Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems
|
|
- Aubrey Montgomery
- 6 years ago
- Views:
Transcription
1 DOI /s Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems Ching-Hsien Hsu & Han-Chieh Chao & Jong Hyuk Park # Springer Science + Business Media, LLC 2009 Abstract With the emergence of wireless RFID technologies, the problem of Anti-Collision has been arousing attention and instigated researchers to propose different heuristic algorithms for advancing RFID systems operated in more efficient manner. However, there still have challenges on enhancing the system throughput and stability due to the underlying technologies had faced different limitation in system performance when network density is high. In this paper, we present a Threshold Jumping (TJ) and a Wrap-Around Scan (WAS) techniques, which are query tree based approaches, aiming to coordinate simultaneous communications in high density RFID environments, to speedup tag identification, to increase the overall read rate and to improve system throughput in largescale RFID systems. The main idea of the Threshold C.-H. Hsu Department of Computer Science and Information Engineering, Chung Hua University, Hsinchu, Taiwan, Republic of China chh@chu.edu.tw H.-C. Chao Institute of Computer Science & Information Engineering, and Department of Electronic Engineering, National Ilan University, I-Lan, Taiwan, Republic of China hcc@mail.niu.edu.tw hcc@mail.ndhu.edu.tw H.-C. Chao Department of Electrical Engineering, National Dong Hwa University, Hualien, Taiwan, Republic of China J. Hyuk Park (*) Department of Computer Science and Engineering, Kyungnam University, Masan, Kyungnam, South Korea parkjonghyuk1@hotmail.com Jumping is to limit the number of collisions. When the number of collisions exceeds a predefined threshold, it reveals that tag density in RF field is too high. To avoid unnecessary enquiry messages, the prefix matching will be moved to next level of the query tree, alleviating the collision problems. The method of setting frequency bound indeed improves the efficiency in high density and randomly deployed RFID systems. However, in irregular or imbalanced RFID networks, inefficient situation may happen. The problem is that the prefix matching is performed in single direction level-order scheme, which may cause an imbalance query tree on which the right subtree always not been examined if the identification process goes to next level before scan the right sub-tree due to threshold jumping. By scanning the query tree from right to left in alternative levels, i.e., wrap-around, this flaw cold be ameliorated. To evaluate the performance of proposed techniques, we have implemented the TJ and the WAS method along with the query tree protocol. The simulation results show that the proposed techniques provide superior performance in high density environments. It is shown that the TJ and WAS are effective in terms of increasing system throughput and minimizing identification delay. Keywords Tag anti-collision. Query tree. Wrap-around scan. Threshold jumping 1 Introduction Radio Frequency Identifier (RFID) system is an automatic technology to identify objects, record metadata or control individual target through radio waves. The RFID system is mainly composed by three components, tags, readers and host system. An RFID tag is comprised of integrated circuit
2 with an antenna for storing information and communication, respectively. An RFID reader is capable of reading the information stored at tags located in its sensing range. The host system is a control center that provides services and management. The electronics in the RFID reader use an outside power resource to generate signal to drives the reader s antenna and turn into radio wave. The radio wave will be received by RFID tag which will reflect the energy in the way of signaling its identification and other related information. In matured RFID systems, the reader s RF can also instruct the memory to be read or written from which the tag contained. Many applications, such as supply chain automation, identification of products at check-out points, security and access control, localization and object tracking have been developed to take the primary function of RFID systems. Advantages of RFID technologies, such as price efficiency, fast deployment, reusable and accuracy of stock management also broaden the scope of applications of RFID systems. Advanced characteristics of recent RFID readers, like size miniaturization and capabilities of Wi-Fi or cellular also motivate the development of large scale RFID systems. In recent RFID technologies, it is motivated that an RFID system can be integrated with wireless sensor network by interfacing RFID tags with external sensing capabilities, such as light, temperature or shock sensors; forming a hybrid infrastructure that combines advantages of both technologies. Similar to wireless sensor network, RFID tags can be deployed in an ad-hoc fashion instead of pre-installed statically. As a result, RFID has gradually been applied to our daily lives so that some identification problems might be happened. When a reader simultaneously communicate with multiple tags that are in the same interrogation zone, the tags responses might be collided because the tag could not be aware the existence of neighboring tags due to it has no carrier sense ability. Therefore, efficient methods for identifying multiple tags simultaneously are of great importance for the development of large-scale wireless RFID systems. In general, the tag anti-collision techniques can be classified into two categories, aloha based and query tree based protocols. Aloha based approaches use time slot to reduce collision probability. Tags randomly select a particular slot in the time frame, load and transmit its identification to the reader. Once the transmission is collided, tags will repeatedly send its id in next interval of time to make sure its id is successfully recognized. Alohabased protocols can reduce the collision probability. However, they have the tag starvation problem that a particular tag nay not be identified for a long time. For the consideration of performance, when number of RFID tag increased, the tag collision rate will be increased as well; this may result a low tag recognition rate. The query tree based schemes use a data structure similar to a binary search algorithm. An RFID reader consecutively communicates with tags by sending prefix codes based on the query tree data structure. Only tags in the reader s interrogation zone and of which ID match the prefix respond. The reader can identify a tag if only one tag respond the inquiry. Otherwise the tags responses will be collided if multiple tags respond simultaneously. Although tree based protocols do not bring the tag starvation problem, but they have relatively long identification delay. In this paper, we present a Threshold Jumping (TJ) and a Wrap-Around Scan (WAS) techniques aim to coordinate simultaneous communications in high density RFID environments, to speedup tag identification and to increase the overall read rate and throughput in large-scale RFID systems. The main idea of the proposed technique is to limit number of collisions during the identification phase. When number of collisions larger than the predefined acceptable ratio, it reveals that the density in RF field is too high. In order to minimize unnecessary inquiry, the prefix matching will be moved to lower level of the query tree, alleviating the collision problems. The method of setting collision bound indeed improves the efficiency of large-scale RFID tag identification. Together with the concept of wrap-around scan, the tag anti-collision problem could be significantly ameliorated. To evaluate the performance of proposed techniques, we have implemented the TJ and the WAS method along with other tag identification approaches. The experimental results show that the proposed techniques present significant improvement in most circumstance. The rest of this paper is organized as follows: In Section 2, a brief survey of related work will be presented. Section 3 introduces the tree based tag identification algorithm as preliminary of this study. In section 4, two query tree based algorithms, the Threshold Jumping (TJ) and Wrap-Around Scan (WAS) are proposed. Performance comparisons and analysis of the proposed techniques will be given in Section 5. Finally, in Section 6, some concluding remarks are made. 2 Related work Many research results have been proposed in literature, such as security and privacy related research (Weis et al. 2004) focuses on methods of preserving and protecting privacy of RFID tags; the RFID reader collision avoidance and hidden terminal problems were firstly addressed in (Engels et al. 2002) aiming to enhance accuracy of RFID systems; the energy saving and coverage problems (Namboodiri and Gao 2007; Zhang and Hou 2005; Ching- Hsien et al. 2008) were extensively studied in order to improve lifetime of wireless RFID networks.
