Search Results - (( using identification rfid algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- using identification »
- identification rfid »
- java implementation »
- mining algorithm »
- rfid algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
Get full text
Get full text
Article -
4
Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat
Published 2007“…Today world technology of RFID will used in a global security of identification systems. …”
Get full text
Get full text
Thesis -
5
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…We propose to use clustering algorithms in order to detect counterfeit in supply chain management. …”
Get full text
Get full text
Conference or Workshop Item -
6
Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat
Published 2007“…Now a day world technology of RFID will used in a global security of identifications. …”
Get full text
Get full text
Article -
7
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
8
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
9
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…Among the widely used technology in recent years is Radio Frequency Identification (RFID). …”
Get full text
Get full text
Get full text
Thesis -
10
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
11
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…Radio Frequency Identification (RFID) is a technology that is used for wireless monitoring, tracking and identification of an object. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Radio Frequency Identification (RFID) Indoor Parking Control System
Published 2017“…This system identifies each vehicle with a RFID-TAG/CARD using the mall worker card at the gate. …”
Get full text
Get full text
Article -
13
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
14
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
A modified technique in RFID networking planning and optimization
Published 2015“…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
RFID data reliability optimiser based on two dimensions bloom filter
Published 2017“…RFID system used radio waves to perform wireless interaction to detect and read data from the tagged object. …”
Get full text
Get full text
Article -
18
Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things
Published 2020“…Using this method, passive RFID allows short-range communication to read automatically the patient identification number and active RFID extends long-range communication for recording and monitoring blood glucose data through multi-hop WSN. …”
Get full text
Get full text
Thesis -
19
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis
