Author:
Younis Mohammed I.,Al-Tameemi Zinah Fadhil Abed,Ismail Widad,Zamli Kamal Z.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference29 articles.
1. Ahn, S., Ryu, W., Hong, B., Chae, H. & Lee, J. (2010). Dynamic thread management for scalable RFID middleware. In Proceedings of the international conference on information science and applications (ICISA 2010), p. 1–8, Seoul, South Korea.
2. Ali M. F. M., Younis M. I., Zamli K. Z., Ismail W. (2010) Development of Java based RFID application programmable interface for heterogeneous RFID system. The Journal of Systems and Software 83(11): 2322–2331
3. Anagnostopoulos A., Soldatos J., Michalakos S. G. (2009) REFiLL: A lightweight programmable middleware platform for cost effective RFID application development. Pervasive and Mobile Computing 5(1): 49–63
4. Balitanas M. O., Kim T. (2010) Review: Security threats for RFID-sensor network anti-collision protocol. International Journal of Smart Home 4(1): 23–36
5. Bondi, A. B. (2000). Characteristics of scalability and their impact on performance. In Proceedings of the 2nd international workshop on software and performance, pp. 195–203, Ottawa, Ontario, Canada.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Smart Traffic Management System Using RFID System;2024 MIT Art, Design and Technology School of Computing International Conference (MITADTSoCiCon);2024-04-25
2. Efficient scheduling and attendance system for the ultrasound department under demand uncertainty during COVID-19;Health Informatics Journal;2023-10
3. Administrator Controlled Timetable Based Automatic Facial Recognition Attendance System;2023 International Conference in Advances in Power, Signal, and Information Technology (APSIT);2023-06-09
4. Cattle Tracking System Architecture Using LORA;2022 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS);2022-12-08
5. Parallel Faces Recognition Attendance System with Anti-Spoofing Using Convolutional Neural Network;Illumination of Artificial Intelligence in Cybersecurity and Forensics;2022