3 Research efforts for collision avoidance have been also presented in literature. Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA) (Jain and Das 2006) are four basic access methods to categorize MAC-level protocols. Standard collision avoidance protocols like RTS-CTS (Sobrinho et al. 2005) cannot be directly applied in RFID systems due to the reason, in traditional wireless networks, the CTS are sent back to the sender. Similar situation in RFID system, when a reader broadcasts an RTS, all tags in the read range need to send back CTS to the reader. It then requires another collision avoidance mechanism for CTS, and it will make the protocol more complicated. Techniques for resolving RFID reader collision problems are usually proposed as reader anti-collision techniques or tag anticollision solutions. The Colorwave (Waldrop 2003) is a scheduling-based approach prevents RFID readers from simultaneously transmitting signal to an RFID tag. The Colorwave is used as a distributed anti-collision system based on TDMA in RFID network. The Pulse protocol (Shailesh et al. 2005) is referred as a beacon broadcast and CSMA mechanism. Readers periodically send a beacon during communication with tags in separate control channels. The contend_back-off and the delay_before_ beaconing in the protocol are similar in wireless networks. If a reader receives a beacon, the residual back-off timer will be stored and kept until the next coming chance. This process is expected to achieve the fairness among all readers. A coverage-based RFID reader anti-collision mechanism was proposed in (Joongheon et al. 2546). Kim et al. (Joongheon et al. 2546) presented a localized clustering coverage protocol for solving reader collision problems occurring among homogeneous RFID readers. In (Cha et al. 2006), Cha et al. proposed two ALOHA-based algorithms with a Tag Estimation Method (TEM) for speedup object identification in RFID systems. Hsu et al. (Ching-Hsien et al. 1007) proposed a two phase dynamic modulation (TPDM) scheme to coordinate communications between multiple readers and tags. In TPDM, the scheduling is divided into two phases, the regional scheduling and the hidden terminal scheduling. The existing tag identification approaches can be classified into two main categories, the Aloha-based (Klair et al. 2007; Law et al. 2000; Roberts 1975; Vogt 2002; Zhen et al. 2005) anti-collision scheme and the tree-based scheme (Capetanakis 1979; Myung et al. 2006; Ryu et al. 2007; Zhou et al. 2004). RFID readers in the former scheme create a frame with a certain number of time slots, and then add the frame length into the inquiry message sending tags in its vicinity. Tags response the interrogation based on a random time slot. Because collisions may happen at the time slot when two or more tag response simultaneously, making those tags could not be recognized. Therefore, the readers have to send inquiries contiguously until all tags are identified. As a result, Aloha-based scheme might have long processing latency in identifying large-scale RFID systems (Law et al. 2000). In (Vogt 2002), Vogt et al. investigated how to recognize multiple RFID tags within the reader s interrogation ranges without knowing the number of tags in advance by using framed Aloha. A similar research is also presented in (Zhen et al. 2005) by Zhen et al. In (Klair et al. 2007), Klair et al. also presented a detailed analytical methodology and an in-depth qualitative energy consumption analysis of pure and slotted Aloha anti-collision protocols. Another anti-collision algorithm called enhanced dynamic framed slotted aloha (EDFSA) is proposed in (Lee et al. 2005). EDFSA estimates the number of unread tags first and adjusts the number of responding tags or the frame size to give the optimal system efficiency. In tree-based scheme, such as ABS (Myung et al. 2006), IBBT (Choi et al. 2004) and IQT (Sahoo et al. 2006), RFID readers split the set of tags into two subsets and labeled them by binary numbers. The reader repeats such process until each subset has only one tag. Thus the reader is able to identify all tags. The adaptive memoryless tag anti-collision protocol proposed by Myung et al. (Myung & Lee 2005) is an extended technique based on the query tree protocol. Choi et al. also proposed the IBBT (Improved Bit-by-bit Binary-Tree) algorithm (Choi et al. 2004) in Ubiquitous ID system and evaluate the performance along three other old schemes. The IQT protocol (Sahoo et al. 2006) is a similar work approach by exploiting specific prefix patterns in the tags to make the entire identification process. Recently, Zhou et al. (Zongheng et al. 2007) consider the problem of slotted scheduled access of RFID tags in a multiple reader environment. They developed centralized algorithms in a slotted time model to read all the tags. With the fact of NPhard, they also designed approximation algorithms for the single channel and heuristic algorithms for the multiple channel cases. Although tree based schemes have advantage of implementation simplicity and better response time compare with the Aloha based ones, they still have challenges in decreasing the identification latency. In this paper, we present two enhanced tree based tag identification techniques aim to coordinate simultaneous communications in large-scale RFID systems, to speedup minimize tag identification latency and to increase the overall read rate and throughput. 3 Query tree based tag anti-collision Radio Frequency IDentification (RFID) system is operated with the identification function through radio frequency, but
4 usually, not only one tag is applied to the identification, that means RFID reader needs to identify multiple tags at the same time. However, collision problems may happen in the process of identifying multiple tags. Binary splitting is a commonly approach applied in solving the tag collision problems. Figure 1 demonstrates a simple example of the query tree scheme. As this is a simple example, the collision only happened at nodes 0 and 01, which are represented as grid circles. The reader takes six inquiries to identify the three tags in this example. Considering when tag density becomes higher, every time when collision happened, the reader will add one bit for prefix matching at next level. In such way, it may waste too much time in scanning the entire binary tree. Due to this, a threshold of collisions could be defined as the criterion to move the identification to next level of a query tree. When the number of collisions exceeds the predefined threshold, we can predict that tag density in RF field is too high. So, the prefix matching at the current level will be skipped and jump to next level in order to save unnecessary communications of prefix enquiries. This idea motivates the design of threshold jumping. 4 The proposed techniques 4.1 Threshold Jumping (TJ) Recall that when readers stay in the environment with high tags density, collision may happen very frequently, and owing to this, a lot of query time will be wasted. In Threshold Jumping algorithm, a threshold of collisions is mainly used as the criterion of moving the identification to next level of a query tree. By means of the criterion to judge the level of tag density, if the density is high, the corresponding level of the query tree will be jumped over. As shown in Fig. 2, when the number of collisions exceeds the predefined threshold, prefix matching at the present level will be skipped in order to save unnecessary prefix inquiries for the remaining part at the same level. Through the step, the number of inquiry message could be significantly reduced. Let s take an example to clarify the above concept. Given an RFID network having 13 tags with 4-bits id length as shown in Fig. 3, the prefix matching will be conducted in level order scheme. Prefix messages are with 1-bit in level 1, two bits length in level 2, and so on. To perform a complete inquiry in different level, the number of inquiry messages will be 2 in level 1, 4 in level 2, 8 in level 3, etc. Having the threshold set to 2 I /M, where I denotes the level in the query tree and M is a pre-defined constant, if the collisions