- Page 4 and 5: Optimizing Processes with RFID and
- Page 6 and 7: Preface Herbert Wegmann Herbert Weg
- Page 8 and 9: Contents 1 Introduction . . . . . .
- Page 10 and 11: Contents 6 Standardization . . . .
- Page 12 and 13: Contents 13 Optimization of Supply
- Page 14 and 15: Contents 20.4.3 Asymmetric cryptogr
- Page 16 and 17: 1 Introduction age capacity. Billio
- Page 18 and 19: 1.1 Historical Development Fig. 1.3
- Page 20 and 21: 1.2 Proven in several applications
- Page 22 and 23: 1.3 Innovation as a driver Moreover
- Page 24 and 25: Part 1 Technical Fundamentals
- Page 26 and 27: 2.2 The components of an RFID syste
- Page 28 and 29: 2.2 The components of an RFID syste
- Page 30 and 31: 2.2.3 Transponders 2.2 The componen
- Page 32 and 33: 2.3 Classification of RFID systems
- Page 34 and 35: 2.3 Classification of RFID systems
- Page 36 and 37: 2.4 Frequency bands and their prope
- Page 38 and 39: Microwaves: 2400-2483.5 MHz 2.4 Fre
- Page 40 and 41: 3.2 Standards regarding the 2D code
- Page 42 and 43: 3.3 Data Matrix Code features vides
- Page 44 and 45: 3.3 Data Matrix Code features Matri
- Page 46 and 47: 3.4.2 Direct marking processes 3.4
- Page 48 and 49: Fig. 3.3 Effects of the lighting fo
- Page 50 and 51: 3.5 Reading systems and their prope
- Page 52 and 53:
3.5 Reading systems and their prope
- Page 54 and 55:
3.6.1 Optimization of the optical c
- Page 56 and 57:
3.7 Outlook and new developments dr
- Page 58 and 59:
4 System architecture Peter Schramm
- Page 60 and 61:
4.1 Overview goods shipment, for ex
- Page 62 and 63:
4.2.2 Topologies 4.2 System levels
- Page 64 and 65:
4.2 System levels Data distribution
- Page 66 and 67:
Application Presentation Session Tr
- Page 68 and 69:
4.4 Data flow and data management T
- Page 70 and 71:
4.5 System management Finally, upda
- Page 72 and 73:
4.5.6 Invoicing functions 4.6 The E
- Page 74 and 75:
4.7 Summary The processes and requi
- Page 76 and 77:
5.1 Automatic identification with D
- Page 78 and 79:
5.2 “Open Loop” applications wi
- Page 80 and 81:
5.3 “Closed Loop” applications
- Page 82 and 83:
5.4 Conclusion: both technologies c
- Page 84 and 85:
• continuity along the entire sup
- Page 86 and 87:
6.3 The central RFID standard ISO 1
- Page 88 and 89:
6.4 Further useful standards and gu
- Page 90 and 91:
6.6 Standardization through EPCglob
- Page 92:
6.7 Conclusion and forecast However
- Page 95 and 96:
7 Process design and profitability
- Page 97 and 98:
7 Process design and profitability
- Page 99 and 100:
7 Process design and profitability
- Page 101 and 102:
7 Process design and profitability
- Page 103 and 104:
7 Process design and profitability
- Page 105 and 106:
8 Introduction to the practical app
- Page 107 and 108:
8 Introduction to the practical app
- Page 109 and 110:
8 Introduction to the practical app
- Page 111 and 112:
8 Introduction to the practical app
- Page 113 and 114:
8 Introduction to the practical app
- Page 115 and 116:
9 Manufacturing control Markus Wein
- Page 117 and 118:
9 Manufacturing control der). The h
- Page 119 and 120:
9 Manufacturing control organism. M
- Page 121 and 122:
9 Manufacturing control Fig. 9.4 Un
- Page 123 and 124:
9 Manufacturing control planning an
- Page 125 and 126:
9 Manufacturing control required qu
- Page 127 and 128:
10 Production logistics Heinz-Peter
- Page 129 and 130:
10 Production logistics cessing sta
- Page 131 and 132:
10 Production logistics Fig. 10.3 E
