100% found this document useful (6 votes)
37 views

Instant download RFID and Auto ID in Planning and Logistics A Practical Guide for Military UID Applications 1st Edition Erick C. Jones pdf all chapter

UID

Uploaded by

dhoulnigret
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (6 votes)
37 views

Instant download RFID and Auto ID in Planning and Logistics A Practical Guide for Military UID Applications 1st Edition Erick C. Jones pdf all chapter

UID

Uploaded by

dhoulnigret
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 51

Download Full ebookname - Read Now at ebookname.

com

RFID and Auto ID in Planning and Logistics A


Practical Guide for Military UID Applications 1st
Edition Erick C. Jones

https://ebookname.com/product/rfid-and-auto-id-in-planning-
and-logistics-a-practical-guide-for-military-uid-
applications-1st-edition-erick-c-jones/

OR CLICK BUTTON

DOWLOAD EBOOK

Discover More Ebook - Explore Now at ebookname.com


Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

Auto identification and Ubiquitous Computing Applications


Rfid and Smart Technologies for Information Convergence
Premier Reference Source 1st Edition Judith Symonds
https://ebookname.com/product/auto-identification-and-ubiquitous-
computing-applications-rfid-and-smart-technologies-for-information-
convergence-premier-reference-source-1st-edition-judith-symonds/
ebookname.com

Applied Econometrics for Health Economists A Practical


Guide 2nd Edition Andrew Jones (Author)

https://ebookname.com/product/applied-econometrics-for-health-
economists-a-practical-guide-2nd-edition-andrew-jones-author/

ebookname.com

Guide to the LEED AP interior design and construction ID C


exam 1st Edition Cottrell

https://ebookname.com/product/guide-to-the-leed-ap-interior-design-
and-construction-id-c-exam-1st-edition-cottrell/

ebookname.com

Nest Building and Bird Behavior Nicholas E. Collias

https://ebookname.com/product/nest-building-and-bird-behavior-
nicholas-e-collias/

ebookname.com
State of Exception 1st Edition Giorgio Agamben (Translated
By Kevin Attell)

https://ebookname.com/product/state-of-exception-1st-edition-giorgio-
agamben-translated-by-kevin-attell/

ebookname.com

Internet Teletraffic Modeling and Estimation 1st Edition


Alexandre Barbosa De Lima

https://ebookname.com/product/internet-teletraffic-modeling-and-
estimation-1st-edition-alexandre-barbosa-de-lima/

ebookname.com

Handbook of Clinical Pediatric Endocrinology Second


Edition Charles G. D. Brook

https://ebookname.com/product/handbook-of-clinical-pediatric-
endocrinology-second-edition-charles-g-d-brook/

ebookname.com

Factory Operations Planning and Instructional Methods 2nd


Edition Richard Crowson

https://ebookname.com/product/factory-operations-planning-and-
instructional-methods-2nd-edition-richard-crowson/

ebookname.com

Optimizing strength training designing nonlinear


periodization workouts 1st Edition Kraemer

https://ebookname.com/product/optimizing-strength-training-designing-
nonlinear-periodization-workouts-1st-edition-kraemer/

ebookname.com
The Political Legacy of Aung San Josef Silverstein
(Editor)

https://ebookname.com/product/the-political-legacy-of-aung-san-josef-
silverstein-editor/

ebookname.com
RFID and Auto-ID
in Planning and Logistics
A Practical Guide for Military UID Applications

Erick C. Jones, PhD


Christopher A. Chung, PhD
RFID and Auto-ID
in Planning and Logistics
A Practical Guide for Military UID Applications
RFID and Auto-ID
in Planning and Logistics
A Practical Guide for Military UID Applications

Erick C. Jones, PhD


The University of Texas at Arlington, USA

Christopher A. Chung, PhD


Seabrook, Texas, USA

Boca Raton London New York

CRC Press is an imprint of the


Taylor & Francis Group, an informa business
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742

© 2011 by Taylor and Francis Group, LLC


CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed in the United States of America on acid-free paper


10 9 8 7 6 5 4 3 2 1

International Standard Book Number-13: 978-1-4200-9428-2 (Ebook-PDF)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to
publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials
or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material repro-
duced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any
form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming,
and recording, or in any information storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copy-
right.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400.
CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been
granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identifica-
tion and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com

and the CRC Press Web site at


http://www.crcpress.com
Contents
Preface.......................................................................................................................................... xxiii
Acknowledgments.........................................................................................................................xxvii
Authors...........................................................................................................................................xxix

Part Iâ•… History and Background

Chapter 1 Introduction and History of Military Logistics............................................................. 3


1.1 Introduction........................................................................................................3
1.2 Assyrians............................................................................................................3
1.3 Philip II of Macedon and Alexander the Great..................................................4
1.3.1 Reduction of Logistical Burdens...........................................................4
1.3.2 Naval Logistics......................................................................................4
1.3.3 Advanced Supply Depots......................................................................5
1.4 Middle Ages Logistics: 1000–1400 AD.............................................................5
1.4.1 Early Scorched Earth Policy................................................................. 5
1.4.2 Siege Logistical Considerations............................................................5
1.5 Early British Naval Logistics: 1700–1800s........................................................ 6
1.5.1 Lord Nelson...........................................................................................6
1.5.2 Logistical Requirements to Prevent Scurvy.......................................... 7
1.5.3 Prevention of Spoilage of Supplies........................................................ 7
1.5.4 Cannon Logistics Considerations..........................................................7
1.5.5 Gunpowder Logistics Considerations.................................................... 8
1.6 American Revolutionary War.............................................................................8
1.6.1 Logistical Acquisition and Supply Difficulties.....................................8
1.6.2 Host Nation Support..............................................................................8
1.7 Early 1800s.........................................................................................................9
1.8 U.S. Civil War..................................................................................................... 9
1.8.1 Railways and Trains.............................................................................. 9
1.8.2 Mortuary Logistics................................................................................9
1.9 Zulu Wars......................................................................................................... 10
1.9.1 British Ammunition Logistics............................................................. 10
1.10 Spanish–American War.................................................................................... 10
1.10.1 Logistical Problems at the Departure Port.......................................... 10
1.10.2 Logistical Problems at Sea.................................................................. 11
1.10.3 More Logistical Problems in the Field................................................ 11
1.11 World War I...................................................................................................... 11
1.11.1 Use of Railways and Trains................................................................. 11
1.11.2 Fortified Defensive Positions............................................................... 12
1.11.3 Heavier than Air Aircraft.................................................................... 12
1.11.4 U-Boats................................................................................................ 12
1.11.5 Poison Gas........................................................................................... 13

v
vi Contents

1.12 World War II..................................................................................................... 13


