Skip to main content

RFID Tags


RFID Tags is short for “radio frequency identification”, RFID Tags itself are a type of tracking system that uses smart barcodes in order to identify items. The radio waves transmit data from the tag to a reader, which then transmits the information to a RFID computer program. RFID Tags are usually used for marchandise, but they also can be used to track vehicles, pets, amd even patients with Alzheimer’s disease.
 
There are two types of RFID Tags: battery-operated and passive. Battery-operated RFID Tags or might also can be called active RFID Tags contain an onboard battery as a power supply, whereas a passive RFID Tags does not, instead working by using electromagnetic energy transmitted from an RFID reader. 

An active RFID Tags is constantly sending out a signal, it makes an excellent choice for those who looking for up-to-the-minute live tracking. They are an expensive product, but they do offer a long read range. The other hand, a passive RFID Tags are a much more economical choice than active RFID Tags, this makes them a popular choice for supply chain management, race tracking, file management, and acces control applications.

Active RFID tag
Passive RFID tag


But, RFID Tags are not ideal compared to other tracking labels for a number of reasons. There is some problems with it, including different security and technological issues. Because an RFID tag cannot distinguish between readers, the information can be read by almost anyone, once it has left the original supplu chain. Another concern is that RFID Tags can be linked to individual credit cards, creating a potential for financial theft and fraud. These disadvantages are often avoided with the use of barcodes. 


Dinda Berlian Putri 106218047

 

Reference:

Pontius, N. 2019. What are RFID Tags? Learn How RFID Tags Work, What They’re Used for, and Some of the Disadvantages of RFID Technology. Retrieved from: https://www.camcode.com/asset-tags/what-are-rfid-tags/

Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...