This paper presents a smart checkout system designed to mitigate the issues of noise and errors present in the existing barcode and RFID-based systems used at retail stores’checkout counters.This is achieved by integ...This paper presents a smart checkout system designed to mitigate the issues of noise and errors present in the existing barcode and RFID-based systems used at retail stores’checkout counters.This is achieved by integrating a novel AI algorithm,called Improved Laser Simulator Logic(ILSL)into the RFID system.The enhanced RFID system was able to improve the accuracy of item identification,reduce noise interference,and streamline the overall checkout process.The potential of the systemfor noise detection and elimination was initially investigated through a simulation study usingMATLAB and ILSL algorithm.Subsequently,it was deployed in a small-scale environment to validate its real-world performance.Results show that RFID with the proposed new algorithm ILSL and AI basket is capable of accurately detecting the related itemswhile eliminating noise originating fromunrelated objects,achieving an accuracy rate of 88%.展开更多
Radio Frequency Identification(RFID)technology has been widely used to identify missing items.In many applications,rapidly pinpointing key tags that are attached to favorable or valuable items is critical.To realize t...Radio Frequency Identification(RFID)technology has been widely used to identify missing items.In many applications,rapidly pinpointing key tags that are attached to favorable or valuable items is critical.To realize this goal,interference from ordinary tags should be avoided,while key tags should be efficiently verified.Despite many previous studies,how to rapidly and dynamically filter out ordinary tags when the ratio of ordinary tags changes has not been addressed.Moreover,how to efficiently verify missing key tags in groups rather than one by one has not been explored,especially with varying missing rates.In this paper,we propose an Efficient and Robust missing Key tag Identification(ERKI)protocol that consists of a filtering mechanism and a verification mechanism.Specifically,the filtering mechanism adopts the Bloom filter to quickly filter out ordinary tags and uses the labeling vector to optimize the Bloom filter's performance when the key tag ratio is high.Furthermore,the verification mechanism can dynamically verify key tags according to the missing rates,in which an appropriate number of key tags is mapped to a slot and verified at once.Moreover,we theoretically analyze the parameters of the ERKI protocol to minimize its execution time.Extensive numerical results show that ERKI can accelerate the execution time by more than 2.14compared with state-of-the-art solutions.展开更多
With the availability of low-cost radio frequency identification (RFID) tags,security becomes an increasing concern. However,such tags do not permit complex cryptographic functions due to their computational,communica...With the availability of low-cost radio frequency identification (RFID) tags,security becomes an increasing concern. However,such tags do not permit complex cryptographic functions due to their computational,communications,and storage limitations. In this paper,we investigate the security issues and requirements of RFID systems,and propose ultra-light weight and light weight protocols for low-cost RFID tags.The proposed protocols has been applied to a supply chain management system.展开更多
Radio frequency identification technology is one of the main technologies of Internet of Things(IoT).Through the transmission and reflection of wireless radio frequency signals,non-contact identification is realized,a...Radio frequency identification technology is one of the main technologies of Internet of Things(IoT).Through the transmission and reflection of wireless radio frequency signals,non-contact identification is realized,and multiple objects identification can be realized.However,when multiple tags communicate with a singleton reader simultaneously,collision will occur between the signals,which hinders the successful transmissions.To effectively avoid the tag collision problem and improve the reading performance of RFID systems,two advanced tag identification algorithms namely Adaptive M-ary tree slotted Aloha(AMTS)based on the characteristics of Aloha-based and Query tree-based algorithms are proposed.In AMTS,the reader firstly uses the framed slotted Aloha protocol to map the tag set to different time slots,and then identify the collided tags using binary search method based on collision factor or mapping table.Both performance analysis and extensive experimental results indicate that our proposed algorithms significantly outperforms most existing anti-collision approaches in tag dense RFID systems.展开更多
