ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: RFID
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Improved Q-Learning Algorithm Integrated into the Aloha Anti-Collision Protocol for Energy-Efficient RFID Systems
Van-Hoa Le,Duc-Nhat-Quang Nguyen,Viet-Minh-Nhat Vo
#RFID system
#aloha protocol
#anti-collision
#Q-learning
#energy-efficiency
Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols
Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID
#Low*cost RFID
# cryptography
# protocol
# vulnerabilit y
An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques
Abstract: Nowadays, the vital parts of the business programs are the data warehouses and the data mining techni ques.
# Data warehousing system
# data cleaning
# data transf ormation
# data loading
# dirty data
# RFID
# suspicious tags
A new Model of Multi-Key Generation for RFID Access Control System
handling modern security threats, with access decisions influenced by several factors, including situational, environmental
#Encryption key generation model
# Risk-based access control
# Radio frequency identification
On the Security of Two Ownership Transfer
1Electrical Engineering Department, Shahid Rajaee Teacher Training University, Iran 2Computer Engineering Department, Shahid Rajaee Teacher Training University, Iran
#RFID
# cryptanalysis
# ownership transfer protocol
# de-synchronization attack
An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques
Abstract: Nowadays, the vital parts of the business programs are the data warehouses and the data mining techni ques.
# Data warehousing system
# data cleaning
# data transf ormation
# data loading
# dirty data
# RFID
# suspicious tags
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint