SlideShare a Scribd company logo
RFID & ITS APPLICATION
Members : Bob(123456)
Max(2344556)
…
GCIT1015
Wednesday, October 7, 2015
CONTENT FLOW OF PRESENTATION
RFID
• RFID = Radio Frequency Identification
• Electronic labeling and wireless identification of objects using radio
frequency
• Tag carries with its information
• a serial number
• Model number
• Color or any other imaginable data
• When these tags pass through a field generated by a compatible reader,
they transmit this information back to the reader, thereby identifying the
object
RFID COMPONENTS
• A basic RFID system consists of these components:
• A programmable RFID tag/inlay for storing item data;
• Consisting of an RFID chip for data storage
• an antenna to facilitate communication with the RFID chip
• A reader/antenna system to interrogate the RFID inlay
• Application software and a host computer system
RFID TAG
• The RFID tag consists of an integrated circuit (IC) embedded in a thin film
medium.
• Information stored in the memory of the RFID chip is transmitted by the
antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID
reader
• 3 types
• Passive
• Semi-passive
• Active
TYPES OF RFID TAGS
Active Tags
•Use a battery
•communicate over
distances of several
meters
Semi-passive Tags
•Contain built-in
batteries to power the
chip’s circuitry, resist
interference and
circumvent a lack of
power from the reader
signal due to long
distance.
•They are different from
active tags in that
they only transmit
data at the time a
response is received
Passive Tags
•Derive their power
from the field
generated by the
reader
•without having an
active transmitter to
transfer the
information stored
APPLICATIONS
Frequency Appx. Read Range Data Speed Cost of
Tags
Application
Low Frequency (125kHz) <5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency (13.56
Mhz)
10 cm – 1m
(passive)
Low to Moderate Medium
to Low
• Smart Cards
• Payment (paywave)
Ultra High Frequency
(433, 868-928 Mhz)
3m -7m
(passive)
Moderate to High Low • Logistics and Supply Chain
• Baggage Tracking
Microwave (2.45 & 5.8
Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll collection (Autotoll)
• Container Tracking
CURRENT APPLICATIONS
APPLICATIONS
Credit Cards with RFID
(Pay wave function)
Octopus (Smart Card)
APPLICATIONS
Autotoll (Electronic toll collection)
Access Control
ONLINE SURVEY
• Target: SME
• Information: Opinion on RFID and its applications
• Site:
• http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
SURVEY RESULT
Logistics and Supply
Chain Management
20%
Pharmaceutic manufacturing
industries
15%
Library
Management
21%
Inventory Control
10%
Document Management
8%
Security
8%
Customer Services
5%
Hotel Management
5%
Banking and Finance
5%
Social Services
3%
Other
18%
Types of industries that respondents think
it is possible to apply RFID technology
FURTHER DEVELOPMENT
• In medical uses and library management
VIDEO
CONCLUSION
• Positive
• RFID is a contactless reading technology and can read
through other materials
• Hold more data than barcode does
• RFID tags data can be changed or added
• More effective, bring lots of convenience to us
• Negative
• Cost is relatively remain high (compare to barcode)
• RFID signals may have problems with some materials
• RFID standards are still being developed

More Related Content

What's hot

RFID Application15221784 pss7-ans
RFID Application15221784 pss7-ansRFID Application15221784 pss7-ans
RFID Application15221784 pss7-ans
YUENYUKMUK
 
15216039 pss7-ans
15216039 pss7-ans15216039 pss7-ans
15216039 pss7-ans
Shirley LEE
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
tigertsang
 
Rfid &amp; its applications
Rfid &amp; its applicationsRfid &amp; its applications
Rfid &amp; its applications
MingMing Cheung
 
RFID Application
RFID ApplicationRFID Application
RFID Application
tianna15223779
 
RFID Applications
RFID Applications RFID Applications
RFID Applications
Ming Hei Jemma Cheung
 
13206117 pss7.pptx
13206117 pss7.pptx13206117 pss7.pptx
13206117 pss7.pptx
chautingfong
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
15216047 pss7-ans
15216047 pss7-ans15216047 pss7-ans
15216047 pss7-ans
Jaime Lee
 
RFID AND ITS APPLICATION
RFID AND ITS APPLICATIONRFID AND ITS APPLICATION
RFID AND ITS APPLICATION
keromandy
 
13213652 pss7
13213652 pss713213652 pss7
13213652 pss7
13213652
 
15225089 pss7-ans
15225089 pss7-ans15225089 pss7-ans
15225089 pss7-ans
whting
 
13209922 pss7
13209922 pss713209922 pss7
13209922 pss7
13209922
 
try
trytry
13207520 pss7
13207520 pss713207520 pss7
13207520 pss7
cherry Yeung
 
RFID Application
RFID ApplicationRFID Application
RFID Application
lee163
 
wireless technology
wireless technologywireless technology
wireless technology
laiwaiho
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Kayan To
 