Blocker tag attack is one of the denial-of-service(DoS)attacks that threatens the privacy and security of RFID systems.The attacker interferes with the blocked tag by simulating a fake tag with the same ID,thus causin...Blocker tag attack is one of the denial-of-service(DoS)attacks that threatens the privacy and security of RFID systems.The attacker interferes with the blocked tag by simulating a fake tag with the same ID,thus causing a collision of message replies.In many practical scenarios,the number of blocked tags may vary,or even be small.For example,the attacker may only block the important customers or high-value items.To avoid the disclosure of privacy and economic losses,it is of great importance to fast pinpoint these blocked ones.However,existing works do not take into account the impact of the number of blocked tags on the execution time and suffer from incomplete identification of blocked tags,long identification time or privacy leakage.To overcome these limits,we propose a cross layer blocked tag identification protocol(CLBI).CLBI consists of multiple rounds,in which it enables multiple unblocked tags to select one time slot and concurrently verify them by using tag estimation in physical layer.Benefiting from the utilization of most collision slots,the execution time can be greatly reduced.Furthermore,for efficient identification of blocked tags under different proportions,we propose a hybrid protocol named adaptive cross layer blocked tag identification protocol(A-CLBI),which estimates the remaining blocked tag in each round and adjusts the identification strategy accordingly.Extensive simulations show that our protocol outperforms state-of-the-art blocked tags identification protocol.展开更多
Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequen...Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.展开更多
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w...In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.展开更多
This paper presents a distributed wireless sensor network for multiple mobile agents localization. Localization of mobile agents, such as mobile robots, humans, and moving objects, in an indoor space is essential for ...This paper presents a distributed wireless sensor network for multiple mobile agents localization. Localization of mobile agents, such as mobile robots, humans, and moving objects, in an indoor space is essential for robot-robot interaction (RRI) and human-robot interaction (HRI). The standard localization system, which is based on sensors installed in the robot body, is not suitable for multiple agents. Therefore, the concept of sensor network, which uses wireless sensors distributed in a specified space, is used in this study. By analyzing related studies, two solutions are proposed for the localization of mobile agents including humans: a new hardware system and a new software algorithm. The first solution focuses on the architectural design of the wireless sensor network for multiple agent localization. A passive RFID system is used, and then the architecture of the sensor network is adapted to suit the target system. The second solution centers on a localization algorithm based on the sensor network. The proposed localization algorithm improves the accuracy in the multiple agent localization system. The algorithm uses the displacement conditions of the mobile agents and the recognition changes between the RFID tags and RFID reader. Through experiments using a real platform, the usefulness of the proposed system is verified.展开更多
Elderly inhabitants have a strong influence to healthcare facilities globally in the last few years as a result of the high demand on the healthcare services and the gap between the services provided by caregivers and...Elderly inhabitants have a strong influence to healthcare facilities globally in the last few years as a result of the high demand on the healthcare services and the gap between the services provided by caregivers and the increasing number of older people. Radio Frequency Identification (RFID) technologies have been increasingly adopted in smart homes and used widely for indoor localisation. These technologies have been benefiting to healthcare domain where they improve the quality of services delivering by healthcare providers. This article presents a comprehensive review on RFID systems and healthcare research works in smart homes. We also compare RFID-based solutions in healthcare and distinguish challenges of smart home technologies in indoor environment. We also discuss research challenges related to Activity in Daily Living (ADL) in smart homes for wellbeing.展开更多
In radio frequency identification(RFID) systems,one of the most widely used anti-collision algorithms is the dynamic framed slotted ALOHA(DFSA)algorithm which usually uses two methods,one is tag estimation method (TEM...In radio frequency identification(RFID) systems,one of the most widely used anti-collision algorithms is the dynamic framed slotted ALOHA(DFSA)algorithm which usually uses two methods,one is tag estimation method (TEM) which estimates the number of tags around the reader,and the other is dynamic slot allocation (DSA) method which is the method to dynamically allocate the frame size according to the number of tags.DFSA can achieve optimal system performance when the frame size is equal to the number of tags.As the number of tags becomes large,DFSA is not practical to increase the frame size infinitely,thus the application of DFSA algorithm is limited.In this paper a TEM method and a DSA method are proposed from two novel aspects respectively in order to use DFSA algorithm more effectively,and the analysis and comparison are given subsequently.Meanwhile,the improved DFSA algorithm is proposed to solve the problem of DFSA algorithm.When the number of tags is large,if the improved DFSA algorithm is applied,the system efficiency that can be attained is not less than 50%.展开更多