1.12.1 Use of Widespread Air Transportation............................................... 13
1.12.2 Use of Long-Range Bombers.............................................................. 14
1.12.3 Ammunition........................................................................................ 14
1.12.4 U-Boats................................................................................................ 14
1.12.5 Russian Campaign............................................................................... 14
1.13 Korean War....................................................................................................... 15
1.13.1 ANTIAC.............................................................................................. 15
1.13.2 First Widespread Use of the Helicopter for Logistical
Operations....................................................................................15
1.14 Cold War........................................................................................................... 16
1.14.1 Stockpiling of Supplies....................................................................... 16
1.14.2 Dependence on Civilian Aircraft........................................................ 16
1.15 Vietnam War: U.S. Perspective........................................................................ 17
1.15.1 Rapid Removal of Battlefield Casualties............................................. 17
1.15.2 Increased Firepower............................................................................ 17
1.16 Vietnam War: Viet Cong Perspective............................................................... 17
1.16.1 Military Supply Recycling.................................................................. 18
1.16.2 Acquisition of Supplies on the Open Market...................................... 18
1.16.3 Viet Cong Medical Logistics............................................................... 18
1.16.4 Viet Cong Mortuary Logistics............................................................ 18
1.17 Soviet–Afghanistan War................................................................................... 18
1.17.1 Use of Local Support.......................................................................... 19
1.17.2 Logistical Operations without Local Support..................................... 19
1.18 Iran–Iraq War................................................................................................... 19
1.18.1 Use of Modern Foreign Weapons Systems......................................... 19
1.18.2 World Involvement in Military Logistics............................................20
1.18.3 Overreliance on Foreign Military Suppliers.......................................20
1.19 Falkland Islands War........................................................................................20
1.19.1 British Vulcan Bombing of Port Stanley Airfield...............................20
1.19.2 Exocet Missiles................................................................................... 21
1.20 Gulf War........................................................................................................... 22
1.20.1 Lack of Resupply................................................................................. 22
1.20.2 Incompatibility of Logistical Information Systems............................ 22
1.21 War on Terrorism in Afghanistan..................................................................... 22
1.22 Iraq War............................................................................................................ 23
1.22.1 Personal Body Armor.......................................................................... 23
1.22.2 Widespread Use of Military Contractors............................................ 23
1.22.3 U.S. Soldiers Forced to Steal Water....................................................24
1.23 Future of Military Logistics.............................................................................24
1.24 Summary..........................................................................................................24

Chapter 2 U.S. Department of Defense and North Atlantic Treaty Organization Supply
Classes and National Stock Numbers.........................................................................25
2.1 Introduction......................................................................................................25
2.2 Specific Supply Class Details...........................................................................26
2.2.1 Class I: Food........................................................................................26
2.2.2 Class II: Clothing................................................................................26
2.2.3 Class III: Fuel and Lubricants............................................................. 27
2.2.4 Class IV: Barrier or Fortification Materials........................................ 27
Contents vii

2.2.5 Class V: Ammunition.......................................................................... 27


2.2.6 Class VI: Personal Demand Items...................................................... 27
2.2.7 Class VII: Major End Items................................................................ 27
2.2.8 Class VIII: Medical Supplies.............................................................. 27
2.2.9 Class IX: Repair Parts.........................................................................28
2.2.10 Class X: Materials for Nonmilitary Programs....................................28
2.3 Summary.......................................................................................................... 28

Chapter 3 DOD Shipping Level Containers RFID Designations................................................ 29


3.1 Introduction...................................................................................................... 29
3.2 Layer 0: Product Item....................................................................................... 29
3.3 Layer 1: Package............................................................................................... 29
3.4 Layer 2: Transport Unit or Shipping Container................................................ 29
3.5 Layer 3: Unit Load or Palletized Unit Load..................................................... 29
3.6 Layer 4: Freight Container................................................................................ 30
3.7 Layer 5: Movement Vehicle.............................................................................. 30
3.8 Summary.......................................................................................................... 30

Part IIâ•… Overview of RFID and AIT Technologies

Chapter 4 Overview of AIT Technologies................................................................................... 33


4.1 Introduction...................................................................................................... 33
4.2 Automatic Information Technologies............................................................... 33
4.2.1 AIM Global......................................................................................... 33
4.2.1.1 Bar Codes............................................................................ 34
4.2.1.2 RFID.................................................................................... 35
4.2.1.3 RFDC................................................................................... 36
4.2.1.4 RTLS................................................................................... 36
4.2.1.5 Satellite Tags with GPS....................................................... 36
4.2.1.6 MEMS................................................................................. 37
4.2.1.7 Contact Memory Buttons..................................................... 37
4.2.1.8 Biometrics............................................................................ 38
4.2.1.9 Common Access Cards........................................................ 38
4.2.1.10 Optical Character� Recognition............................................ 38
4.3 Bar Codes......................................................................................................... 39
4.3.1 Early History of the Bar Code............................................................. 39
4.3.2 Industry Acceptance............................................................................40
4.3.2.1 Railroads..............................................................................40
4.3.2.2 Grocery Industry.................................................................40
4.3.3 Universal Product Code......................................................................40
4.3.3.1 Economic Impact of the UPC..............................................40
4.3.4 Technology behind the Bar Code........................................................ 41
4.3.5 Current Level of Use........................................................................... 42
4.3.6 Future Uses.......................................................................................... 43
4.4 RFID................................................................................................................. 43
4.4.1 Prior to IFF..........................................................................................44
4.4.2 How the Great Bug Seal Worked........................................................ 45
viii Contents

4.4.3 Research on RFID............................................................................... 45


4.4.3.1 In the Twentieth Century..................................................... 45
4.4.3.2 The First RFID Patents........................................................46
4.4.3.3 Toll Road and Animal Tracking..........................................46
4.4.4 Development of Cost-Effective Protocol............................................. 48
4.4.5 Overview of Passive and Active Radio Frequency Identification
Technologies........................................................................................ 49
4.5 Global Positioning Systems.............................................................................. 50
4.5.1 Integration of Real-Time Technologies and GPS................................ 51
4.5.2 Conclusion........................................................................................... 52
4.6 Real-Time Location Systems............................................................................ 52
4.7 Differences in Using RFID, RTLS, and GPS................................................... 53
4.8 Trend to Integrated AIT Applications.............................................................. 53
4.9 Summary.......................................................................................................... 55

Chapter 5 Basic Introduction to Common RFID Components.................................................... 57


5.1 General Component Overview......................................................................... 57
5.1.1 Tags..................................................................................................... 57
5.1.2 Reader.................................................................................................. 58
5.1.3 Antennas.............................................................................................. 59
5.1.4 Host.....................................................................................................60
5.2 Tags...................................................................................................................60
5.2.1 Power Sources.....................................................................................60
5.2.1.1 Passive Tags.........................................................................60
5.2.1.2 Active Tags.......................................................................... 61
5.2.1.3 Semi-Active Tags................................................................. 62
5.2.1.4 SAW RFID Tags.................................................................. 62
5.2.2 Tag Frequencies................................................................................... 62
5.2.3 Writing Capabilities............................................................................ 63
5.2.3.1 Read Only............................................................................ 63
5.2.3.2 Write Once Read Many....................................................... 63
5.2.3.3 Read–Write.......................................................................... 63
5.2.4 Tag Components..................................................................................64
5.2.4.1 Tag Integrated Circuitry......................................................64
5.2.4.2 Tag Antennas.......................................................................64
5.2.4.3 Tag Substrate or Tag Housing.............................................. 65
5.2.5 Tag Generations................................................................................... 65
5.3 Scanners and Readers.......................................................................................66
5.3.1 Scanners..............................................................................................66
5.3.2 Readers................................................................................................66
5.3.3 Reader Frequencies.............................................................................66
5.3.4 Reader Interrogation Modes................................................................66
5.4 Antennas........................................................................................................... 68
5.5 Hosts................................................................................................................. 69
5.5.1 Communication Protocols................................................................... 69
5.5.1.1 RS-232................................................................................. 69
5.5.1.2 RS-485................................................................................. 69
5.5.1.3 Ethernet................................................................................ 70
5.6 Summary.......................................................................................................... 70
Questions..................................................................................................................... 70
Contents ix

Chapter 6 Passive RFID System Components............................................................................. 71


