Rfid Disadvantages

Great Essays
3.8: Benefits and Limitations of RFID:

Though RFID is not likely to entirely replace commonly used barcodes in the near future, the following advantages suggest to additionally apply RFID for added value of identification:
• Tag detection not requiring human intervention reduces employment costs and eliminates human errors from data collection,
• As no line-of-sight is required, tag placement is less constrained,
RFID tags have a longer read range than, e. g., barcodes,
• Tags can have read/write memory capability, while barcodes do not,
• An RFID tag can store large amounts of data additionally to a unique identifier,
• Unique item identification is easier to implement with RFID than with barcodes,
• Its ability to identify items individually rather than generically. • Tags are less sensitive to adverse conditions (dust, chemicals, physical damage etc.), • Many tags can be read simultaneously, • RFID tags can be combined with sensors, • Automatic reading at several places reduces time lags and inaccuracies in an inventory, • Tags can locally store additional information; such distributed data storage may increase fault tolerance of the entire system, • Reduces inventory control and provisioning costs, • Reduces warranty claim processing costs. Limitations of RFID: • Standardization: Though the characteristics of the application and the environment of use determine the appropriate tag, the sparse standards still leave much freedom in the choice of communication protocols and the format and amount of information stored in the tag. Companies transcending a closed-loop solution and wishing to share their application with others may encounter conflicts as cooperating partners need to agree in standards concerning communication protocols, signal modulation types, data transmission rates, data encoding and frames, and collision handling algorithms. • Cost: The cost of tags depends on their type. In the 2003 report ‘RFID Systems in the Manufacturing Supply Chain’, ARC This predicted decrease is still deemed insufficient, as economic use of tags—taking the associated 5–35% decrease of labor costs and zero tag information generation costs into account as well—would require a maximum of 25 cents per tag for high-end products, and 5 cents for common item-level tagging. Prices of active or semi-passive tags (at least $1 per tag) are even more of a hindrance, allowing their economic application only for scanning high-value goods over long ranges. • Collision: Attempting to read several tags at a time may result in signal collision and ultimately to data loss. To prevent this, anti-collision algorithms (most of them are patented or patent pending) can be applied at an extra cost. The development of these methods, aimed at reducing overall read time and maximizing the number of tags simultaneously read, still goes on. • Faulty manufacture of tags and deficient detection of tags: Manufacturing of tags is not yet 100% failure-free today; about 20–30% of tags used in early RFID pilots have been defective. Tags may be damaged during usage. A wide range of application challenges can be answered by the multitude of suitable tags, yet none of them is completely invulnerable and the causes of damage
…show more content…
User can instantly determine the general location of tagged assets anywhere within the facility with the help of active RFID technology. Control point detection zones at strategic locations throughout the facility allow the user to define logical zones and monitor high traffic areas. Tagged assets moving through these control points provide instant location data.Asset tracking applications will see an almost vertical growth curve in the coming years and the growth rate in this area will be much higher than the growth rate of general RFID …show more content…
Hospitals and jails are most general tracking required places. Hospital uses RFID tags for tracking their special patients. In emergency patient and other essential equipment can easily track. It will be mainly very useful in mental care hospitals where doctors can track each and every activity of the patient. Hospitals also use these RFID tags for locating and tracking all the activities of the newly born babies. The best use of the people tracking system will be in jails. It becomes an easy tracking system to track their inmates. Many jails of different US states like Michigan, California, and Arizona are already using RFID-tracking systems to keep a close eye on jail

Related Documents

  • Great Essays

    Cost Benefit Analysis

    • 1774 Words
    • 7 Pages

    An RFI is an informal communication in which the target vendor may respond with its general marketing materials, product features, or services listings. An RFI may be useful in determining what products are commonly available among vendors or learning about the history/longevity of a specific vendor. This method is can be executed quickly with little preparation on the part of the soliciting organization. A request for proposal (RFP) on the other hand, involves a considerable investment of time and preparation for an organization.…

    • 1774 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Essay On 1984 Technology

    • 501 Words
    • 3 Pages

    “Let’s stop calling them cellphones, call them trackers” (that’s no phone). With cellphones everywhere you go you can get tracked. If you get lost it can tell you exactly where you are at. Also if you leave your phone somewhere you can track your lost phone and find it where ever it’s at. This states how technology can track you…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    For example, in the article "That 's No Phone. That 's My Tracker. " it states, "In just the past few years, cellphone companies have honed their geographic technology, which has become almost pinpoint… If someone knows exactly where you are, they probably know what you are doing.…

    • 1042 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Police officers have needed the information on electronic devices. They need this data for finding missing citizens and suspects. But have been stopped in their tracks countless times. They have been stopped by the owners and others that believe the 4th Amendment enables them to decline the seizing and search of their devices. They want officers to have a warrant.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    House Arrest Essay

