Efficient Monitoring of Dynamic Tag Populations in RFID Systems
|
|
- Carol Price
- 5 years ago
- Views:
Transcription
1 2 2 Ninth IFIP IEEE/IFIP Ninth International Conerence on on Embedded and and Ubiquitous Computing Eicient Monitoring o Dynamic Tag Populations in RFID Systems Qingjun Xiao, Kai Bu, Bin Xiao Department o Computing The Hong Kong Polytechnic University {csqjxiao, cskbu, csbxiao}@comp.polyu.edu.hk Abstract As RFID tags become more ubiquitously available, e.g., in a supermarket, it is necessary to monitor larger-scale tag populations in a dynamic environment to get updated tag inormation. This paper considers the problem o monitoring a dynamic tag population, to identiy both the missing tags and new tags. Traditional approach can solve the problem by collecting all tag IDs in the current population, which could be slow because it ignores the knowledge o the tag population in a previous scan. To be more eicient, this paper presents two protocols: () a baseline protocol with optimized length o random number bits, (2) an improved one-phase protocol with easy labor to identiy only the new and missing tags in ALOHA rames by ully utilizing previous tag population knowledge. Our analysis shows that the one-phase protocol can improve the monitoring accuracy by 25% and improve the time eiciency by 55%, as compared with the two-phase protocol proposed in a recent paper which also identiies population changes. Keywords-Ubiquitous Computing, RFID, Dynamic Tag Population, Tag Population Monitoring I. INTRODUCTION About a decade ago, RFID (radio-requency identiication) was envisioned as one o the enabling techniques towards the uture o ubiquitous computing []. Nowadays, RFID has arguably become one o the most successul technologies in the computing history, which has been adopted by a wide range o applications, e.g. warehouse management, object tracking and inventory control. RFID s success is largely due to its clear advantages over the classical barcode system. RFID extends the operation distance rom inches to tens o eet (or passive tags) or even hundreds o eet (or active tags). RFID also dramatically improves the tag reading speed: barcode attached products can only be checked manually, one at a time, while all RFID tags in the range o a reader can be inventoried as a population, at the speed o several milliseconds per tag. This paper studies an important RFID problem o monitoring a dynamic tag population, which identiies the population changes, including both the missing tags that disappear within the readers range and the new tags that are previously unknown and newly appear. Such a population change identiication ability can bring solid beneits to many industries. For example, imagine a large warehouse with tens o thousands o stocks. Every night, the warehouse manager needs to check the inventories and ind the missing items and the new items, because the existence o missing items probably indicates inventory thie or vendor raud, and the presence o new items may expose management aults, e.g. unregistered stocks and misplaced stocks. However, manual counting is laborious. I each stock item is attached with a tag, then the RFID readers can know the stocks changes automatically. In recent years, researchers also investigated various other RFID problems. Much prior work concentrates on tag identiication problem which is to collect all the tag IDs in a tag population as quickly as possible [2], [3], [4], [5], [6], [7], [8], [9]. Another extensively studied topic is the tag estimation problem which is to give a rough estimate o the tag population size in a time-eicient manner [], []. Missing tag identiication problem also attracted much attention recently, which is to identiy the IDs o missing tags in a tag population [2], [3]. Our tag population monitoring problem is dierent rom the previous research topics. It may appear that, i we can collect all the tag IDs in the current population (i.e. the tag identiication problem), then we will learn the population changes by comparing current population with the population in the previous scan. However, there can be a large number o tags that exist in both the previous scan and the current scan, called remaining tags. Recollecting the IDs o these remaining tags in the current scan is a waste o time, especially when each tag ID can be as long as 96 bits, according to EPC UHF RFID speciication [3]. Can we detect the tag population change by the tag estimation problem? I we cannot detect any change in the number o tags, then we have no need to urther identiy those newlyarrived tags and missing tags. However, the tag number estimate is just a rough estimate with at least % error [], []. I the population change only involves a ew tags, we can hardly assert the change based on the estimated population size that is statistically variant. Finally, our tag population monitoring problem that identiies both missing tags and new tags is also dierent rom the missing tag identiication problem which determines only the IDs o missing tags. The most related is a recent paper [4] which designed a protocol to detect both missing tags and new tags. However, the time eiciency o this protocol can be improved, because it uses only empty slots in the previous scan (or in the current scan) or the detection. To guarantee the inal detec / $26. 2 IEEE DOI.9/EUC.2.3 6
2 tion accuracy, it must rely on the multiple-round execution which is time consuming. Moreover, this protocol uses two separated phases to detect missing tags and new tags. This is time-wasting since both phases need the remaining tags to respond, which is unnecessary and can be avoided. We propose protocols that not only detect the tag population change events but also identiy which tags are new tags or missing tags. The most important perormance criterion is to minimize the identiication time while meeting the accuracy lower bound. Otherwise, i the protocol execution takes too long, the normal operation (e.g. relocating goods in a warehouse) may alter the current population during the scan, and misleads the protocol to report wrong sets o missing tags and new tags, which would cause conusion to warehouse management. We highlight the contributions o this paper to identiying new tags and missing tags. () We describe the protocol that identiies the current tag population as the baseline protocol, and we improve its time eiciency by %, by optimizing the length o the random number bits used or collision detection. (2) We propose a one-phase protocol that identiies only the population changes. This protocol is 7% more eicient than the baseline, when the remaining tag ratio is.5 or above. This protocol is 25% more accurate than state-o-the-art two-phase protocol in [4], by utilizing both empty slots and singleton slots in the previous scan (or in the current scan) to detect population changes. (3) We analyze the tradeo between accuracy and eiciency. We show that, or our one-phase protocol, the increase o accuracy requirement will cause time eiciency decrease, i.e. higher time cost per identiied new tag or missing tag. We also show that our one-phase protocol is 55% more eicient in execution time than the two-phase protocol in [4] at the same accuracy level. The rest o this paper is organized as ollows. We introduce some preliminary knowledge about RFID systems in Section II. We ormulate our tag monitoring problem in Section III. For this problem, we present two monitoring protocols: the baseline protocol in Section IV and the onephase protocol in Section V. We analyze the accuracyeiciency tradeo o the one-phase protocol in Section VI. We review the related work in Section VII and conclude our paper in Section VIII. II. RFID BACKGROUND AND SYSTEM MODEL In this section, we introduce the technical background in RFID systems. An RFID system consists o RFID tags and RFID readers. Each tag stores a unique ID in its memory, and each reader can read the IDs o its surrounding tags by wireless connections. We consider the scenario where there is only one reader covering all the tags. This is the most common scenario adopted by most existing RFID research [5], [6], [8], [9]. I multiple readers are used, we believe that it is easy to extend our protocols using existing reader scheduling protocols [5]. A. Framed Slotted ALOHA Protocol One major challenge in the RFID research is the collision problem, i.e. when multiple tags hear the reader s query and respond, their responses will overlap and the reader may ail to decode the overlapped waveorm. There exist a plethora o RFID anti-collision protocols, which can be classiied into two major categories: tree-traversal algorithms [2], [7] and ramed slotted ALOHA [3], [4], [5], [6], [8], [9], [6]. We adopt the latter because it has higher time-eiciency than the ormer in large RFID systems [3], [9]. The basic idea o the latter is to start an ALOHA rame with many time slots, and distribute the many tags uniormly to these slots to reduce the chance that multiple tags respond in a same slot. This uniorm tag distribution is implemented by each tag selecting its own slot autonomously and pseudo-randomly, using a hash unction h (id, r), where id is the tag ID, is the number o slots in the ALOHA rame, and r is a random seed. The parameters and r are broadcast by the reader when starting the rame. B. Slot States in Framed Slotted ALOHA A slot in a rame has three possible states, according to the number o replying tags in this slot. I there are no tags replies, the slot is empty (noted as number ). I there is one and only one tag reply, it is called a singleton slot (noted as ). I there are at least two tag responses, it is a collision slot (noted as 2). Singleton slots can be urther classiied as singleton-with-id slots and singleton-without- ID slots, according to whether tag ID transmission occurs. The singleton-without-id slots is or the reader to know the presence o tags without ID collection. We denote the probability or a slot to be empty as P, the probability o being singleton as P, and the probability o being collision as P 2. Then we have P = e ρ, P = ρ e ρ, and P 2 = P P, because the number o replying tag in a slot ollows Poisson distribution whose expected number o occurrences equals the rame s load actor ρ, i.e. the number o tags divided by the number o slots. III. TAG POPULATION MONITORING PROBLEM In this section, we ormulate our problem precisely. A tag population is inevitably dynamic because tags can move in or out o the reader s range or various reasons. Such a dynamic tag population can be modelled as a dynamic process [T,..., T t, T t +,... ], where T t is the tag population at discrete time t. A tag population monitoring protocol is, with the knowledge o previous tag population T t, to derive an estimate o the current tag population T t +. Each tag population is represented by a set o tag IDs. I comparing the previous population and the current population, we have three kinds o tags, as depicted in Fig.. 7
3 Missing Tags Fig.. T t T t + T t + T T + t T t + t + New Tags Remaining Tags Missing Tags, Remaining Tags, and New Tags. Missing Tags: the tags that were ound in previous population but no longer exist in current population, which are noted as Tt + = T t T t +. Remaining Tags: the tags that exists in both the previous population and the current population, i.e. T t T t +. New Tags: the tags that are unknown in previous population but appear in current population, which are noted as T t + + = T t + T t. We introduce a vector [β,β,β + ] to ormalize the relation between the previous population T t and the current population T t +. β is the missing tag ratio that equals β is the remaining tag ratiothat equals T t + T t T, t + Tt Tt + T t T, t + T + t + T t T. t + β + is the new tag ratio that equals O course, the sum o the three ratios is equal to one. For example, vector [.,.5,.5] means no missing tags, 5% remaining tags, 5% new tags. Vector [.5,.5,.] means 5% missing tags, 5% remaining tags, no new tags. We consider two perormance metrics or evaluating tag monitoring protocols: accuracy and time eiciency. ) Tag monitoring accuracy α is the degree o similarity between the current population T t + and the generated estimate ˆT t +. We deine α = Tt + ˆT t + T t + ˆT. The maximum t + value o the accuracy α is equal to one, when the estimate ˆT t + is absolutely accurate and identical to T t +.Akey concern o this paper is to guarantee the estimation accuracy α to be above a threshold α. 2) Time Eiciency γ is deined as the total execution time t total divided by the size o identiied population changes, i.e. γ = t total T t ˆT t + + ˆT t + T t, where T t ˆT t+ is the number o identiied missing tags and ˆT t+ T t is the number o identiied new tags. We do not deine γ as the total time cost divided by the size o current population, because we believe that the users o our RFID systems are mainly interested in the changes rather than the current population. IV. BASELINE PROTOCOL The most straightorward protocol to solve this tag monitoring problem is to collect all the IDs in the current population, and then compare the collected IDs with the memory o previous population to identiy the changes. The accuracy o this baseline protocol can be close to one, since the traditional tag identiication methods usually support the multiple-round execution, in which the next round can collect the tag IDs that ails to collect in the previous round. The time eiciency o this baseline protocol is analyzed by the ollowing subsections. A. Time Cost or Dierent Slot States Much previous analysis o protocol time eiciency assumes the time cost o all slots is the same. But in practice the time cost o the our slot states (i.e. empty, collision, singleton-without-id and singleton-with-id) is dierent. We list the our time cost in the ollowing table, where υ is the length o the random number (RAND or short) sent by tags to acilitate the detection o collisions at the reader side. When two tags send dierent RANDs (whose possibility is 2 υ ), the reader can detect the collision at waveorm level. Note that the listed time cost assumes EPC RFID protocol [3], and include both data transmission time and waiting time between transmissions 2. Deinition Value t e time cost o an empty slot 84 μs t s time cost o a singleton-without-id slot υ μs t ID time cost o a singleton-with-id slot υ μs t c time cost o a collision slot, i.e. ( 2 υ ) t s +2 υ t ID Time cost t e o an empty slot is the smallest. Time cost t s o a singleton-without-id slot almost doubles t e. Time cost o a singleton-with-id slot t ID is at least ten times larger than t e, because a tag ID is as long as 96-bit EPC plus 6- bit CRC and each bit requires 6μs to transmit. Thereore, reducing the number o ID transmissions is a key concern or many RFID protocols. The calculation o time cost o a collision slot is complicated, i.e. ( 2 υ ) t s +2 υ t ID. Here, 2 υ is the probability or the reader to detect the collision when receiving RANDs. I two tags send identical RANDs with 2 υ probability, the collision can be detected by the reader only when the two tags send out their IDs, whose time cost is t ID. B. Protocol Time Eiciency ) Tag Identiication Eiciency: For a tag identiication protocol, its time eiciency is usually deined as the time t cost per collected tag ID, i.e. e P + t ID P + t c P 2 P. This is because or any slot i, ithasp chance to be empty whose time cost is t e, P chance to be singleton-with-id whose time cost is t ID, and P 2 chance to be collision whose time cost is t c. This time eiciency can be rewritten as t ID + ρ t e + ( e ρ ( + ρ) ) t c. We plot in Fig. 2 the tag identiication eiciency against load actor ρ. Fig. 2 shows that when the load actor o the rame is between.6 and.8, the time eiciency reaches its peak about 3μs i the RAND length υ is 6. We argue that, although Fig. 2 uses the slot time cost parameters t e, t ID, t c o EPC RFID system in Section IV-A, Note: RT rate=64kbps, TR rate=62.5kbps, QueryRep=4bits, Ack=2+υbits. 2 Assume RT cal =3.25μs, T pri =8μs, T =8μs, T 2 = T 3 =4μs. 8
4 our conclusions can be easily adapted to other RFID systems by adjusting these parameters accordingly. Fig. 2. Time Eiciency o Tag Identiication Protocol against Load Factor. Beside the appropriate choice o load actor, another interesting issue is the optimal coniguration o RAND length υ. It is true that it is not a speciication compliant eature that the RAND length is adjustable. For example, EPC UHF RFID protocol deines RAND to have 6 bits [3], and Philips I-Code system deines RAND to be bits [4]. We investigate what is the optimal RAND length or tag identiication eiciency. Fig. 2 shows that the optimal RAND length is 6. I reducing the RAND length rom 6 to 6, the time eiciency can be improved rom 3μs to 27μs (i.e. % improvement). We regard 6 as the optimal length because a value smaller than 6 will lead to worse perormance in heavy load region where the load actor is larger than.4 (i.e. the υ =4 curve is higher than the υ =6curve in the heavy load region). The explanation is that, when RAND length is 6, collisions can be detected with 2 6 =98.44% probability. I RAND length is reduced to 4, the detection probability will drop to 2 4 =93.75%. Note that an undetected collision will be ollowed by a time-consuming tag ID transmission. Such a trend o perormance degradation in heavy load region is even more prominent when RAND length is reduced to or 2. Thereore, we conigure RAND length to 6 to optimize the perormance in medium load regions and heavy load regions. 2) Tag Monitoring Eiciency: Dierent rom the tag identiication eiciency, tag monitoring eiciency is the total time cost 27μs T t + divided by the size o population changes, i.e. T t T t + + T t + T t. This tag monitoring eiciency can be rewritten as Tt Tt + + Tt + Tt β + β+ γ baseline = T t T t + + T t + T t 27μs = β 27μs. As a summary, the monitoring eiciency o the baseline protocol degrades with the increase o remaining tag ratio β which means the baseline protocol will waste more time in collecting the already-known remaining tag IDs. V. ONE-PHASE PROTOCOL We observe that the major drawback o baseline protocol is the re-collection o remaining tag IDs which are known in the previous population. To avoid such redundant collection and improve time eiciency, we adopt an incremental update strategy that identiies only the IDs o new tags and missing tags. We assume the set o identiied new tag IDs is T t + + and the set o identiied missing tag IDs is Tt +. Then we can generate an estimate o the current population by the equation: ˆT t + =(T t Tt + ) T t + +. Thereore, the pivot is shited to the eicient collection o new tag IDs and the eicient identiication o missing tags whose IDs are already known. We present our solution in this section. A. Detection o New Tags and Missing Tags We propose a one-phase protocol that detects the presence o new tags or missing tags in one rame (note: the new tag ID collection will be described in Section V-C). This one rame is depicted in Fig. 3 as the true rame which invites the participation o all tags in the current population T t +. Besides this true rame, we construct a so-called expected rame that involves the tags in previous population T t. This expected rame is generated by pure computation without any wireless transmission involved, and it uses the same hash unction as the true rame. A remaining tag responds in both the true rame and the expected rame and at the same slot, e.g. tags 3-7. A missing tag replies only in expected rame, e.g. tags -2. A new tag responds only in the true rame, e.g. tags 8-. True Frame s i : Expected Frame ŝ i : Fig. 3. T t T t + One-Phase Protocol to Detect Population Changes by One Frame. We detect the presence o new tags and missing tags by scanning the two rames and comparing the slot states. For the slot i, we denote its state in the true rame by s i and denote its state in the expected rame by ŝ i. I the slot state changes with s i ŝ i, it indicates the presence o either new tags or missing tags, or even both. This is because when a slot contains only remaining tags which are mapped to both rames, its state will have no change. I there is no state change with s i =ŝ i, most probably this slot contains only remaining tags, in which we have no interests. But it is also possible that () this slot contains equal number o missing tags and new tags, which will escape rom our detection, or (2) this slot contains at least two remaining tags, which will shield our detection. We will analyze the impacts o these two abnormal cases on detection accuracy later. We list in the ollowing table all the possibilities or a slot whose state changes with s i ŝ i. For the irst two 9
5 cases, the identiication o new tags and missing tags is easy, because the tags in such slots are either all new tags or all missing tags. I the true state s i is nonempty and the expected state ŝ i is empty, all the tags in this slot are new tags, since there are no remaining tags as indicated by ŝ i = (e.g. slot 8). I the true state s i is empty and the expected state ŝ i is nonempty, all the tags in this slot are missing tags, since there are no remaining tags indicated by s i =(e.g. slot). s i ŝ i Detection Notes + all the tags that respond in slot i are new tags + all the tags that should respond in slot i are missing tags 2 some tags that respond in slot i are new tags; also possibly the old tag is missing and all tags that respond are new tags 2 some tags that should respond disappear; also possibly all tag that should respond disappear and one new tag comes NOTE: is empty, is singleton, 2 is collision, and + is non-empty. For the other two cases, the identiication is diicult since the tags in such slots are a mixture o missing tags, remaining tags and new tags, which needs to dierentiate. We solve this dierentiation problem by a technique called population change recalculation which is detailed in Section V-C. I the true state s i is collision and the expected state ŝ i is singleton, the slot contains a remaining tag and a new tag (e.g. slot 6 which has remaining tag 5 and new tag 9). I the true state s i is singleton and the expected state ŝ i is collision, the slot may contain a remaining tag and a missing tag, or even contain a new tag and two missing tags (e.g. slot 4 with new tag 8 and missing tags,2). B. Accuracy Analysis We analyze the accuracy that can be achieved by utilizing all the our kinds o changed slots. A recent paper that also studies new tag and missing tag detection uses only the irst two cases whose tag identiication is easy [4]. We will highlight the improvement we made in accuracy (i.e. about 25%) by also using the other two cases. We assume that ˆρ is load actor o the expected rame which equals T t /. Thus the probability o empty slots (or singleton slots) in the expected rame is ˆP = e ˆρ (or ˆP =ˆρe ˆρ ). Similar parameters can be assumed or the true rame: load actor ρ = T t + /, empty slot probability P = e ρ, and singleton slot probability P = ρe ρ. Theorem. The accuracy o our one-phase protocol is E ( α ) β +(ˆP + ˆP ) β + (P + P ) β = β +(+ˆρ) e ˆρ β + ( + ρ) e ρ β, () where β is missing tag ratio, β is remaining tag ratio and β + is new tag ratio. In contrast, the accuracy o the twophase protocol in [4] is only E ( α ) = β + e ˆρ β + e ρ β. Proo: Consider an arbitrary new tag in the set T t + T t,ithas ˆP + ˆP probability to be mapped to a noncollision slot in the expected rame (i.e. ŝ i =or ), where it can change the slot state and get identiied. An arbitrary missing tags in the set T t T t + has P + P probability to be mapped to a non-collision slots in the true rame (i.e. s i =or ) and get identiied. Thus, the expected number o identiied new tags is ( ˆP + ˆP ) T t + T t, and the expected number o identiied missing tag is (P + P ) T t T t +. The accuracy o one-phase protocol can be estimated as E ( α ) Tt Tt + +(ˆP + ˆP ) T t + T t T t T t + (P + P ) T t T t +, where the nominator is the number o remaining tags T t T t + plus the number o identiied new tags, and the denominator is the union population size T t T t + with the identiied missing tag removed. This accuracy can be urther rewritten to the orm in Theorem. The accuracy equation in Theorem appears to be a unction with two variables: load actor ρ o the true rame, and load actor ˆρ o the expected rame. In act, it is a unction with only one variable, i.e. the union load actor ρ Tt Tt + =. This is because or the true rame load actor ρ, wehave Tt + Tt Tt + ρ = = (β + β + )=ρ (β + β + ), and or the expected rame load actor ˆρ, wehave ˆρ = Tt = Tt Tt + (β + β) =ρ (β + β), where missing tag ratio β, remaining tag ratio β and new tag ratio β + are all constants. The physical meaning o the union load actor ρ is that e ρ is the expected ratio o slots that are empty both in true rame and in expected rame. We plot in Fig. 4 both the accuracy o our one-phase protocol and the accuracy o the two-phase protocol in [4]. Fig. 4 adopts three typical scenarios with dierent combinations o [β,β,β + ]. The remaining tags ratio β is ixed to 5%. Vector [.25,.5,.25] means 25% missing tags and 25% new tags. Vector [.,.5,.5] means no missing tags and 5% new tags. Vector [.5,.5,.] means 5% missing tags and no new tags. Fig. 4., / Our One-Phase Protocol vs. Two-Phase Protocol [4] in Accuracy. Figure 4 shows that the accuracy o our one-phase protocol is roughly 25% better than the accuracy o twophase protocol in [4]. For example, in the [.25,.5,.25] scenario, when the union load actor ρ equals, the accuracy o the two-phase protocol is 7%, while the accuracy o our one-phase protocol is 89%, which means 27.4%
6 improvement. Fig. 4 also shows that the accuracy o both protocols is poor and lower than.7 in the heavy load region with union load actor ρ above 4. This is because when ρ is above 4 and remaining tag ratio β is.5, the density o remaining tags is larger than 2 remaining tags per slot. In slots with 2 or more remaining tags, we can not detect the presence o new tags and missing tags. However, when the union load actor is lower than.3, the accuracy o our onephase protocol can be higher than 95%, which can satisy the needs o many RFID applications. C. Identiication o New Tags and Missing Tags We present our one-phase protocol in Protocol. This protocol provides high accuracy by utilizing all the our kinds o slot state changes, and it addresses the problem o dierentiating missing tags and new tags when all kinds tags mixed in one slot. The input o the protocol is the prior knowledge o previous population T t, and the output is an estimate o the current population ˆT t+. Note that when the prior knowledge T t is an empty set, our protocol will degrade to the baseline protocol that neglects the prior knowledge. Protocol : One-Phase Population Monitoring Protocol input : the prior knowledge o tag population T t at time t output : estimate ˆT t+ o current tag population at time t + Reader generates rame size and random seed r 2 Reader obtains state belie ŝ i o each slot, by T t and h (id, r) 3 Reader resets the session lags o all tags in T t + to 4 Reader starts a rame by broadcasting and r to all tags 5 or slot i to do 6 i a tag selects slot i by h (id, r) then it replies RAND 7 Reader obtains the state s i o slot i when receiving RAND 8 i s i =ŝ i then Reader closes slot i by a special QueryRep that orces tags in slot i to invert session lags 9 else Reader updates the missing tag set by T t + := T t + { id T t tag id should respond in slot i } i slot i is singleton with s i =then 2 Reader sends ACK, and the tag replies its id 3 Reader updates new tag set by adding id to T + t+ 4 Reader closes slot i by QueryRep (note: the single tag in slot i automatically inverts its session lag [3]) 5 Reader uses a new rame or new rames to collect IDs o tags whose session lags are, and adds the collected IDs to T + t+ 6 Reader re-identiies the missing tags by T t + := T t + T + t + 7 Reader re-identiies the new tags by T + t + := T + t + Tt 8 return tag population estimate ˆT t + := (T t T t + ) T + t + Firstly, the reader detects population changes. The reader starts a rame by broadcasting rame size and random seed r to the current population T t + (see Ln. 4). The tags use hash unction h (id, r) to choose their slots in which they respond with RAND to show their presence (see Ln. 6). The reader, ater receiving the RANDs, can obtain the state s i o each slot i (see Ln. 7). The reader can also establish a prior belie ŝ i about slot i s state (see Ln. 2), using the knowledge o the previous tag population T t and the hash unction h (id, r). Then the reader compares the true state s i with the state belie ŝ i (see Ln. 8). I no change can be ound, the reader closes the current slot i instantly by the QueryRep command which is deined in [3]; otherwise, this slot i is detected as a changed slot which contains new tags or missing tags. Secondly, the reader urther identiies new tags and missing tags in the changed slot i by the ollowing three steps. Step (Missing Tag Identiication). The reader adds all the tags in population T t that should respond in slot i to the missing tag set Tt + (see Ln. ). For example, in Fig. 3, the slots {, 4, 6, 8} are changed slots, and the old tags {,, 2, 5} that should respond in these changed slots are marked as missing tags. It is possible that this set Tt + may contain remaining tags, e.g. tags 5 that should respond in changed slot 6 in Fig. 3. Such remaining tags that are wrongly marked as missing tags won t ruin our inal tag population estimate ˆT t +, because their responses will be heard by the reader in step 2 and be re-identiied as new tags. Step 2 (New Tag Identiication). The reader will add the IDs o all the tags that responded by RAND and showed their presence in slot i to the new tag set T t + +. For example, in Fig. 3, tags {5, 8, 9, } that responded in the changed slots {, 4, 6, 8} are regarded as new tags. It is possible that a tag in the set T t + + is in act a remaining tag, e.g. tags 5. But this won t ruin our inal population estimate ˆT t + at step 3. Dierent rom the missing tags whose IDs are contained in T t, the IDs o new tags are unknown and need to be collected. The reader will use two methods to collect new tag IDs. Firstly, i a changed slot i is singleton in the true rame (e.g. slots 4, 8), then the reader collects the single tag ID in slot i directly (see Ln. -3). This because as deined in [3], the reader can send an ACK command to notiy the tag to propagate back its ID. Secondly, i a changed slot i is collision in the true rame, then the multiple tag IDs cannot be collected in the current slot and should be delayed to a new rame (see Ln. 5). The sole purpose o this new rame is to collect IDs o the new tags mapped to the changed slots that are collision in true rame. But the question is how can we let these tags know they should participate in this new rame and let other tags know they shouldn t. The answer is to use the session lag eature 3 deined in [3]. Initially, the session lags o all tags are zero (see Ln. 3). Then, the lags o the tags in unchanged slots will be be orced to invert (see Ln. 8). The lags o the tags in singleton changed slots will invert automatically (see Ln. 4) according to [3]. Thus only the tags in collision changed slots do not invert their lags and will participate the ID collection rame(s) at Ln By section o [3], each tag has our session lags S-S3. The rame start command Query contains two parameters: a session lag id and a desired value (e.g. session lag S2 and value ). A tag will participate in this rame only i the tag s corresponding session lag matches the desired value.
7 Step 3 (Population Change Recalculation). To remove the remaining tags wrongly contained in the missing tag set Tt +, the reader recalculates the set o missing tags by Tt + = T t + T t + + (see Ln. 6). To remove the old tags wrongly contained in the new tag set T t + +, the reader recalculates the set o new tags by T t + + = T t + + T t (see Ln. 7). Finally, with the recalculated missing tag set and new tag set, we give the population estimate ˆT t + at Ln. 8. VI. TIME-EFFICIENCY TRADEOFF This section analyzes the tradeo between monitoring accuracy and eiciency o the proposed one-phase protocol. A. Time Eiciency Analysis We analyze the time eiciency o our one-phase protocol, which is another perormance metric besides accuracy. We calculate the time eiciency as γ one-phase = tslot, where n slot +n+ slot t slot is the expected time cost o a slot, n slot is the expected number o missing tags that can be identiied in a slot, and n + slot is the expected number o new tags that can be identiied in a slot. This eiciency γ one-phase is a unction o union load actor ρ, which is plotted in Fig. 5. This igure adopts three scenarios: [.,.5,.5], [.25,.5,.25], [.5,.5,.]. We omit the expression to calculate t slot which is complicated. This is because the true rame has ive kinds slots with dierent time cost: empty slots whose cost is t e, singleton unchanged slots whose cost is t s, singleton changed slots whose cost is t ID, collision unchanged slots whose cost is t c, and collision changed slots whose cost is about 27μs per tag (see Section IV-A or time cost deinitions). We need to calculate their corresponding probabilities, and combine them linearly to obtain t slot. The equations or n slot and n+ slot are as ollows: n slot = ρ (P +P )P + + ρ ( e ρ )P P + + P P P 2 +, n + slot = P (P +P )ρ + + P2 P P + + P P ρ + ( e ρ+ ), where P, P, P 2 are the probabilities o,, 2 missing tags in a slot respectively; P, P, P2 are the probabilities o,, 2 remaining tags in a slot respectively; P +,P +,P 2 + are the probabilities o,, 2 new tags in a slot. Figure 5 shows that the time eiciency o our protocol is prominently higher than that o the baseline protocol in the medium load region. For example, in the [.5,.5,.] scenario, the eiciency o baseline protocol is 27μs per changed tag (i.e. γ baseline = 27μs β+β+ β ), while the best eiciency o our one-phase protocol is roughly μs, i.e. 7% reduction in time cost. In the [.,.5,.5] scenario, the eiciency o baseline protocol is 54μs, while the best time eiciency o our protocol is about 4μs, i.e. 26% improvement. Our one-phase protocol has much better perormance in [.5,.5,.] scenario than in [.,.5,.5] scenario, because [.5,.5,.] scenario has only missing tags whose identiication is does not need to transmit tag IDs. Fig. 5. One-Phase Protocol vs. Baseline Protocol in Monitoring Eiciency. Figure 5 also shows that the time eiciency o onephase protocol degrades rapidly in the high-load region with ρ > 4. This is because in the high-load region, the expected number o remaining tags in a slot ρ is larger than 2 (note: ρ =β ρ ). A slot with at least two remaining tags will have its states in the true rame and in the expected rame to be both collision, which can hide the presence o new tags and missing tags. In contrast, in light-load region with ew such slots, our protocol only degrades mildly in time eiciency. B. Accuracy-Eiciency Tradeo The one-phase protocol needs to keep a balance between accuracy and time eiciency. Although the accuracy can be improved by reducing union load actor (see Fig. 4), this meanwhile will degrade the time eiciency when entering the light-load region (see Fig. 5). Thereore, we analyze the unctional relation between accuracy and eiciency, and plot our analysis results in Fig. 6. It adopts three scenarios with dierent remaining tag ratio β: the scenario [.,.8,.] with β =.8, the scenario [.25,.5,.25] with β =.5, and the scenario [.4,.2,.4] with β =.2. Fig. 6 does not show the portion with accuracy lower than 9% since we believe that RFID users have no interests in such poor accuracy. Fig. 6. Tag Monitoring Eiciency γ vs. Accuracy Requirement α. As we have expected, Fig. 6 shows that the time cost o our one-phase protocol increases as the required accuracy goes higher. I the required accuracy exceeds 98%, the time cost inlates nearly straight up with the increase o accuracy. The explanation is that our one-phase protocol is based on a randomized algorithm that detects missing tags and new tags by randomly distributing them to slots where they can be detected. I ultra-high accuracy is needed, we may have to use extra-large rame size to increase the chance o detection. 2
8 However, we believe that the accuracy between 9% and 99% can already satisy the need o most RFID applications. Finally, we show the advantage o our one-phase protocol over the two-phase protocol [4] in Fig. 6. It shows that at the same accuracy level (e.g. 96%), our one-phase protocol can be 55.43% more eicient than the two-phase protocol in [.25,.5,.25] scenario. This is because the two-phase protocol has lower accuracy than our one-phase protocol. I the two-phase protocol needs to achieve the same accuracy level as ours, it must use much larger rame size (or even multiple round execution) to create more empty slots or eective detection o new tags and missing tags, which however reduces protocol eiciency. VII. RELATED WORK RFID technology has been considered in many applications. The most traditional application is the tag identiication problem which collects all tag IDs in a population. The proposed solutions can be classiied into two major categories: tree-based [2], [7] and ALOHA-based [3], [4], [5], [6], [8], [9]. The ormer organizes all tag IDs in a tree o ID preixes, while the latter distributes all tag IDs uniormly in an ALOHA rame. The major diiculty o ALOHA-based protocols is how to choose the optimal rame size which should be roughly equal to the number o tags. Thereore, tag population size estimation problem becomes another hot topic or RFID research [], []. Another important problem that attracts academic interests is, given the prior knowledge o the tag population, to identiy the missing tags [2], [3]. However, in practice, besides missing tags, there may also exist new tags whose IDs are unknown. The problem o identiying both o these tags is called tag population monitoring problem, since we can establish an estimate o the current tag population, with the knowledge o previous tag population, new tags and missing tags. A relevant study on this problem is a recent paper [4] which can detect a new tag when it is mapped to an empty slot in the expected rame, and detect a missing tag when it is mapped to an empty slot in the true rame. However, the accuracy o this protocol can be improved by at least 25%, i we can also make use o the massive singleton slots in the expected rame or true rame to detect o missing tags and new tags. Moreover, the twophase protocol is ineicient, because it uses two separated phases to detect missing tags and new tags. The remaining tags thus need to respond in both two phases, which waste precious execution time. VIII. CONCLUSION This paper ocused on the problem o monitoring a dynamic tag population. We proposed a one-phase solution which is eicient by using only one rame to detect both missing tags and new tags. This solution is also accurate because it uses both empty slots and singleton slots in the true rames (or in the expected rames) to detect the population changes. Another contribution we made is that we derived an optimal coniguration o RAND length or the traditional tag identiication protocol, which is neglected beore. ACKNOWLEDGEMENT The authors would like to thank the reviewers or comments. This work is supported by HK RGC PolyU 534/E. REFERENCES [] M. Weiser, The computer or the 2st century, in Proc. o ACM SIGMOBILE, vol. 3, 999, pp. 3. [2] ISO/IEC 8 inormation technology - RFID or item management - Part 6: Parameters or air interace communications at 86MHz-96MHz, 24. [3] EPC TM radio-requency identity protocols class- generation-2 UHF RFID protocol or communications at 86MHz-96MHz v.2., 28. [4] P. Semiconductors, I-CODE smart label RFID tags, 24. [5] H. Vogt, Eicient object identiication with passive RFID tags, in Proc. o IEEE PERCOM, 22, pp [6] B. Zhen, M. Kobayashi, and M. Shimizu, Framed ALOHA or multiple RFID objects identiication, IEICE Trans. on Communications, 25. [7] J. Myung and W. Lee, Adaptive splitting protocols or RFID tag collision arbitration, in Proc. o ACM MOBIHOC, 26. [8] S.-R. Lee, S.-D. Joo, and C.-W. Lee, An enhanced dynamic ramed slotted ALOHA algorithm or RFID tag identiication, in Proc. o IEEE MOBIQUITOUS, 25, pp [9] C. Qian, Y. Liu, H. Ngan, and L. M. Ni, ASAP: Scalable identiication and counting or contactless RFID systems, in Proc. o IEEE ICDCS, 2, pp [] C. Qian, H. Ngan, and Y. Liu, Cardinality estimation or large-scale RFID systems, in Proc. o IEEE PerCom, 28. [] M. Kodialam and T. Nandagopal, Fast and reliable estimation schemes in RFID systems, in Proc. o ACM MobiCom, 26, pp [2] C. C. Tan, B. Sheng, and Q. Li, How to monitor or missing RFID tags, in Proc. o IEEE ICDCS, 28, pp [3] T. Li, S. Chen, and Y. Ling, Identiying the missing tags in a large RFID system, in Proc. o ACM MOBIHOC, 2. [4] B. Sheng, Q. Li, and W. Mao, Eicient continuous scanning in RFID systems, in Proc. o IEEE INFOCOM, 2. [5] S. Tang, X. Li, G. Chen, Y. Liu, and J. Zhao, Raspberry: A stable reader activation scheduling protocol in multi-reader RFID systems, in Proc. o IEEE ICNP, 29. [6] K. Bu, B. Xiao, Q. Xiao, and S. Chen, Eicient pinpointing o misplaced tags in large RFID systems, in Proc. o IEEE SECON, 2. 3
Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. 2013; 25:2080 2097 Published online 28 March 2012 in Wiley Online Library (wileyonlinelibrary.com)..2835 SPECIAL
More informationRADIO Frequency Identification (RFID) devices are widely. A Multiple Hashing Approach to Complete Identification of Missing RFID Tags
A Multiple Hashing Approach to Complete Identiication o Missing RFID ags Xiulong Liu, Keqiu Li*, Geyong Min, Yanming Shen, Alex X. Liu, Wenyu Qu Abstract Owing to its superior properties, such as ast identiication
More informationCOMPARED to the traditional barcode technology,
1 Completely Pinpointing the Missing RFID Tags in a Time-eicient Way Xiulong Liu, Keqiu Li*, Geyong Min, Yanming Shen, Alex X. Liu, Wenyu Qu Abstract Radio Frequency Identiication (RFID) technology has
More informationAN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION
AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION J-P. Kauppi, K.S. Martikainen Patria Aviation Oy, Naulakatu 3, 33100 Tampere, Finland, ax +358204692696 jukka-pekka.kauppi@patria.i,
More informationFast RFID Polling Protocols
Fast RFID Polling Protocols Jia Liu, Bin Xiao, Xuan Liu and Lijun Chen State Key Laboratory for Novel Software Technology, Nanjing University, China Department of Computing, The Hong Kong Polytechnic University,
More informationAn Efficient Tag Search Protocol in Large-Scale RFID Systems
An Efficient Tag Search Protocol in Large-Scale RFID Systems Min Chen Wen Luo Zhen Mo Shigang Chen Yuguang Fang Department of Computer & Information Science & Engineering Department of Electrical & Computer
More informationPLAT: A Physical-layer Tag Searching Protocol in Large RFID Systems
PLAT: A Physical-layer Tag Searching Protocol in Large RFID Systems Feng Zhu, Bin Xiao, Jia Liu, Xuan Liu, Li-jun Chen Department of Computer Science and Technology, Nanjing University, Nanjing, China
