SlideShare a Scribd company logo
RFID & Its Applications
Members:
ABC (1234567)
CDE (12345678)
…
GCIT1015
7 October 2015
Flow of Presentation
Introduction Background Applications Survey results Videos Conclusion
RFID
 RFID = Radio Frequency Identification
 Electronic labeling and wireless identification of
objects using radio frequency
 Tag carries with its information
 a serial number
 Model number
 Color or any other imaginable data
 When these tags pass through a field generated by a
compatible reader, they transmit this information back
to the reader, thereby identifying the object
RFID components
 A basic RFID system consists of these components:
 A programmable RFID tag/inlay for storing item data;
 Consisting of an RFID chip for data storage
 an antenna to facilitate communication with the RFID chip
 A reader/antenna system to interrogate the RFID inlay
 Application software and a host computer system
RFID Tag
 The RFID tag consists of an integrated circuit (IC)
embedded in a thin film medium.
 Information stored in the memory of the RFID chip is
transmitted by the antenna circuit embedded in the
RFID inlay via radio frequencies, to an RFID reader
 3 types
 Passive
 Semi-passive
 Active
Types of RFID Tags
Active Tags
•Use a battery
•communicate
over distances of
several meters
Semi-passive Tags
•Contain built-in
batteries to power
the chip’s
circuitry, resist
interference and
circumvent a lack
of power from the
reader signal due
to long distance.
•They are different
from active tags
in that they only
transmit data at
the time a
response is
received
Passive Tags
•Derive their power
from the field
generated by the
reader
•without having an
active transmitter
to transfer the
information stored
Applications
Frequency Appx. Read
Range
Data Speed Cost of
Tags
Application
Low Frequency
(125kHz)
<5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency
(13.56 Mhz)
10 cm – 1m
(passive)
Low to
Moderate
Mediu
m to
Low
• Smart Cards
• Payment (paywave)
Ultra High
Frequency (433,
868-928 Mhz)
3m -7m
(passive)
Moderate to
High
Low • Logistics and Supply
Chain
• Baggage Tracking
Microwave (2.45
& 5.8 Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll collection
(Autotoll)
• Container Tracking
Current Applications
Application Segment Representative
Applications
Competitive
Technologies
Current
Penetration
Typical Tag Type
Access Control Doorway entry Other keyless entry
technologies
High Passive
Asset Tracking Locating tractors
within a freight yard
None Low Active
Asset Tagging Tracking corporate
computing systems
Bar Code Low Passive
Authentication Luxury goods
counterfeit
prevention
Holograms Low Passive
Baggage Tracking Positive bag
matching
Bar Code, Optical
Character Recognition
Low Passive
POS Applications SpeedPass Credit Cards, Smart
Cards, Wireless Phones
Medium Passive
SCM (Container Level) Tracking containers
in shipping terminals
GPS-based Systems Low Active
SCM (Pallet Level) Tracking palletized
shipments
Bar Code Minimal Active, Passive
SCM (Item Level) Identifying
individual items
Bar Code Minimal Passive
Vehicle Identification Electronic toll
collection
Bar Code, License
plate, reader systems
Medium Active, Passive
Vehicle Immobilizers Automotive ignition
systems
Other theft prevention
technologies
High Passive
Applications
Credit Cards with RFID
(Paywave function)
Octopus (Smart Card)
Applications
Autotoll (Electronic toll collection)
Access Control
Online Survey
 Target: SME
 Information: Opinion on RFID and its applications
 Site:
 http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
Survey Result
Enhanced
customer
satisfaction
Improved
efficiency
Increased
inventory turnover
rate
Reduced
manpower
Reduced total
cost
0
2
0
2
1
0
2
1
3
0
1 1
0
1
0
3
4 4 4 4
Benefits of using RFID in different industries
Manufacturing Retailing Transportation Warehousing
Further Development
 In medical uses and library management
Video
Conclusion
 Positive
 RFID is a contactless reading technology and can read through other
materials
 Hold more data than barcode does
 RFID tags data can be changed or added
 More effective, bring lots of convenience to us
 Negative
 Cost is relatively remain high (compare to barcode)
 RFID signals may have problems with some materials
 RFID standards are still being developed

