SlideShare a Scribd company logo
Project topic : RFID
Name : Wang ZhuoYu
Student ID : 15251616
16 October 2015
Introduction
of RFID
Applications
Survey
Results
Future
development
and
opportunities
Conclusion
RFID
 RFID = Radio Frequency Identification
 Electronic labeling and wireless identification of objects using radio
frequency
 Tag carries with its information
 a serial number
 Model number
 Color or any other imaginable data
 When these tags pass through a field generated by a compatible reader, they
transmit this information back to the reader, thereby identifying the object
Active Tags
• Use a battery
• communicate over
distances of several
meters
Semi-passive Tags
• Contain built-in
batteries to power the
chip’s circuitry, resist
interference and
circumvent a lack of
power from the reader
signal due to long
distance.
• They are different from
active tags in that they
only transmit data at
the time a response is
received
Passive Tags
• Derive their power from
the field generated by
the reader
• without having an active
transmitter to transfer
the information stored
Frequency Appx. Read
Range
Data Speed Cost of
Tags
Application
Low Frequency
(125kHz)
<5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency
(13.56 Mhz)
10 cm – 1m
(passive)
Low to Moderate Medium
to Low
• Smart Cards
• Payment (paywave)
Ultra High
Frequency (433,
868-928 Mhz)
3m -7m
(passive)
Moderate to
High
Low • Logistics and Supply
Chain
• Baggage Tracking
Microwave (2.45
& 5.8 Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll collection
(Autotoll)
• Container Tracking
Application Segment Representative Applications Competitive Technologies Current Penetration Typical Tag Type
Access Control Doorway entry Other keyless entry technologies High Passive
Asset Tracking Locating tractors within a freight yard None Low Active
Asset Tagging Tracking corporate computing systems Bar Code Low Passive
Authentication Luxury goods counterfeit prevention Holograms Low Passive
Baggage Tracking Positive bag matching Bar Code, Optical Character Recognition Low Passive
POS Applications SpeedPass Credit Cards, Smart Cards, Wireless Phones Medium Passive
SCM (Container Level) Tracking containers in shipping terminals GPS-based Systems Low Active
SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive
SCM (Item Level) Identifying individual items Bar Code Minimal Passive
Vehicle Identification Electronic toll collection Bar Code, License plate, reader systems Medium Active, Passive
Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive
RFID Application 15251616
RFID Application 15251616
RFID Application 15251616

More Related Content

What's hot

13207121 pss7
13207121 pss713207121 pss7
13207121 pss7
wingwing0530
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7
kwokyy
 
13200828 pps7
13200828 pps713200828 pps7
13200828 pps7
13200828
 
15224147 pss7
15224147 pss715224147 pss7
15224147 pss7
kiko ip
 
15214087 pss7-ans
15214087 pss7-ans15214087 pss7-ans
15214087 pss7-ans
LukWO
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Chi Yan TSE
 
RFID Application
RFID ApplicationRFID Application
RFID Application
codykong
 
15226662 pss 7
15226662 pss 715226662 pss 7
15226662 pss 7
Lok Hin NG
 
14218534 pss7.ppt
14218534 pss7.ppt14218534 pss7.ppt
14218534 pss7.ppt
jessica wong
 
13206265 pss7
13206265 pss713206265 pss7
13206265 pss7
leechiting
 
13210939 pss7
13210939 pss713210939 pss7
13210939 pss7
lauwaiting
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15217639
 
RFID Application
RFID ApplicationRFID Application
RFID Application
lhcdenise
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
Vincent Hui
 
13252399 pss7
13252399 pss713252399 pss7
13252399 pss7
Jingwen MAI
 
15215075 pss7
15215075 pss715215075 pss7
15215075 pss7
amylsy
 
RFID Application
RFID ApplicationRFID Application
RFID Application
debby Li
 
13203487 pps7
13203487 pps713203487 pps7
13203487 pps7
13203487
 
13212613 pss7
13212613 pss713212613 pss7
13212613 pss7
andychun
 

What's hot (19)

13207121 pss7
13207121 pss713207121 pss7
13207121 pss7
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7
 
13200828 pps7
13200828 pps713200828 pps7
13200828 pps7
 
15224147 pss7
15224147 pss715224147 pss7
15224147 pss7
 
15214087 pss7-ans
15214087 pss7-ans15214087 pss7-ans
15214087 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15226662 pss 7
15226662 pss 715226662 pss 7
15226662 pss 7
 
14218534 pss7.ppt
14218534 pss7.ppt14218534 pss7.ppt
14218534 pss7.ppt
 
13206265 pss7
13206265 pss713206265 pss7
13206265 pss7
 
13210939 pss7
13210939 pss713210939 pss7
13210939 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
13252399 pss7
13252399 pss713252399 pss7
13252399 pss7
 
