METHODS AND SYSTEMS FOR EVALUATING ROCK CUTTINGS USING RFID TAGS

Information

  • Patent Application
  • 20240328311
  • Publication Number
    20240328311
  • Date Filed
    March 28, 2023
    a year ago
  • Date Published
    October 03, 2024
    4 months ago
Abstract
A method for evaluating rock cuttings using RFID tags involves injecting a first batch of RFID tags through a drill pipe to a first depth, attaching of at least a subset of the RFID tags to rock cuttings resulting from drilling activity, transporting the rock cuttings uphole, detecting the subset of the RFID tags attached to the rock cuttings, by an RFID sensor, determining well composite data based on the rock cuttings, and labeling the well composite data as being associated with the first depth.
Description
BACKGROUND

Rock cuttings are small pieces of rock that are chipped away by a drill bit while a well is being drilled. The rock cuttings are transported by the mud stream from the bit to the surface where they may be analyzed. The rock cuttings may be analyzed because they are often the only physical lithological data that are recovered from a well. These data may be used, for example, to develop a reservoir and lithological description, geological correlation and formation identification, etc.


In order to perform a meaningful analysis, it is important that the origin of the rock cuttings, e.g., a certain depth in the well is known. Conventional methods such as collecting the cuttings in a shale shaker may not be applicable under certain circumstances, for example, in underbalanced drilling scenarios using coiled tubing. In such a closed loop system, the cuttings are not accessible. For these and other scenarios, an inline sensing system for analysis of the rock cuttings is necessary or desirable.


SUMMARY

This summary is provided to introduce a selection of concepts that are further described below in the detailed description. This summary is not intended to identify key or essential features of the claimed subject matter, nor is it intended to be used as an aid in limiting the scope of the claimed subject matter.


In general, in one aspect, embodiments relate to a method for evaluating rock cuttings using RFID tags, the method comprising: injecting a first batch of RFID tags through a drill pipe to a first depth; attaching of at least a subset of the RFID tags to rock cuttings resulting from drilling activity; transporting the rock cuttings uphole; detecting the subset of the RFID tags attached to the rock cuttings, by an RFID sensor; determining well composite data based on the rock cuttings; and labeling the well composite data as being associated with the first depth.


In general, in one aspect, embodiments relate to a system for evaluating rock cuttings using RFID tags, the system comprising: an RFID sensor configured to perform an in-line detection of RFID tags attached to rock cuttings resulting from drilling activity at a first depth; an inline sensor system configured to determine well composite data based on the rock cuttings; and a computing system configured to label the well composite data as being associated with the first depth, based on the in-line detection of the RFID tags.


In general, in one aspect, embodiments relate to an RFID tag for evaluating rock cuttings, the RFID tag comprising: an adhesive and flexible substrate; and carbon nanotubes disposed on the substrate to form a coil for wireless passive radio frequency identification of the RFID tag.


Other aspects and advantages of the claimed subject matter will be apparent from the following description and the appended claims.





BRIEF DESCRIPTION OF DRAWINGS

Specific embodiments of the disclosed technology will now be described in detail with reference to the accompanying figures. Like elements in the various figures are denoted by like reference numerals for consistency.



FIG. 1 shows a drilling system in accordance with embodiments of the disclosure.



FIG. 2 shows a system for evaluating rock cuttings using radio-frequency identification (RFID) tags, in accordance with embodiments of the disclosure.



FIG. 3A shows an RFID tag, in accordance with embodiments of the disclosure.



FIG. 3B shows a manufacturing of an RFID tag, in accordance with embodiments of the disclosure.



FIG. 4 shows a flowchart of a method for predicting conditions ahead of a drill bit, in accordance with embodiments of the disclosure.



FIG. 5 shows a computer system in accordance with embodiments of the disclosure.





DETAILED DESCRIPTION

In the following detailed description of embodiments of the disclosure, numerous specific details are set forth in order to provide a more thorough understanding of the disclosure. However, it will be apparent to one of ordinary skill in the art that the disclosure may be practiced without these specific details. In other instances, well-known features have not been described in detail to avoid unnecessarily complicating the description.


