SlideShare une entreprise Scribd logo
1  sur  15
RFID & ITS APPLICATIONS
MEMBERS: BOB(123456)
MAX(2344556)
…
GCIT1015
Wednesday, October 7,
2015
CONTENT FLOW OF PRESENTATION
Introduction Application
Survey
Results
Video Conclusion
RFID
• RFID = Radio Frequency Identification
• Electronic labeling and wireless identification of objects using radio frequency
• Tag carries with its information
• a serial number
• Model number
• Color or any other imaginable data
• When these tags pass through a field generated by a compatible reader, they transmit this information
back to the reader, thereby identifying the object
RFID COMPONENTS
• A basic RFID system consists of these components:
• A programmable RFID tag/inlay for storing item data;
• Consisting of an RFID chip for data storage
• an antenna to facilitate communication with the RFID chip
• A reader/antenna system to interrogate the RFID inlay
• Application software and a host computer system
RFID TAG
• The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium.
• Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in
the RFID inlay via radio frequencies, to an RFID reader
• 3 types
• Passive
• Semi-passive
• Active
TYPES OF RFID TAGS
Active Tags
• Use a battery
• communicate over
distances of several meters
Semi-passive Tags
• Contain built-in batteries
to power the chip’s
circuitry, resist interference
and circumvent a lack of
power from the reader
signal due to long distance.
• They are different from
active tags in that they
only transmit data at the
time a response is received
Passive Tags
• Derive their power from
the field generated by the
reader
• without having an active
transmitter to transfer the
information store
APPLICATIONS
Frequency Appx. Read Range Data Speed Cost of
Tags
Application
Low Frequency
(125kHz)
<5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency
(13.56 Mhz)
10 cm – 1m
(passive)
Low to Moderate Medium
to Low
• Smart Cards
• Payment (paywave)
Ultra High Frequency
(433, 868-928 Mhz)
3m -7m
(passive)
Moderate to High Low • Logistics and Supply Chain
• Baggage Tracking
Microwave (2.45 &
5.8 Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll collection
(Autotoll)
• Container Tracking
CURRENT APPLICATIONS
APPLICATIONS
Credit Cards with RFID
(Paywave function)
Octopus (Smart Card)
APPLICATIONS
Autotoll (Electronic toll collection)
Access Control
ONLINE SURVEY
• Target: SME
• Information: Opinion on RFID and its applications
• Site:
• http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
SURVEY RESULT
Logistics and Supply
Chain Management
20%
Pharmaceutic
manufacturing
industries
15%
Library
Management
21%
Inventory Control
10%
Document
Management
8%
Security
8%
Customer Services
5%
Hotel Management
5%
Banking and Finance
5%
Social Services
3%
Other
18%
Types of industries that respondents think
it is possible to apply RFID technology
FURTHER DEVELOPMENT
• In medical uses and library management
VIDEO
CONCLUSION
• Positive
• RFID is a contactless reading technology and can read through other materials
• Hold more data than barcode does
• RFID tags data can be changed or added
• More effective, bring lots of convenience to us
• Negative
• Cost is relatively remain high (compare to barcode)
• RFID signals may have problems with some materials
• RFID standards are still being developed

Contenu connexe

Tendances

15216047 pss7-ans
15216047 pss7-ans15216047 pss7-ans
15216047 pss7-ansJaime Lee
 
15216691 pss7-ans
15216691 pss7-ans15216691 pss7-ans
15216691 pss7-ansjackylou123
 
15216039 pss7-ans
15216039 pss7-ans15216039 pss7-ans
15216039 pss7-ansShirley LEE
 
RFID AND ITS APPLICATION
RFID AND ITS APPLICATIONRFID AND ITS APPLICATION
RFID AND ITS APPLICATIONkeromandy
 
15225089 pss7-ans
15225089 pss7-ans15225089 pss7-ans
15225089 pss7-answhting
 
RFID Application15221784 pss7-ans
RFID Application15221784 pss7-ansRFID Application15221784 pss7-ans
RFID Application15221784 pss7-ansYUENYUKMUK
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationbenkalok
 
RFID Application
RFID ApplicationRFID Application
RFID ApplicationKayan To
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationlee163
 
3D printing
3D printing3D printing
3D printingnoel_cwk
 
RFID Application
RFID ApplicationRFID Application
RFID Application15216535
 
13206117 pss7.pptx
13206117 pss7.pptx13206117 pss7.pptx
13206117 pss7.pptxchautingfong
 
15215644 pps
15215644 pps15215644 pps
15215644 ppsbobolew
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705
 

Tendances (19)