More informationDRaMA: Device-specific Repetition-aided Multiple Access for Ultra-Reliable and Low-Latency Communication
DRaMA: Device-speciic Repetition-aided Multiple Access or Ultra-Reliable and Low-Latency Communication itaek Lee, Sundo im, Junseok im, and Sunghyun Choi Department o ECE and INMC, Seoul National University,
More informationA MATLAB Model of Hybrid Active Filter Based on SVPWM Technique
International Journal o Electrical Engineering. ISSN 0974-2158 olume 5, Number 5 (2012), pp. 557-569 International Research Publication House http://www.irphouse.com A MATLAB Model o Hybrid Active Filter
More informationORE Open Research Exeter
ORE Open Research Exeter TITLE Efficient unknown tag identification protocols in large-scale RFID systems AUTHORS Liu, X; Li, K; Min, G; et al. JOURNAL IEEE Transactions on Parallel and Distributed Systems
More informationFrequency-Foldback Technique Optimizes PFC Efficiency Over The Full Load Range
ISSUE: October 2012 Frequency-Foldback Technique Optimizes PFC Eiciency Over The Full Load Range by Joel Turchi, ON Semiconductor, Toulouse, France Environmental concerns lead to new eiciency requirements
More informationCardinality Estimation for Large-scale RFID Systems
IEEE TRANSACTION ON, VOL., NO., MON YEAR 1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Student Member, IEEE, Hoilun Ngan, Student Member, IEEE, Yunhao Liu, Senior Member, IEEE, Lionel
More informationPower Optimization in Stratix IV FPGAs
Power Optimization in Stratix IV FPGAs May 2008, ver.1.0 Application Note 514 Introduction The Stratix IV amily o devices rom Altera is based on 0.9 V, 40 nm Process technology. Stratix IV FPGAs deliver
More informationRFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode
International Journal of Networking and Computing www.ijnc.org ISSN 2185-2839 (print) ISSN 2185-2847 (online) Volume 4, Number 2, pages 355 368, July 2014 RFID Multi-hop Relay Algorithms with Active Relay
More informationImproving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques
1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,
More informationOptimal Placement of Phasor Measurement Units for State Estimation
PSERC Optimal Placement o Phasor Measurement Units or State Estimation Final Project Report Power Systems Engineering Research Center A National Science Foundation Industry/University Cooperative Research
More informationECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation
ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall 2007 Mohamed Essam Khedr Channel Estimation Matlab Assignment # Thursday 4 October 2007 Develop an OFDM system with the
More informationADAPTIVE LINE DIFFERENTIAL PROTECTION ENHANCED BY PHASE ANGLE INFORMATION
ADAPTIVE INE DIEENTIA POTECTION ENHANCED BY PHASE ANGE INOMATION Youyi I Jianping WANG Kai IU Ivo BNCIC hanpeng SHI ABB Sweden ABB Sweden ABB China ABB Sweden ABB - Sweden youyi.li@se.abb.com jianping.wang@se.abb.com
More informationPAPER Novel Dynamic Framed-Slotted ALOHA Using Litmus Slots in RFID Systems
IEICE TRANS. COMMUN., VOL.E95 B, NO.4 APRIL 2012 1375 PAPER Novel Dynamic Framed-Slotted ALOHA Using Litmus Slots in RFID Systems Soon-Bin YIM, Jongho PARK, Nonmembers, and Tae-Jin LEE a), Member SUMMARY
More informationDynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System
Dynamic Framed Slotted AOHA Algorithms using Fast Tag Estimation Method for RFID System Jae-Ryong Cha School of Electrical and Computer Engineering Ajou Univ., Suwon, Korea builder@ajou.ac.kr Jae-Hyun
More information3.6 Intersymbol interference. 1 Your site here
3.6 Intersymbol intererence 1 3.6 Intersymbol intererence what is intersymbol intererence and what cause ISI 1. The absolute bandwidth o rectangular multilevel pulses is ininite. The channels bandwidth
More informationCyclostationarity-Based Spectrum Sensing for Wideband Cognitive Radio
9 International Conerence on Communications and Mobile Computing Cyclostationarity-Based Spectrum Sensing or Wideband Cognitive Radio Qi Yuan, Peng Tao, Wang Wenbo, Qian Rongrong Wireless Signal Processing
More informationDecoding the Collisions in RFID Systems
This paper was presented as part of the Mini-Conference at IEEE INFOCOM 2 Decoding the Collisions in RFID Systems Lei Kang, Kaishun Wu, Jin Zhang and Haoyu Tan Department of Computer Science and Engineering
More informationA Modified Profile-Based Location Caching with Fixed Local Anchor for Wireless Mobile Networks
A Modiied Proile-Based Location Caching with Fixed Local Anchor or Wireless Mobile Networks Md. Kowsar Hossain, Tumpa Rani Roy, Mousume Bhowmick 3 Department o Computer Science and Engineering, Khulna
More informationTraffic Assignment Over Licensed and Unlicensed Bands for Dual-Band Femtocells
Traic Assignment Over Licensed and Unlicensed Bands or Dual-Band Femtocells Feilu Liu, Erdem Bala, Elza Erkip and Rui Yang ECE Department, Polytechnic Institute o NYU, Brooklyn, NY 11201 InterDigital Communications,
More informationDKAN0008A PIC18 Software UART Timing Requirements
DKAN0008A PIC18 Sotware UART Timing Requirements 11 June 2009 Introduction Design conditions oten limit the hardware peripherals available or an embedded system. Perhaps the available hardware UARTs are
More informationDesign of Multidimensional Space Motion Simulation System For Spacecraft Attitude and Orbit Guidance and Control Based on Radar RF Environment
2016 Sixth International Conerence on Instrumentation & Measurement, Computer, Communication and Control Design o Multidimensional Space Motion Simulation System For Spacecrat Attitude and Orbit Guidance
More informationOptimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm
IOSR Journal o Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 01 (January. 2015), V1 PP 44-57 www.iosrjen.org Optimizing Reception Perormance o new UWB Pulse shape over Multipath
More informationOn the Suitability of Framed Slotted Aloha based RFID Anti-collision Protocols for Use in RFID-Enhanced WSNs
1 On the Suitability of Framed Slotted Aloha based RFID Anti-collision Protocols for Use in RFID-Enhanced WSNs Dheeraj K. Klair, Kwan-Wu Chin and Raad Raad School of Electrical, Computer and Telecommunications
More informationSection III. Area, Timing and Power Optimization
Section III. Area, Timing and Power Optimization Introduction Physical implementation can be an intimidating and challenging phase o the design process. This section introduces eatures in Altera s Quartus
More informationIntroduction to OFDM. Characteristics of OFDM (Orthogonal Frequency Division Multiplexing)
Introduction to OFDM Characteristics o OFDM (Orthogonal Frequency Division Multiplexing Parallel data transmission with very long symbol duration - Robust under multi-path channels Transormation o a requency-selective
More informationMultiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios
Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios Khalid Hossain, Ayman Assra, and Benoît Champagne, Senior Member, IEEE Department o Electrical and Computer Engineering,
More informationSpectrum allocation with beamforming antenna in heterogeneous overlaying networks
2st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Spectrum allocation with beamorming antenna in heterogeneous overlaying networks Sunheui Ryoo, Changhee Joo and
More informationAnalysis of Power Consumption of H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate
Analysis o Power Consumption o H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate Bambang A.B. Sari, Panos Nasiopoulos and Victor C.M. eung Department o Electrical
More informationFurther developments on gear transmission monitoring
Further developments on gear transmission monitoring Niola V., Quaremba G., Avagliano V. Department o Mechanical Engineering or Energetics University o Naples Federico II Via Claudio 21, 80125, Napoli,
More informationHybrid spectrum arrangement and interference mitigation for coexistence between LTE macrocellular and femtocell networks
Bai and Chen EURASIP Journal on Wireless Communications and Networking 2013, 2013:56 RESEARCH Open Access Hybrid spectrum arrangement and intererence mitigation or coexistence between LTE macrocellular
More informationDynamic Tag Estimation for Optimizing Tree Slotted Aloha in RFID Networks
Dynamic Tag Estimation for Optimizing Tree Slotted Aloha in RFID Networks Gaia Maselli, Chiara Petrioli, Claudio Vicari Computer Science Department Rome University La Sapienza, Italy {maselli, petrioli,
More informationAn Empirical Study of UHF RFID Performance. Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof.