Throughout the application, ordinal numbers (e.g., first, second, third, etc.) may be used as an adjective for an element (i.e., any noun in the application). The use of ordinal numbers is not to imply or create any particular ordering of the elements nor to limit any element to being only a single element unless expressly disclosed, such as using the terms “before”, “after”, “single”, and other such terminology. Rather, the use of ordinal numbers is to distinguish between the elements. By way of an example, a first element is distinct from a second element, and the first element may encompass more than one element and succeed (or precede) the second element in an ordering of elements.


In general, embodiments of the disclosure include systems and methods for evaluating rock cuttings using RFID tags. The RFID tags may attach to the rock cuttings to enable an inline detection and interpretation of the rock cuttings. A detailed description is subsequently provided.



FIG. 1 shows a drilling system (100) that may include a top drive drilling rig (110) arranged around the setup of a drill bit (124) in a drilling configuration. The drilling system (100) may include logging-while-drilling (LWD) functionality. The drilling system (100) may further include geosteering functionality. A top drive drilling rig (110) may include a top drive (111) that may be suspended in a derrick (112) by a travelling block (113). In the center of the top drive (111), a drive shaft (114) may be coupled to a top pipe of a drill string (115), for example, by threads. The top drive (111) may rotate the drive shaft (114), so that the drill string (115) and a drill bit (124) cut the rock at the bottom of a wellbore (116). Drilling mud may be pumped into the wellbore (116) through a mud line (119), the drive shaft (114), and/or the drill string (115).


The control system (144) may include one or more programmable logic controllers (PLCs) that include hardware and/or software with functionality to control one or more processes performed by the drilling system (100). Specifically, a programmable logic controller may control valve states, fluid levels, pipe pressures, warning alarms, and/or pressure releases throughout a drilling rig. While one control system is shown in FIG. 1, the drilling system (100) may include multiple control systems for managing various well drilling operations, maintenance operations, well completion operations, and/or well intervention operations. The control system (144) may be based on a computer system as shown in FIG. 5.


The wellbore (116) may include a bored hole that extends from the surface into a target zone of the hydrocarbon-bearing formation, such as the reservoir. An upper end of the wellbore (116), terminating at or near the surface, may be referred to as the “up-hole” end of the wellbore (116), and a lower end of the wellbore, terminating in the hydrocarbon-bearing formation, may be referred to as the “down-hole” end of the wellbore (116). The wellbore (116) may facilitate the circulation of drilling fluids during well drilling operations, the flow of hydrocarbon production (“production”) (e.g., oil and gas) from the reservoir to the surface during production operations, the injection of substances (e.g., water) into the hydrocarbon-bearing formation or the reservoir during injection operations, or the communication of monitoring devices (e.g., logging tools) into the hydrocarbon-bearing formation or the reservoir during monitoring operations (e.g., during in situ logging operations).


While FIG. 1 shows various configurations of components, other configurations may be used without departing from the scope of the disclosure. For example, the drilling system (100) may use coiled tubing for the drilling. Further, various components in FIG. 1 may be combined to create a single component. As another example, the functionality performed by a single component may be performed by two or more components.



FIG. 2 shows a system for evaluating rock cuttings using RFID tags, in accordance with embodiments of the disclosure. In order to perform a meaningful analysis of rock cuttings, it is important that the origin of the rock cuttings, e.g., a certain depth in the well, is known. Conventional methods such as collecting the cuttings in a shale shaker may not be applicable under certain circumstances, for example, in underbalanced drilling scenarios using coiled tubing. In such a closed loop system, the cuttings are not accessible. For these and other scenarios, the system (200), providing an inline sensing for analysis of the rock cuttings may be particularly beneficial. As further described below, rock cuttings may be labeled using RFID tags, and the inline sensing may include a detection of the RFID tags, and further an evaluation of the rock cuttings using other sensing methods.


Similar to what is shown in FIG. 1, FIG. 2 shows a drilling scenario, with a drill bit (224) in a wellbore (216). FIG. 2 further shows a drill pipe (218) which may be part of the drill string (115) of FIG. 1.



FIG. 2 also shows rock cuttings (252) that may be released as a result of the drilling using the drill bit (224). In addition, RFID tags (254) are shown. The RFID tags, in one or more embodiments, are transported from the surface in a downhole direction to the rock through the drill pipe (218) with the drilling mud. The RFID tags (254) may be in the drilling mud (and possibly other fluids) surrounding the drill bit (224), where they may come in contact with the rock cuttings (252). In one or more embodiments, the RFID tags (254) are designed to adhere to the rock cuttings (252). Rock cuttings (252) with attached RFID tags (254) may be transported to the surface with the circulation of the drilling mud.


As the rock cuttings (252) are transported to the surface, they are recorded inline by an RFID sensor (260) based on signals obtained from the RFID tags (254). An RFID sensor (260), installed above-ground may be used to detect the RFID tags (254) inline, as they are passing by the RFID sensor (260) in the drilling mud. Accordingly, rock cuttings (252) to which the RFID tags (254) are attached, may be detected using the RFID sensor (260). Based on the readout by the RFID sensor (260), a depth from which a rock cutting (252) originated may be determined as further discussed below.


An inline sensor system (270) may be used to further evaluate characteristics of the rock cuttings (252). For example, the inline sensor system (270) may include equipment that performs resistivity measurements, ultrasonic measurements, X-ray fluorescence (XRF) measurements, and/or chemical composition measurements. With depth information available based on the signals obtained by the RFID sensor (260), the measurements obtained by the inline sensor system (270) may be correlated with depth in order to provide an enhanced formation evaluation.


A detailed description of an RFID tag (254), and the interrogation of the RFID tag using the RFID sensor (260) is provided below in reference to FIG. 3A.



FIG. 3A shows an RFID tag (300), in accordance with embodiments of the disclosure. The RFID tag (300) includes a substrate (302) and carbon nanotubes (304). The substrate (302) may be a flexible and sticky adhesive polymer substrate, and the carbon nanotubes (304) may be disposed on the substrate (302). The polymer substrate may have characteristics that enable it to attach to rock cuttings and to remain attached. The footprint of an RFID tag (300) may have any shape such as circular, rectangular, square, etc., and the dimensions of the RFID tag (300) may be in a range of, for example, 0.7 mm to 5 mm.


In one or more embodiments, the RFID tag provides a wireless passive (or chipless) radio-frequency identification system. The wireless passive strain sensor is formed by a coil formed by the carbon nanotubes (304). The coil may have a particular resonance frequency that is governed by the geometry of the coil. In one embodiment, the carbon nanotubes are arranged in a rectangular form to maximize signal response and resonance. The spacing in the rectangular shaped antenna may be optimized to depending on the desired resonance frequency for the RFID tag identification.


The RFID tag (300) may be read out using an electrical impedance spectroscopy analysis, e.g., performed by the RFID sensor (260) in FIG. 2. The RFID sensor (260) may include an impedance analyzer, and the readout may be performed by measuring the complex impedance of the coil of carbon nanotubes to determine resonance frequencies of individual RFID tags. A certain complex impedance, in one or more embodiments, corresponds to a particular RFID tag design. Accordingly, when different RFID tags are present, they may be distinguished based on their resonance frequencies. When RFID tags with unique complex impedances (based on unique coil geometries) are injected in a depth-specific manner, rock cuttings to which the RFID tags adhere may be assigned to different depths, based on the complex impedances detected when performing the RFID tag identification.



FIG. 3B shows the manufacturing (350) of an RFID tag (300), in accordance with embodiments of the disclosure. In the example, an insulating layer film (352) is deposited on top of a substrate (302). The carbon nanotubes (304) are deposited onto the insulating layer film (352) between electrodes (354), e.g., to form a pattern as shown in FIG. 3A. The depositing of the carbon nanotubes may be accomplished by spraying or dripping a carbon nanotube dispersion liquid (356) onto the insulating layer film (352) by an inkjet nozzle (358). The carbon nanotube dispersion liquid (356) may include a semi-conductive polymer, that is connected to a single walled carbon nanotube that is semi-conductive.


An RFID tag (300) as shown in FIG. 3A and manufactured as shown in FIG. 3B may have a communication distance of approximately lm, which is sufficient for in-pipe detection.


Using the RFID tag (300) in combination with the RFID sensor (260) and the inline sensor system (270), data may be acquired in real-time or near-real-time, even when the drilling mud is circulating in a closed system. The types of data that is obtained may be governed by the sensing modalities of the inline sensor system (270). The obtained data may be used to facilitate decisions on drilling. For example, the data may allow determination of formation properties including lithology and saturation patterns ahead of the bit for geosteering purposes.



FIGS. 4 shows a flowchart in accordance with one or more embodiments. The flowchart of FIG. 4 relates to a method (400) for evaluating rock cuttings using RFID tags.


