AN ENHANCED BINARY ANTI-COLLISION ALGORITHM OF BACKTRACKING IN RFID SYSTEM
|
|
|
- Camilla Howard
- 10 years ago
- Views:
Transcription
1 Progress In Electromagnetics Research B, Vol. 4, , 2008 AN ENHANCED BINARY ANTI-COLLISION ALGORITHM OF BACKTRACKING IN RFID SYSTEM X.-L. Shi, X.-W. Shi, Q.-L. Huang, and F. Wei National Key Laboratory of Antennas and Microwave Technology Xidian University Xi an , P. R. China Abstract On the base of the binary search algorithm of backtracking, an enhanced binary anti-collision search algorithm for radio frequency identification (RFID) system is presented in this paper. With the method of transferring the collision bit in place of the ID of the tag, the proposed algorithm can improve identification efficiency significantly. Mathematical simulation result shows that compared with the binary search algorithm, dynamic binary search algorithm and the binary search algorithm of backtracking, the proposed algorithm outperforms the three algorithms previous when handling multiple RFID tags simultaneously. 1. INTRODUCTION Radio frequency identification (RFID) system is a contact-less automatic identification system. Now it has received much attention in many industries like manufacturing companies, material flow systems, etc. Compared with the barcode, a RFID system has many merits as follows [1]: A. The information stored in a tag is much larger than that in a barcode. B. The information stored in tags can be reprogrammed and tags can be used repeatedly. C. A tag has a much longer life than a barcode especially when the working condition is extremely bad. D. When there is a barrier in front of a barcode, the barcode can not be read by a reader, but a tag can be read due to the different working styles.
2 264 Shi et al. E. A tag can be scanned by a reader more quickly than a barcode. RFID system consists of readers and a large number of tags [1]. A tag has an identification number (ID) and a reader recognizes an object through consecutive communications with the tag attached to it. The reader sends out a signal which supplies power and instructions to a tag. The tag transmits its ID to the reader and the reader consults an external database with received ID to recognize the object. The process of the identification is shown in Figure 1. The reader must be able to identify tags as quickly as possible. However, when multiple tags transmit their IDs simultaneously, data collision resulted from the data transaction between more tags and the reader at the same time occurs. Therefore, anti-collision algorithms are required to identify tags correctly and efficiently. Figure 1. The structure of RFID system. Nowadays, tag anti-collision algorithms are mainly separated into ALOHA-based and tree-based [1]. The ALOHA-based algorithms such as ALOHA, slotted ALOHA, frame slotted ALOHA and dynamic frame slotted ALOHA, reduce the probability of tag collisions since tags are scheduled to transmit at distinct times. However, they have a serious problem that a specific tag may not be identified for a long time, leading to the so-called tag starvation problem. With the increase of the number of tags, the identification performance will be deteriorated sharply. Comparing to ALOHA algorithms, tree-based search algorithms such as binary search algorithm [2] and dynamic binary search algorithm [3, 4] are able to identify tags correctly according to locating the collision bit and do not cause the tag starvation as in the ALOHA-based algorithm. However, relatively long time is required for the reader to identify all the tags. Recently, the binary search algorithm of backtracking is proposed [2, 5], which is an improvement on binary tree searching algorithm. When there is no collision, the reader can acquire next request signal from superior layer. This algorithm has an advantage comparing with old algorithm
3 Progress In Electromagnetics Research B, Vol. 4, in testing times of identifying n tags. On the base of the binary search algorithm of backtracking, an enhanced algorithm is presented in this paper which can identify tags more efficiently. With the improvement on the length of the data transferred, the new algorithm has the potential to suppress the occurrence of collisions, shorten the total delay for recognizing all tags and improve the identification efficiency greatly. 2. BINARY ANTI-COLLISION SEARCH ALGORITHMS [1, 6] In this algorithm, Manchester code is used so as to recognize the bits where there is a collision. In Manchester code, the ascending edge is coded as logical 0, and the descending edge is coded as logical 1. Therefore when the reader receives an identification code and the states of the code do not change in some bits, the reader can know where collisions occur. Supposed there are two tags: (tag1), (tag2), these two tags will answer the reader at the same time when the reader sends a RQUEST command to them. It can be seen that D3 and D4 of tag1 s identification code are logical 0 and logical 1 respectively, but those of the same bits of the tag2 s identification code are logical 1 and logical 0 respectively, thus the states of the identification code received by the reader will not change in these two bits which are shown by the broken lines in Figure 2. Then the reader can know collisions occur in these two bits. In binary search algorithm, tags whose first collided bit is logical 1 do not respond to the reader s next request while tags whose first collided bit is logical 0 send their Figure 2. Collisions in received ID.
