Search Results - (( using identification rfid algorithm ) OR ( evolution optimization method algorithm ))

Refine Results
  1. 1

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
    Get full text
    Get full text
    Article
  3. 3

    Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat by Amat, Mohd Faizul Azmy

    Published 2007
    “…Today world technology of RFID will used in a global security of identification systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…We propose to use clustering algorithms in order to detect counterfeit in supply chain management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Article
  7. 7

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…Among the widely used technology in recent years is Radio Frequency Identification (RFID). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing counterfeit tag detection for RFID system using slotted aloha by Musa, Yusuf

    Published 2021
    “…Radio Frequency Identification (RFID) is a technology that is used for wireless monitoring, tracking and identification of an object. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Radio Frequency Identification (RFID) Indoor Parking Control System by El-Hageen, Hazem M. M., Mohammad Ata, Karimeh Ibrahim, Che Soh, Azura, Ishak, Asnor Juraiza, Jaafar, Haslina

    Published 2017
    “…This system identifies each vehicle with a RFID-TAG/CARD using the mall worker card at the gate. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A modified technique in RFID networking planning and optimization by Nawawi, Azli

    Published 2015
    “…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain by Mohamad Zihin , Mohd Zain

    Published 2018
    “…The proposed method is tested on 10 multi-objective benchmark problems of CEC 2009 and compared with four metaheuristics: Multi-Objective Grey Wolf Optimizer (MOGWO), Multi-Objective Evolutionary Algorithm Based on Decomposition (MOEA/D), Multi-Objective Differential Evolution (MODE) and MOPSO. …”
    Get full text
    Get full text
    Thesis
  14. 14

    RFID data reliability optimiser based on two dimensions bloom filter by Yaacob, Siti Salwani, Mahdin, Hairulnizam, Kasim, Shahreen

    Published 2017
    “…RFID system used radio waves to perform wireless interaction to detect and read data from the tagged object. …”
    Get full text
    Get full text
    Article
  15. 15

    Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things by Hamid, Shabinar Abdul

    Published 2020
    “…Using this method, passive RFID allows short-range communication to read automatically the patient identification number and active RFID extends long-range communication for recording and monitoring blood glucose data through multi-hop WSN. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    An innovative approach for estimating the number of tags in RFID traffic monitoring systems by Chebil, Jalel, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2024
    “…One of the technologies used in ITS is Radio Frequency Identification (RFID) system for traffic monitoring and electronic toll collection. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Parameter Estimation Using Improved Differential Evolution And Bacterial Foraging Algorithms To Model Tyrosine Production In Mus Musculus(Mouse) by Jia, Xing Yeoh, Chuii, Khim Chong, Mohd Saberi, Mohamad, Yee, Wen Choon, Lian, En Chai, Safaai, Deris, Zuwairie, Ibrahim

    Published 2015
    “…The hybrid of Differential Evolution algorithm with Kalman Filtering and Bacterial Foraging algorithm is a novel global optimisation method implemented to obtain the best kinetic parameter value. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
    Get full text
    Get full text
    Thesis