2013
DOI: 10.1080/0951192x.2012.749532
|View full text |Cite
|
Sign up to set email alerts
|

RFID-enabled real-time advanced planning and scheduling shell for production decision making

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0
4

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 107 publications
(69 citation statements)
references
References 38 publications
0
65
0
4
Order By: Relevance
“…However, if the attacker is able to implement this attack, the threat of the encryption system is the largest [13][14]. Given a lot of chaos-based encryption system, many of them cannot resist this attack [15][16], the risk exists in our approach as well. Figure 4 shows the sensitivity experiments based on the approaches in this paper.…”
Section: Cyclicity Of Cat Mappingmentioning
confidence: 99%
“…However, if the attacker is able to implement this attack, the threat of the encryption system is the largest [13][14]. Given a lot of chaos-based encryption system, many of them cannot resist this attack [15][16], the risk exists in our approach as well. Figure 4 shows the sensitivity experiments based on the approaches in this paper.…”
Section: Cyclicity Of Cat Mappingmentioning
confidence: 99%
“…Secondly, the cross section of the fingers changes slightly. It is possible to get the image block from the vertical of the finger image [10]. Thus, the average gray value of each image block could be obtained.…”
Section: Vein Image Processing Approachmentioning
confidence: 99%
“…For the clustering process, based on the importance, single property clustering could be achieved. During the clustering, stepwise trial method is used for each property [22]. Therefore, the threshold should be determined.…”
Section: Proposed Clustering Approachmentioning
confidence: 99%