in level I exceeds 2 I /M, the prefix matching will be jumped to the next level for a new search. Figure 3 shows the example of identifying 13 RFID tags using TJ with M=3. Based on the threshold ratio 1/3, the threshold in levels 1, 2, 3 are [2/3], [4/3] and [8/3], respectively. Namely, in level 1, the identification will be moved to level 2 if 1 collision occurred; when I=2, i.e., level 2, the identification moves to level 3 if more than 2 collisions are occurred; similarly, when I=3, the identification will be jumped to level 4 if more than 3 collisions are raised in level 3, and so on. Table 1 summarizes the detail information (collision, identified or idle) using the TJ method compared to the traditional query tree scheme. The TJ uses 22 inquiries to identify all tags while the QT spent 24 inquiries. One thing worthy to mention is that although 22 inquiries is much more than the number of RFID tags, but to exhaustively scan RFID tags using full length id is not a feasible approach. This is because for RFID tags having more than 16 bits length id, the process of scanning entire query tree will lead significant large amount of inquiries, i.e., Therefore, the query tree based mechanism with prefix matching is usually considered as the feasible solution in tag anti-collision problem. Recall the example described above, it s clear that there are a lot of unnecessary broadcast in the method of query tree with binary splitting. For the TJ technique, when collision exceeds a certain proportion, it reveals that tag density is too high so there is no need to continuously launch broadcast to current level in order to save identification time. Therefore, in the Threshold Jumping method, the threshold is taken to count the collision numbers. Once collision is over the proportion, there is no need to continue the query to the current level, instead, jumping to the next level. Based on the reduction of broadcasting messages, the efficiency of identification will be enhanced. 4.2 Wrap-Around Scan (WAS) The method of setting collision limitation in TJ (Threshold Jumping) is adopted to improve identification efficiency when tag density is high. Recall that the TJ scans the query tree in a level order scheme. The direction of scan is always from left to right. Considering that the single direction scan in TJ may result very limited information of idle or collision in the right sub-tree of the query tree due to the threshold jumping. As a result, the identification of right sub-tree will be postponed to the last moment. The main reason is that if threshold is fulfilled in TJ, right sub-tree will be skipped over so that inefficiency may happen if tag density is low or meets the situation of unbalanced tree. The problem can be resolved through alternatively change the direction of prefix scan in different levels; the so-called WAS (Wrap-Around Scan). In WAS, the identification of tags in the right sub-tree could be advanced by reversing
5 Fig. 1 Example of query tree algorithm the direction of scan in each level alternatively. Figure 4 demonstrates the idea of wrap-around scan. The level ordered scans start from left to right in all odd (or even) levels and starts from right to left in all even (or odd) levels. Using wrap-around scan, the amount of prefix inquiries is expected to be decreased as the advance findings of the information of no response / collisions in the query tree could be in a balanced way. Let s use the same example that illustrated in section 4.1 to demonstrate the WAS scheme. Figure 5 gives the details of identification of the WAS method. The WAS scans the query tree from right to left in level 1, the reverse in level 2, and reverse again in level 3, and so on. Since the threshold ration is set 1/3, the threshold of collisions are 1, 2 and 3 in level 1, level 2 and level 3, respectively. The only one collision happened in level 1 is node 1, the two collision nodes appeared in level 2 are nodes 00 and 01; while the three collision nodes in level 3 are happened at nodes 111, 100 and 010 in order. It s clear that the efficiency of identification is enhanced by means of the addition of WAS (Wrap-Around Scan) in TJ (Threshold Jumping). The reason is that the WAS (Wrap-Around Scan) could identify the tags of right sub-tree and learned more information regarding no response and collision. The advanced information can significantly diminish the inquiry messages. Such phenomenon reveals that the WAS (Wrap- Around Scan) can speed up the identification efficiency, especially in unbalanced or irregular RFID networks. 5 Performance evaluation To evaluate the performance of the proposed techniques, we have implemented the TJ and WAS schemes along with the query tree protocol (QT). Figure 6 compares the number of inquiries to identify different number of RFID tags. Because Fig. 2 The paradigm of threshold jumping
6 Fig. 3 Example of threshold jumping the tag id is set 8 bits length, density=10% means that there are %=26 tags and density=20% means that there are %=51 tags, and so on. All tags are randomly generated in a uniform distribution manner. This is so called balance tree, as entitled in the figure. In this test, the threshold ratio is set 1/3. Basically, the proposed techniques TJ and WAS can reduce the amount of inquiry messages. As we expected, the WAS outperforms the TJ. Although the TJ and WAS methods do not improve the inquiry messages very much in low density network, when density increasing, both of the proposed methods present significant improvements to the traditional query tree protocol. Figure 7 uses the same configuration as that of Fig. 6 but increases the length of tag ID. Because of the long Table 1 Tag identification of three different schemes Step Binary Tree Threshold Jumping Wrap-Around Scan Broadcast Status Identified Tag Broadcast Status Identified Tag Broadcast Status Identified Tag 1 0 Collision 0 Collision 0 Collision 2 1 Collision 00 Collision 00 Collision 3 00 Collision 01 Collision 01 Collision 4 01 Collision 000 Collision 111 Collision 5 10 Collision 001 Collision 110 Identified Collision 010 Collision 101 Collision Collision 0000 Identified Collision Collision 0001 Identified Identified Collision 0010 Identified Collision Identified Identified Identified Collision 0100 Identified Identified Identified Identified Identified Identified Identified Identified Collision 0111 No Response 0100 Identified Identified Identified Identified Identified Identified Identified Identified No Response 1001 Identified Identified Identified Identified Identified Identified Identified Identified No Response Identified Identified Identified Identified Identified Identified 1111
7 Fig. 4 The paradigm of wrap-around scan simulation time for high density network with 12 bits ID length, we only report the results from density=20% to density=80%. Namely, the number of tags in this test is set from %~ %, i.e., 819~3277. This simulation has similar observations as those of Fig. 6. The TJ and WAS have better performance compare to the QT in terms of the inquiry messages. As the TJ and WAS schemes define a collision threshold to limit unnecessary inquiries, Fig. 8 examines the effects of different threshold ratio to the performance of the two schemes. Figure 8(a) is the result for density=80% and Fig. 8(b) is the results for density=50%. For high density network, we observed that lower threshold resulting less inquiry cost. Both of the TJ and WAS methods outperform the traditional query tree protocol (QT). For low density RFID network, it is obvious that TJ and WAS will reach a lower bound inquiries when threshold ratio is less than 1/5. Similar to the previous one, the TJ and WAS have better performance compare to the QT in terms of the inquiry messages. The last experiment was conducted with different distribution of tags id. The term Tree Balance Factor (TBF) defined in Fig. 9 is used to indicate the percentage of tags distributed in left sub-tree and right sub-tree of a query tree. TBF=10% means that number of tags in left sub-tree and right sub-tree are with the ratio 1:9; similarly, TBF= 20% represents the number of tags in left sub-tree and right sub-tree are with the ratio 2:8. Since the distribution of tags in a query tree is not a uniform distribution, this is so called Fig. 5 Example of wrap-around scan
8 Inquiry QT Balance Tree (8-Bits) Inquiry Balance Tree (8-Bits), density=80% QT TJ WAS TJ WAS Density(%) a Threshold Ratio (1/TR) Inquiry Balance Tree (8-Bits), density=50% Fig. 6 Performance comparison of the TJ, WAS and QT with 8 bits RFID tag imbalance tree, as titled in Fig. 9. The experiment varies tree balance factor from 10% which means a balance tree, to 50% which reflects an imbalance distribution. The density is set 80% in this test. From the experimental results, the WAS scheme outperforms the TJ and the query tree methods. For imbalanced instances, the TJ performs worse than the query tree (BT) protocol. This is because the TJ method does not scan right sub-tree in most of levels in a query tree. As a result, there is no information of collision or no response at upper levels of the right sub-tree. Consequently, when the identification goes to lower levels, the reader needs to match large number of tags id. This situation usually happened in imbalanced tree. Such phenomenon matches the results shown in Fig. 9. For the cases of TBF=40% and 50%, the TJ scheme could present noticeable improvement as compare to the QT b QT TJ WAS Threshold Ratio Fig. 8 Performance comparison of the TJ, WAS and QT with different threshold ratio a results of density=80% b results of density=50% Inquiry Balance Treee(12--Bits) 350 Inquiry QT Imbalance Tree (8-Bits) TJ WAS QT TJ WA Density(%) Tree Balance Factor (%) Fig. 7 Performance comparison of the TJ, WAS and QT with 12 bits RFID tag Fig. 9 Performance comparison of the TJ, WAS and BT in imbalanced tree
9 6 Conclusions With the emergence of wireless RFID technologies, identifying high density RFID tags is a crucial task in developing largescale RFID systems. In this paper, we have presented two enhanced tree-based tag identification techniques for minimizing tag identification cost. By setting a collision bound, the prefix matching will be jumped to lower level of the query tree in order to alleviate the collision problems. Together with the wrap-around scan technique, the efficiency of tag identification can be significantly improved. To evaluate the performance of proposed techniques, we have implemented the TJ and WAS techniques along with the query tree protocol (QT). The experimental results show that the proposed techniques provide considerable improvements on the latency of tag identification. It is also shown that the TJ and WAS are effective in terms of increasing system throughput, efficiency and easy implementation. There is also room for improvement of the identification technique in order to eliminate runtime peaks. It remains challenging, however, to find an optimal approach that would take environmental effects into account in order to adapt to them. We hope that the work done so far helps implementing pervasive computing environments that employ RFID systems. Acknowledgement The authors are grateful to the anonymous referees whose insightful comments enabled us to make significant improvements. This research was supported by NSC, National Science Council of Taiwan, under grant number NSC E References Birari, S. M. & Iyer, S. (2005). Mitigating the Reader Collision Problem in RFID Networks with mobile readers, International Conference on Networks (ICON). Capetanakis, J. I. (1979). Tree algorithms for packet broadcast channels. IEEE Transactions on Information Theory, 25, Cha, J. R. & Kim, J. H. (2009). Dynamic Framed Slotted ALOHA Algorithm using Fast Tag Estimation method for RFID System, in proceedings CCNC 06, Las Vegas, USA, Choi, H. S., Cha, J. R. & Kim, J. H. (2004). Improved Bit-by-bit Binary Tree Algorithm in Ubiquitous ID System, in proceedings of the IEEE PCM 2004, Tokyo, Japan, Nov. 29-Dec. 3, pp , Engels, D. W. & Sarma, S. E. (2002). The reader collision problem, in proceedings of the IEEE International Conference on Systems, Man and Cybernetics. Jain, S., & Das, S. R. (2006). Collision avoidance in multi-reader RFID networks, in proceedings of the WiNTECH California: Los Angeles. Kim, J., Kim, S., Kim, D., Lee W. & Kim, E. (2005). Low-Energy Localized Clustering: An Adaptive Cluster Radius Configuration Scheme for Topology Control in Wireless Sensor Networks, proceedings of the IEEE Vehicular Technology Conference (VTC), pp Klair, D. K., Chin, K.-W., & Raad, R. (2007). An investigation into the energy efficiency of pure and slotted aloha based RFID anticollision protocols, in proceedings of the IEEE WoWMoM 07, June Finland: Helsinki. Law, C., Lee, K. & Siu, K.-Y. (2000). Efficient Memoryless Protocol for Tag Identification. in proceedings of the International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications. Lee, S., Joo, S.D. & Lee, C.W. (2005). An enhanced dynamic framed slotted aloha algorithm for RFID tag identification, in ACM Mobiquitous. Myung, J., & Lee, W. (2005). An adaptive memoryless tag anticollision protocol for RFID networks, IEEE INFOCOM 05. Mar: Poster Session. Myung, J., Lee, W., & Srivastava, J. (2006). Adaptive binary splitting for efficient RFID tag anti-collision. IEEE Communication Letter, 10(3), Namboodiri, V. & Gao, L. (2007). Energy-Aware Tag Anti-Collision Protocols for RFID Systems, in proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications, pp Roberts, L. G. (1975). Aloha Packet System with and without Slots and Capture. ACM SIGCOMM Computer Communication Review, 5, Ryu, J., Lee, H., Seok, Y., Kwon, T., & Choi, Y. (2007). A Hybrid Query Tree Protocol for Tag Collision Arbitration in RFID systems. IEEE International Conference on Communications (ICC-07), 24 28, Sahoo, A., Iyer, S., & Bhandari, N. (2006). Improving RFID System to Read Tags Efficiently. IIT Bombay, June: KRSIT Technical Report. Sobrinho, J. L., de Haan, R. & Brazio, J.M. (2005). Why RTS-CTS is not your ideal wireless LAN multiple access protocol, in proceedings of the IEEE Wireless Communications and Networking Conference, pp Vogt, H. (2002). Efficient Object Identification with Passive RFID Tags, in proceedings of the 1st International Conference on Pervasive Computing. LNCS, 2414, Weis, S., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2004). Security and privacy aspects of low-cost radio frequency identification systems, Security in Pervasive Computing. LNCS, 2803, Waldrop, J., Engels, D. W. & Sarma, S. E. (2003). Colorwave: an anticollision algorithm for the reader collision problem, proceedings of the IEEE International Conference on Communications, pp Zhang, H., & Hou, J. C. (2005). Maintaining sensing coverage and connectivity in large sensor networks. Wireless Ad Hoc and Sensor Networks, 1(1 2), Zhen, B., Kobayashi, M., & Shimizui, M. (2005). Framed aloha for multiple RFID objects Identification. IEICE Trans. on Comm, E88-B(3), Zhou, Z., Gupta, H., Das S. R. & Zhu. X. (2007). Slotted Scheduled Tag Access in Multi-Reader RFID Systems, in proceedings of the IEEE International Conference on Networks Protocols (ICNP), pp Zhou, F., Chen, C., Jin, D., Huang, C., & Min, H. (2004). Evaluating and Optimizing Power Consumption of Anti-Collision Protocols for Applications in RFID systems, in proceedings of the International Symposium on Low Power Electronics and Design. California, USA, August: Newport Beach. Hsu, Ching-Hsien, Chen, Shih-Chang, Yu, Chia-Hao & Park, J. H. (2009). Alleviating the Reader Collision Problem in Mobile and Wireless RFID Environments, Journal of Personal and Ubiquitous Computing, Springer, doi: /s Hsu, Ching-Hsien, Chen, Yi-Min & Kang, H. J. (2008). Performance-Effective and Low-Complexity Redundant Reader Detection in Wireless RFID Networks, EURASIP Journal on Wireless Communications and Networking, vol. 2008, Article ID , 9 pages, doi: /2008/