4 266 Shi et al. identification codes. After each request, the collided bits become less. The searching process keeps going until the identification code of a tag is recognized and will be repeated from the beginning until the identification codes of all the tags are recognized. 3. THE PRINCIPLE OF THE PROPOSED BINARY SEARCH ALGORITHM OF BACKTRACKING 3.1. Principle of the Enhanced Algorithm An enhanced binary anti-collision algorithm for RFID system is proposed in this paper based on the binary search algorithm of backtracking. When there was no collision, the reader can acquire next request signal from superior layer [5]. Furthermore, in this paper, the method of transferring the collision bit instead of the ID of tags to decrease the length of the binary encoding sent by the request order is proposed. As the change of the collision bit, the length of the data transferred varies for dynamic binary search algorithm, however, the length of the encoding which represents the collision bit is constant. For example, 3 bits can be used to represent the collision bit for the tags with the ID of 8 bits. Therefore, the reader just transfers the information of collision bit instead of the whole ID. Then the tags compare the number indicated in the request with 0 after receiving the request. If it is equal to 0, the tags continue to transmit their remaining IDs. Otherwise, the tags will not response to the following request until it receives the request in the next anti-collision cycle Example The detailed process can be demonstrated from the following example. In this example there are 4 tags in the interrogation zone of a reader. Their IDs are (tag1), (tag2), (tag3), (tag4), respectively. First time: All tags respond after receiving the request (NULL) sent by the reader. Second time: Detecting the collision, the reader sends the first collision bit (001) to the tags and those tags whose D1 are 0 respond. Hence, tag2 and tag3 respond and send data from D2 to D7 to the reader respectively. Third time: Detecting the collision again, the reader sends the request (011) and those tags whose D3 are 0 respond. Here, tag2 responds and sends the data from D4 to D7 to the reader. As no collision occurs the reader reads the data from tag2 and sends the order of UNSELECT to let tag2 be inactive.
5 Progress In Electromagnetics Research B, Vol. 4, Figure 3. The process of identification by the proposed algorithm. Fourth time: After identifying one tag successfully, the algorithm backtracks to the last request. Now, the reader sends the request (001) again and tag1 and tag3 respond. Fifth time: The reader sends the request (101) after detecting the collision again and only tag1 responds. As no collision occurs, the reader reads the data from tag1. The reader sends the UNSELECT order to let tag1 be inactive. Sixth time: The algorithm backtracks to the last request at the node again. Now, the reader sends the request (001) again and only tag3 responds. Then, the reader reads the data from tag3 and let it be inactive. Seventh time: The algorithm returns back to the last request and the reader sends the request (NULL). Here, only tag4 responds and the reader reads the data from it. Until now, all the tags are successfully identified. The working-flow of this identification can be seen in Figure SIMULATION RESULT Basing on the theory of the binary search algorithm, it is known that the searching time depends on two factors. The first one is the number of the tags within the interrogation area of a reader and the other one is the UID (Ubiquitous Identification). The process of the identification will take more time when more tags and longer UID are considered. N, n, m, M, S represent the total searching times, the number of the tags within the interrogation area of a reader, the length of the encoding of the tags, the length of the encoding sent by the reader each time and the total length of the data transferred during the researching process respectively. Therefore, S is equal to N M.
6 268 Shi et al. For binary search algorithm and dynamic binary search algorithm, if the number of the tags is n, the total searching times N can be expressed as N = n(n +1)/2 [7]. In order to identify the four tags in the previous example using proposed algorithm, the total searching times N can be expressed as N(4) = (4 1) = 7. The formula of N = 2n 1 to calculate the total searching times can be obtained by mathematical induction [2, 5]. The length of the encoding sent by the reader each time M for dynamic binary search algorithm and the proposed algorithm is equal to (m+1)/2 and log 2 m respectively. Therefore, the total length of the data transferred during the researching process S is as follows: Binary search algorithm: n(n +1) S 1 = 2 Dynamic binary search algorithm: m (1) S 2 = n(n +1) 2 Backtracking binary search algorithm: (m +1) 2 (2) Proposed algorithm in our paper: S 3 =(2n 1) m (3) S 4 =(2n 1) log 2 m (4) With m = 64, the total length of the data transferred during the researching process of the four algorithms is shown in Table 1. Table 1. The total length of the data transferred of the four algorithms (m = 64). n S S S S S With n = 10, the total length of the data transferred during the researching process of the four algorithms is shown in Table 2.
