2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns 2009
DOI: 10.1109/computationworld.2009.112
|View full text |Cite
|
Sign up to set email alerts
|

A Security System and Employees Performance Evaluation Using RFID Sensors and Fuzzy Logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The reason that fuzzy set theory is so well suited to widespread applications is that it generates results based on uncertain information. It has been applied and studied in several fields, including the cost-effectiveness of adding drugs to prescriptions (Cheng et al 2007), the selection of products according to a wide number of variables (Wang et al 2009), and to compare the time employees spent working or dawdling (Morsi et al 2009). In this research, fuzzy inference will be used to determine the dangerous degree of the user to a certain dangerous object or location.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The reason that fuzzy set theory is so well suited to widespread applications is that it generates results based on uncertain information. It has been applied and studied in several fields, including the cost-effectiveness of adding drugs to prescriptions (Cheng et al 2007), the selection of products according to a wide number of variables (Wang et al 2009), and to compare the time employees spent working or dawdling (Morsi et al 2009). In this research, fuzzy inference will be used to determine the dangerous degree of the user to a certain dangerous object or location.…”
Section: Related Workmentioning
confidence: 99%
“…There are a few commonly used methods for defuzzification: modified center average, center of sums, mean of maxima and center of gravity. Center of gravity is chosen for defuzzification of the output variable-the dangerous degree, because it has lower computational complexity and is easy to understand (Cheng et al 2007;Morsi et al 2009). The defuzzified dangerous degree can be found by the following equation.…”
Section: Fuzzy Inference For Danger Warningmentioning
confidence: 99%
“…Read rate of sensor tags is decided by the speed of tags fall into the downhole and turbulent eddies. Average read rate of each tag is 60 to 79 percent [7]. It can rise to 100 percent by placing at least 10 of the same tags into downhole.The new target tracking problems are often concerned about moving curve of the goal accompanied by a large number of monitoring information, such as ambient pressure, temperature, humidity, etc.RFID reader, which involved in RFID sensor networks, is responsible for detecting and deciding the location of current moving target, as well as the direction of movement.…”
Section: Research On the Sensor Tags Moving Target Tracking Technologymentioning
confidence: 99%
“…The first model is the system security hierarchical evaluation model [8][9][10], which proposes an RFID system security assessment based on a fuzzy comprehensive method. This model divides the security levels into the object layer, criterion layer, and indicator layer.…”
Section: Phase Correlation Methodsmentioning
confidence: 99%
“…For instance, the atomic node possibility in Table 5 is calculated via variation coefficient method with formulas (6) to (9), considering the four related parameters that are level of attack cost, level of technical difficulty, level of attack discovered, and time cost. And according to formulas (10) to (12), the probability AND operation in Table 5 is represented as "×, " the probability OR operation is expressed as "⊕, " and the probability SAND operation is expressed as "⊗. "…”
Section: Attack Tree Sequencesmentioning
confidence: 99%