Flylib.com
RFID Sourcebook (paperback)
RFID Sourcebook (paperback)
ISBN: 0132762021
EAN: 2147483647
Year: 2006
Pages: 100
Authors:
Sandip Lahiri
BUY ON AMAZON
RFID Sourcebook
Table of Contents
Copyright
Preface
Acknowledgments
Chapter1.Technology Overview
Section 1.1. Fundamental Concepts
Section 1.2. RFID System
Section 1.3. Conclusion
Chapter2.Advantages of the Technology
Section 2.1. Advantages of RFID
Section 2.2. Conclusion
Chapter3.Limitations of the Technology
Section 3.1. Limitations of RFID
Section 3.2. Conclusion
Chapter4.Application Areas
Section 4.1. Prevalent Application Types
Section 4.2. Emerging Application Types
Section 4.3. Conclusion
Chapter5.Privacy Concerns
Section 5.1. Core Issue
Section 5.2. What Are Privacy Rights?
Section 5.3. Resolution Attempts
Section 5.4. Conclusion
Chapter6.RFID Versus Bar Code
Section 6.1. Bar Codes
Section 6.2. Advantages of RFID Over Bar Codes
Section 6.3. Advantages of Bar Codes Over RFID
Section 6.4. Disadvantages of RFID and Bar Codes
Section 6.5. RFID Will Replace Bar Codes Soon
Section 6.6. Conclusion
Chapter7.The RFID Strategy
Section 7.1. Why an RFID Strategy?
Section 7.2. Strategy Guidelines
Section 7.3. RFID Strategy to Deployment Strategy
Section 7.4. Conclusion
Chapter8.Creating Business Justification for RFID
Section 8.1. Slap-and-Ship Type Application
Section 8.2. Step 1: Forming the Business Justification Team
Section 8.3. Step 2: Determining Potential Application Areas
Section 8.4. Step 3: Building Business Cases
Section 8.5. Step 4: Determining Priorities
Section 8.6. Step 5: Creating Roadmaps
Section 8.7. Conclusion
Chapter9.Designing and Implementing an RFID Solution
Section 9.1. System Architecture
Section 9.2. Technical Variables
Section 9.3. Implementation Notes
Section 9.4. Conclusion
Chapter10.Standards
Section 10.1. ANSI Standards
Section 10.2. AIAG Standard
Section 10.3. EANUCC Standard
Section 10.4. EPCglobal Specification
Section 10.5. U.S. Department of Defense (DoD)
Section 10.6. ISO (International Organization for Standardization)
Section 10.7. ETSI (European Telecommunications Standards Institute)
Section 10.8. ERO (European Radiocommunications Office)
Section 10.9. The Open Services Gateway Initiative
Section 10.10. Contact Information of Standards Bodies
Chapter11.Closing Thoughts
Section 11.1. Current Hurdles to Using RFID
Section 11.2. Comments and Observations
Section 11.3. Conclusion
AppendixA.RFID Vendors, News Sources, and Conferences
Section A.1. RFID Vendors
Section A.2. RFID News Sources
Section A.3. RFID Conferences
AppendixB.Passive Tag Manufacturing Overview
Section B.1. Die
Section B.2. Tag Antenna
Section B.3. Inlet
Section B.4. Inlet Conversion
Glossary
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
Z
RFID Sourcebook (paperback)
ISBN: 0132762021
EAN: 2147483647
Year: 2006
Pages: 100
Authors:
Sandip Lahiri
BUY ON AMAZON
Project Management JumpStart
Defining the Project Goals
Breaking Down the Project Activities
Controlling the Project Outcome
Appendix B Sample Project Management Forms
Appendix C Sample Project Management Checklists
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Complex application Using Boost.Build
Using Hashed Containers
Removing Objects from a Container
Introduction
Transforming an XML Document with XSLT
Competency-Based Human Resource Management
Why a Focus on Jobs Is Not Enough
Competency-Based Employee Training
Competency-Based Employee Rewards
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix D Employee Development and Succession Management
Microsoft WSH and VBScript Programming for the Absolute Beginner
Overview of the Windows Script Host
Conditional Logic
Combining Different Scripting Languages
Appendix A WSH Administrative Scripting
Appendix C Whats on the CD-ROM?
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Line Editing
Table Joins
Master/Detail Reports in HTML
Using EXPLAIN PLAN
The Product User Profile
MPLS Configuration on Cisco IOS Software
Implementing BGP in MPLS VPNs
Implementing Route-Reflectors in MPLS VPN Networks
Deployment Scenarios with CSC Architecture
Case Study 1: Implementing Multicast Support for MPLS VPNs
Case Study 10: BGP Site of Origin
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies