{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:00:26Z","timestamp":1726063226108},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030347055"},{"type":"electronic","value":"9783030347062"}],"license":[{"start":{"date-parts":[[2019,12,15]],"date-time":"2019-12-15T00:00:00Z","timestamp":1576368000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-34706-2_3","type":"book-chapter","created":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T07:05:52Z","timestamp":1576307152000},"page":"41-59","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Management System for an Administrative Office with RFID-Tagged Classified Documents"],"prefix":"10.1007","author":[{"given":"Robert","family":"Waszkowski","sequence":"first","affiliation":[]},{"given":"Tadeusz","family":"Nowicki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,15]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Finkenzeller K (2003) RFID handbook: fundamentals and applications in contactless smart cards and identification, 2nd edn. Wiley","DOI":"10.1145\/1005062.1005077"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Cole PH, Ranasinghe DC (2008) Networked RFID systems and lightweight cryptography. Springer","DOI":"10.1007\/978-3-540-71641-9"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Zhang Y, Yang LT, Chen J (2009) RFID and sensor networks architectures, protocols, security and integrations. CRC Press","DOI":"10.1201\/9781420077780"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Paret D (2009) RFID at ultra and super high frequencies. Theory and application. Wiley","DOI":"10.1002\/9780470682135"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bolic M, Simplot-Ryl D, Stojmenovic I (2010) RFID systems research trends and challenges. Wiley","DOI":"10.1002\/9780470665251"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Miles SB, Sarma SE, Williams JR (2008) RFID technology and applications. Cambridge University Press","DOI":"10.1017\/CBO9780511541155"},{"key":"3_CR7","unstructured":"noFilis, CrossTalk AppCenter 3.0 Installation and Administration Guide"},{"key":"3_CR8","unstructured":"Canon UniFLOW documentation. www.canon.com"},{"key":"3_CR9","unstructured":"Aurea BPM system documentation. aurea-bpm.com"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Kiedrowicz M, Nowicki T, Waszkowski R, Wesolowski Z, Worwa K (2016) Method for assessing software reliability of the document management system using the RFID technology. In: Mastorakis N, Mladenov V, Bulucea A (eds) 20th international conference on circuits, systems, communications and computers, vol 76. MATEC Web of Conferences, Cedex A: E D P Sciences","DOI":"10.1051\/matecconf\/20167602001"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"02001","DOI":"10.1051\/matecconf\/20167602001","volume":"76","author":"Maciej Kiedrowicz","year":"2016","unstructured":"Kiedrowicz M, Nowicki T, Waszkowski R, Wesolowski Z, Worwa K (2016) Optimization of the document placement in the RFID cabinet. In: Mastorakis N, Mladenov V, Bulucea A (eds) 20th international conference on circuits, systems, communications and computers, vol 76. MATEC Web of Conferences, Cedex A: E D P Sciences","journal-title":"MATEC Web of Conferences"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"04012","DOI":"10.1051\/matecconf\/20167604012","volume":"76","author":"Maciej Kiedrowicz","year":"2016","unstructured":"Kiedrowicz M, Nowicki T, Waszkowski R, Wesolowski Z, Worwa K (2016) Software simulator for property investigation of document management system with RFID tags. In: Mastorakis N, Mladenov V, Bulucea A (eds) 20th international conference on circuits, systems, communications and computers, vol 76. MATEC Web of Conferences, Cedex A: E D P Sciences","journal-title":"MATEC Web of Conferences"},{"key":"3_CR13","unstructured":"Nowicki T, Pytlak R, Waszkowski R, Bertrandt J (2013) The method for finding optimal sanitary inspectors schedules (in English). Ann Nutr Metab 63:1027"},{"key":"3_CR14","unstructured":"Nowicki T, Pytlak R, Waszkowski R, Zawadzki T, Migdal W, Bertrandt J (2013) Creating and calibrating models of food-borne epidemics (in English). Ann Nutr Metab 63:1027"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Waszkowski R, Agata C, Kiedrowicz M, Nowicki T, Wesolowski Z, Worwa K (2016) Data flow between RFID devices in a modern restricted access administrative office. In: Mastorakis N, Mladenov V, Bulucea A (eds) 20th international conference on circuits, systems, communications and computers, vol 76. MATEC Web of Conferences, Cedex A: E D P Sciences","DOI":"10.1051\/matecconf\/20167604004"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Waszkowski R, Kiedrowicz M, Nowicki T, Wesolowski Z, Worwa K (2016) Business processes in the RFID-equipped restricted access administrative office. In: Mastorakis N, Mladenov V, Bulucea A (eds) 20th international conference on circuits, systems, communications and computers, vol 76. MATEC Web of Conferences, Cedex A: E D P Sciences","DOI":"10.1051\/matecconf\/20167602001"},{"key":"3_CR17","unstructured":"Braude EJ, Bernstein ME (2011) Software engineering: modern approaches. Wiley"},{"key":"3_CR18","unstructured":"Larman C (2012) Applying UML and patterns: an introduction to object-oriented analysis and design and iterative development. 3\/e, Pearson Education India"},{"key":"3_CR19","unstructured":"Ross SM (2006) Simulation. Elsevier Inc"},{"key":"3_CR20","volume-title":"Simulation of computer systems and computer networks: a process-oriented approach","author":"B Sinclair","year":"2004","unstructured":"Sinclair B (2004) Simulation of computer systems and computer networks: a process-oriented approach. University Press, Cambridge, UK"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Fishman GS (2001) Discrete event simulation. Modeling, programming and analysis. Springer, New York","DOI":"10.1007\/978-1-4757-3552-9"},{"key":"3_CR22","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-774-4","volume-title":"Handbook of research on discrete event simulation environments: technologies and applications","author":"EM Abu-Taieh","year":"2010","unstructured":"Abu-Taieh EM, El Sheikh AAR (2010) Handbook of research on discrete event simulation environments: technologies and applications. IGI Global, Hershey, New York"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Data-Centric Business and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34706-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T09:06:25Z","timestamp":1665219985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34706-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,15]]},"ISBN":["9783030347055","9783030347062"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34706-2_3","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2019,12,15]]},"assertion":[{"value":"15 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}