1975
DOI: 10.1109/proc.1975.9928
|View full text |Cite
|
Sign up to set email alerts
|

Short-range radio-telemetry for electronic identification, using modulated RF backscatter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(32 citation statements)
references
References 1 publication
0
32
0
Order By: Relevance
“…There could mainly be two reasons for the offsets. One is the indoor multi-path effects of electromagnetic wave propagation [19][20][21], which reduces the accuracy of the free space Friis electromagnetic wave propagation equation that has been utilized in (1) and (5). The other one is the inherent SNR uncertainty of the nor-correlate demodulation scheme as discussed in Section 3.…”
Section: Design Example and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…There could mainly be two reasons for the offsets. One is the indoor multi-path effects of electromagnetic wave propagation [19][20][21], which reduces the accuracy of the free space Friis electromagnetic wave propagation equation that has been utilized in (1) and (5). The other one is the inherent SNR uncertainty of the nor-correlate demodulation scheme as discussed in Section 3.…”
Section: Design Example and Resultsmentioning
confidence: 99%
“…based on the operational principles of wireless power transmission [2] and backscatter communication [3][4][5]. The reader transmits electromagnetic waves into air and the tag draws operational energy from the radiation fields.…”
Section: Introductionmentioning
confidence: 99%
“…The latter scenario occurs when a) a single tag passes within working range of the interrogator [8], as in toll collection scenarios or b) tags are equipped with receivers and can be addressed individually [17], or in groups with the help of a tree-based anti-collision algorithm (e.g. see [11]).…”
Section: The Sensors Accessmentioning
confidence: 99%
“…Continuous sensor operation: All sensors in this work continuously backscatter their information. As such, the presented system contrasts with prior systems designed to acquire information from a subset of tags (or a single tag) within a fraction of time and not continuously (see for example pioneering RFID work in [8]). iv.…”
Section: Introductionmentioning
confidence: 99%
“…We note that from the perspective of modulation and access scheme, our system is radically different than that proposed in [5], where amplitude modulation was used to detect high bit-rate information from a single rapidly moving tag, or work in [6] where a simple receiver at each tag allowed individual interrogation of each tag from the reader (hub) at each time interval. Our system is designed to interrogate several, low-bit rate sensors continuously and simultaneously.…”
Section: B Sensors Access and Subcarrier Modulationmentioning
confidence: 99%