2022
DOI: 10.1109/tmc.2020.3024076
|View full text |Cite
|
Sign up to set email alerts
|

Capture-Aware Identification of Mobile RFID Tags With Unreliable Channels

Abstract: Yongrui (2020) Capture-aware identification of mobile RFID tags with unreliable channels. IEEE Transactions on Mobile Computing.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
31
0
1

Year Published

2022
2022
2025
2025

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(32 citation statements)
references
References 49 publications
0
31
0
1
Order By: Relevance
“…is paper evaluates the performance of our proposed EFB-ACA algorithm, SUBF-DFSA, ERE-ABS, DS-MAP, and LC-DFSA in the error-prone channel. To maintain the convergence, Monte Carlo method is used in the simulations [18][19][20][21]. Figure 1 compares the convergence phase duration of various algorithms in error-prone channel.…”
Section: Experimental Studymentioning
confidence: 99%
“…is paper evaluates the performance of our proposed EFB-ACA algorithm, SUBF-DFSA, ERE-ABS, DS-MAP, and LC-DFSA in the error-prone channel. To maintain the convergence, Monte Carlo method is used in the simulations [18][19][20][21]. Figure 1 compares the convergence phase duration of various algorithms in error-prone channel.…”
Section: Experimental Studymentioning
confidence: 99%
“…There is also great progress in remote sensing positioning. In 2020, it has been proposed that Capture-aware identification of mobile RFID tags with unreliable channels [31];a partitioning approach to RFID identification [32] ; a time and energy saving based frame adjustment strategy (TES-FAS) tag identification algorithm for UHF RFID systems [33];Idle slots skipped mechanism based tag identification algorithm with enhanced collision detection [34];Redundant rule detection for software-defined networking [35].…”
Section: Introductionmentioning
confidence: 99%
“…Research related to emergencies involves public opinion [1][2][3], network security [4][5][6], and data mining analysis [7][8][9][10][11][12]. Ontology models have been widely used in the fields of knowledge engineering and natural language processing.…”
Section: Introductionmentioning
confidence: 99%