6.1 Introduction...................................................................................................... 71
6.1.1 Major Advantages to Passive RFID .
Systems................................................................................................ 71
6.1.1.1 Lower Expense.................................................................... 71
6.1.1.2 Smaller Sizes....................................................................... 71
6.1.1.3 Greater Operational Life..................................................... 72
6.1.1.4 Environmental Robustness.................................................. 72
6.1.2 Major Disadvantages to Passive RFID Systems................................. 72
6.1.2.1 Less Range........................................................................... 72
6.1.2.2 Less Identification Capability.............................................. 73
6.2 Chapter Organization....................................................................................... 73
6.3 Trovan Electronic Identification Systems......................................................... 73
6.3.1 Trovan Passive Tags............................................................................ 73
6.3.1.1 ID 100 Series....................................................................... 73
6.3.1.2 ID 200 and 300 Series......................................................... 74
6.3.1.3 ID 400 Series....................................................................... 75
6.3.1.4 ID 600 Series....................................................................... 75
6.3.1.5 ID 700 Series....................................................................... 75
6.3.1.6 ID 800 Series....................................................................... 75
6.3.1.7 ID 1000 Series..................................................................... 77
6.3.2 Trovan Portable Readers..................................................................... 77
6.3.2.1 LID WAPR Workabout Pro Reader..................................... 77
6.3.2.2 GR-250 High-Performance Reader..................................... 78
6.3.2.3 LID Pocket Series Readers.................................................. 78
6.4 SmartCode........................................................................................................ 79
6.4.1 SmartCode Inlays................................................................................ 79
6.4.2 SmartCode Passive Tags..................................................................... 79
6.5 Symbol Technologies........................................................................................ 79
6.5.1 RFX3000 Series Inlays....................................................................... 79
6.5.1.1 RFX3000 1 × 1 Read/Write Tag.........................................80
6.5.1.2 RFX3000 1 × 6 Read/Write Tag.........................................80
6.5.1.3 RFX3000 2 × 2 Read/Write Tag......................................... 81
6.5.1.4 RFX3000 4 × 4 Read/Write Tag......................................... 81
6.5.2 Gen 2 RFX6000 Series Read/Write Inlay.......................................... 81
6.5.2.1 RFX6000 1 × 1 Series Read/Write Inlay............................ 81
6.5.2.2 RFX6000 2 × 4 Series Read/Write Inlay............................ 81
6.5.2.3 Cargo Tag............................................................................. 82
6.5.3 Symbol Antennas................................................................................ 83
6.5.3.1 AN200 General Purpose Antenna....................................... 83
6.5.3.2 AN400 High-Performance Area .
Antenna................................................................................84
6.5.4 Symbol Readers...................................................................................84
6.5.4.1 RD5000...............................................................................84
6.5.4.2 XR400 Series.......................................................................84
6.6 Intermec............................................................................................................ 85
6.6.1 Intellitag Windshield Tag.................................................................... 85
6.6.2 Intellitag Container Tag...................................................................... 85
6.6.3 Intellitag ID Card................................................................................ 86
6.6.4 Intermec Readers................................................................................. 86
x Contents

6.6.4.1 IF Series of Fixed Readers.................................................. 87


6.6.4.2 IP4 Handheld Reader Handle with Intermec
700 Series Computer........................................................... 87
6.6.4.3 IV7 Vehicle Mount Reader.................................................. 88
6.7 Summary.......................................................................................................... 88

Chapter 7 Active RFID System Components.............................................................................. 89


7.1 Introduction...................................................................................................... 89
7.1.1 Major Advantages to Active RFID Systems....................................... 89
7.1.1.1 Greater Range...................................................................... 89
7.1.1.2 Greater Identification Capability......................................... 89
7.1.2 Major Disadvantages to Active RFID Systems...................................90
7.1.2.1 More Expensive...................................................................90
7.1.2.2 Less Operational Life..........................................................90
7.1.2.3 Larger Physical Size............................................................90
7.2 Savi Corporation............................................................................................... 91
7.2.1 Savi Active Tags.................................................................................. 91
7.2.1.1 SaviTag ST-602.................................................................... 91
7.2.1.2 SaviTag ST-604....................................................................92
7.2.1.3 SaviTag ST-654....................................................................92
7.2.1.4 SaviTag ST-656....................................................................92
7.2.2 Savi Fixed Readers.............................................................................. 92
7.2.2.1 SR-650 Fixed Reader........................................................... 93
7.2.2.2 Savi Signpost....................................................................... 93
7.2.3 Savi Mobile Readers............................................................................94
7.3 Mark IV Industries........................................................................................... 95
7.3.1 Mark IV Transponders........................................................................ 95
7.3.1.1 Mark IV Internal Flat Pack Transponder............................ 95
7.3.1.2 License Plate Transponder................................................... 95
7.3.1.3 Roof Mount Transponder..................................................... 95
7.3.1.4 Fusion Transponder.............................................................96
7.3.1.5 Ubiquity Transponder.......................................................... 96
7.3.2 Mark IV Readers................................................................................. 96
7.3.2.1 Badger Reader......................................................................97
7.3.2.2 MGate Reader......................................................................97
7.3.3 Mark IV Antennas...............................................................................99
7.4 Summary..........................................................................................................99

Part IIIâ•…Overview of Equipment Interoperability Protocols


and Standards

Chapter 8 Important RFID Mandates........................................................................................ 103


8.1 Introduction.................................................................................................... 103
8.2 Department of Defense Mandate.................................................................... 103
8.2.1 Commencing January 1, 2005........................................................... 103
8.2.2 Commencing January 1, 2006........................................................... 103
8.2.3 Commencing January 1, 2007........................................................... 104
8.2.4 Guidelines and Requirements........................................................... 104
Contents xi

8.3 Walmart Mandate........................................................................................... 104


8.4 Other Organizations....................................................................................... 105

Chapter 9 Standards Organizations and RFID Standards......................................................... 107


9.1 Introduction.................................................................................................... 107
9.2 International Standards Organization .
Standards........................................................................................................ 107
9.3 ISO Standards and RFID............................................................................... 107
9.3.1 18000-1 Part 1: Generic Parameters for the Air Interface
for Globally Accepted Frequencies................................................... 108
9.3.2 18000-2 Part 2: Parameters for Air Interface Communications
below 135â•›kHz................................................................................... 108
9.3.2.1 Protocol and the Commands............................................. 108
9.3.2.2 Compliance Rules.............................................................. 109
9.3.3 18000-3 Part 3: Parameters for Air Interface Communications
at 13.56â•›MHz..................................................................................... 109
9.3.3.1 Intellectual Property.......................................................... 109
9.3.4 18000-4 Part 4: Parameters for Air Interface Communications
at 2.45â•›GHz........................................................................................ 109
9.3.4.1 Frequency.......................................................................... 109
9.3.4.2 Interface Definitions.......................................................... 109
9.3.5 18000-5 Part 5: Parameters for Air Interface Communications
at 5.8â•›GHz.......................................................................................... 110
9.3.5.1 Intellectual Property.......................................................... 110
9.3.6 18000-6 Part 6: Parameters for Air Interface Communications
at 860–930â•›MHz................................................................................ 110
9.3.7 18000-7 Part 7: Parameters for Air Interface Communications
at 433â•›MHz........................................................................................ 111
9.3.7.1 DASH7 Alliance................................................................ 111
9.4 Work Group on RFID for Item Management (WG 4).................................... 111
9.4.1 ISO Standards Summary................................................................... 112
9.5 EPC Global Standards.................................................................................... 112
9.6 GS1 and GS1 US............................................................................................. 113
9.7 EPC/GTIN Integration................................................................................... 114
9.8 EPC Generation 2........................................................................................... 114
9.9 Other Standards.............................................................................................. 115
9.10 Electronic Product Code Details.................................................................... 115
9.10.1 Serialized Global Trade Item Number.............................................. 116
9.10.2 Serialized Global Location Number................................................. 116
9.10.3 Global Returnable Asset Identifier.................................................... 117
9.10.4 Global Individual Asset Identifier..................................................... 117
9.10.5 Global Identifier (GID-96)................................................................ 118
9.11 Department of Defense UID.......................................................................... 119
9.12 EPC Global Tag Data Construct Option........................................................ 120
9.13 FCC Part 15 Radiation Regulation................................................................. 122

Chapter 10 UID and RFID Standards for Military..................................................................... 123


10.1 Introduction.................................................................................................... 123
10.2 UID................................................................................................................. 123
xii Contents

10.3 RFID............................................................................................................... 124


10.3.1 Passive RFID..................................................................................... 124
10.3.1.1 DOD-96 Identifier.............................................................. 124
10.3.1.2 Data Fields......................................................................... 124
10.3.2 Active RFID...................................................................................... 126
10.4 Implementation............................................................................................... 126
10.4.1 Implementation Strategies................................................................. 129
10.4.2 Replacement for Bar Codes............................................................... 130
10.5 Summary........................................................................................................ 130

Part IVâ•…Implementation, Decision Making, and Testing


Approaches

Chapter 11 RFID Project Management....................................................................................... 133


11.1 Introduction.................................................................................................... 133
11.2 RFID Project Selection................................................................................... 133
11.2.1 Project Selection Models and Factors............................................... 134
11.2.2 Nonnumeric Project Selection Models.............................................. 134
11.2.2.1 Sacred Cow........................................................................ 134
11.2.2.2 Operating Necessity........................................................... 134
11.2.2.3 Competitive Necessity....................................................... 134
11.2.2.4 Comparative Models.......................................................... 135
11.2.3 Numeric Project Selection Models.................................................... 135
11.2.3.1 Payback Time.................................................................... 135
11.2.3.2 Average Rate of Return..................................................... 136
11.2.3.3 Unweighted 0–1................................................................. 136
11.2.3.4 Unweighted Scoring.......................................................... 136
11.2.3.5 Weighted Scoring.............................................................. 137
11.2.3.6 Constrained Weighted Scoring.......................................... 137
11.3 RFID Project Parameters............................................................................... 138
11.4 RFID Implementation Life Cycle................................................................... 138
11.4.1 Conceptual Phase.............................................................................. 139
11.4.2 Planning Phase.................................................................................. 139
11.4.3 Installation Phase.............................................................................. 139
11.4.4 Startup Phase..................................................................................... 139
11.5 RFID Project Manager................................................................................... 139
11.6 RFID Project Manager Authority.................................................................. 139
11.7 RFID Project Manager Functions.................................................................. 140
11.7.1 Planning............................................................................................ 140
11.7.2 Organizing......................................................................................... 140
11.7.3 Motivating......................................................................................... 140
11.7.3.1 Maslow’s Theory............................................................... 140
11.7.3.2 Herzberg’s Theory............................................................. 141
11.7.4 Directing............................................................................................ 141
11.7.4.1 Situational Leadership Theory.......................................... 141
11.7.5 Controlling........................................................................................ 142
11.8 Developing the Project Plan........................................................................... 143
11.8.1 Work Breakdown Structure............................................................... 143
Contents xiii

11.8.2 Linear Responsibility Chart.............................................................. 144


11.8.3 Gantt Chart........................................................................................ 145
11.8.3.1 Finish-to-Start Relationship.............................................. 145
11.8.3.2 Start-to-Start Relationship................................................. 145
11.8.3.3 Finish-to-Finish Relationship............................................ 146
11.8.3.4 Lags.................................................................................... 146
11.9 Compressing and Crashing Projects............................................................... 146
11.9.1 Compressing the Acquisition of Hardware and Software................. 147
11.9.2 Compressing the Testing of RFID Tags............................................ 147
11.9.3 Compressing the Installation of Hardware and Software................. 147
11.9.4 RFID Project Tasks That Cannot or Should Not Be Compressed.......147
11.9.4.1 Hardware and Software Selection..................................... 148
11.9.4.2 Avoid Compressing Pilot Testing...................................... 148

Chapter 12 RFID System Design................................................................................................. 149


12.1 System Design Approach............................................................................... 149
12.2 Step 1: Gain Ideas through Understanding.................................................... 149
12.2.1 On-Site Analysis................................................................................ 149
12.2.2 Equipment Evaluation....................................................................... 150
12.2.3 Environmental Evaluation................................................................. 151
12.2.3.1 Radio Frequency Interference Testing............................... 151
12.2.4 Human Factor Evaluation.................................................................. 151
12.3 Step 2: Create Preliminary Designs............................................................... 151
12.4 Step 3: Prototype Development...................................................................... 151
12.5 Step 4: Choose an Alternative........................................................................ 151
12.6 Step 5: Test and Retest Chosen System.......................................................... 152
12.7 Step 6: Implement the Solution...................................................................... 152
Appendix 12.A.......................................................................................................... 152
12.A.1 Sample RFID Dock Door Survey..................................................... 152
12.A.1.1 Dock Doors Checklist....................................................... 153
12.A.2 RFID Environment Evaluation......................................................... 154
12.A.2.1 Common Problems............................................................ 154
12.A.2.2 Best Practices..................................................................... 154
12.A.3 Using a Spectrum Analyzer to Test EMI.......................................... 155
12.A.3.1 General Directions for Using a Spectrum Analyzer.......... 156
12.A.3.2 General Guidelines and Notes........................................... 157
12.A.3.3 Other.................................................................................. 158
12.A.4 Overview of Work Measurement and Times Studies........................ 158
12.A.4.1 Brief History of Industrial Engineering............................ 158
12.A.4.2 Industrial Engineering Organizations............................... 159
12.A.5 Cognitive Turnover Job Satisfaction Survey..................................... 160
12.A.5.1 Background........................................................................ 160
12.A.5.2 Study Limitations.............................................................. 164
12.A.5.3 Lessons Learned and Recommendations.......................... 164

Chapter 13 RFID Supply Chain Planning Levels........................................................................ 167


13.1 Introduction.................................................................................................... 167
13.2 RFID Supports Supply Chain Planning and Operational Optimization........ 167
13.2.1 Tactical Level.................................................................................... 168
xiv Contents

13.2.2 Intermediate-Level Problems............................................................ 168


13.2.2.1 Transportation Strategy..................................................... 168
13.2.2.2 Common Transportation Decisions................................... 169
13.2.2.3 Transportation Mode......................................................... 169
13.2.2.4 Intermediate-Level Summary............................................ 169
13.2.3 Strategic Level................................................................................... 169
13.2.3.1 Facilities Strategy.............................................................. 170
13.2.3.2 Facilities Decisions............................................................ 170
13.3 RFID Best Practices for Success.................................................................... 171
13.4 Summary........................................................................................................ 171

Chapter 14 Implementing RFID Systems.................................................................................... 173


14.1 Introduction.................................................................................................... 173
14.1.1 Make the ROI Case for RFID........................................................... 173
14.1.2 Choose the Right RFID Technology................................................. 173
14.1.3 RFID System Details........................................................................ 174
14.1.4 Six Sigma Methodology.................................................................... 174
14.2 3P’s Theoretical Model................................................................................... 174
14.3 Plan................................................................................................................. 175
14.3.1 Define................................................................................................ 175
14.3.2 Measure............................................................................................. 175
14.4 Predict............................................................................................................. 176
14.4.1 Analyze............................................................................................. 176
14.4.2 Design................................................................................................ 176
14.5 Perform........................................................................................................... 177
14.5.1 Optimize............................................................................................ 177
14.5.1.1 Factors and Levels............................................................. 178
14.5.2 Verify................................................................................................. 178
14.6 Conclusion...................................................................................................... 179

Chapter 15 Obsolete Inventory Reduction with Modified Carrying Cost Ratio......................... 183
15.1 Introduction.................................................................................................... 183
15.2 Two-Echelon Model....................................................................................... 183
15.3 One-Echelon Model........................................................................................ 185
15.4 Modified Carrying Cost Ratio Model............................................................ 186
15.5 Results: Case Study........................................................................................ 187
15.6 Facilities Costs................................................................................................ 187
15.7 Purchasing Costs............................................................................................ 188
15.8 Modified Carrying Cost Ratio........................................................................ 188
15.9 Inventory Turn Analysis................................................................................. 189
15.10 Decision.......................................................................................................... 189
15.11 Conclusion...................................................................................................... 189