One or more steps in FIG. 4 may be performed by one or more components introduced in FIGS. 1, 2, and 3A and 3B. One or more of the steps may involve use of a computer system, e.g., as shown in FIG. 5. While the various steps in FIG. 4 are presented and described sequentially, one of ordinary skill in the art will appreciate that some or all of the steps may be executed in different orders, may be combined or omitted, and some or all of the steps may be executed in parallel. Furthermore, the steps may be performed actively or passively.


In Step 402, RFID tags are injected through the drill pipe. The RFID tags may be introduced above-ground. In one or more embodiments, the RFID tags are injected in batches for specific depth intervals. Each batch, specific to a depth interval may include RFID tags with a unique coil geometry (and a resulting unique resonance frequency) in order to enable distinction of rock cuttings from different depth intervals. For example, a first batch of RFID tags may be injected at a first depth, and a second batch of RFID tags may be injected at a second depth. The RFID tags in the first batch have the same first resonance frequency, and the RFID tags in the second batch have the same second reference frequency. The first and the second reference frequencies may be different.


In Step 404, the RFID tags are transported to the drill bit. Transport downhole toward the drill bit may be provided by the flow of the drilling mud.


In Step 406, the RFID tags attach to the rock cuttings. In one or more embodiments, RFID tags attach to the rocks, moving into the interpore structures. This entrapment enables the RFID tags to attach to the rock cuttings such that they may be transported jointly with the rock cuttings. Event though not all RFID tags may necessarily attach to rock cuttings, at least a subset or a majority of the injected RFID tags do get attached to the rock cuttings.


In Step 408, the rock cuttings are transported uphole. Transport uphole toward the drill bit may be provided by the flow of the drilling mud.


In Step 410, the RFID tags, attached to the rock cuttings, are detected by the RFID sensor. The detection may be performed based on the complex impedance specific to the RFID tags. When different RFID tags are present, they may be distinguished based on their resonance frequencies and corresponding complex impedances. The detection, in one or more embodiments, results in an assignment of a specific depth interval to a rock cutting with an attached RFID tag. In one or more embodiments, an automatic characterization is performed based on the RFID tag response to the inline sensing. When a tag is damaged or destroyed (e.g., mechanically deformed), the RFID tag response may no longer correspond to the originally intended response of the RFID tag. A deep learning algorithm may be used to detect and correct errors resulting from such issues.


In Step 412, when the RFID tags are detected, the inline sensor system records and analyzes data of the well composite. For example, resistivity measurements, ultrasonic measurements, X-ray fluorescence (XRF) measurements, and/or chemical composition measurements may be performed by sensors of the inline sensor system.


In Step 414, the data of the well composite are labeled according to depth, based on the RFID tags detected in Step 410. Specifically, with depth information available based on the signals obtained by the RFID sensor, the measurements obtained by the inline sensor system (270) may be correlated with depth in order to provide an enhanced formation evaluation.


In Step 416, based on the results obtained after completion of Step 414, an optimization of possible future injections of RFID tags may be performed. The optimization may be performed in terms of determining the injection quantities of the tags, and the time intervals between which different tags are injected. Furthermore, the RFID tag properties may be changed in terms of size, and format in order to ensure attachment, while minimizing cost. Further, drilling operations may be adjusted.


Embodiments may be implemented on a computer system. FIG. 5 is a block diagram of a computer system (502) used to provide computational functionalities associated with described algorithms, methods, functions, processes, flows, and procedures as described in the instant disclosure, according to an implementation. The illustrated computer (502) is intended to encompass any computing device such as a high performance computing (HPC) device, a server, desktop computer, laptop/notebook computer, wireless data port, smart phone, personal data assistant (PDA), tablet computing device, one or more processors within these devices, or any other suitable processing device, including both physical or virtual instances (or both) of the computing device. Additionally, the computer (502) may include a computer that includes an input device, such as a keypad, keyboard, touch screen, or other device that can accept user information, and an output device that conveys information associated with the operation of the computer (502), including digital data, visual, or audio information (or a combination of information), or a GUI.


The computer (502) can serve in a role as a client, network component, a server, a database or other persistency, or any other component (or a combination of roles) of a computer system for performing the subject matter described in the instant disclosure. The illustrated computer (502) is communicably coupled with a network (530). In some implementations, one or more components of the computer (502) may be configured to operate within environments, including cloud-computing-based, local, global, or other environment (or a combination of environments).


