SlideShare a Scribd company logo
RFID & Its Applications
Member : Cheng Chi Chiu(15224902)
CDE(2345678)
…
GCIT1015
10/7/201
5
Flow of my presentation
Introduction Background Applications
Survey
Results
Video Conclusion
RFID
• RFID = Radio Frequency Identification
• Electronic labeling and wireless identification of objects using
radio frequency
• Tag carries with its information
• a serial number
• Model number
• Color or any other imaginable data
• When these tags pass through a field generated by a compatible
reader, they transmit this information back to the reader,
thereby identifying the object
RFID components
• A basic RFID system consists of these components:
• A programmable RFID tag/inlay for storing item data;
• Consisting of an RFID chip for data storage
• an antenna to facilitate communication with the RFID chip
• A reader/antenna system to interrogate the RFID
inlay
• Application software and a host computer system
RFID Tag
• The RFID tag consists of an integrated circuit (IC)
embedded in a thin film medium.
• Information stored in the memory of the RFID chip is
transmitted by the antenna circuit embedded in the RFID
inlay via radio frequencies, to an RFID reader
• 3 types
• Passive
• Semi-passive
• Active
Types of RFID Tags
Active Tags
• Use a battery
• communicate over
distances of several
meters
Semi-passive Tags
• Contain built-in
batteries to power the
chip’s circuitry, resist
interference and
circumvent a lack of
power from the reader
signal due to long
distance.
• They are different from
active tags in that they
only transmit data at
the time a response is
received
Passive Tags
• Derive their power
from the field
generated by the reader
• without having an
active transmitter to
transfer the
information stored
Applications
Frequency Appx. Read
Range
Data Speed Cost of
Tags
Application
Low Frequency
(125kHz)
<5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency
(13.56 Mhz)
10 cm – 1m
(passive)
Low to Moderate Medium
to Low
• Smart Cards
• Payment (paywave)
Ultra High
Frequency (433,
868-928 Mhz)
3m -7m
(passive)
Moderate to High Low • Logistics and Supply Chain
• Baggage Tracking
Microwave (2.45 &
5.8 Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll collection
(Autotoll)
• Container Tracking
Current Applications
Applications
Credit Cards with RFID
(Paywave function)
Octopus (Smart Card)
Applications
Autotoll (Electronic toll collection)
Access Control
Online Survey
• Target: SME
• Information: Opinion on RFID and its applications
• Site:
• http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyu
Wtsk4
Survey Result
Logistics and Supply Chain
Management
20%
Pharmaceutic
manufacturing
industries
15%
Library Management
21%
Inventory
Control
10%
Document Management
8%
Security
8%
Customer Services
5%
Hotel Management
5%
Banking and Finance
5%
Social Services
3%
Other
18%
Types of industries that respondents think
it is possible to apply RFID technology
Further Development
• In medical uses and library management
Video
Conclusion• Positive
• RFID is a contactless reading technology and can read through other
materials
• Hold more data than barcode does
• RFID tags data can be changed or added
• More effective, bring lots of convenience to us
• Negative
• Cost is relatively remain high (compare to barcode)
• RFID signals may have problems with some materials
• RFID standards are still being developed

More Related Content

What's hot

RFID Application
RFID ApplicationRFID Application
RFID Application
sam995lee
 
14221152 pss7-ans
14221152 pss7-ans14221152 pss7-ans
14221152 pss7-ans
chaahan724
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
Lenox1224
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
ckmsara
 
RFID Application
RFID ApplicationRFID Application
RFID Application
benkalok
 
3D printing
3D printing3D printing
3D printing
noel_cwk
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Jeanie Lo
 
15218473 pss7-ans
15218473 pss7-ans15218473 pss7-ans
15218473 pss7-ans
Fan Lingling
 
15225089 pss7-ans
15225089 pss7-ans15225089 pss7-ans
15225089 pss7-ans
whting
 
15215288 pss7 ans
15215288 pss7 ans15215288 pss7 ans
15215288 pss7 ans
Carol Ko
 
15227049 pss7-ans
15227049 pss7-ans15227049 pss7-ans
15227049 pss7-ans
timothyara
 
15226778 pss7-ans
15226778 pss7-ans15226778 pss7-ans
15226778 pss7-ans
15226778
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
sarah ho
 