15215075 pss7
15215075 pss715215075 pss7
15215075 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13203487 pps7
13203487 pps713203487 pps7
13203487 pps7
 
13212613 pss7
13212613 pss713212613 pss7
13212613 pss7
 

Viewers also liked

Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slidesMining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Michael Mathioudakis
 
Памятка для родителей первоклассников
 Памятка для родителей первоклассников Памятка для родителей первоклассников
Памятка для родителей первоклассников
ГБОУ № 509
 
Forms and conventions of media texts
Forms and conventions of media textsForms and conventions of media texts
Forms and conventions of media texts
acdproductions
 
Bump Hunting in the Dark - ICDE15 presentation
Bump Hunting in the Dark - ICDE15 presentationBump Hunting in the Dark - ICDE15 presentation
Bump Hunting in the Dark - ICDE15 presentation
Michael Mathioudakis
 
Lecture 06 - CS-5040 - modern database systems
Lecture 06  - CS-5040 - modern database systemsLecture 06  - CS-5040 - modern database systems
Lecture 06 - CS-5040 - modern database systems
Michael Mathioudakis
 
Modern Database Systems - Lecture 01
Modern Database Systems - Lecture 01Modern Database Systems - Lecture 01
Modern Database Systems - Lecture 01
Michael Mathioudakis
 
5 ways to release stress
5 ways to release stress5 ways to release stress
5 ways to release stress
LoanHuynhThanh
 
Об организации приёма в 1 классы
Об организации приёма в 1 классыОб организации приёма в 1 классы
Об организации приёма в 1 классы
ГБОУ № 509
 
Contruction - Adding non diegetic sound
Contruction - Adding non diegetic soundContruction - Adding non diegetic sound
Contruction - Adding non diegetic sound
acdproductions
 
ГИА в 2016 году
ГИА в 2016 годуГИА в 2016 году
ГИА в 2016 году
ГБОУ № 509
 
Lecture 07 - CS-5040 - modern database systems
Lecture 07 -  CS-5040 - modern database systemsLecture 07 -  CS-5040 - modern database systems
Lecture 07 - CS-5040 - modern database systems
Michael Mathioudakis
 
Construction
ConstructionConstruction
Construction
acdproductions
 
Mining the Social Web - Lecture 2 - T61.6020
Mining the Social Web - Lecture 2 - T61.6020Mining the Social Web - Lecture 2 - T61.6020
Mining the Social Web - Lecture 2 - T61.6020
Michael Mathioudakis
 
Webfolio учителя
Webfolio учителяWebfolio учителя
Webfolio учителя
ГБОУ № 509
 
Modern Database Systems - Lecture 02
Modern Database Systems - Lecture 02Modern Database Systems - Lecture 02
Modern Database Systems - Lecture 02
Michael Mathioudakis
 
Mining the Social Web - Lecture 3 - T61.6020
Mining the Social Web - Lecture 3 - T61.6020Mining the Social Web - Lecture 3 - T61.6020
Mining the Social Web - Lecture 3 - T61.6020
Michael Mathioudakis
 
Modern Database Systems - Lecture 00
Modern Database Systems - Lecture 00Modern Database Systems - Lecture 00
Modern Database Systems - Lecture 00
Michael Mathioudakis
 
Absorbing Random Walk Centrality
Absorbing Random Walk CentralityAbsorbing Random Walk Centrality
Absorbing Random Walk Centrality
Michael Mathioudakis
 

Viewers also liked (18)

Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slidesMining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
 
Памятка для родителей первоклассников
 Памятка для родителей первоклассников Памятка для родителей первоклассников
Памятка для родителей первоклассников
 
Forms and conventions of media texts
Forms and conventions of media textsForms and conventions of media texts
Forms and conventions of media texts
 
Bump Hunting in the Dark - ICDE15 presentation
Bump Hunting in the Dark - ICDE15 presentationBump Hunting in the Dark - ICDE15 presentation
Bump Hunting in the Dark - ICDE15 presentation
 
Lecture 06 - CS-5040 - modern database systems
Lecture 06  - CS-5040 - modern database systemsLecture 06  - CS-5040 - modern database systems
Lecture 06 - CS-5040 - modern database systems
 
Modern Database Systems - Lecture 01
Modern Database Systems - Lecture 01Modern Database Systems - Lecture 01
Modern Database Systems - Lecture 01
 
5 ways to release stress
5 ways to release stress5 ways to release stress
5 ways to release stress
 
Об организации приёма в 1 классы
Об организации приёма в 1 классыОб организации приёма в 1 классы
Об организации приёма в 1 классы
 
Contruction - Adding non diegetic sound
Contruction - Adding non diegetic soundContruction - Adding non diegetic sound
Contruction - Adding non diegetic sound
 
