C


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

California State Assembly
cameras
     readers
capabilities of tags
capacitive-coupled systems
capacity
     advantages of RFID over bar codes
     data (9.2.2 tags)
carrier frequency
CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) 2nd
categories
     of privacy
         business community 2nd
         political and legal resolutions 2nd 3rd 4th
         technical community 2nd 3rd 4th
CCD (charged coupled device) readers
CEN (European Committee for Standardization)
channels
    input/output
         readers 2nd
character density (bar codes)
characterization of RFID systems 2nd 3rd
charged coupled device (CCD) readers
checkpoints
     multiple tags
CID (consumer identification data)
class tags (EPC) 2nd
clock extractors
close-coupled systems
clusters
     HA
cold (operating conditions)
collaboration
     standards
collisions
     anti-collision algorithms
     readers
commands
     kill 2nd
commisioning tags
commissioning tags
communication infrastructure
comparable accuracy rates (bar codes over RFID)
comparing
     cost of buying/building software
complexity
     objections for not using RFID
complexity of RFID systems
compliance (regulations)
components
     enterprise back-end 2nd
     microchips 2nd
     RFID systems 2nd
         actuators
         annunciators
         characterization of 2nd 3rd
         communication infrastructure
         controllers 2nd
         host/software systems 2nd 3rd
         reader antennas 2nd 3rd 4th
         readers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
         references 2nd 3rd 4th
         sensors
         tags 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
composition relationships
concepts of RFID 2nd 3rd
conferences
constructive interference
consumer identification data (CID)
consumer packaged goods (CPG)
Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN) 2nd
contact wands
contactless smart cards
contactless tags 2nd
Container Security Initiative (CSI)
containers, smart shipping
contingency (plan for vendors)
continuous learning cycles
continuous wave (CW) 2nd
controllers 2nd
     readers
controlling
     access 2nd 3rd 4th
controlling inventory 2nd 3rd
converting
     inlets
corrective measures 2nd
cost of RFID systems 2nd
costs
     as objection for using RFID
     bar codes
     objections for not using RFID 2nd
     ROI
     tags
counterfeiting
     anti-counterfeiting applications 2nd 3rd 4th 5th 6th 7th
CPG (consumer packaged goods)
creating business justification goals 2nd
     building business cases 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
     creating roadmaps 2nd
     determining potential application areas
     forming teams
     setting priorities 2nd
     slap-and-ship type applications 2nd
creep (scope), avoiding
crests
cross-functional support
CSI (Container Security Initiative)
currency
     anti-counterfeit applications 2nd 3rd 4th 5th 6th 7th
current state of RFID
     exclusive in the short run
     high degree of confusion about 2nd
     inclusive in the medium to long run
customization
     slap-and-ship type applications
CW (carrier wave)
CW (continuous wave)
cycles



RFID Sourcebook
RFID Sourcebook (paperback)
ISBN: 0132762021
EAN: 2147483647
Year: 2006
Pages: 100
Authors: Sandip Lahiri

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net