Radio frequency identification (RFID) is an important internet of things (IoT) enabling technology. In RFIDs collision occur among tags because tags share communication channel. This is called tag collision problem. The problem becomes catastrophic when dense population of tags are deployed like in IoT. Hence, the need to enhance existing dynamic frame slotted ALOHA (DFSA) based electronic product code (EPC) C1G2 media access control (MAC) protocol. Firstly, this paper validates through simulation the DFSA theory that efficiency of the RFID system is maximum when the number tags is approximately equal to the frame size. Furthermore, literature review shows tag grouping is becoming popular to improving the efficiency of the RFID system. This paper analyzes selected grouping-based algorithms. Their underlining principles are discussed including their tag estimation methods. The algorithms were implemented in MATLAB while extensive Monte Carlo simulation was performed to evaluate their strengths and weaknesses. Results show that with higher tag density, fuzzy C-means based algorithm (FCMBG) outperformed traditional DFSA by over 40% in terms of throughput rate. The results also demonstrate FCMBG bettered other grouping-based algorithms (GB-DFSA and GBSA) whose tag estimation method are based on collision slots in terms slot efficiency by over 10% and also in terms of identification time.
Ijaems apr-2016-18 Simulation on probabilistic anti collision protocols of RF...INFOGAIN PUBLICATION
In RFID System, it is important to avoid tag collision for identifying tag faster. In this paper, we proposed concept of variable delay for tag estimation & identification. The scheme is based on the Multi-level dynamic framed ALOHA protocol. Simulation results indicate that the time delay is added to each tag for avoiding collision. The main advantage of this is the delay is in microseconds which will not create problem of more time consumption.
Ijaems apr-2016-35 Comparative Analysis of Anti-Collision Protocols in RFIDINFOGAIN PUBLICATION
Radio Frequency Identification, abbreviated as RFID which was originally invented as a replacement tool for bar-code scanning and identification has now evolved into a vital technology spanning across fields such as supply chain management, shipping of goods, tracking and identification, etc. However along with the widespread use of RFID, the underlying problem of collision of readers, and tags has been hampering the reliability, and integrity of RFID; thus causing a problem in the further evolution and future deployment of the same in new-born organizations. This papers aims at surveying the various anti-collision protocols which are designed and implemented in order to curb one of the major encumbrances in RFID technology viz. collision.
Energy efficient anti-collision algorithm for the RFID networksjournalBEEI
Energy efficiency is crucial for radio frequency identification (RFID) systems as the readers are often battery operated. The main source of the energy wastage is the collision which happens when tags access the communication medium at the same time. Thus, an efficient anti-collision protocol could minimize the energy wastage and prolong the lifetime of the RFID systems. In this regard, EPCGlobal-Class1-Generation2 (EPC-C1G2) protocol is currently being used in the commercial RFID readers to provide fast tag identification through efficient collision arbitration using the Q algorithm. However, this protocol requires a lot of control message overheads for its operation. Thus, a reinforcement learning based anti-collision protocol (RL-DFSA) is proposed to provide better time system efficiency while being energy efficient through the minimization of control message overheads. The proposed RL-DFSA was evaluated through extensive simulations and compared with the variants of EPC-Class 1 Generation 2 algorithms that are currently being used in the commercial readers. The results show conclusively that the proposed RL-DFSA performs identically to the very efficient EPC-C1G2 protocol in terms of time system efficiency but readily outperforms the compared protocol in the number of control message overhead required for the operation.
Secured authentication of radio-frequency identification system using PRESENT...IJECEIAES
The internet of things (IoT) is an emerging and robust technology to interconnect billions of objects or devices via the internet to communicate smartly. The radio frequency identification (RFID) system plays a significant role in IoT systems, providing most features like mutual establishment, key establishment, and data confidentiality. This manuscript designed secure authentication of IoT-based RFID systems using the lightweight PRESENT algorithm on the hardware platform. The PRESENT-256 block cipher is considered in this work, and it supports 64-bit data with a 256-key length. The PRESENT-80/128 cipher is also designed along with PRESENT-256 at electronic codebook (ECB) mode for Secured mutual authentication between RFID tag and reader for IoT applications. The secured authentication is established in two stages: Tag recognition from reader, mutual authentication between tag and reader using PRESENT80/128/256 cipher modules. The complete secured authentication of IoTbased RFID system simulation results is verified using the chip-scope tool with field-programmable gate array (FPGA) results. The comparative results for PRESENT block cipher with existing PRESENT ciphers and other lightweight algorithms are analyzed with resource improvements. The proposed secured authentication work is compared with similar RFID-mutual authentication (MA) approaches with better chip area and frequency improvements.
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
Ijaems apr-2016-18 Simulation on probabilistic anti collision protocols of RF...INFOGAIN PUBLICATION
In RFID System, it is important to avoid tag collision for identifying tag faster. In this paper, we proposed concept of variable delay for tag estimation & identification. The scheme is based on the Multi-level dynamic framed ALOHA protocol. Simulation results indicate that the time delay is added to each tag for avoiding collision. The main advantage of this is the delay is in microseconds which will not create problem of more time consumption.
Ijaems apr-2016-35 Comparative Analysis of Anti-Collision Protocols in RFIDINFOGAIN PUBLICATION
Radio Frequency Identification, abbreviated as RFID which was originally invented as a replacement tool for bar-code scanning and identification has now evolved into a vital technology spanning across fields such as supply chain management, shipping of goods, tracking and identification, etc. However along with the widespread use of RFID, the underlying problem of collision of readers, and tags has been hampering the reliability, and integrity of RFID; thus causing a problem in the further evolution and future deployment of the same in new-born organizations. This papers aims at surveying the various anti-collision protocols which are designed and implemented in order to curb one of the major encumbrances in RFID technology viz. collision.
Energy efficient anti-collision algorithm for the RFID networksjournalBEEI
Energy efficiency is crucial for radio frequency identification (RFID) systems as the readers are often battery operated. The main source of the energy wastage is the collision which happens when tags access the communication medium at the same time. Thus, an efficient anti-collision protocol could minimize the energy wastage and prolong the lifetime of the RFID systems. In this regard, EPCGlobal-Class1-Generation2 (EPC-C1G2) protocol is currently being used in the commercial RFID readers to provide fast tag identification through efficient collision arbitration using the Q algorithm. However, this protocol requires a lot of control message overheads for its operation. Thus, a reinforcement learning based anti-collision protocol (RL-DFSA) is proposed to provide better time system efficiency while being energy efficient through the minimization of control message overheads. The proposed RL-DFSA was evaluated through extensive simulations and compared with the variants of EPC-Class 1 Generation 2 algorithms that are currently being used in the commercial readers. The results show conclusively that the proposed RL-DFSA performs identically to the very efficient EPC-C1G2 protocol in terms of time system efficiency but readily outperforms the compared protocol in the number of control message overhead required for the operation.
Secured authentication of radio-frequency identification system using PRESENT...IJECEIAES
The internet of things (IoT) is an emerging and robust technology to interconnect billions of objects or devices via the internet to communicate smartly. The radio frequency identification (RFID) system plays a significant role in IoT systems, providing most features like mutual establishment, key establishment, and data confidentiality. This manuscript designed secure authentication of IoT-based RFID systems using the lightweight PRESENT algorithm on the hardware platform. The PRESENT-256 block cipher is considered in this work, and it supports 64-bit data with a 256-key length. The PRESENT-80/128 cipher is also designed along with PRESENT-256 at electronic codebook (ECB) mode for Secured mutual authentication between RFID tag and reader for IoT applications. The secured authentication is established in two stages: Tag recognition from reader, mutual authentication between tag and reader using PRESENT80/128/256 cipher modules. The complete secured authentication of IoTbased RFID system simulation results is verified using the chip-scope tool with field-programmable gate array (FPGA) results. The comparative results for PRESENT block cipher with existing PRESENT ciphers and other lightweight algorithms are analyzed with resource improvements. The proposed secured authentication work is compared with similar RFID-mutual authentication (MA) approaches with better chip area and frequency improvements.
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
IoT (and M2M and WoT) From the Operators (CSP) perspectiveSamuel Dratwa
Short introduction to IoT for telecom operators, providers and vendors.
Including: value chain, working examples and more.
Also describe: Smart cities, Smart home, wearables, etc.
Low complexity physical layer security approach for 5G internet of thingsIJECEIAES
Fifth-generation (5G) massive machine-type communication (mMTC) is expected to support the cellular adaptation of internet of things (IoT) applications for massive connectivity. Due to the massive access nature, IoT is prone to high interception probability and the use of conventional cryptographic techniques in these scenarios is not practical considering the limited computational capabilities of the IoT devices and their power budget. This calls for a lightweight physical layer security scheme which will provide security without much computational overhead and/or strengthen the existing security measures. Here a shift based physical layer security approach is proposed which will provide a low complexity security without much changes in baseline orthogonal frequency division multiple access (OFDMA) architecture as per the low power requirements of IoT by systematically rearranging the subcarriers. While the scheme is compatible with most fast Fourier transform (FFT) based waveform contenders which are being proposed in 5G especially in mMTC and ultra-reliable low latency communication (URLLC), it can also add an additional layer of security at physical layer to enhanced mobile broadband (eMBB).
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Internet of Things (IoT) Applicability in a Metropolitan CityEswar Publications
Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several
technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically
feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a
concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in
supporting the metropolitan needs in San Antonio, Texas.
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...IJERA Editor
In this paper, optical CDMA which combines the large bandwidth of the fibre medium with the flexibility of the
CDMA technique to achieve high speed connectivity has been used. For achieving this purpose, OPPM
signalling and switching techniques have been employed. This helps in the achievement of high tolerance to
Multiple Access Interference, further resulting in improvement of both the Bit Error Rate and optical channel
capacity without the need to decrease the light pulse width. An OPPM scheme to support multimedia services
with different transmission rates and Quality of Service requirements is proposed. Packet Switching technique
has been employed to help in the transfer of data in the form of packets from the source to the destination via a
specified route. The results are calculated by using PPM signalling and switching technology.But switching
technology has been found to be far better than the OOK-OCDMA if the average power has been considered as
the restraining factor.
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure.infrastructure is one such technology which enables the Internet of things.When the RFID readers abides by appropriate communication protocols and are connected to the terminal of Internet, the readers distributed throughout the world can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT).
Barcode & RFID Convergence: Enabling Greater Visibility Through StandardsVDC Research Group
This webcast was presented by VDC Research on the convergence of Barcode and RFID technologies on the GS1 US Visibility Framework.
Barcode is the dominant track and trace technology on the planet today and its value proposition is being extended by the more automated features of RFID. While these two technologies are often viewed as competitive, they are actually complimentary, and organizations are realizing the best of both worlds when they use GS1 standards as the framework for integrating RFID to improve their business processes.
Members of GS1 US and/or EPCglobal US will see that they not only have the foundation for enhanced visibility solutions, but they can implement them in a more cost effective and timely manner - all while realizing the benefits of building those solutions on a common architecture.
This paper represents the RFID and GSM technology. The main objective of the system is to uniquely identify and to make security for a person. This requires a unique product,which has the capability of distinguishing different person. This is possible by the new emerging technology RFID (Radio Frequency Identification). The main parts of an RFID system ar e RFID tag (with unique ID number) and RFID reader (for reading the RFID tag). In this system,RFID ta g and RFID reader used are operating at 125 KHz. The microcontroller internal memory is used for storing the details.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
More Related Content
Similar to Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
IoT (and M2M and WoT) From the Operators (CSP) perspectiveSamuel Dratwa
Short introduction to IoT for telecom operators, providers and vendors.
Including: value chain, working examples and more.
Also describe: Smart cities, Smart home, wearables, etc.
Low complexity physical layer security approach for 5G internet of thingsIJECEIAES
Fifth-generation (5G) massive machine-type communication (mMTC) is expected to support the cellular adaptation of internet of things (IoT) applications for massive connectivity. Due to the massive access nature, IoT is prone to high interception probability and the use of conventional cryptographic techniques in these scenarios is not practical considering the limited computational capabilities of the IoT devices and their power budget. This calls for a lightweight physical layer security scheme which will provide security without much computational overhead and/or strengthen the existing security measures. Here a shift based physical layer security approach is proposed which will provide a low complexity security without much changes in baseline orthogonal frequency division multiple access (OFDMA) architecture as per the low power requirements of IoT by systematically rearranging the subcarriers. While the scheme is compatible with most fast Fourier transform (FFT) based waveform contenders which are being proposed in 5G especially in mMTC and ultra-reliable low latency communication (URLLC), it can also add an additional layer of security at physical layer to enhanced mobile broadband (eMBB).
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Internet of Things (IoT) Applicability in a Metropolitan CityEswar Publications
Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several
technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically
feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a
concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in
supporting the metropolitan needs in San Antonio, Texas.
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...IJERA Editor
In this paper, optical CDMA which combines the large bandwidth of the fibre medium with the flexibility of the
CDMA technique to achieve high speed connectivity has been used. For achieving this purpose, OPPM
signalling and switching techniques have been employed. This helps in the achievement of high tolerance to
Multiple Access Interference, further resulting in improvement of both the Bit Error Rate and optical channel
capacity without the need to decrease the light pulse width. An OPPM scheme to support multimedia services
with different transmission rates and Quality of Service requirements is proposed. Packet Switching technique
has been employed to help in the transfer of data in the form of packets from the source to the destination via a
specified route. The results are calculated by using PPM signalling and switching technology.But switching
technology has been found to be far better than the OOK-OCDMA if the average power has been considered as
the restraining factor.
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure.infrastructure is one such technology which enables the Internet of things.When the RFID readers abides by appropriate communication protocols and are connected to the terminal of Internet, the readers distributed throughout the world can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT).
Barcode & RFID Convergence: Enabling Greater Visibility Through StandardsVDC Research Group
This webcast was presented by VDC Research on the convergence of Barcode and RFID technologies on the GS1 US Visibility Framework.
Barcode is the dominant track and trace technology on the planet today and its value proposition is being extended by the more automated features of RFID. While these two technologies are often viewed as competitive, they are actually complimentary, and organizations are realizing the best of both worlds when they use GS1 standards as the framework for integrating RFID to improve their business processes.
Members of GS1 US and/or EPCglobal US will see that they not only have the foundation for enhanced visibility solutions, but they can implement them in a more cost effective and timely manner - all while realizing the benefits of building those solutions on a common architecture.
This paper represents the RFID and GSM technology. The main objective of the system is to uniquely identify and to make security for a person. This requires a unique product,which has the capability of distinguishing different person. This is possible by the new emerging technology RFID (Radio Frequency Identification). The main parts of an RFID system ar e RFID tag (with unique ID number) and RFID reader (for reading the RFID tag). In this system,RFID ta g and RFID reader used are operating at 125 KHz. The microcontroller internal memory is used for storing the details.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Grouping based radio frequency identification anti-collision protocols for dense internet of things application (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
block diagram and signal flow graph representation
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 6, December 2022, pp. 5848~5860
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i6.pp5848-5860 5848
Journal homepage: http://ijece.iaescore.com
Grouping based radio frequency identification anti-collision
protocols for dense internet of things application
Nnamdi H. Umelo1
, Nor K. Noordin1
, Mohd Fadlee A. Rasid1
, Tan K. Geok2
, Fazirulhisyam Hashim1
1
Department of Computer and Communication Systems Engineering, Faculty of Engineering, University Putra Malaysia,
Selangor, Malaysia
2
Faculty of Engineering, Multimedia University, Melaka, Malaysia
Article Info ABSTRACT
Article history:
Received Jun 5, 2021
Revised Jun 5, 2022
Accepted Jul 1, 2022
Radio frequency identification (RFID) is an important internet of things
(IoT) enabling technology. In RFIDs collision occur among tags because
tags share communication channel. This is called tag collision problem. The
problem becomes catastrophic when dense population of tags are deployed
like in IoT. Hence, the need to enhance existing dynamic frame slotted
ALOHA (DFSA) based electronic product code (EPC) C1G2 media access
control (MAC) protocol. Firstly, this paper validates through simulation the
DFSA theory that efficiency of the RFID system is maximum when the
number tags is approximately equal to the frame size. Furthermore, literature
review shows tag grouping is becoming popular to improving the efficiency
of the RFID system. This paper analyzes selected grouping-based
algorithms. Their underlining principles are discussed including their tag
estimation methods. The algorithms were implemented in MATLAB while
extensive Monte Carlo simulation was performed to evaluate their strengths
and weaknesses. Results show that with higher tag density, fuzzy C-means
based algorithm (FCMBG) outperformed traditional DFSA by over 40% in
terms of throughput rate. The results also demonstrate FCMBG bettered
other grouping-based algorithms (GB-DFSA and GBSA) whose tag
estimation method are based on collision slots in terms slot efficiency by
over 10% and also in terms of identification time.
Keywords:
Anti-collision
Dynamic frame slotted
ALOHA
Electronic product code
Internet of things
Performance evaluation
Radio frequency identification
Tag grouping
This is an open access article under the CC BY-SA license.
Corresponding Author:
Nnamdi H. Umelo
Department of Computer and Communication Systems Engineering, Faculty of Engineering, University
Putra Malaysia
Serdang 43400, Selangor, Malaysia
Email: gs54341@student.upm.edu.my
1. INTRODUCTION
Internet of things (IoT) has been defined in different ways by different stakeholders. Obviously, IoT
is different things to different people. Whereas some professionals tend to define IoT based on how they will
contribute to it, users on the other hand define IoT based on how they may benefit from it. But one consensus
definition of IoT is that it is that evolutionary trend of the internet where objects and just anything can
exchange data about itself and its surroundings. Evans [1] of Cisco Internet Business Security Group opined
that IoT is a state of Internet when objects gets connected and exchange information more that humans. He
argued that since the population of things already connected to the internet has surpassed human population
in 2008, we are already experiencing IoT. He made a prediction that in 2020 as the population of the world is
expected to increase to 7.6 billion, objects connected to the internet are expected to skyrocket to about
50 billion.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Grouping based radio frequency identification anti-collision protocols for dense … (Nnamdi H. Umelo)
5849
Radio frequency identification (RFID) is seen as an inevitable enabling technology for the
attainment of IoT’s vision of automatic identification and data communication of just everything [2]. RFID is
used for diverse applications like in health monitoring [3], shopping mall [4] and in the passports of USA,
UK and Malaysia. RFID has numerous advantages over other identification procedures like barcodes,
biometrics, and magnetic stripes. in that it can identify things wirelessly, simultaneously and within a long
range.
There are three types of RFID based on energy source of their tags namely: active RFID,
semi-passive RFID and passive RFID. Whereas both active RFID and semi-passive RFID have batteries
installed on each tag, only the active RFID tag can generate its own wave. As shown in Table 1, semi-passive
RFID though equipped with batteries, still rely on the backscattering of wave from reader query just like the
passive RFIDs. In Table 1, we show the characteristics of these three types of RFID. Passive ultra-high
frequency (UHF) RFID is the RFID for IoT as they are cheap and require no batteries [5]. Hence, they can
easily be deployed on a very large scale for object identification and sensing. Passive RFIDs are often used
interchangeably as RFID itself. Therefore, in this paper we shall be referring passive RFID as RFID.
Table 1. Categorization of RFID based on energy source of their tags
RFID Type Passive RFID Semi-passive RFID Active RFID
Battery presence NO YES YES
Communication principle Backscattering Backscattering Generates own wave
Communication range 10 cm to 7 m Less than 80 m Over 100 m
Cost ($) [5] Less than 0.5 1 to 2 Over 10
Operating frequency LF (125KHz), HF (13.56 MHz), UHF,
Microwave
UHF (860-960 MHz) UHF, Microwave
(2.45 GHz)
Application areas Access control, security, manufacturing
process, animal identification, smart cards,
supply chain
Library books tracking, animal
monitoring and identification,
vehicle immobilizers.
Aerospace, Railroad car
tracking, container
tracking
RFID suffers three types of collision namely: reader-to-reader collision, reader-to-tag collision, and
lastly tag-to-tag type of collision. Tag-to-tag collision is referred to as tag collision problem (TCP) of RFID
networks [6]. As depicted in Figure 1, TCP is a situation where tags’ signal (T1, T2) collides as they try to
respond to reader through backscattering. This is possible because tags use same communication channel to
reply to reader queries.
Figure 1. Tag-to-tag collision
In 2005, electronic product code (EPC global) standardized EPC class 1 generation 2 (EPC C1G2)
[7], [8] as a DFSA-based media access control (MAC) protocol that addresses TCP for passive ultrahigh
frequency (UHF) RFID and for a few tag network. However, as the number of tags increases, the efficiency
of EPC C1G2 deteriorates drastically [9]–[11]. Hence, the need to enhance DFSA for high tag density
applications like IoT. The focus of paper is on enhancing EPC C1G2 to support IoT application.