7 Progress In Electromagnetics Research B, Vol. 4, Table 2. The total length of the data transferred of the four algorithms (n = 10). m S S S S S The total length of the data transferred means the time of transferring the anti-collision requests based on the binary search algorithm. Therefore, it is obvious that the decrease of the length of the data transferred can improve the efficiency of the identification. According to the first table above, it can be seen that when the length of the encoding of the tags remains stable and the number of the tags is equal to 10, the total length of the data transferred of the proposed anti-collision algorithm is 114. However, the figure for the binary search algorithm, the dynamic binary search algorithm and the binary search algorithm of backtracking is 3250, 1787, 1216 respectively. Hence, the performance of the proposed algorithm precedes the other three algorithms considerably. Meanwhile, the longer the bits of the encoding of tags and the bigger the number of the tags within the interrogation area of a reader, the better the performance is. 5. CONCLUSION This paper proposed an enhanced binary anti-collision algorithm which can improve identification efficiency significantly. With transferring the collision bit, the length of the data transferred can be decreased dramatically. The simulation results show that the proposed algorithm has the superiority comparing to the three other algorithms. ACKNOWLEDGMENT The work is supported by the project of microwave RFID system and industrialization.
8 270 Shi et al. REFERENCES 1. Finkenzeller, K., RFID Handbook: Radio-frequency Identification Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd edition, John Wiley, New York, Jiang, L.-F., G.-Z. Lu, and Y.-W. Xin, Research on anti-collision algorithm in radio frequency identification system, Computer Engineering and Applications, Vol. 15, 29 32, Shih, D., P.-L. Sun, D.-C. Yen, and S.-M. Huang, Taxonomy and survey of RFID anti-collision protocols, Computer and Communications, Vol. 29, No. 11, , Law, C., K. Lee, and K. Y. Siu, Efficient memory-less protocol for tag identification, Proc. 4th International Workshop on DIALM, 75 84, Boston, Massachusetts, ISA, Du, H.-T., K.-L. Xu, and W.-L. Wang, An anti-collision algorithm based on binary-tree searching of backtracking, Journal of Yunnan University, Vol. 28, , Liu, L.-A., Z.-H. Xie, J.-T. Xi, and S.-L. Lai, An improved anti-collision algorithm in RFID system, Mobile Technology, Applications and Systems, nd International Conference, Nov Ju, W.-C. and C.-F. Yu, An anti-collision RFID algorithm based on the dynamic binary, Journal of Fudan University, Vol. 44, No. 1, 46 50, Dai, X.-W., C.-H. Liang, B. Wu, and J.-W. Fan, Novel dual-band bandpass filter design using microstrip open-loop resonators, Journal of Electromagnetic Waves and Application, Vol. 22, No. 2, , Wu, B., B. Li, T. Su, and C. H. Liang, Equivalent-circuit analysis and lowpass filter design of split-ring resonator DGS, Journal of Electromagnetic Waves and Application, Vol. 20, No. 14, , Khalaj-Amirhosseini, M., Microwave filters using waveguides filled by multi-layer dielectric, Progress In Electromagnetics Research, PIER 66, , Chen, Z.-X., X.-W. Dai, and C.-H. Liang, Novel dual-mode dualband bandpass filter using double square-loop structure, Progress In Electromagnetics Research, PIER 77, , Zhao, L.-P., X.-W. Dai, Z.-X. Chen, and C.-H. Liang, Novel design of dual-mode dual-band bandpass filter with triangular resonators, Progress In Electromagnetics Research, PIER 77, , 2007.
9 Progress In Electromagnetics Research B, Vol. 4, Xue, W., C.-H. Liang, X.-W. Dai, and J.-W. Fan, Design of miniature planar dual-band filter with 0 feed structures, Progress In Electromagnetics Research, PIER 77, , Fan, J.-W., C.-H. Liang, and X.-W. Dai, Design of cross-coupled dual-band filter with equal-length split-ring resonators, Progress In Electromagnetics Research, PIER 75, , Fan, Z., S. Qiao, H.-F. Jiang Tao, and L.-X. Ran, Signal descriptions and formulations for long range UHF RFID readers, Progress In Electromagnetics Research, PIER 71, , Kim, D.-Y., H.-G. Yoon, B.-J. Jang, and J.-G. Yook, Interference analysis of UHF RFID systems, Progress In Electromagnetics Research B, Vol. 4, , Zainud-Deen, S. H., M. E. S. Badr, E. El-Deen, K. H. Awadalla, and H. A. Sharshar, Microstrip antenna with defected ground plane structure as a sensor for landmines detection, Progress In Electromagnetics Research B, Vol. 4, 27 39, Zhang, Y.-Q. and Z.-S. Wu, The calculation of angular sideplay amount produced by radiation pressure acting on the space object, Progress In Electromagnetics Research B, Vol. 4, 67 77, Liang, C.-H., L. Li, and X.-J. Dang, Inequality condition for grating lobes of planar phased array, Progress In Electromagnetics Research B, Vol. 4, , Su, D., D.-M. Fu, and D. Yu, Genetic algorithms and method of moments for the design of PIFAs, Progress In Electromagnetics Research Letters, Vol. 1, 9 18, Zhang, X.-C., Z.-Y. Yu, and J. Xu, Novel band-pass substrate integrated waveguide (SIW) filter based on complementary split ring resonators (CSRRs), Progress In Electromagnetics Research, PIER 72, 39 46, Zhao, X. W., C.-H. Liang, and L. Liang, Multilevel fast multipole algorithm for radiation characteristics of shipborne antennas above seawater, Progress In Electromagnetics Research, PIER 81, , 2008.