Improving efficiency in roll grinding process is a critical issue in the steel mill.Each roll has to be grinded to a well-defined profile and then to be measured for quality check.However,the surface conditions are in...Improving efficiency in roll grinding process is a critical issue in the steel mill.Each roll has to be grinded to a well-defined profile and then to be measured for quality check.However,the surface conditions are inspected by using different on-line inspection probes equipped on the grinder.The roll number is a unique information which can be used to merge with a huge amount of measurement data so that the condition of each roll is fully monitored.One of the key factors that hinder the efficiency in such process is the errors and time consumption due to human intervention.In order to mitigate these issues and to realize the fully automatic grinding process,radio frequency identification technology(RFID) could be a solution and has been developed in this paper.It is well known that when an RFID tag is placed directly upon a metallic object,in the absence of a gap or a substrate,it functions rather poorly and even becomes totally dysfunctional.This limitation,in turn,poses a real barrier to the use of the RFID on metallic objects.This paper proposes a miniature RFID tag antenna design for application on roll number identification.The experimental tests show that the maximum read range of the proposed RFID tag placed on a roll is approximately 1.5m and the overall size is only 32×18×3.2 mm;.An RFID system for roll number identification was used in a roll shop and several remarkable improvements were achieved,including the completely automatic grinding process and the error-free identification,as well as the high personnel safety operation.展开更多
Tag collision algorithm is a key issue for energy saving and throughput with Radio Frequency IDentification (RFID) system more popular in sensing infrastructure of covering wider area on a large scale. Exploiting low ...Tag collision algorithm is a key issue for energy saving and throughput with Radio Frequency IDentification (RFID) system more popular in sensing infrastructure of covering wider area on a large scale. Exploiting low energy consumption strategy would enable longer operational life of tags and reader with battery energy supply. And improving throughput is required on a large scale to preserve the capability of the correct reception. Therefore, this paper proposes an enhanced anti-collision algorithm called Dynamic Slotted with Muting (DSM), which uses multiple slots within a frame per node in a binary tree and takes tag estimation function to optimize the number of slots, and adds a mute command to put identified tags silence. The performance of the proposed algorithm is analytically provided, and simulation results show that DSM saves more than 40% energy consumptions both at reader and tags, and improves more than 35% throughput compared to the existing algorithms. Thus our algorithm is demonstrated to perform efficient energy savings at reader and tags with throughput improvement.展开更多
In this paper, we present a power adjustment scheme to dynamically enlarge and shrink power coverage to speed up tag identification in an RFID system. By dividing a TDMA frame into time slots, the proposed power adjus...In this paper, we present a power adjustment scheme to dynamically enlarge and shrink power coverage to speed up tag identification in an RFID system. By dividing a TDMA frame into time slots, the proposed power adjustment scheme can adaptively increase or decrease the transmission power of a reader. Specifically, due to the contention for a TDMA slot from numerous tags, three states of a slot could exist;they are respectively referred to as successful, collided, and idle states. An adjustment factor based on the three states is designed to dynamically adjust the transmission power of a reader. The design of the adjustment factor considers two different aspects. When the number of idle state far exceeds the number of collided state, the first aspect will enlarge the power such that more tags within the coverage can be concurrently identified. On the other hand, when the number of idle state is much smaller than the number of collided state, the second aspect will shrink the power such that the number of tags within the coverage is significantly reduced. The proposed power adjustment scheme is simulated using NS-3. In the simulation, we design three different topologies which place tags in three distributions, uniform, random, and hotspot. From the simulation results, we demonstrate that the proposed power adjustment scheme can speed up the tag identification and save energy consumption, particularly when a large number of tags are placed in hotspot distribution.展开更多
One of the most important goals followed in most systems is to increase efficiency, reduce errors and enhance ease of data entry tasks such as better services in organizations. Therefore, the use of intelligent tools ...One of the most important goals followed in most systems is to increase efficiency, reduce errors and enhance ease of data entry tasks such as better services in organizations. Therefore, the use of intelligent tools is of the most important requirements for a management system in order to collect complete and accurate data and create complete information. In management, use of new technologies is recommended to have smart systems and reduce human errors. This study aimed to investigate “professors and students attendance system using RFID” and research population consists of professors and students. Findings show that, as attendance checking system in universities and schools is done through the class list and checking attendance of students needs to spend time and energy so it leads to a waste of valuable time and energy of professors to teach. Therefore, it is essential to use efficient and modern systems, because with the design and implementation of RFID attendance system and replacing the traditional system, time and energy waste could be avoided and attendance system could be promoted to an intelligent and integrated one. The designed system includes a number of hours of presence and absence, delays and rush to pay the salaries of professors at the University with its automatic identification through radio frequency. This system aims to create changes in this area and it is economic in whole.展开更多
