A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems
|
|
- Godwin Patterson
- 6 years ago
- Views:
Transcription
1 Sensors & Transducers 2013 by IFSA A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems 1 Xiaowu Li, 2 Zhenjiang Wang, 3 Xin Ren, 4 Yuyan Liu, 5 Qing Zhao School of Information and Technology, Kunming University, Puxin Road 2, Kunming, Yunnan, , China Tel.: , , , , lxwlxw66@126.com, zjwangkm@126.com, renxin66@126.com, @126.com, @qq.com Received: 22 May 2013 /Accepted: 19 July 2013 /Published: 31 July 2013 Abstract: Frame slotted ALOHA (FSA) protocol is a classic tag anti-collision protocol. Similar to most existing anti-collision protocols, The FSA initially aims at tag identification of static scenarios, that is, all tags keep still during the tag identification process. However, in many real scenarios, tags generally move along a fixed path in the reader coverage area, that is, tags stay the coverage area only for a restricted time (sojourn time). Obviously, tag loss is inevitable in some mobile RFID scenarios. For example, tag quantity is too large or their moving speed is too high. Like almost existing tag identification protocols, FSA is not concerned with optimal management of lost tags. In this paper, we propose an improved FSA algorithm with early end which can decrease tag loss by early termining idle slots, collision slots and slots that are occupied by lost tag. Simulation results show that the proposed protocol can significantly reduce the numbers of lost tags in mobile RFID scenarios. The idea of the paper is beneficial for redesigning other existing tag anti-collision protocols so as to make these protocols adapt to mobile RFID systems. Copyright 2013 IFSA. Keywords: RFID, Anti-collision, Frame slotted ALOHA (FSA), Early end, Tag identification protocol, Tag loss rate (TLR). 1. Introduction One of radio frequency identification (RFID) advantages over traditional bar code is that RFID can support simultaneous multi-tag identification without any contact. So, RFID technique is applied to various sectors, such as supply chain management, traceability and emergency management. The majority of RFID systems are composed of some RFID readers and many passive transponders, called tags. Passive tags get their power supply from the electromagnetic field of the reader. When the multiple tags simultaneously transmit their signals to the reader, collisions will happen. So far, many collision resolution protocols have been proposed for static scenarios, that is, no tag enters or leaves the reader coverage area during the process of tag identification. These algorithms can be grouped into two broad categories: tree-based algorithms and aloha-based algorithms [1 6]. In ALOHA-based systems, the channel time is divided into frames. Each frame in turn is divided into several time slots. Within a frame, each tag randomly selects a time slot and transmits its identifier to the reader in that slot. 82 Article number P_1254
2 Note that, within each frame there exist three kinds of slots: (1) the idle slot where no tags reply; (2) the successful slot where only one tag replies; and (3) the collision slot where multiple tags reply. In tree-based systems, anti-collision protocols are based on binary trees and every root-to-leaf path in these trees represents a unique tag ID. Compared with ALOHAbased algorithm, tree-based algorithms promise deterministic identifications, but need a high number of reader-to-tag commands. moving velocity (assumed constant) and tag sojourn time S (given in slots) which can be derived from mentioned main parameters and the time interval for one slot. Mobile RFID systems shown in Fig. 2 are our research scenarios. Fig. 2. The mobile RFID system diagram. Fig. 1. Early end for idle slots. To decrease tag identification time, ISO A and EPCglobal Class 1 [8] presented frame slotted ALOHA with early end, as shown Fig. 1. From this figure, we can see that all idle slots are terminated early, which can decrease identification delay effectively Besides, in many practical scenarios, tags attached to items usually move along the fixed path in the reader coverage area [3, 9-11], that is, tags stay the coverage area only for a certain time (sojourn time). Since the reader has limited sojourn time to identify the passing tags, it is critical to decrease the number of tags which leave the coverage area without being identified. Systems involving moving tags are generally called mobile RFID systems [3, 9-10]. A typical example of them is the portal of a warehouse equipped with RFID reader to automatically identify passing tags and update the central database with the captured information. Another typical example of them is a conveyor belt in a factory or a logistic center where objects attached with RFID tags have to be identified [9]. In these situations, tags usually move along a fixed path at a constant speed and can enter or leave the reader coverage area during the process of tag identification. Fig. 2 shows the mobile RFID system diagram and illustrates some parameters: the reader coverage area length, the tag As mentioned previously, in the mobile RFID systems, some tags may leave the coverage area unidentified. We refer to such a tag as a lost tag. In some situations (e.g. the tag moving velocity is too great, etc.), the phenomenon of lost tags is inevitable. How to decrease the number of lost tags is the critical research issue in mobile RFID applications. Therefore, we rate tag loss ratio (TLR) as a critical performance metric, which is defined as the quotient between the number of lost tags and the total number of tags entering the coverage area [3, 10-11]. Obviously, TLR is related to other many system performance metrics, such as throughput, system efficiency and the identification delay [4]. For