“…Recently, a number of studies related to mitigating reader-to-reader interference have been introduced [5][6][7][8][9][10]. However there are few figures-of-merit for interference assessment.…”
Section: Irrr (Interrogation Range Reduction Ratio)mentioning
confidence: 99%
“…The last type of interference, reader-to-reader interference, is induced when a signal from one reader reaches other readers [6]. This can happen even if there is no intersection among reader interrogation ranges.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the interference is potentially magnified in a dense reader environment, which can involve hundreds of readers in one warehouse or manufacturing facility. Many attempts to mitigate reader-to-reader interference have been made [6][7][8]. They are normally based on standard multiple access mechanisms such as frequency-division multiple access (FDMA), time-division multiple access (TDMA), or carrier-sense multiple access (CSMA).…”
Abstract-In this paper, RFID reader-to-reader interference is analyzed from the point of view of interrogation range. To evaluate RFID interference quantitatively, the new figure-of-merit, interrogation range reduction ratio (IRRR), is defined. In order to show the usefulness of IRRR, its value is calculated in various environments. Additionally, the calculated IRRR values are verified by measurements using two RFID readers and an RFID tag. IRRR can be referred to an important design parameter to analyze more complex interfering problems in instances of actual RFID system deployment.
“…Recently, a number of studies related to mitigating reader-to-reader interference have been introduced [5][6][7][8][9][10]. However there are few figures-of-merit for interference assessment.…”
Section: Irrr (Interrogation Range Reduction Ratio)mentioning
confidence: 99%
“…The last type of interference, reader-to-reader interference, is induced when a signal from one reader reaches other readers [6]. This can happen even if there is no intersection among reader interrogation ranges.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the interference is potentially magnified in a dense reader environment, which can involve hundreds of readers in one warehouse or manufacturing facility. Many attempts to mitigate reader-to-reader interference have been made [6][7][8]. They are normally based on standard multiple access mechanisms such as frequency-division multiple access (FDMA), time-division multiple access (TDMA), or carrier-sense multiple access (CSMA).…”
Abstract-In this paper, RFID reader-to-reader interference is analyzed from the point of view of interrogation range. To evaluate RFID interference quantitatively, the new figure-of-merit, interrogation range reduction ratio (IRRR), is defined. In order to show the usefulness of IRRR, its value is calculated in various environments. Additionally, the calculated IRRR values are verified by measurements using two RFID readers and an RFID tag. IRRR can be referred to an important design parameter to analyze more complex interfering problems in instances of actual RFID system deployment.
“…The EPC Network includes several components, the EPC, tag, reader, EPC Information Server (EPCIS), Object Name Service (ONS), and Middleware [1,2,5,6,7,10,16,24].…”
Abstract. Radio Frequency Identification (RFID) systems are increasingly becoming accepted for many EPC Network applications. However, RFID systems have some privacy problems. In this paper, a system for missing child location tracking in the EPC Network applications, is proposed. The proposed system improves security and privacy compared to existing applications, while also keeping in line with traditional procedures, commonly accepted by most industrial applications. The proposed MCLT (Missing Child Location Tracking) system can protect users' privacy while providing location tracking of the RFID tag.
“…In case of multiple readers placed close to each other, it is possible that the signal of one reader interferes with others. Such interference caused by the presence of multiple readers was called reader collision [4]. This paper investigates tag collisions and proposes an optimal Q algorithms based on Gen-2 [1] protocol.…”
Radio frequency identification (RFID) provides a non-lineof-sight and contactless approach for object identification. But if there are multiple tags in the range of an RFID reader, tag collision can take place due to radio signal interference and therefore an anti-collision algorithm is required to resolve collisions. Recently, EPCglobal RFID generation-2 (Gen-2) protocol [1] is proposed for ultrahigh frequency (UHF) passive tags and is being deployed. Gen-2 designs a slotted random anti-collision algorithm, especially, an adaptive slot-counter (Q) selection algorithm. The integer-valued parameter Q in Gen -2 plays a critical role in tag collision resolution. This adaptive algorithm dynamically adjusts the value of Q based on the type of replies from tags. In this paper, we propose an optimal Q algorithm that determines the optimal values of Q according to the number of remaining tags and in turn to optimize tag identification speed (TIS). It's been demonstrated through extensive simulations that the proposed algorithm achieves higher TIS than Gen-2 adaptive Q algorithm.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.