Assembly Modul Pembaca Transponder RFID dan Pengujiannya
DOI:
https://doi.org/10.30871/jaee.v7i1.5462Kata Kunci:
Assembly, RFID, TransponderAbstrak
Teknologi berkembang sangat pesat beberapa tahun terakhir terutama pada teknologi berbasis Radio Frequency Identification Device (RFID). Hal ini disebabkan oleh banyaknya kebutuhan yang menggunakan teknologi. Pemanfaatan sistem RFID di Indonesia sebagian besar masih menggunakan perangkat keras RFID seperti transponder RFID dan RFID reader module yang dibeli dari negara lain seperti Cina atau negeri lainnya. Industri di Indonesia yang menggunakan RFID juga rata-rata masih membeli dan tidak memproduksi sendiri. Dari masalah yang ada, maka adanya peluang untuk memproduksi perangkat RFID ini baik transponder RFID maupun modul pembaca transponder RFID yang mirip dengan RFID yang sudah ada. Dalam penelitian ini dilakukan pembuatan modul pembaca transponder RFID dengan tahapan yang dimulai dari membuat skematik rangkaian modul pembaca transponder RFID, membuat layout PCB, mencetak PCB sesuai desain PCB, melakukan assembly komponen dengan menggunakan solder manual, dan melakukan pengujian. Hasil pengujian fungsi menunjukkan bahwa modul pembaca transponder RFID yang dibuat hanya bisa membaca kartu RFID dengan jarak tapping maksimal pada jarak 7 mm, sedangkan modul pembaca transponder RFID yang di pasaran bisa membaca kartu RFID dengan jarak tapping bisa lebih dari 7 mm.
Unduhan
Referensi
A. Coustasse, B. Cunningham, S. Deslich, E. Willson, and P. Meadows, "Benefits and Barriers of Implementation and Utilization of Radio-Frequency Identification (RFID) Systems in Transfusion Medicine," Perspect Health Inf Manag, vol. 12, no. Summer, 2015, Accessed: May 28, 2023. [Online]. Available: /pmc/articles/PMC4558481/
R. Nayak, M. George, I. U. Haq, and H. C. Pham, "Sustainability benefits of RFID technology in Vietnamese fashion supply chain," Cleaner Logistics and Supply Chain, vol. 5, p. 100086, Dec. 2022, doi: 10.1016/J.CLSCN.2022.100086.
P. M. Reyes, W. J. Worthington, and J. D. Collins, "Knowledge management enterprise and RFID systems adoption to supply chain performance," Management Research Review, vol. 38, no. 1, pp. 44"“66, Jan. 2015, doi: 10.1108/MRR-01-2013-0011/FULL/XML.
T. J. Fan, X. Y. Chang, C. H. Gu, J. J. Yi, and S. Deng, "Benefits of RFID technology for reducing inventory shrinkage," Int J Prod Econ, vol. 147, no. PART C, pp. 659"“665, Jan. 2014, doi: 10.1016/J.IJPE.2013.05.007.
M. Mohanasundar, K. J. Thelly, P. Raveendran, al -, A. Aribowo, and A. Satya Putra, "Lecturer and Student Attendance System with RFID," J Phys Conf Ser, vol. 1858, no. 1, p. 012063, Apr. 2021, doi: 10.1088/1742-6596/1858/1/012063.
M. Berg et al., "MFRC522 RFID Technology Implementation for Conventional Merchant with Cashless Payment System," J Phys Conf Ser, vol. 1737, no. 1, p. 012012, Jan. 2021, doi: 10.1088/1742-6596/1737/1/012012.
E. L. Jurnal and P.-I. Sains, "Rancang Bangun Smart Locker Menggunakan Rfid Berbasis Arduino Uno," vol. 2, no. 1, pp. 2527"“6336, 2020.
N. M. Siregar, H. Muhammad, and R. Wicaksono, "Locker Dengan RFID MFRC522 Berbasis Arduino UNO," Autocracy: Jurnal Otomasi, Kendali, dan Aplikasi Industri, vol. 3, no. 02, pp. 140"“148, Dec. 2016, Accessed: May 28, 2023. [Online]. Available: https://journal.unj.ac.id/unj/index.php/autocracy/article/view/6875
R. Weinstein, "RFID: a technical overview and its application to the enterprise," IT Prof, vol. 7, no. 3, pp. 27"“33, 2005, doi: 10.1109/MITP.2005.69.
L. Kong, L. He, Y. Gu, M. Y. Wu, and T. He, "A Parallel Identification Protocol for RFID systems," Proceedings - IEEE INFOCOM, pp. 154"“162, 2014, doi: 10.1109/INFOCOM.2014.6847935.
Miodrag. BolicÌ, David. Simplot-Ryl, and Ivan. StojmenovicÌ, "RFID systems: research trends and challenges," p. 552, 2010, Accessed: May 28, 2023. [Online]. Available: https://books.google.com/books/about/RFID_Systems.html?id=VansInOpixEC.
"RFID Handbook: Fundamentals and Applications in Contactless Smart Cards ... - Klaus Finkenzeller - Google Books." Available: https://bit.ly/3CEfa6P (accessed May 28, 2023).
I. Mayordomo, R. Berenguer, A. Garcia-Alonso, I. Fernandez, and Ã. Gutierrez, "Design and implementation of a long-range rfid reader for passive transponders," IEEE Trans Microw Theory Tech, vol. 57, no. 5, pp. 1283"“1290, 2009, DOI: 10.1109/TMTT.2009.2017291.
S. Preradovic and N. C. Karmakar, "RFID Readers - A Review," in 2006 International Conference on Electrical and Computer Engineering, 2006, pp. 100"“103. DOI: 10.1109/ICECE.2006.355300.
"RC522 RFID Module Pinout, Features, Specs & How to Use It." https://components101.com/wireless/rc522-rfid-module (accessed May 28, 2023).
Unduhan
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Open Access Policy
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge. Its free availability on the public internet, permitting any users to read, download, copy, distribute, print, search, or link to the full texts of these articles, crawl them for indexing, pass them as data to software, or use them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself.