Radio-frequency identification(RFID)antennas are critical components in wireless communication networks for the Internet of things(IoT).The RFID systems make it possible to realize the dynamic interconnection of vario...Radio-frequency identification(RFID)antennas are critical components in wireless communication networks for the Internet of things(IoT).The RFID systems make it possible to realize the dynamic interconnection of various things.To better summarize the operating principles of the RFID antennas and associate antennas with specific complex applications,a review of RFID systems and antennas is necessary.In this paper,a review of reader antennas for ultra-high frequency(UHF)RFID systems is presented,and the categories of RFID systems are summarized for the first time.The antennas are classified according to the reading region and operating principle.The reading region determines the most crucial performance that should be concentrated on when designing an antenna,while the operating principle affects the current distribution on the surface of the antenna,and further the electromagnetic radiation.By the summary of the RFID systems and antennas,the understanding of future researchers on the operating principles of the RFID antennas could be facilitated,which can be helpful in the advanced design and implementation of RFID antennas.In addition,taking engineering requirements into account,the future prospective of RFID applications is discussed,as well as the challenges to be addressed.展开更多
基金funding from Universiti Malaya and Ministry of High Education-Malaysia under Research Grant FRGS/1/2023/TK10/UM/02/3 and GPF 020A-2023supported by Researchers Supporting Project Number(RSPD2024 R803).
文摘This paper presents a smart checkout system designed to mitigate the issues of noise and errors present in the existing barcode and RFID-based systems used at retail stores’checkout counters.This is achieved by integrating a novel AI algorithm,called Improved Laser Simulator Logic(ILSL)into the RFID system.The enhanced RFID system was able to improve the accuracy of item identification,reduce noise interference,and streamline the overall checkout process.The potential of the systemfor noise detection and elimination was initially investigated through a simulation study usingMATLAB and ILSL algorithm.Subsequently,it was deployed in a small-scale environment to validate its real-world performance.Results show that RFID with the proposed new algorithm ILSL and AI basket is capable of accurately detecting the related itemswhile eliminating noise originating fromunrelated objects,achieving an accuracy rate of 88%.
基金This work was supported in part by the National Natural Science Foundation of China under project contracts No.61971113 and 61901095in part by National Key R&D Program under project contract No.2018AAA0103203+5 种基金in part by Guangdong Provincial Research and Development Plan in Key Areas under project contract No.2019B010141001 and 2019B010142001in part by Sichuan Provincial Science and Technology Planning Program under project contracts No.2020YFG0039,No.2021YFG0013 and No.2021YFH0133in part by Ministry of Education China Mobile Fund Program under project contract No.MCM20180104in part by Yibin Science and Technology Program-Key Projects under project contract No.2018ZSF001 and 2019GY001in part by Central University Business Fee Program under project contract No.A03019023801224the Central Universities under Grant ZYGX2019Z022.
文摘Radio Frequency Identification(RFID)technology has been widely used to identify missing items.In many applications,rapidly pinpointing key tags that are attached to favorable or valuable items is critical.To realize this goal,interference from ordinary tags should be avoided,while key tags should be efficiently verified.Despite many previous studies,how to rapidly and dynamically filter out ordinary tags when the ratio of ordinary tags changes has not been addressed.Moreover,how to efficiently verify missing key tags in groups rather than one by one has not been explored,especially with varying missing rates.In this paper,we propose an Efficient and Robust missing Key tag Identification(ERKI)protocol that consists of a filtering mechanism and a verification mechanism.Specifically,the filtering mechanism adopts the Bloom filter to quickly filter out ordinary tags and uses the labeling vector to optimize the Bloom filter's performance when the key tag ratio is high.Furthermore,the verification mechanism can dynamically verify key tags according to the missing rates,in which an appropriate number of key tags is mapped to a slot and verified at once.Moreover,we theoretically analyze the parameters of the ERKI protocol to minimize its execution time.Extensive numerical results show that ERKI can accelerate the execution time by more than 2.14compared with state-of-the-art solutions.