Part Vâ•…Overview of Logistics Planning and Inventory Control

Chapter 16 Engineering Economics of RFID.............................................................................. 193


16.1 Introduction.................................................................................................... 193
16.2 Problem Statement.......................................................................................... 193
Contents xv

16.3 Background..................................................................................................... 194


16.4 Cost Justification............................................................................................. 194
16.4.1 Scenario 1: Baseline.......................................................................... 194
16.5 Audit Costs..................................................................................................... 194
16.6 Rework Costs.................................................................................................. 196
16.7 Scrap Costs..................................................................................................... 196
16.8 Management Costs......................................................................................... 196
16.9 Customer Service Costs.................................................................................. 197
16.10 Total Annual Cost........................................................................................... 198
16.10.1 Scenario 2: RFID Implementation.................................................... 198
16.11 Tag Costs........................................................................................................ 198
16.12 Reader Costs................................................................................................... 199
16.13 Software Costs................................................................................................ 199
16.14 Implementation Costs..................................................................................... 199
16.14.1 Investment for Scenario 2.................................................................. 199
16.15 Net Present Value Comparison.......................................................................200
16.16 Comparison.................................................................................................... 201
16.17 Sensitivity Analysis........................................................................................ 201
16.18 Limitations.....................................................................................................203
16.19 Conclusions..................................................................................................... 203
Appendix 16.A..........................................................................................................204
16.A.1 Investment.........................................................................................204
16.A.2 Yearly Cost........................................................................................204
16.A.3 Maintenance Cost..............................................................................205
16.A.4 Discount Rate (i)...............................................................................206
16.A.5 Number of Periods (N)......................................................................206

Chapter 17 Forecasting................................................................................................................209
17.1 Time Horizon in Forecasting..........................................................................209
17.2 Characteristics of Forecasts............................................................................209
17.3 Subjective Forecasting Models....................................................................... 210
17.4 Objective Forecasting Methods...................................................................... 211
17.4.1 Causal Models................................................................................... 211
17.4.2 Time Series Methods......................................................................... 212
17.5 Notation Conventions..................................................................................... 212
17.6 Evaluating Forecasts....................................................................................... 213
17.7 Methods for Forecasting Stationary Series.................................................... 214
17.7.1 Moving Averages............................................................................... 214
17.7.1.1 Moving Average Lags behind the Trend........................... 215
17.7.2 Exponential Smoothing..................................................................... 216
17.7.3 Comparison of Exponential Smoothing and Moving .
Averages............................................................................................ 217
17.7.3.1 Similarities......................................................................... 217
17.7.3.2 Differences......................................................................... 217
17.8 Trend-Based Methods..................................................................................... 217
17.8.1 Regression Analysis.......................................................................... 218
17.8.2 Double Exponential Smoothing Using Holt’s .
Method.............................................................................................. 219
17.9 Advanced Methods......................................................................................... 219
xvi Contents

Chapter 18 Manpower Planning.................................................................................................. 221


18.1 Aggregate Units of Production....................................................................... 221
18.2 Overview of the Aggregate Planning Problem............................................... 223
18.3 Costs in Aggregate Planning.......................................................................... 223
18.4 Prototype Problem.......................................................................................... 225
18.4.1 Evaluation of a Chase Strategy (Zero Inventory Plan)...................... 226
18.4.2 Evaluation of the Constant Workforce Plan...................................... 228
18.5 Solution of Aggregate Planning Problems by Linear .
Programming����������������������������������尓������������������������������������尓��������������������������� 229
18.5.1 Cost Parameters and Given Information........................................... 229
18.5.2 Problem Variables............................................................................. 229
18.5.3 Problem Constraints.......................................................................... 230
18.6 Solving Aggregate Planning Problems by Linear Programming:
An Example.................................................................................................... 231
18.7 Advantages and Disadvantages...................................................................... 232

Chapter 19 Production Planning and Scheduling........................................................................ 233


19.1 Introduction.................................................................................................... 233
19.2 Schedule Design............................................................................................. 233
19.2.1 Process Requirements....................................................................... 233
19.2.2 Scrap Estimates................................................................................. 234
19.3 Tools for Production Scheduling.................................................................... 234
19.3.1 Affinity Diagram............................................................................... 234
19.3.2 Interrelationship Digraph.................................................................. 235
19.3.3 Activity Network Diagram................................................................ 235
19.4 Summary........................................................................................................ 235

Chapter 20 RFID in Logistics...................................................................................................... 237


20.1 Introduction.................................................................................................... 237
20.2 RFID Supports Information Use in the Supply Chain................................... 237
20.2.1 Data Analysis and Information Gathering........................................ 237
20.2.1.1 Push and Pull Operational Strategies................................ 238
20.2.1.2 Supply Chain Coordination............................................... 238
20.2.1.3 Forecasting......................................................................... 238
20.2.1.4 Aggregate Planning........................................................... 238
20.2.2 RFID and Other Enabling Technologies........................................... 239
20.2.2.1 EDI Business Transmissions.............................................. 239
20.2.2.2 Web-Based Application Systems....................................... 239
20.2.2.3 Business Operations Systems............................................ 239
20.2.2.4 Overall Trade-Off: Responsiveness versus .
Efficiency...........................................................................240
20.2.2.5 e-Commerce and Technology............................................240
20.2.2.6 RFID as Part of the Information Supply .
Chain����������������������������������尓������������������������������������尓����������� 241
20.2.3 RFID as an Intelligent Agent System................................................ 241
20.2.4 Summary of RFID and Information Enablers.................................. 242
20.2.5 RFID Provides Timely Visibility in Logistics.................................. 242
20.3 Inventory in the Supply Chain........................................................................ 243
Contents xvii

20.4 Business Responsiveness................................................................................244


20.4.1 Cycle Inventory.................................................................................244
20.4.2 Safety Inventory................................................................................244
20.4.3 Seasonal Inventory............................................................................244
20.4.4 Level of Product Availability............................................................ 245
20.4.4.1 Inventory-Related Metrics................................................. 245
20.4.5 Bullwhip Effect................................................................................. 245
20.5 Summary........................................................................................................246
Questions................................................................................................................... 247

Chapter 21 Inventory Control Basics........................................................................................... 249


21.1 Introduction.................................................................................................... 249
21.2 Inventory Carrying Costs............................................................................... 249
21.3 Stock-Out Costs.............................................................................................. 250
21.4 Safety Stocks.................................................................................................. 250
21.5 Economic Order Quantity.............................................................................. 251
21.6 Inventory Flows.............................................................................................. 254
21.7 Fixed-Order-Interval System.......................................................................... 255
21.8 Just-in-Time Inventory Systems..................................................................... 256
21.9 RFID and Inventory Control.......................................................................... 256
21.9.1 Automatic Replenishment................................................................. 257
21.9.2 Safety-Stock Reduction..................................................................... 257
21.9.3 Picking and Routing.......................................................................... 257
21.9.4 Order Batching of Waves.................................................................. 258
21.10 Summary........................................................................................................ 258

Chapter 22 Transportation and RFID Applications..................................................................... 261


22.1 Introduction.................................................................................................... 261
22.2 Transportation Definitions.............................................................................. 262
22.2.1 Small-Volume Shippers..................................................................... 262
22.2.2 LTL Shippers..................................................................................... 263
22.2.3 Freight Forwarders and Other Consolidators.................................... 263
22.2.4 Shippers’ Cooperatives......................................................................264
22.2.5 Truckload and Carload Shippers.......................................................264
22.2.6 Large Bulk Shippers..........................................................................264
22.2.7 Bulk Cargo........................................................................................264
22.2.8 Truckload Hauls................................................................................264
22.2.9 Railroads...........................................................................................264
22.2.10 Water Carriers................................................................................... 265
22.2.11 Pipelines............................................................................................ 265
22.2.12 Slurry Systems.................................................................................. 265
22.2.13 Comparison of Modes....................................................................... 265
22.3 Transportation in SCM...................................................................................266
22.4 Information Technology and SCM................................................................. 267
22.5 Real-Time Technologies................................................................................. 267
22.6 Future Technologies....................................................................................... 269
22.7 Conclusion...................................................................................................... 270
xviii Contents