There have been several efforts to addressing TCP. In literature, approaches by different researchers
is categorized into two namely: ALOHA-based approach and tree-based approach [12]–[15]. Tree-based
protocols also referred to as deterministic based approach are divided into two, namely: Binary tree protocols
(binary splitting) and query tree protocols (QT). Binary tree protocols use random binary number to resolve
collision among tags while in QT protocols, the reader uses prefixes in tag IDs to resolve collision. The merit
of tree-based protocols is the fact that there is no tag starvation as all tags will eventually be identified albeit,
they are computationally complex as they consume more bits and time for tag identification [16]. On the
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 5848-5860
5850
other hand dynamic frame slotted ALOHA (DFSA-based) (ALOHA-based) protocols are easy to implement
[6], ensures fairness in the random access of the shared channel and are promising for high density
application of RFID if enhanced and made robust to quickly mitigate collision when they occur.
DFSA is the De Facto algorithm adopted by EPC C1G2 protocol. however, the traditional DFSA
still has the challenge of poor tag number estimation and bogus frame size adjustment algorithm which
causes either too many idle or collision slots and consequently, affects channel utilization and efficiency of
the RFID system. IoT deployment of RFID demands accurate unidentified tag number estimation that would
effectively support dense deployment of tags. In the current tag number estimation algorithm, the RFID
reader does not have prior knowledge of tag number before the actual process of identification and relies on
querying the tags within its read range and estimating tag number using the number of collision slots from the
query result. The current estimation algorithm is based on an assumption that a collision means two tags have
collided [14]. The equation (1) is the lower bound of collision slot-based tag number estimation which
assumes that every collision slot means two tags have collided.
Over the years, researchers have tried to improve on this by proposing probability models that tries
to determine the actual value of the collision. However, the works of [17], [18] show that collision slots could
occur in an RFID system due to an error prone channel or interference from other signals. Therefore,
determining the value of collision slots alone is not enough to guarantee the accuracy of the tag estimation
algorithm and protocols developed for IoT with such assumption for collision slots could cause a total system
breakdown.
𝑛
̂ = 𝑆𝑠 + 2𝑆𝑐 (1)
Where 𝑛
̂ is the tag number estimate per query cycle, 𝑆𝑠 is the number of tags in the success slot per query
cycle and 𝑆𝑐 is the number of tags in the collision slot per query cycle.
Furthermore, in DFSA a frame is a collection of time slots, and each RFID tag can only be identified
by the reader using a time slot. In frame slotted ALOHA (FSA) and DFSA, the reader queries the tags using
frame per cycle unlike in slotted ALOHA (SA). In DFSA each query cycle tries to automatically decrease or
increase the number of time slot in a frame (frame size). Hence, the dynamism in DFSA. It follows that
efficiency of the RFID systems is a function of how close the frame size is to the estimated number of
unidentified tags. Traditionally, slot efficiency 𝑆𝐸 expressed in (2) is the most popular metric in evaluating
the performance of an RFID anti-collision protocol [9]. Hence, a good protocol is one that ensures the
efficient utilization of time slots (communication channel).
𝑆𝐸 =
𝑆𝑠+𝑆𝑐
𝑆𝑠+𝑆𝑖+𝑆𝑐
(2)
Where 𝑆𝑠 is number of successful slots, 𝑆𝑖 is number of ideal slots, and 𝑆𝑐 is number of collision slots.
On the other hand, Tag grouping is becoming a popular technique in RFID anti-collision research
[9]. The advantage of grouping can be summarized in that the number of tags is small (per group), and the
frame size is equal to the number of tags. This is to say that whereas DFSA gives fair share to all tags in
accessing the shared channel while responding to reader queries, grouping based schemes would only present
a fewer number of tags (a group or cluster) to the channel at a time even when the RFID tags are so densely
populated (IoT scenario).
2. GROUPING METHODS FOR RFID ANTI-COLLISION PROTOCOL
The underlining principle behind grouping is the fact that existing protocol EPC C1G2 can
effectively address collision in a few tags’ density. Theoretically and in practice, this principle ensures that
unlike FSA, DFSA can surpass the optimal throughput of about 36.8% [19]. In this section, we first present
an analysis of DFSA for RFID then we discussed each of the selected grouping-based algorithms.
2.1. Analysis of DFSA for RFID
Dynamic frame slotted ALOHA (DFSA) algorithm is a more complex algorithm that equips RFID
readers with the ability to dynamically adjust their frame sizes based on the intelligence or knowledge they
gather from the RFID system. DFSA addresses the limitation of FSA in terms of readers’ fixed (static) frame
sizes that either results to high collision rate or wastage of the communication channel depending on the tag
density of the RFID environment [20]. Figure 2 describes how DFSA works. From the diagram there are four
RFID tags that are to be identified by the reader. During the first read cycle (using frame 1), the reader
queries tags and tag 1 and tag 4 randomly chose slot 2 and slot 4 respectively and got successfully read by the
4. Int J Elec & Comp Eng ISSN: 2088-8708
Grouping based radio frequency identification anti-collision protocols for dense … (Nnamdi H. Umelo)
5851
reader while tag 2 and tag 3 randomly chose slot 3 at the same time causing a collision. Apart from the
collision, slot 1 and slot 5 were idle causing wastage of bandwidth. However, during read cycle 2 the reader
automatically reduced the frame size from 5 to 3 (frame 2) because there are only two remaining tags to be
read. However, there were still collision and idle slots. Note that slots 2 and 4 are referred to as success slots
S, slot 3 is referred to as collision slot C, while slots 1 and 5 are referred to as idle slots I.
