|
References [1] E. Teaw, G. Hou, M. Gouzman, K. W. Tang, A. Kesluk, M. Kane, and J. Farrell, “A wireless health monitoring system,” in Proc. Int. Conf. Information Acquisition, Hong Kong and Macau, China, pp. 247–252, Jun.–Jul. 2005. [2] Business Weekly, http://www.businessweekly.com.tw/ Access available 2010/5/30. [3] MIC (Market Intelligence Center), http://mic.iii.org.tw/english/ Access available 2010/5/30. [4] C. H. Chang, and W. L. Wang, “RFID System,” Tsang Hai Book, Taiwan, 2008. [5] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed, Wiley, 2003, UK. [6] C. M. Roberts, “Radio frequency identification (RFID),” Journal Computer & Security, vol. 25, no. 1, pp. 18–26, Feb. 2006. [7] S. L. Garfinkel, “Public key cryptography,” Computer, vol. 29, no. 6, pp. 101–104, June 1996. [8] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Communications of the ACM, vol. 21, pp. 120–126, 1978. [9] Y. -Y. Chen, J. -K. Jan, and C. -L. Chen, “A fair and secure mobile billing system,” Computer Networks, vol. 48, no. 4, pp. 517–524, Jul. 2005. [10] S. Goldwasser, “The search for provably secure cryptosystems,” in Proceedings Symposia in Applied Mathematics, vol. 42, pp. 89–113, 1990. [11] J. Buchmann, “Introduction to Cryptography,” 2nd, Springer-Verlag, New York, pp. 27, 2004. [12] L. Lamport, “Password authentication with insecure communication,” Communication of the ACM, vol. 24, no. 11, pp. 770–772, 1981. [13] M.-S. Hwang, and L.-H. Li, “A new remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 1, no. 46, pp. 28–30, 2000. [14] H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng, “An efficient and practical solution to remote authentication: smart card,” Computers & Security, vol. 21, no. 4, pp. 372–375, Aug. 2002. [15] H.-F. Huang, and W.-C. Wei, “A new efficient and complete remote user authentication protocol with smart card, ”International Journal of Innovative Computing, Information and Control, vol. 4, no. 11, pp. 2803–2808, 2008. [16] W.-C. Ku, and S.-M. Chen, “Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronic, vol. 50, no. 1, pp. 204–207, 2004. [17] M. Kumar, On the weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards, Cryptology ePrint Archive: Report 163, http://eprint.iacr.org/complete/. [18] C.-C. Chang, and J.-S Lee, “A smart-card-based remote authentication scheme,” Proceedings of the Second International Conference on Embedded Software and Systems (ICESS’05), pp. 1–5, Dec. 16–18, 2005. [19] S.-T. Wu, and B.-C. Chieu, “A user friendly remote authentication scheme with smart cards,” Computers & Security, vol. 22, no. 6, pp. 547–550, Sep. 2003. [20] E.-J. Yoon, and K.-Y. Yoo, “More efficient and secure remote user authentication scheme using smart cards,“ Proceedings of 11th International Conference, vol. 2, pp. 73–77, 2005. [21] S.-W. Lee, H.-S. Kim, and K.-Y. Yoo, "Improved efficient remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 565–567, 2004. [22] A. K. Awasthi, “Comment on a dynamic ID-based remote user authentication scheme,” Transaction on Cryptology, vol. 1, no. 2, pp. 15–17, 2004. [23] M. L. Das, A. Saxena, and V. P. Gulati, “A dynamic ID-based remote user authentication scheme,” IEEE Trans. Consumer Electronics, vol. 50, no. 2. pp. 629–631, 2004. [24] M. Misbahuddin, M. A. Ahmed, A. A. Rao, C. S. Bindu, and M. A. M. Khan, “A novel dynamic ID-based remote user authentication scheme,” 2006 Annual India Conference, pp. 1–5, 2006. [25] X.-M. Wang, W.-F. Zhang, J.-S. Zhang, and M.