An Empirical Study of UHF RFID Performance Michael Buettner and David Wetherall Presented by Qian (Steve) He CS 577 - Prof. Bob Kinicki Overview Introduction Background Knowledge Methodology and Tools
More informationIEEE C802.16h-05/022r1. IEEE Broadband Wireless Access Working Group <
Project IEEE 802.16 Broadband Wireless Access Working Group Title Cognitive radio concepts or 802.16h Date Submitted 2005-07-11 Source(s) Mariana Goldhamer Alvarion Tel Aviv, 21
More informationLousy Processing Increases Energy Efficiency in Massive MIMO Systems
1 Lousy Processing Increases Energy Eiciency in Massive MIMO Systems Sara Gunnarsson, Micaela Bortas, Yanxiang Huang, Cheng-Ming Chen, Liesbet Van der Perre and Ove Edors Department o EIT, Lund University,
More informationOverexcitation protection function block description
unction block description Document ID: PRELIMIARY VERSIO ser s manual version inormation Version Date Modiication Compiled by Preliminary 24.11.2009. Preliminary version, without technical inormation Petri
More information840 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010
840 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010 Efficient Estimation and Collision-Group-Based Anticollision Algorithms for Dynamic Frame-Slotted ALOHA in RFID
More informationSignal Strength Coordination for Cooperative Mapping
Signal Strength Coordination or Cooperative Mapping Bryan J. Thibodeau Andrew H. Fagg Brian N. Levine Department o Computer Science University o Massachusetts Amherst {thibodea,agg,brian}@cs.umass.edu
More informationA Universal Motor Performance Test System Based on Virtual Instrument
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Universal Motor Perormance Test System Based on Virtual Instrument Wei Li, Mengzhu Li, Qiang Xiao School o Instrument
More informationWorst Case Modelling of Wireless Sensor Networks
Worst Case Modelling o Wireless Sensor Networks Jens B. Schmitt disco Distributed Computer Systems Lab, University o Kaiserslautern, Germany jschmitt@inormatik.uni-kl.de 1 Abstract At the current state
More informationSoftware Defined Radio Forum Contribution
Committee: Technical Sotware Deined Radio Forum Contribution Title: VITA-49 Drat Speciication Appendices Source Lee Pucker SDR Forum 604-828-9846 Lee.Pucker@sdrorum.org Date: 7 March 2007 Distribution:
More informationSequence-based Rendezvous for Dynamic Spectrum Access
Sequence-based endezvous or Dynamic Spectrum Access Luiz A. DaSilva Bradley Dept. o Electrical and Computer Engineering Virginia Tech Arlington, VA, USA ldasilva@vt.edu Igor Guerreiro Wireless Telecommunications
More informationOn the Impact of Fading and Inter-piconet Interference on Bluetooth Performance
On the Impact o Fading and Inter-piconet Intererence on Bluetooth Perormance Andrea Zanella Dept. o Inormation Engineering University o Padova, Padova, Italy zanella@dei.unipd.it Andrea Tonello Bell Labs,
More informationAmplifiers. Department of Computer Science and Engineering
Department o Computer Science and Engineering 2--8 Power ampliiers and the use o pulse modulation Switching ampliiers, somewhat incorrectly named digital ampliiers, have been growing in popularity when
More informationA technique for noise measurement optimization with spectrum analyzers
Preprint typeset in JINST style - HYPER VERSION A technique or noise measurement optimization with spectrum analyzers P. Carniti a,b, L. Cassina a,b, C. Gotti a,b, M. Maino a,b and G. Pessina a,b a INFN
More informationANALYTICAL EVALUATION OF RFID IDENTIFICATION PROTOCOLS. Gaia Maselli
ANALYTICAL EVALUATION OF RFID IDENTIFICATION PROTOCOLS Gaia Maselli maselli@di.uniroma1.it 2 RFID Technology Ø RFID - Radio Frequency Identification Technology enabling automatic object identification
More informationMeasuring the Speed of Light
Physics Teaching Laboratory Measuring the peed o Light Introduction: The goal o this experiment is to measure the speed o light, c. The experiment relies on the technique o heterodyning, a very useul tool
More informationSinusoidal signal. Arbitrary signal. Periodic rectangular pulse. Sampling function. Sampled sinusoidal signal. Sampled arbitrary signal
Techniques o Physics Worksheet 4 Digital Signal Processing 1 Introduction to Digital Signal Processing The ield o digital signal processing (DSP) is concerned with the processing o signals that have been
More informationMultiple access techniques
Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ
More informationOpportunism vs. Cooperation: Analysis of Forwarding Strategies in Multihop Wireless Networks with Random Fading
1 Opportunism vs. Cooperation: Analysis o Forwarding Strategies in Multihop Wireless Networks with Random Fading Chi-Kin Chau, Anand Seetharam, Jim Kurose, Don Towsley Masdar Institute o Science and Technology,
More informationExperimental Verification of a One-turn Transformer Power Supply Circuit for Gate Drive Unit
Experimental Veriication o a One-turn Transormer Power Supply Circuit or Gate Drive Unit Jun-ichi Itoh, Takeshi Kinomae *agaoka University o Technology/Department o Electrical, Electronics and Inormation
More informationDynamic Framed-Slot ALOHA Anti-Collision using Precise Tag Estimation Scheme
Dynamic Framed-Slot ALOHA Anti-Collision using Precise Tag Estimation Scheme Author Pupunwiwat, Prapassara, Stantic, Bela Published 2010 Conference Title Twenty-First Australasian Database Conference (ADC2010)
More informationRequest Request Request Request Request Request Request
TITLE: DATE: March, 0 AFFECTED DOCUMENT: OCuLink.0 SPONSOR: Part I:. Summary o the Functional Changes PCI-SIG ENGINEERING CHANGE REQUEST OCuLink Cable Spec ECR Rev. Alex Haser (Molex), Jay Neer (Molex)
More informationPredicting the performance of a photodetector
Page 1 Predicting the perormance o a photodetector by Fred Perry, Boston Electronics Corporation, 91 Boylston Street, Brookline, MA 02445 USA. Comments and corrections and questions are welcome. The perormance
More informationDevelopment of New Algorithm for Voltage Sag Source Location
Proceedings o the International MultiConerence o Engineers and Computer Scientists 2009 Vol II IMECS 2009, March 8-20, 2009, Hong Kong Development o New Algorithm or Voltage Sag Source Location N. Hamzah,
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification
Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,
More informationDouble Time Slot RFID Anti-collision Algorithm based on Gray Code
Double Time Slot RFID Anti-collision Algorithm based on Gray Code Hongwei Deng 1 School of Computer Science and Technology, Hengyang Normal University; School of Information Science and Engineering, Central
More informationArtefact Characterisation for JPEG and JPEG 2000 Image Codecs: Edge Blur and Ringing
I'.NCINEER- Vol. XXXX, No. 3, pp. 25-3, 27
More informationEffect of Layer Spacing and Line Width of PCB Coil on Resonant Frequency Shen WANG, Zhi-qiang WEI, Yan-ping CONG * and Hao-kun CHI
2016 International Conerence on Sustainable Energy, Environment and Inormation Engineering (SEEIE 2016) ISBN: 978-1-60595-337-3 Eect o Layer Spacing and Line Width o PCB Coil on Resonant Frequency Shen
More informationA Parallel Identification Protocol for RFID Systems
A Parallel Identification Protocol for RFID Systems Linghe Kong, Liang He, Yu Gu, Min-You Wu, Tian He Singapore University of Technology and Design, Singapore Shanghai Jiao Tong University, China University
More informationDARK CURRENT ELIMINATION IN CHARGED COUPLE DEVICES
DARK CURRENT ELIMINATION IN CHARGED COUPLE DEVICES L. Kňazovická, J. Švihlík Department o Computing and Control Engineering, ICT Prague Abstract Charged Couple Devices can be ound all around us. They are
More informationCOMPRESSIVE CLASSIFICATION FOR THROUGH-THE-WALL RADAR IMAGING. Mark R. Balthasar, Michael Leigsnering, Abdelhak M. Zoubir
20th European Signal Processing Conerence (EUSIPCO 2012) Bucharest, Romania, August 27-31, 2012 COMPRESSIVE CLASSIFICATION FOR THROUGH-THE-WALL RADAR IMAGING Mark R. Balthasar, Michael Leigsnering, Abdelhak
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification
Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification 1 RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,
More informationDaniela Dragomirescu 1, 2
PERFORMANCE EVALUATION OF IMPULSE RADIO ULTRA WIDE BAND WIRELESS SENSOR NETWORKS Aubin Lecointre, 2 alecoint@laas.r Abdoulaye Berthe, 2 aberthe@laas.r Daniela Dragomirescu, 2 daniela@laas.r Jacques Turbert