example, if throughput of protocol A is higher than protocol B, then TLR of protocol A is usually lower than protocol B. Compared with other performance metrics, the users of RFID systems put more emphasis on TLR and it reflects the performance of mobile RFID system very well. So, we only focus on the performance metric TLR in the paper. In mobile RFID systems, there exists a special slot, named lost tag slot, which is different from the idle, collision and successful slot. The reason for its advent is that one or more tags that select the slot to communicate with reader have left the reader s field unidentified when the reader identifies them. Successful and collision slots could switch to lost slots when tags that select them leave the coverage area unidentified, as shown in Fig. 3. So, in the mobile RFID systems, there are four types of slots: idle, collision, successful and lost tag slots. In this paper, we will present an improved frame slotted ALHOHA (FSA) protocol with early end which can decrease tag loss by early termining idle slots, collision slots and slots that are occupied by lost tag in the mobile RFID systems. The proposed protocol is named EARLY-END protocol. The remainder of this paper is organized as follows. In Section 2 we briefly review the related 83
3 work in the area. Then, in Section 3 we offer EARLY-END protocol in the mobile RFID systems. Section 4 provides the simulation results. Finally, Section 5 concludes. belt carrying tag sets and proposed a dynamic frame length ALOHA to improve the system performance. The proposed protocol can improve to some extent the system performance of mobile RFID systems. However, the scenarios studied in [9] are similar to that in [11] and thus they are also not our research scenarios. In this paper, we develop an improved frame slotted ALOHA protocol with early end in mobile RFID systems which is devoted to avoid the wastage due to the lost tag slots. Fig. 3. The illustration of lost slots. 2. Related Works The tag recognition rate is a conception that is similar to TLR since it also involves unidentified tags. In [13], Vogt first modeled the identification process of framed slotted ALOHA as a Markov chain, and asserted that only by performing multiple read cycles, a high tag recognition rate can be reached. Unlike our research scenarios, tag recognition rate is based on the static scenario. In order to compute TLR, many researches based on Markov chain were done. In [11], Vales-Alonso et al. focused on TLR of single tag set passing the coverage area in a limited time. In the scenarios, no more tag sets enter the coverage area until the previous one has left. However, the scenarios are different from our research scenario. In [10], Vales-Alonso et al. offered a Markov model for the analysis of mobile RFID systems. The big drawback of applying the Markov approach to mobile RFID scenario is that, as the dimension of the problem increases, TLR requires too much computation. Furthermore, the model did not consider the wastage due to the lost tag slots. Alcaraz et al. [3] provided dynamic systems model for mobile RFID systems implementing FSA as the collision resolution protocol. In this model, both TLR and the optimal frame size can be easily obtained. However, the model is only suitable for analyzing TLR of FSA. In addition, the model did not consider the wastage due to the lost tag slots. There are other works that focus not only on computation of TLR but also on performance improvement of mobile RFID systems. In [9], Xie et al. presented a probabilistic model for a conveyor Fig. 4. Idle and lost tag slots terminated early. 3. Early-end Protocol The ideal of EARLY-END protocol is if the reader detects no transmission after a small period of time, it terminates idle, collision and lost tag slots early using the End-slot command, as shown in Fig. 4. From the figure, the time spent by idle, collision and lost tag slots are decreased effectively. The method of EARLY-END protocol can be summarized as follows: 1) At the beginning of a frame, the RFID Reader sends the Frame-begin command with an integer parameter 'L'. Upon hearing this command, unsilenced tags generate a random number from 0 to L - 1. Those generating '0' reply immediately. 2) If only one tag replies, the reader can identify it and send back the Silence command. Upon hearing this command, the replied tag will be silenced, that is, it will not respond to future commands, while the other tags decrease their counter values by 1 and contend the channel if the counters reach 0. 3) If the reader detects a collision, the reader will send back the End-slot command early. In this paper, time cost of a collision slot is equal to 0.6 times of that of a successful slot. Upon hearing this command, all the unsilenced tags will decrease their counters by 1 and contend the channel if their counters reach 0. 84
4 4) If no tag replies, the reader will send back the End-slot command early. This means that an idle slot or a lost tag slot has occurred. In this paper, we assume that time cost of an idle and a lost tag slot is equal to 0.2 times of that of a successful slot. Upon hearing this command, all the unsilenced tags will decrease their counters by 1 and contend the channel if their counters reach 0. 5) After one frame ends, the Reader will begin a new frame by sending the Frame-begin command if some tags were collided in the previous frame. Through these steps, EARLY-END protocol can terminate idle, collision and lost tag slots early under the mobile RFID systems. 