At a high level, the computer (502) is an electronic computing device operable to receive, transmit, process, store, or manage data and information associated with the described subject matter. According to some implementations, the computer (502) may also include or be communicably coupled with an application server, e-mail server, web server, caching server, streaming data server, business intelligence (BI) server, or other server (or a combination of servers).


The computer (502) can receive requests over network (530) from a client application (for example, executing on another computer (502)) and responding to the received requests by processing the said requests in an appropriate software application. In addition, requests may also be sent to the computer (502) from internal users (for example, from a command console or by other appropriate access method), external or third-parties, other automated applications, as well as any other appropriate entities, individuals, systems, or computers.


Each of the components of the computer (502) can communicate using a system bus (503). In some implementations, any or all of the components of the computer (502), both hardware or software (or a combination of hardware and software), may interface with each other or the interface (504) (or a combination of both) over the system bus (503) using an application programming interface (API) (512) or a service layer (513) (or a combination of the API (512) and service layer (513). The API (512) may include specifications for routines, data structures, and object classes. The API (512) may be either computer-language independent or dependent and refer to a complete interface, a single function, or even a set of APIs. The service layer (513) provides software services to the computer (502) or other components (whether or not illustrated) that are communicably coupled to the computer (502). The functionality of the computer (502) may be accessible for all service consumers using this service layer. Software services, such as those provided by the service layer (513), provide reusable, defined business functionalities through a defined interface. For example, the interface may be software written in JAVA, C++, or other suitable language providing data in extensible markup language (XML) format or other suitable format. While illustrated as an integrated component of the computer (502), alternative implementations may illustrate the API (512) or the service layer (513) as stand-alone components in relation to other components of the computer (502) or other components (whether or not illustrated) that are communicably coupled to the computer (502). Moreover, any or all parts of the API (512) or the service layer (513) may be implemented as child or sub-modules of another software module, enterprise application, or hardware module without departing from the scope of this disclosure.


The computer (502) includes an interface (504). Although illustrated as a single interface (504) in FIG. 5, two or more interfaces (504) may be used according to particular needs, desires, or particular implementations of the computer (502). The interface (504) is used by the computer (502) for communicating with other systems in a distributed environment that are connected to the network (530). Generally, the interface (504 includes logic encoded in software or hardware (or a combination of software and hardware) and operable to communicate with the network (530). More specifically, the interface (504) may include software supporting one or more communication protocols associated with communications such that the network (530) or interface's hardware is operable to communicate physical signals within and outside of the illustrated computer (502).


The computer (502) includes at least one computer processor (505). Although illustrated as a single computer processor (505) in FIG. 5, two or more processors may be used according to particular needs, desires, or particular implementations of the computer (502). Generally, the computer processor (505) executes instructions and manipulates data to perform the operations of the computer (502) and any algorithms, methods, functions, processes, flows, and procedures as described in the instant disclosure.


The computer (502) also includes a memory (506) that holds data for the computer (502) or other components (or a combination of both) that can be connected to the network (530). For example, memory (506) can be a database storing data consistent with this disclosure. Although illustrated as a single memory (506) in FIG. 5, two or more memories may be used according to particular needs, desires, or particular implementations of the computer (502) and the described functionality. While memory (506) is illustrated as an integral component of the computer (502), in alternative implementations, memory (506) can be external to the computer (502).


The application (507) is an algorithmic software engine providing functionality according to particular needs, desires, or particular implementations of the computer (502), particularly with respect to functionality described in this disclosure. For example, application (507) can serve as one or more components, modules, applications, etc. Further, although illustrated as a single application (507), the application (507) may be implemented as multiple applications (507) on the computer (502). In addition, although illustrated as integral to the computer (502), in alternative implementations, the application (507) can be external to the computer (502).


There may be any number of computers (502) associated with, or external to, a computer system containing computer (502), each computer (502) communicating over network (530). Further, the term “client,” “user,” and other appropriate terminology may be used interchangeably as appropriate without departing from the scope of this disclosure. Moreover, this disclosure contemplates that many users may use one computer (502), or that one user may use multiple computers (502).


