SlideShare a Scribd company logo
1 of 15
RFID
Application
Wong Wai Ling 14218534
22 February 2016
Introduction of
RFID
Applications
Survey
Results
Future
Development
And
Opportunities
Conclusion
RFID
– RFID = Radio Frequency Identification
– Electronic labeling and wireless identification of objects using radio frequency
– Tag carries with its information
– a serial number
– Model number
– Color or any other imaginable data
– When these tags pass through a field generated by a compatible reader, they
transmit this information back to the reader, thereby identifying the object
RFID components
– A basic RFID system consists of these components:
– A programmable RFID tag/inlay for storing item data;
– Consisting of an RFID chip for data storage
– an antenna to facilitate communication with the RFID chip
– A reader/antenna system to interrogate the RFID inlay
– Application software and a host computer system
RFID Tag
– The RFID tag consists of an integrated circuit (IC) embedded in a thin film
medium.
– Information stored in the memory of the RFID chip is transmitted by the
antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID
reader
– 3 types
– Passive
– Semi-passive
– Active
Types of RFID Tags
Active Tags
• Use a battery
• communicate over
distances of several meters
Semi-passive Tags
• Contain built-in batteries to
power the chip’s circuitry,
resist interference and
circumvent a lack of power
from the reader signal due
to long distance.
• They are different from
active tags in that they only
transmit data at the time a
response is received
Passive Tags
• Derive their power from
the field generated by the
reader
• without having an active
transmitter to transfer the
information stored
Applications
Frequency Appx. Read Range Data Speed Cost of
Tags
Application
Low Frequency (125kHz) <5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency (13.56
Mhz)
10 cm – 1m
(passive)
Low to Moderate Medium to
Low
• Smart Cards
• Payment (paywave)
Ultra High Frequency
(433, 868-928 Mhz)
3m -7m
(passive)
Moderate to High Low • Logistics and Supply Chain
• Baggage Tracking
Microwave (2.45 & 5.8
Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll collection (Autotoll)
• Container Tracking
Current ApplicationsApplication Segment Representative Applications Competitive Technologies Current
Penetration
Typical Tag
Type
Access Control Doorway entry Other keyless entry
technologies
High Passive
Asset Tracking Locating tractors within a
freight yard
None Low Active
Asset Tagging Tracking corporate
computing systems
Bar Code Low Passive
Authentication Luxury goods counterfeit
prevention
Holograms Low Passive
Baggage Tracking Positive bag matching Bar Code, Optical
Character Recognition
Low Passive
POS Applications SpeedPass Credit Cards, Smart Cards,
Wireless Phones
Medium Passive
SCM (Container Level) Tracking containers in
shipping terminals
GPS-based Systems Low Active
SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active,
Passive
SCM (Item Level) Identifying individual items Bar Code Minimal Passive
Vehicle Identification Electronic toll collection Bar Code, License plate,
reader systems
Medium Active,
Passive
Vehicle Immobilizers Automotive ignition systems Other theft prevention
technologies
High Passive
Applications
Credit Cards with RFID
(Paywave function)
Octopus (Smart Card)
Applications
Autotoll (Electronic toll collection)
Access Control
Online Survey
– Target: SME
– Information: Opinion on RFID and its applications
– Site:
– http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
Survey Result
Enhanced customer
satisfaction Improved efficiency
Increased inventory turnover
rate Reduced manpower
Reduced total cost
0
2
0
2
1
0
2
1
3
0
1
1
0
1
0
3
4
4
4
4
Benefits of using RFID in differentindustries
Manufacturing Retailing Transportation Warehousing
Further Development
– In medical uses and library management
Video
Conclusion
– Positive
– RFID is a contactless reading technology and can read through other materials
– Hold more data than barcode does
– RFID tags data can be changed or added
– More effective, bring lots of convenience to us
– Negative
– Cost is relatively remain high (compare to barcode)
– RFID signals may have problems with some materials
– RFID standards are still being developed

More Related Content

What's hot

15224147 pss7
15224147 pss715224147 pss7
15224147 pss7kiko ip
 
13205129 pss7
13205129 pss713205129 pss7
13205129 pss713205129
 
RDIF Application
RDIF ApplicationRDIF Application
RDIF Application15219518
 
13250442 pss7
13250442 pss713250442 pss7
13250442 pss713250442
 
15214087 pss7-ans
15214087 pss7-ans15214087 pss7-ans
15214087 pss7-ansLukWO
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationlhcdenise
 
RFID Application
RFID ApplicationRFID Application
RFID ApplicationRimoFan
 
13205196 pss7
13205196 pss7 13205196 pss7
13205196 pss7 13205196
 
RFID Application
RFID ApplicationRFID Application
RFID Application15217639
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7kwokyy
 