4. Simulation and Results Now, we begin to evaluate the proposed protocol. Because TLR can be derived by mathematical model only for FSA and CSMA so far [8] [10], we offer a simplified mobile RFID experiment model. The model comprises 3 groups of mobile tags, as shown in Fig. 5 where T1 denotes the arriving interval between the 1st and 2nd groups of tags, T2 denotes the arriving interval between the 2nd and 3rd groups of tags, N1, N2 and N3 respectively denote the number of tags in the 1st, 2nd and 3rd groups of tags, S denotes the tag sojourn time. Notice that in the paper, all parameters related to time, such as T1, T2 and S are measured in slot. Parameters S have been defined in section 1. Below, we compare EARLY-END protocol with FSA without early-end feature [14] which is similar to EARLY-END protocol except that it is not characterized by early end. Our simulation based on Monte Carlo technique and the simplified mobile RFID experiment model. when the number of tags in the second group N2 is equal to 50 tags, TLR of our method is nearly 3 percent while that of FSA is 42 percent. In the Fig. 6 (b), we survey the relationship between TLR and the tag sojourn time S by changing S (corresponding to change of the tag moving speed or the reader coverage area length). Related parameters in the experiment are: N1=70, N2=70, N3=70, T1=50, T2=80. We can find that TLR of both protocols decreases as S increases. The reason is that the reader has more time to identify tags as S increases. Compared with FSA, EARLY-END protocol has better performance. For example, when tag sojourn time S is larger than or equals 350 slots, TLR of the proposed protocol is zero while that of FSA is about 26 percent. (a) TLR vs. the tag density. (b) TLR vs. the sojourn time model Fig. 5. Simplified mobile RFID experiment mode. In the Fig. 6 (a), we survey the relationship between TLR and the tag density by changing the number of tags N2 in the second group. Related parameters in the experiment are: N1=70, N3=70, T1=50, T2=80, S=230. We can find that TLR of both protocols increases as the tag density increases. The reason is that the reader must identify more tags in the identical interval. Compared with FSA, EARLY- END protocol has better performance. For example, (c) TLR vs. tag arrival rate. Fig. 6. TRL of IVAEEMR and Vogt protocols. In the Fig. 6 (c), we survey the relationship between TLR and tag arrival rate by changing T1. 85
5 Related parameters in the experiment are: N1=70, N2=70, N3=70, S=230. From the figure, we can find that TLR of both protocols decreases as the tag arrival rate become slow. The reason is that the reader has more time to identify tags when the rate becomes slow. Compared with FSA, EARLY-END has better performance. When T1 is equal to 60 slots, TLR of EARLY-END protocol is nearly 4 percent while that of FSA protocol is equal to about 44 percent. In general, the simulation results demonstrate that compared with FSA, EARLY-END protocol can reduce TLR and improve mobile RFID system performance remarkably since it can terminate idle, collision and lost tag slots early. 5. Conclusions This paper introduces a term lost tag slot first in the mobile RFID systems. Then, EARLY-END protocol is proposed. The protocol can terminate idle, collision and lost tag slots, which decrease TLR effectively in the mobile RFID system. Moreover, in order to evaluate our method, we present a simplified mobile RFID experiment model, which can easily analyze the TLR of many tag anticollision protocols in the mobile RFID systems and avoid complicated mathematical computation of TLR Acknowledgements This work is supported by the National Natural Science Foundation of China (NNSF) under Grant and Science Foundation of Kunming University of China under Grant XJ11L001. References [1]. M. He, S.-J. Haring, P. Fan, M. K. Khan, R.-S. Run, J.-L. Lai, R.-J. Chen. A fast RFID Tag Identification Algorithm Based on Counter and Stack, Expert Systems with Applications, Vol. 38, 2011, pp [2]. M.-K. Yeh, J.-R. Jiang and S.-T. Huang, Adaptive splitting and pre-signaling for RFID tag anticollision, Computer Communications, Vol. 32, 2009, pp [3]. J. J. Alcaraz, E. Egea-López, J. Vales-Alonso, J. García-Haro, Dynamic System Model for Optimal Configuration of Mobile RFID Systems, Computer Networks, Vol. 55, 2011, pp [4]. K. Finkenzeller, RFID Handbook: Radio-frequency Identification Fundamentals and Applications, Wiley, New York, [5]. C. P. Wong, Q. Feng, Grouping Based Bit-slot ALOHA Protocol for Tag Anti-collision in RFID Systems, Communication Letters, Vol. 11, No. 12, 2007, pp [6]. X. Jia, Q. Feng, C. Ma, An Efficient Anti-collision Protocol for RFID Tag Identification, IEEE Communication Letters, Vol. 14, No. 11, 2010, pp [7]. L. Zhu, T.-S. P. Yum. A Critical Survey and Analysis of RFID Anti-Collision Mechanisms, IEEE Communications Magazine, Vol. 5, 2011, pp [8]. D. K. Klair, K. Chin, R. Raad, A Survey and Tutorial of RFID Anti-Collision Protocols, IEEE Communications Surveys Tutorials, Vol. 12, No. 3, 2009, pp [9]. L. Xie, B. Sheng, C. C. Tan, H. Han, Q. Li, D. Chen, Efficient Tag Identification in Mobile RFID Systems, in Proceedings of the IEEE International Conference (INFOCOM' 10), San Diego, 2010, pp [10]. J. Vales-Alonso, M. V. Bueno-Delgado, E. Egea- López, J. J. Alcaraz-Espín, J. García-Haro, Markovian model for Computation of Tag Loss Ratio in Dynamic RFID Systems, in Proceedings of the 5 th European Workshop on RFID Systems and Technologies, Bremen, Germany, 2009, pp [11]. J. Vales-Alonso, M. V. Bueno-Delgado, E. Egea- López, J. J. Alcaraz-Espín, J. M. Pérez-Mañil, On the Optimal Identification of Tag Sets in Timeconstrained RFID Configurations, Sensors, Vol. 11, 2011, pp [12]. V. Sarangan, M. R. Devarapalli, and S. Radhakrishnan, A framework for fast RFID tag reading in static and mobile environments, Computer Networks, Vol. 52, 2008, pp [13]. H. Vogt, Efficient Object Identification with Passive RFID Tag, in Proceedings of the IEEE International Conference on Systems, 2002, pp Copyright, International Frequency Sensor Association (IFSA). All rights reserved. ( 86