RFID Application
RFID ApplicationRFID Application
RFID Application
AmbroseTse
 

What's hot (19)

RFID Application15221784 pss7-ans
RFID Application15221784 pss7-ansRFID Application15221784 pss7-ans
RFID Application15221784 pss7-ans
 
15216039 pss7-ans
15216039 pss7-ans15216039 pss7-ans
15216039 pss7-ans
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
 
Rfid &amp; its applications
Rfid &amp; its applicationsRfid &amp; its applications
Rfid &amp; its applications
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Applications
RFID Applications RFID Applications
RFID Applications
 
13206117 pss7.pptx
13206117 pss7.pptx13206117 pss7.pptx
13206117 pss7.pptx
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15216047 pss7-ans
15216047 pss7-ans15216047 pss7-ans
15216047 pss7-ans
 
RFID AND ITS APPLICATION
RFID AND ITS APPLICATIONRFID AND ITS APPLICATION
RFID AND ITS APPLICATION
 
13213652 pss7
13213652 pss713213652 pss7
13213652 pss7
 
15225089 pss7-ans
15225089 pss7-ans15225089 pss7-ans
15225089 pss7-ans
 
13209922 pss7
13209922 pss713209922 pss7
13209922 pss7
 
try
trytry
try
 
13207520 pss7
13207520 pss713207520 pss7
13207520 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
wireless technology
wireless technologywireless technology
wireless technology
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 

Viewers also liked

Rfid tags
Rfid tagsRfid tags
Rfid tags
kit105
 
Presentation english rfid 2.0
Presentation english rfid 2.0Presentation english rfid 2.0
Presentation english rfid 2.0
JasperALA
 
Re-seller Information - ENGLISH
 Re-seller Information - ENGLISH Re-seller Information - ENGLISH
Re-seller Information - ENGLISH
MedTech Wristbands
 
Itgs rfid presentation
Itgs rfid presentationItgs rfid presentation
Itgs rfid presentation
smatejka2082
 
Nucleus presentation RFID EATS JSSATE
Nucleus presentation RFID EATS JSSATENucleus presentation RFID EATS JSSATE
Nucleus presentation RFID EATS JSSATE
Tanuj Agrawal
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
Sulthony Hartanto
 
Rfid presentation
Rfid presentationRfid presentation
Healthcare industry
Healthcare industryHealthcare industry
Healthcare industry
vaishalshah01
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
Pravin Shinde
 
RFID
RFID RFID
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
Pradheep Shrinivasan
 
RFID BASED SMART CARD READER
RFID BASED SMART CARD READERRFID BASED SMART CARD READER
RFID BASED SMART CARD READER
bharath405
 
Gcit1015 rfid presentation
Gcit1015 rfid presentationGcit1015 rfid presentation
Gcit1015 rfid presentation
funren
 
Rfid presentation recreational
Rfid presentation   recreationalRfid presentation   recreational
Rfid presentation recreational
MedTech Wristbands
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
Sandeep Singh
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
avinash yada
 
Java Based RFID Attendance Management System Graduation Project Presentation
Java Based RFID Attendance Management System Graduation Project PresentationJava Based RFID Attendance Management System Graduation Project Presentation
Java Based RFID Attendance Management System Graduation Project Presentation
Ibrahim Abdel Fattah Mohamed
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slides
guestbed1dd
 
Product and service design
Product and service designProduct and service design
Product and service design
Grace Falcis
 

Viewers also liked (19)

Rfid tags
Rfid tagsRfid tags
Rfid tags
 
Presentation english rfid 2.0
Presentation english rfid 2.0Presentation english rfid 2.0
Presentation english rfid 2.0
 
Re-seller Information - ENGLISH
 Re-seller Information - ENGLISH Re-seller Information - ENGLISH
Re-seller Information - ENGLISH
 
Itgs rfid presentation
Itgs rfid presentationItgs rfid presentation
Itgs rfid presentation
 
Nucleus presentation RFID EATS JSSATE
Nucleus presentation RFID EATS JSSATENucleus presentation RFID EATS JSSATE
Nucleus presentation RFID EATS JSSATE
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Healthcare industry
Healthcare industryHealthcare industry
Healthcare industry
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
RFID
RFID RFID
RFID
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
RFID BASED SMART CARD READER
RFID BASED SMART CARD READERRFID BASED SMART CARD READER
RFID BASED SMART CARD READER
 
