Search Results - (( based evaluation a algorithm ) OR ( _ identification ((rfid algorithm) OR (rsa algorithm)) ))

Refine Results
  1. 1

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…Based on evaluation that have done, we found that Farthest First is the best algorithm for 1000 (small data) and 10000 (bigger data). …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    A novel anti-collision protocol for optimization of remote sensing in dense reader network by Nawaz, F., Jeoti, V.

    Published 2015
    “…The behavior of the algorithm is evaluated through a set of simulation experiments which demonstrates that the algorithm is 15 efficient than NFRA. …”
    Get full text
    Get full text
    Article
  4. 4

    Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things by Hamid, Shabinar Abdul

    Published 2020
    “…Using this method, passive RFID allows short-range communication to read automatically the patient identification number and active RFID extends long-range communication for recording and monitoring blood glucose data through multi-hop WSN. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…In conclusion, it can be inferred from the analysis that the Random Forest model has better predictive performance compared to the rest of the pallet level partition model with a height of 12 cm used in this research. Based on the train, validation, and test sets in Random Forest, the RFID capability to determine the position of the pallet can be detected precisely.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Design and implementation of a 2.4 ghz embedded RFID system for fruit maturity evaluation for agricultural industries utilizing wireless mesh sensor network by Othman, Azlina

    Published 2018
    “…To determine the amount of mature fruit within a short period of time, RFID system has been applied by using Xbee Pro S2b as a medium of transmission. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat by Amat, Mohd Faizul Azmy

    Published 2007
    “…RFID (Radio Frequency Identification) is a technology that incorporates the use of electromagnetic or electrostatic An Radio Frequency Identification RFID system may consist of several component like tags and tags reader. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
    Get full text
    Get full text
    Article
  14. 14

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…Among the widely used technology in recent years is Radio Frequency Identification (RFID). It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    RFID Network Planning of Smart Factory Based on Swarm Intelligent Optimization Algorithm: A Review by YEJIAO, WANG, KAMALUDIN, HAZALILA, MOHAMMED ALDUAIS, NAYEF ABDULWAHAB, MOHD SAFAR, NOOR ZURAIDIN, ZHONGCHAO, HAO

    Published 2024
    “…The improvement direction of swarm intelligence optimization algorithms and factors affecting RFID network performance are also explored. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Enhancing counterfeit tag detection for RFID system using slotted aloha by Musa, Yusuf

    Published 2021
    “…Radio Frequency Identification (RFID) is a technology that is used for wireless monitoring, tracking and identification of an object. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Radio Frequency Identification (RFID) Indoor Parking Control System by El-Hageen, Hazem M. M., Mohammad Ata, Karimeh Ibrahim, Che Soh, Azura, Ishak, Asnor Juraiza, Jaafar, Haslina

    Published 2017
    “…Frequency Identification (RFID) Parking Control System is a control and monitoring system designed for using at residential condominiums, gated communities, business parking garages, university parking areas, and hospitality or retail centers. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    RSA authentication mechanisms in control grid computing environment using Gridsim toolkit by Ismail, Saiful Adli, Ngadi, Md Asri, Mohd Sharif, Johan, Kama, Mohd Nazri, Sarkan, Haslina

    Published 2015
    “…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item