- Page 133 and 134:
10 Production logistics production
- Page 135 and 136:
10 Production logistics sistent dec
- Page 137 and 138:
11 Container and Asset Management F
- Page 139 and 140:
11 Container and Asset Management b
- Page 141 and 142:
11 Container and Asset Management N
- Page 143 and 144:
11 Container and Asset Management t
- Page 145 and 146:
11 Container and Asset Management C
- Page 147 and 148:
11 Container and Asset Management b
- Page 149 and 150:
12 Tracking and Tracing Harald Lang
- Page 151 and 152:
12 Tracking and Tracing In practice
- Page 153 and 154:
MV camera code control package inse
- Page 155 and 156:
12 Tracking and Tracing the validat
- Page 157 and 158:
12 Tracking and Tracing Fig. 12.3 C
- Page 159 and 160:
13 Optimization of Supply Networks
- Page 161 and 162:
13 Optimization of Supply Networks
- Page 163 and 164:
13 Optimization of Supply Networks
- Page 165 and 166:
13 Optimization of Supply Networks
- Page 167 and 168:
13 Optimization of Supply Networks
- Page 169 and 170:
14 Vehicle logistics sight. These p
- Page 171 and 172:
14 Vehicle logistics creased signif
- Page 173 and 174:
14 Vehicle logistics over a distanc
- Page 175 and 176:
14 Vehicle logistics Fig. 14.5 Oper
- Page 177 and 178:
14 Vehicle logistics Fig. 14.7 Two
- Page 179 and 180:
15 RFID at the airport Access and d
- Page 181 and 182:
15 RFID at the airport As for all o
- Page 183 and 184:
15 RFID at the airport Fig. 15.2 RF
- Page 185 and 186:
15 RFID at the airport for high-val
- Page 187 and 188:
15 RFID at the airport 15.2.7 Advan
- Page 189 and 190:
16 Postal automation Dr. Norbert Ba
- Page 191 and 192:
16 Postal automation • 2D barcode
- Page 193 and 194:
16 Postal automation a practical ro
- Page 195 and 196:
16 Postal automation trance and exi
- Page 197 and 198:
16 Postal automation 16.3 Outlook F
- Page 199 and 200:
17 RFID in hospitals Thomas Jell He
- Page 201 and 202:
17 RFID in hospitals Fig. 17.1 Read
- Page 203 and 204:
17 RFID in hospitals all theater ma
- Page 205 and 206:
17 RFID in hospitals viable for the
- Page 207 and 208:
17 RFID in hospitals Fig. 17.3 Bloo
- Page 210 and 211:
Part 4 How to proceed?
- Page 212 and 213:
18.1 Protection of trade marks with
- Page 214 and 215:
18.2 Technological basics Fig. 18.2
- Page 216 and 217:
18.3 Possible solutions using print
- Page 218 and 219:
19 RFID and sensors Georg Schwondra
- Page 220 and 221:
19.2 Technical basis necessary. The
- Page 222 and 223:
VarioSens 19.2 Technical basis The
- Page 224 and 225:
19.3 Initial applications 19.3.1 Te
- Page 226 and 227:
19.4 Possible future applications i
- Page 228 and 229:
20 RFID security Dr. Stephan Lechne
- Page 230 and 231:
Chip in the passport cover Symbol f
- Page 232 and 233:
20.3 Classic protection measures 20
- Page 234 and 235:
20.4 Protection against complex thr
- Page 236 and 237:
20.4.3 Asymmetric cryptography and
- Page 238 and 239:
20.5 Security in RFID standardizati
- Page 240 and 241:
21 Epilogue: En route to the “int
- Page 242 and 243:
21 Epilogue: En route to the “int
- Page 244 and 245:
21 Epilogue: En route to the “int
- Page 246 and 247:
Bibliography Ralph Brugger: Der IT
- Page 248 and 249:
Editor and authors Dr. Norbert Bart
- Page 250 and 251:
Editor and authors developer at Sie
- Page 252 and 253:
Editor and authors Lausanne, he has
- Page 254 and 255:
Encryption 230 Enterprise Resource
- Page 256:
Tracking and tracing 148 Trade 161