Chapter 23 Optimizing RFID Portal Locations in Distribution Using Systematic


Layout Planning........................................................................................................ 271
23.1 Introduction.................................................................................................... 271
23.2 Modeling Procedure....................................................................................... 272
23.2.1 Phase 1: Multi-Objective RF Warehouse Architecture..................... 272
23.2.2 Phase 2: Data Environment Analysis................................................ 273
23.3 Layout Improvement Alternatives and Numerical Results............................ 277
23.4 Computer-Aided Program Algorithm Approach (BLOCPLAN)................... 277
23.4.1 Relationship Data.............................................................................. 277
23.5 RFID-Enabled Forklift System vs. RFID Portal System............................... 278
23.6 Discussion and Conclusion.............................................................................280

Chapter 24 RFID Uses in Warehousing...................................................................................... 281


24.1 Introduction.................................................................................................... 281
24.2 Warehouse Applications................................................................................. 281
24.3 Receiving........................................................................................................ 282
24.4 Storage............................................................................................................ 282
24.5 Pick/Pack........................................................................................................ 282
24.6 Shipping.......................................................................................................... 283
24.7 Reliability....................................................................................................... 283
24.8 IT Infrastructure Issues.................................................................................. 283
24.9 RFID Warehouse Implementation Examples.................................................284
24.9.1 Gillette...............................................................................................284
24.9.2 International Paper............................................................................284
24.9.3 Proctor & Gamble.............................................................................284
24.10 Conclusion...................................................................................................... 286

Part VIâ•… Military RFID Initiatives and Applications

Chapter 25 U.S. Army RFID Initiatives...................................................................................... 289


25.1 Introduction.................................................................................................... 289
25.2 Total Asset Visibility and In-Transit Visibility.............................................. 289
25.3 Tracking Trainees........................................................................................... 290
25.4 Gun Monitoring..............................................................................................290
25.5 Using RFID to Track Army Medical Records............................................... 290
25.5.1 Introduction.......................................................................................290
25.5.2 Application........................................................................................ 291
25.5.3 Summary........................................................................................... 291
25.6 Chapter Summary.......................................................................................... 291

Chapter 26 Marine Corps and Navy RFID Initiatives................................................................. 293


26.1 Marine Corps Active RFID Initiatives........................................................... 293
26.1.1 Introduction....................................................................................... 293
26.1.2 Active Tagging Requirements........................................................... 293
26.1.3 Containers inside the Defense Transportation System...................... 294
26.1.4 Active RFID Tags and Placement..................................................... 294
26.1.5 Summary of Marine Corps Active RFID Initiatives........................ 294
Contents xix

26.2 Marine Corps Passive RFID Initiatives......................................................... 295


26.2.1 Introduction....................................................................................... 295
26.2.2 Passive RFID Pilot Project: 2004..................................................... 295
26.2.3 Implementation Plan Pilot Project 1: 2008....................................... 295
26.2.4 Implementation Plan Pilot Project 2: 2009....................................... 295
26.2.5 Implementation Plan Pilot Project 3: 2010........................................ 296
26.2.6 Implementation Plan Pilot Project 4: 2011........................................ 296
26.2.7 The Future of Marine Corp Passive Applications............................. 296
26.2.8 Summary of Marine Corps Passive Initiatives................................. 297
26.3 Personnel Records Applications..................................................................... 297
26.3.1 Application........................................................................................ 297
26.3.2 Tracking Tag...................................................................................... 297
26.3.3 Tracking Pad..................................................................................... 297
26.3.4 Handheld Tracker.............................................................................. 298
26.3.5 Summary........................................................................................... 298

Chapter 27 Marine Terminal RFID Applications........................................................................ 299


27.1 Introduction.................................................................................................... 299
27.2 Tracking Containers....................................................................................... 299
27.3 Container Tags................................................................................................ 299
27.3.1 Tag Operation.................................................................................... 299
27.3.2 Tag Mounting....................................................................................300

Chapter 28 Other Foreign Countries Armed Forces Adoption of RFID Technology................. 301
28.1 New Zealand Military Clothing RFID Applications..................................... 301
28.1.1 Application........................................................................................ 301
28.1.2 Summary...........................................................................................302
28.2 Spanish Armed Forces RFID Efforts.............................................................302
28.2.1 Application........................................................................................ 303
28.2.2 Summary of Spanish Armed Forces RFID Efforts.......................... 303
28.3 French Armed Forces RFID Efforts.............................................................. 303

Part VIIâ•…Other Potential Military RFID Applications


and Radio Theory

Chapter 29 Military Physical Fitness RFID Applications...........................................................307


29.1 Introduction....................................................................................................307
29.2 Application Considerations............................................................................307
29.3 Tags.................................................................................................................308
29.3.1 Mounting Considerations..................................................................308
29.4 Antenna Systems............................................................................................ 310
29.5 Reader Systems............................................................................................... 310
29.6 Performance Issues......................................................................................... 311
xx Contents

29.7 Extensions to Other Sports Competitions...................................................... 312


29.7.1 Special Cycling RFID Considerations.............................................. 312
29.7.2 Special Skating RFID Considerations.............................................. 312
29.8 Summary........................................................................................................ 312
Questions................................................................................................................... 313

Chapter 30 Marine RFID Security Applications......................................................................... 315


30.1 Introduction.................................................................................................... 315
30.2 Special RFID Hardware Considerations........................................................ 315
30.2.1 Water Resistance and Water Resistance Ratings.............................. 315
30.2.2 Circuit Board Hardening................................................................... 316
30.2.3 Shock Resistance............................................................................... 316
30.2.4 UV Protection................................................................................... 317
30.2.5 RFID Tag Positioning....................................................................... 317
30.3 Infrastructure Considerations......................................................................... 317
30.3.1 Marine Portals................................................................................... 317
30.3.2 Antenna Mounting............................................................................ 319
30.4 Other Considerations...................................................................................... 321
30.5 Marine RFID Security Applications.............................................................. 321
30.5.1 Vessel Registration Tag Applications................................................ 321
30.5.2 Scanning Recreational Vessel RFID Tags........................................ 322
30.6 Stolen Vessel Identification............................................................................ 323
30.7 Hostile Vessel Identification........................................................................... 323
30.7.1 RFID Chaff....................................................................................... 324
30.8 Summary........................................................................................................ 324
Questions................................................................................................................... 324

Chapter 31 Military Mortuary RFID Implantation Applications................................................ 325


31.1 Introduction.................................................................................................... 325
31.2 VeriChip......................................................................................................... 325
31.3 Implantation Process...................................................................................... 325
31.4 Post Mortem Operations................................................................................. 326
31.5 Medical Other than Mortuary Uses............................................................... 326
31.6 Summary........................................................................................................ 326

Chapter 32 Railroad Car Tracking by an RFID System to Organize Traffic Flow..................... 327
32.1 Introduction.................................................................................................... 327
32.2 Current Problem............................................................................................. 328
32.3 Reason for Improvement................................................................................ 328
32.4 Strategy........................................................................................................... 329
32.5 Methodology................................................................................................... 329
32.5.1 Testing the Active Tags..................................................................... 329
32.5.2 Test Results........................................................................................ 329
32.5.3 Finding a Practical Way to Send Data to the Control Center............ 329
32.5.4 Determining the Appropriate Layout to Set the Devices.................. 330
32.6 Simulation Results.......................................................................................... 330
32.7 Cost Analysis.................................................................................................. 330
Contents xxi