10 Dr. Ching- Hsien. Hsu received the B.S. and Ph.D. degrees in Computer Science from Tung Hai University and Feng Chia University, Taiwan, in 1995 and 1999, respectively. He is currently an associate professor in the department of Computer Science and Information Engineering at Chung Hua University, Taiwan. Dr. Hsu s research interest is primarily in parallel and distributed computing, cloud and grid computing, P2P computing and services computing. Dr. Hsu has published more than 100 academic papers in journals, books and conference proceedings. He was awarded as annual outstanding researchers by Chung Hua University in 2005, 2006 and 2007 and got the excellent research award in Dr. Hsu is serving in a number of journal editorial boards, including International Journal of Communication Systems, International Journal of Computer Science, International Journal of Grid and High Performance Computing, International Journal of Smart Home and International Journal of Multimedia and Ubiquitous Engineering. He has edited more than 20 international journal special issues as a guest editor. He has severed many international conferences as various chairs and committee members. Dr. Hsu is currently an IEEE senior member and serves as an executive committee of IEEE Technical Committee on Scalable Computing (TCSC). Homepage: TEL: FAX: Han-Chieh Chao is a joint appointed Full Professor of the Department of Electronic Engineering and Institute of Computer Science & Information Engineering. He also serves as the Dean of the College of Electrical Engineering & Computer Science for National Ilan University, I-Lan, Taiwan, R.O.C. He has been appointed as the Director of the Computer Center for Ministry of Education on September 2009 as well. His research interests include High Speed Networks, Wireless Networks, IPv6 based Networks, Digital Creative Arts and Digital Divide. He received his MS and Ph.D. degrees in Electrical Engineering from Purdue University in 1989 and 1993 respectively. Dr. Chao is also serving as an IPv6 Steering Committee member and co-chair of R&D division of the NICI (National Information and Communication Initiative, a ministry level government agency which aims to integrate domestic IT and Telecom projects of Taiwan), Co-chair of the Technical Area for IPv6 Forum Taiwan, the Editor-in-Chief of the Journal of Internet Technology, Journal of Internet Protocol Technology and International Journal of Ad Hoc and Ubiquitous Computing. Dr. Chao has served as the guest editors for Mobile Networking and Applications (ACM MONET), IEEE JSAC, IEEE Communications Magazine, Computer Communications, IEE Proceedings Communications, the Computer Journal, Telecommunication Systems, Wireless Personal Communications, and Wireless Communications & Mobile Computing. Dr. Chao is an IEEE senior member and a Fellow of IET (IEE). He is a Chartered Fellow of British Computer Society. Dr. Jong Hyuk Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. Before August, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. He is now a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. Dr. Park has published about 100 research papers in international journals and conferences. Dr. Park has served as Chairs, program committee or organizing committee chair for many international conferences and workshops; Chair of SH 06/07/08, MUE 07/08, IPC 07/07, FGCN 07/08, TRUST 07/08, SMPE 07/08, UASS 07/08, SSDU 07/ 08, UIC 07/08, Mobility 08, SUTC 08, WPS 08, SecUbiq 07, ISM 07, and PC member of PerCom 08, AINA 07/08, MOBIQU- ITOUS 07/08, ATC 08, EUC 07 and so on. Dr. Park was editor-inchief of the International Journal of Multimedia and Ubiquitous Engineering (IJMUE), the managing editor of the International Journal of Smart Home (IJSH). And he is Associate Editors / Editors of 13 international journals including seven journals indexed by SCI(E). Dr. Park s research interests include Digital Forensics, Security, Ubiquitous and Pervasive Computing, Context Awareness, Multimedia Service, etc. He is a member of the KICS, KIISC, KMS, and IEICE. Homepage:
A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems 1 Xiaowu Li, 2 Zhenjiang Wang, 3 Xin Ren, 4 Yuyan Liu, 5 Qing
More informationA RFID Explicit Tag Estimation Scheme for Dynamic Framed- Slot ALOHA Anti-Collision
A RFID Explicit Tag Estimation Scheme for Dynamic Framed- Slot ALOHA Anti-Collision Author Pupunwiwat, Prapassara, Stantic, Bela Published 2010 Conference Title 6th International Conference on Wireless
More informationNovel Tag Anti-collision Algorithm with Adaptive Grouping
Wireless Sensor Network, 2009, 1, 475-481 doi:10.4236/wsn.2009.15057 Published Online December 2009 (http://www.scirp.org/journal/wsn). Novel Tag Anti-Collision Algorithm with Adaptive Grouping Abstract
More informationA simulation study on the energy efficiency of pure and slotted Aloha based RFID tag reading protocols
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 9 A simulation study on the energy efficiency of pure and slotted Aloha
More informationRECENT ADVANCES in SOFTWARE ENGINEERING, PARALLEL and DISTRIBUTED SYSTEMS
RECENT ADANCES in SOFTWARE ENGINEERING, PARALLEL and DISTRIBUTED SYSTEMS The First Search Right Algorithm for Elimination in RFID Network Jui-Wen Hung 1, I-Hui Li 2, Hsin-Hung Lin, Jyun-An Cai Department
More informationGrouping Based Dynamic Framed Slotted ALOHA for Tag Anti-Collision Protocol in the Mobile RFID Systems
Appl. Math. Inf. Sci. 7, No. 2L, 655-659 (2013) 655 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/072l40 Grouping Based Dynamic Framed Slotted ALOHA
More informationDesign of the RFID for storage of biological information
Design of the RFID for storage of biological information Yu-Lee Choi *, Seok-Man Kim **, Sang-Hee Son ***, and Kyoung-Rok Cho ** Dept. of Bio and Information Technology * Chungbuk National University,
More informationPerformance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement
, pp.1-10 http://dx.doi.org/10.14257/ijseia.2014.8.3.01 Performance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement Chang-Su Kim 1, Bong-Im Jang 1 and Hoe-Kyung Jung 1* 1 PaiChai
More informationMinimising collisions in RFID data streams using probabilistic Cluster-Based Technique
Minimising collisions in RFID data streams using probabilistic Cluster-Based Technique Author Pupunwiwat, Prapassara, Stantic, Bela Published 2013 Journal Title Wireless Networks DOI https://doi.org/10.1007/s11276-012-0495-3
More informationConceptual Selective RFID Anti-Collision Technique Management
Conceptual Selective RFID Anti-Collision Technique Management Author Pupunwiwat, Prapassara, Darcy, Peter, Stantic, Bela Published 2011 Journal Title Procedia Computer Science DOI https://doi.org/10.1016/j.procs.2011.07.114
More informationEfficient and Reliable Estimation of Tags in RFID Systems
Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Efficient and Reliable Estimation of Tags in RFID Systems Xu Huang Abstract
More informationRFID as an Infrastructure
Yan Qiao, Shigang Chen, Tao Li RFID as an Infrastructure Monograph August 28, 2012 Springer Chapter 1 Introduction Abstract RFID (radio frequency identification) tags are becoming ubiquitously available
More informationOn the Accuracy of RFID Tag Estimation Functions
1 On the Accuracy of RFID Tag Estimation Functions Dheeraj K. Klair, Kwan-Wu Chin and Raad Raad Telecommunications Information Technology Research Institute University of Wollongong orthfields Avenue,
More informationRFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers
RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers S. Anusha and Sridhar Iyer Indian Institute of Technology Bombay, India {anusha, sri}@it.iitb.ac.in Abstract. Radio Frequency
More informationOn the Accuracy of RFID Tag Estimation Functions
University of Wollongong Research Online Faculty of Informatics - Papers Faculty of Informatics 27 On the Accuracy of RFID Tag Estimation Functions D. K. Klair University of Wollongong K. Chin University
More informationConceptual Selective RFID Anti-Collision Technique Management
Available online at www.sciencedirect.com Procedia Computer Science 5 (2011) 827 834 The Fifth International Workshop on RFID Technology - Concepts, Applications, Challenges Conceptual Selective RFID Anti-Collision
More informationJoined Q-ary Tree Anti-Collision for Massive Tag Movement Distribution
Proc. 33rd Australasian Computer Science Conference (ACSC 2010), Brisbane, Australia Joined Q-ary Tree Anti-Collision for Massive Tag Movement Distribution Prapassara Pupunwiwat Bela Stantic Institute
