• Title/Summary/Keyword: tag collision

Search Result 173, Processing Time 0.025 seconds

Adaptive Q-Algorithm for Multiple Tag Identification in EPCglobal Gen-2 RFID System

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.307-311
    • /
    • 2010
  • EPCglobal Class-1 Gen-2 protocol has been proposed for UHF-band RFID systems. In Gen-2 standard, Q-algorithm was proposed to select a frame size for the next query round without estimating the number of tags. Therefore, the Q-algorithm has advantage that the reader's algorithm is simpler than other algorithms. However, it is impossible to allocate the optimized frame size. Also, the original Q-algorithm did not define an optimized parameter C for adjusting the frame size. In this paper, we propose an adaptive Q-algorithm with the different parameter $C_c$ and $C_i$ in accordance with the status of reply slot. Simulation results show that the proposed adaptive Q-algorithm outperforms the original Gen-2 Q-algorithm.

Performance Comparison and Analysis of DFSA and Binary Tree Protocol for RFID Tag Anti-Collision in Error-Prone Environment (에러가 있는 환경에서 RFID 태그 충돌을 해결하기 위한 DFSA와 이진트리 프로토롤의 성능 비료 및 분석)

  • Eom, Jun-Bong;Lee, Tae-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.493-494
    • /
    • 2007
  • RFID (Radio Frequency IDentification) 시스템에서 수동 태그의 낮은 전송 파워 때문에 리더는 태그와의 통신시 많은 에러를 경험하게 된다. 이것은 리더가 태그의 정보를 빠르고 정확하게 인식하는 것을 어렵게 만든다. 따라서, 이러한 문제를 해결하기 위해 에러에 강한 알고리즘을 개발하고 적용할 필요가 있다. 리더가 태그의 정보를 인식하기 위해 사용하는 대표적인 프로토콜에는 ALOHA 기반의 DFSA (Dynamic Framed-Slotted ALOHA) 프로토콜과 트리 기반의 이진트리 프로토콜이 있다. 기존의 두 프로토콜 중 DFSA는 에러가 없을 때 이진트리 보다 성능이 우수하나, 에러가 존재할 때, 이진트리 보다 약 35% 정도 에러의 영향을 많이 받는 성질을 보인다. 본 논문에서는 에러가 있는 환경과 없는 환경에서의 DFSA와 이진트리 프로토콜의 성능을 분석하고, 시뮬레이션을 이용하여 이 논문에서의 성능 분석 방법이 타당함을 증명한다. 그리고 에러가 많은 환경에서는, 빠른 RFID 태그 인식을 위해 DFSA 프로토콜보다 이진트리 프로토콜을 사용할 것을 제안한다.

  • PDF

Tag-Identification Mechanism using Orthogonal Code in RFID System (RFID 시스템에서 Orthogonal Code를 사용한 태그 인식 메커니즘)

  • Kim, Sung-Jun;Jung, Young-Hwan;Ahn, Sun-Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.490-492
    • /
    • 2005
  • 본 논문에서는 별도의 충돌 방지 메커니즘이 필요 없는 orthogonal code를 태그 ID로 부여함으로써 태그 인식을 간단하게 하는 메커니즘에 대해 설명한다. 첫 번째 적용 메커니즘으로 Local환경에서 Orthogonal code가 적용될 수 있는 여러 가지 응용 분야를 제안하고 두 번째로 Orthogonal code를 기존 ID 체계의 일부분으로 사용하여 anti-collision algorithm의 효율을 높이는 방법을 제시한다. 마지막으로 orthogonal code ID의 개수가 많아짐에 따라 code bit수가 길어지는 문제를 해결하기 위하여 code를 블록화 하여 사용 bit를 줄이는 메커니즘을 제시한다.

  • PDF

Performance Analysis of RFID Interference Suppression System Based on the Gold Code (골드 코드 기반의 RFID 간섭제거 시스템 성능분석)

  • khadka, Grishma;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1491-1497
    • /
    • 2013
  • Radio frequency identification (RFID) is an important and essential components of ubiquitous computing, with the development of wireless communication technologies and mobile computing environment. Recently, RFID becomes the mainstream application that helps fast handling and uniquely identifying the physical objects. It utilizes the electromagnetic energy for data transmission from a tag to a reader in the presence of arbitrary interference and noise. In order to employ the portable mobile RFID reader, a tag-collision problem between two or more adjacent tags should be considered. In this paper, we present the operation of RFID system in which numerous tags are present in the interrogation zone of a single reader at the same time. Since there may exist a number of tagged objects in the narrow area, multiple RFID tags may interfere each other, caused to degrade the data reliability and efficiency of the RFID system. In order to suppress interference signals from multiple neighboring tags, we present an application of Gold code for RFID communication system, which uses spread spectrum technique. In this RFID system, data bits are spreaded in each tags with the unique Gold code and the spreaded data bits are despreaded in the reader with the same Gold code. The performance analysis of the considered RFID anti-collision system is illustrated via computer simulation examples.

Hybrid MAC Protocol Design for an Underwater Acoustic Network (수중음향통신망을 위한 하이브리드 MAC 프로토콜 설계)

  • Park, Jong-Won;Ko, Hak-Lim;Cho, A-Ra;Yun, Chang-Ho;Choi, Young-Chol;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2088-2096
    • /
    • 2009
  • This paper deals with hybrid MAC protocol design for underwater acoustic networks. The proposed MAC protocol has the cluster structure with a master node and slave nodes, and the hybrid network structure that combines a contention free period based on TDMA(Time Division Multiple Access) with a contention period. The suggested MAC protocol has a beacon packet for supervising network, a guard period between time slots for packet collision, time tag for estimation of propagation delay with a master node, the time synchronization of nodes, entering and leaving of network, and the communication method among nodes. In this paper, we adapt the proposed hybrid MAC protocol to AUV network, that is the representative mobile device of underwater acoustic network, and verify this protocol is applicable in real underwater acoustic network environment.