RFID Application
RFID ApplicationRFID Application
RFID Application12208752
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7cypfiona
 

What's hot (19)

13210939 pss7
13210939 pss713210939 pss7
13210939 pss7
 
15224147 pss7
15224147 pss715224147 pss7
15224147 pss7
 
Smart watch
Smart watch Smart watch
Smart watch
 
13213148 pss7
13213148 pss713213148 pss7
13213148 pss7
 
13205129 pss7
13205129 pss713205129 pss7
13205129 pss7
 
RDIF Application
RDIF ApplicationRDIF Application
RDIF Application
 
13250442 pss7
13250442 pss713250442 pss7
13250442 pss7
 
15250121 pss7-ans
15250121 pss7-ans15250121 pss7-ans
15250121 pss7-ans
 
15224554 pss7
15224554 pss715224554 pss7
15224554 pss7
 
15214087 pss7-ans
15214087 pss7-ans15214087 pss7-ans
15214087 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13205196 pss7
13205196 pss7 13205196 pss7
13205196 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15227324 pss7
15227324 pss715227324 pss7
15227324 pss7
 
13209000 pss7
13209000 pss713209000 pss7
13209000 pss7
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7
 

Viewers also liked

Pembelajaran berbantu komputer
Pembelajaran berbantu komputerPembelajaran berbantu komputer
Pembelajaran berbantu komputerWenni Minarsih
 
Minggu ke 8 ( struktur kontrol php)
Minggu ke 8 ( struktur kontrol php)Minggu ke 8 ( struktur kontrol php)
Minggu ke 8 ( struktur kontrol php)Erik Kuswanto
 
model pembelajaran tutorial
model pembelajaran tutorialmodel pembelajaran tutorial
model pembelajaran tutorialambarlestari
 
Ikat Pinggang dan Bros Batik Khas Nusantara
Ikat Pinggang dan Bros Batik Khas NusantaraIkat Pinggang dan Bros Batik Khas Nusantara
Ikat Pinggang dan Bros Batik Khas NusantaraKinantiPutriU
 
iPad Class Recommendation
iPad Class RecommendationiPad Class Recommendation
iPad Class RecommendationKevin Buck
 
Reference Letter - Erica Lai_Cheesecake Factory
Reference Letter - Erica Lai_Cheesecake FactoryReference Letter - Erica Lai_Cheesecake Factory
Reference Letter - Erica Lai_Cheesecake FactoryErica Lai
 
Presentasi hukum dasar kimia
Presentasi hukum dasar kimiaPresentasi hukum dasar kimia
Presentasi hukum dasar kimiaMuhammad Ridwan
 
Electric and Hybrid vehicles
Electric and Hybrid vehiclesElectric and Hybrid vehicles
Electric and Hybrid vehiclesK C KARTHIK
 

Viewers also liked (20)

writing assignment 2
writing assignment 2writing assignment 2
writing assignment 2
 
Pembelajaran berbantu komputer
Pembelajaran berbantu komputerPembelajaran berbantu komputer
Pembelajaran berbantu komputer
 
Minggu ke 8 ( struktur kontrol php)
Minggu ke 8 ( struktur kontrol php)Minggu ke 8 ( struktur kontrol php)
Minggu ke 8 ( struktur kontrol php)
 
Putaran 2
Putaran 2Putaran 2
Putaran 2
 
model pembelajaran tutorial
model pembelajaran tutorialmodel pembelajaran tutorial
model pembelajaran tutorial
 
Ikat Pinggang dan Bros Batik Khas Nusantara
Ikat Pinggang dan Bros Batik Khas NusantaraIkat Pinggang dan Bros Batik Khas Nusantara
Ikat Pinggang dan Bros Batik Khas Nusantara
 
iPad Class Recommendation
iPad Class RecommendationiPad Class Recommendation
iPad Class Recommendation
 
Alternatives to charging electric cars
Alternatives to charging electric carsAlternatives to charging electric cars
Alternatives to charging electric cars
 
Tp informatica
Tp informaticaTp informatica
Tp informatica
 
Reference Letter - Erica Lai_Cheesecake Factory
Reference Letter - Erica Lai_Cheesecake FactoryReference Letter - Erica Lai_Cheesecake Factory
Reference Letter - Erica Lai_Cheesecake Factory
 
4 steering system
4 steering system4 steering system
4 steering system
 
Presentasi hukum dasar kimia
Presentasi hukum dasar kimiaPresentasi hukum dasar kimia
Presentasi hukum dasar kimia
 
General motors
General motorsGeneral motors
General motors
 
PENGANGGARAN PERUSAHAAN
PENGANGGARAN PERUSAHAANPENGANGGARAN PERUSAHAAN
PENGANGGARAN PERUSAHAAN
 
Electric and Hybrid vehicles
Electric and Hybrid vehiclesElectric and Hybrid vehicles
Electric and Hybrid vehicles
 
