SlideShare a Scribd company logo
RFID & ITS APPLICATIONS
MEMBERS: BOB(123456)
MAX(2344556)
…
GCIT1015
Wednesday, October 7,
2015
CONTENT FLOW OF PRESENTATION
Introduction Application
Survey
Results
Video Conclusion
RFID
• RFID = Radio Frequency Identification
• Electronic labeling and wireless identification of objects using radio frequency
• Tag carries with its information
• a serial number
• Model number
• Color or any other imaginable data
• When these tags pass through a field generated by a compatible reader, they transmit this information
back to the reader, thereby identifying the object
RFID COMPONENTS
• A basic RFID system consists of these components:
• A programmable RFID tag/inlay for storing item data;
• Consisting of an RFID chip for data storage
• an antenna to facilitate communication with the RFID chip
• A reader/antenna system to interrogate the RFID inlay
• Application software and a host computer system
RFID TAG
• The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium.
• Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in
the RFID inlay via radio frequencies, to an RFID reader
• 3 types
• Passive
• Semi-passive
• Active
TYPES OF RFID TAGS
Active Tags
• Use a battery
• communicate over
distances of several meters
Semi-passive Tags
• Contain built-in batteries
to power the chip’s
circuitry, resist interference
and circumvent a lack of
power from the reader
signal due to long distance.
• They are different from
active tags in that they
only transmit data at the
time a response is received
Passive Tags
• Derive their power from
the field generated by the
reader
• without having an active
transmitter to transfer the
information store
APPLICATIONS
Frequency Appx. Read Range Data Speed Cost of
Tags
Application
Low Frequency
(125kHz)
<5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency
(13.56 Mhz)
10 cm – 1m
(passive)
Low to Moderate Medium
to Low
• Smart Cards
• Payment (paywave)
Ultra High Frequency
(433, 868-928 Mhz)
3m -7m
(passive)
Moderate to High Low • Logistics and Supply Chain
• Baggage Tracking
Microwave (2.45 &
5.8 Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll collection
(Autotoll)
• Container Tracking
CURRENT APPLICATIONS
APPLICATIONS
Credit Cards with RFID
(Paywave function)
Octopus (Smart Card)
APPLICATIONS
Autotoll (Electronic toll collection)
Access Control
ONLINE SURVEY
• Target: SME
• Information: Opinion on RFID and its applications
• Site:
• http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
SURVEY RESULT
Logistics and Supply
Chain Management
20%
Pharmaceutic
manufacturing
industries
15%
Library
Management
21%
Inventory Control
10%
Document
Management
8%
Security
8%
Customer Services
5%
Hotel Management
5%
Banking and Finance
5%
Social Services
3%
Other
18%
Types of industries that respondents think
it is possible to apply RFID technology
FURTHER DEVELOPMENT
• In medical uses and library management
VIDEO
CONCLUSION
• Positive
• RFID is a contactless reading technology and can read through other materials
• Hold more data than barcode does
• RFID tags data can be changed or added
• More effective, bring lots of convenience to us
• Negative
• Cost is relatively remain high (compare to barcode)
• RFID signals may have problems with some materials
• RFID standards are still being developed

More Related Content

What's hot

15216047 pss7-ans
15216047 pss7-ans15216047 pss7-ans
15216047 pss7-ans
Jaime Lee
 
15216691 pss7-ans
15216691 pss7-ans15216691 pss7-ans
15216691 pss7-ans
jackylou123
 
15216039 pss7-ans
15216039 pss7-ans15216039 pss7-ans
15216039 pss7-ans
Shirley LEE
 
RFID Application
RFID ApplicationRFID Application
RFID Application
tianna15223779
 
RFID AND ITS APPLICATION
RFID AND ITS APPLICATIONRFID AND ITS APPLICATION
RFID AND ITS APPLICATION
keromandy
 
15225089 pss7-ans
15225089 pss7-ans15225089 pss7-ans
15225089 pss7-ans
whting
 
RFID Application15221784 pss7-ans
RFID Application15221784 pss7-ansRFID Application15221784 pss7-ans
RFID Application15221784 pss7-ans
YUENYUKMUK
 
RFID Application
RFID ApplicationRFID Application
RFID Application
benkalok
 
15200787 pss7-ans
15200787 pss7-ans15200787 pss7-ans
15200787 pss7-ans
Haven Der Königtiger
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Kayan To
 
RFID Application
RFID ApplicationRFID Application
RFID Application
lee163
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Chi Chung Chan
 
3D printing
3D printing3D printing
3D printing
noel_cwk
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
Hui Tin Yan
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15216535
 
15223108 pss7
15223108 pss715223108 pss7
15223108 pss7
Jenna Chan
 
13206117 pss7.pptx
13206117 pss7.pptx13206117 pss7.pptx
13206117 pss7.pptx
chautingfong
 
15215644 pps
15215644 pps15215644 pps
15215644 pps
bobolew
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
15251705
 

What's hot (19)

