SlideShare a Scribd company logo
WONG Ho Yan 
12209813 
October 27, 2014
Introduction 
of RFID 
Applications Survey results 
Future 
development 
and 
opportunities 
Conclusions
 RFID = Radio Frequency Identification 
 Electronic labeling and wireless identification 
of objects using radio frequency 
 Tag carries with its information 
 a serial number 
 Model number 
 Color or any other imaginable data 
 When these tags pass through a field generated 
by a compatible reader, they transmit this 
information back to the reader, thereby 
identifying the object
 A basic RFID system consists of these 
components: 
 A programmable RFID tag/inlay for storing item 
data; 
 Consisting of an RFID chip for data storage 
 an antenna to facilitate communication with the RFID 
chip 
 A reader/antenna system to interrogate the 
RFID inlay 
 Application software and a host computer 
system
 The RFID tag consists of an integrated circuit 
(IC) embedded in a thin film medium. 
 Information stored in the memory of the RFID 
chip is transmitted by the antenna circuit 
embedded in the RFID inlay via radio 
frequencies, to an RFID reader 
 3 types 
 Passive 
 Semi-passive 
 Active
Active Tags 
•Use a battery 
• communicate over 
distances of several 
meters 
Semi-passive Tags 
•Contain built-in 
batteries to power 
the chip’s circuitry, 
resist interference 
and circumvent a 
lack of power from 
the reader signal 
due to long distance. 
• They are different 
from active tags in 
that they only 
transmit data at the 
time a response is 
received 
Passive Tags 
• Derive their power 
from the field 
generated by the 
reader 
• without having an 
active transmitter to 
transfer the 
information stored
Frequency Appx. Read 
Range 
Data Speed Cost of 
Tags 
Application 
Low Frequency 
(125kHz) 
<5cm 
(passive) 
Low High • Animal Identification 
• Access Control 
High Frequency 
(13.56 Mhz) 
10 cm – 1m 
(passive) 
Low to Moderate Medium 
to Low 
• Smart Cards 
• Payment (paywave) 
Ultra High 
Frequency (433, 868- 
928 Mhz) 
3m -7m 
(passive) 
Moderate to High Low • Logistics and Supply Chain 
• Baggage Tracking 
Microwave (2.45 & 
5.8 Ghz) 
10m -15m 
(passive) 
20m – 40m 
(active) 
High High • Electronic toll collection 
(Autotoll) 
• Container Tracking
Application 
Segment 
Representative 
Applications 
Competitive 
Technologies 
Current 
Penetration 
Typical Tag Type 
Access Control Doorway entry Other keyless entry 
technologies 
High Passive 
Asset Tracking Locating tractors 
within a freight 
yard 
None Low Active 
Asset Tagging Tracking 
corporate 
computing 
systems 
Bar Code Low Passive 
Authentication Luxury goods 
counterfeit 
prevention 
Holograms Low Passive 
Baggage Tracking Positive bag 
matching 
Bar Code, Optical 
Character 
Recognition 
Low Passive 
POS Applications SpeedPass Credit Cards, Smart 
Cards, Wireless 
Phones 
Medium Passive 
SCM (Container 
Level) 
Tracking 
containers in 
shipping 
terminals 
GPS-based Systems Low Active 
SCM (Pallet Level) Tracking 
palletized 
shipments 
Bar Code Minimal Active, Passive 
SCM (Item Level) Identifying 
individual items 
Bar Code Minimal Passive 
Vehicle 
Identification 
Electronic toll 
collection 
Bar Code, License 
plate, reader systems 
Medium Active, Passive 
Vehicle 
Immobilizers 
Automotive 
ignition systems 
Other theft 
prevention 
technologies 
High Passive
Types of industries that respondents think 
it is possible to apply RFID technology 
Inventory Control 
Logistics and Supply Chain 
Management 
20% 
Library Management 
21% 
Pharmaceutic 
manufacturing 
industries 
15% 
10% 
Document Management 
8% 
Security 
8% 
Customer Services 
5% 
Hotel Management 
5% 
Banking and Finance 
5% 
Social Services 
3% 
Other 
18%
http://youtu.be/eob532iEpqk 
I don’t why the embed code is not working, even after 
changing the words.
12209813 pss7

More Related Content

What's hot

RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
christy LEE
 
Rfid application
Rfid applicationRfid application
Rfid application
kcy523
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
13215221
 
14218631 pss7
14218631 pss714218631 pss7
14218631 pss7
ecect
 
15215075 pss7
15215075 pss715215075 pss7
15215075 pss7
amylsy
 
13212613 pss7
13212613 pss713212613 pss7
13212613 pss7andychun
 
15216683 pss7
15216683 pss715216683 pss7
15216683 pss7
ngyeukman
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Chi Yan TSE
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15200736
 
RFID application
RFID applicationRFID application
RFID application
Wissely Cheung
 
13213962 pss7
13213962 pss713213962 pss7
13213962 pss7
13213962
 
15215225 pss7
15215225 pss715215225 pss7
15215225 pss7
15216225
 
13203487 pps7
13203487 pps713203487 pps7
13203487 pps7
13203487
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
Hui Tin Yan
 
RFID Application
RFID ApplicationRFID Application
RFID Application
lhcdenise
 
13209116 pss7
13209116 pss713209116 pss7
13209116 pss7
calvin6c05
 

What's hot (19)

RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
Rfid application
Rfid applicationRfid application
Rfid application
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
 
14218631 pss7
14218631 pss714218631 pss7
14218631 pss7
 
13200712 pss7
13200712 pss713200712 pss7
13200712 pss7
 
15215075 pss7
15215075 pss715215075 pss7
15215075 pss7
 
13212613 pss7
13212613 pss713212613 pss7
13212613 pss7
 
15216683 pss7
15216683 pss715216683 pss7
15216683 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13209000 pss7
13209000 pss713209000 pss7
13209000 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID application
RFID applicationRFID application
RFID application
 
13213962 pss7
13213962 pss713213962 pss7
13213962 pss7
 
15215225 pss7
15215225 pss715215225 pss7
15215225 pss7
 
13203487 pps7
13203487 pps713203487 pps7
13203487 pps7
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13209833 pss7
13209833 pss713209833 pss7
13209833 pss7
 
13209116 pss7
13209116 pss713209116 pss7
13209116 pss7
 

Similar to 12209813 pss7

14225077 pss7
14225077 pss7 14225077 pss7
14225077 pss7
123wwcc
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
13215221
 
RFID Application
RFID ApplicationRFID Application
RFID Application
yuewingyan
 
RFID and its application
RFID and its applicationRFID and its application
RFID and its application
pangszeming
 
13252399 pss7
13252399 pss713252399 pss7
13252399 pss7
Jingwen MAI
 
RFID Applicaiton
RFID ApplicaitonRFID Applicaiton
RFID Applicaiton
KKKKay
 
15209687 pss7
15209687 pss715209687 pss7
15209687 pss7
15209687
 
RFID Application
RFID ApplicationRFID Application
RFID Application
lau_hkbu
 
13209922 pss7
13209922 pss713209922 pss7
13209922 pss713209922
 
15220117 pss7
15220117 pss715220117 pss7
15220117 pss7
15220117
 
15224147 pss7
15224147 pss715224147 pss7
15224147 pss7
kiko ip
 
RFID Application
RFID ApplicationRFID Application
RFID Application
debby Li
 
13200828 pps7
13200828 pps713200828 pps7
13200828 pps713200828
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15217639
 
15226662 pss 7
15226662 pss 715226662 pss 7
15226662 pss 7
Lok Hin NG
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
15225763
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
Vincent Hui
 

Similar to 12209813 pss7 (18)

14225077 pss7
14225077 pss7 14225077 pss7
14225077 pss7
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID and its application
RFID and its applicationRFID and its application
RFID and its application
 
Money
MoneyMoney
Money
 
13252399 pss7
13252399 pss713252399 pss7
13252399 pss7
 
RFID Applicaiton
RFID ApplicaitonRFID Applicaiton
RFID Applicaiton
 
15209687 pss7
15209687 pss715209687 pss7
15209687 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13209922 pss7
13209922 pss713209922 pss7
13209922 pss7
 
15220117 pss7
15220117 pss715220117 pss7
15220117 pss7
 
15224147 pss7
15224147 pss715224147 pss7
15224147 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13200828 pps7
13200828 pps713200828 pps7
13200828 pps7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15226662 pss 7
15226662 pss 715226662 pss 7
15226662 pss 7
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

12209813 pss7

  • 1. WONG Ho Yan 12209813 October 27, 2014
  • 2. Introduction of RFID Applications Survey results Future development and opportunities Conclusions
  • 3.  RFID = Radio Frequency Identification  Electronic labeling and wireless identification of objects using radio frequency  Tag carries with its information  a serial number  Model number  Color or any other imaginable data  When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4.  A basic RFID system consists of these components:  A programmable RFID tag/inlay for storing item data;  Consisting of an RFID chip for data storage  an antenna to facilitate communication with the RFID chip  A reader/antenna system to interrogate the RFID inlay  Application software and a host computer system
  • 5.  The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium.  Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader  3 types  Passive  Semi-passive  Active
  • 6. Active Tags •Use a battery • communicate over distances of several meters Semi-passive Tags •Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. • They are different from active tags in that they only transmit data at the time a response is received Passive Tags • Derive their power from the field generated by the reader • without having an active transmitter to transfer the information stored
  • 7. Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868- 928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 8. Application Segment Representative Applications Competitive Technologies Current Penetration Typical Tag Type Access Control Doorway entry Other keyless entry technologies High Passive Asset Tracking Locating tractors within a freight yard None Low Active Asset Tagging Tracking corporate computing systems Bar Code Low Passive Authentication Luxury goods counterfeit prevention Holograms Low Passive Baggage Tracking Positive bag matching Bar Code, Optical Character Recognition Low Passive POS Applications SpeedPass Credit Cards, Smart Cards, Wireless Phones Medium Passive SCM (Container Level) Tracking containers in shipping terminals GPS-based Systems Low Active SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive SCM (Item Level) Identifying individual items Bar Code Minimal Passive Vehicle Identification Electronic toll collection Bar Code, License plate, reader systems Medium Active, Passive Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive
  • 9. Types of industries that respondents think it is possible to apply RFID technology Inventory Control Logistics and Supply Chain Management 20% Library Management 21% Pharmaceutic manufacturing industries 15% 10% Document Management 8% Security 8% Customer Services 5% Hotel Management 5% Banking and Finance 5% Social Services 3% Other 18%
  • 10. http://youtu.be/eob532iEpqk I don’t why the embed code is not working, even after changing the words.