to which is mainly used for data backups.On other hand Magnetic Disk is ... Read More
424 Views
Tag identification layer of Electronic Product Code (EPC) Gen 2 lays down the method by which the readers can receive the identifiers from the tags. EPC Gen 2 (second generation) RFID (Radio Frequency Identification) network has two main components, tags and readers. RFID tags are affixed on objects with EPC encoded on them for identification. EPC helps to check identities of objects like inventory, assets and people, and track them. Readers are the intelligent part of the system that tracks the tags. The tag identification layer addresses the multiple access problem of getting messages from unknown number of tags.Working PrincipleIn ... Read More
2K+ Views
Backscatter is a method that uses an incident radio-frequency (RF) signal to transmit data without a battery or power source. It employs passive reflection and modulation of the incoming RF signal, and converts it into tens or hundreds of microwatts of electricity, that can be encoded for data communications.It differs from other wireless communications since the communication is half duplex in nature, i.e. both the sender and receiver cannot transmit simultaneously. The mains advantage of backscattering is that it’s low energy requirements and low complexity of deployment.Architecture of backscatter communicationsA basic backscatter communication system has two main components: tags, and ... Read More
345 Views
Physical layer of Electronic Product Code (EPC) Gen 2 defines method of transmission of bits across the network. EPC is a universal identifier encoded on RFID (Radio Frequency Identification) tags to check identities of objects like inventory, assets and people, and track them. The second generation of this technology, as laid down by EPCglobal Tag Data Standard, is called EPC Gen 2.EPC Gen 2 RFID network has two main components, tags and readers. Tags are affixed on objects that enables them to be identified or tracked. Readers are the intelligent part of the system that tracks the tags. The physical ... Read More
536 Views
EPC or Electronic Product Code is a universal identifier that are encoded on RFID (Radio Frequency Identification) tags to check identities of objects like inventory, assets and people, and track them. The second generation of this technology, as laid down by EPCglobal Tag Data Standard, is called EPC Gen 2.The architecture of EPC Gen 2, RFID network has two main components −Tags or labels − They are affixed on objects so that they can be identified or tracked.Readers or interrogators − They are the intelligent part of the system that tracks the tags.The architecture is shown as below −RFID tags ... Read More
3K+ Views
Electronic Product Code (EPC) is a universal identifier that aims to render a unique identity to every possible physical object of the world. EPCs are mostly encoded on RFID (Radio Frequency Identification) tags that are used to check identities of objects like inventory, assets and people, and track them.EPC is the 96–bit number associated with an RFID tag for identifying a particular tag amongst other tags. It distinguishes two identical products, and also provide the product’s manufacture date, origin or batch number.The EPC structure is laid down by EPCglobal Tag Data Standard, an open standard freely defined by EPCglobal Inc.EPC ... Read More
124 Views
Subtitled files are allowing hackers to read your information. These files are targeted for malicious software attacks that are being used to control devices like (Smart TV, Computer and Mobile Device). Check Point researchers has discovered this vulnerability.People generally wish to see subtitles for translated movies. However, hackers are taking advantage of this and exploiting viewers in a rather shocking way.A team Check Point has discovered this vulnerability in the four most used media player applications, where hackers are able to access viewers device via vulnerabilities via PC, Smart TV or Mobile device with the code inserted in the subtitles.The ... Read More
66 Views
Not long before we were talking about sensors. The invention of sensors helps us to solve many mysteries of medical science, manufacturing industries, the world of automotive, and also some other areas too. It was a great discovery of the mankind which helps doctors and scientists around the world to study more about the deadly diseases to develop effective counter solutions.The use of sensors is not only limited to the field of medical research. There are many such examples where sensors are being used to solve some of our huge problems. Let’s see some of the areas where the sensors ... Read More
48 Views
Earlier we had simple analog watches, then came the trend of digital watches, then the one with pulse check, heart rate and finally the smart watches. So, if you forgot your phone but have your smart watch, it’s OK. You can still receive all your important calls and messages. Anyways here we are not talking about the smartwatches but watches with some extra smartness. Confused?So let’s put it this way, imagine a watch that would use your hand as an interface. Your hand will be your ultimate watch, cool right? You interact with this interfaces outside the smartwatch. This is ... Read More
22K+ Views
In a computer system, a port provides an interface to connect a peripheral device to the computer system. Thus, ports in the computer hardware are the jacks or sockets through which the peripheral devices are attached to the computer system. These ports are standardized for each purpose. There are several types of ports available in the computer system such as USB ports, Ethernet ports, display ports, serial ports, parallel ports, etc. Through these ports, we connect different hardware devices such as monitor, keyboard, mouse, etc. to the computer. Read through this article to find out more about Serial ... Read More
To Continue Learning Please Login
Login with Google