A Cross-Frequency Protective Emblem: Protective Options for Medical Units and Wounded Soldiers in the Context of (fully) Autonomous Warfare
暂无分享,去创建一个
[1] K. Minaoui,et al. DMLAR: Distributed Machine Learning-Based Anti-Collision Algorithm for RFID Readers in the Internet of Things , 2022, Comput..
[2] Osama M. Mohsen,et al. A machine learning approach to predict production time using real-time RFID data in industrialized building construction , 2022, Adv. Eng. Informatics.
[3] Filippo Costa,et al. A Review of RFID Sensors, the New Frontier of Internet of Things , 2021, Sensors.
[4] Xujuan Zhou,et al. Remote Patient Monitoring Using Radio Frequency Identification (RFID) Technology and Machine Learning for Early Detection of Suicidal Behaviour in Mental Health Facilities , 2021, Sensors.
[5] Brian Fitzgerald,et al. Taxonomy of Centralization in Public Blockchain Systems: A Systematic Literature Review , 2020, Inf. Process. Manag..
[6] A.K.M. Najmul Islam,et al. A Critical Review of Concepts, Benefits, and Pitfalls of Blockchain Technology Using Concept Map , 2020, IEEE Access.
[7] Seema Patil,et al. A Survey on Road Traffic Sign Recognition System using Convolution Neural Network , 2018 .
[8] M. Sridevi,et al. Automatic traffic sign recognition system using fast normalized cross correlation and parallel processing , 2017, 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT).
[9] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[10] Rob Nicholls,et al. Implanting Military RFID: Rights and Wrongs , 2017, IEEE Technology and Society Magazine.
[11] Hauptadministrator,et al. QR code , 2016, The Fairchild Books Dictionary of Fashion.
[12] David Hyunchul Shim,et al. Real-time Traffic Sign Recognition system with deep convolutional neural network , 2016, 2016 13th International Conference on Ubiquitous Robots and Ambient Intelligence (URAI).
[13] Enis Bilgin,et al. Road sign recognition system on Raspberry Pi , 2016, 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[14] Gregory D. Durgin,et al. Long range and low powered RFID tags with tunnel diode , 2015, 2015 IEEE International Conference on RFID Technology and Applications (RFID-TA).
[15] Chien-Chen Chen,et al. RFID-based human behavior modeling and anomaly detection for elderly care , 2010, Mob. Inf. Syst..
[16] Kwan-Wu Chin,et al. A Survey and Tutorial of RFID Anti-Collision Protocols , 2010, IEEE Communications Surveys & Tutorials.
[17] B. Rolle,et al. The emblem that cried wolf: ICRC study on the use of the emblems , 2009, Revue Internationale de la Croix-Rouge.
[18] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[19] T. Hasegawa,et al. Machine learning approach to self-localization of mobile robots using RFID tag , 2007, 2007 IEEE/ASME international conference on advanced intelligent mechatronics.
[20] Qinghan Xiao,et al. RFID Security Issues in Military Supply Chains , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[21] Ron Weinstein,et al. RFID: a technical overview and its application to the enterprise , 2005, IT Professional.
[22] David W. Chadwick,et al. Role-Based Access Control With X.509 Attribute Certificates , 2003, IEEE Internet Comput..
[23] Mark A. Buckner,et al. MICLOG RFID tag program enables total asset visibility , 2002, MILCOM 2002. Proceedings.
[24] N J Mangus,et al. Smart Munitions: An Introduction to the Concepts, the Technologies, and the Systems Primer and Briefing Manual. , 1987 .