文摘With the availability of low-cost radio frequency identification (RFID) tags,security becomes an increasing concern. However,such tags do not permit complex cryptographic functions due to their computational,communications,and storage limitations. In this paper,we investigate the security issues and requirements of RFID systems,and propose ultra-light weight and light weight protocols for low-cost RFID tags.The proposed protocols has been applied to a supply chain management system.
基金supported by The People’s Republic of China Ministry of Science and Technology[2018YFF0213606-03(Mu Y.,Hu T.L.,Gong H.,Li S.J.and Sun Y.H.)http://www.most.gov.cn]the Science and Technology Department of Jilin Province[20160623016TC,20170204017NY,20170204038NY,20200402006NC(Mu Y.,Hu T.L.,Gong H.and Li S.J.)http://kjt.jl.gov.cn]the Science and Technology Bureau of Changchun City[18DY021(Mu Y.,Hu T.L.,Gong H.,and Sun Y.H.)http://kjj.changchun.gov.cn].
文摘Radio frequency identification technology is one of the main technologies of Internet of Things(IoT).Through the transmission and reflection of wireless radio frequency signals,non-contact identification is realized,and multiple objects identification can be realized.However,when multiple tags communicate with a singleton reader simultaneously,collision will occur between the signals,which hinders the successful transmissions.To effectively avoid the tag collision problem and improve the reading performance of RFID systems,two advanced tag identification algorithms namely Adaptive M-ary tree slotted Aloha(AMTS)based on the characteristics of Aloha-based and Query tree-based algorithms are proposed.In AMTS,the reader firstly uses the framed slotted Aloha protocol to map the tag set to different time slots,and then identify the collided tags using binary search method based on collision factor or mapping table.Both performance analysis and extensive experimental results indicate that our proposed algorithms significantly outperforms most existing anti-collision approaches in tag dense RFID systems.
基金This work was supported in part by the National Natural Science Foundation of China under project contracts Nos.61701082,61701116,61601093,61971113 and 61901095in part by National Key R&D Program under project Nos.2018YFB1802102 and 2018AAA0103203+3 种基金in part by Guangdong Provincial Research and Development Plan in Key Areas under project contract Nos.2019B010141001 and 2019B010142001in part by Sichuan Provincial Science and Technology Planning Program under project contracts Nos.2018HH0034,2019YFG0418,2019YFG0120 and 2018JY0246in part by the fundamental research funds for the Central Universities under project contract No.ZYGX2016J004in part by Science and Technology on Electronic Information Control Laboratory.
文摘Blocker tag attack is one of the denial-of-service(DoS)attacks that threatens the privacy and security of RFID systems.The attacker interferes with the blocked tag by simulating a fake tag with the same ID,thus causing a collision of message replies.In many practical scenarios,the number of blocked tags may vary,or even be small.For example,the attacker may only block the important customers or high-value items.To avoid the disclosure of privacy and economic losses,it is of great importance to fast pinpoint these blocked ones.However,existing works do not take into account the impact of the number of blocked tags on the execution time and suffer from incomplete identification of blocked tags,long identification time or privacy leakage.To overcome these limits,we propose a cross layer blocked tag identification protocol(CLBI).CLBI consists of multiple rounds,in which it enables multiple unblocked tags to select one time slot and concurrently verify them by using tag estimation in physical layer.Benefiting from the utilization of most collision slots,the execution time can be greatly reduced.Furthermore,for efficient identification of blocked tags under different proportions,we propose a hybrid protocol named adaptive cross layer blocked tag identification protocol(A-CLBI),which estimates the remaining blocked tag in each round and adjusts the identification strategy accordingly.Extensive simulations show that our protocol outperforms state-of-the-art blocked tags identification protocol.
基金Project(2009BADB9B09)supported by the National Key Technologies R&D Program of China
文摘Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.
