RFID-enabled supply chain detection using clustering algorithms
暂无分享,去创建一个
Manmeet Mahinderjit Singh | Rohail Hassan | Teh FarahinAzahar | Rohail Hassan | M. Singh | Teh FarahinAzahar
[1] M. Singh. RFID-enabled Supply Chain Simulator for Counterfeiting Attack Detection , 2014 .
[2] Diego Klabjan,et al. Warehousing and Analyzing Massive RFID Data Sets , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[3] Diego Klabjan,et al. Warehousing and Mining Massive RFID Data Sets , 2006, ADMA.
[4] B. Efron. The Efficiency of Cox's Likelihood Function for Censored Data , 1977 .
[5] Ian Witten,et al. Data Mining , 2000 .
[6] J. Townsend. Theoretical analysis of an alphabetic confusion matrix , 1971 .
[7] Yahia Zare Mehrjerdi,et al. RFID‐enabled supply chain systems with computer simulation , 2009 .
[8] Jacky Hartnett,et al. Deckard: A System to Detect Change of RFID Tag Ownership , 2007 .
[9] Xue Li,et al. Counterfeiting Detection in RFID-enabled Supply Chain , 2013, IOT 2013.
[10] Xue Li,et al. RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.
[11] A. Rubinov,et al. Unsupervised and supervised data classification via nonsmooth and global optimization , 2003 .
[12] Xue Li,et al. A Cost-based Model for Risk Management in RFID-Enabled Supply Chain Applications , 2011 .
[13] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[14] Charles Elkan,et al. Expectation Maximization Algorithm , 2010, Encyclopedia of Machine Learning.
[15] Jian Huang,et al. An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.
[16] ChiaCheng Chao,et al. Determining technology trends and forecasts of RFID by a historical review and bibliometric analysis from 1991 to 2005 , 2007 .
[17] Katina Michael,et al. The pros and cons of RFID in supply chain management , 2005, International Conference on Mobile Business (ICMB'05).
[18] Elgar Fleisch,et al. Probabilistic Approach for Location-Based Authentication , 2007 .
[19] Manmeet Mahinderjit Singh,et al. Trust in RFID-enabled Supply-Chain Management , 2010, Int. J. Secur. Networks.
[20] Manmeet Mahinderjit Singh,et al. Security and privacy protection in RFID-enabled supply chain management , 2011, Int. J. Radio Freq. Identif. Technol. Appl..
[21] Narendra Sharma,et al. Comparison the various clustering algorithms of weka tools , 2012 .