The basic factor in DFSA is the ability of the reader to accurately estimate the number of
unidentified tags after each query cycle and have a precise frame size adjustment algorithm [21]. Existing
works in literature use collision slots as the basis for tag number estimation. The current RFID MAC
protocol: EPC class 1 generation 2 (EPC C1G2) is DFSA based. However, its efficiency is not guaranteed
with high tag density application like IoT. This paper evaluates grouping-based RFID algorithms and
compares them to traditional DFSA. Therefore, before discussing the selected grouping algorithms, we
present an analysis of DFSA algorithm for RFID. As stated earlier the only factor that determines what the
frame size should be per query cycle is the estimated number of unidentified tags.
Figure 2. DFSA anti-collision algorithm for RFID
In analyzing what the estimated tag number should be in relation to the frame size we assume that
the probabilities that tags choose slots are equal (fair access to the shared channel). Therefore, where 𝑛 is the
estimated number of tags and 𝐿 is the frame size and using the binomial distribution, the probability that
there are 𝑟 tags in a slot is given by:
𝑎𝑟 = (𝑛
𝑟
) (
1
𝐿
)
𝑟
(1 −
1
𝐿
)
𝑛−𝑟
(3)
Hence, the probability that there is only one tag in a slot is given by:
𝑎1 = 𝑛 (
1
𝐿
)
𝑟
(1 −
1
𝐿
)
𝑛−1
(4)
While the probability that there is no tag in a slot is given by:
𝑎0 = (1 −
1
𝐿
)
𝑛
(5)
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 5848-5860
5852
Consequently, given the frame size 𝐿, in a query cycle the number of success slot are:
𝑆𝑠 = 𝐿 ∗ 𝑎1 = 𝑛 (1 −
1
𝐿
)
𝑛−1
(6)
While the number of idle slots is:
𝑆𝑖 = 𝐿 ∗ 𝑎0 = 𝐿 (1 −
1
𝐿
)
𝑛
(7)
Therefore, the number of collision slots is:
𝑆𝑐 = 𝐿 − 𝑆𝑠 − 𝑆𝑖 = 𝐿 − 𝑛 (1 −
1
𝐿
)
𝑛−1
− 𝐿 (1 −
1
𝐿
)
𝑛
(8)
Efficiency of the RFID system can be calculated as (9):
𝜂 =
𝑆𝑠
𝐿
(9)
To maximize efficiency, we calculate:
𝑑𝑆𝑠
𝑑𝐿
= (1 −
1
𝐿
)
𝑛−1
+ 𝑛 (1 −
1
𝐿
)
𝑛−1
ln (1 −
1
𝐿
) = (1 −
1
𝐿
)
𝑛−1
[1 + 𝑛 ln (1 −
1
𝐿
)] = 0 (10)
When 𝑛 is known:
𝐿 =
1
1−𝑒
1
𝑛
=
𝑒
1
𝑛
𝑒
1
𝑛−1
When the value of 𝑛 is very large:
𝐿 =
1+
1
𝑛
1+
1
𝑛
−1
= 𝑛 + 1 (11)
Therefore, it is proven in DFSA that the closer the frame size 𝐿 is to number of unidentified tags 𝑛,
the higher the efficiency of the RFID system. Moreover, in Figure 3, we use simulation to validate this
theoretical model in (11) with a tag density of 300. From Figure 3, it can be seen that for different frame sizes
𝐿 (16, 32, 64, 128, 256), efficiency is maximum when tag density 𝑛 is almost equal to 𝐿.
Figure 3. System Efficiency as a function of tag number in DFSA
6. Int J Elec & Comp Eng ISSN: 2088-8708
Grouping based radio frequency identification anti-collision protocols for dense … (Nnamdi H. Umelo)
5853
2.2. Fuzzy C-means grouping algorithm
Fuzzy C-means grouping algorithm (FCMBG) is a DFSA based anti-collision scheme that uses
fuzzy C-means machine learning technique together with Mahalanobis distance measure to group RFID tags
using their EPC codes. The algorithm is set up in such a way that the reader uses the grouping condition of
tags to predict frame size that would cause minimal collision. In the fuzzy C-means algorithm [19], RFID
tags are assumed to be 𝑛 vectors that are firstly grouped (𝑋 = {𝑥1𝑥2 … 𝑥𝑛}) into c fuzzy sets (𝑆1𝑆2 … 𝑆𝑛)
with c clustering centers as set 𝑣 = {𝑣1𝑣2 … 𝑣𝑛}. Then the cluster center of each group is computed so that
the value of the objective function is minimized. The fuzzy membership degree 𝑢𝑖𝑘 can be computed for each
tag using (12) while the centroid is computed using (13). The objective function is stated in (14):
𝑢𝑖𝑘 =
1
∑ (
𝑑𝑖𝑘
𝑑𝑗𝑘
)
2
𝑚−1
𝑐
𝑗=1
(12)
𝑣𝑖 =
∑ (𝑢𝑖𝑘)𝑚
𝑛
𝑘=1 𝑥𝑘
∑ (𝑢𝑖𝑘)𝑚
𝑛
𝑘=1
(13)
𝐿 ≈
1+
1
𝑛
1+
1
𝑛−1
= 𝑛 + 1, 𝑛 ≫ 1 (14)
Here is the procedure for grouping in FCMB grouping algorithm:
- Step 1: initialize the cluster center (centroid) 𝑣, number of groups 𝑐, fuzzy weighted index 𝑚 and range of
frame size [𝐿𝑚𝑖𝑛𝐿𝑚𝑎𝑥];
- Step 2: compute the fuzzy membership degree matrix 𝑢 using (12)
𝑢𝑖𝑗 =
{
[∑
‖𝑥𝑖−𝑣𝑗‖
2
𝑚−1
‖𝑥𝑖−𝑣𝑘‖
2
𝑚−1
𝑐
𝑘=1 ]−1 ‖𝑥𝑖 − 𝑣𝑘‖ ≠ 0
1 ‖𝑥𝑖 − 𝑣𝑘‖ = 0 = 𝑗
0 ‖𝑥𝑖 − 𝑣𝑘‖ = 0 ≠ 𝑗
(15)
where 𝑢𝑖𝑗 is the fuzzy membership degree given that 𝑥𝑖 belong to group 𝑗, and 𝑣𝑗 is the centroid of
group 𝑗.
