2015
DOI: 10.1016/j.asoc.2015.01.056
|View full text |Cite
|
Sign up to set email alerts
|

RFID reader-to-reader collision avoidance model with multiple-density tag distribution solved by artificial immune network optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…PSO was selected due to its almost similar characteristics with GSA and its application in the similar type of sputtering process [23][24][25], while GA was selected due to its adaptation in other type of sputtering processes [26][27][28]. As for AIS and ACO, these algorithms have been adapted in various engineering parameter optimization problems [29][30][31][32]. All of the algorithms were executed 30 times, with their average fitness values and processing times recorded as shown in Table 6.…”
Section: Resultsmentioning
confidence: 99%
“…PSO was selected due to its almost similar characteristics with GSA and its application in the similar type of sputtering process [23][24][25], while GA was selected due to its adaptation in other type of sputtering processes [26][27][28]. As for AIS and ACO, these algorithms have been adapted in various engineering parameter optimization problems [29][30][31][32]. All of the algorithms were executed 30 times, with their average fitness values and processing times recorded as shown in Table 6.…”
Section: Resultsmentioning
confidence: 99%
“…In most literatures [5,14,15,16,17,19], the interrogation range is defined as a perfect circumstance where the radius only depends on the reader’s output power. In this paper, we also follow this assumption as UHF RFID readers with known positions and passive RFID tags with fixed positions in centralized MRE:

Readers are randomly distributed over an area in two dimensions.

Any reader has only two states, active and inactive, where only the readers in active operate and interfere with other active ones.

The interference power from multiple interfering readers seen by the desired reader is additive.

…”
Section: Resource Allocation Model In Centralized Mre Under Epcglomentioning
confidence: 99%
“…Based on this, the number of time slots, the number of frequency channels and the position of readers are optimally allocated by using some heuristic algorithms such as genetic algorithm [12], swarm optimization algorithm [13] and artificial immune algorithms [14,15,16,17]. Among these, the artificial immune algorithms output the best performance when compared with other heuristic ones, the advantage of which is mainly embodied in outputting a larger interrogation range.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2013, localization precision of a passive RFID localization system has been improved by using sparsely distributed RFID tags (Yang et al, 2013). In 2014, Li and his group established an RFID reader-to-reader collision avoidance model with multiple-density tag distribution (R2RCAM-MTD) (Li et al, 2015). In Yu et al (2016b), Yu and his team used the Fisher matrix to theoretically prove that the distribution of the multi-tag does affect its reading performance.…”
Section: Introductionmentioning
confidence: 99%