Gcit1015 rfid presentation
Gcit1015 rfid presentationGcit1015 rfid presentation
Gcit1015 rfid presentation
 
Rfid presentation recreational
Rfid presentation   recreationalRfid presentation   recreational
Rfid presentation recreational
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
Java Based RFID Attendance Management System Graduation Project Presentation
Java Based RFID Attendance Management System Graduation Project PresentationJava Based RFID Attendance Management System Graduation Project Presentation
Java Based RFID Attendance Management System Graduation Project Presentation
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slides
 
Product and service design
Product and service designProduct and service design
Product and service design
 

Similar to RFID Application

15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
RFID Application
RFID ApplicationRFID Application
RFID Application
benkalok
 
15205487pss7 ans
15205487pss7 ans15205487pss7 ans
15205487pss7 ans
Loin Huang
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
15251705
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Chi Chung Chan
 
15223108 pss7
15223108 pss715223108 pss7
15223108 pss7
Jenna Chan
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15216535
 
15214311 pss7-ans
15214311 pss7-ans15214311 pss7-ans
15214311 pss7-ans
Ella Li
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
ckmsara
 
13203177 pss7
13203177 pss713203177 pss7
13203177 pss7
heiyinyuen
 
13200798 pss7
13200798 pss713200798 pss7
13200798 pss7
heiyinyuen
 
RFID & Its applications
 RFID & Its applications RFID & Its applications
RFID & Its applications
Group8
 
3D printing
3D printing3D printing
3D printing
noel_cwk
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
Hui Tin Yan
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
Lenox1224
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
David Zhang
 

Similar to RFID Application (17)

15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15205487pss7 ans
15205487pss7 ans15205487pss7 ans
15205487pss7 ans
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15223108 pss7
15223108 pss715223108 pss7
15223108 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15214311 pss7-ans
15214311 pss7-ans15214311 pss7-ans
15214311 pss7-ans
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
13203177 pss7
13203177 pss713203177 pss7
13203177 pss7
 
13200798 pss7
13200798 pss713200798 pss7
13200798 pss7
 
RFID & Its applications
 RFID & Its applications RFID & Its applications
RFID & Its applications
 
3D printing
3D printing3D printing
3D printing
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 

RFID Application

  • 1. RFID & ITS APPLICATION Members : Bob(123456) Max(2344556) … GCIT1015 Wednesday, October 7, 2015
  • 2. CONTENT FLOW OF PRESENTATION
  • 3. RFID • RFID = Radio Frequency Identification • Electronic labeling and wireless identification of objects using radio frequency • Tag carries with its information • a serial number • Model number • Color or any other imaginable data • When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID COMPONENTS • A basic RFID system consists of these components: • A programmable RFID tag/inlay for storing item data; • Consisting of an RFID chip for data storage • an antenna to facilitate communication with the RFID chip • A reader/antenna system to interrogate the RFID inlay • Application software and a host computer system
  • 5. RFID TAG • The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium. • Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader • 3 types • Passive • Semi-passive • Active
  • 6. TYPES OF RFID TAGS Active Tags •Use a battery •communicate over distances of several meters Semi-passive Tags •Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. •They are different from active tags in that they only transmit data at the time a response is received Passive Tags •Derive their power from the field generated by the reader •without having an active transmitter to transfer the information stored
  • 7. APPLICATIONS Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 9. APPLICATIONS Credit Cards with RFID (Pay wave function) Octopus (Smart Card)
  • 10. APPLICATIONS Autotoll (Electronic toll collection) Access Control
  • 11. ONLINE SURVEY • Target: SME • Information: Opinion on RFID and its applications • Site: • http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 12. SURVEY RESULT Logistics and Supply Chain Management 20% Pharmaceutic manufacturing industries 15% Library Management 21% Inventory Control 10% Document Management 8% Security 8% Customer Services 5% Hotel Management 5% Banking and Finance 5% Social Services 3% Other 18% Types of industries that respondents think it is possible to apply RFID technology
  • 13. FURTHER DEVELOPMENT • In medical uses and library management
  • 14. VIDEO
  • 15. CONCLUSION • Positive • RFID is a contactless reading technology and can read through other materials • Hold more data than barcode does • RFID tags data can be changed or added • More effective, bring lots of convenience to us • Negative • Cost is relatively remain high (compare to barcode) • RFID signals may have problems with some materials • RFID standards are still being developed