Search Results - (( simulation identification rfid algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- simulation identification »
- identification rfid »
- java implementation »
- implementation path »
- rfid algorithm »
- path algorithm »
-
1
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. …”
Get full text
Get full text
Get full text
Thesis -
2
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
Get full text
Get full text
Article -
5
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…Radio frequency identification (RFID) is an important internet of things (IoT) enabling technology. …”
Get full text
Get full text
Article -
6
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
Get full text
Get full text
Article -
7
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
Get full text
Get full text
Thesis -
8
An innovative approach for estimating the number of tags in RFID traffic monitoring systems
Published 2024“…During identification process, RFID systems encounter two main challenges: tag collision and reader collision. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…Low-cost radio frequency identification (RFID) tags conforming to the EPCglobal Class-1 Generation-2 standard are inherently insecure due to computational constraints. …”
Get full text
Get full text
Thesis -
10
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
11
A novel anti-collision protocol for optimization of remote sensing in dense reader network
Published 2015“…The behavior of the algorithm is evaluated through a set of simulation experiments which demonstrates that the algorithm is 15 efficient than NFRA. …”
Get full text
Get full text
Article -
12
Effect of parameters variation on the performance of particle swarm optimization algorithm for tag coverage problem of radio frequency identification network
Published 2016“…Optimal tag coverage is the most crucial aspect for deploying RFID (Radio Frequency Identification) system in a large scale. …”
Get full text
Get full text
Article -
13
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
14
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
16
Intruder localization wireless sensor network radar design with virtual reference tags
Published 2014“…VRTs are previously used in RFID (Radio Frequency Identification) system to provide reference to the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis
