Novel RFID anti-collision algorithm based on the Monte–Carlo query tree search
暂无分享,去创建一个
[1] Guoxing Zhang,et al. An improved binary search RFID anti-collision algorithm , 2017, 2017 12th International Conference on Computer Science and Education (ICCSE).
[2] Yuan-Cheng Lai,et al. General binary tree protocol for coping with the capture effect in RFID tag identification , 2010, IEEE Communications Letters.
[3] Yuxing Chen,et al. A Staff Access Control System Based on RFID Technology , 2016 .
[4] C. M. Roberts,et al. Radio frequency identification (RFID) , 2006, Comput. Secur..
[5] Yuan-Cheng Lai,et al. An RFID anti-collision algorithm with dynamic condensation and ordering binary tree , 2013, Comput. Commun..
[6] Katina Michael. RFID/NFC Implants for Bitcoin Transactions , 2016, IEEE Consumer Electronics Magazine.
[7] Hervé Rivano,et al. A Survey of RFID Readers Anticollision Protocols , 2018, IEEE Journal of Radio Frequency Identification.
[8] Subir Kumar Sarkar,et al. Anti-collision algorithm for RFID system using adaptive Bayesian Belief Networks and it's VLSI Implementation , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).
[9] Wei Xi,et al. CBID: A Customer Behavior Identification System Using Passive Tags , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[10] Izabela Lacmanovic,et al. Contactless payment systems based on RFID technology , 2010, The 33rd International Convention MIPRO.
[11] Jorge L. V. Barbosa,et al. An intelligent model for logistics management based on geofencing algorithms and RFID technology , 2015, Expert Syst. Appl..
[12] Anthony J. Maeder,et al. RFID Localisation For Internet Of Things Smart Homes: A Survey , 2017, ArXiv.
[13] Lei Yang,et al. ShopMiner: Mining Customer Shopping Behavior in Physical Clothing Stores with COTS RFID Devices , 2015, SenSys.
[14] A. Provotorov,et al. Development of Methods for Determining the Locations of Large Industrial Goods During Transportation on the Basis of RFID , 2015 .
[15] Hu Chen,et al. A Low Complexity Anti-Collision Algorithm for RFID Using Query Tree , 2018, 2018 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC).
[16] Quanyuan Feng,et al. An Efficient Anti-Collision Protocol for RFID Tag Identification , 2010, IEEE Communications Letters.
[17] Klaus Finkenzeller,et al. Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .
[18] Tanvi Agrawal,et al. An Optimized Query Tree Algorithm in RFID Inventory Tracking -A case Study Evidence , 2012 .
[19] Alain Yee-Loong Chong,et al. Structural equation modeling for multi-stage analysis on Radio Frequency Identification (RFID) diffusion in the health care industry , 2012, Expert Syst. Appl..
[20] Shuang-Hua Yang,et al. Hybrid Zigbee RFID sensor network for humanitarian logistics centre management , 2011, J. Netw. Comput. Appl..
[21] Bo Li,et al. Efficient Anti-Collision Algorithm Utilizing the Capture Effect for ISO 18000-6C RFID Protocol , 2011, IEEE Communications Letters.
[22] Majid Manteghi,et al. Chipless RFID: Design Procedure and Detection Techniques , 2014 .
[23] Girish. R. Talmale,et al. Medicine Reminder and Monitoring System for Secure Health Using IOT , 2016 .
[24] Yi Pan,et al. A Novel Anti-Collision Algorithm in RFID Systems for Identifying Passive Tags , 2010, IEEE Transactions on Industrial Informatics.
[25] Ji Hwan Choi,et al. Novel Query Tree Algorithm Based on Reservation and Time-Divided Responses to Support Efficient Anti-Collision Protocol , 2018, 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN).
[26] Rémi Coulom,et al. Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search , 2006, Computers and Games.
[27] Rajiv Khosla,et al. RFID-based Hospital Real-time Patient Management System , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).
[28] Tae-Jin Lee,et al. An efficient framed-slotted ALOHA algorithm with pilot frame and binary selection for anti-collision of RFID tags , 2008, IEEE Communications Letters.
[29] Cheng-Ta Yang,et al. Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID , 2016 .
[30] Yunhao Liu,et al. Design and Implementation of an RFID-Based Customer Shopping Behavior Mining System , 2017, IEEE/ACM Transactions on Networking.
[31] Liu Baolong,et al. An Investigation on Tree-Based Tags Anti-collision Algorithms in RFID , 2017, 2017 International Conference on Computer Network, Electronic and Automation (ICCNEA).
[32] Kay Römer,et al. Smart Identification Frameworks for Ubiquitous Computing Applications , 2004, Wirel. Networks.
[33] Henry C. W. Lau,et al. A RFID case-based logistics resource management system for managing order-picking operations in warehouses , 2009, Expert Syst. Appl..
[34] Csaba Szepesvári,et al. Bandit Based Monte-Carlo Planning , 2006, ECML.
[35] Edwin Lughofer,et al. An Online RFID Localization in the Manufacturing Shopfloor , 2018, Predictive Maintenance in Dynamic Systems.
[36] Quanyuan Feng,et al. Stability Analysis of an Efficient Anti-Collision Protocol for RFID Tag Identification , 2012, IEEE Transactions on Communications.
[37] A. L. Herrera-May,et al. Design and implementation of a system access control by RFID , 2016, 2016 IEEE International Engineering Summit, II Cumbre Internacional de las Ingenierias (IE-Summit).
[38] Simon M. Lucas,et al. A Survey of Monte Carlo Tree Search Methods , 2012, IEEE Transactions on Computational Intelligence and AI in Games.
[39] Jiang-Liang Hou,et al. Quantitative performance evaluation of RFID applications in the supply chain of the printing industry , 2006, Ind. Manag. Data Syst..
[40] Shing-Tsaan Huang,et al. Adaptive splitting and pre-signaling for RFID tag anti-collision , 2009, Computer Communications.
[41] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[42] W. Tsai,et al. Logistics Management System Based on Permissioned Blockchains and RFID Technology , 2019, Proceedings of the 2019 International Conference on Computer, Network, Communication and Information Systems (CNCI 2019).
[43] Kai Cheng,et al. RFID enabled manufacturing: fundamentals, methodology and applications , 2006 .
[44] Demis Hassabis,et al. Mastering the game of Go without human knowledge , 2017, Nature.
[45] Gökhan Dalkiliç,et al. Review of different classes of RFID authentication protocols , 2019, Wirel. Networks.
[46] Deming Wang,et al. A Highly Stable and Reliable 13.56-MHz RFID Tag IC for Contactless Payment , 2015, IEEE Transactions on Industrial Electronics.
[47] Baolong Liu,et al. An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme , 2018, Inf..
[48] Jianqiang Wang,et al. RFID-Based Vehicle Positioning and Its Applications in Connected Vehicles , 2014, Sensors.
[49] Ravikanth Pappu,et al. An Optimal Q-Algorithm for the ISO 18000-6C RFID Protocol , 2009, IEEE Transactions on Automation Science and Engineering.
[50] Byeongchan Jeon,et al. Multiple RFID Tags Identification with M-ary Query Tree Scheme , 2013, IEEE Communications Letters.
[51] Pedro M. Reyes,et al. Impact of RFID on manufacturing effectiveness and efficiency , 2012 .
[52] H. Jaap van den Herik,et al. Progressive Strategies for Monte-Carlo Tree Search , 2008 .
[53] Mostafa Salah,et al. Tag Anti-collision Algorithm for RFID Systems with Minimum Overhead Information in the Identification Process , 2011 .
[54] Tzer-Shyong Chen,et al. The Application of RFID to Healthcare Management of Nursing House , 2016, Wirel. Pers. Commun..
[55] Thomas F. La Porta,et al. Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization , 2011, IEEE Transactions on Mobile Computing.
[56] Raymond E. Floyd. RFID in Transportation , 2015, IEEE Potentials.
[57] Li Yi-nan. Research on RFID anti-collision algorithms based on binary tree , 2010 .
[58] Francesca Lonetti,et al. Instant collision resolution for tag identification in RFID networks , 2007, Ad Hoc Networks.
[59] Haejae Jung,et al. A Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags , 2015, J. Inf. Process. Syst..
[60] Yu Min Wang,et al. Understanding the determinants of RFID adoption in the manufacturing industry , 2010 .
[61] Aneesh Krishna,et al. Application of RFID Technology to Reduce Overcrowding in Hospital Emergency Departments , 2018 .
[62] Inkyu Lee,et al. FTTP: A Fast Tree Traversal Protocol for Efficient Tag Identification in RFID Networks , 2010, IEEE Communications Letters.
[63] Kai-Yeung Siu,et al. Efficient memoryless protocol for tag identification (extended abstract) , 2000, DIALM '00.
[64] Hyuckjae Lee,et al. Bi-slotted tree based anti-collision protocols for fast tag identification in RFID systems , 2006, IEEE Communications Letters.
[65] Mustapha Djeddou,et al. Improved RFID anti-collision algorithm , 2013 .
[66] Rui Wang,et al. A Novel RFID Anti-Collision Algorithm based on Binary Tree , 2013, J. Networks.