In some embodiments, the computer (502) is implemented as part of a cloud computing system. For example, a cloud computing system may include one or more remote servers along with various other cloud components, such as cloud storage units and edge servers. In particular, a cloud computing system may perform one or more computing operations without direct active management by a user device or local computer system. As such, a cloud computing system may have different functions distributed over multiple locations from a central server, which may be performed using one or more Internet connections. More specifically, a cloud computing system may operate according to one or more service models, such as infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), mobile “backend” as a service (MBaaS), serverless computing, artificial intelligence (AI) as a service (AIaaS), and/or function as a service (FaaS).


Although only a few example embodiments have been described in detail above, those skilled in the art will readily appreciate that many modifications are possible in the example embodiments without materially departing from this invention. Accordingly, all such modifications are intended to be included within the scope of this disclosure as defined in the following claims.

Claims
  • 1. A method for evaluating rock cuttings using RFID tags, the method comprising: injecting a first batch of RFID tags through a drill pipe to a first depth;attaching of at least a subset of the RFID tags to rock cuttings resulting from drilling activity;transporting the rock cuttings uphole;detecting the subset of the RFID tags attached to the rock cuttings, by an RFID sensor;determining well composite data based on the rock cuttings; andlabeling the well composite data as being associated with the first depth.
  • 2. The method of claim 1, further comprising performing a formation evaluation, based on the well composite data.
  • 3. The method of claim 1, further comprising: injecting a second batch of RFID tags through the drill pipe to a second depth;attaching of at least a subset of the RFID tags in the second batch to rock cuttings generated by drilling activity at the second depth; anddetecting the subset of the RFID tags, attached to the rock cuttings from the second depth, by the RFID sensor.
  • 4. The method of claim 3, wherein the RFID tags in the second batch are distinguishable from the RFID tags in the first batch, by the RFID sensor.
  • 5. The method of claim 1, further comprising optimizing future injections of RFID tags, based on results obtained from the injection of the first batch of RFID tags.
  • 6. The method of claim 1, wherein attaching of at least a subset of the RFID tags to rock cuttings generated by drilling activity comprises: adhering of a flexible and sticky substrate of the RFID tags to the rock cuttings upon contact.
  • 7. The method of claim 1, wherein transporting the rock cuttings uphole is provided by a flow of drilling mud.
  • 8. The method of claim 1, wherein detecting the subset of the RFID tags by the RFID sensor comprises: measuring, for an RFID tag in the subset, a complex impedance of a coil of the RFID tag.
  • 9. The method of claim 8, wherein detecting the subset of the RFID tags by the RFID sensor further comprises: detecting an error associated with a damaged RFID tag.
  • 10. The method of claim 1, wherein each of the RFID tags in the first batch comprises a coil with a same resonance frequency.
  • 11. The method of claim 1, wherein determining the well composite data comprises at least one selected from a group consisting of determining resistivity measurements, ultrasonic measurements, X-ray fluorescence measurements, and chemical composition measurements.
  • 12. The method of claim 1, wherein the rock cuttings are evaluated in a closed loop system of an underbalanced drilling scenario using coiled tubing.
  • 13. A system for evaluating rock cuttings using RFID tags, the system comprising: an RFID sensor configured to perform an in-line detection of RFID tags attached to rock cuttings resulting from drilling activity at a first depth;an inline sensor system configured to determine well composite data based on the rock cuttings; anda computing system configured to label the well composite data as being associated with the first depth, based on the in-line detection of the RFID tags.
  • 14. The system of claim 13, wherein the RFID sensor comprises an impedance analyzer configured to measure a complex impedance associated with the RFID tags.
  • 15. The system of claim 13, wherein the inline sensor system comprises measurement equipment configured to perform at least one of resistivity measurements, ultrasonic measurements, X-ray fluorescence measurements, and chemical composition measurements.
  • 16. An RFID tag for evaluating rock cuttings, the RFID tag comprising: an adhesive and flexible substrate; andcarbon nanotubes disposed on the substrate to form a coil for wireless passive radio frequency identification of the RFID tag.
  • 17. The RFID tag of claim 16, wherein the coil has a particular resonance frequency governed by a geometry of the coil.
  • 18. The RFID tag of claim 16, wherein the carbon nanotubes are arranged in a rectangular form.
  • 19. The RFID tag of claim 16, wherein the substrate is a polymer substrate.
  • 20. The RFID tag of claim 16, further comprising an insulating film between the substrate and the carbon nanotubes.