    • 707 Words
    • 3 Pages

    Nonresidential intermediate sanctions allow offenders to reside at home while participating in programs and adhering to a strict set of rules and guidelines to ensure they are deterred from crime while not in physical custody. For pretrial detainees who voluntarily and convicted offenders house arrest serves as a way to confine those who cannot afford bail or whose personal recognizance is not enough to be unsupervised. The main purpose of house arrest is not to stop criminal behavior, but to reduce the offender’s movement. House arrest will not stop criminal behavior, since they are still in their communities and have ample opportunity to associate with the same neighborhood criminals. House arrest can be supported by electronic monitoring…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The appellant, Chester Comerford, was a licensed attorney and previous law professor who operated a website for a group whom he founded, called the guardians. The guardians questioned President Obama’s citizenship; in 2011 Comerford was convicted of aiding and abetting threats on the President, however the Supreme Court of the United States reversed his conviction the following year. After his conviction was reversed, Comerford went to a local merchant to purchase a smart-phone. Knowing that a phone could be tracked through GPS technology, Comerford disabled the GPS tracking capability, with help from online instructions.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Outsourcing Trends

    • 1566 Words
    • 7 Pages

    Briefly describe the technologies that are leading businesses into the third wave of electronic commerce. The key technologies that are leading businesses into the third wave of electronic commerce include mobile phones and tablets along with high-speed networks that allow users to access the Internet and smart cards and radio frequency identification devices (RFID) that are being used with biometric technologies such as retina scanners and fingerprint readers. In about 100 words, describe the function of the Internet Corporation for Assigned Names and Numbers. Include a discussion of the differences between gTLDs and sTLDs in your answer.…

    • 1566 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    "None of our Business?" by Roberta Fusaro Raydar Electronics is a technology firm which makes radio frequency identification tags and readers. This article describes the use of RFIDs and where they are placed, what their intended purpose is, and why it has stirred commotion to people. Dante Sorella, a CEO of a technology firm informs the readers of some presentations that were given as well. One quick example of this that places such as the US military which have been experimenting with RFIDs on tires for vehicles they use. Further into the article, Marketing director at KoolKids incorporated Carol Sullivan and the CEO of KK Craig Davis took an interest in Raydar to know what is going in and out of the warehouse.…

    • 950 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Aadhaar Case Study

    • 864 Words
    • 4 Pages

    Name: Anand Nair School: The Daly College Delegation: Dr Karan Singh Council: Rajya Sabha Agenda: The Legal Basis for the Aadhaar Biometric Registration Scheme Aadhaar is a 12-digit unique identification number issued by the Indian government to every individual resident of India. The Unique Identification Authority of India (UIDAI), which functions under the Planning Commission of India, is responsible for managing Aadhaar numbers and Aadhaar identification cards. The Aadhaar project was initiated as an attempt towards having a single, unique identification document or number that would capture all the details, including demographic and biometric information, of every resident Indian individual. Aadhaar numbers will eventually serve as the…

    • 864 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Three Dimensional Space

    • 758 Words
    • 4 Pages

    In this project I will talk about curves in three space, also known as curves in three dimensional space or 3 - D. Many of us are familiar with two dimensional space or 2- D. It is called two dimension space because it has two axes: the x-axes and the y-axes. Three dimensional space is represented by the symbol it is called three dimensional space because three axes are used to draw, and the three axes are: x, y, and z. Figure 01: Standard axes of 3 dimensions This is the standard axes of three dimensional or…

    • 758 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Lanyards Essay

    • 675 Words
    • 3 Pages

    Different Uses of Lanyards Lanyards are now an important tool in any type of businesses. Its increasing popularity is likely to continue in most industries and organizations. Aside from its value in the workforce, it has its function in your daily life. People recognize the usefulness of lanyard in different situations and occasions.…

    • 675 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    We just need to scan the people like any of conviction occurs by anyone. So finally, they thought of attaching a chip to a bracelet which offers a tracking capability. Neighbor Watch is basically a neighborhood watch model where the certain set of neighborhood look for each other and report the abnormal behavior. So, that anyone who thought of committing crime can be caught on the eye of the neighborhood. I believe to some each extend eliminate crime and people can be alert and watchful all the time.…

    • 1069 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Home confinement has grown due to the modernization of technology and the growing issues with the prison system. This type of monitoring is used due to the rising crime rates and the overcrowding of prisons. There are two types of monitoring systems that are used; they are active, which keep track or individuals on a continuous basis and passive, which contacts the individual on a random basis to ensure whereabouts. There are advantages to electronic monitoring that include, an alternative to overcrowding prison, enhances the supervision of offenders, reduces the costs of monitoring offenders, provides and intermediate level of punishment, and a great alternative to incarceration letting the offender maintain the support of family and friends.…

    • 1334 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Rfid Pros And Cons

    • 2432 Words
    • 10 Pages

    Topic: Radio Frequency Identification (RFID) -Pros & Cons 1.0 Explanation of marking justification. The topic of the pros and cons of radio frequency identification (RFID) had been evaluated during the presentation session and marks had been given. There are two categories in marking criteria which are content and presentation. For the content which 60 marks in total, there are divided into details which is research, relevance, topicality, and conclusion.…

    • 2432 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    Oneconnec In America

    • 3561 Words
    • 15 Pages

    Product Idea Description: The problem manifested through traditional exchange of business cards which stems from the initial point of exchange to the final storage of contact credentials. Traditional business cards despite their prevalent use; has its own limitations and pain points. Specifically, there are three main sources of pain for users, including: 1) Need to always carry a large stack of business cards. 2) Manual process of inputting and organizing contact information to a device.…

    • 3561 Words
    • 15 Pages
    Improved Essays