National Laboratory of Antennas and Microwave Technology Xidian University Xi an, Shaanxi 710071, China
Progress In Electromagnetics Research, PIER 76, 237 242, 2007 A BROADBAND CPW-FED T-SHAPE SLOT ANTENNA J.-J. Jiao, G. Zhao, F.-S. Zhang, H.-W. Yuan, and Y.-C. Jiao National Laboratory of Antennas and Microwave
J. Zhang, J.-Z. Gu, B. Cui, andx. W. Sun Shanghai Institute of Microsystem & Information Technology CAS Shanghai 200050, China
Progress In Electromagnetics Research, PIER 69, 93 100, 2007 COMPACT AND HARMONIC SUPPRESSION OPEN-LOOP RESONATOR BANDPASS FILTER WITH TRI-SECTION SIR J. Zhang, J.-Z. Gu, B. Cui, andx. W. Sun Shanghai
TWO-PORT ANTENNA WITH HIGH ISOLATION FOR DTV/GSM/UMTS INDOOR APPLICATIONS
Progress In Electromagnetics Research Letters, Vol. 10, 107 113, 2009 TWO-PORT ANTENNA WITH HIGH ISOLATION FOR DTV/GSM/UMTS INDOOR APPLICATIONS S.-G. Zhou, B.-H. Sun, Y.-F. Wei, and Q.-Z. Liu National
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
Connected U-Slots Patch Antenna for WiMAX Applications
Connected U-Slots Patch Antenna for WiMAX Applications Hattan F. AbuTarboush (1), D. Budimir (2), R. Nilavalan (1) and H. S. Al-Raweshidy (1) (1) Wireless Network and Communication Centre (WNCC), School
Efficient Novel Anti-collision Protocols for Passive RFID Tags
Efficient Novel Anti-collision Protocols for Passive RFID Tags Three methods for fast tag identification: bislotted tree based RFID tag anti-collision protocols, query tree based reservation, and the combining
A Fractal-based Printed Slot Antenna for Multi-band Wireless Applications
Progress In Electromagnetics Research Symposium Proceedings, Stockholm, Sweden, Aug. 12-15, 2013 1047 A Fractal-based Printed Slot Antenna for Multi-band Wireless Applications Seevan F. Abdulkareem, Ali
Design of an U-slot Folded Shorted Patch Antenna for RF Energy Harvesting
Design of an U-slot Folded Shorted Patch Antenna for RF Energy Harvesting Diponkar Kundu, Ahmed Wasif Reza, and Harikrishnan Ramiah Abstract Novel optimized U-slot Folded Shorted Patch Antenna (FSPA) is
STUDY OF ELLPITICAL SLOT UWB ANTENNAS WITH A 5.0 6.0 GHz BAND-NOTCH CAPABILITY
Progress In Electromagnetics Research C, Vol. 16, 207 222, 2010 STUDY OF ELLPITICAL SLOT UWB ANTENNAS WITH A 5.0 6.0 GHz BAND-NOTCH CAPABILITY A. Elboushi, O. M. Ahmed, and A. R. Sebak Electrical and Computer
Progress In Electromagnetics Research C, Vol. 38, 67 78, 2013
Progress In Electromagnetics Research C, Vol. 38, 67 78, 2013 DESIGN AND INVESTIGATION OF A DUAL-BAND ANNULAR RING SLOT ANTENNA FOR AIRCRAFT APPLICATIONS Li Sun *, Bao-Hua Sun, Guan-Xi Zhang, Dan Cao,
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu [email protected] Jen-Hou Liu [email protected] Min-Sheng
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
PRINTED ANTENNA FOR PENTA-BAND WWAN TABLET COMPUTER APPLICATION USING EMBED- DED PARALLEL RESONANT STRUCTURE
Progress In Electromagnetics Research, Vol. 136, 725 737, 2013 PRINTED ANTENNA FOR PENTA-BAND WWAN TABLET COMPUTER APPLICATION USING EMBED- DED PARALLEL RESONANT STRUCTURE Zhi Chen 1, Yongling Ban 2, *,
Review Paper for Broadband CPW-Fed T-Shape Slot Antenna