AprilTag and Stereo Visual Inertial Odometry (A-SVIO) based Mobile Assets Localization at Indoor Construction Sites

  • Khalid, Rabia;Khan, Muhammad;Anjum, Sharjeel;Park, Junsung;Lee, Doyeop;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.344-352
    • /
    • 2022
  • Accurate indoor localization of construction workers and mobile assets is essential in safety management. Existing positioning methods based on GPS, wireless, vision, or sensor based RTLS are erroneous or expensive in large-scale indoor environments. Tightly coupled sensor fusion mitigates these limitations. This research paper proposes a state-of-the-art positioning methodology, addressing the existing limitations, by integrating Stereo Visual Inertial Odometry (SVIO) with fiducial landmarks called AprilTags. SVIO determines the relative position of the moving assets or workers from the initial starting point. This relative position is transformed to an absolute position when AprilTag placed at various entry points is decoded. The proposed solution is tested on the NVIDIA ISAAC SIM virtual environment, where the trajectory of the indoor moving forklift is estimated. The results show accurate localization of the moving asset within any indoor or underground environment. The system can be utilized in various use cases to increase productivity and improve safety at construction sites, contributing towards 1) indoor monitoring of man machinery coactivity for collision avoidance and 2) precise real-time knowledge of who is doing what and where.

  • PDF

A Study on Development of Base Station System for 13.56MHz & 2.45GHz Dual-band RFID (13.56MHz & 2.45GHz Dual-band RFID Base Station System 개발에 관한 연구)

  • Lee, Tae-Yun;Kim, Woong-Sub;Choi, Moon-Seung;Han, Woon-Soo;Jho, Yong-Chul;Kwon, Dae-Woo;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.4
    • /
    • pp.161-168
    • /
    • 2009
  • Ubiquitous application is in need of high-level technology to meet various requests for ubiquitous service. In order to adopt ubiquitous technology in not only pilot projects but also regional services, many projects like u-City are implemented in and outside the country. RFID has been known as one of the important technology to provide with core benefits of Ubiquitous services. Because each band of RFID technology has merits and demerits concurrently, single-band RFID system has limitations for various RFID services. Thus, we developed dual-band RFID system enable to provide with 13.56MHz and 2.45GHz RFID service at the same time to compensate the shortage of single-band RFID system. Also we have considered the way that the firmware would control signals without collision, studied battery life and range for tag, and made hardware for dual-band RFID service.

A Query Tree Protocol with Stop Signal in RFID Systems (RFID 시스템에서 중지신호를 이용한 쿼리 트리 프로토콜)

  • Lim In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.526-529
    • /
    • 2006
  • In this paper, a QT_ss protocol is proposed for identifying all the tags within the identification range. The proposed QT_ss protocol revises the QT protocol. which has a memoryless property. In the QT_ss protocol, the tag will send all the bits of their identification codes when the query string matches the first bits of their identification codes. While the tags are sending their identification codes. if the reader detects a collision bit, it will send a signal to the tags to stop sending. According to the simulation results, the QT_ss protocol outperforms the QT protocol in terns of the number of response bits.

  • PDF

An Anti-Collision Algorithm with 4-Slot in RFID Systems (RFID 시스템에서 4 슬롯을 이용한 충돌방지 알고리즘)

  • Kim, Yong-Hwan;Kim, Sung-Soo;Ryoo, Myung-Chun;Park, Joon-Ho;Chung, Kyung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.111-121
    • /
    • 2014
  • In this paper, we propose tree-based hybrid query tree architecture utilizing time slot. 4-Bit Pattern Slot Allocation(4-SL) has a 8-ary tree structure and when tag ID responses according to query of the reader, it applies a digital coding method, the Manchester code, in order to extract the location and the number of collided bits. Also, this algorithm can recognize multiple Tags by single query using 4 fixed time slots. The architecture allows the reader to identify 8 tags at the same time by responding 4 time slots utilizing the first bit($[prefix+1]^{th}$, F ${\in}$ {'0' or '1'}) and bit pattern from second ~ third bits($[prefix+2]^{th}{\sim}[prefix+3]^{th}$, $B_2{\in}$ {"00" or "11"}, $B_1{\in}$ {"01" or "10"}) in tag ID. we analyze worst case of the number of query nodes(prefix) in algorithm to extract delay time for recognizing multiple tags. The identification delay time of the proposed algorithm was based on the number of query-responses and query bits, and was calculated by each algorithm.

Game Theoretic Analysis for RFID Reader Collision (RFID 리더 주파수 간섭에 대한 게임 이론 관점에서의 해석)

  • Lee, Dong-Yul;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.36-47
    • /
    • 2009
  • There exists RFID reader-to reader frequency which can not recognize tag in dense reader nude because the interference causes low SIR. To solve this frequency, the many algorithms based on TDM have been proposed. But the most of existing algorithms not obtain the optimal time allocation but propose heuristic scheduling algorithm. In this paper, we apply game theory which deals with interest between players of game to RFID reader-to reader interference and analyze the time allocation problem of reader based on TDM in terms of cooperative game which the players bind agreements using Nash Bargaining Solution(NBS) and non-cooperative game which the players do not bind agreements using Nash Equilibrium(NE). The applied results show that in dense reader mode, NBS of cooperative game is superior to NE of non-cooperative game and present optimal time allocation in dense reader mode.