RFID Sourcebook (paperback)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

California State Assembly

cameras

     readers

capabilities of tags

capacitive-coupled systems

capacity

     advantages of RFID over bar codes

     data (9.2.2 tags)

carrier frequency

CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) 2nd

categories

     of privacy

         business community 2nd

         political and legal resolutions 2nd 3rd 4th

         technical community 2nd 3rd 4th

CCD (charged coupled device) readers

CEN (European Committee for Standardization)

channels

    input/output

         readers 2nd

character density (bar codes)

characterization of RFID systems 2nd 3rd

charged coupled device (CCD) readers

checkpoints

     multiple tags

CID (consumer identification data)

class tags (EPC) 2nd

clock extractors

close-coupled systems

clusters

     HA

cold (operating conditions)

collaboration

     standards

collisions

     anti-collision algorithms

     readers

commands

     kill 2nd

commisioning tags

commissioning tags

communication infrastructure

comparable accuracy rates (bar codes over RFID)

comparing

     cost of buying/building software

complexity

     objections for not using RFID

complexity of RFID systems

compliance (regulations)

components

     enterprise back-end 2nd

     microchips 2nd

     RFID systems 2nd

         actuators

         annunciators

         characterization of 2nd 3rd

         communication infrastructure

         controllers 2nd

         host/software systems 2nd 3rd

         reader antennas 2nd 3rd 4th

         readers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

         references 2nd 3rd 4th

         sensors

         tags 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

composition relationships

concepts of RFID 2nd 3rd

conferences

constructive interference

consumer identification data (CID)

consumer packaged goods (CPG)

Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN) 2nd

contact wands

contactless smart cards

contactless tags 2nd

Container Security Initiative (CSI)

containers, smart shipping

contingency (plan for vendors)

continuous learning cycles

continuous wave (CW) 2nd

controllers 2nd

     readers

controlling

     access 2nd 3rd 4th

controlling inventory 2nd 3rd

converting

     inlets

corrective measures 2nd

cost of RFID systems 2nd

costs

     as objection for using RFID

     bar codes

     objections for not using RFID 2nd

     ROI

     tags

counterfeiting

     anti-counterfeiting applications 2nd 3rd 4th 5th 6th 7th

CPG (consumer packaged goods)

creating business justification goals 2nd

     building business cases 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

     creating roadmaps 2nd

     determining potential application areas

     forming teams

     setting priorities 2nd

     slap-and-ship type applications 2nd

creep (scope), avoiding

crests

cross-functional support

CSI (Container Security Initiative)

currency

     anti-counterfeit applications 2nd 3rd 4th 5th 6th 7th

current state of RFID

     exclusive in the short run

     high degree of confusion about 2nd

     inclusive in the medium to long run

customization

     slap-and-ship type applications

CW (carrier wave)

CW (continuous wave)

cycles

Категории