基金the National Natural Science Foundation of China under Grant 61502411Natural Science Foundation of Jiangsu Province under Grant BK20150432 and BK20151299+7 种基金Natural Science Research Project for Universities of Jiangsu Province under Grant 15KJB520034China Postdoctoral Science Foundation under Grant 2015M581843Jiangsu Provincial Qinglan ProjectTeachers Overseas Study Program of Yancheng Institute of TechnologyJiangsu Provincial Government Scholarship for Overseas StudiesTalents Project of Yancheng Institute of Technology under Grant KJC2014038“2311”Talent Project of Yancheng Institute of TechnologyOpen Fund of Modern Agricultural Resources Intelligent Management and Application Laboratory of Huzhou Normal University.
文摘In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.
文摘This paper presents a distributed wireless sensor network for multiple mobile agents localization. Localization of mobile agents, such as mobile robots, humans, and moving objects, in an indoor space is essential for robot-robot interaction (RRI) and human-robot interaction (HRI). The standard localization system, which is based on sensors installed in the robot body, is not suitable for multiple agents. Therefore, the concept of sensor network, which uses wireless sensors distributed in a specified space, is used in this study. By analyzing related studies, two solutions are proposed for the localization of mobile agents including humans: a new hardware system and a new software algorithm. The first solution focuses on the architectural design of the wireless sensor network for multiple agent localization. A passive RFID system is used, and then the architecture of the sensor network is adapted to suit the target system. The second solution centers on a localization algorithm based on the sensor network. The proposed localization algorithm improves the accuracy in the multiple agent localization system. The algorithm uses the displacement conditions of the mobile agents and the recognition changes between the RFID tags and RFID reader. Through experiments using a real platform, the usefulness of the proposed system is verified.
文摘Elderly inhabitants have a strong influence to healthcare facilities globally in the last few years as a result of the high demand on the healthcare services and the gap between the services provided by caregivers and the increasing number of older people. Radio Frequency Identification (RFID) technologies have been increasingly adopted in smart homes and used widely for indoor localisation. These technologies have been benefiting to healthcare domain where they improve the quality of services delivering by healthcare providers. This article presents a comprehensive review on RFID systems and healthcare research works in smart homes. We also compare RFID-based solutions in healthcare and distinguish challenges of smart home technologies in indoor environment. We also discuss research challenges related to Activity in Daily Living (ADL) in smart homes for wellbeing.
基金supported in part by the Program for New Century Excellent Talents in University in China(No.NCET-06-0510)National Natural Science Foundation of China (No. 60874091)the Natural Science Basic Research Project for Universities of Jiangsu Province(No. 08KJD510022)
文摘In radio frequency identification(RFID) systems,one of the most widely used anti-collision algorithms is the dynamic framed slotted ALOHA(DFSA)algorithm which usually uses two methods,one is tag estimation method (TEM) which estimates the number of tags around the reader,and the other is dynamic slot allocation (DSA) method which is the method to dynamically allocate the frame size according to the number of tags.DFSA can achieve optimal system performance when the frame size is equal to the number of tags.As the number of tags becomes large,DFSA is not practical to increase the frame size infinitely,thus the application of DFSA algorithm is limited.In this paper a TEM method and a DSA method are proposed from two novel aspects respectively in order to use DFSA algorithm more effectively,and the analysis and comparison are given subsequently.Meanwhile,the improved DFSA algorithm is proposed to solve the problem of DFSA algorithm.When the number of tags is large,if the improved DFSA algorithm is applied,the system efficiency that can be attained is not less than 50%.
文摘Improving efficiency in roll grinding process is a critical issue in the steel mill.Each roll has to be grinded to a well-defined profile and then to be measured for quality check.However,the surface conditions are inspected by using different on-line inspection probes equipped on the grinder.The roll number is a unique information which can be used to merge with a huge amount of measurement data so that the condition of each roll is fully monitored.One of the key factors that hinder the efficiency in such process is the errors and time consumption due to human intervention.In order to mitigate these issues and to realize the fully automatic grinding process,radio frequency identification technology(RFID) could be a solution and has been developed in this paper.It is well known that when an RFID tag is placed directly upon a metallic object,in the absence of a gap or a substrate,it functions rather poorly and even becomes totally dysfunctional.This limitation,in turn,poses a real barrier to the use of the RFID on metallic objects.This paper proposes a miniature RFID tag antenna design for application on roll number identification.The experimental tests show that the maximum read range of the proposed RFID tag placed on a roll is approximately 1.5m and the overall size is only 32×18×3.2 mm;.An RFID system for roll number identification was used in a roll shop and several remarkable improvements were achieved,including the completely automatic grinding process and the error-free identification,as well as the high personnel safety operation.