More Related Content

What's hot

RFID Application
RFID ApplicationRFID Application
RFID Application
lhcdenise
 
Smart watch
Smart watch Smart watch
Smart watch
Arthur Cheung
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7kwokyy
 
15215075 pss7
15215075 pss715215075 pss7
15215075 pss7
amylsy
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Chi Yan TSE
 
15224147 pss7
15224147 pss715224147 pss7
15224147 pss7
kiko ip
 
14218534 pss7.ppt
14218534 pss7.ppt14218534 pss7.ppt
14218534 pss7.ppt
jessica wong
 
15224554 pss7
15224554 pss715224554 pss7
15224554 pss7
navidmak1122
 
13209116 pss7
13209116 pss713209116 pss7
13209116 pss7
calvin6c05
 
RDIF Application
RDIF ApplicationRDIF Application
RDIF Application
15219518
 
RFID Application
RFID ApplicationRFID Application
RFID Application
nkwing302
 
15215225 pss7
15215225 pss715215225 pss7
15215225 pss7
15216225
 
13252399 pss7
13252399 pss713252399 pss7
13252399 pss7
Jingwen MAI
 
13250442 pss7
13250442 pss713250442 pss7
13250442 pss7
13250442
 
RFID Application
RFID ApplicationRFID Application
RFID Application
isabellalee0630
 
RFID Application
RFID ApplicationRFID Application
RFID Application
RimoFan
 
RFID
RFIDRFID
RFID
nkwing302
 
13210696 pss7
13210696 pss713210696 pss7
13210696 pss7
13210696
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15217639
 

What's hot (20)

RFID Application
RFID ApplicationRFID Application
RFID Application
 
Smart watch
Smart watch Smart watch
Smart watch
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7
 
15215075 pss7
15215075 pss715215075 pss7
15215075 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15224147 pss7
15224147 pss715224147 pss7
15224147 pss7
 
14218534 pss7.ppt
14218534 pss7.ppt14218534 pss7.ppt
14218534 pss7.ppt
 
15224554 pss7
15224554 pss715224554 pss7
15224554 pss7
 
13210939 pss7
13210939 pss713210939 pss7
13210939 pss7
 
13209116 pss7
13209116 pss713209116 pss7
13209116 pss7
 
RDIF Application
RDIF ApplicationRDIF Application
RDIF Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15215225 pss7
15215225 pss715215225 pss7
15215225 pss7
 
13252399 pss7
13252399 pss713252399 pss7
13252399 pss7
 
13250442 pss7
13250442 pss713250442 pss7
13250442 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID
RFIDRFID
RFID
 
13210696 pss7
13210696 pss713210696 pss7
13210696 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 

Viewers also liked

Survey analysis xi e
Survey analysis xi eSurvey analysis xi e
Survey analysis xi e
ARTI CHOPRA
 
Cosmetic dentistry
Cosmetic dentistryCosmetic dentistry
Cosmetic dentistry
dentalavenue
 
Ana Júlia Evlyn e Vitor - Mc Donalds Perguntas
Ana Júlia Evlyn e Vitor - Mc Donalds PerguntasAna Júlia Evlyn e Vitor - Mc Donalds Perguntas
Ana Júlia Evlyn e Vitor - Mc Donalds Perguntas
Eruditos2a
 
The evolution of optical wavelength bands
The evolution of optical wavelength bandsThe evolution of optical wavelength bands
The evolution of optical wavelength bands
cheer9284
 
Amanda Beatriz e Rafaela - Apple
Amanda Beatriz e Rafaela - AppleAmanda Beatriz e Rafaela - Apple
Amanda Beatriz e Rafaela - Apple
Eruditos2a
 
