“…To solve the multi-Tag collision problem in batch identification of RFID Tags, In [1], Tanee Demeechai et al improved the reading efficiency of RFID systems without causing bandwidth expansion by introducing the code division multiple access technique in the framework of [2,3] (ISOC standard), but the data format of Tag answer frames is not compatible with existing international standards and difficult to commercialize.In [4,5], Hsin-chin Liu et al proposed a multi-carrier UHF passive RFID system by combining the frequency division multiple access technique, which improved the identification efficiency of the system while causing bandwidth expansion and low identification efficiency improvement.In [6], Fischer M et al used the forward link frequency of the RFID system by fixing the forward link frequency and using the respective subcarrier frequency in the return link, using In [7], Blind Source Separation (BSS) can be used to separate collision signals, which was improved by Dr Yue Keqiang through the Under-blind positioning (anti-NMT) algorithm, when the number of Tags is twice as many as the number of antennas The performance of this algorithm becomes significantly worse when the number of Tags is twice the number of antennas, and the number of antennas cannot be increased indefinitely, which limits the performance of the anti-NMT algorithm.Recently,In [8],Qing-Yuan Miao et al introduced NOMA into the tag recognition process to improve the system performance, but the performance is poor in the case of dense tag distribution. In [9], Kaimin Guo; Xin Xie et al proposed a priority-based tag identification (PTI) protocol for RFID systems that enables readers to detect tags with the highest priority by using a priority queueing technique, which is a single-tag identification approach with limited performance improvement. In [10], H. Shiomi applies CDMA blind inverse diffusion with independent component analysis to RFID uplink signals collision avoidance technology, which requires only one antenna and one query SIC has multi-user access capability and can be easily adapted to other multiple access technologies for common use, which is complementary to the Aloha algorithm with good compatibility.…”