Grouping Based Dynamic Framed Slotted ALOHA for Tag Anti-Collision Protocol in the Mobile RFID Systems
Appl. Math. Inf. Sci. 7, No. 2L, 655-659 (2013) 655 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/072l40 Grouping Based Dynamic Framed Slotted ALOHA
More informationNovel Tag Anti-collision Algorithm with Adaptive Grouping
Wireless Sensor Network, 2009, 1, 475-481 doi:10.4236/wsn.2009.15057 Published Online December 2009 (http://www.scirp.org/journal/wsn). Novel Tag Anti-Collision Algorithm with Adaptive Grouping Abstract
More informationA simulation study on the energy efficiency of pure and slotted Aloha based RFID tag reading protocols
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 9 A simulation study on the energy efficiency of pure and slotted Aloha
More informationMissing Tag Identification in Blocker-enabled RFID Systems
Missing Tag Identification in locker-enabled RFID Systems Xia Wang, Jia Liu, Feng Zhu, Yanyan Wang and Lijun Chen State Key Laboratory for Novel Software Technology, Nanjing University, China College of
More informationRFID reader-tag communication throughput analysis using Gen2 Q-algorithm frame adaptation scheme
RFID reader-tag communication throughput analysis using Gen2 Q-algorithm frame adaptation scheme Petar Šolić, Matko Šarić, and Maja Stella Abstract Dynamic Frame Slotted ALOHA (DFSA) is widely used Medium
More informationMissing Tag Identification in Open RFID Systems
Missing Tag Identification in Open RFID Systems Yanyan Wang, Jia Liu, Xia Wang, Feng Zhu, and Lijun Chen State Key Laboratory for Novel Software Technology, Nanjing University, China Email: wangyanyan@smail.nju.edu.cn,
More informationRFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas
RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas 1 RFID Tutorial Outline Introduction RFID System Tags Readers Data link layer Modulation Encoding Anti-Collision
More informationOn the Accuracy of RFID Tag Estimation Functions
University of Wollongong Research Online Faculty of Informatics - Papers Faculty of Informatics 27 On the Accuracy of RFID Tag Estimation Functions D. K. Klair University of Wollongong K. Chin University
More informationOn the Accuracy of RFID Tag Estimation Functions
1 On the Accuracy of RFID Tag Estimation Functions Dheeraj K. Klair, Kwan-Wu Chin and Raad Raad Telecommunications Information Technology Research Institute University of Wollongong orthfields Avenue,
More informationApplications of Fast-Moving RFID Tags in High-speed Railway Systems
Applications of Fast-Moving RFID Tags in High-speed Railway Systems Xiaoqiang Zhang and Manos Tentzeris Xiaoqiang Zhang is with the School of Logistics, Southwest Jiaotong University, Sichuan, China and
More informationabhisam RFID Discover the power of e-learning!
RFID Introduction : Radio Frequency Identification Technology (RFID in short) is the hottest new technology today, with applications ranging from car parking systems to hospitals and supply chain management.
More informationEfficient and Reliable Estimation of Tags in RFID Systems
Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Efficient and Reliable Estimation of Tags in RFID Systems Xu Huang Abstract
More informationThe Monitoring System of Marine Refrigerated Containers Based on RFID Temperature Tags
Research Journal of Applied Sciences, Engineering and Technology 5(8): 2551-2555, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 31, 2012 Accepted: September
More informationAn Architecture for the Agricultural Machinery Intelligent Scheduling in Cross-Regional Work Based on Cloud Computing and Internet of Things
An Architecture for the Agricultural Machinery Intelligent Scheduling in Cross-Regional Work Based on Cloud Computing and Internet of Things Sun Zhiguo 1,2, Xia Hui 3, and Wang Wensheng 1,2 1 Agricultural
More informationConstructing the Process Models for the Traceability of Rice Production and Distribution
Constructing the Process Models for the Traceability of Rice Production and Distribution Huei-Huang CHEN Department of Information Management, Tatung University No.40, Sec. 3, Chungshan North Road, Taipei,
More informationIntroduction to RFID
Introduction to RFID Hu Hai Year 1 Mphil Student 2004. 09. 11 1. What is RFID? Radio frequency identification, or RFID, is a generic term for that use radio waves to automatically identify people or objects.
More informationUnified Q-ary Tree for RFID Tag Anti-Collision Resolution
Unified Q-ary Tree for RFID Tag Anti-Collision Resolution Prapassara Pupunwiwat Bela Stantic Institute of Integrated and Intelligent Systems Griffith University, Gold Coast Campus Queensland 4222, Australia
More informationOutbound Delivery Using RFID in Sap System
Outbound Delivery Using RFID in Sap System Sheng Wang, Dong Wang Class B0303395 School of Software Shanghai Jiao Tong University Shanghai, China 800 Dong Chuan Road Phone: 086-021-62933040; 086-13764599933
More informationDesign and Implementation of Parent fish Breeding Management System Based on RFID Technology
Design and Implementation of Parent fish Breeding Management System Based on RFID Technology Yinchi Ma 1, 2, Wen Ding 1, 2 1 Beijing Fisheries Research Institute, Beijing, 100068, China 2 National Engineering
More informationLaboratory Management Based on Internet of Things. Jianming Huang
Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on
More informationRFID as an Infrastructure
Yan Qiao, Shigang Chen, Tao Li RFID as an Infrastructure Monograph August 28, 2012 Springer Chapter 1 Introduction Abstract RFID (radio frequency identification) tags are becoming ubiquitously available
More informationSecurity issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks
Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Arif Sari School of Applied Sciences, Department of Management Information Systems, European University
