S.L. Ting

ORCID: 0000-0002-7165-0444
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • RFID technology advancements
  • Food Supply Chain Traceability
  • Biomedical Text Mining and Ontologies
  • Electronic Health Records Systems
  • Semantic Web and Ontologies
  • Data Mining Algorithms and Applications
  • User Authentication and Security Systems
  • Mobile Crowdsensing and Crowdsourcing
  • Traffic Prediction and Management Techniques
  • ERP Systems Implementation and Impact
  • Outsourcing and Supply Chain Management
  • Intelligent Tutoring Systems and Adaptive Learning
  • Indoor and Outdoor Localization Technologies
  • Supply Chain Resilience and Risk Management
  • Advanced Authentication Protocols Security
  • Quality and Supply Management
  • Transportation Planning and Optimization
  • Advanced Manufacturing and Logistics Optimization
  • Advanced Text Analysis Techniques
  • Data Quality and Management
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Machine Learning in Healthcare
  • Vehicle emissions and performance
  • Information Systems Education and Curriculum Development
  • Biometric Identification and Security

The University of Western Australia
2024

Hong Kong Polytechnic University
2009-2022

Radio frequency identification (RFID) is the technology that put an RFID tag on objects or people, so they can be identified, tracked, and managed automatically. With its wide application in automobile assembly industry, warehouse management supply chain network, has been recognized as next promising serving positioning purpose. Existing technologies such GPS are not available indoors terminal cannot get signal from satellites. To enhance availability of systems for indoors, development...

10.5772/45678 article EN cc-by International Journal of Engineering Business Management 2011-01-01

10.1016/j.trb.2025.103157 article EN cc-by Transportation Research Part B Methodological 2025-01-29

Purpose The purpose of this paper is to focus on the design a counterfeit network analyzer (CNA) for aggregating all problematic product flows in order discover any distribution source, and control spread goods. leverages radio frequency identification (RFID) information stored within electronic code (EPC) network. Design/methodology/approach system architecture proposed CNA first discussed. A case study application Hong Kong pharmaceutical manufacturing company then presents adoption...

10.1108/02635571011069086 article EN Industrial Management & Data Systems 2010-08-24

There are an increasing number of organizations planning to implement Radio Frequency Identification (RFID) systems enhance their competitiveness. Due the novelty technology, many managerial challenges exist in determining and for implementation such systems. These often lead wasted efforts resources, as well failed implementations. This paper presents a systematic holistic RFID framework which has been validated by both users experts. The outlines important tasks be performed each step...

10.5772/56511 article EN cc-by International Journal of Engineering Business Management 2013-01-01

Purpose: Numerous studies discuss that Radio Frequency Identification (RFID) technology can provide better container handling efficiency; however, relative lack of research concerns the tracking and monitoring movement vehicle in terminal environment. Thus, this study aims at discussing feasibility applying RFID for purpose a terminal. Design/methodology/approach: This makes use series experiments to factors affect The possibility accuracy using such challenging environment is also...

10.3926/jiem.412 article EN cc-by Journal of Industrial Engineering and Management 2012-06-21

Data mining is the process of finding patterns, associations or relationships among data using different analytical techniques involving creation a model and concluded result will become useful information knowledge. The advancement new medical deceives database management systems create huge number data-bases in biomedicine world. Establishing methodology for knowledge discovery large amounts heterogeneous has major priority research. This paper introduces some basic techniques,...

10.4236/jsea.2009.23022 article EN Journal of Software Engineering and Applications 2009-01-01

Facing the problem of variation and chaotic behavior customers, lack sufficient information is a challenge to many business organizations. Human analysts lacking an understanding hidden patterns in data, thus, can miss corporate opportunities. In order embrace all opportunities, enhance competitiveness, discovery knowledge, unexpected useful rules from large databases have provided feasible solution for several decades. While there wide range financial analysis products existing market, how...

10.5772/50937 article EN cc-by International Journal of Engineering Business Management 2011-01-01

AbstractCounterfeiting undoubtedly produces great harm to companies and the society. This article presents a study on application of social network analysis (SNA) combating this problem. The supply chain can be viewed as parties involved in delivering value consumers. Normally, SNA is used analyse relationships between people. In study, it utilised chains for identification that are likely counterfeiting activities. After identifying suspects chain, company deter detect by tightening...

10.1080/00207543.2013.861947 article EN International Journal of Production Research 2013-11-29

Purpose The purpose of this paper is to present an automatic Medical Knowledge Elicitation System (MediKES), which designed improve elicitation and sharing tacit knowledge acquired by physicians. system leverages the clinical information stored in electronic medical record systems, representing a series maps. Design/methodology/approach architecture proposed MediKES first discussed, then case study on application Hong Kong organization presented illustrate adoption process highlight benefits...

10.1108/02635571111161280 article EN Industrial Management & Data Systems 2011-08-20

10.1007/s10916-013-9946-3 article EN Journal of Medical Systems 2013-04-09

Conflict management is one of the most important issues in leveraging organizational competitiveness. However, traditional social scientists built theories or models this area which were mostly expressed words and diagrams are insufficient. Social science research based on computational modeling simulation beginning to augment theory building. Simulation provides a method for people try their actions out way that cost effective, faster, appropriate, flexible, ethical. In paper, model...

10.5772/50932 article EN cc-by International Journal of Engineering Business Management 2011-01-01

Car following model is an important part in traffic modelling and has attracted a lot of attentions the literature. As proposed car models become more complex with components, reliably estimating their parameters becomes crucial to enhance predictive performance. While most studies adopt optimisation-based approach for estimation, we present statistically rigorous method that quantifies uncertainty estimates. We Bayesian estimate using popular Gipps' as demonstration, which allows proper...

10.1016/j.physa.2024.129671 article EN cc-by Physica A Statistical Mechanics and its Applications 2024-03-12

Abstract Today, many manufacturers prefer to shift their pick-and-pack postponement operations third-party logistics companies lower operational cost and improve mass customisation flexibility. The type of operation is complicated, as it usually involves a large number stock keeping units several warehouse operations. Surprisingly, in most 3PL, the complicated are still mainly managed by an experienced manager, which unreliable methodology often creates mistakes. A hybrid intelligent system...

10.1080/00207543.2011.643505 article EN International Journal of Production Research 2012-01-31

Due to the globalisation of counterfeiting activities, penetration fake products in open market is growing. So far, technologies combat are mostly applied high-value (e.g. premium wine and branded handbags); however, medium- low-value products' perspective, there no secure way for consumers identify whether purchased items genuine or not. To address problems effectively, a platform identifying authenticated promoting anti-counterfeit activities very important. The aim this paper design...

10.1080/17517575.2012.755713 article EN Enterprise Information Systems 2013-01-29

Medical errors happen during surgery such as leaving medical instruments in patient′s body after surgery. In recent years, numerous cases have shown successful applications of Radio Frequency Identification (RFID) technology hospitals. This paper aims to investigate the potential RFID management a Hong Kong public hospital where nurse patient ratio is much lower than other countries. An RFID‐based Surgery Management System proposed tackle problems identified current situation. Apart from...

10.1260/2040-2295.3.3.347 article EN cc-by Journal of Healthcare Engineering 2012-01-01
Coming Soon ...