15216047 pss7-ans
15216047 pss7-ans15216047 pss7-ans
15216047 pss7-ans
 
15216691 pss7-ans
15216691 pss7-ans15216691 pss7-ans
15216691 pss7-ans
 
15216039 pss7-ans
15216039 pss7-ans15216039 pss7-ans
15216039 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID AND ITS APPLICATION
RFID AND ITS APPLICATIONRFID AND ITS APPLICATION
RFID AND ITS APPLICATION
 
15225089 pss7-ans
15225089 pss7-ans15225089 pss7-ans
15225089 pss7-ans
 
RFID Application15221784 pss7-ans
RFID Application15221784 pss7-ansRFID Application15221784 pss7-ans
RFID Application15221784 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15200787 pss7-ans
15200787 pss7-ans15200787 pss7-ans
15200787 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
3D printing
3D printing3D printing
3D printing
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15223108 pss7
15223108 pss715223108 pss7
15223108 pss7
 
13206117 pss7.pptx
13206117 pss7.pptx13206117 pss7.pptx
13206117 pss7.pptx
 
15215644 pps
15215644 pps15215644 pps
15215644 pps
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
 

En vedette

Serverhuset Funktionshyra
Serverhuset FunktionshyraServerhuset Funktionshyra
Serverhuset FunktionshyraServerhuset
 
Manual de microsoft office word 2013
Manual de microsoft office  word 2013Manual de microsoft office  word 2013
Manual de microsoft office word 2013yurikacht666
 
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicosFrancisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicosFundación Ramón Areces
 
Corporate interior designers
Corporate interior designersCorporate interior designers
Corporate interior designersandrew-mack
 
7 th-apresentação
7 th-apresentação7 th-apresentação
7 th-apresentaçãoThiago Ferri
 
4° básico b semana del martes 11 al 14 de octubre
4° básico b semana del martes 11 al 14 de octubre4° básico b semana del martes 11 al 14 de octubre
4° básico b semana del martes 11 al 14 de octubreColegio Camilo Henríquez
 
Валерий Куваев, Agile нельзя Waterfall
Валерий Куваев, Agile нельзя WaterfallВалерий Куваев, Agile нельзя Waterfall
Валерий Куваев, Agile нельзя WaterfallScrumTrek
 
Deconstructing Buckeye Nation - An Examination Through the Tribal Lens
Deconstructing Buckeye Nation - An Examination Through the Tribal LensDeconstructing Buckeye Nation - An Examination Through the Tribal Lens
Deconstructing Buckeye Nation - An Examination Through the Tribal LensGabe Abella
 
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)Great Ayuda
 
Newsletter Januar 2017, DLF Rechtsanwälte Ukraine
Newsletter Januar 2017, DLF Rechtsanwälte UkraineNewsletter Januar 2017, DLF Rechtsanwälte Ukraine
Newsletter Januar 2017, DLF Rechtsanwälte UkraineChristine Khariv
 

En vedette (15)

Serverhuset Funktionshyra
Serverhuset FunktionshyraServerhuset Funktionshyra
Serverhuset Funktionshyra
 
Manual de microsoft office word 2013
Manual de microsoft office  word 2013Manual de microsoft office  word 2013
Manual de microsoft office word 2013
 
BEAUTIFYING THE STAIRCASES
BEAUTIFYING THE STAIRCASESBEAUTIFYING THE STAIRCASES
BEAUTIFYING THE STAIRCASES
 
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicosFrancisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
Francisco Morán-Abriendo mentes sobre carreras profesionales de los científicos
 
Corporate interior designers
Corporate interior designersCorporate interior designers
Corporate interior designers
 
Ppt compuerta x nor
Ppt compuerta x norPpt compuerta x nor
Ppt compuerta x nor
 
7 th-apresentação
7 th-apresentação7 th-apresentação
7 th-apresentação
 
4° básico b semana del martes 11 al 14 de octubre
4° básico b semana del martes 11 al 14 de octubre4° básico b semana del martes 11 al 14 de octubre
4° básico b semana del martes 11 al 14 de octubre
 
2° basico b semana del 12 al 16 de agosto
2°  basico b  semana del   12 al 16 de agosto2°  basico b  semana del   12 al 16 de agosto
2° basico b semana del 12 al 16 de agosto
 
Валерий Куваев, Agile нельзя Waterfall
Валерий Куваев, Agile нельзя WaterfallВалерий Куваев, Agile нельзя Waterfall
Валерий Куваев, Agile нельзя Waterfall
 
Deconstructing Buckeye Nation - An Examination Through the Tribal Lens
Deconstructing Buckeye Nation - An Examination Through the Tribal LensDeconstructing Buckeye Nation - An Examination Through the Tribal Lens
Deconstructing Buckeye Nation - An Examination Through the Tribal Lens
 