More informationAnalysis of energy consumption for multiple object identification system with active RFID tags
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2008; 8:953 962 Published online 18 September 2007 in Wiley InterScience (www.interscience.wiley.com).552 Analysis of energy consumption
More informationDistributed Resource Allocation Based on Queue Balancing in Multi-hop Cognitive Radio Networks
Distributed Resource Allocation Based on Queue Balancing in Multi-hop Cognitive Radio Networks Wei Wang, Kang G. Shin and Wenbo Wang Wireless Signal Processing and Network Lab (WSPN) Key Lab o Universal
More informationMIMO-Aware Routing in Wireless Mesh Networks
MIMO-Aware Routing in Wireless Mesh Networks Shan Chu and Xin Wang Department o Electrical and Computer Engineering Stony Brook University, Stony Brook, New York 794 Email: {schu, xwang}@ece.sunysb.edu
More informationCardinality Estimation for Large-scale RFID Systems
Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Department of Computer Science and Engineering Hong Kong University of Science and Technology {cqian, cpeglun,
More informationFrequency Hopped Spread Spectrum
FH- 5. Frequency Hopped pread pectrum ntroduction n the next ew lessons we will be examining spread spectrum communications. This idea was originally developed or military communication systems. However,
More informationRADIO Frequency Identification (RFID) brings a revolutionary
Exploring Tag Distribution in Multi-reader RFID Systems Feng Zhu, Bin Xiao, Senior Member, IEEE, Jia Liu, Member, IEEE, Bin Wang, Qingfeng Pan, Li-jun Chen Abstract Radio Frequency Identification RFID)
More informationAnti-collision Scheme Analysis of RFID System
Anti-collision Scheme Analysis of RFID System Zhongxiang Wang, Dan Liu, Xiaofang Zhou, Xi Tan, Junyu Wang, Hao Min Auto-ID Labs White Paper WP-HARDWARE-045 Zhongxiang Wang M.S. student Auto-ID Lab at Fudan
More informationFast and Reliable Unknown Tag Detection in Large-Scale RFID Systems
Fast and Reliable Unknown Tag Detection in Large-Scale RFID Systems Wei Gong *, Jiangchuan Liu *, and Zhe Yang * {gongweig, jcliu}@sfu.ca, zyang@nwpu.edu.cn * School of Computing Science, Simon Fraser
More informationRFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014
RFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014 Un. of Rome La Sapienza Chiara Petrioli, Gaia Maselli Department of Computer Science University of Rome Sapienza Italy RFID Technology Ø RFID
More informationAddressing the 5G Cell Switch-off Problem with a Multi-objective Cellular Genetic Algorithm
Addressing the 5G Cell Switch-o Problem with a Multi-objective Cellular Genetic Algorithm Francisco Luna, Raael M. Luque-Baena, Jesús Martínez Dept. o Languages and Computer Science Universidad de Málaga
More informationPower Efficiency in IEEE a WLAN with Cross-Layer Adaptation
Power Eiciency in IEEE 802.11a WLA with Cross-Layer Adaptation Jun Zhao, Zihua Guo, and Wenwu Zhu Microsot Research Asia 3/F, Beijing Sigma Center, o.49, Zhichun Road, Haidian District Beijing 100080,
More informationConsumers are looking to wireless
Phase Noise Eects on OFDM Wireless LAN Perormance This article quantiies the eects o phase noise on bit-error rate and oers guidelines or noise reduction By John R. Pelliccio, Heinz Bachmann and Bruce
More informationA Wavelet Approach to Wideband Spectrum Sensing for Cognitive Radios
A Wavelet Approach to Wideband Spectrum Sensing or Cognitive Radios Zhi Tian Department o Electrical & Computer Engineering Michigan Technological University Houghton, MI 4993 USA ztian@mtu.edu Georgios
More informationPLANNING AND DESIGN OF FRONT-END FILTERS
PLANNING AND DESIGN OF FRONT-END FILTERS AND DIPLEXERS FOR RADIO LINK APPLICATIONS Kjetil Folgerø and Jan Kocba Nera Networks AS, N-52 Bergen, NORWAY. Email: ko@nera.no, jko@nera.no Abstract High capacity
More informationPublic Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process
Public Watermarking urviving General caling and ropping: An Application or Print-and-can Process hing-yung Lin Department o Electrical Engineering olumbia University 500 W0th t. #3 New York, NY 007, UA
More informationParametric Design Model of Disc-scoop-type Metering Device Based on Knowledge Engineering. Yu Yang 1, a
Advanced Materials Research Online: 2013-10-31 ISSN: 1662-8985, Vols. 834-836, pp 1432-1435 doi:10.4028/www.scientiic.net/amr.834-836.1432 2014 Trans Tech Publications, Switzerland Parametric Design Model
More informationCOSC 3213: Communication Networks Chapter 5: Handout #6
OS 323: ommunication Networks hapter 5: Handout #6 Instructor: Dr. Marvin Mandelbaum Department o omputer Science York University F8 Section E Topics:. Peer-to-peer and service models 2. RQ and how to
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationEXPLOITING RMS TIME-FREQUENCY STRUCTURE FOR DATA COMPRESSION IN EMITTER LOCATION SYSTEMS
NAECON : National Aerospace & Electronics Conerence, October -,, Dayton, Ohio 7 EXPLOITING RMS TIME-FREQUENCY STRUCTURE FOR DATA COMPRESSION IN EMITTER LOCATION SYSTEMS MARK L. FOWLER Department o Electrical
More informationA Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags
J Inf Process Syst, Vol., No., pp.95~3, March 25 http://dx.doi.org/.3745/jips.3. ISSN 976-93X (Print) ISSN 292-85X (Electronic) A Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags
More informationOptimal Control Motion Planning
Optimal Control Motion Planning O. Hachour Abstract Motion planning is one o the important tasks in intelligent control o an autonomous mobile robot. An optimal ree path without collision is solicited
More informationAutonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc Network
Autonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc etwork Young An Kim 1, Choong Seon Hong 1 1 Department of Electronics and Information, Kyung Hee University, 1
More informationMFCC-based perceptual hashing for compressed domain of speech content identification
Available online www.jocpr.com Journal o Chemical and Pharmaceutical Research, 014, 6(7):379-386 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 MFCC-based perceptual hashing or compressed domain
More informationA MODIFIED ISLANDING DETECTION METHOD FOR HYBRID AC/DC MICROGRIDS WITH REDUCED DETECTION TIME
A MODIFIED ISLANDING DETECTION METHOD FOR HYBRID AC/DC MICROGRIDS WITH REDUCED DETECTION TIME Meam SADEGHI Tabriz Electric Power Dtribution Company Iran Shahid Beheshti University, A.C. Iran Maam_sadeghi@ieee.org
More informationA temperature insensitive quartz resonator force sensor
Meas. Sci. Technol. 11 (2000) 1565 1569. Printed in the UK PII: S0957-0233(00)15873-4 A temperature insensitive quartz resonator orce sensor Zheyao Wang, Huizhong Zhu, Yonggui Dong and Guanping Feng Department
More informationBode Plot based Auto-Tuning Enhanced Solution for High Performance Servo Drives
Bode lot based Auto-Tuning Enhanced Solution or High erormance Servo Drives. O. Krah Danaher otion GmbH Wachholder Str. 4-4 4489 Düsseldor Germany Email: j.krah@danaher-motion.de Tel. +49 3 9979 133 Fax.
More informationA Novel Anti-Collision Algorithm for High-Density RFID Tags
A Novel Anti-Collision Algorithm for High-Density RFID s 33 A Novel Anti-Collision Algorithm for High-Density RFID s Sarawut Makwimanloy 1, Piya Kovintavewat 2, Urachada Ketprom 3, and Charturong Tantibundhit
More informationFairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness
Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness Muhammad Shahzad Department of Computer Science North Carolina State University Raleigh, NC, USA mshahza@ncsu.edu
More informationImage Characteristic Based Rate Control Algorithm for HEVC
Image Characteristic Based Rate Control Algorithm or HEVC Mayan Fei, Zongju Peng*, Weiguo Chen, Fen Chen Faculty o Inormation Science and Engineering, Ningbo University, Ningbo 352 China *pengzongju@26.com;
More informationBezier-curve Navigation Guidance for Impact Time and Angle Control
Bezier-curve Navigation Guidance or Impact Time and Angle Control Gun-Hee MOON 1, Sang-Wook SHIM 1, Min-Jea TAHK*,1 *Corresponding author 1 Korea Advanced Institute o Science and Technology, Daehakro 91
More informationECEN 5014, Spring 2013 Special Topics: Active Microwave Circuits and MMICs Zoya Popovic, University of Colorado, Boulder
ECEN 5014, Spring 2013 Special Topics: Active Microwave Circuits and MMICs Zoya Popovic, University o Colorado, Boulder LECTURE 13 PHASE NOISE L13.1. INTRODUCTION The requency stability o an oscillator
More information