More informationUnknown-Target Information Collection in Sensor-Enabled RFID Systems
1164 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 4, AUGUST 2014 Unknown-Target Information Collection in Sensor-Enabled RFID Systems Hao Yue, Student Member, IEEE, Chi Zhang, Member, IEEE, Miao Pan,
More informationJoined Q-ary Tree Anti-Collision for Massive Tag Movement Distribution
Joined Q-ary Tree Anti-Collision for Massive Tag Movement Distribution Author Pupunwiwat, Prapassara, Stantic, Bela Published 2010 Conference Title Proceedings of the Thirty-Third Australasian Computer
More informationApplying RFID Hand-Held Device for Factory Equipment Diagnosis
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Applying RFID Hand-Held Device for Factory Equipment Diagnosis Kai-Ying Chen,
More informationUnified Q-ary Tree for RFID Tag Anti-Collision Resolution
Unified Q-ary Tree for RFID Tag Anti-Collision Resolution Prapassara Pupunwiwat Bela Stantic Institute of Integrated and Intelligent Systems Griffith University, Gold Coast Campus Queensland 4222, Australia
More informationA Critical Survey and Analysis of RFID Anti-Collision Mechanisms
ACCEPTED FROM OPEN CALL A Critical Survey and Analysis of RFID Anti-Collision Mechanisms Lei Zhu and Tak-Shing Peter Yum, The Chinese University of Hong Kong ABSTRACT The anti-collision mechanism is an
More informationThe RFID Story. Sanjay Sarma Dean of Digital Learning, Professor of Mechanical Engineering. The Internet of Things: Roadmap to a Connected World
The RFID Story Sanjay Sarma Dean of Digital Learning, Professor of Mechanical Engineering Computer Science and Artificial Intelligence Laboratory (CSAIL) Massachusetts Institute of Technology CLASSIFYING
More informationA Critical Survey and Analysis of RFID Anti-Collision Mechanisms
ACCEPTED FROM OPEN CALL A Critical Survey and Analysis of RFID Anti-Collision Mechanisms Lei Zhu and Tak-Shing Peter Yum, The Chinese University of Hong Kong ABSTRACT The anti-collision mechanism is an
More informationCHAPTER 6 A CDMA BASED ANTI-COLLISION DETERMINISTIC ALGORITHM FOR RFID TAGS
CHAPTER 6 A CDMA BASED ANTI-COLLISION DETERMINISTIC ALGORITHM FOR RFID TAGS 6.1 INTRODUCTION Applications making use of Radio Frequency Identification (RFID) technology with large tag populations often
More informationMulti Token Based Location Sharing for Multi UAV Systems
Multi Token Based Location Sharing for Multi UAV Systems Eyup Emre Ulku*, Ilker Bekmezci ASTIN, Computer Engineering Department, Istanbul, Turkey. Turkish Air Force Academy, Computer Engineering Department,
More informationAn Improved Anti-collision Algorithm in RFID System
An Improved Anti-collision Algorithm in RFID System Leian Liu, Zhenhua Xie, Jingtian Xi, Shengli Lai School of Electronic and Information Engineering South China University of Technology Guangzhou, 510641,
More informationLOAD SHARING IN HETEROGENEOUS DISTRIBUTED SYSTEMS
Proceedings of the 2 Winter Simulation Conference E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes, eds. LOAD SHARING IN HETEROGENEOUS DISTRIBUTED SYSTEMS Helen D. Karatza Department of Informatics
More informationMobile Agent Code Updating and Authentication Protocol for Code-centric RFID System
Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System 1 Liang Yan, 2 Hongbo Guo, 3 Min Chen, 1 Chunming Rong, 2 Victor Leung 1 Department of Electrical Engineering and Computer
More informationExtending Birthday Paradox Theory to Estimate the Number of Tags in RFID Systems
Extending Birthday Paradox Theory to Estimate the Number of Tags in RFID Systems Masoud Shakiba 1,2 *, Mandeep Jit Singh 1, Elankovan Sundararajan 2, Azam Zavvari 1,2, Mohammad Tariqul Islam 1 1 Department
More informationA Railway Warehouse Information Acquisition System Based on Passive RFID Tag
A Railway Warehouse Information Acquisition System Based on Passive RFID Tag Weidong Li 1, Jinyu Xu 1*, Wa Niu 2 1. Dalian Jiaotong University, China. 2.Central University of Finance and Economics, China.
More informationResearch on Design and Implementation of Intelligent Warehouse Management System in Z Company
International Journal of Science and Qualitative Analysis 2016; 2(3): 30-35 http://www.sciencepublishinggroup.com/j/ijsqa doi: 10.11648/j.ijsqa.20160203.12 ISSN: 2469-8156 (Print); ISSN: 2469-8164 (Online)
More informationQuality Monitoring Traceability Platform of Agriculture products Cold Chain Logistics Based on the Internet of Things
517 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Editors: Peiyu Ren, Yancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The
More informationIn-Network Phased Filtering Mechanism for a Large-Scale RFID Inventory Application
In-Network Phased Filtering Mechanism for a Large-Scale RFID Inventory Application Wonil Choi, Nonmember, and Myong-Soon Park, Member, IEEE ㅔ Abstract--RFID technology is one of automatic identification
More informationFurther Discussing About the Conflict Problem of RFID Tag
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(1): 6-10 Published online January 21, 2016 (http://www.aascit.org/journal/wcnmc) ISSN: 2381-1137 (Print); ISSN:
More informationCampus Tracking System Based On IoT Yibiao Pi
Applied Mechanics and Materials Online: 2014-08-11 ISS: 1662-7482, Vols. 599-601, pp 1416-1419 doi:10.4028/www.scientific.net/amm.599-601.1416 2014 Trans Tech Publications, Switzerland Campus Tracking
More informationDESIGN, OPERATION AND ANTI-COLLISION PROCEDURE OF DATA TRANSFER OF INTELLIGENT LOAD UNITS
Advanced Logistic Systems Vol. 6. No. 1. (2012) pp. 190-200. DESIGN, OPERATION AND ANTI-COLLISION PROCEDURE OF DATA TRANSFER OF INTELLIGENT LOAD UNITS ISTVÁN SZENTMIKLÓSI 1, BÉLA ILLÉS 2 Abstract: The
More informationApplications of Fast-Moving RFID Tags in High-speed Railway Systems
Applications of Fast-Moving RFID Tags in High-speed Railway Systems Xiaoqiang Zhang and Manos Tentzeris Xiaoqiang Zhang is with the School of Logistics, Southwest Jiaotong University, Sichuan, China and
More informationResearch Article Identifying the Missing Tags in Categorized RFID Systems
Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 214, Article ID 582951, 12 pages http://dx.doi.org/1.1155/214/582951 Research Article Identifying the Missing
More informationLaboratory Management Based on Internet of Things. Jianming Huang
Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on
More informationAUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL
AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL D.P.Anusuya,Asst.Professor, Karpapga Vinayaga College of Engineering and Technology, Madhrandagam,Chennai,India. anu.krish1988@gmail.com
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 21 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(21), 2014 [12736-12740] Research on informational management of laboratory
More informationMissing Tag Identification in Blocker-enabled RFID Systems
Missing Tag Identification in locker-enabled RFID Systems Xia Wang, Jia Liu, Feng Zhu, Yanyan Wang and Lijun Chen State Key Laboratory for Novel Software Technology, Nanjing University, China College of
More informationLow-cost RFID identification variation
Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Low-cost RFID identification variation Koong Lin Tzu-Chang Yeh Yao-Yuan Liu Chad Lin Edith Cowan University 10.2991/jcis.2006.14 Originally
More informationSecure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems
Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems Kyoung Hyun Kim 1, Eun Young Choi 2,SuMiLee 3, and Dong Hoon Lee 4 Center for Information Security Technologies(CIST), Korea
More informationA Logistics Monitoring Technology Based on Wireless Sensors
A Logistics Monitoring Technology Based on Wireless Sensors https://doi.org/10.3991/ijoe.v13i07.7375 Hongxia Sun Zhengzhou Shengda University of Economics, Business & Management, Zhengzhou, China sunhongxia421@163.com
More informationRFID Project Technical Report
RFID Project Technical Report Bernard Ghanem 1. Introduction The use of Radio Frequency Identification (RFID) technology extends historically to the 1970 s, when the first commercial products emerged.
More informationChanges of Clothing Distribution Logistics Management RFID Technology
Science Journal of Business and Management 2016; 4(3): 72-76 http://www.sciencepublishinggroup.com/j/sjbm doi: 10.11648/j.sjbm.20160403.12 ISSN: 2331-0626 (Print); ISSN: 2331-0634 (Online) Changes of Clothing
More informationTHE APPLICATION OF RADIO FREQUENCY IDENTIFICATION (RFID) IN SPEEDING UP THE FLOW OF MATERIALS IN AN INDUSTRIAL MANUFACTURING PROCESS
THE APPLICATION OF RADIO FREQUENCY IDENTIFICATION (RFID) IN SPEEDING UP THE FLOW OF MATERIALS IN AN INDUSTRIAL MANUFACTURING PROCESS B.N. GATSHENI AND F. AGHDASI ABSTRACT: RFID can work in conjunction
More informationApplication of Internet of Things Management in Electric Power Industry
Application of Internet of Things Management in Electric Power Industry Yong Qian1, a, Xinyu Wang1, Hua Guo1, Xuanchen Long1, Xiaoguang Chi1 1State Grid Tieling Electric Power Supply Company, Tieling,
More informationSMART ATTENDANCE AND AUTO NOTIFICATION SYSTEM USING RFID
e-issn 2455 1392 Volume 2 Issue 7, July 2016 pp. 190 194 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com SMART ATTENDANCE AND AUTO NOTIFICATION SYSTEM USING RFID Vikas Kumar Ranjan 1, Shri
More informationRSAA: Reliable Splitting Aware ALOHA to Capture Passing Tags
: Reliable Splitting Aware ALOHA to Capture Passing Tags Lei Kang, Chen Qian and Lionel Ni Hong Kong University of Science and Technology University of Texas at Austin {kang,ni}@cse.ust.hk,cqian@cs.utexas.edu
More informationDesign of intelligent logistics information platform based on wireless sensor RFID technology. Hai Ye 1, a
5th International Conference on Education, Management, Information and Medicine (EMIM 2015) Design of intelligent logistics information platform based on wireless sensor RFID technology Hai Ye 1, a 1 Qingyuan
More informationIEEE RFID 2012 Tutorials and Workshops
IEEE RFID 2012 Tutorials and Workshops Tutorial: Advanced UHF RFID Tag Antenna Design (April 3: 8:30 am 12:00 pm) Organizer: Gaetano Marrocco (University of Roma Tor Vergata) Things equipped with electronic
More informationA GATE SENSOR FOR CONSTRUCTION LOGISTICS
A GATE SENSOR FOR CONSTRUCTION LOGISTICS Woo-Jae Lee plum_80@naver.com Soon-Wook Kwon swkwon@skku.edu Cheolho Choi Doalltech Sae-myung B/D 770-11, Yeoksam-Dong, Gangnam-Gu, Seoul, Korea 135-928 choi@doalltech.com
More informationEfficient Pinpointing of Misplaced Tags in Large RFID Systems
th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Efficient Pinpointing of Misplaced Tags in Large RFID Systems Kai Bu, Bin Xiao, Qingjun Xiao, Shigang
More informationPassengers Rights Boarding pass using Radio frequency identification
Passengers Rights Boarding pass using Radio frequency identification SAUTY Aurélien, Institut de Formation Universitaire et de Recherche du Transport Aérien. aurelien_sauty@yahoo.com The reason of this
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 11 Radio Frequency Identification Objectives Define Radio Frequency Identification (RFID) Explain the need for RFID and how RFID works List the components
More informationDesign and implementation of energy management system software in green building
Acta Technica 62 No. 1A/2017, 495 506 c 2017 Institute of Thermomechanics CAS, v.v.i. Design and implementation of energy management system software in green building Hongyan Zhang 1, Zhiping Zhou 1 Abstract.
More informationRFID Based Electricity Billing and Cut-Off System for Energy Through GSM
RESEARCH ARTICLE OPEN ACCESS RFID Based Electricity Billing and Cut-Off System for Energy Through GSM 1 K.Jansi lakshmi, 2 N.Swetha soundarya, 3 D.Sasi kala, 4 B.Venkatarami reddy, 5 A.Akhil Assistant
More informationREMOTE CONTROL SYSTEM FOR GREENHOUSE ENVIRONMENT USING MOBILE DEVICES
REMOTE CONTROL SYSTEM FOR GREENHOUSE ENVIRONMENT USING MOBILE DEVICES Sin-Woo Kang, Sun-Ok Chung, Ki-Dae Kim Dept. of Biosystems Machinery Engineering Chungnam National University, Daejeon, Republic of
More informationA Centralized and Aligned Scheduler for passive RFID Dense Reader Environments working under EPCglobal standard
A Centralized and Aligned Scheduler for passive RFID Dense Reader Environments working under EPCglobal standard M. Victoria Bueno-Delgado, Pablo Pavon-Marino Communications and Technology Information Department,
More informationSecurity issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks
Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Arif Sari School of Applied Sciences, Department of Management Information Systems, European University
More informationA Novel and Efficient Anti-Collision Protocol for RFID Tag Identification
JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 12, NO. 4, DECEMBER 216 173 A Novel and Efficient Anti-Collision for RFID Tag Identification Adarsh Kumar, Krishna Gopal, and Alok Aggarwal Abstract
More informationKeywords RFID, field management, bulk material inventory, nuclear plant, area subdivision.
International Journal of Innovative Research in Engineering & Management (IJIREM) ISSN: 2350-0557, Volume-4, Issue-1, January-2017 DOI: 10.21276/ijirem.2017.4.1.4 Strategies for Field Management Using
More informationIEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEM 1. On the Design and Deployment of RFID Assisted Navigation Systems for VANETs
IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEM On the Design and Deployment of RFID Assisted Navigation Systems for VANETs Wei Cheng, Member, IEEE, Xiuzhen Cheng, Member, IEEE, Min Song, Senior Member,
More informationIntegration of RFID and WSN for Supply Chain Intelligence System
Integration of RFID and WSN for Supply Chain Intelligence System Shiva Mirshahi 1, Sener Uysal 2 Dept. of Electrical and Electronic Engineering Eastern Mediterranean University Famagusta, North Cyprus
More informationAutomatic Neighboring BS List Generation Scheme for Femtocell Network
Automatic Neighboring BS List Generation Scheme for Femtocell Network Kwanghun Han, Seungmin Woo, Duho Kang, and Sunghyun Choi School of Electrical Engineering and INMC, Seoul National University, Seoul,
More informationSystem Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network Shin-ichi Kuribayashi 1 and Yasunori Osana 1 1 Department of Computer and Information Science, Seikei University,
More informationMissing Tag Identification in Open RFID Systems
Missing Tag Identification in Open RFID Systems Yanyan Wang, Jia Liu, Xia Wang, Feng Zhu, and Lijun Chen State Key Laboratory for Novel Software Technology, Nanjing University, China Email: wangyanyan@smail.nju.edu.cn,
More informationIMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD
IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD Shilpa S. Badhiye1,Prof.Rupali S. Khule2 1 student, Electronics and telecommunication Department, MCOERC, Maharashtra, India 2 Professor, Electronics
More informationRFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas
RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas 1 RFID Tutorial Outline Introduction RFID System Tags Readers Data link layer Modulation Encoding Anti-Collision
More informationInvestigation of the construction of intelligent logistics system from traditional logistics model based on wireless network technology
Ouyang et al. EURASIP Journal on Wireless Communications and Networking (2019) 2019:20 https://doi.org/10.1186/s13638-018-1334-8 RESEARCH Investigation of the construction of intelligent logistics system
More informationPrivacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader
Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader Byunggil Lee and Howon Kim Electronics and Telecommunications Research Institute bglee@etri.re.kr Abstract
More informationProduction Management Modelling Based on MAS
International Journal of Automation and Computing 7(3), August 2010, 336-341 DOI: 10.1007/s11633-010-0512-x Production Management Modelling Based on MAS Li He 1 Zheng-Hao Wang 2 Ke-Long Zhang 3 1 School
More informationA Design and Application of RFID Gantry Quan Gang Wen 1,a Yongbing Xu 2,b
International Power, Electronics and Materials Engineering Conference (IPEMEC 015) A Design and Application of RFID Gantry Quan Gang Wen 1,a Yongbing Xu,b 1, Computer Department Zhuhai College of Jilin
More informationAnalyzing CRFIDs in Simulation Ting-You Wang and Ting-Yen Wang Advised by Michael Buettner
Analyzing CRFIDs in Simulation Ting-You Wang and Ting-Yen Wang Advised by Michael Buettner Background RFIDs have almost become ubiquitous such that one can find RFID readers installed in almost any location.
