Recognition Systems (CIE IGCSE ICT)

Revision Note

Becci Peters

Expertise

Computer Science

Recognition Systems


Recognition System


Characteristics


Uses


Advantages


Disadvantages

Optical Mark Recognition (OMR)

Detects marks on paper, such as filled-in circles or checkboxes

School registers, multiple-choice examination papers, barcodes, QR codes

Fast and efficient data collection, reduces manual entry errors

Limited to predetermined responses, sensitive to poor marking or smudging

Optical Character Recognition (OCR)

Converts printed or handwritten text into machine-readable text

Automated Number Plate Recognition (ANPR) systems

Speeds up data processing reduce human error

Can struggle with different fonts or handwriting styles, sensitive to image quality

Radio Frequency Identification Device (RFID)

Uses radio frequency signals to transmit data stored on a microchip

Tracking stock, passports, automobiles, contactless payment

Fast and efficient data transfer, can be read without a direct line of sight

Limited read range, can be susceptible to interference or hacking

Near Field Communication (NFC)

Enables short-range wireless communication between devices

Payment using a smartphone

Convenient and secure, allows for contactless transactions

Limited range, compatibility issues with some devices

Biometric Recognition

Identifies individuals based on unique biological traits

Face, iris, retina, finger, thumb, hand, voice recognition

Highly secure, difficult to forge or replicate

Expensive technology, privacy concerns, potential false positives or negatives

Worked example

As banks reduce the number of branches due to the increased use of online banking systems, improved security of customer data is needed. Many banks are introducing biometric systems to secure customer data.
Explain, using examples, why biometric systems are more effective than other methods of security.

[3]

Max 2 of:

The biometric data is unique to the person [1]
The biometrics cannot be forgotten/stolen/shared like passwords [1]
The person needs to be present to enter the data [1]
Difficult to replicate/forge / fake/duplicate [1]

Award 1 mark for any 2 examples:

Examples: fingerprint/palm print / facial recognition/hand geometry/iris / retina scan/voice [1]

How does RFID work?

  • RFID Tags

    • RFID stands for Radio Frequency Identification. It refers to a technology that uses radio waves to identify and track objects. This system includes RFID tags, which can be attached to objects and contains information about them

  • Components of RFID Tags

    • RFID tags consist of an integrated circuit (IC) and an antenna. The IC is responsible for storing and processing information, while the antenna receives and transmits the signal

  • Passive RFID Tags

    • Passive RFID tags do not have a power supply. They get their power from the electromagnetic energy transmitted by the RFID reader

    • When the RFID reader emits radio waves, these waves are picked up by the passive tag's antenna

    • The energy from the waves is converted into electrical energy, which powers the IC

    • The IC then transmits the stored information back to the reader via the antenna, again using radio waves

  • Active RFID Tags

    • Unlike passive tags, active RFID tags have their power source, which is usually a battery. This allows them to broadcast a signal to the reader actively, making them more powerful and capable of being read from a greater distance

    • Active tags emit a signal which is picked up by the RFID reader. They don't require the reader's signal to activate them, unlike passive tags
  • Radio Waves

    • Both passive and active RFID systems operate by utilising radio waves for communication

    • The RFID reader transmits radio waves, which are captured by the RFID tag's antenna in the case of passive tags, or directly interact with the active tags' signal

    • The frequency of these radio waves can vary and is generally divided into low-frequency (LF), high-frequency (HF), and ultra-high-frequency (UHF) RFID systems. The choice of frequency impacts the reading distance, speed of data transfer, and ability to penetrate different materials

  • Antennas

    • The antennas in the RFID system are crucial for the communication between the tag and the reader

    • In passive RFID tags, the antenna receives the signal from the reader, powers the IC, and then transmits the tag's information back to the reader

    • In active RFID tags, the antenna is responsible for emitting the signal that carries the tag's information to the reader

  • Communication with RFID Reader

    • The RFID reader emits radio waves, which are either captured by the passive tag or interact with the active tag's signal. The reader then receives the information transmitted by the tag's IC through the tag's antenna. This information can be used to identify and track the tagged object

Worked example

A farmer has purchased a computerised feeding system for her goats. A goat has an RFID tag
attached to its ear, which is recognised by the computer. The system uses a passive RFID tag.
a. Describe how the RFID tag can be activated.

[3]

3 of:

The RFID reader sends radio waves / signals to the RFID antenna in the tag [1]
The tag sends radio wave/signal back to the reader [1]
The radio waves move from the tag’s antenna to the microchip [1]
A signal is generated and sent back to the RF system [1]
The RF wave is detected by the reader which interprets the data [1]

The system recognises the goat and therefore gives the correct feed to the animal.
b. Describe how RFID technology will be used to give the correct feed to the animal.

[3]

3 of:

The goat passes the RFID reader [1]
The RFID reader extracts data from the tag [1]
The ID is compared with data stored in the database [1]
The feed for the goat is then selected/identified / read from the database [1]

Exam Tip

  • When talking about where data is stored, be specific and don't just say 'in the computer/system'. The example above the data is stored in a database

What is Near Field Communication (NFC)?

It's a technology that allows two devices to communicate when they're very close together, typically within a few centimetres. This is the same tech that allows you to make payments by tapping your phone or card on a payment terminal.

  • Two Modes of Operation

    • NFC works in two modes - reader/writer mode (for reading tags in NFC posters, for example) and peer-to-peer mode (for exchanging data between two NFC devices)

  • Power Source

    • NFC devices can be either passive or active. Active devices, like smartphones, can both send and receive data. Passive devices, like NFC tags, don't have their own power source and can only send data when they come close to an active device

  • Communication

    • Communication between NFC devices happens through radio waves. When two NFC devices get close, one sends radio waves that the other can pick up, allowing them to exchange information

  • Usage

    • NFC enables payment for things at the shop by tapping a phone on the terminal, share files by bringing two phones close together, and use a phone as a bus or train ticket

  • Security

    • Because NFC only works over a short range, it's generally secure. But it's always good to be aware that any wireless communication could potentially be intercepted, so it's important to only use NFC for secure transactions with trusted devices

You've read 0 of your 0 free revision notes

Get unlimited access

to absolutely everything:

  • Downloadable PDFs
  • Unlimited Revision Notes
  • Topic Questions
  • Past Papers
  • Model Answers
  • Videos (Maths and Science)

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Did this page help you?

Becci Peters

Author: Becci Peters

Becci has been a passionate Computing teacher for over 9 years, teaching Computing across the UK helping to engage, interest and develop confidence in the subject at all levels. Working as a Head of Department and then as an educational consultant, Becci has advised schools in England, where her role was to support and coach teachers to improve Computing teaching for all. Becci is also a senior examiner for multiple exam boards covering GCSE & A-level. She has worked as a lecturer at a university, lecturing trainee teachers for Computing.