ГИА в 2016 году
ГИА в 2016 годуГИА в 2016 году
ГИА в 2016 году
 
Lecture 07 - CS-5040 - modern database systems
Lecture 07 -  CS-5040 - modern database systemsLecture 07 -  CS-5040 - modern database systems
Lecture 07 - CS-5040 - modern database systems
 
Construction
ConstructionConstruction
Construction
 
Mining the Social Web - Lecture 2 - T61.6020
Mining the Social Web - Lecture 2 - T61.6020Mining the Social Web - Lecture 2 - T61.6020
Mining the Social Web - Lecture 2 - T61.6020
 
Webfolio учителя
Webfolio учителяWebfolio учителя
Webfolio учителя
 
Modern Database Systems - Lecture 02
Modern Database Systems - Lecture 02Modern Database Systems - Lecture 02
Modern Database Systems - Lecture 02
 
Mining the Social Web - Lecture 3 - T61.6020
Mining the Social Web - Lecture 3 - T61.6020Mining the Social Web - Lecture 3 - T61.6020
Mining the Social Web - Lecture 3 - T61.6020
 
Modern Database Systems - Lecture 00
Modern Database Systems - Lecture 00Modern Database Systems - Lecture 00
Modern Database Systems - Lecture 00
 
Absorbing Random Walk Centrality
Absorbing Random Walk CentralityAbsorbing Random Walk Centrality
Absorbing Random Walk Centrality
 

Similar to RFID Application 15251616

13202537 pss7
13202537 pss713202537 pss7
13202537 pss7
13202537
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
13215221
 
13209922 pss7
13209922 pss713209922 pss7
13209922 pss7
13209922
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
15225763
 
RFID Application
RFID ApplicationRFID Application
RFID Application
shirley Leung
 
15226832 pss7
15226832 pss715226832 pss7
15226832 pss7
NgLamAlien
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7
kwokyy
 
12209813 pss7
12209813 pss712209813 pss7
12209813 pss7
12209813
 
15215225 pss7
15215225 pss715215225 pss7
15215225 pss7
15216225
 
RFID
RFIDRFID
RFID
nkwing302
 
13210831 pss7
13210831 pss713210831 pss7
13210831 pss7
madaohhh
 
13209000 pss7
13209000 pss713209000 pss7
13209000 pss7
KayleyChan
 
try
trytry
13207520 pss7
13207520 pss713207520 pss7
13207520 pss7
cherry Yeung
 
RFID Application
RFID ApplicationRFID Application
RFID Application
nkwing302
 
RDIF Application
RDIF ApplicationRDIF Application
RDIF Application
15219518
 

Similar to RFID Application 15251616 (16)

13202537 pss7
13202537 pss713202537 pss7
13202537 pss7
 
13215221 pss7
13215221 pss713215221 pss7
13215221 pss7
 
13209922 pss7
13209922 pss713209922 pss7
13209922 pss7
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15226832 pss7
15226832 pss715226832 pss7
15226832 pss7
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7
 
12209813 pss7
12209813 pss712209813 pss7
12209813 pss7
 
15215225 pss7
15215225 pss715215225 pss7
15215225 pss7
 
RFID
RFIDRFID
RFID
 
13210831 pss7
13210831 pss713210831 pss7
13210831 pss7
 
13209000 pss7
13209000 pss713209000 pss7
13209000 pss7
 
try
trytry
try
 
13207520 pss7
13207520 pss713207520 pss7
13207520 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RDIF Application
RDIF ApplicationRDIF Application
RDIF Application
 

Recently uploaded

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

RFID Application 15251616

  • 1. Project topic : RFID Name : Wang ZhuoYu Student ID : 15251616 16 October 2015
  • 3. RFID  RFID = Radio Frequency Identification  Electronic labeling and wireless identification of objects using radio frequency  Tag carries with its information  a serial number  Model number  Color or any other imaginable data  When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. Active Tags • Use a battery • communicate over distances of several meters Semi-passive Tags • Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. • They are different from active tags in that they only transmit data at the time a response is received Passive Tags • Derive their power from the field generated by the reader • without having an active transmitter to transfer the information stored
  • 5. Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 6. Application Segment Representative Applications Competitive Technologies Current Penetration Typical Tag Type Access Control Doorway entry Other keyless entry technologies High Passive Asset Tracking Locating tractors within a freight yard None Low Active Asset Tagging Tracking corporate computing systems Bar Code Low Passive Authentication Luxury goods counterfeit prevention Holograms Low Passive Baggage Tracking Positive bag matching Bar Code, Optical Character Recognition Low Passive POS Applications SpeedPass Credit Cards, Smart Cards, Wireless Phones Medium Passive SCM (Container Level) Tracking containers in shipping terminals GPS-based Systems Low Active SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive SCM (Item Level) Identifying individual items Bar Code Minimal Passive Vehicle Identification Electronic toll collection Bar Code, License plate, reader systems Medium Active, Passive Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive