Search Results - (( simulation identification rfid algorithm ) OR ( java implementation plan algorithm ))

Refine Results
  1. 1

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
    Get full text
    Get full text
    Article
  7. 7

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An innovative approach for estimating the number of tags in RFID traffic monitoring systems by Chebil, Jalel, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2024
    “…During identification process, RFID systems encounter two main challenges: tag collision and reader collision. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…Low-cost radio frequency identification (RFID) tags conforming to the EPCglobal Class-1 Generation-2 standard are inherently insecure due to computational constraints. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A novel anti-collision protocol for optimization of remote sensing in dense reader network by Nawaz, F., Jeoti, V.

    Published 2015
    “…The behavior of the algorithm is evaluated through a set of simulation experiments which demonstrates that the algorithm is 15 efficient than NFRA. …”
    Get full text
    Get full text
    Article
  11. 11

    Effect of parameters variation on the performance of particle swarm optimization algorithm for tag coverage problem of radio frequency identification network by Nawawi, Azli, Hasnan, Khalid, Ngali, Zamani, Sidek, Noor Azizah

    Published 2016
    “…Optimal tag coverage is the most crucial aspect for deploying RFID (Radio Frequency Identification) system in a large scale. …”
    Get full text
    Get full text
    Article
  12. 12

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The development of this project is based on a framework of 5 main stages: planning, analysis, design, implementation and testing. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This methodology consist of Requirement and Planning, Design, Construction, Testing and Implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Intruder localization wireless sensor network radar design with virtual reference tags by Abdullah, Hadi

    Published 2014
    “…VRTs are previously used in RFID (Radio Frequency Identification) system to provide reference to the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis