A novel algorithm LWFO for redundant reader elimination in RFID networks

Publish Year: 1403
نوع سند: مقاله ژورنالی
زبان: English
View: 34

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJNAA-15-8_015

تاریخ نمایه سازی: 20 خرداد 1403

Abstract:

Abstract- Today, the Radio frequency identification system is widely used in various applications on a large scale. The readers must be densely deployed in order to cover their entire work area. If the number of readers is not optimal, some readers will be redundant, which will reduce the efficiency of the whole system. In more detail, redundant readers increase system overhead, unnecessary tag-reader communication, tag collision, and reader collision, and also, decrease the lifetime of RFID networks. The redundant reader elimination problem is a process that finds the least number of readers to cover all system tags. It is proved that the redundant reader elimination problem is NP_hard. One of the useful tasks in eliminating redundant readers is improving the performance of existing approximation algorithms. In this paper, we propose a distributed algorithm, the LWFO algorithm, which combines the count base algorithm (CBA) and a weighting algorithm. The simulation results show that the proposed algorithm reduces reader redundancy compared to existing algorithms also processing time is reasonable.

Authors

Mahia Samani

Department of Computer Engineering, Qom branch, Islamic Azad University, Qom, Iran.

Ahmad Khademzadeh

Iran Telecom. Research center

Kambiz Badie

Iran Telecom. Research center

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • A. Abuelkhail, U. Baroudi, M. Raad, and T. Sheltami, Internet ...
  • G. Alfian, J. Rhee, H. Ahm, J. Lee, and U. ...
  • K. Ali, H. Hassanein, and W. Alsalih, Using neighbor and ...
  • W.A.A. Alsalihy and N.A. Askar, Enhancement of redundant reader elimination ...
  • S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, and G. ...
  • B. Carbunar, M.K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. ...
  • B. Carbunar, M.K. Ramanathan, M. Koyuturk, S. Jagannathan, and A. ...
  • A. Haibi, H. Bouazza, M. Bouya, K. El Yassini, K. ...
  • A. Haibi, K. Oufaska, K. El Yassini, M. Boulmalf, and ...
  • C.-H. Hsu, Y.-M. Chen, and C.-T. Yang, A layered optimization ...
  • C. Jin, C. Xu, X. Zhang, and J. Zhao, A ...
  • M.S. Khan, M.S. Islam, and H. Deng, Design of a ...
  • H. Landaluce, L. Arjona, A. Peraiios, F. Falcone, I. Angulo, ...
  • M. Ma and P. Wang, Redundant reader elimination in large-scale ...
  • M. Ma, P. Wang and C.-H. Chu, A novel distributed ...
  • A. Motroni, A. Buffi and P. Nepa, A survey on ...
  • A.W. Nagpukar and S.K. Jaiawal, An overview of WSN and ...
  • S. Pan and Z. Yang, A count based algorithm for ...
  • S. Piramuthu and W. Zhau, RFID and sensor network automation ...
  • N. Rashid, S. Choudury and K. Salomaa, Localized algorithms for ...
  • R. Sundar, S. Hebbar, and V. Golla, Implementing intelligent traffic ...
  • S. Sundaresan, R. Doss, S. Piramuthu, and W. Zhou, Secure ...
  • X. Wang, Tennis robot design via Internet of Things and ...
  • X. Wang, Y. Ji, and B. Zhao, An approximate duplicate-elimination ...
  • H. Xu, W. Shen, and P. Li, A novel algorithm ...
  • P. Yang, PRLS-INVES: A general experimental investigation strategy for high ...
  • R. Yarinezhad and S.N. Hashemi, A routing algorithm for wireless ...
  • K.-M. Yu, C.-W. Yu, and Z.-Y. Lin, A density-based algorithm ...
  • Z. Zhang and Q. Qi, An efficient RFID authentication protocol ...
  • Z. Zhao, A secure RFID authentication protocol for healthcare environments ...
  • نمایش کامل مراجع