-K. Khan, “Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards,” Computer Standards & Interfaces, vol. 29, no. 4, pp. 507–512, 2007. [26] Fujitsu Company, http://www.fujitsu.com/sg/services/computing/pc/notebooks/useries/u2010/index.html. Access available 2010/5/30. [27] C.-L. Chen, “An “All-In-One” Mobile DRM System Design,” The International Journal of Innovative Computing, Information and Control, vol. 6, no. 3A, pp. 897–911, March 2010. [28] G. Kardas, and E. T. Tunali, “Design and implementation of a smart card based healthcare information system,” Computer Methods and Programs in Biomedicine, vol. 81, no. 1, pp. 66–78, Jan. 2006. [29] C.-L. Chen, Y.-Y. Chen, and Y.-H. Chen, “Group-based authentication to protect digital content for business applications,” The International Journal of Innovative Computing, Information and Control, vol. 5, no. 5, pp. 1243–1251, May. 2009. [30] M. Markovic, “On secure e-health systems,” Lecture Notes in Computer Science, vol. 4302/2006, no. 5, pp. 360–374, Nov. 2006. [31] C.-J Li, L. Liu, S.-Z. Chen, C.-C. Wu, C.-H. Huang, and X.-M. Chen “Mobile healthcare service system using RFID,” IEEE Networking, Sensing and Control, vol. 2, Taipei, Taiwan, pp. 1014–1019, Mar. 2004. [32] M. Chen, S. Gonzalez, V. Leung, Q. Zhang, and M. Li, “A 2G-RFID-based e-healthcare system,” Proc. of IEEE Conf. Wireless Communications, pp. 37–43, Feb. 2010. [33] D. L. Hudson, and M. E. Cohen, “Intelligent agent model for remote support of rural healthcare for the elderly,” Proc. of the 28th IEEE Conf. on Engineering in Medicine and Biology Society, California, San Francisco, USA, pp. 6332–6335, 2006. [34] C.-C. Lin, M.-J. Chiu, C.-C. Hsiao, R.-G. Le, and Y.-S. Tsai, “Wireless health care service system for elderly with dementia,” IEEE transactions on Information Technology in Biomedicine. vol. 10, no. 4, pp. 696–704, Oct. 2006. [35] J. A. Stevens, P. S. Corso, E. A. Finkelstein, and T. R. Miller, “The costs of fatal and nonfatal falls among older adults,” Injury Prevention, vol. 12, pp. 290–295, 2006. [36] H. Xie, T. Chaussalet, and P. Millard, “A tool for studying the effects of residents' attributes on patterns of length of stay in long-term care,” Proc. of the 18th IEEE International Conf. on Computer-Based Medical Systems, vol. 23-25, pp. 473–478, Jun. 2005. [37] H. Kanai, G. Tsuruma, T. Nakada, and S. Kunifuji, “Notification of dangerous situation for elderly people using visual cues,” Proc. of International Conf. on Intelligent User Interfaces, pp. 345–348, 2008. [38] A. Arcelus, M. H. Jones, R. Goubran, and F. Knoefel, “Integration of smart home technologies in a health monitoring system for the elderly,” Advanced Information Networking and Applications Workshops , 21st International Conference 2007, vol. 2, pp. 820–825, 2007. [39] A. Sixsmith, and N. Johnson, “A smart sensor to detect the falls of the elderly,” IEEE Pervasive Computing,” vol. 3, no. 2, pp. 42–47, April, 2004. [40] M. N. Nyan, F. E. H. Tay, M. Manimaran, and K. H. W. Seah, “Garment-based detection of falls and activities of daily living using 3-axis MEMS accelerometer,” International MEMS Conference 2006, vol. 34, pp. 1059–1067, 2006. [41] U. Maurer, A. Rowe, A. Smailagic, and D. P. Siewiorek, “eWatch: a wearable sensor and notification platform,” Wearable and Implantable Body Sensor Networks, Cambridge, MA, pp. 141–145, April. 2006. [42] Y. Seo, T. Asano, H. Lee, and K. Kim, “A lightweight protocol enabling ownership transfer and granular data access of RFID tags,” Proc. of Symposium Conf. on Cryptography and Information Security, Sasebo, Japan, pp. 23–26, 2007. [43] N. Raza, V. Bradshaw, and M. Hague, “Applications of RFID technology,” Proc. of IEEE International Conf. on RFID Technology, pp. 1/1–1/5, Oct. 1999. [44] G. Steiner, H. Zangl, P. Fulmek, and G. Brasser, “A tuning transformer for the automatic adjustment of resonant loop antennas in RFID systems,” Proc. of IEEE International Conf. on Industrial Technology, vol. 2, pp. 912–916, Dec. 8-10, 2004. [45] I.