Search Results - (( data identification rfid algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…AC complement algorithm was used to compare the different in each set of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…Furthermore, RFID data nature characteristics faces the issues likes RFID just carry simple information, in-flood of data, inaccuracy data from RFID readers and difficulties to track spatial and place. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…Among the widely used technology in recent years is Radio Frequency Identification (RFID). It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    RFID data reliability optimiser based on two dimensions bloom filter by Yaacob, Siti Salwani, Mahdin, Hairulnizam, Kasim, Shahreen

    Published 2017
    “…However, RFID data streams contain a lot of false positive and duplicate readings. …”
    Get full text
    Get full text
    Article
  7. 7

    Radio Frequency Identification (RFID) Indoor Parking Control System by El-Hageen, Hazem M. M., Mohammad Ata, Karimeh Ibrahim, Che Soh, Azura, Ishak, Asnor Juraiza, Jaafar, Haslina

    Published 2017
    “…Based on the data, the dynamic programming algorithm embedded in the system will determine the nearest parking location based on their entrance destination to the worker. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things by Hamid, Shabinar Abdul

    Published 2020
    “…Using this method, passive RFID allows short-range communication to read automatically the patient identification number and active RFID extends long-range communication for recording and monitoring blood glucose data through multi-hop WSN. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…Radio Frequency Identification (RFID) is an increasingly widespread and applied technology of automatic real-time monitoring and control railway assets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    An efficient approach to detecting missing tags in RFID data stream by Zainudin, Nur’Aifaa, Mahdin, Hairulnizam, Witarsyah, Deden, Makhtar, Mokhairi, Hafez Ninggal, Mohd Izuan, Baharum, Zirawani

    Published 2018
    “…RFID technology is a Radio frequency identification system that provides a reader reading the data item from its tag. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…Identifying specific locations of items such as containers, warehouse pellets, and returnable packages in a large environment, for instance, in a warehouse, requires an extensive tracking system that could identify the location through data visualization. This is the similar case for radio-frequency identification (RFID) pallet level signal as the accuracy of determining the position for specific location either on the level or stacked in the same direction are read uniformly. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Design and implementation of a 2.4 ghz embedded RFID system for fruit maturity evaluation for agricultural industries utilizing wireless mesh sensor network by Othman, Azlina

    Published 2018
    “…Thereore, a simple system is proposed to determine the fruit maturity by utilizing active Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  17. 17
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  20. 20