基金Supported by the Chongqing Education Administration Program Foundation of China (No.KJ110516)the Chongqing Natural Science Foundation of China (No.cstc2011jjA40014, No.cstc2011A40028)
文摘Tag collision algorithm is a key issue for energy saving and throughput with Radio Frequency IDentification (RFID) system more popular in sensing infrastructure of covering wider area on a large scale. Exploiting low energy consumption strategy would enable longer operational life of tags and reader with battery energy supply. And improving throughput is required on a large scale to preserve the capability of the correct reception. Therefore, this paper proposes an enhanced anti-collision algorithm called Dynamic Slotted with Muting (DSM), which uses multiple slots within a frame per node in a binary tree and takes tag estimation function to optimize the number of slots, and adds a mute command to put identified tags silence. The performance of the proposed algorithm is analytically provided, and simulation results show that DSM saves more than 40% energy consumptions both at reader and tags, and improves more than 35% throughput compared to the existing algorithms. Thus our algorithm is demonstrated to perform efficient energy savings at reader and tags with throughput improvement.
文摘In this paper, we present a power adjustment scheme to dynamically enlarge and shrink power coverage to speed up tag identification in an RFID system. By dividing a TDMA frame into time slots, the proposed power adjustment scheme can adaptively increase or decrease the transmission power of a reader. Specifically, due to the contention for a TDMA slot from numerous tags, three states of a slot could exist;they are respectively referred to as successful, collided, and idle states. An adjustment factor based on the three states is designed to dynamically adjust the transmission power of a reader. The design of the adjustment factor considers two different aspects. When the number of idle state far exceeds the number of collided state, the first aspect will enlarge the power such that more tags within the coverage can be concurrently identified. On the other hand, when the number of idle state is much smaller than the number of collided state, the second aspect will shrink the power such that the number of tags within the coverage is significantly reduced. The proposed power adjustment scheme is simulated using NS-3. In the simulation, we design three different topologies which place tags in three distributions, uniform, random, and hotspot. From the simulation results, we demonstrate that the proposed power adjustment scheme can speed up the tag identification and save energy consumption, particularly when a large number of tags are placed in hotspot distribution.
文摘One of the most important goals followed in most systems is to increase efficiency, reduce errors and enhance ease of data entry tasks such as better services in organizations. Therefore, the use of intelligent tools is of the most important requirements for a management system in order to collect complete and accurate data and create complete information. In management, use of new technologies is recommended to have smart systems and reduce human errors. This study aimed to investigate “professors and students attendance system using RFID” and research population consists of professors and students. Findings show that, as attendance checking system in universities and schools is done through the class list and checking attendance of students needs to spend time and energy so it leads to a waste of valuable time and energy of professors to teach. Therefore, it is essential to use efficient and modern systems, because with the design and implementation of RFID attendance system and replacing the traditional system, time and energy waste could be avoided and attendance system could be promoted to an intelligent and integrated one. The designed system includes a number of hours of presence and absence, delays and rush to pay the salaries of professors at the University with its automatic identification through radio frequency. This system aims to create changes in this area and it is economic in whole.
基金supported by the National Natural Science Foundation of China(61971051)。
文摘Radio-frequency identification(RFID)antennas are critical components in wireless communication networks for the Internet of things(IoT).The RFID systems make it possible to realize the dynamic interconnection of various things.To better summarize the operating principles of the RFID antennas and associate antennas with specific complex applications,a review of RFID systems and antennas is necessary.In this paper,a review of reader antennas for ultra-high frequency(UHF)RFID systems is presented,and the categories of RFID systems are summarized for the first time.The antennas are classified according to the reading region and operating principle.The reading region determines the most crucial performance that should be concentrated on when designing an antenna,while the operating principle affects the current distribution on the surface of the antenna,and further the electromagnetic radiation.By the summary of the RFID systems and antennas,the understanding of future researchers on the operating principles of the RFID antennas could be facilitated,which can be helpful in the advanced design and implementation of RFID antennas.In addition,taking engineering requirements into account,the future prospective of RFID applications is discussed,as well as the challenges to be addressed.