15216047 pss7-ans
15216047 pss7-ans15216047 pss7-ans
15216047 pss7-ans
 
15216691 pss7-ans
15216691 pss7-ans15216691 pss7-ans
15216691 pss7-ans
 
15216039 pss7-ans
15216039 pss7-ans15216039 pss7-ans
15216039 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID AND ITS APPLICATION
RFID AND ITS APPLICATIONRFID AND ITS APPLICATION
RFID AND ITS APPLICATION
 
15225089 pss7-ans
15225089 pss7-ans15225089 pss7-ans
15225089 pss7-ans
 
RFID Application15221784 pss7-ans
RFID Application15221784 pss7-ansRFID Application15221784 pss7-ans
RFID Application15221784 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15200787 pss7-ans
15200787 pss7-ans15200787 pss7-ans
15200787 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
3D printing
3D printing3D printing
3D printing
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15223108 pss7
15223108 pss715223108 pss7
15223108 pss7
 
13206117 pss7.pptx
13206117 pss7.pptx13206117 pss7.pptx
13206117 pss7.pptx
 
15215644 pps
15215644 pps15215644 pps
15215644 pps
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
 

Viewers also liked

Serverhuset Funktionshyra
Serverhuset FunktionshyraServerhuset Funktionshyra
Serverhuset FunktionshyraServerhuset
 
Manual de microsoft office word 2013
Manual de microsoft office  word 2013Manual de microsoft office  word 2013
Manual de microsoft office word 2013
yurikacht666
 
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicosFrancisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
Fundación Ramón Areces
 
Corporate interior designers
Corporate interior designersCorporate interior designers
Corporate interior designers
andrew-mack
 
Ppt compuerta x nor
Ppt compuerta x norPpt compuerta x nor
Ppt compuerta x nor
Miguel Gonzalez
 
7 th-apresentação
7 th-apresentação7 th-apresentação
7 th-apresentaçãoThiago Ferri
 
4° básico b semana del martes 11 al 14 de octubre
4° básico b semana del martes 11 al 14 de octubre4° básico b semana del martes 11 al 14 de octubre
4° básico b semana del martes 11 al 14 de octubre
Colegio Camilo Henríquez
 
2° basico b semana del 12 al 16 de agosto
2°  basico b  semana del   12 al 16 de agosto2°  basico b  semana del   12 al 16 de agosto
2° basico b semana del 12 al 16 de agosto
Colegio Camilo Henríquez
 
Валерий Куваев, Agile нельзя Waterfall
Валерий Куваев, Agile нельзя WaterfallВалерий Куваев, Agile нельзя Waterfall
Валерий Куваев, Agile нельзя Waterfall
ScrumTrek
 
Deconstructing Buckeye Nation - An Examination Through the Tribal Lens
Deconstructing Buckeye Nation - An Examination Through the Tribal LensDeconstructing Buckeye Nation - An Examination Through the Tribal Lens
Deconstructing Buckeye Nation - An Examination Through the Tribal Lens
Gabe Abella
 
Asitvd 2016 cyberadministration geo.admin.ch
Asitvd 2016 cyberadministration geo.admin.chAsitvd 2016 cyberadministration geo.admin.ch
Asitvd 2016 cyberadministration geo.admin.ch
geoportal of the federal authorities of the Swiss Confederation
 
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
Great Ayuda
 
Newsletter Januar 2017, DLF Rechtsanwälte Ukraine
Newsletter Januar 2017, DLF Rechtsanwälte UkraineNewsletter Januar 2017, DLF Rechtsanwälte Ukraine
Newsletter Januar 2017, DLF Rechtsanwälte Ukraine
Christine Khariv
 

Viewers also liked (15)

Serverhuset Funktionshyra
Serverhuset FunktionshyraServerhuset Funktionshyra
Serverhuset Funktionshyra
 
Manual de microsoft office word 2013
Manual de microsoft office  word 2013Manual de microsoft office  word 2013
Manual de microsoft office word 2013
 
BEAUTIFYING THE STAIRCASES
BEAUTIFYING THE STAIRCASESBEAUTIFYING THE STAIRCASES
BEAUTIFYING THE STAIRCASES
 
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicosFrancisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
 
Corporate interior designers
Corporate interior designersCorporate interior designers
Corporate interior designers
 
Ppt compuerta x nor
Ppt compuerta x norPpt compuerta x nor
Ppt compuerta x nor
 
7 th-apresentação
7 th-apresentação7 th-apresentação
7 th-apresentação
 
4° básico b semana del martes 11 al 14 de octubre
4° básico b semana del martes 11 al 14 de octubre4° básico b semana del martes 11 al 14 de octubre
4° básico b semana del martes 11 al 14 de octubre
 
2° basico b semana del 12 al 16 de agosto
2°  basico b  semana del   12 al 16 de agosto2°  basico b  semana del   12 al 16 de agosto
2° basico b semana del 12 al 16 de agosto
 
