2021
DOI: 10.1186/s13677-021-00228-8
|View full text |Cite
|
Sign up to set email alerts
|

Suffix-based double reader tag movement RFID anti-collision method

Abstract: At present, some existing tag anti-collision algorithms are used mostly in scenarios of fixed number of tags and they perform poorly in tag moving scenarios. Therefore, this paper proposes a double reader tag movement RFID anti-collision method based on suffix, and through the cloud platform based on cloud computing, the supply chain data sharing is realized. Tag moving scenarios usually use a single reader. The proposed employs double reader to expand the recognition range and also to prolong the recognition … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Many researchers presented the corresponding work to cope with the R2Rc issue. e authors in [14] proposed a probability-based query tree (PBQT) protocol. In PBQT protocol, the conflict identification and useless identification can be avoided via the shared information between the readers.…”
Section: Related Workmentioning
confidence: 99%
“…Many researchers presented the corresponding work to cope with the R2Rc issue. e authors in [14] proposed a probability-based query tree (PBQT) protocol. In PBQT protocol, the conflict identification and useless identification can be avoided via the shared information between the readers.…”
Section: Related Workmentioning
confidence: 99%
“…This is another reason RFID is seen as inevitable to achieving the dreams of IoT, which is to enable just anything to have connectivity. RFID unique ID (EPC) is 96-bits and is accessible in the cloud via EPCIS (EPC information service) [42]. Therefore, RFID tagged things are uniquely identifiable and when interfaced with say 5G network can achieve IoT's dream.…”
Section: Binary To Decimal Conversion Of Datamentioning
confidence: 99%
“…Therefore, RFID tagged things are uniquely identifiable and when interfaced with say 5G network can achieve IoT's dream. As can be seen in Table 1, EPC is long [42] and because of space limitations, this paper utilizes only 16-bits out of the 96-bits for analysis and evaluation.…”
Section: Binary To Decimal Conversion Of Datamentioning
confidence: 99%
“…When the number of slots is much larger than the number of labels, there will be a lot of empty slots, resulting in waste. Based on this principle, it is necessary to find a suitable number of time slots for system operation to improve the efficiency of the system [12].…”
Section: Anti‐collision Algorithm and Improvement Analysismentioning
confidence: 99%