Review Paper for Broadband CPW-Fed T-Shape Slot Antenna Shahpure Sana 1, Bharate Rajashri 2, Prof. Jadhav D.A. 3 1,2 BE, Dept. of E&TC, Brahmdevdada Mane Institute of Technology, Dist. Solapur (Maharashtra)
The Research and Application of College Student Attendance System based on RFID Technology
The Research and Application of College Student Attendance System based on RFID Technology Zhang Yuru, Chen Delong and Tan Liping School of Computer and Information Engineering, Harbin University of Commerce,
The design of an open laboratory information management system based upon a browser/server (B/S) architecture
World Transactions on Engineering and Technology Education Vol.11, No.1, 2013 2013 WIETE The design of an open laboratory information management system based upon a browser/server (B/S) architecture Wen-cheng
Progress In Electromagnetics Research C, Vol. 11, 147 154, 2009 COMPACT SIZE AND DUAL BAND SEMICIRCLE SHAPED ANTENNA FOR MIMO APPLICATIONS
Progress In Electromagnetics Research C, Vol. 11, 147 154, 2009 COMPACT SIZE AND DUAL BAND SEMICIRCLE SHAPED ANTENNA FOR MIMO APPLICATIONS R. Sadeghi Fakhr Department of Electrical Engineeri Islamic Azad
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
Design & Simulation of 8-Shape Slotted Microstrip Patch Antenna
World Applied Sciences Journal 31 (6): 1065-1071, 2014 ISSN 1818-4952 IDOSI Publications, 2014 DOI: 10.5829/idosi.wasj.2014.31.06.1462 Design & Simulation of 8-Shape Slotted Microstrip Patch Antenna Sohag
Barcode Based Automated Parking Management System
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Barcode Based Automated Parking Management System Parth Rajeshbhai Zalawadia 1 Jasmin
A PRACTICAL MINIATURIZED U-SLOT PATCH ANTENNA WITH ENHANCED BANDWIDTH
Progress In Electromagnetics Research B, Vol. 3, 47 62, 2008 A PRACTICAL MINIATURIZED U-SLOT PATCH ANTENNA WITH ENHANCED BANDWIDTH G. F. Khodaei, J. Nourinia, and C. Ghobadi Electrical Engineering Department
ULTRA-WIDEBAND BANDPASS FILTERS USING MULTILAYER SLOT COUPLED TRANSITIONS
ULTRA-WIDEBAND BANDPASS FILTERS USING MULTILAYER SLOT COUPLED TRANSITIONS Mourad Nedil, Tayeb Denidni, Azzeddine Djaiz, Halim Boutayeb To cite this version: Mourad Nedil, Tayeb Denidni, Azzeddine Djaiz,
A Novel Multi Frequency Rectangular Microstrip Antenna with Dual T Shaped Slots for UWB Applications
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. VI (Feb. 2014), PP 120-124 A Novel Multi Frequency Rectangular Microstrip
! #! % & % ( )! & +,,.! / 0 1 /) ) %222 3 4 1 5 6. /,,, %778,,9 / 6, : 0 9, 99, 3 +,, 9 9
! #! % & % ( )! & +,,.! / 0 1 /) ) %222 3 4 1 5 6. /,,, %778,,9 / 6, : 0 9, 99, 3 +,, 9 9 ; 896 IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 56, NO. 4, APRIL 2008 A Circuit-Theoretic Approach
A DUAL-POLARIZED WIDE-BAND PATCH ANTENNA FOR INDOOR MOBILE COMMUNICATION APPLICA- TIONS
Progress In Electromagnetics Research, PIER 1, 189 2, 2010 A DUAL-POLARIZED WIDE-BAND PATCH ANTENNA FOR INDOOR MOBILE COMMUNICATION APPLICA- TIONS M. Secmen and A. Hizal Department of Electrical and Electronics
Beam-Steerable Microstrip-Fed Bow-Tie Antenna Array for Fifth Generation Cellular Communications Ojaroudiparchin, Naser; Shen, Ming; Pedersen, Gert F.
