Search Results - (( based evaluation a algorithm ) OR ( _ identification ((rfid algorithm) OR (rsa algorithm)) ))
Search alternatives:
- based evaluation »
- _ identification »
- rfid algorithm »
- rsa algorithm »
- evaluation a »
- a algorithm »
-
1
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…Based on evaluation that have done, we found that Farthest First is the best algorithm for 1000 (small data) and 10000 (bigger data). …”
Get full text
Get full text
Conference or Workshop Item -
2
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…Radio frequency identification (RFID) is an important internet of things (IoT) enabling technology. …”
Get full text
Get full text
Article -
3
A novel anti-collision protocol for optimization of remote sensing in dense reader network
Published 2015“…The behavior of the algorithm is evaluated through a set of simulation experiments which demonstrates that the algorithm is 15 efficient than NFRA. …”
Get full text
Get full text
Article -
4
Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things
Published 2020“…Using this method, passive RFID allows short-range communication to read automatically the patient identification number and active RFID extends long-range communication for recording and monitoring blood glucose data through multi-hop WSN. …”
Get full text
Get full text
Thesis -
5
Investigation of features for classification RFID reading between two RFID reader in various support vector machine kernel function
Published 2022“…However, the precise location of the RFID device is still a problem in a specific area due to the interference of the radiofrequency. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…In conclusion, it can be inferred from the analysis that the Random Forest model has better predictive performance compared to the rest of the pallet level partition model with a height of 12 cm used in this research. Based on the train, validation, and test sets in Random Forest, the RFID capability to determine the position of the pallet can be detected precisely.…”
Get full text
Get full text
Thesis -
7
Design and implementation of a 2.4 ghz embedded RFID system for fruit maturity evaluation for agricultural industries utilizing wireless mesh sensor network
Published 2018“…To determine the amount of mature fruit within a short period of time, RFID system has been applied by using Xbee Pro S2b as a medium of transmission. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
Get full text
Get full text
Article -
10
Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat
Published 2007“…Now a day world technology of RFID will used in a global security of identifications. …”
Get full text
Get full text
Article -
11
Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat
Published 2007“…RFID (Radio Frequency Identification) is a technology that incorporates the use of electromagnetic or electrostatic An Radio Frequency Identification RFID system may consist of several component like tags and tags reader. …”
Get full text
Get full text
Thesis -
12
-
13
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
Get full text
Get full text
Article -
14
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
Get full text
Get full text
Thesis -
15
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…Among the widely used technology in recent years is Radio Frequency Identification (RFID). It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
Get full text
Get full text
Get full text
Thesis -
16
RFID Network Planning of Smart Factory Based on Swarm Intelligent Optimization Algorithm: A Review
Published 2024“…The improvement direction of swarm intelligence optimization algorithms and factors affecting RFID network performance are also explored. …”
Get full text
Get full text
Get full text
Article -
17
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…Radio Frequency Identification (RFID) is a technology that is used for wireless monitoring, tracking and identification of an object. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Radio Frequency Identification (RFID) Indoor Parking Control System
Published 2017“…Frequency Identification (RFID) Parking Control System is a control and monitoring system designed for using at residential condominiums, gated communities, business parking garages, university parking areas, and hospitality or retail centers. …”
Get full text
Get full text
Article -
19
-
20
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
