Search Results - (( data identification rfid algorithm ) OR ( based optimization method algorithm ))

Refine Results
  1. 1

    Hybridized firefly algorithm for multi-objective radio frequency identification (RFID) network planning by Elewe, Adel Muhsin, Hasnan, Khalid, Nawawi, Azli

    Published 2017
    “…The technique was combining the Density Based Clustering method (DBSCAN) and firefly algorithm. …”
    Get full text
    Get full text
    Article
  2. 2

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…In conclusion, this study presented a novel hybrid evolutionary algorithm based on the combination of AHP with GBCS to specify optimal RFID reader positions and amount based on the working train station domain. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things by Hamid, Shabinar Abdul

    Published 2020
    “…Using this method, passive RFID allows short-range communication to read automatically the patient identification number and active RFID extends long-range communication for recording and monitoring blood glucose data through multi-hop WSN. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…AC complement algorithm was used to compare the different in each set of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…Furthermore, RFID data nature characteristics faces the issues likes RFID just carry simple information, in-flood of data, inaccuracy data from RFID readers and difficulties to track spatial and place. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…Among the widely used technology in recent years is Radio Frequency Identification (RFID). It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    RFID data reliability optimiser based on two dimensions bloom filter by Yaacob, Siti Salwani, Mahdin, Hairulnizam, Kasim, Shahreen

    Published 2017
    “…However, RFID data streams contain a lot of false positive and duplicate readings. …”
    Get full text
    Get full text
    Article
  8. 8

    Radio Frequency Identification (RFID) Indoor Parking Control System by El-Hageen, Hazem M. M., Mohammad Ata, Karimeh Ibrahim, Che Soh, Azura, Ishak, Asnor Juraiza, Jaafar, Haslina

    Published 2017
    “…Based on the data, the dynamic programming algorithm embedded in the system will determine the nearest parking location based on their entrance destination to the worker. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    An efficient approach to detecting missing tags in RFID data stream by Zainudin, Nur’Aifaa, Mahdin, Hairulnizam, Witarsyah, Deden, Makhtar, Mokhairi, Hafez Ninggal, Mohd Izuan, Baharum, Zirawani

    Published 2018
    “…RFID technology is a Radio frequency identification system that provides a reader reading the data item from its tag. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…Low-cost radio frequency identification (RFID) tags conforming to the EPCglobal Class-1 Generation-2 standard are inherently insecure due to computational constraints. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…Identifying specific locations of items such as containers, warehouse pellets, and returnable packages in a large environment, for instance, in a warehouse, requires an extensive tracking system that could identify the location through data visualization. This is the similar case for radio-frequency identification (RFID) pallet level signal as the accuracy of determining the position for specific location either on the level or stacked in the same direction are read uniformly. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Design and implementation of a 2.4 ghz embedded RFID system for fruit maturity evaluation for agricultural industries utilizing wireless mesh sensor network by Othman, Azlina

    Published 2018
    “…Thereore, a simple system is proposed to determine the fruit maturity by utilizing active Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Opposition-based Whale Optimization Algorithm by Alamri, Hammoudeh S., Alsariera, Yazan A., Kamal Z., Zamli

    Published 2018
    “…The OWOA use the Opposition-based method to enhance Whale Optimization Algorithm (WOA) performance. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
    Get full text
    Get full text
    Article
  20. 20

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
    Get full text
    Get full text
    Thesis