[1] A. Abuelkhail, U. Baroudi, M. Raad, and T. Sheltami, Internet of Things for healthcare monitoring applications based on RFID clustering scheme, Wireless Networks 27 (2020), 747–763.
[2] G. Alfian, J. Rhee, H. Ahm, J. Lee, and U. Farooq, Integration of RFID, wireless sensor network, and data mining in an e-pedigree food traceability system, J. Food Eng. 212 (2017), 65–75.
[3] K. Ali, H. Hassanein, and W. Alsalih, Using neighbor and tag estimations for redundant reader eliminations in RFID networks, Proc. IEEE Wireless Commun. Netw. (WCNC), 2011, pp. 832–837.
[4] W.A.A. Alsalihy and N.A. Askar, Enhancement of redundant reader elimination by using hybrid algorithm in RFID systems, Wireless Pers. Common. 72 (2013), no. 2, 1139–1156.
[5] S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, and G. Marrocco, RFID technology for IoT-based personal healthcare in smart spaces, IEEE Internet Things J. 1 (2014), no. 2, 144–152.
[6] B. Carbunar, M.K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. Grama, Redundant reader elimination in RFID systems, Proc. 2nd Annu. IEEE Commun. Soc. Conf. Sensor Ad Hoc Commun. Netw, 2005, pp. 176–184.
[7] B. Carbunar, M.K. Ramanathan, M. Koyuturk, S. Jagannathan, and A. Grama, Efficient tag detection in RFID systems, J. Parallel Distrib. Comput. 69 (2009), no. 2, 180–196.
[8] A. Haibi, H. Bouazza, M. Bouya, K. El Yassini, K. Oufaska, M. Boulmalf, A. Lazaro, and A. Hadjoudja, A new compact metal mountable dual-band UHF RFID tag antenna with an adapted middleware for transport and SCM fields, Int. J. Commun. Antenna Propag. 11 (2021), no. 2, 106–117.
[9] A. Haibi, K. Oufaska, K. El Yassini, M. Boulmalf, and M. Bouya, Systematic mapping study on RFID technology, IEEE Access 10 (2022), 6363–6380.
[10] C.-H. Hsu, Y.-M. Chen, and C.-T. Yang, A layered optimization approach for redundant reader elimination in wireless RFID networks, 2nd IEEE Asia-Pacific Service Comput. Conf. (APSCC 2007), IEEE, 2007, pp. 138–145.
[11] C. Jin, C. Xu, X. Zhang, and J. Zhao, A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography, J. Med. Syst. 39 (2015), no. 3, 1–8.
[12] M.S. Khan, M.S. Islam, and H. Deng, Design of a reconfigurable RFID sensing tag as a generic sensing platform toward the future Internet of Things, IEEE Internet Things J. 1 (2014), no. 4, 300–310.
[13] H. Landaluce, L. Arjona, A. Peraiios, F. Falcone, I. Angulo, and F. Muralter, A review of IOT sensing applications and challenges using RFID and wireless sensor networks, Sensors 20 (2020), no. 9.
[14] M. Ma and P. Wang, Redundant reader elimination in large-scale distributed REID networks, IEEE Internet Things J. 5 (2018), no. 2, 884–894.
[15] M. Ma, P. Wang and C.-H. Chu, A novel distributed algorithm for redundant reader elimination in RFID networks, IEEE Int. Conf. RFID Technol. Appl. (RFID TA), 2013, pp. 1–6.
[16] A. Motroni, A. Buffi and P. Nepa, A survey on indoor vehicle localization through RFID technology, IEEE 9 (2021), 17921–17942.
[17] A.W. Nagpukar and S.K. Jaiawal, An overview of WSN and RFID network integration, 2nd Int. Conf. Electronics Commun. Syst. (ICECS), IEEE, 2015, pp. 497–502.
[18] S. Pan and Z. Yang, A count based algorithm for redundant reader elimination in RFID application system, Proc. 3rd Int. Conf. Intell. Syst. Design Eng. Appl. (IS DEA), 2013, pp. 30–33.
[19] S. Piramuthu and W. Zhau, RFID and sensor network automation in the food industry: Ensuring quality and safety through supply chain visibility, John Wiley & Sons, 2016.
[20] N. Rashid, S. Choudury and K. Salomaa, Localized algorithms for redundant readers elimination in RFID networks, Int. J. Parallel, Emergent Distrib. Syst. 34 (2018), no. 3, 1–12.
[21] R. Sundar, S. Hebbar, and V. Golla, Implementing intelligent traffic control system for congestion control, ambulance clearance, and stolen vehicle detection, IEEE Sensors J. 15 (2015), no. 2, 1109–1113.
[22] S. Sundaresan, R. Doss, S. Piramuthu, and W. Zhou, Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner privacy, Comput. Commun. 55 (2015), 112–124.
[23] X. Wang, Tennis robot design via Internet of Things and deep learning, IEEE Access 9 (2021), 127460–127470.
[24] X. Wang, Y. Ji, and B. Zhao, An approximate duplicate-elimination in RFID data streams based on d-left time bloom filter, Web Technol. Appl. 8709 (2014), 413–424.
[25] H. Xu, W. Shen, and P. Li, A novel algorithm L-NCD for redundant reader elimination in P2P-RFID network, J. Algorithm Comput. Technol. 11 (2017), no. 2, 1–13.
[26] P. Yang, PRLS-INVES: A general experimental investigation strategy for high accuracy and precision in passive RFID location systems, IEEE Internet Things J. 2 (2015), no. 2, 159–167.
[27] R. Yarinezhad and S.N. Hashemi, A routing algorithm for wireless sensor networks based on clustering and an fpt-approximation algorithm, J. Syst. Software 155 (2019), 145–161.
[28] K.-M. Yu, C.-W. Yu, and Z.-Y. Lin, A density-based algorithm for redundant reader elimination in an RFID network, Proc. 2nd Int. Conf. Future Gener. Commun. Netw. (FGCN), 2008, pp. 89–92.
[29] Z. Zhang and Q. Qi, An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography, J. Med. Syst. 38 (2014)., no. 5, 1–7.
[30] Z. Zhao, A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem, J. Med. Syst. 38 (2014), no. 5, 1–7.