- Step 3: update each centroid 𝑣 according to (16)
𝑣𝑗 =
∑ 𝑢𝑖𝑗
𝑚
𝑛
𝑖=1 𝑥𝑖
∑ 𝑢𝑖𝑗
𝑚
𝑛
𝑖=1
(16)
where 𝑛 is the number of primary data vector (tags).
- Step 4: using (17) the target number of groups is computed and if the minimum condition of the objective
function is not met go to step 2 else continue.
𝑐 = {
𝑐 − 1 𝑙𝑖 < 𝐿𝑚𝑖𝑛
𝑐 + 1 𝑙𝑖 > 𝐿𝑚𝑎𝑥
𝑐 𝐿𝑚𝑖𝑛 ≤ 𝑙𝑖 ≤ 𝐿𝑚𝑎𝑥
(17)
- Step 5: compute the number of tags for each group. If it falls within the range 𝑙𝑖 ∉ [𝐿𝑚𝑖𝑛 𝐿𝑚𝑎𝑥], update
the centroid and go to step 1, else STOP.
2.3. Group-based binary splitting algorithm
To ensure good coverage of the different approaches to RFID anti-collision in our evaluation of
grouping-based algorithms, this paper also selected a binary splitting based algorithm which is tree-based
grouping algorithm by [9] called group-based binary splitting algorithm (GBSA). In GBSA, tags are divided
into multiple subsets using a tag number estimation 𝑛 and an optimal grouping factor 𝑓𝑜𝑝𝑡 then identified
using a modified binary splitting (MBS) approach. The algorithm which is described in the block diagram in
Figure 4 starts with the reader performing the first query cycle by showing the initial frame size. After the
tags responds to the first query, the reader computes the 𝑛 𝑎𝑛𝑑 𝑓𝑜𝑝𝑡 using the statistics of the success,
collision, and idle slots. Consequently, the tags within the read range of the reader are grouped into
𝑁 = 𝑛. 𝑓𝑜𝑝𝑡 groups. Afterwards, the modified binary splitting is used for tag identification in each group. In
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 5848-5860
5854
their modified binary splitting strategy, GBSA deployed a 1-bit random binary generator 𝑅 to pre-split
contending tags. Since the time used for collision arbitration is eliminated, hence, efficiency and throughput
are enhanced. For their tag number estimation function, GBSA adopted [22] and it is based on the result of
the first sub-frame. They considered 𝑛 tags are assigned 𝐿 slots, after each query cycle, the probabilities that
a slot is success slot 𝑆𝑠, or collision slot 𝑆𝑐or idle slot 𝑆𝑖 is given by:
𝑃(𝐿𝑠𝑢𝑏, 𝑆𝑠𝑆𝑐𝑆𝑖) = (
𝐿𝑠𝑢𝑏!
𝑆𝑠!𝑆𝑐!𝑆𝑖!
) × 𝑃0(𝑆𝑖) × 𝑃1(𝑆𝑠|𝑆𝑖) × 𝑃2(𝑆𝑐|𝑆𝑖, 𝑆𝑠) (18)
where 𝑃1, 𝑃2 and 𝑃0 are probabilities of success slot, collision slot and idle slot. The estimated number of tags
in a given sub-frame is gotten when the probability of (18) is maximum. This means that 𝑛
̂𝑠𝑢𝑏 = 𝑛 when
𝑃(𝐿𝑠𝑢𝑏, 𝑆𝑠𝑆𝑐𝑆𝑖) is maximum. Therefore, for the full frame 𝐿, the estimated tag number is computed:
𝑛
̂𝑒𝑠𝑡 = 𝑛
̂𝑠𝑢𝑏 ×
𝐿
𝐿𝑠𝑢𝑏
(19)
Figure 4. Function block diagram for GBSA
2.4. Grouping-based DFSA with fine groups (GB-DFSA)
One of the first works on grouping based of RFID anti-collision algorithms was proposed by [23].