-C. Lin, C.-W. Yang, and S.-C. Tsaur, “Noidentifiable RFID privacy protection with ownership transfer,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 5, pp. 2341–2352, 2010. [46] M. Buckner, R. Crutcher, M. R. Moore, and B. Whitus, “Miclog RFID tag program enables total asset visibility”, Proc. of IEEE International Conf. on MILCOM, vol. 2, pp. 1422–1426, 2002. [47] W. D. Yu, P. Ray, and Y. Motoc, “A RFID technology based wireless mobile multimedia system in healthcare,” Proc. of the 8th International Conf. on E-Health Networking, Applications and Services, pp. 1–8, 2006. [48] D.-G. Yun, J.-M. Lee, M.-J. Yu, and S.-G. Choi, “Agent-based user mobility support mechanism in RFID networking environment,” IEEE Trans. Consumer Electron, vol. 55, no. 2, pp. 800–804, 2009. [49] H. Jabbar, T. Jeong, H. Hwang, and G. Park, “Viewer identification and authentication in IPTV using RFID Technique,” IEEE Trans. Consumer Electron, vol. 54, no. 1, pp. 105–109, Feb. 2008. [50] Y.-S. Yen, F.-Lin, and H.-C. Chao, “Integrated residential gateway: easy IA management with P2P community using RFID,” IEEE Trans. Consumer Electron, vol. 51, no. 3, pp. 824–830, Aug. 2005. [51] R. Tesoriero, J. A. Gallud, M. D. Lozano, and V. M. R. Penichet, “Tracking autonomous entities using RFID technology,” IEEE Trans. Consumer Electron, vol. 55, no. 2, pp. 650–655, May. 2009. [52] R. Tesoriero, J. A. Gallud, M. D. Lozano, and V. M. R. Penichet, “Using active and passive RFID technology to support indoor location-aware systems,” IEEE Trans. Consumer Electron, vol. 54, no. 2, pp. 578–583, 2008. [53] S. S. Manapure, H. Darabi, V. Patel, and S. Banejee, “A comparative study of radio frequency-based indoor location sensing & systems,” Proc. of IEEE International Conf. on Networking, Sensing and Control, Taipei, Taiwan, vol. 2, pp. 1265–1270, 2004. [54] H. Hontani, M. Nakagawa, T. Kugimiya, K. Baba, and M. Stao, “A visual tracking system using an RFID-tag,” Proc. of Conf. on SICE Annual, vol. 3, pp. 2720–2723, 2004. [55] T. Cao, and P. Shen, “Cryptanalysis of two RFID authentication protocols,” International Journal of Network Security, vol. 9, no. 1, pp. 95–100, July. 2009. [56] S. L. Garfinkel, A. Juels, and R. Pappu, “RFID Privacy: An overview of problems and proposed Solutions,” IEEE Security & Privacy Magazine, vol. 3, no. 3, pp. 34–43, 2005. [57] S. Han, H. Lim, and J. Lee, “An efficient localization scheme for a differential-driving mobile robot based on RFID system,” IEEE Trans. Ind. Electron, vol. 54, no. 6, pp. 3362–3369, Dec. 2007. [58] L. Hong, and C. Tianjie, “RFID protocol enabling ownership transfer to protect against Traceability and DoS attacks,” IEEE First International Symposium on Data, Privacy and E-Commerce. pp. 508–510, 2007. [59] A. D. Henrici, and P. MAuller, “Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers,” Proc. of the PerSec'04 Conf. on PerCom, pp. 149–153, March. 2004. [60] A. Juels, “Strengthening EPC tags against cloning,” Proc. of the 4th ACM workshop on Wireless security, pp. 67–76, March. 