SlideShare a Scribd company logo
1 of 15
Download to read offline
RFID APPLICATION 
L E E C H U N G WI N G 
1 4 2 1 8 3 4 8 
1 7 O C TO B E R 2 0 1 4
CONTENTS 
Introduction of 
RFID 
Applications 
Survey 
Results 
Future 
development 
and 
opportunities 
Conclusion
RFID 
RFID = Radio Frequency Identification 
Electronic labeling and wireless identification of objects using radio 
frequency 
Tag carries with its information 
 a serial number 
 Model number 
 Color or any other imaginable data 
When these tags pass through a field generated by a compatible reader, 
they transmit this information back to the reader, thereby identifying the 
object
RFID COMPONENTS 
A basic RFID system consists of these components: 
 A programmable RFID tag/inlay for storing item data; consisting of 
 an RFID chip for data storage 
 an antenna to facilitate communication with the RFID chip 
 A reader/antenna system to interrogate the RFID inlay 
 Application software and a host computer system
RFID TAG 
The RFID tag consists of an integrated circuit (IC) embedded in a thin film 
medium. 
Information stored in the memory of the RFID chip is transmitted by the 
antenna circuit embedded in the RFID inlay via radio frequencies, to an 
RFID reader 
3 types 
 Passive 
 Semi-passive 
 Active
TYPES OF RFID TAGS
APPLICATIONS 
Frequency Appx. Read 
Range 
Data Speed Cost of Tags Application 
Low Frequency (125kHz) <5cm 
(passive) 
Low High • Animal Identification 
• Access Control 
High Frequency (13.56 Mhz) 10 cm – 1m 
(passive) 
Low to Moderate Medium to Low • Smart Cards 
• Payment (paywave) 
Ultra High Frequency (433, 868-928 
Mhz) 
3m -7m 
(passive) 
Moderate to High Low • Logistics and Supply Chain 
• Baggage Tracking 
Microwave (2.45 & 5.8 Ghz) 10m -15m 
(passive) 
20m – 40m 
(active) 
High High • Electronic toll collection (Autotoll) 
• Container Tracking
CURRENT APPLICATIONS 
Application Segment Representative Applications Competitive Technologies Current 
Penetration 
Typical Tag 
Type 
Access Control Doorway entry Other keyless entry technologies High Passive 
Asset Tracking Locating tractors within a freight yard None Low Active 
Asset Tagging Tracking corporate computing systems Bar Code Low Passive 
Authentication Luxury goods counterfeit prevention Holograms Low Passive 
Baggage Tracking Positive bag matching Bar Code, Optical Character 
Recognition 
Low Passive 
POS Applications SpeedPass Credit Cards, Smart Cards, 
Wireless Phones 
Medium Passive 
SCM (Container Level) Tracking containers in shipping terminals GPS-based Systems Low Active 
SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive 
SCM (Item Level) Identifying individual items Bar Code Minimal Passive 
Vehicle Identification Electronic toll collection Bar Code, License plate, reader 
systems 
Medium Active, Passive 
Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive
APPLICATIONS 
Credit Cards with RFID 
(Paywave function) 
Octopus (Smart Card)
APPLICATIONS 
Autotoll (Electronic toll collection) 
Access Control
ONLINE SURVEY 
Target: SME 
Information: Opinion on RFID and its applications 
Site: 
 http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
SURVEY RESULT 
Types of industries that respondents think 
it is possible to apply RFID technology 
Logistics and Supply Chain 
Management 
20% 
Library Management 
Pharmaceutic 
manufacturing industries 
15% 
21% 
Inventory Control 
10% 
Document Management 
8% 
Security 
8% 
Customer Services 
5% 
Hotel Management 
5% 
Banking and Finance 
5% 
Social Services 
3% 
Other 
18%
FURTHER DEVELOPMENT 
In medical uses and library management
VIDEO
CONCLUSION 
Positive 
 RFID is a contactless reading technology and can read through other materials 
 Hold more data than barcode does 
 RFID tags data can be changed or added 
 More effective, bring lots of convenience to us 
Negative 
 Cost is relatively remain high (compare to barcode) 
 RFID signals may have problems with some materials 
 RFID standards are still being developed

More Related Content

What's hot

Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyEmma___
 
Rfid application
Rfid applicationRfid application
Rfid applicationkcy523
 
12209813 pss7
12209813 pss712209813 pss7
12209813 pss712209813
 
RFID Application
RFID ApplicationRFID Application
RFID ApplicationJeanie Lo
 
14215128 pss7
14215128 pss714215128 pss7
14215128 pss7LamAlice
 
RFID Application
RFID ApplicationRFID Application
RFID Application15250296
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationlee163
 
14221780-pss7
14221780-pss714221780-pss7
14221780-pss7Zoeso
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATIONsarah ho
 
15216683 pss7
15216683 pss715216683 pss7
15216683 pss7ngyeukman
 
14218631 pss7
14218631 pss714218631 pss7
14218631 pss7ecect
 
13203487 pps7
13203487 pps713203487 pps7
13203487 pps713203487
 
14225077 pss7
14225077 pss714225077 pss7
14225077 pss7123wwcc
 
12201375 PSS7
12201375 PSS712201375 PSS7
12201375 PSS712201375
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationlau_hkbu
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss713215221
 

What's hot (20)

Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Rfid application
Rfid applicationRfid application
Rfid application
 
12209813 pss7
12209813 pss712209813 pss7
12209813 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
14215128 pss7
14215128 pss714215128 pss7
14215128 pss7
 
14253828 pss7
14253828 pss714253828 pss7
14253828 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
Money
MoneyMoney
Money
 