More informationExtending Birthday Paradox Theory to Estimate the Number of Tags in RFID Systems
Extending Birthday Paradox Theory to Estimate the Number of Tags in RFID Systems Masoud Shakiba 1,2 *, Mandeep Jit Singh 1, Elankovan Sundararajan 2, Azam Zavvari 1,2, Mohammad Tariqul Islam 1 1 Department
More informationUbiquitous Sensor Network System
TOMIOKA Katsumi, KONDO Kenji Abstract A ubiquitous sensor network is a means for realizing the collection and utilization of real-time information any time and anywhere. Features include easy implementation
More informationThreshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems
DOI 10.1007/s10796-009-9209-5 Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems Ching-Hsien Hsu & Han-Chieh Chao & Jong Hyuk Park # Springer
More informationUHF-RFID solutions for logistics units management in the food supply chain
UHF-RFID solutions for logistics units management in the food supply chain Paolo Barge, Paolo Gay, Valentina Merlino, Cristina Tortia DI.S.A.F.A Università degli Studi di Torino, Grugliasco (TO), Italy
More informationQuality Monitoring Traceability Platform of Agriculture products Cold Chain Logistics Based on the Internet of Things
517 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Editors: Peiyu Ren, Yancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The
More informationAN APPLICATION OF RFID IN MONITORING AGRICULTURAL MATERIAL PRODUCTS
A APPLICATIO OF RFID I MOITORIG AGRICULTURAL MATERIAL PRODUCTS Jianhui Du 1, 2, Peipei Li 1, Wanlin Gao 1,*, Dezhong Wang 1, Qing Wang 1, ilong Zhu 1 1 College of Information and Electrical Engineering,
More informationImplementation and Design of Digital System for High Frequency RFID Tag Chip
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Implementation and Design of Digital System for High Frequency RFID Tag Chip Wenwen Zhang, * Weiping Jing, Bin Jiang antong
More informationThe Research of Middleware Architecture of Intelligent Logistics System Based on SOA
American Journal of Software Engineering and Applications 2015; 4(6): 115-120 Published online October 23, 2015 (http://www.sciencepublishinggroup.com/j/ajsea) doi: 10.11648/j.ajsea.20150406.13 ISSN: 2327-2473
More informationRAIN Radio Protocol. December 2015
RAIN Radio Protocol December 2015 Background RAIN reader tag communications use the UHF Gen2 radio protocol. The MIT Auto-ID Center pioneered the early work on the UHF Gen2 protocol in 2002, transitioning
More informationINTELLIGENT LOGISTICS SYSTEM BASED ON THREE-TIER ARCHITECTURE AND RFID
INTELLIGENT LOGISTICS SYSTEM BASED ON THREE-TIER ARCHITECTURE AND RFID 1 DONG HUANG, 2 HE WEI 1 School of Mathematics and Computers Science, Qinzhou University, Qinzhou 535000,China 2 Jiaxing Vocational
More informationAdvance Automatic Toll Collection & Vehicle Detection During Collision using RFID
Advance Automatic Toll Collection & Vehicle Detection During Collision using RFID Akshay Bhavke Dept. of Electronics & Telecommunication Fr. C. Rodrigues Institute of Technology Vashi, Navi Mumbai, Maharashtra-400703,
More informationImplementation of Embedded System Using RFID and Alcohol Sensor at the Toll Plaza
Implementation of Embedded System Using RFID and Alcohol Sensor at the Toll Plaza Abdulshabaz 1, K. Mounika 2, B. Krishna 3, K.J.Arvind chary 4 Student, Dept. of E.C.E, KITE College of Professional Engineering
More informationRFID-Based Inventory and Security System
RFID-Based Inventory and Security System Wael Abu Shehab 1 Ghadeer Al-Shabaan 1 Wael Al-Sawalmeh 2 1.Department of Electrical Engineering, College of Engineering, Al-Hussein Bin Talal University, 71111
More information9. Verification, Validation, Testing
9. Verification, Validation, Testing (a) Basic Notions (b) Dynamic testing. (c) Static analysis. (d) Modelling. (e) Environmental Simulation. (f) Test Strategies. (g) Tool support. (h) Independent Verification
More informationAn RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises
An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises Turcu, Cristina Elena Prodan, Remus Catalin Popa, Valentin 14 th December 2005
More informationResearch on Regional Logistics Industry Development Strategy Based on System Dynamics: Take Changzhou as a Case
3rd International Conference on Management Science and Management Innovation (MSMI 2016) Research on Regional Logistics Industry Development Strategy Based on System Dynamics: Take Changzhou as a Case
More informationApplying RFID Hand-Held Device for Factory Equipment Diagnosis
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Applying RFID Hand-Held Device for Factory Equipment Diagnosis Kai-Ying Chen,
More informationAnimal Radio Frequency Identification: Low Frequency Advanced Transponder with flexible memory organization
Animal Radio Frequency Identification: Low Frequency Advanced Transponder with flexible memory organization Pieter Hogewerf (IMA-Wageningen) ISO TC23\SC19\WG3 (Animal) Identification ICAR approved ISO
More informationSIMULATION AND VISUALIZATION OF AUTOMATED GUIDED VEHICLE SYSTEMS IN A REAL PRODUCTION ENVIRONMENT
SIMULATION AND VISUALIZATION OF AUTOMATED GUIDED VEHICLE SYSTEMS IN A REAL PRODUCTION ENVIRONMENT Axel Hoff, Holger Vogelsang, Uwe Brinkschulte, Oliver Hammerschmidt Institute for Microcomputers and Automation,
More informationSimulation based Performance Analysis of an End-of-Aisle Automated Storage and Retrieval System
Simulation based Performance Analysis of an End-of-Aisle Automated Storage and Retrieval System Behnam Bahrami, El-Houssaine Aghezzaf and Veronique Limère Department of Industrial Management, Ghent University,
More informationINDIAN INSTITUTE OF MATERIALS MANAGEMENT Post Graduate Diploma in Materials Management PAPER 18 C OPERATIONS RESEARCH.