2005. [61] K. H. S. S. Koralalage, S. M. Reza, J. Miura, Y. Goto, and J. Cheng, “An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism,” In Proc. ACM symposium on Applied computing, pp. 270–275, New York, NY, USA, 2007. [62] D. Molnar, A. Soppera, and D. Wagner, “A scalable delegatable pseudonym protocol enabling ownership transfer of RFID tags,” Selected Areas in Cryptography - SAC 2005, LNCS, vol. 3897/2006, pp. 276–290, 2006. [63] K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An efficient and secure RFID security method with ownership transfer”, Proc. of IEEE International Conf. on Computational Intelligence and Security, vol. 2 pp. 3–6, 2006. [64] J. Saito, J. C, Ryou, and K. Sakurai, “Enhancing privacy of universal re-encryption scheme for RFID tags,” Lecture Notes in Computer Science, EUC 2004, LNCS, vol. 3207, pp. 879–890, 2004. [65] Y. Seo, T. Asano, H. Lee, and K. Kim, “A lightweight protocol enabling ownership transfer and granular data access of RFID tags,” In Proc. Symposium on Cryptography and Information Security Sasebo, Japan, pp. 23–26, Jan. 2007. [66] B. Toiruul, and K. Lee, “An advanced mutual-authentication algorithm using AES for RFID systems,” In International Journal of Computer Science and Network Security, vol. 6, no. 9B, pp. 156–162, 2006. [67] S. Weis, S. Sarma, R. Rivest, and D. Engels, “Security and privacy aspects of low-cost radio frequency identification systems,” Proc. of the 1st IEEE Conf. on Security in Pervasive Computing, pp. 12–14, 2003. [68] H. C. Hsieh, J. S. Leu, and W. K. Shih, “Reaching consensus underlying an autonomous local wireless sensor network,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 4, pp. 1905–1914, April. 2010. [69] P. C. Tseng, C. Y. Chen, W. S. Hwang, J. S. Pan, and B. Y. Liao, “Qos-aware residential gateway supporting Zigbee-related services based on a service-oriented architecture,” International Journal of Innovative Computing, Information and Control, In press, vol. 6, no. 6, pp. 2803–2816, 2010. [70] M. Singh, M. Sethi, N. Lal, and S. Poonia, “A tree based routing protocol for mobile sensor networks,” International Journal of Computer Sciences and Engineering Systems, vol. 1, no. 2, pp. 50–60, 2010. [71] G. S. Binu, and K. P. Jacob, “A channel adaptive MAC protocol with traffic aware distributed power management in wireless sensor networks,” IJCSNS International Journal of Computer Science and Network Security, vol. 10, no. 7, pp. 177–182, July. 2010. [72] M. K. J. Kumar, and R. S. Rajesh, “Distributed positioning technique in wireless Ad Hoc sensor networks,” International Journal of Computer Sciences and Engineering Systems, vol. 2, no. 3, pp. 193–199, July. 2008. [73] Y. J. Zhao, R. Govindan, and D. Estrin, “Residual energy scan for monitoring sensor networks,” Proc. of the IEEE Conf. on Wireless Communications and Networking, Orlando, FL,USA, vol. 1, pp. 356–362, Mar. 2002. [74] R. D. Pietro, L. V. Mancini, and A. Mei, A. “Random key-assignment for secure wireless sensor networks.” In Proceedings of ACM workshop on Security of ad hoc and sensor networks, Fairfax, VA, USA, pp. 62–71, 2003. [75] E. J. D. Duarte-Melo, and M. Liu, “Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks,” Proc. of the IEEE Conf. on Telecommunication, pp. 21–25, 2002. [76] C. Schurgers, and M. B. Srivastava, “Energy efficient routing in wireless sensor networks,” Proc. of the IEEE Conf. on Military Communications, vol. 1, pp. 357–361, 2001. [77] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks: International Journal of Computer and Telecommunications Networking, vol. 38, no. 4, pp. 393–422, March. 