15207870 pss7-ans
15207870 pss7-ans15207870 pss7-ans
15207870 pss7-ans
michaelkw
 
15251500 pss7-ans
15251500 pss7-ans15251500 pss7-ans
15251500 pss7-ans
LIULINXUAN
 
RFID Application
RFID ApplicationRFID Application
RFID Application
lee163
 
RFID Application
RFID ApplicationRFID Application
RFID Application
sinwingsuet
 
RFID & Its applications
 RFID & Its applications RFID & Its applications
RFID & Its applications
Group8
 
13207415 pss7
13207415 pss713207415 pss7
13207415 pss7kwuntanki
 

What's hot (19)

RFID Application
RFID ApplicationRFID Application
RFID Application
 
14221152 pss7-ans
14221152 pss7-ans14221152 pss7-ans
14221152 pss7-ans
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
3D printing
3D printing3D printing
3D printing
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15218473 pss7-ans
15218473 pss7-ans15218473 pss7-ans
15218473 pss7-ans
 
15225089 pss7-ans
15225089 pss7-ans15225089 pss7-ans
15225089 pss7-ans
 
15215288 pss7 ans
15215288 pss7 ans15215288 pss7 ans
15215288 pss7 ans
 
15227049 pss7-ans
15227049 pss7-ans15227049 pss7-ans
15227049 pss7-ans
 
15226778 pss7-ans
15226778 pss7-ans15226778 pss7-ans
15226778 pss7-ans
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
 
15207870 pss7-ans
15207870 pss7-ans15207870 pss7-ans
15207870 pss7-ans
 
15251500 pss7-ans
15251500 pss7-ans15251500 pss7-ans
15251500 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID & Its applications
 RFID & Its applications RFID & Its applications
RFID & Its applications
 
13207415 pss7
13207415 pss713207415 pss7
13207415 pss7
 

Viewers also liked

14枚の魅了される神殿の外観写真
14枚の魅了される神殿の外観写真14枚の魅了される神殿の外観写真
14枚の魅了される神殿の外観写真
Japanese translation of More Good Foundation
 
Dl 196 2015 reformas ley de regulación servicios información historial de cré...
Dl 196 2015 reformas ley de regulación servicios información historial de cré...Dl 196 2015 reformas ley de regulación servicios información historial de cré...
Dl 196 2015 reformas ley de regulación servicios información historial de cré...
El Contador SV
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
Floressss
FloressssFloressss
Floressss
Yta Olórtegui
 
EnlightenHealth_8Page_Proof
EnlightenHealth_8Page_ProofEnlightenHealth_8Page_Proof
EnlightenHealth_8Page_ProofLeo Donnan
 
Educ@vo2 no te mates con las mates
Educ@vo2 no te mates con las matesEduc@vo2 no te mates con las mates
Educ@vo2 no te mates con las mates
Ricardo Duran
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
Educ@vo2 no te mates con las mates
Educ@vo2 no te mates con las matesEduc@vo2 no te mates con las mates
Educ@vo2 no te mates con las mates
Ricardo Duran
 
K3lift
K3liftK3lift
PROYECTO DE PLANEACION
PROYECTO DE PLANEACIONPROYECTO DE PLANEACION
PROYECTO DE PLANEACION
edgarvillarreal1988
 
Presentation semantic klmpok 7
Presentation semantic klmpok 7Presentation semantic klmpok 7
Presentation semantic klmpok 7
Madalia
 
Feminism
FeminismFeminism
Feminism
Jonajzg
 

Viewers also liked (14)

SHPE SWC Report
SHPE SWC ReportSHPE SWC Report
SHPE SWC Report
 
14枚の魅了される神殿の外観写真
14枚の魅了される神殿の外観写真14枚の魅了される神殿の外観写真
14枚の魅了される神殿の外観写真
 
Dl 196 2015 reformas ley de regulación servicios información historial de cré...
Dl 196 2015 reformas ley de regulación servicios información historial de cré...Dl 196 2015 reformas ley de regulación servicios información historial de cré...
Dl 196 2015 reformas ley de regulación servicios información historial de cré...
 