Ufmg 2008
Ufmg 2008Ufmg 2008
Ufmg 2008
 
Banking analysis
Banking analysisBanking analysis
Banking analysis
 
Rise and fall of Kodak
Rise and fall of KodakRise and fall of Kodak
Rise and fall of Kodak
 
Turkish Culture
Turkish CultureTurkish Culture
Turkish Culture
 
Guia Digital: Tudo sobre o SISU
Guia Digital: Tudo sobre o SISUGuia Digital: Tudo sobre o SISU
Guia Digital: Tudo sobre o SISU
 

Similar to 14218534 pss7.ppt

Rfid application demo
Rfid application demoRfid application demo
Rfid application demo7richard
 
15226662 pss 7
15226662 pss 715226662 pss 7
15226662 pss 7Lok Hin NG
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7cypfiona
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application15225763
 
RFID Application
RFID ApplicationRFID Application
RFID Application14208490
 
13210696 pss7
13210696 pss713210696 pss7
13210696 pss713210696
 
RFID Application
RFID ApplicationRFID Application
RFID Application15200736
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationnkwing302
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationwingki
 
RFID application
RFID applicationRFID application
RFID application14208490
 
13215779 pss7
13215779 pss713215779 pss7
13215779 pss7Crazyfong
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7kwokyy
 

Similar to 14218534 pss7.ppt (16)

Rfid application demo
Rfid application demoRfid application demo
Rfid application demo
 
15226662 pss 7
15226662 pss 715226662 pss 7
15226662 pss 7
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15226832 pss7
15226832 pss715226832 pss7
15226832 pss7
 
13210696 pss7
13210696 pss713210696 pss7
13210696 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID application
RFID applicationRFID application
RFID application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13215779 pss7
13215779 pss713215779 pss7
13215779 pss7
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7
 
RFID
RFIDRFID
RFID
 
13209116 pss7
13209116 pss713209116 pss7
13209116 pss7
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

14218534 pss7.ppt

  • 1. RFID Application Wong Wai Ling 14218534 22 February 2016
  • 3. RFID – RFID = Radio Frequency Identification – Electronic labeling and wireless identification of objects using radio frequency – Tag carries with its information – a serial number – Model number – Color or any other imaginable data – When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID components – A basic RFID system consists of these components: – A programmable RFID tag/inlay for storing item data; – Consisting of an RFID chip for data storage – an antenna to facilitate communication with the RFID chip – A reader/antenna system to interrogate the RFID inlay – Application software and a host computer system
  • 5. RFID Tag – The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium. – Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader – 3 types – Passive – Semi-passive – Active
  • 6. Types of RFID Tags Active Tags • Use a battery • communicate over distances of several meters Semi-passive Tags • Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. • They are different from active tags in that they only transmit data at the time a response is received Passive Tags • Derive their power from the field generated by the reader • without having an active transmitter to transfer the information stored
  • 7. Applications Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 8. Current ApplicationsApplication Segment Representative Applications Competitive Technologies Current Penetration Typical Tag Type Access Control Doorway entry Other keyless entry technologies High Passive Asset Tracking Locating tractors within a freight yard None Low Active Asset Tagging Tracking corporate computing systems Bar Code Low Passive Authentication Luxury goods counterfeit prevention Holograms Low Passive Baggage Tracking Positive bag matching Bar Code, Optical Character Recognition Low Passive POS Applications SpeedPass Credit Cards, Smart Cards, Wireless Phones Medium Passive SCM (Container Level) Tracking containers in shipping terminals GPS-based Systems Low Active SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive SCM (Item Level) Identifying individual items Bar Code Minimal Passive Vehicle Identification Electronic toll collection Bar Code, License plate, reader systems Medium Active, Passive Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive
  • 9. Applications Credit Cards with RFID (Paywave function) Octopus (Smart Card)
  • 10. Applications Autotoll (Electronic toll collection) Access Control
  • 11. Online Survey – Target: SME – Information: Opinion on RFID and its applications – Site: – http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 12. Survey Result Enhanced customer satisfaction Improved efficiency Increased inventory turnover rate Reduced manpower Reduced total cost 0 2 0 2 1 0 2 1 3 0 1 1 0 1 0 3 4 4 4 4 Benefits of using RFID in differentindustries Manufacturing Retailing Transportation Warehousing
  • 13. Further Development – In medical uses and library management
  • 14. Video
  • 15. Conclusion – Positive – RFID is a contactless reading technology and can read through other materials – Hold more data than barcode does – RFID tags data can be changed or added – More effective, bring lots of convenience to us – Negative – Cost is relatively remain high (compare to barcode) – RFID signals may have problems with some materials – RFID standards are still being developed