21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) 2007
DOI: 10.1109/ainaw.2007.286
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of RFID Anti-Collision Algorithm with FPGA Implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…In the downlink communication, the PIE (Pulse Interval Code) is used in the encoding course according to EPC protocol. As shown in Fig.1, Tari of PIE is the reference interval based on EPC protocol type A [2]. As one pulse of the above code can represent a number of binary symbols, it is more appropriate in high-speed transmission system [3].…”
Section: Fig 1 Base-band Transmission Model Of Rfid Systemmentioning
confidence: 99%
“…In the downlink communication, the PIE (Pulse Interval Code) is used in the encoding course according to EPC protocol. As shown in Fig.1, Tari of PIE is the reference interval based on EPC protocol type A [2]. As one pulse of the above code can represent a number of binary symbols, it is more appropriate in high-speed transmission system [3].…”
Section: Fig 1 Base-band Transmission Model Of Rfid Systemmentioning
confidence: 99%
“…In recent years, reader-talk-first (RTF) RFID tag identification protocols have seriously been investigated as new improvements in silicon technology and digital signal processing technology have mitigated or overcome the major shortcomings of RTF protocols: complex circuitry and reader interfe-rence problem, and the capability of RTF protocols on detecting large populations of tags in a short time period has been observed. RTF tag identification protocols are broadly classified into aloha-based schemes [3][4][5][6][7][8][9][10][11][12] and tree-based schemes [2,[13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29]. In aloha-based schemes [30,31], a reader predicts the number of current tags within its interrogation area and assigns estimated number of timeslots to all of the tags.…”
Section: Introductionmentioning
confidence: 99%
“…Based on RFID EPC protocol, using PIE-encoding and Miller-decoding technology [2], a kind of IP core based on RFID base-band process is designed, which has functions of high-speed encoding & decoding, internal task scheduling and data control while the RTL design based on moduler idea is given.…”
Section: Introductionmentioning
confidence: 99%