Search Results - (( process identification rfid algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- process identification »
- identification rfid »
- application testing »
- testing algorithm »
- java application »
- rfid algorithm »
-
1
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat
Published 2007“…RFID (Radio Frequency Identification) is a technology that incorporates the use of electromagnetic or electrostatic An Radio Frequency Identification RFID system may consist of several component like tags and tags reader. …”
Get full text
Get full text
Thesis -
3
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…RFID is also used in inventory processes for RFID counterfeit detection and identification to reduce financial loss caused by shrinkage. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
A modified technique in RFID networking planning and optimization
Published 2015“…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…Radio Frequency Identification (RFID) is an increasingly widespread and applied technology of automatic real-time monitoring and control railway assets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
An innovative approach for estimating the number of tags in RFID traffic monitoring systems
Published 2024“…During identification process, RFID systems encounter two main challenges: tag collision and reader collision. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Design and implementation of a 2.4 ghz embedded RFID system for fruit maturity evaluation for agricultural industries utilizing wireless mesh sensor network
Published 2018“…Thereore, a simple system is proposed to determine the fruit maturity by utilizing active Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…This is the similar case for radio-frequency identification (RFID) pallet level signal as the accuracy of determining the position for specific location either on the level or stacked in the same direction are read uniformly. …”
Get full text
Get full text
Thesis -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
12
-
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
