Search Results - (( simulation identification rfid algorithm ) OR ( java implementation case algorithm ))
Search alternatives:
- simulation identification »
- identification rfid »
- java implementation »
- implementation case »
- rfid algorithm »
- case algorithm »
-
1
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. …”
Get full text
Get full text
Get full text
Thesis -
2
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
Get full text
Get full text
Article -
5
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…Radio frequency identification (RFID) is an important internet of things (IoT) enabling technology. …”
Get full text
Get full text
Article -
6
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
Get full text
Get full text
Article -
7
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
Get full text
Get full text
Thesis -
8
An innovative approach for estimating the number of tags in RFID traffic monitoring systems
Published 2024“…During identification process, RFID systems encounter two main challenges: tag collision and reader collision. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…Low-cost radio frequency identification (RFID) tags conforming to the EPCglobal Class-1 Generation-2 standard are inherently insecure due to computational constraints. …”
Get full text
Get full text
Thesis -
10
A novel anti-collision protocol for optimization of remote sensing in dense reader network
Published 2015“…The behavior of the algorithm is evaluated through a set of simulation experiments which demonstrates that the algorithm is 15 efficient than NFRA. …”
Get full text
Get full text
Article -
11
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
12
Effect of parameters variation on the performance of particle swarm optimization algorithm for tag coverage problem of radio frequency identification network
Published 2016“…Optimal tag coverage is the most crucial aspect for deploying RFID (Radio Frequency Identification) system in a large scale. …”
Get full text
Get full text
Article -
13
-
14
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
16
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
17
-
18
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
19
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item