INDIAN INSTITUTE OF MATERIALS MANAGEMENT Post Graduate Diploma in Materials Management PAPER 18 C OPERATIONS RESEARCH. Dec 2014 DATE: 20.12.2014 Max. Marks: 100 TIME: 2.00 p.m to 5.00 p.m. Duration: 03
More informationThe Application of Agile Management in Software Project
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 The Application of Agile Management in Software Project Zheng HAN a* and Zhong YAO School of Economics
More informationUncertainty of the pebble flow to power peak factor
IAEA Technical Meeting on Re-evaluation of Maximum Operating Temperatures and Accident Conditions for High Temperature Reactor (HTR) Fuel and Structural Materials Uncertainty of the pebble flow to power
More informationPermanent parts marking on aircraft components. Utilization in MRO-Processes and on OEM units manufactured by LH Technik
Permanent parts marking on aircraft components Utilization in MRO-Processes and on OEM units manufactured by LH Technik Product Divisions of the Lufthansa Technik Group to enhance the solutions for our
More informationThe Full Range for RFID
Your Global Automation Partner The Full Range for RFID Turck is a global leader in industrial automation technology. Over 4,000 employees in 28 countries strive to deliver the best sensor, connectivity,
More informationThe Application used RFID in Third Party Logistics
Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 2045 2049 2012 International Conference on Solid State Devices and Materials Science The Application used RFID in Third Party Logistics
More informationLegal Aspects of RFID Technology
Legal Aspects of RFID Technology Jürgen Müller University of Kassel Provet Project Team for Constitutionally Compatible Technology Design Matthias Handy University of Rostock Institute of Applied Microelectronics
More informationComparative Method for Indirect Sensitivity Measurement of UHF RFID Reader with Respect to Interoperability and Conformance Requirements
Comparative Method for Indirect Sensitivity Measurement of UHF RFID Reader with Respect to Interoperability and Conformance Requirements Lukas KYPUS, Lukas VOJTECH Department of Telecommunication Engineering,
More informationSimulation Study Based on OpenTrack on Carrying Capacity in District of Beijing-Shanghai High-speed Railway
Applied Mechanics and Materials Online: 2014-01-16 ISSN: 1662-7482, Vols. 505-506, pp 567-570 doi:10.4028/www.scientific.net/amm.505-506.567 2014 Trans Tech Publications, Switzerland Simulation Study Based
More informationRouting Optimization of Fourth Party Logistics with Reliability Constraints based on Messy GA
Journal of Industrial Engineering and Management JIEM, 2014 7(5) : 1097-1111 Online ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.1126 Routing Optimization of Fourth Party Logistics
More informationSIMULATION METHOD FOR RELIABILITY ASSESSMENT OF ELECTRICAL DISTRIBUTION SYSTEMS
SIMULATION METHOD FOR RELIABILITY ASSESSMENT OF ELECTRICAL DISTRIBUTION SYSTEMS Johan Setréus, Lina Bertling, Shima Mousavi Gargari KTH, School of Electrical Engineering, Stockholm, Sweden johan.setreus@ee.kth.se
More informationThe Preemptive Stocker Dispatching Rule of Automatic Material Handling System in 300 mm Semiconductor Manufacturing Factories
Journal of Physics: Conference Series PAPER OPEN ACCESS The Preemptive Stocker Dispatching Rule of Automatic Material Handling System in 300 mm Semiconductor Manufacturing Factories To cite this article:
More informationSIMATIC RF630L Smartlabel 1. SIMATIC Sensors. RFID systems SIMATIC RF630L Smartlabel. Operating Instructions 06/2009 J31069-D0186-U001-A4-7618
1 SIMATIC Sensors RFID systems Operating Instructions 06/2009 J31069-D0186-U001-A4-7618 Legal information Warning notice system This manual contains notices you have to observe in order to ensure your
More informationBasics of EPC. Training
Basics of EPC Training Introduction Objectives: - Create awareness of the concepts - Develop technical knowledge - Show benefits of implementation - Explain 5 steps of Implementation 2 Programme Introduction
More informationDesign and Realization of the Automatic Gear Machining System
5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015) Design and Realization of the Automatic Gear Machining System Hui Qian 1, a, Nanyan Shen 1,b*,Ran Ju 1,c and
More informationSummary. CAEN group overview. CAEN RFID products. Cold Chain Case Histories
RFID Conference in Struer, 12-13th October 2011 Summary CAEN group overview CAEN RFID products Cold Chain Case Histories CAEN: from High Energy Physics to RFID Founded in 1980, Headquarters in Viareggio
More informationRFIDPlanner A Coverage Planning Tool for RFID Networks
RFIDPlanner A Coverage Planning Tool for RFID Networks DDP Thesis Presentation by Nitesh Gupta Under the guidance of Prof. Sridhar Iyer Radio Frequency Identification or RFID Technology Uses radio frequency
More informationExpert System Applied to High-Speed Railway Track Circuit Coding and Its Simulation
Expert System Applied to High-Speed Railway Track Circuit Coding and Its Simulation Yan Li, Dewang Chen, and Xuan Yang State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University,
More informationChanges of Clothing Distribution Logistics Management RFID Technology
Science Journal of Business and Management 2016; 4(3): 72-76 http://www.sciencepublishinggroup.com/j/sjbm doi: 10.11648/j.sjbm.20160403.12 ISSN: 2331-0626 (Print); ISSN: 2331-0634 (Online) Changes of Clothing