15, 2002. [78] J. Levendovszky, A. Bojárszky, B. Karlócai, and A. Oláh, “Energy balancing by combinatorial optimization for wireless sensor networks,” WSEAS transactions on communications, vol. 7, no. 2, pp. 27–32, Feb. 2008. [79] T. J. Chan, C. M. Chen, Y. F. Huang, J. Y. Lin, and T. R. Chen, “Optimal cluster number selection in ad-hoc wireless sensor networks,” WSEAS transactions on communications, vol. 7, no. 8, pp. 837–846, August. 2008. [80] R. S. Yadav, and K. Singh, “Overview of secure network system,” International Journal of Computer Sciences and Engineering Systems, vol. 1, no. 4, Oct. 2007. [81] K. Yamamoto, and M. Iwakiri, “Real-time audio watermarking based on characteristics of PCM in digital Instrument,” Journal of Information Hiding and Multimedia Signal Processing, vol. 1, no. 2, pp. 59–71, 2010. [82] H. Sayoud, and S. Ouamour, “Proposal of a new confidence parameter estimating the number of speakers -an experimental investigation,” Journal of Information Hiding and Multimedia Signal Processing, vol. 1, no. 2, pp. 101–109, 2010. [83] D. H. Kang, J. H. Chio, Y. H. Lee, and C. Lee, “Applications of a DPCM system with median predictors for image coding,” IEEE Trans. Consumer Electron, vol.38, no. 3, pp. 429–435, 1992. [84] D. Goodman, “Embedded DPCM for variable bit rate transmission,” IEEE Trans. communications, vol. 28, no. 7, pp.1040–1046, 1980. [85] R. Link, and S. Kaellal, “Optimal use of markov models for DPCM picture transmission over noisy channels,” IEEE Trans. communications, vol. 48, no. 10, pp. 1702–1711, 2000. [86] M. H. Chan, “The performance of DPCM operating on lossy channels with memory,” IEEE Trans. communications, vol. 43, no. 234, pp. 1686–1696, 1995. [87] J. E Essman, and P. A. Wantz, “The effects of channel errors in DPCM systems and comparison with PCM systems,” IEEE Trans. communications, vol. 21, no. 8, pp. 867–877, Aug. 1973. [88] A. N. Kim, and T. A. Ramstad, “Improving the Rate-distortion performance of DPCM using multirate processing With Application in Low-Rate Image Coding,” IEEE Trans. Signal.Processing, vol. 55, no. 10, pp. 4958–4968,2007. [89] T. Eger, and L. Varner, “A novel adaptive predictor DPCM system for speech signals,” Proc. of IEEE International Conf. of the ICASSP’81 IEEE Conf on Acoustics, Speech, and signal Processing, Hong Kong and Macau, China, pp. 623–626, April. 1981. [90] P. Pirsch, “Stability conditions for DPCM Coder,” IEEE Trans. communications, vol. 30, no. 5, p.1174–1184,1982. [91] N. Jia, Detecting human falls with a 3-axis digital accelerometer, Analog dialog Devices, vol. 43, no. 7, pp. 1–7, 2009. [92] H. S. Chen, M. J. Su, T. H. Tsai, S. S. Teng, H. W. Zhang, L. S. Lai, F. P. Lai and C. Y. Chen, “U-care for the elderly: implementation of a Comprehensive Living and Health Care Network,” in Proc. 9th Int. Conf. E-Health Networking, Applications and Services, pp. 187–190, Jul. 2006. [93] H. Xie, T. Chaussalet, and P. Millard, “A tool for studying the effects of residents' attributes on patterns of length of stay in long-term care,” Proc. 18 Int. Conf. Computer-Based Medical Systems, pp. 473–478, Jun. 2005. [94] P. H. Cheng, T. H. Yang, H. S. Chen, K. P. Hsu, S. J. Chen and L. S. Lai “Codesign of a healthcare enterprise information portal and hospital information systems,” in Proc. 7th Int. Conf. Enterprise networking and Computing in Healthcare Industry, pp. 446–449, Jun. 2005. [95] D. L. Hudson, and M. E. Cohen, “Intelligent agent model for remote support of rural healthcare for the elderly,” in Proc. EMBS 28th Annual. New York City, USA, pp. 6332–6335, Aug–Step. 2006. [96] N. Raza, V. Bradshaw, and M. Hague, “Applications of RFID technology,” in Proc. IEEE Int. Conf. on RFID Technology, pp. 1/1–1/5Oct. 1999. [97] R. Shahriyar, M. F. Bari, G. Kundu, S. I. Ahamed, and M. M. Akbar, “Intelligent