Aalborg Universitet Beam-Steerable Microstrip-Fed Bow-Tie Antenna Array for Fifth Generation Cellular Communications Ojaroudiparchin, Naser; Shen, Ming; Pedersen, Gert F. Published in: 10th European Conference
Chinese Academy of Sciences, 865 Chang Ning Road, Shanghai 200050, China
Progress In Electromagnetics Research Letters, Vol. 39, 115 126, 2013 MULTIBAND SLOT ANTENNAS FOR METAL BACK COVER MOBILE HANDSETS Jiangwei Zhong 1, 3, Robert M. Edwards 2, Lei Ma 3, and Xiaowei Sun 1,
GPR Polarization Simulation with 3D HO FDTD
Progress In Electromagnetics Research Symposium Proceedings, Xi an, China, March 6, 00 999 GPR Polarization Simulation with 3D HO FDTD Jing Li, Zhao-Fa Zeng,, Ling Huang, and Fengshan Liu College of Geoexploration
SIW 2D PLANAR ARRAY WITH FOUR CROSS SLOTS RADIATOR AND TUNING VIAS
Progress In Electromagnetics Research C, Vol. 40, 83 92, 2013 SIW 2D PLANAR ARRAY WITH FOUR CROSS SLOTS RADIATOR AND TUNING VIAS P. Sanchez-Olivares, J. L. Masa-Campos *, J. A. Ruiz-Cruz, and B. Taha-Ahmed
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
LibRFID: Automation Software for Library Management System Using RFID Technology
LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi,
Planar Inter Digital Capacitors on Printed Circuit Board
1 Planar Inter Digital Capacitors on Printed Circuit Board Ajayan K.R., K.J.Vinoy Department of Electrical Communication Engineering Indian Institute of Science, Bangalore, India 561 Email {ajayanr jvinoy}
A NOVEL SHIELD FOR GSM 1800 MHz BAND USING FREQUENCY SELECTIVE SURFACE
Progress In Electromagnetics Research Letters, Vol. 38, 193 199, 2013 A NOVEL SHIELD FOR GSM 1800 MHz BAND USING FREQUENCY SELECTIVE SURFACE Ramprabhu Sivasamy 1, *, Malathi Kanagasabai 1, Sanjay Baisakhiya
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper
Research Article A Dual Band Patch Antenna with a Pinwheel-Shaped Slots EBG Substrate
International Antennas and Propagation Volume 21, Article ID 8171, 8 pages http://dx.doi.org/1.11/21/8171 Research Article A Dual Band Patch Antenna with a Pinwheel-Shaped Slots EBG Substrate iaoyan Zhang,
Applying RFID in traffic junction monitoring
Second Conference of Junior Researchers in Civil Engineering 11 Applying RFID in traffic junction monitoring Nikol Krausz BME Department of Photogrammerty and Geoinformatics, e-mail: [email protected]
by Hiroyuki Tamaoka *, Hiroki Hamada * and Takahiro Ueno * 1. INTRODUCTION 2. DEVELOPMENTAL TASKS
by Hiroyuki Tamaoka *, Hiroki Hamada * and Takahiro Ueno * Antennas for mobile phone handsets are generally required to have such ABSTRACT characteristics as compactness, complete built-in mountability,
On the Security of RFID
On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com
NFC APPLICATIONS IN THE TRACKING SYSTEMS
Advanced Logistic Systems, Vol. 7, No. 2 (2013), pp. 41 48. NFC APPLICATIONS IN THE TRACKING SYSTEMS TAMÁS HARTVÁNYI 1 CSABA I. HENCZ 2 Abstract: Radio Frequency Identification (RFID) and a Near Field
RFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
A Dual-Band Beam-Switched Slot Array for GSM 900/1800MHz
Proceedings of Asia-Pacific Microwave Conference 2006 A Dual-Band Beam-Switched Slot Array for GSM 900/1800MHz Yijun Liu, Zhongxiang Shen, Boyu Zheng and Weihua Tan School of Electrical and Electronic
Technical Support Bulletin Nr.18 Modbus Tips
Technical Support Bulletin Nr.18 Modbus Tips Contents! Definitions! Implemented commands! Examples of commands or frames! Calculating the logical area! Reading a signed variable! Example of commands supported
CSMA Multi-Stage Anti-collision Protocol for Active RFID Systems
CSMA Multi-Stage Anti-collision Protocol for Active RFID Systems Alejandro Palomo-López, M. Victoria Bueno-Delgado, Esteban Egea-López, Juan J. Alcaraz-Espín and Javier Vales-Alonso Department of Information
Integration of radio frequency identification and building information modelling for decentralised information management
icccbe 2010 Nottingham University Press Proceedings of the International Conference on Computing in Civil and Building Engineering W Tizani (Editor) Integration of radio frequency identification and building
Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model
Presentation of Multi Level Data Replication Distributed Decision Making Strategy for High Priority Tasks in Real Time Data Grids
