- RFID technology advancements
- Food Supply Chain Traceability
- Biomedical Text Mining and Ontologies
- Electronic Health Records Systems
- Semantic Web and Ontologies
- Data Mining Algorithms and Applications
- User Authentication and Security Systems
- Mobile Crowdsensing and Crowdsourcing
- Traffic Prediction and Management Techniques
- ERP Systems Implementation and Impact
- Outsourcing and Supply Chain Management
- Intelligent Tutoring Systems and Adaptive Learning
- Indoor and Outdoor Localization Technologies
- Supply Chain Resilience and Risk Management
- Advanced Authentication Protocols Security
- Quality and Supply Management
- Transportation Planning and Optimization
- Advanced Manufacturing and Logistics Optimization
- Advanced Text Analysis Techniques
- Data Quality and Management
- Physical Unclonable Functions (PUFs) and Hardware Security
- Machine Learning in Healthcare
- Vehicle emissions and performance
- Information Systems Education and Curriculum Development
- Biometric Identification and Security
The University of Western Australia
2024
Hong Kong Polytechnic University
2009-2022
Radio frequency identification (RFID) is the technology that put an RFID tag on objects or people, so they can be identified, tracked, and managed automatically. With its wide application in automobile assembly industry, warehouse management supply chain network, has been recognized as next promising serving positioning purpose. Existing technologies such GPS are not available indoors terminal cannot get signal from satellites. To enhance availability of systems for indoors, development...
Purpose The purpose of this paper is to focus on the design a counterfeit network analyzer (CNA) for aggregating all problematic product flows in order discover any distribution source, and control spread goods. leverages radio frequency identification (RFID) information stored within electronic code (EPC) network. Design/methodology/approach system architecture proposed CNA first discussed. A case study application Hong Kong pharmaceutical manufacturing company then presents adoption...
There are an increasing number of organizations planning to implement Radio Frequency Identification (RFID) systems enhance their competitiveness. Due the novelty technology, many managerial challenges exist in determining and for implementation such systems. These often lead wasted efforts resources, as well failed implementations. This paper presents a systematic holistic RFID framework which has been validated by both users experts. The outlines important tasks be performed each step...
Purpose: Numerous studies discuss that Radio Frequency Identification (RFID) technology can provide better container handling efficiency; however, relative lack of research concerns the tracking and monitoring movement vehicle in terminal environment. Thus, this study aims at discussing feasibility applying RFID for purpose a terminal. Design/methodology/approach: This makes use series experiments to factors affect The possibility accuracy using such challenging environment is also...
Data mining is the process of finding patterns, associations or relationships among data using different analytical techniques involving creation a model and concluded result will become useful information knowledge. The advancement new medical deceives database management systems create huge number data-bases in biomedicine world. Establishing methodology for knowledge discovery large amounts heterogeneous has major priority research. This paper introduces some basic techniques,...
Facing the problem of variation and chaotic behavior customers, lack sufficient information is a challenge to many business organizations. Human analysts lacking an understanding hidden patterns in data, thus, can miss corporate opportunities. In order embrace all opportunities, enhance competitiveness, discovery knowledge, unexpected useful rules from large databases have provided feasible solution for several decades. While there wide range financial analysis products existing market, how...
AbstractCounterfeiting undoubtedly produces great harm to companies and the society. This article presents a study on application of social network analysis (SNA) combating this problem. The supply chain can be viewed as parties involved in delivering value consumers. Normally, SNA is used analyse relationships between people. In study, it utilised chains for identification that are likely counterfeiting activities. After identifying suspects chain, company deter detect by tightening...
Purpose The purpose of this paper is to present an automatic Medical Knowledge Elicitation System (MediKES), which designed improve elicitation and sharing tacit knowledge acquired by physicians. system leverages the clinical information stored in electronic medical record systems, representing a series maps. Design/methodology/approach architecture proposed MediKES first discussed, then case study on application Hong Kong organization presented illustrate adoption process highlight benefits...
Conflict management is one of the most important issues in leveraging organizational competitiveness. However, traditional social scientists built theories or models this area which were mostly expressed words and diagrams are insufficient. Social science research based on computational modeling simulation beginning to augment theory building. Simulation provides a method for people try their actions out way that cost effective, faster, appropriate, flexible, ethical. In paper, model...
Car following model is an important part in traffic modelling and has attracted a lot of attentions the literature. As proposed car models become more complex with components, reliably estimating their parameters becomes crucial to enhance predictive performance. While most studies adopt optimisation-based approach for estimation, we present statistically rigorous method that quantifies uncertainty estimates. We Bayesian estimate using popular Gipps' as demonstration, which allows proper...
Abstract Today, many manufacturers prefer to shift their pick-and-pack postponement operations third-party logistics companies lower operational cost and improve mass customisation flexibility. The type of operation is complicated, as it usually involves a large number stock keeping units several warehouse operations. Surprisingly, in most 3PL, the complicated are still mainly managed by an experienced manager, which unreliable methodology often creates mistakes. A hybrid intelligent system...
Due to the globalisation of counterfeiting activities, penetration fake products in open market is growing. So far, technologies combat are mostly applied high-value (e.g. premium wine and branded handbags); however, medium- low-value products' perspective, there no secure way for consumers identify whether purchased items genuine or not. To address problems effectively, a platform identifying authenticated promoting anti-counterfeit activities very important. The aim this paper design...
Medical errors happen during surgery such as leaving medical instruments in patient′s body after surgery. In recent years, numerous cases have shown successful applications of Radio Frequency Identification (RFID) technology hospitals. This paper aims to investigate the potential RFID management a Hong Kong public hospital where nurse patient ratio is much lower than other countries. An RFID‐based Surgery Management System proposed tackle problems identified current situation. Apart from...