Summer Intern
Summer InternSummer Intern
Summer Intern
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
Floressss
FloressssFloressss
Floressss
 
EnlightenHealth_8Page_Proof
EnlightenHealth_8Page_ProofEnlightenHealth_8Page_Proof
EnlightenHealth_8Page_Proof
 
Educ@vo2 no te mates con las mates
Educ@vo2 no te mates con las matesEduc@vo2 no te mates con las mates
Educ@vo2 no te mates con las mates
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
Educ@vo2 no te mates con las mates
Educ@vo2 no te mates con las matesEduc@vo2 no te mates con las mates
Educ@vo2 no te mates con las mates
 
K3lift
K3liftK3lift
K3lift
 
PROYECTO DE PLANEACION
PROYECTO DE PLANEACIONPROYECTO DE PLANEACION
PROYECTO DE PLANEACION
 
Presentation semantic klmpok 7
Presentation semantic klmpok 7Presentation semantic klmpok 7
Presentation semantic klmpok 7
 
Feminism
FeminismFeminism
Feminism
 

Similar to 15224902 pss7-ans

RFID Application
RFID ApplicationRFID Application
RFID Application
Tsangkc1231
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Kayan To
 
15216047 pss7-ans
15216047 pss7-ans15216047 pss7-ans
15216047 pss7-ans
Jaime Lee
 
15216691 pss7-ans
15216691 pss7-ans15216691 pss7-ans
15216691 pss7-ans
jackylou123
 
15223108 pss7
15223108 pss715223108 pss7
15223108 pss7
Jenna Chan
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
15251705
 
15226948 pss7
15226948 pss715226948 pss7
15226948 pss7
NgHoiTungCindy
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
David Zhang
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15216535
 
13200798 pss7
13200798 pss713200798 pss7
13200798 pss7
heiyinyuen
 
13203177 pss7
13203177 pss713203177 pss7
13203177 pss7
heiyinyuen
 

Similar to 15224902 pss7-ans (11)

RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15216047 pss7-ans
15216047 pss7-ans15216047 pss7-ans
15216047 pss7-ans
 
15216691 pss7-ans
15216691 pss7-ans15216691 pss7-ans
15216691 pss7-ans
 
15223108 pss7
15223108 pss715223108 pss7
15223108 pss7
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
 
15226948 pss7
15226948 pss715226948 pss7
15226948 pss7
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13200798 pss7
13200798 pss713200798 pss7
13200798 pss7
 
13203177 pss7
13203177 pss713203177 pss7
13203177 pss7
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

15224902 pss7-ans

  • 1. RFID & Its Applications Member : Cheng Chi Chiu(15224902) CDE(2345678) … GCIT1015 10/7/201 5
  • 2. Flow of my presentation Introduction Background Applications Survey Results Video Conclusion
  • 3. RFID • RFID = Radio Frequency Identification • Electronic labeling and wireless identification of objects using radio frequency • Tag carries with its information • a serial number • Model number • Color or any other imaginable data • When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID components • A basic RFID system consists of these components: • A programmable RFID tag/inlay for storing item data; • Consisting of an RFID chip for data storage • an antenna to facilitate communication with the RFID chip • A reader/antenna system to interrogate the RFID inlay • Application software and a host computer system
  • 5. RFID Tag • The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium. • Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader • 3 types • Passive • Semi-passive • Active
  • 6. Types of RFID Tags Active Tags • Use a battery • communicate over distances of several meters Semi-passive Tags • Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. • They are different from active tags in that they only transmit data at the time a response is received Passive Tags • Derive their power from the field generated by the reader • without having an active transmitter to transfer the information stored
  • 7. Applications Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 9. Applications Credit Cards with RFID (Paywave function) Octopus (Smart Card)
  • 10. Applications Autotoll (Electronic toll collection) Access Control
  • 11. Online Survey • Target: SME • Information: Opinion on RFID and its applications • Site: • http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyu Wtsk4
  • 12. Survey Result Logistics and Supply Chain Management 20% Pharmaceutic manufacturing industries 15% Library Management 21% Inventory Control 10% Document Management 8% Security 8% Customer Services 5% Hotel Management 5% Banking and Finance 5% Social Services 3% Other 18% Types of industries that respondents think it is possible to apply RFID technology
  • 13. Further Development • In medical uses and library management
  • 14. Video
  • 15. Conclusion• Positive • RFID is a contactless reading technology and can read through other materials • Hold more data than barcode does • RFID tags data can be changed or added • More effective, bring lots of convenience to us • Negative • Cost is relatively remain high (compare to barcode) • RFID signals may have problems with some materials • RFID standards are still being developed