32.8 Recommendations.......................................................................................... 331


32.9 Conclusion...................................................................................................... 331

Chapter 33 Six Sigma.................................................................................................................. 333


33.1 Six Sigma........................................................................................................ 333
33.2 Six Sigma Methodologies............................................................................... 333
33.2.1 Design for Six Sigma......................................................................... 333
33.2.2 Lean Six Sigma................................................................................. 334
33.3 Six Sigma as an Industrial Engineer.............................................................. 335
33.3.1 Roles in Six Sigma............................................................................ 335
33.3.2 Industrial Roles................................................................................. 335
33.3.3 Six Sigma/Industrial Engineering Interface .
Framework......................................................................................... 335
33.4 Six Sigma in Logistics: A Case Study............................................................ 337
33.4.1 Typical Issue within the Supply Chain.............................................. 337
33.4.2 Background....................................................................................... 338
33.4.2.1 Capacitated Plant Location Model.................................... 339
33.4.3 Network Modeling Steps Incorporated into a Six Sigma
Service Project..................................................................................340
33.4.3.1 Define.................................................................................340
33.4.3.2 Measure.............................................................................340
33.4.3.3 Analyze..............................................................................340
33.4.3.4 Improve..............................................................................340
33.4.3.5 Control............................................................................... 341
33.4.4 Case Description............................................................................... 341
33.4.4.1 Organizational Description............................................... 341
33.4.4.2 Project Description............................................................ 341
33.4.5 Lessons Learned............................................................................... 342
33.4.6 Implications for the Engineering Manager....................................... 343
33.4.7 Conclusions.......................................................................................344
33.5 Six Sigma Best Practices................................................................................344
33.5.1 Good to Great....................................................................................344
33.5.2 Six Sigma’s Effect on Profit.............................................................. 345
33.5.3 Six Sigma and Quality Awards .
and ISO Standards.............................................................................346
33.5.4 Six Sigma Best Practices...................................................................346
33.6 Six Sigma in Military Logistics..................................................................... 347
33.7 Six Sigma in the Military: A Case Study....................................................... 347
33.7.1 Test Plan............................................................................................348
33.7.2 Plan.................................................................................................... 349
33.7.2.1 Define................................................................................. 349
33.7.2.2 Measure............................................................................. 350
33.7.3 Predict............................................................................................... 352
33.7.3.1 Analyze.............................................................................. 352
33.7.3.2 Identify............................................................................... 353
33.7.3.3 Design................................................................................ 353
33.7.4 Perform.............................................................................................. 353
33.7.4.1 Optimize............................................................................ 353
33.7.4.2 Verify................................................................................. 353
33.7.5 Tools Utilized in Each Theme........................................................... 353
xxii Contents

Chapter 34 Case Study: Multichannel RFID............................................................................... 355


34.1 Background..................................................................................................... 355
34.2 VerdaSee Technologies Frequency-Agile .
RFID System.................................................................................................. 355
34.3 Military in the Box......................................................................................... 357
34.4 Last Mile Visibility........................................................................................ 357
34.5 Conclusion...................................................................................................... 360

Chapter 35 Radio Frequency Theory........................................................................................... 361


35.1 Introduction.................................................................................................... 361
35.2 Common Terms.............................................................................................. 361
35.3 Units and Prefixes........................................................................................... 363
35.4 Wave Theory.................................................................................................. 363
35.4.1 Electromagnetic Waves..................................................................... 363
35.4.2 Radio Waves...................................................................................... 363
35.4.3 Frequency Spectrum.........................................................................364
35.4.4 Measuring Power Loss...................................................................... 365
35.4.5 Smith Chart....................................................................................... 366
35.4.6 Return-Loss....................................................................................... 366
35.4.7 Coupling............................................................................................ 367
35.4.8 Polarization....................................................................................... 367
35.5 Antennas......................................................................................................... 367
35.5.1 Standard Antenna Impedance........................................................... 368
35.5.2 Impedance Matching......................................................................... 368
35.5.3 Tuning................................................................................................ 369
35.5.4 Range and Path Loss......................................................................... 370
35.6 Modulation..................................................................................................... 370
35.6.1 Signal Propagation............................................................................ 370
35.6.2 Modulation........................................................................................ 371
35.6.3 Frequency Modulation...................................................................... 372
35.6.4 Amplitude Modulation...................................................................... 373
35.6.5 Phase Modulation.............................................................................. 373
35.6.6 Pulse Modulation.............................................................................. 373
35.6.7 Amplitude Shift Keying.................................................................... 374
35.6.8 Handshaking..................................................................................... 374
35.6.9 Frequency Hopping........................................................................... 376
35.7 Value Proposition: Wave of the Future........................................................... 377
Questions................................................................................................................... 377

Chapter 36 Future RFID Applications......................................................................................... 379


36.1 RFID and AIT Centers................................................................................... 379
36.2 RFID in Research........................................................................................... 379
36.3 Broader Impact............................................................................................... 381
36.4 Future of RFID in Specific Areas.................................................................. 382
Bibliography.................................................................................................................................. 385
Preface
RFID AND AIT IN PLANNING AND LOGISTICS
The use of RFID technology is becoming increasingly popular due to the perceived reduction in
costs that it may bring to the operational costs. In 2003, we opened the RFID and Supply Chain
Logistics Lab at the University of Nebraska, one of the first RFID labs focused on RFID and
logistics. We believed that RFID technology was not mature enough to enter mainstream logistics
operations and that an unbiased application lab was the best way to test and prove concepts prior
to operational deployment. The academic lab setting would provide the researchers an opportunity
to test the applications unlike vendor-driven labs that could potentially become biased.
After the lab opened, mandates from large retailers such as Walmart and TESCO motivated
manufacturers to implement RFID initiatives into their supply chain. Unfortunately, because there
was no developed testing or implementation plan, most of these implementations were on a trial-
and-error basis. The most common challenges to implementation were lack of knowledge of pas-
sive and active technologies, not testing of the manufacturing specifications, and not realizing the
operational impact of changing technologies.
The logistics consulting background of the researchers combined with the research they have
conducted over the past several years has led to innovative implementation models for applying
RFID into logistics operations. This approach, for example, first provides the reader with foun-
dational relationships in RFID such as how antennae, integrated circuitry, and substrates work
together. The approach then leads the reader to reach an understanding of which technology he or
she is seeking to use such as passive, semi-passive, or active tags. These foundational relationships
are not explained in other books in enough detail for implementers to determine if there is a design
problem with tags in their troubleshooting process. In our previous RFID symposium at University
of Nebraska-Lincoln (UNL), participants have asked how to validate that manufacturers are provid-
ing accurate specifications, what are true points of failure, and how do we set up and validate our
prototypes. By working in close collaboration with other researchers, manufacturers, and integra-
tors, this book will provide some opportunities to implement these more effectively.
In 2005, universities such as the University of Nebraska-Lincoln and Oklahoma State University
offered a course on RFID. The books that were available did not provide enough robust material
for engineering students, engineers, and operational personnel to use for foundational concepts for
integrating logistics and RFID. The foundational concept of increased inventory visibility due to
the automatic data capture abilities of RFID provides an opportunity to reduce inventory levels. The
proof of this concept should be validated by changing the amended economic order quantity (EOQ)
model to focus on the reorder point strategy. This can affect how the logistics professional config-
ures his warehouse management system (WMS) or enterprise resource planning (ERP) system.
This book will provide the foundational understanding on how these are integrated into an overall
logistics model.