Caroline Eduarda e Marina - Nestlé Perguntas
Caroline Eduarda e Marina - Nestlé PerguntasCaroline Eduarda e Marina - Nestlé Perguntas
Caroline Eduarda e Marina - Nestlé Perguntas
Eruditos2a
 
Powerpointpresentation
PowerpointpresentationPowerpointpresentation
Powerpointpresentation
sreechithras
 
Caroline Eduarda e Marina - Nestlé
Caroline Eduarda e Marina - NestléCaroline Eduarda e Marina - Nestlé
Caroline Eduarda e Marina - Nestlé
Eruditos2a
 
Dental Bridges
Dental BridgesDental Bridges
Dental Bridges
dentalavenue
 
Gregory e Raul - Nike
Gregory e Raul - NikeGregory e Raul - Nike
Gregory e Raul - Nike
Eruditos2a
 
João, Luiz e Misael gibson perguntas
João, Luiz e Misael gibson perguntasJoão, Luiz e Misael gibson perguntas
João, Luiz e Misael gibson perguntas
Eruditos2a
 

Viewers also liked (16)

Survey analysis xi e
Survey analysis xi eSurvey analysis xi e
Survey analysis xi e
 
Cosmetic dentistry
Cosmetic dentistryCosmetic dentistry
Cosmetic dentistry
 
Ana Júlia Evlyn e Vitor - Mc Donalds Perguntas
Ana Júlia Evlyn e Vitor - Mc Donalds PerguntasAna Júlia Evlyn e Vitor - Mc Donalds Perguntas
Ana Júlia Evlyn e Vitor - Mc Donalds Perguntas
 
TGS15 tune out gyro
TGS15 tune out gyroTGS15 tune out gyro
TGS15 tune out gyro
 
The evolution of optical wavelength bands
The evolution of optical wavelength bandsThe evolution of optical wavelength bands
The evolution of optical wavelength bands
 
sumit_NEW
sumit_NEWsumit_NEW
sumit_NEW
 
COMPANY PROFILE- SWEATERSINDIA
COMPANY PROFILE- SWEATERSINDIACOMPANY PROFILE- SWEATERSINDIA
COMPANY PROFILE- SWEATERSINDIA
 
Amanda Beatriz e Rafaela - Apple
Amanda Beatriz e Rafaela - AppleAmanda Beatriz e Rafaela - Apple
Amanda Beatriz e Rafaela - Apple
 
Caroline Eduarda e Marina - Nestlé Perguntas
Caroline Eduarda e Marina - Nestlé PerguntasCaroline Eduarda e Marina - Nestlé Perguntas
Caroline Eduarda e Marina - Nestlé Perguntas
 
Powerpointpresentation
PowerpointpresentationPowerpointpresentation
Powerpointpresentation
 
Caroline Eduarda e Marina - Nestlé
Caroline Eduarda e Marina - NestléCaroline Eduarda e Marina - Nestlé
Caroline Eduarda e Marina - Nestlé
 
Dental Bridges
Dental BridgesDental Bridges
Dental Bridges
 
scanned d0cuments
scanned d0cumentsscanned d0cuments
scanned d0cuments
 
6
66
6
 
Gregory e Raul - Nike
Gregory e Raul - NikeGregory e Raul - Nike
Gregory e Raul - Nike
 
João, Luiz e Misael gibson perguntas
João, Luiz e Misael gibson perguntasJoão, Luiz e Misael gibson perguntas
João, Luiz e Misael gibson perguntas
 

Similar to 15214087 pss7-ans

13211110 pss7
13211110 pss713211110 pss7
13211110 pss7kwokyy
 
15220117 pss7
15220117 pss715220117 pss7
15220117 pss7
15220117
 
15216683 pss7
15216683 pss715216683 pss7
15216683 pss7
ngyeukman
 
RFID Application
RFID ApplicationRFID Application
RFID Application
debby Li
 
13213962 pss7
13213962 pss713213962 pss7
13213962 pss7
13213962
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
13215221
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
13215221
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
15225763
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7cypfiona
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7cypfiona
 