14221780-pss7
14221780-pss714221780-pss7
14221780-pss7
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
 
13209833 pss7
13209833 pss713209833 pss7
13209833 pss7
 
15216683 pss7
15216683 pss715216683 pss7
15216683 pss7
 
14218631 pss7
14218631 pss714218631 pss7
14218631 pss7
 
13203487 pps7
13203487 pps713203487 pps7
13203487 pps7
 
14225077 pss7
14225077 pss714225077 pss7
14225077 pss7
 
12201375 PSS7
12201375 PSS712201375 PSS7
12201375 PSS7
 
13200712 pss7
13200712 pss713200712 pss7
13200712 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
 

Similar to RFID Applications and Future Opportunities

RFID Application
RFID ApplicationRFID Application
RFID Applicationyuewingyan
 
14225077 pss7
14225077 pss7 14225077 pss7
14225077 pss7 123wwcc
 
RFID and its application
RFID and its applicationRFID and its application
RFID and its applicationpangszeming
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationlhcdenise
 
13203223 pss7
13203223 pss713203223 pss7
13203223 pss7vbmrming
 
RFID Application
RFID ApplicationRFID Application
RFID ApplicationMatt Hin
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationelenaleelee
 
15217388 pss7
15217388 pss715217388 pss7
15217388 pss7tsf1014
 
15215075 pss7
15215075 pss715215075 pss7
15215075 pss7amylsy
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationwingki
 
13214934 pss7
13214934 pss713214934 pss7
13214934 pss713214934
 
RFID Application
RFID ApplicationRFID Application
RFID ApplicationRimoFan
 
RFID Application
RFID ApplicationRFID Application
RFID Application15217639
 
RFID Application
RFID ApplicationRFID Application
RFID Application15200736
 
13250752 pss7
13250752 pss713250752 pss7
13250752 pss7Wendytt
 
RDIF Application
RDIF ApplicationRDIF Application
RDIF Application15219518
 

Similar to RFID Applications and Future Opportunities (20)

RFID Application
RFID ApplicationRFID Application
RFID Application
 
14225077 pss7
14225077 pss7 14225077 pss7
14225077 pss7
 
RFID and its application
RFID and its applicationRFID and its application
RFID and its application
 
RFID
RFIDRFID
RFID
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13203223 pss7
13203223 pss713203223 pss7
13203223 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15217388 pss7
15217388 pss715217388 pss7
15217388 pss7
 
15215075 pss7
15215075 pss715215075 pss7
15215075 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID application
RFID applicationRFID application
RFID application
 
13214993 pss-7
13214993 pss-713214993 pss-7
13214993 pss-7
 
13214934 pss7
13214934 pss713214934 pss7
13214934 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15224066 pss7
15224066 pss715224066 pss7
15224066 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13250752 pss7
13250752 pss713250752 pss7
13250752 pss7
 
RDIF Application
RDIF ApplicationRDIF Application
RDIF Application
 

Recently uploaded

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Recently uploaded (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

RFID Applications and Future Opportunities

  • 1. RFID APPLICATION L E E C H U N G WI N G 1 4 2 1 8 3 4 8 1 7 O C TO B E R 2 0 1 4
  • 2. CONTENTS Introduction of RFID Applications Survey Results Future development and opportunities Conclusion
  • 3. RFID RFID = Radio Frequency Identification Electronic labeling and wireless identification of objects using radio frequency Tag carries with its information  a serial number  Model number  Color or any other imaginable data When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID COMPONENTS A basic RFID system consists of these components:  A programmable RFID tag/inlay for storing item data; consisting of  an RFID chip for data storage  an antenna to facilitate communication with the RFID chip  A reader/antenna system to interrogate the RFID inlay  Application software and a host computer system
  • 5. RFID TAG The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium. Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader 3 types  Passive  Semi-passive  Active
  • 7. APPLICATIONS Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 8. CURRENT APPLICATIONS Application Segment Representative Applications Competitive Technologies Current Penetration Typical Tag Type Access Control Doorway entry Other keyless entry technologies High Passive Asset Tracking Locating tractors within a freight yard None Low Active Asset Tagging Tracking corporate computing systems Bar Code Low Passive Authentication Luxury goods counterfeit prevention Holograms Low Passive Baggage Tracking Positive bag matching Bar Code, Optical Character Recognition Low Passive POS Applications SpeedPass Credit Cards, Smart Cards, Wireless Phones Medium Passive SCM (Container Level) Tracking containers in shipping terminals GPS-based Systems Low Active SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive SCM (Item Level) Identifying individual items Bar Code Minimal Passive Vehicle Identification Electronic toll collection Bar Code, License plate, reader systems Medium Active, Passive Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive
  • 9. APPLICATIONS Credit Cards with RFID (Paywave function) Octopus (Smart Card)
  • 10. APPLICATIONS Autotoll (Electronic toll collection) Access Control
  • 11. ONLINE SURVEY Target: SME Information: Opinion on RFID and its applications Site:  http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 12. SURVEY RESULT Types of industries that respondents think it is possible to apply RFID technology Logistics and Supply Chain Management 20% Library Management Pharmaceutic manufacturing industries 15% 21% Inventory Control 10% Document Management 8% Security 8% Customer Services 5% Hotel Management 5% Banking and Finance 5% Social Services 3% Other 18%
  • 13. FURTHER DEVELOPMENT In medical uses and library management
  • 14. VIDEO
  • 15. CONCLUSION Positive  RFID is a contactless reading technology and can read through other materials  Hold more data than barcode does  RFID tags data can be changed or added  More effective, bring lots of convenience to us Negative  Cost is relatively remain high (compare to barcode)  RFID signals may have problems with some materials  RFID standards are still being developed