Asitvd 2016 cyberadministration geo.admin.ch
Asitvd 2016 cyberadministration geo.admin.chAsitvd 2016 cyberadministration geo.admin.ch
Asitvd 2016 cyberadministration geo.admin.ch
 
Rajiv Bhatia
Rajiv BhatiaRajiv Bhatia
Rajiv Bhatia
 
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
Lenguaje 3° medio - Actividad de Vocabulario (crucigrama)
 
Newsletter Januar 2017, DLF Rechtsanwälte Ukraine
Newsletter Januar 2017, DLF Rechtsanwälte UkraineNewsletter Januar 2017, DLF Rechtsanwälte Ukraine
Newsletter Januar 2017, DLF Rechtsanwälte Ukraine
 

Similaire à RFID Application

RFID Application
RFID ApplicationRFID Application
RFID ApplicationAmbroseTse
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applicationsckmsara
 
Rfid &amp; its applications
Rfid &amp; its applicationsRfid &amp; its applications
Rfid &amp; its applicationsMingMing Cheung
 
15215288 pss7 ans
15215288 pss7 ans15215288 pss7 ans
15215288 pss7 ansCarol Ko
 
RFID & Its applications
 RFID & Its applications RFID & Its applications
RFID & Its applicationsGroup8
 
RFID Application
RFID ApplicationRFID Application
RFID ApplicationJeanie Lo
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD ApplicationLenox1224
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATIONsarah ho
 
15214311 pss7-ans
15214311 pss7-ans15214311 pss7-ans
15214311 pss7-ansElla Li
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applicationschristy LEE
 
15223426 pss7
15223426 pss715223426 pss7
15223426 pss7ying0000
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-anstigertsang
 

Similaire à RFID Application (15)

15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
Rfid &amp; its applications
Rfid &amp; its applicationsRfid &amp; its applications
Rfid &amp; its applications
 
15215288 pss7 ans
15215288 pss7 ans15215288 pss7 ans
15215288 pss7 ans
 
RFID & Its applications
 RFID & Its applications RFID & Its applications
RFID & Its applications
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
 
15214311 pss7-ans
15214311 pss7-ans15214311 pss7-ans
15214311 pss7-ans
 
15218473 pss7-ans
15218473 pss7-ans15218473 pss7-ans
15218473 pss7-ans
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
15223426 pss7
15223426 pss715223426 pss7
15223426 pss7
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
 

Dernier

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

RFID Application

  • 1. RFID & ITS APPLICATIONS MEMBERS: BOB(123456) MAX(2344556) … GCIT1015 Wednesday, October 7, 2015
  • 2. CONTENT FLOW OF PRESENTATION Introduction Application Survey Results Video Conclusion
  • 3. RFID • RFID = Radio Frequency Identification • Electronic labeling and wireless identification of objects using radio frequency • Tag carries with its information • a serial number • Model number • Color or any other imaginable data • When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID COMPONENTS • A basic RFID system consists of these components: • A programmable RFID tag/inlay for storing item data; • Consisting of an RFID chip for data storage • an antenna to facilitate communication with the RFID chip • A reader/antenna system to interrogate the RFID inlay • Application software and a host computer system
  • 5. RFID TAG • The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium. • Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader • 3 types • Passive • Semi-passive • Active
  • 6. TYPES OF RFID TAGS Active Tags • Use a battery • communicate over distances of several meters Semi-passive Tags • Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. • They are different from active tags in that they only transmit data at the time a response is received Passive Tags • Derive their power from the field generated by the reader • without having an active transmitter to transfer the information store
  • 7. APPLICATIONS Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 9. APPLICATIONS Credit Cards with RFID (Paywave function) Octopus (Smart Card)
  • 10. APPLICATIONS Autotoll (Electronic toll collection) Access Control
  • 11. ONLINE SURVEY • Target: SME • Information: Opinion on RFID and its applications • Site: • http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 12. SURVEY RESULT Logistics and Supply Chain Management 20% Pharmaceutic manufacturing industries 15% Library Management 21% Inventory Control 10% Document Management 8% Security 8% Customer Services 5% Hotel Management 5% Banking and Finance 5% Social Services 3% Other 18% Types of industries that respondents think it is possible to apply RFID technology
  • 13. FURTHER DEVELOPMENT • In medical uses and library management
  • 14. VIDEO
  • 15. CONCLUSION • Positive • RFID is a contactless reading technology and can read through other materials • Hold more data than barcode does • RFID tags data can be changed or added • More effective, bring lots of convenience to us • Negative • Cost is relatively remain high (compare to barcode) • RFID signals may have problems with some materials • RFID standards are still being developed