More informationSIWAREX FTC-B Weighing Module for Belt Scales Set-up of SIWAREX FTC with SIWATOOL FTC_B
SIWAREX FTC-B Weighing Module for Belt Scales Set-up of SIWAREX FTC with SIWATOOL FTC_B Quick Guide For modules with order number 7MH4900-3AA01 1 Hardware Requirements... 3 2 Connections... 5 3 SIWATOOL
More informationResearch Article Food Safety Tag Anti-collision Control Based on Collision Detection
Advance Journal of Food Science and Technology 9(5): 35-356, 205 DOI: 0.9026/ajfst.9.94 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Submitted: March 7, 205 Accepted: March
More informationApplication Note. Document Tracking
Application Note Document Tracking Recognizing the need to be able to use RFID technology to track items that have been placed very close together led Magellan to develop its Stack- Tag technology. This
More informationAUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL
AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL D.P.Anusuya,Asst.Professor, Karpapga Vinayaga College of Engineering and Technology, Madhrandagam,Chennai,India. anu.krish1988@gmail.com
More informationImplementation and Application of RFID EPC Information Service for Forward and Reverse Logistics
Implementation and Application of RFID EPC Information Service for Forward and Reverse Logistics Shih-Chih Chen, Ph.D. Student, Tatung University, Taiwan Huei-Huang Chen, Professor, Tatung University,
More informationStackelberg Game Model of Wind Farm and Electric Vehicle Battery Switch Station
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Stackelberg Game Model of Wind Farm and Electric Vehicle Battery Switch Station To cite this article: Zhe Jiang et al 2017 IOP
More informationProduction Management Modelling Based on MAS
International Journal of Automation and Computing 7(3), August 2010, 336-341 DOI: 10.1007/s11633-010-0512-x Production Management Modelling Based on MAS Li He 1 Zheng-Hao Wang 2 Ke-Long Zhang 3 1 School
More informationMethod of Optimal Scheduling of Cascade Reservoirs based on Improved Chaotic Ant Colony Algorithm
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Method of Optimal Scheduling of Cascade Reservoirs based on Chaotic Ant Colony Algorithm 1 Hongmin Gao, 2 Baohua Xu, 1 Zhenli Ma, 1 Lin Zhang,
More informationGreenhouse Environment Monitoring System using Near Field Communication. (NFC) Technology
Greenhouse Environment Monitoring System using Near Field Communication (NFC) Technology Jun Wang 1, Tiansi Ren 1, Fu Zhang 1, Ronggang Xia 1, Zhaomei Qiu 1 1. College of agriculture Engineering, Henan
More informationSimulation of Supply Chain Management Based on the EPCglobal Enterprise Network
American Journal of Computer Science and Information Engineering 2015; 2(2): 7-14 Published online April 30, 2015 (http://www.aascit.org/journal/ajcsie) Simulation of Supply Chain Management Based on the
More informationGang Scheduling Performance on a Cluster of Non-Dedicated Workstations
Gang Scheduling Performance on a Cluster of Non-Dedicated Workstations Helen D. Karatza Department of Informatics Aristotle University of Thessaloniki 54006 Thessaloniki, Greece karatza@csd.auth.gr Abstract
More informationApplying Robust Optimization to MISO Look- Ahead Commitment
Applying Robust Optimization to MISO Look- Ahead Commitment Yonghong Chen, Qianfan Wang, Xing Wang, and Yongpei Guan Abstract Managing uncertainty has been a challenging task for market operations. This
More informationResearch and Application Study on Accident-Based 3D Power Station Simulation Technology
International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) Research and Application Study on Accident-Based 3D Power Station Simulation Technology Tie Li, Xiaoming
More informationOPTIMAL ALLOCATION OF WORK IN A TWO-STEP PRODUCTION PROCESS USING CIRCULATING PALLETS. Arne Thesen
Arne Thesen: Optimal allocation of work... /3/98 :5 PM Page OPTIMAL ALLOCATION OF WORK IN A TWO-STEP PRODUCTION PROCESS USING CIRCULATING PALLETS. Arne Thesen Department of Industrial Engineering, University
More informationRFID, Web-Based, and Artificial Intelligence Integration in Facilities Management
RFID, Web-Based, and Artificial Intelligence Integration in Facilities Management Chien-Ho Ko Department of Civil Engineering, National Pingtung University of Science and Technology, Taiwan E-mail: ko@mailnpustedutw
More informationMulti Token Based Location Sharing for Multi UAV Systems
Multi Token Based Location Sharing for Multi UAV Systems Eyup Emre Ulku*, Ilker Bekmezci ASTIN, Computer Engineering Department, Istanbul, Turkey. Turkish Air Force Academy, Computer Engineering Department,
More informationOPERATING SYSTEMS. Systems and Models. CS 3502 Spring Chapter 03
OPERATING SYSTEMS CS 3502 Spring 2018 Systems and Models Chapter 03 Systems and Models A system is the part of the real world under study. It is composed of a set of entities interacting among themselves
More informationTest and Analysis of Metallurgical Converter Equipment
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Test and Analysis of Metallurgical Converter Equipment Shan Pang College of Mechanical and Electrical Engineering, Xinxiang University, Xinxiang
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 24753 First edition 2011-09-01 Information technology Radio frequency identification (RFID) for item management Application protocol: encoding and processing rules for sensors
