2009 International Conference on New Trends in Information and Service Science 2009
DOI: 10.1109/niss.2009.231
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Control Method to Reduce Collisions and Interferences between Multiple RFID Readers and RFID Tag

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…To get a messaging app that has good performance such as speed and security and can be used on mobile devices, now you can use the Application Telegram, the Telegram messages can be synchronize on all computer equipment, including mobile equipment (Kamoun, 2009;Kim, Park, & Lee. 2009;Said, et.al.2014;Rusok, et.al.…”
Section: Telegram Messengermentioning
confidence: 99%
“…To get a messaging app that has good performance such as speed and security and can be used on mobile devices, now you can use the Application Telegram, the Telegram messages can be synchronize on all computer equipment, including mobile equipment (Kamoun, 2009;Kim, Park, & Lee. 2009;Said, et.al.2014;Rusok, et.al.…”
Section: Telegram Messengermentioning
confidence: 99%
“…Other approaches such as HiQ in [11] use an analysis of collision patterns over consecutive time-slots to improve scheduling policies. Regarding coverage-based algorithms, two types of scheme can be commonly found: those that reduce the overlapping coverage area between readers (e.g., [12]), and those that monitor interference to adapt power levels accordingly (e.g., [4]). …”
Section: Rfid Technology and Previous Workmentioning
confidence: 99%
“…Multipath efficiency [12], NLOS may result in failure of selecting tags and even worse lead to discontinuities in the target's trajectory in the process of tracking device-free target. To solve this problem, paper [14] proposed a cleaning strategy based on the probability model.…”
Section: Filling Of Missing Pathmentioning
confidence: 99%