2011
DOI: 10.1109/tii.2011.2158831
|View full text |Cite
|
Sign up to set email alerts
|

Multiframe Maximum-Likelihood Tag Estimation for RFID Anticollision Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
54
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(54 citation statements)
references
References 24 publications
0
54
0
Order By: Relevance
“…(2) and (3), the optimal frame size for all tag backlog can be derived. It is noted that the authors in [12] provide another Q-selection method with can yield the same result. But our scheme is simpler without multiple loop iterations.…”
Section: System Model and Algorithm Descriptionmentioning
confidence: 79%
See 1 more Smart Citation
“…(2) and (3), the optimal frame size for all tag backlog can be derived. It is noted that the authors in [12] provide another Q-selection method with can yield the same result. But our scheme is simpler without multiple loop iterations.…”
Section: System Model and Algorithm Descriptionmentioning
confidence: 79%
“…According to Schoute's method [2], the estimated tag quantity of a full frame can be given as n est = S + 2.39C, where S and C are the number of successful and collision slots at the end of current identification round. Different to the existing solutions [3] [11][12] where the tag quantity is estimated by the previous full frame, we propose an algorithm to estimate the tag quantity by only using a fraction (also called detected sector F ds ) of the current frame. The estimated tag quantity can be given as…”
Section: B the Backlog Estimation Methodsmentioning
confidence: 99%
“…It defines an MAC mechanism for RFID readers working at UHF that organize the tags responses by a Frame Slotted Aloha (FSA) protocol [32], controlled by the reader. This is a very simple mechanism with a low rate of identification, which has led the scientific community to propose new alternatives compatible with the standard that significantly increase the rate of identified tags per time unit [33][34][35][36].…”
Section: Agents At the Rfid Medium Access Controlmentioning
confidence: 99%
“…It is recommended to use bistatic antennas, with circular polarization, and a distance between the reader and the reader antennas (cable) less than 5 m. The reader will have at least 4 I/O ports, and it will work to the maximum output power according to the ITU region where it is operating. The reader-to-tag communication protocol must be EPCglobal Class-1 Gen-2 [31] or an improved version, compatible with the standard, that permits to modify the frame-length parameter (Q) [32][33][34]. Readers must implement a reader-toreader anti-collision protocol based on FHHS or a similar technique, being compatible with the current standard [31].…”
mentioning
confidence: 99%
“…This technology has recently seen growing interest from a wide range of industries such as retail, pharmaceutical, and logistics [18][19][20][21]. In these domains, RFID technology holds the promise eliminating many existing business problems by bridging the economically costly gap between the virtual world of IT systems and the real world of products and logistical units.…”
Section: Introductionmentioning
confidence: 99%