More informationCHAPTER 1 INTRODUCTION This chapter briefly discuss on the overview of this research. It contains five sections. The first section is introduction; follow by the problem statement. Next are the objectives
More informationA GATE SENSOR FOR CONSTRUCTION LOGISTICS
A GATE SENSOR FOR CONSTRUCTION LOGISTICS Woo-Jae Lee plum_80@naver.com Soon-Wook Kwon swkwon@skku.edu Cheolho Choi Doalltech Sae-myung B/D 770-11, Yeoksam-Dong, Gangnam-Gu, Seoul, Korea 135-928 choi@doalltech.com
More informationAnalyzing Customer Behavior and Decisions in Saudi Arabia Hotel Industry
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:05 8 Analyzing Customer Behavior and Decisions in Saudi Arabia Hotel Industry Rami H. Alamoudi Department of Industrial Engineering
More informationReliability Analysis of the Railway Time Synchronization Network Based on Bayesian
, pp.59-72 http://dx.doi.org/10.14257/ijca.2015.8.10.06 Reliability Analysis of the Railway Time Synchronization Network Based on Bayesian Youpeng Zhang, Feng Wang, Shan Zhang and Li Lan School of Automation
More informationAvonwood Developments Ltd. Tel: +44 (0) Fax: +44 (0) Web:
RFID For Inventory Control & Security Presented By: Avonwood Developments Ltd. Avonwood Developments Ltd. Innovative products and services for identification and asset management under the brand name Eureka
More informationProject: Simulation of parking lot in Saint-Petersburg Airport
Project: Simulation of parking lot in Saint-Petersburg Airport worked by: Khabirova Maja Course: 4IT496 SImulation of Systems VŠE, FIS-KI 2012 1. Problem definition 1.1 Introduction Anyone who has ever
More informationA Secured Mutual Authentication Protocol For RFID System
A Secured Mutual Authentication Protocol For RFID System Rajarshi Roy Chowdhury, Md. Abdul Awal Ansary Abstract: Contactless automatic RFID system is intended to replace existing barcode scheme, since
More informationSystem Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network Shin-ichi Kuribayashi 1 and Yasunori Osana 1 1 Department of Computer and Information Science, Seikei University,
More informationLetter Report: An RFID-enabled Warehouse at DRDC Valcartier
Letter Report: An RFID-enabled Warehouse at DRDC Valcartier Prepared for: Resources Management, DRDC Valcartier From: Qinghan Xiao, Network Information Operations Section, DRDC Ottawa Date: April 16, 2010
More informationLecture 3: Use Case Modeling for Real-Time Embedded Systems
SWE 760 Lecture 3: Use Case Modeling for Real-Time Embedded Systems Hassan Gomaa Department of Computer Science George Mason University Email: hgomaa@gmu.edu References: H. Gomaa, Chapter 6 - Real-Time
More informationCOMPUTATIONAL ANALYSIS OF A MULTI-SERVER BULK ARRIVAL WITH TWO MODES SERVER BREAKDOWN
Mathematical and Computational Applications, Vol. 1, No. 2, pp. 249-259, 25. Association for cientific Research COMPUTATIONAL ANALYI OF A MULTI-ERVER BULK ARRIVAL ITH TO MODE ERVER BREAKDON A. M. ultan,
More informationPrivacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader
Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader Byunggil Lee and Howon Kim Electronics and Telecommunications Research Institute bglee@etri.re.kr Abstract
More informationAutomated link analysis using radio frequency identification (RFID)
Loughborough University Institutional Repository Automated link analysis using radio frequency identification (RFID) This item was submitted to Loughborough University's Institutional Repository by the/an
More informationRef:
Emad Ebeid Ph.D. student @ CS depart University of Verona, Italy Emad.Ebeid@univr.it Davide Quaglia Assistant Professor @ CS depart University of Verona, Italy Davide.Quaglia@univr.it Ref: www.it.iitb.ac.in/~sri/talks/rfid-05.ppt
More informationAnalysis and simulation of one worker with multi-machine mode
Advanced Materials Research Online: 2014-02-06 ISSN: 1662-8985, Vols. 889-890, pp 1227-1230 doi:10.4028/www.scientific.net/amr.889-890.1227 2014 Trans Tech Publications, Switzerland Analysis and simulation
More informationThe access control system of the Vatican City State
The access control system of the Vatican City State F. Garzia 1, E. Sammarco 2, R. Cusani 1 1 INFOCOM Department University of Rome La Sapienza, Italy 2 General Direction of Safety, Security and Civil
More informationENEA, Italian National Agency for New Technologies, Energy and Sustainable Economic Development Bologna, Italy
Open issues associated with passive safety systems reliability assessment L. Burgazzi ENEA, Italian National Agency for New Technologies, Energy and Sustainable Economic Development Bologna, Italy Abstract.
More informationChinese Herbal Medicine Warehouse Management and Control Integration System Design
G.J. E.D.T.,Vol.5(4):1-7 (July-August, 2016) ISSN: 2319 7293 Chinese Herbal Medicine Warehouse Management and Control Integration System Design Zhang Ke-wei 1, Fan Hong-yan 1 & Dou Xin-xin 2 1 School of
More informationRETAIL. Innovation for All Retail
RETAIL Innovation for All Retail RETAIL e satisfy globally the Retailers Auto-ID business needs, from the Distribution Center to the Checkout and the Shoppers Home, with a uniquely innovative product and
More informationThe Application of Data Mining Technology in Building Energy Consumption Data Analysis
The Application of Data Mining Technology in Building Energy Consumption Data Analysis Liang Zhao, Jili Zhang, Chongquan Zhong Abstract Energy consumption, in particular those involving public buildings,
More information