Showing 1 - 4 results of 4 for search '"counterfeit"', query time: 0.06s Refine Results
  1. 1

    Enhancing counterfeit tag detection for RFID system using slotted aloha by Musa, Yusuf

    Published 2021
    “…The recent works on counterfeit detection are based on cardinality contradiction and cloned detection which assumed that both counterfeit and genuine tags most be in the system before it can detect counterfeit. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    The quadriceps muscle of knee joint modelling using hybrid particle swarm optimization-neural network (PSO-NN) by Mohamed Nasir, Noorhamizah, Huq, Mohammad Saiful, Mohamed Ramli, Norazan, KSM Kader, Babul Salam, Pah, Chin Hee, Tolos, Siti Marponga, Md Ghani, Nor Azura, Ahmad Kamaruddin, Saadi

    Published 2015
    “…This paper exhibits the modelling of quadriceps muscle model by utilizing counterfeit smart procedures named consolidated backpropagation neural network nonlinear autoregressive (BPNN-NAR) and backpropagation neural network nonlinear autoregressive moving average (BPNN-NARMA) models in view of utilitarian electrical incitement (FES). …”
    Get full text
    Article
  3. 3

    Enchancing RFID data quality and reliability using approximate filtering techniques by Kamaludin, Hazalila

    Published 2018
    “…The second proposed approach, Managing Counterfeit Hash (MCH) performs fastest and 25.7% faster than baseline protocol (BASE) and achieved 99% detection accuracy while DeClone 64% and BASE 77%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Clone tag detection in distributed RFID systems by Kamaludin, Hazalila, Mahdin, Hairulnizam, Abawajy, Jemal H.

    Published 2018
    “…Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. …”
    Get full text
    Article