Presentation of Multi Level Data Replication Distributed Decision Making Strategy for High Priority Tasks in Real Time Data Grids Naghmeh Esmaieli [email protected] Mahdi Jafari [email protected]
Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform
Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2014, 6, 1463-1467 1463 Open Access Research on Database Massive Data Processing and Mining Method
BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID
267 BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID Herdawatie binti Abdul Kadir, Siti Nurul Aqmariah binti Mohd Kanafiah and Mohd Helmy bin Abd. Wahab Faculty of Electrical and Electronic
SAR REDUCTION IN HUMAN HEAD FROM MOBILE PHONE RADIATION USING SINGLE NEGATIVE META- MATERIALS
J. of Electromagn. Waves and Appl., Vol. 23, 1385 1395, 2009 SAR REDUCTION IN HUMAN HEAD FROM MOBILE PHONE RADIATION USING SINGLE NEGATIVE META- MATERIALS M. B. Manapati and R. S. Kshetrimayum Department
Demand Forecasting Optimization in Supply Chain
2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V52.12 Demand Forecasting Optimization
To link to this article: http://dx.doi.org/10.1080/09205071.2012.724766
This article was downloaded by: [Professor Joshua Le-Wei Li] On: 15 February 2013, At: 09:02 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered
A Service Revenue-oriented Task Scheduling Model of Cloud Computing
Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,
Development of a Web-based Information Service Platform for Protected Crop Pests
Development of a Web-based Information Service Platform for Protected Crop Pests Chong Huang 1, Haiguang Wang 1 1 Department of Plant Pathology, China Agricultural University, Beijing, P. R. China 100193
UHF-Technology. Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2014
UHF-Technology Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2014 RFID System A traditional passive label (tag) is queried and it responds with it s ID accordingly. Power
EL 25,1. Received 21 December 2005 Revised 31 March 2006 Accepted 7 April 2006
The current issue and full text archive of this journal is available at wwwemeraldinsightcom/0264-0473htm EL 54 Received 21 December 2005 Revised 31 March 2006 Accepted 7 April 2006 RFID implementation
Optimization of PID parameters with an improved simplex PSO
Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng
Multiple Bands Antenna with Slots for Wireless Communication System
Multiple Bands Antenna with Slots for Wireless Communication System Evizal Abdulkadir,Eko Supriyanto, T.A. Rahman, S.K.A. Rahim and S.L Rosa Abstract Rapid growing of user in mobile communication and limited
A Multi-layer Tree Model for Enterprise Vulnerability Management
A Multi-layer Tree Model for Enterprise Vulnerability Management Bin Wu Southern Polytechnic State University Marietta, GA, USA [email protected] Andy Ju An Wang Southern Polytechnic State University Marietta,
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors
INTEGRATED CIRCUITS I CODE SLI Smart Label IC SL2 ICS20 Product Specification Revision 3.1 February July 2005 2001 Public Philips Semiconductors CONTENTS 1 FEATURES...4 1.1 I CODE SLI RF Interface (ISO/IEC
ANALYSIS OF ELEMENT SHAPE IN THE DESIGN FOR MULTI-BAND APPLICATIONS
ANALYSIS OF ELEMENT SHAPE IN THE DESIGN FOR MULTI-BAND APPLICATIONS Pidugu Prasad 1, D Vakula 2 1 M.Tech, Dept. of Electronics and Communication Engineering, NIT Warangal, A.P, India 2 Assistant Professor,
Compact Tunable and Dual band Circular Microstrip Antenna for GSM and Bluetooth Applications
205 Compact Tunable and Dual band Circular Microstrip Antenna for GSM and Bluetooth Applications *K. P. Ray 1, S. Nikhil 2 and A. Nair 2 1 SAMEER, IIT Campus, Powai, Mumbai 400 076, India 2 K.J.Somaiya
ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)
ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you
Design of Rectangular Microstrip Slot Antenna for Multi Band Application
Design of Rectangular Microstrip Slot Antenna for Multi Band Application K.Thamarairubini 1, V. Kiruthiga 2 Assistant professor, Dept. of ECE, BIT College, Sathyamangalam, Tamilnadu, India 1 PG Student
Small Terminal Antennas for Mobile Applications: Design Considerations and Specific Examples.
