2017
DOI: 10.1109/lcomm.2017.2649490
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Easy-to-Implement Tag Identification Algorithm for UHF RFID Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
47
0
1

Year Published

2018
2018
2020
2020

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(50 citation statements)
references
References 10 publications
2
47
0
1
Order By: Relevance
“…e frame length L of the next frame is calculated according to (9). Because (16) needs to rely on the identification result of two frames, the parameters of the frame length L and SIDw of the first two frames are run according to the initial value and then calculated frame by frame.…”
Section: Mobile Information Systemsmentioning
confidence: 99%
See 3 more Smart Citations
“…e frame length L of the next frame is calculated according to (9). Because (16) needs to rely on the identification result of two frames, the parameters of the frame length L and SIDw of the first two frames are run according to the initial value and then calculated frame by frame.…”
Section: Mobile Information Systemsmentioning
confidence: 99%
“…In dynamic arrival scenarios, the miss rate is an important indicator for evaluating the reliability of the algorithm. e smaller the waiting time threshold, the greater the (12) if (SIDt � � SIDc and TagSate is Wait) (13) response RN16; (14) else if (Instruction is IndicateArrival) begin (15) if (SIDt � � SIDc and (TagSate is Wait or Arrival)) (16) response RN16; (17) else if (TagSate is NewArrival) begin (18) SIDt � Generate random slot number;/ * SIDt between SIDl + 1 and L. * / (19) Set TagSate to Arrival; (20) if(SIDt � � SIDc) (21) response RN16; (22) end (23) end (24) else if (Instruction is Ack) (25) if (RN16 is itself ) begin (26) Set IsIdentified to ture; (27) Set TagSate probability of tag miss. In general, when the miss rate of the algorithm is 0, all tags are guaranteed to be identified and the algorithm is considered to be reliable.…”
Section: Miss Ratementioning
confidence: 99%
See 2 more Smart Citations
“…M Mayer and N Goertz 19 designed a novel scheme of RFID tag identification with compressed sensing techniques, and simulations show that this new scheme significantly outperforms FSA protocol regarding identification speed and noise robustness. YR Chen et al 20 proposed a novel sub-frame-based DFSA protocol, which can improve the system utility to approximately 0.36 and reduce the computation complexity. V Namboodiri and LX Gao 21 proposed three novel protocols which combine the idea of binary tree search protocol with that of FSA protocol and developed an analytical framework to predict the performance of their protocols in terms of the average reader energy consumption, average tag energy consumption, and so on.…”
Section: Introductionmentioning
confidence: 99%