Mobile Health Monitoring Systems,” International Journal of Control and Automation, vol. 2, no. 3, pp. 13–28, Sep. 2009. [98] C. L. Chen, Y. L. Lai, C. C. Chen, Y. Y. Deng, and Y. C. Hwang, “RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards,” Int. J. Network Security, vol. 13, no. 1, pp. 41–48, July. 2011. [99] G. Steiner, H. Zangl, P. Fulmek, and G. Brasser, “A tuning transformer for the automatic adjustment of resonant loop antennas in RFID systems,” in Proc. IEEE Int. Conf. on Industrial Technology, vol. 2, pp. 912–916, Dec. 2004. [100] M. Buckner, R. Crutcher, M. R. Moore, and B. Whitus, “MICLOG RFID tag program enables total asset visibility,” in Proc. IEEE Int. Conf. on MILCOM, vol. 2, pp. 1422–1426, Oct. 2002. [101] S. W. Wang, W. H. Chen, C. S. Ong, L. Liu, and Y. W. Chuang, "RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital,” Proceedings of the 39th Hawaii International Conference on System Sciences, vol. 8, Washington, DC, USA, pp. 184A, 2006. [102] A. Lahtela, M. Hassinen, and V. Jylha, “RFID and NFC in healthcare: safety of hospitals medication care,” in Proceedings of Second International Conference on Pervasive Computing Technologies for Healthcare, pp. 241–244, Jan. 2008,. [103] S. L. Ting, S. K. Kwok, A. H. Tsang, and W. B. Lee “Critical elements and lessons learnt from the implementation of an RFID-enabled healthcare management system in a medical organization.” Journal of Medical Systems, 2009 [104] J. H. Park, J. A. Seol, and Y. H. Oh, “Design and implementation of an effective mobile healthcare system using mobile and RFID technology,” in Proc. 7th Int. Conf. Enterprise networking and Computing in Healthcare Industry, pp. 263–266, Jun. 2005. [105] D. W. Bates, D. J. Cullen, N. Laird, L. A. Petersen, S. D. Small, D. Servi, G. Laffel, B. J. Sweitzer, B. F. Shea, R. Hallisey, M. V. Vliet, R. Nemeskal, and L. L. Leape, “Incidence of adverse drug events and potential adverse drug events. Implications for prevention. ADE Prevention Study Group,"JAMA vol. 247, no. 1, pp. 29–34, 1995. [106] P. Aspden, J. A. Wolcott, J. L. Bootman, and L. R. Cronenwett, “Preventing medication errors,” The National Academies Press, Washington, DC, 2007. [107] B. V. D. Castle, J. Kim, M. L. G. Pedreira, A. Paisa, W. Goossen, and D. W. Bates, “Information technology and patient safety in nursing practice: an international perspective,” International Journal of Medical Informatics, vol. 73, pp. 607–614, 2004. [108] P. R. Sun, B. H Wang, and F. Wu,”A new method to guard inpatient medication safety by the implementation of RFID,” Journal of Medical System, vol. 32, pp. 327–332, 2008. [109] M. R. Chassin, and E. C. Becher, “The wrong patient,” Ann. International. Medical, vol. 136, pp. 826–833, 2002. [110] W. L. Wang, and C. H Lin, “A study of two-dimensional barcode prescription system for pharmacist’s activities of NHI contracted pharmacy,” Journal of the Pharmaceutical Society of Japan, vol. 128, no. 1, pp. 123–127, 2008. [111] M. Kamei, K. Teshima, N. Fukushima, and T. Nakamura, “Investigation of patients' demand for community pharmacies: relationship between pharmacy services and patient satisfaction,” Journal of the Pharmaceutical Society of Japan, vol. 121, no. 3, pp.215–220, 2001. [112] H. Y. Chien, C. C. Yang, and T. C. Wu, “Two RFID -based Solutions to enhance inpatient medication safety,” Journal of Medical System, vol. 35, pp. 369–375, 2011. [113] H. H. Huang, C. Y. Ku, and T. C. Wu, “A RFID grouping proof protocol for medication safety of inpatient,” Journal of Medical System, vol. 33, no. 6 pp. 467–474, 2011.
|