DESCRIPTION OF RFID AND AIT IN PLANNING AND LOGISTICS


With RFID and Auto-ID in Planning and Logistics, we hope to establish the concepts and prin-
ciples by which students, military personnel and contractors, and corporate managers can learn
about RFID and other automatic information capture technologies, and the ways in which it can be
integrated into planning and logistics functions. A comparative evaluation of RFID along with other

xxiii
xxiv Preface

technologies such as bar codes, satellite tags, and global positioning systems provides a complete
understanding of which technologies to use in specific planning and distribution operations. Also,
integration of unique identification standards that are required for military contractors will allow
this book to provide a useful knowledge base for military personnel and contractors. Moreover, the
description of these technologies’ histories, current use, and future application will serve to educate
students, academia, and military personnel and contractors on supply chain planning and logistics
uses for RFID and AIT technologies.
Also, we hope to provide self-help for military personnel and contractors, individuals, and cor-
porate managers who wish to regain productivity.

UTA RfAID
Dr. Erick C. Jones currently works at the University of Texas at Arlington. In an effort to support the
marriage of industry’s supply chain needs like automatic identification technology with academia’s
theoretical applications, he has created an industry/academia collaboration in the RFID and Supply
Chain Lab (RFSCL). The purpose of this facility is to support project initiatives like radio fre-
quency identification (RFID), logistics (supply chain engineering), manufacturing (six sigma and
Lean initiatives), and information technology (ERP, WMS). The facility’s goal is to enhance the
industrial engineering field by utilizing some of the research methodologies to provide solutions in
the areas of RFID, supply chain logistics, and engineering management. The mission of the RFSCL
is “providing integrated solutions in logistics and other data driven environments through automatic
data capture, real world prototypes, and analysis.” Equipment used in the lab include active and
passive tags/readers and software (Matrics, Alien, Samsys, IMPINJ, SERIT), hytrol conveyor, and
GCS WMS, HP5555 Mobile Active Reader and Software, RF Code active tags, and SAVI Active
Tags and Reader (WMRM/WORM). The methodology utilized for research in the lab is known
as DFSS (design for six sigma), which is similar to the six sigma DMAIC methodology. The seven
steps in this methodology are define, measure, analyze, identify, design, optimize, and verify. The
RFSCL team consists of approximately 15 graduate students, with 7 being PhD students and the
rest masters’ students. The RFSCL has received over 40 research awards that have amounted to over
$3,067,756. The lab has also received over $1,726,357 in research funding. Research projects focus
on four areas: logistics systems analysis and design, supply chain modeling, material flow design
and improvement, and intelligent systems. In the RFSCL, projects are either applied research or
theoretical research models. RFID applied research concentrates on areas such as RFID and bar
code integration into WMS and ERP systems or RFID in industrial applications such as conveyors.
Theoretical research models for RFID include RFID integration into GPS/GIS or alternate active
tag standard development. Supply chain applied research focuses on facility/transportation network
modeling and RFID and bar code systems integration for inventory. Theoretical research models
include mathematical modeling inventory polices and stochastic modeling of supply chain net-
works. Current projects dealing with RFID include embedded RFID license plates (DOT), ROW
underground RFID tags (TxDOT), and RFID RTLS (NASA). Current projects in logistics include
corporate supply chain analysis and grain terminal network analysis.

BOOK PURPOSES AND USES


RFID is an emerging technology that has come of age. Other AIT technologies have been useful in
logistics, and there are numerous challenges between choosing RFID in lieu of, in conjunction with,
or integrated with other AIT technologies. Many practitioners, military personnel, and researchers do
not have a good reference on the workings of RFID, AIT technologies such as satellite tags and bar
codes, their integration into logistics initiatives (UID standards) and mandates (i.e., Walmart and
Department of Defense), and the future uses for RFID. In this book, we will present the background
on RFID and AIT technologies, previous history of AIT technologies (mostly in the military),
Discovering Diverse Content Through
Random Scribd Documents
464 Diosma ovata Oval-leaved G. Shrub. May.
Diosma H.
Straddling-leaved G.
465 Protea divaricata Shrub. July.
Protea H.
G.
466 Goodenia tenella Slender Goodenia Shrub. June.
H.
Lythrum G. All
467 Shrubby Lythrum Shrub.
fruticosum H. Summer.
H.
468 Aloe arborescens Tree Aloe Shrub. June.
H.
Crown-flowered G.
469 Protea coronata Shrub. July.
Protea H.
G.
470 Ophrys arachnoides Spider-like Ophrys Shrub. July.
H.
G.
471 Ophrys myodes Fly-like Ophrys Shrub. July.
H.
Scolloped-leaved G.
472 Hibbertia crenata Shrub. July.
Hibbertia H.
473 Yucca gloriosa Superb Yucca Har. Shrub. July.
Winged-leaved G.
474 Psoralea pinnata Shrub. July.
Psoralea H.
Heart-bearing H.
475 Serapias cordigera Shrub. June.
Serapias H.
Melaleuca Diosma-leaved G.
476 Shrub. July.
diosmæfolia Melaleuca H.
477 Linum venustum Graceful Linum Har. Shrub. July.
Broad-leaved H.
478 Crinum latifolium Bulb. August.
Crinum H.
479 Fragaria indica Indian Strawberry Har. Herb. July.
Shining-leaved
480 Vaccinium nitidum Har. Shrub. June.
Whortle-berry
West India Bark- H.
481 Cinchona caribæa Shrub. August.
tree H.
482 Dianthus alpinus Alpine Pink G. Shrub. July.
H.
Dwarf winged- G.
483 Dahlia pinnata nana Herb. September.
leaved Dahlia H.
G.
484 Nicotiana glutinosa Clammy Tobacco Herb. August.
H.
Melaleuca Willow-leaved G.
485 Shrub. July.
salicifolia Melaleuca H.
486 Pæonia Daurica Dauric Pæony Har. Herb. June.
Xeranthemum Herbaceous Eternal G. All
487 Herb.
herbaceum Flower H. Summer.
Broussonetia
488 Paper Mulberry Har. Shrub. June.
papyrifera
Gnaphalium Large-flowered G.
489 Shrub. August.
grandiflorum Gnaphalium H.
H.
490 Pontederia dilatata Dilated Pontederia Aquatic. September.
H.
H.
491 Gardenia radicans Rooting Gardenia Shrub. August.
H.
Oxylobium Heart-leaved G.
492 Shrub. July.
cordifolium Oxylobium H.
ERRATA.
Plate 438 read 433.
467 instead of Lythrum of Linnæus, read Lythrum fruticosum of Linnæus.
468 line 4 from the bottom, instead of height read size.
*** END OF THE PROJECT GUTENBERG EBOOK THE
BOTANIST'S REPOSITORY FOR NEW AND RARE PLANTS; VOL.
07 [OF 10] ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part of
this license, apply to copying and distributing Project Gutenberg™
electronic works to protect the PROJECT GUTENBERG™ concept
and trademark. Project Gutenberg is a registered trademark, and
may not be used if you charge for an eBook, except by following the
terms of the trademark license, including paying royalties for use of
the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund from
the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears, or
with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning of
this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1 with
active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in paragraph
1.F.3, the Project Gutenberg Literary Archive Foundation, the owner
of the Project Gutenberg™ trademark, and any other party
distributing a Project Gutenberg™ electronic work under this
agreement, disclaim all liability to you for damages, costs and
expenses, including legal fees. YOU AGREE THAT YOU HAVE NO
REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF
WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE
PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE
FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving it,
you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or entity
that provided you with the defective work may elect to provide a
replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and distribution
of Project Gutenberg™ electronic works, harmless from all liability,
costs and expenses, including legal fees, that arise directly or
indirectly from any of the following which you do or cause to occur:
(a) distribution of this or any Project Gutenberg™ work, (b)
alteration, modification, or additions or deletions to any Project
Gutenberg™ work, and (c) any Defect you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many small
donations ($1 to $5,000) are particularly important to maintaining tax
exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make


any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.

Project Gutenberg™ eBooks are often created from several printed


editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
back
back
back
back
back
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookname.com

You might also like