|
[1]Huang G.Q. & Zhang YF & Jiang PY, “RFID-based wireless manufacturing for real-time management of job shop WIP inventories”, International Journal of Advanced Manufacture Technology, 2006 [2]Wang H.C., Wang H.S., “A hybrid expert system for equipment failure analysis”, Expert System with Applications vol. 28 pp.615-622, 2005 [3]Khanlari A., Mohammadi K. and Sohrabi B., “Prioritizing equipments for preventive maintenance (PM) activities using fuzzy rules”, Computers & Industrial Engineering vol. 54, pp.169–184, 2008 [4]Tsang, A. H. C. “Strategic dimensions of maintenance management”. Journal of Quality in Maintenance Engineering, vol. 8(1), pp.7–39,2002 [5]Weinstein, L., & Chung, C. H. “Integrating maintenance and production decisions in a hierarchical production planning environment”. Computers & Operations Research, vol. 26, pp.1059–1074,1999 [6]Ibrahim N, Tansel, Singh R., Chen P., Wang X., Bao W., Dede C., Tosunoglu S., Inanc F., Claudia K.H., “Monitoring and Management of Machines with Wireless PDAs in Wireless Networked Facilities”,IEEE,2004 [7]Wang L.C., Lin Y.C., Lin P.H., “Dynamic mobile RFID-based supply chain control and management system in construction”, Advanced Engineering Informatics vol. 21, pp.377–390, 2007 [8]Huang Y.P. and Tsai T., “a fuzzy semantic approach to retrieving handheld devices”, IEEE, 2005 [9]Domdouzis K., Kumar B., Anumba C.,” Radio-Frequency Identification(RFID) applications:A brief introduction”, Advanced Engineering Informatics vol. 21 pp.350–355, 2007 [10]Takaragi K., Usami M., Imura R., Itsuki R., and Satoh T., “An ultra small individual recognition security chip,” IEEE Micro, vol. 21, no. 6, pp42–49, 2001 [11]Juels A., “RFID Security and Privacy: A Research Survey”, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, vol. 24, no. 2, 2006 [12]White D., “NCR: RFID in retail,” in RFID: Applications, Security, and Privacy, S. Garfinkel and B. Rosenberg, Eds. Reading, MA: Addison- Wesley, 2005, pp. 381–395 [13]Yabuki N., Shimada Y., Tomita K., ”An On-Site Inspection Support System Using Radio Frequency Identification Tags and Personal Digital Assistants”, International Council for Research and Innovation in Building and Construction CIB w78 conference 2002 Aarhus School of Architecture, 12 – 14 June 2002 [14]Bundy, A., B., Silver, and Plummer D. “An Analytic Comparison of Some Rule-Based Learning Programs. Artificial Intelligence. vol.27:pp.137-181., 1985 [15]Ajose S.O., Ezebuiro I.I., D.Sc., and Adegoke A.S., M.Sc., ” A Rule-Based Approach to Voltage Collapse Estimation: A Case Study of the National Electric Power Authority (NEPA) PLC, Egbin Thermal Station”, vol 6, Number 2, , 2005 [16]Cronk R.N., Callahan P.H.., Bernstein L., “Rule-Based Expert Systems for Network Management and Operations:An Intorduction”, IEEE, 1988 [17]Chatterjee D., Sutradhar G., Oraon B., “Fuzzy rule-based prediction of hardness for sintered HSS components”, journal of materials processing technology vol. 200, pp.212–220,2008 [18]Gao M.,Zhou M.C., Huang X. and Wu Z., Fuzzy reasoning Petri nets, IEEE Transactions on System, Man, and Cybernetics, Part A vol. 33(3), pp. 314–324,2003. [19]Qu W. and Shirai K., Belief learning in certainty factor model and its application to text categorization, In: Proceedings of the 2003 Joint Conference of the Fourth International Conference on Information, Communications and Signal Processing and Fourth Pacific-Rim Conference on Multimedia 12, pp. 1192–1196.,2003 [20]Ting Y., Lu W.B., Chen C.H., Wang G.K., “A fuzzy reasoning design for fault detection and diagnosis of a computer-controlled system”, Engineering Applications of Artificial Intelligence vol. 21 pp.157–170,2008 [21]Zhang H., Tong L., Zhong Y.R., Fan Z.M., Wang W.S., “Fault Diagnosis Based on Fuzzy Logic Control for Power Circuits of Drive Systems in Locomotive”, IEEE,pp.449-452,2008 [22]Hui Zhang, Ren J. , Zhong Y.R.., Chen J., “Fault Diagnosis of Power Electronics in Renewable Energy equipment Based on Fuzzy Expert System” ,IEEE,p864-867,2007 [23]Muhammed U. and Robin G. Q., "E-Maintenance In Support of E-Automated Manufacturing Systems”, Journal of Chinese Institute of Industrial Engineers, Vol. 22, No. 1, pp.1-10, 2005 [24]Srivastava N., “RFID Introduction, Present and Future applications and Security Implications”,George Mason University School of Information and Computer Engineering, http://ece.gmu.edu, access date:2008,04 [25]International Organization for standardization. http://www.iso.org/ access date:2008,04 [26]Using RFID Technologies to Reduce Blood Transfusion Errors http://www.cisco.com, access date:2008,04 [27]Boeing Tags Shipment to the DOD, http://www.rfidjournal.com access date:2008,04 [28]DTI Basic Technologies, RFID tagging for the oil industry-a brief introduction, Petroleum Review 2004, http://www.basictechnologies.gov.uk access date:2008,04 [29]E. Fleisch, M. Strassner, The Promise of Auto-ID in the Automotive Industry, Auto-ID Center, Massachusetts Institute of Technology, Cambridge, Massachusetts, 2003 http://www.autoid.org, access date:2008,04 [30]Albrecht K. Supermarket Cards: The Tip of the Retail Surveillance Iceberg, Denver University Law Review 79 (4) 534–554. http://www.spychips.com access date:2008,04 [31]Harold Clampitt, “The RFID HandBook”, http://rfidhandbook.blogspot.com access date:2008,04 [32]SQL Server 2005 Books Online http://msdn.microsoft.com/en-us/library/ms130214.aspx, access date:2008,04 [33]http://www.siliconfareast.com/manufacturing.HTM, access date:2008,04 [34]Choi, J. 2002. “A Rule-Based Expert System Using an Interactive Question and Answer Sequence”. Technical Report, Department of Geography, University of Georgia http://www.cobblestoneconcepts.com/ucgis2summer2002/choi/choi.htm access date:2008,04 [35]Freeman-Hargis, J. 2003. “Rule-Based Systems and Identification Trees: Introduction to Rule-Based Systems.” AI Depot. http://ai-depot.com/tutorial/rulebased.html. , access date:2008,04 [36]http://www.aaai.org/aitopics/pmwiki/pmwiki.php/AITopics/FuzzyLogic access date:2008,04 [37]http://www.xs4all.nl/~dpsol/data-machine/fuzzy1.htm, access date:2008,04 [38]D. Johnson, R. Broida, “How to Do Everything with Your Palm Handheld”, Osborne/McGraw-Hill, NY, 2000 [39]F. McPherson, “How to Do Everything with Your PocketPC and Handheld PC”, sborne/McGraw-Hill, NY, 2000 [40]S. Weiss, Handheld Usability, John Wiley & Sons, 2002 [41]Stephen August Weis, Security and Privacy in Radio-Frequency Identification Devices, Massachusetts Institute Of Technology, May 2003 [42]Addison-Wesley, Negnevitsky, M. Negnevitsky, Artificial Intelligent–A Guide to Intelligent Systems, New York, 2002
|