Small Terminal Antennas for Mobile Applications: Design Considerations and Specific Examples. # Juan R.Mosig 1, Anja K.Skrivervik 1, Marta Martinez-Vazquez 2 1 EPFL, CH-1015, Lausanne, Switzerland, [email protected]
Analysis of Mobile Phone Reliability Based on Active Disassembly Using Smart Materials *
Journal of Surface Engineered Materials and Advanced Technology, 2011, 1, 80-87 doi:10.4236/jsemat.2011.12012 Published Online July 2011 (http://www.scirp.org/journal/jsemat) Analysis of Mobile Phone Reliability
Planar Antennas for WLAN Applications
2002 09 Ansoft Workshop Planar Antennas for WLAN Applications Kin-Lu Wong) Dept. of Electrical Engineering National Sun Yat-Sen University Kaohsiung, Taiwan 1 Outlines WLAN Mobile-Unit Antennas Surface
Application of Wireless Sensor Network and GSM Technology: A Remote Home Security System
Application of Wireless Sensor Network and GSM Technology: A Remote Home Security System Atul Arora, Ankit Malik ABSTRACT In this paper, a low-power consumption remote home security alarm system developed
RECOGNITION OF CONGESTIVE HEART FAILURE USING S-SHAPED SLOT ANTENNA
RECOGNITION OF CONGESTIVE HEART FAILURE USING S-SHAPED SLOT ANTENNA N. Mahalakshmi, A. Thenmozhi, M. Hemalatha, K. Divyarani, M. Nagadharani and A. Meenakshi Department of Electronics and Communication
LONG RANGE ULTRA-HIGH FREQUENCY (UHF) RADIO FREQUENCY IDENTIFICATION (RFID) ANTENNA DESIGN. A Thesis. Submitted to the Faculty.
LONG RANGE ULTRA-HIGH FREQUENCY (UHF) RADIO FREQUENCY IDENTIFICATION (RFID) ANTENNA DESIGN A Thesis Submitted to the Faculty of Purdue University by Nathan D. Reynolds In Partial Fulfillment of the Requirements
Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda
Security Issues in RFID systems By Nikhil Nemade Krishna C Konda Agenda Introduction to an RFID System Possible Application Areas Need for Security Vulnerabilities of an RFID system Security Measures currently
Revision 5 - (Released April 2008) Added further definitions of RFID tag contents and testing requirements for RFID tag read range.
IBM LTO Ultrium Cartridge Label Specification (Revision 6) Part Number 19P0034 EC - M10321 Feb, 2009 IBM Corporation 9000 South Rita Road Tucson, AZ 85744 Notes: The hard copy version of this document
Comparative analysis for Bandwidth Enhancement of RMPA using EBG and varying feed line lengths
Comparative analysis for Bandwidth Enhancement of RMPA using EBG and varying feed line lengths Tripti Basedia 1 1 EC Deptt., SRIT, India, Jabalpur Rahul Koshtha 2 EC Deptt., SRIT, India, Jabalpur ---------------------------------------------------------------------***---------------------------------------------------------------------
OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP
OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP Xing Xu School of Automation Huazhong University of Science and Technology Wuhan 430074, P.R.China E-mail: [email protected]
Automated Security System using ZigBee
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School
Using ISO 15693 Compliant RFID Tags in an Inventory Control System
Using ISO 15693 Compliant RFID Tags in an Inventory Control System University: Louisiana State University, Baton Rouge, Louisiana Course: Undergraduate Capstone Project Student Team Members: Joseph Gates,
RFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, [email protected] Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
Design for Management Information System Based on Internet of Things
Design for Management Information System Based on Internet of Things * School of Computer Science, Sichuan University of Science & Engineering, Zigong Sichuan 643000, PR China, [email protected] Abstract
The design and implementation of the environment monitoring system of smart home based on EnOcean technology
International Conference on Manufacturing Science and Engineering (ICMSE 2015) The design and implementation of the environment monitoring system of smart home based on EnOcean technology Peng Dong1, a,
Synthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS.
Guidelines for Student Reports Synthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS. A. Shariful Abstract The design of large arrays for radar applications require the
Experiment teaching of digital electronic technology using Multisim 12.0
World Transactions on Engineering and Technology Education Vol.12, No.1, 2014 2014 WIETE Experiment teaching of digital electronic technology using Multisim 12.0 Qiu-xia Liu Heze University Heze, Shandong,
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Automated Identification Technologies
Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions [email protected] Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT
Curriculum of Electronics Engineering Program
Curriculum of Electronics Engineering Program FIRST ACADEMIC SEMESTER EB 0101 Workshop on Methods of University Studies 2 -- -- -- 4 EB 0102 Workshop on Oral and Written Communications 2 -- -- -- 4 EB
Contents. I. 3G Mobile Patent. II. 4G LTE Patent. III. RFID Patent. IV. NFC Patent. 2012 TechIPm, LLC All Rights Reserved
Mobile / Wireless Patents in Litigation 1Q 2012 2012 TechIPm, LLC All Rights Reserved www.techipm.com Contents I. 3G Mobile Patent II. 4G LTE Patent III. RFID Patent IV. NFC Patent 2012 TechIPm, LLC All
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas
I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using
RF Attendance System Framework for Faculties of Higher Education
RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,
