2016
DOI: 10.1049/el.2015.3258
|View full text |Cite
|
Sign up to set email alerts
|

Fast fuzzy anti‐collision protocol for the RFID standard EPC Gen‐2

Abstract: A new methodology which integrates fuzzy logic with RFID anti-collision protocols is proposed. The resulting FuzzyQ protocol significantly decreases the identification time by updating the transmission frame size in a dynamic and adaptive way. Simulation results show the performance of FuzzyQ compared with earlier protocols based on the standard EPC Gen-2.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 3 publications
0
19
0
Order By: Relevance
“…Second, the article puts forward a mobile tag anti-collision method based on round priority (RPA) which solves the collisions between the first coming tags and subsequent coming ones. The simulation results show that our proposed method can identify tags without tag loss when the tag moving speed is not higher than 4 m per second and the length of the conveyor belt is 3 m. The method we proposed is superior to Q algorithm 12 and G2-CDFSA.…”
Section: Introductionmentioning
confidence: 94%
“…Second, the article puts forward a mobile tag anti-collision method based on round priority (RPA) which solves the collisions between the first coming tags and subsequent coming ones. The simulation results show that our proposed method can identify tags without tag loss when the tag moving speed is not higher than 4 m per second and the length of the conveyor belt is 3 m. The method we proposed is superior to Q algorithm 12 and G2-CDFSA.…”
Section: Introductionmentioning
confidence: 94%
“…It is noted that the reader needs to accurately estimate the backlog to achieve the best performance. To improve estimation accuracy, most previous methods [3][4][5] are implemented with high complexity. However, typical RFID readers are computation constrained due to the limited processing power provided by single-chip microprocessor.…”
Section: B Dfsa Protocol With Backlog Estimationmentioning
confidence: 99%
“…However, the system throughput of these solutions is still below 0.36. In addition, it is worth mentioning that most of existing DFSA studies are simulation based [3][4][5] [15][16][17], thus the practical performance cannot be verified.…”
Section: B Dfsa Protocol With Backlog Estimationmentioning
confidence: 99%
See 1 more Smart Citation
“…EPC Gen-2 is already dynamic in adjusting frame sizes based on a posterior knowledge of collusion slots in a given frame. For this work, we chose from popular tag estimation algorithms in the literature [22][23][24][25][26] which are: DFSA-I, DFSA-II [27], 2CTE method [28] and incorporated them with EPC Gen-2 to see if they can significantly improve its dynamic aspect and compare where they stand in terms of system efficiency with and without it. The performance of these tag estimation algorithms are also evaluated and compared with the performance of pure EPC Gen-2.…”
Section: Factors Considered For Choosing the Algorithmsmentioning
confidence: 99%