RFID Application
RFID ApplicationRFID Application
RFID Application
wingki
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Matt Hin
 
RFID Application
RFID ApplicationRFID Application
RFID Application
shirley Leung
 

Similar to 15214087 pss7-ans (16)

13211110 pss7
13211110 pss713211110 pss7
13211110 pss7
 
15220117 pss7
15220117 pss715220117 pss7
15220117 pss7
 
15216683 pss7
15216683 pss715216683 pss7
15216683 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13213962 pss7
13213962 pss713213962 pss7
13213962 pss7
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
 
13200712 pss7
13200712 pss713200712 pss7
13200712 pss7
 
13209833 pss7
13209833 pss713209833 pss7
13209833 pss7
 
13207121 pss7
13207121 pss713207121 pss7
13207121 pss7
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

15214087 pss7-ans

  • 1. RFID & Its Applications Members: ABC (1234567) CDE (12345678) … GCIT1015 7 October 2015
  • 2. Flow of Presentation Introduction Background Applications Survey results Videos Conclusion
  • 3. RFID  RFID = Radio Frequency Identification  Electronic labeling and wireless identification of objects using radio frequency  Tag carries with its information  a serial number  Model number  Color or any other imaginable data  When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID components  A basic RFID system consists of these components:  A programmable RFID tag/inlay for storing item data;  Consisting of an RFID chip for data storage  an antenna to facilitate communication with the RFID chip  A reader/antenna system to interrogate the RFID inlay  Application software and a host computer system
  • 5. RFID Tag  The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium.  Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader  3 types  Passive  Semi-passive  Active
  • 6. Types of RFID Tags Active Tags •Use a battery •communicate over distances of several meters Semi-passive Tags •Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. •They are different from active tags in that they only transmit data at the time a response is received Passive Tags •Derive their power from the field generated by the reader •without having an active transmitter to transfer the information stored
  • 7. Applications Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Mediu m to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 8. Current Applications Application Segment Representative Applications Competitive Technologies Current Penetration Typical Tag Type Access Control Doorway entry Other keyless entry technologies High Passive Asset Tracking Locating tractors within a freight yard None Low Active Asset Tagging Tracking corporate computing systems Bar Code Low Passive Authentication Luxury goods counterfeit prevention Holograms Low Passive Baggage Tracking Positive bag matching Bar Code, Optical Character Recognition Low Passive POS Applications SpeedPass Credit Cards, Smart Cards, Wireless Phones Medium Passive SCM (Container Level) Tracking containers in shipping terminals GPS-based Systems Low Active SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive SCM (Item Level) Identifying individual items Bar Code Minimal Passive Vehicle Identification Electronic toll collection Bar Code, License plate, reader systems Medium Active, Passive Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive
  • 9. Applications Credit Cards with RFID (Paywave function) Octopus (Smart Card)
  • 10. Applications Autotoll (Electronic toll collection) Access Control
  • 11. Online Survey  Target: SME  Information: Opinion on RFID and its applications  Site:  http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 12. Survey Result Enhanced customer satisfaction Improved efficiency Increased inventory turnover rate Reduced manpower Reduced total cost 0 2 0 2 1 0 2 1 3 0 1 1 0 1 0 3 4 4 4 4 Benefits of using RFID in different industries Manufacturing Retailing Transportation Warehousing
  • 13. Further Development  In medical uses and library management
  • 14. Video
  • 15. Conclusion  Positive  RFID is a contactless reading technology and can read through other materials  Hold more data than barcode does  RFID tags data can be changed or added  More effective, bring lots of convenience to us  Negative  Cost is relatively remain high (compare to barcode)  RFID signals may have problems with some materials  RFID standards are still being developed