More informationSenseAnywhere introduces the AiroSensor. A lifetime wireless datalogger.
SenseAnywhere introduces the AiroSensor. A lifetime wireless datalogger. Introduction SenseAnywhere s AiroSensor leads a new generation of wireless, ultra low-power data loggers that connect to the Cloud.
More informationCall for Papers. August 16-17, Melbourne Park Function Centre Melbourne, Australia. Australian. Submit your abstract by March 28
Call for Papers August 16-17, 2016 Submit your abstract by March 28 Melbourne Park Function Centre Melbourne, Australia www.protectionsymposium.com.au Overview The Protection Symposium (APS) is a leading
More informationThis is the accepted version of a paper presented at IEEE International Symposium on Communications, Control, and Signal Processing,May 21-24, 2014.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE International Symposium on Communications, Control, and Signal Processing,May 21-24, 2014. Citation for the
More informationApplication of Decision Trees in Mining High-Value Credit Card Customers
Application of Decision Trees in Mining High-Value Credit Card Customers Jian Wang Bo Yuan Wenhuang Liu Graduate School at Shenzhen, Tsinghua University, Shenzhen 8, P.R. China E-mail: gregret24@gmail.com,
More informationJiman Hong Ph.D./Professor
Jiman Hong Ph.D./Professor Director, Embedded Operating System Research Institute E-mail : gman@daisy.kw.ac.kr HomePage : http://eoslab.kw.ac.kr/ gman/ Work Address School of Computer Science and Engineering
More informationIntroduction to RFID
Introduction to RFID Hu Hai Year 1 Mphil Student 2004. 09. 11 1. What is RFID? Radio frequency identification, or RFID, is a generic term for that use radio waves to automatically identify people or objects.
More informationDesign of Transmission Scheme for Radiation Detection &Management Information
17th World Conference on Nondestructive Testing, 25-28 Oct 2008, Shanghai, China Design of Transmission Scheme for Radiation Detection &Management Information Jinping LIU Chao LIU Detection Center, No.8
More informationConstruction of a Mega Disaster Crisis Management System
Construction of a Mega Disaster Crisis Management System Kazuhiro Takahagi 1, Tomoyuki Ishida 1, Akira Sakuraba 2, Kaoru Sugita 3, Noriki Uchida 3, and Yoshitaka Shibata 2 1 Ibaraki University, Hitachi,
More information2017 European Internet of Things Product Leadership Award
2017 European Internet of Things Product Leadership Award Contents Background and Company Performance... 3 Industry Challenges... 3 Product Family Attributes and Business Impact of Wirepas... 4 Conclusion...
More informationA Machine Setup Model for TFT-LCD Cell Back-End Process
A Machine Setup Model for TFT-LCD Cell Back-End Process Y.-C. Chang 1, P.-S. Chen 2, P.-C. Chen 1 1 Department of Industrial Engineering and Management, National Chiao Tung University, Hsinchu, Taiwan
More informationA Quality Evaluation Technique of RFID Middleware in Ubiquitous Computing
A Quality Evaluation Technique of RFID Middleware in Ubiquitous Computing Gi oug, Oh, and Doo yeon, Kim and Sang il, Kim and Sung yul, Rhew giug@korea.com kimdoo@moe.go.kr hava67@selab.ssu.ac.kr syrhew@comp.ssu.ac.kr
More informationDesign of logistics tracking and monitoring system based on internet of things
Acta Technica 62 No. 2A/2017, 75 82 c 2017 Institute of Thermomechanics CAS, v.v.i. Design of logistics tracking and monitoring system based on internet of things Qiang Yu 1 Abstract. To improve the information
More informationCloud Load Balancing Based on ACO Algorithm
Cloud Load Balancing Based on ACO Algorithm Avtar Singh, Kamlesh Dutta, Himanshu Gupta Department of Computer Science, National Institute of Technology,Hamirpur, HP, India Department of Computer Science,
More informationA Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems
A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems Aysan Rasooli Department of Computing and Software McMaster University Hamilton, Canada Email: rasooa@mcmaster.ca Douglas G. Down
More informationLOGISTICAL ASPECTS OF THE SOFTWARE TESTING PROCESS
LOGISTICAL ASPECTS OF THE SOFTWARE TESTING PROCESS Kazimierz Worwa* * Faculty of Cybernetics, Military University of Technology, Warsaw, 00-908, Poland, Email: kazimierz.worwa@wat.edu.pl Abstract The purpose
More informationA Simulation-based Multi-level Redundancy Allocation for a Multi-level System
International Journal of Performability Engineering Vol., No. 4, July 205, pp. 357-367. RAMS Consultants Printed in India A Simulation-based Multi-level Redundancy Allocation for a Multi-level System YOUNG
More informationInternational Journal of Informative & Futuristic Research ISSN (Online):
Reviewed Paper Volume 2 Issue 7 March 2015 International Journal of Informative & Futuristic Research Accomplished Billing Cart Based on ARM7 Paper ID IJIFR/ V2/ E7/ 028 Page No. 2082-2087 Subject Area
More informationReassignment Scheme of an RFID Tag s Key for Owner Transfer
Reassignment Scheme of an RFID Tag s Key for Owner Transfer Junichiro Saito 1, Kenji Imamoto 1, and Kouichi Sakurai 2 1 Graduate School of Information Science and Electrical Engineering, The Department
More informationResearch on Operation Mode of Intelligent Logistics Base on Fourth Party Logistics Platform
Advanced Materials Research Online: 2013-01-11 ISSN: 1662-8985, Vols. 631-632, pp 1254-1259 doi:10.4028/www.scientific.net/amr.631-632.1254 2013 Trans Tech Publications, Switzerland Research on Operation
More informationExploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling
Exploiting Dynamic Workload Variation in Low Energy Preemptive Scheduling Xiaobo Sharon Department of Electrical and Electronic Engineering Department of Computer Science and Engineering Hong Kong University
More informationCHAPTER 1 INTRODUCTION This chapter briefly discuss on the overview of this research. It contains five sections. The first section is introduction; follow by the problem statement. Next are the objectives
More informationRFID Adaptor for Detecting and Handling Data/ Events in Internet of Things
, Vol 8(S5), 140 148, March 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS5/62033 RFID Adaptor for Detecting and Handling Data/ Events in Internet of Things Ina Kim,
More informationLOGISTICS SECURITY MONITORING AND REAL-TIME TRACKING BASED ON RFID TECHNOLOGY DESIGN AND APPLICATION OF ELECTRONIC SEAL Yu Shao
LOGISTICS SECURITY MONITORING AND REAL-TIME TRACKING BASED ON RFID TECHNOLOGY DESIGN AND APPLICATION OF ELECTRONIC SEAL Yu Shao Department of Computer Science, Ningbo Dahongying University, Ningbo, 315175,
More information