Валерий Куваев, Agile нельзя Waterfall
Валерий Куваев, Agile нельзя WaterfallВалерий Куваев, Agile нельзя Waterfall
Валерий Куваев, Agile нельзя Waterfall
 
Deconstructing Buckeye Nation - An Examination Through the Tribal Lens
Deconstructing Buckeye Nation - An Examination Through the Tribal LensDeconstructing Buckeye Nation - An Examination Through the Tribal Lens
Deconstructing Buckeye Nation - An Examination Through the Tribal Lens
 
Asitvd 2016 cyberadministration geo.admin.ch
Asitvd 2016 cyberadministration geo.admin.chAsitvd 2016 cyberadministration geo.admin.ch
Asitvd 2016 cyberadministration geo.admin.ch
 
Rajiv Bhatia
Rajiv BhatiaRajiv Bhatia
Rajiv Bhatia
 
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
 
Newsletter Januar 2017, DLF Rechtsanwälte Ukraine
Newsletter Januar 2017, DLF Rechtsanwälte UkraineNewsletter Januar 2017, DLF Rechtsanwälte Ukraine
Newsletter Januar 2017, DLF Rechtsanwälte Ukraine
 

Similar to RFID Application

15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
RFID Application
RFID ApplicationRFID Application
RFID Application
AmbroseTse
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
ckmsara
 
Rfid &amp; its applications
Rfid &amp; its applicationsRfid &amp; its applications
Rfid &amp; its applications
MingMing Cheung
 
15215288 pss7 ans
15215288 pss7 ans15215288 pss7 ans
15215288 pss7 ans
Carol Ko
 
RFID & Its applications
 RFID & Its applications RFID & Its applications
RFID & Its applications
Group8
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Jeanie Lo
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
Lenox1224
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
sarah ho
 
15214311 pss7-ans
15214311 pss7-ans15214311 pss7-ans
15214311 pss7-ans
Ella Li
 
15218473 pss7-ans
15218473 pss7-ans15218473 pss7-ans
15218473 pss7-ans
Fan Lingling
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
christy LEE
 
15223426 pss7
15223426 pss715223426 pss7
15223426 pss7
ying0000
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
tigertsang
 

Similar to RFID Application (15)

15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
Rfid &amp; its applications
Rfid &amp; its applicationsRfid &amp; its applications
Rfid &amp; its applications
 
15215288 pss7 ans
15215288 pss7 ans15215288 pss7 ans
15215288 pss7 ans
 
RFID & Its applications
 RFID & Its applications RFID & Its applications
RFID & Its applications
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
 
15214311 pss7-ans
15214311 pss7-ans15214311 pss7-ans
15214311 pss7-ans
 
15218473 pss7-ans
15218473 pss7-ans15218473 pss7-ans
15218473 pss7-ans
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
15223426 pss7
15223426 pss715223426 pss7
15223426 pss7
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

RFID Application

  • 1. RFID & ITS APPLICATIONS MEMBERS: BOB(123456) MAX(2344556) … GCIT1015 Wednesday, October 7, 2015
  • 2. CONTENT FLOW OF PRESENTATION Introduction Application Survey Results Video Conclusion
  • 3. RFID • RFID = Radio Frequency Identification • Electronic labeling and wireless identification of objects using radio frequency • Tag carries with its information • a serial number • Model number • Color or any other imaginable data • When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID COMPONENTS • A basic RFID system consists of these components: • A programmable RFID tag/inlay for storing item data; • Consisting of an RFID chip for data storage • an antenna to facilitate communication with the RFID chip • A reader/antenna system to interrogate the RFID inlay • Application software and a host computer system
  • 5. RFID TAG • The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium. • Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader • 3 types • Passive • Semi-passive • Active
  • 6. TYPES OF RFID TAGS Active Tags • Use a battery • communicate over distances of several meters Semi-passive Tags • Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. • They are different from active tags in that they only transmit data at the time a response is received Passive Tags • Derive their power from the field generated by the reader • without having an active transmitter to transfer the information store
  • 7. APPLICATIONS Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 9. APPLICATIONS Credit Cards with RFID (Paywave function) Octopus (Smart Card)
  • 10. APPLICATIONS Autotoll (Electronic toll collection) Access Control
  • 11. ONLINE SURVEY • Target: SME • Information: Opinion on RFID and its applications • Site: • http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 12. SURVEY RESULT Logistics and Supply Chain Management 20% Pharmaceutic manufacturing industries 15% Library Management 21% Inventory Control 10% Document Management 8% Security 8% Customer Services 5% Hotel Management 5% Banking and Finance 5% Social Services 3% Other 18% Types of industries that respondents think it is possible to apply RFID technology
  • 13. FURTHER DEVELOPMENT • In medical uses and library management
  • 14. VIDEO
  • 15. CONCLUSION • Positive • RFID is a contactless reading technology and can read through other materials • Hold more data than barcode does • RFID tags data can be changed or added • More effective, bring lots of convenience to us • Negative • Cost is relatively remain high (compare to barcode) • RFID signals may have problems with some materials • RFID standards are still being developed