Search Results - (( simulation identification rfid algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- simulation identification »
- identification rfid »
- application testing »
- testing algorithm »
- java application »
- rfid algorithm »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. …”
Get full text
Get full text
Get full text
Thesis -
3
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
Get full text
Get full text
Article -
6
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…Radio frequency identification (RFID) is an important internet of things (IoT) enabling technology. …”
Get full text
Get full text
Article -
7
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
Get full text
Get full text
Article -
8
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
Get full text
Get full text
Thesis -
9
An innovative approach for estimating the number of tags in RFID traffic monitoring systems
Published 2024“…During identification process, RFID systems encounter two main challenges: tag collision and reader collision. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
A novel anti-collision protocol for optimization of remote sensing in dense reader network
Published 2015“…The behavior of the algorithm is evaluated through a set of simulation experiments which demonstrates that the algorithm is 15 efficient than NFRA. …”
Get full text
Get full text
Article -
11
Effect of parameters variation on the performance of particle swarm optimization algorithm for tag coverage problem of radio frequency identification network
Published 2016“…Optimal tag coverage is the most crucial aspect for deploying RFID (Radio Frequency Identification) system in a large scale. …”
Get full text
Get full text
Article -
12
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
13
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
14
-
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