Their algorithm has two stages. Firstly, the grouping phase and then the identification phase. Grouping is
achieved in the first phase using the fact that RFID systems attain maximum throughput when the number of
unidentified tags equals the frame size. Evenly, maximum throughput is attained when the tags are small, and
the frame size is equally small. However, as the number of tags decreases, throughput increases hence, they
performed the partitioning of tags into smaller groups and then identify with DFSA using Schoute’s tag
number estimation method [24]. In GB-DFSA shown in Table 2, the RFID reader first estimates number of
groups 𝑠, by performing few queries then it enters into the identification phase where the reader arranges the
tags into 𝑠 groups then use DFSA to read the tags. The algorithm has six variables: 𝑓 represents the frame
size, 𝑠 represents number of groups, 𝑝𝑡ℎ is for threshold, 𝑖 is number of queries in the grouping phase, 𝑚 is
fraction factor. 𝑡𝑎𝑔𝑠𝑔 represents tags within a group.
8. Int J Elec & Comp Eng ISSN: 2088-8708
Grouping based radio frequency identification anti-collision protocols for dense … (Nnamdi H. Umelo)
5855
Table 2. GB-DFSA grouping algorithm
GB-DFSA Grouping Algorithm
GB-DFSA(tags) {
𝑓=4; //Frame size
𝑠=1; //the number of groups
𝑝𝑡ℎ=8; //Threshold
𝑖=1; //the number of iterations
𝑚=4;
𝑡𝑎𝑔𝑠𝑔=𝑡𝑎𝑔𝑠;
//grouping phase
do{
𝑛𝑐=FSA(𝑡𝑎𝑔𝑠𝑔, 𝑓);
If (2.39*𝑛𝑐>𝑝𝑡ℎ);
i=i+1;
𝑠=𝑚𝑖−1
;
[𝑔𝑟𝑜𝑢𝑝1, … , 𝑔𝑟𝑜𝑢𝑝𝑠]=grouping (𝑡𝑎𝑔𝑠, 𝑠);
//randomly choose one of the groups}
𝑡𝑎𝑔𝑠𝑔=random ([𝑔𝑟𝑜𝑢𝑝1, … , 𝑔𝑟𝑜𝑢𝑝𝑚
𝑖−1
]);
end if
}until (2.39*𝑛𝑐 <= 𝑝𝑡ℎ)
//identification phase
𝑓 = 𝑝𝑡ℎ;
𝑔𝑟𝑜𝑢𝑝 = 𝑔𝑟𝑜𝑢𝑝1;
𝑖𝑑𝑒𝑛𝑡𝑖𝑓𝑖𝑒𝑑 𝑡𝑎𝑔𝑠 =DFSA(𝑔𝑟𝑜𝑢𝑝, 𝑓);
for i=2 to 𝑠 do{
𝑓 = 𝑛𝑢𝑚𝑏𝑒𝑟(𝑖𝑑𝑒𝑛𝑡𝑖𝑓𝑖𝑒𝑑 𝑡𝑎𝑔𝑠)/(𝑖 − 1);
𝑔𝑟𝑜𝑢𝑝 = 𝑔𝑟𝑜𝑢𝑝1;
𝑖𝑑𝑒𝑛𝑡𝑖𝑓𝑖𝑒𝑑 𝑡𝑎𝑔𝑠
= 𝑖𝑑𝑒𝑛𝑡𝑖𝑓𝑖𝑒𝑑 𝑡𝑎𝑔𝑠 ᴗ DFSA(𝑔𝑟𝑜𝑢𝑝, 𝑓);
}
return 𝑖𝑑𝑒𝑛𝑡𝑖𝑓𝑖𝑒𝑑 𝑡𝑎𝑔𝑠
}
3. PERFORMANCE EVALUATION/RESULT AND DISCUSSION
In this section, we present an evaluation of the performance of the three selected grouping-based
algorithms for RFID anti-collision together with the traditional DFSA. For fairness and better coverage, the
selection considered DFSA based RFID anti-collision algorithms in conformity with EPC C1G2 and one
tree-based grouping algorithm. All simulations were performed in MATLAB software (8.5.0, MathWorks,
Natick Massachusetts, USA). Different scenarios of tag density and frame sizes were used to generate results
in an extensive Monte Carlo simulation. We assume the communication channel is devoid of any capture
effect and noise. In RFID anti-collision research, there are two main metrics that can be used to derive the
appropriate frame size of the RFID system namely throughput rate and channel utilization factor
(slot efficiency) [25]. We also compared the algorithms performances in terms of time consumption which
[26] defined as total number of slots used by an algorithm to read all tags successfully.
3.1. Simulation parameters and data
Electronic product code (EPC) is a unique identifier of all RFID tags. Just like barcodes, they are
used to identify any physical object in the world uniquely. This attribute is one of the reasons RFID is
imperative to attaining IoT, which is to enable just anything have connectivity. Tag EPC is 96-bits and is
accessible in the cloud via EPC information service (EPCIS). As shown in Table 3, EPC is long and in
conformity with EPC C1G2, this paper uses only 16-bits out of the 96-bits for our evaluation. As shown in
Table 3, the EPC code has four parts. The first 8 bits specifies the version of RFID tag while in the domain
management, the manufacturer identifies the tag uniquely from the organizational side. The object class of
24-bit is used by the EPC management to identify the type of item while the 36-bit serial number is unique
within each object class. This unique serial number forms the basis for our grouping in this paper as 16-bit
binary data are generated randomly in MATLAB to simulate the tags’ RN16. In our study, the 16-bit data ID
is used in the clustering (grouping) of tags for each algorithm-traditional DFSA, GBSA, GB-DFSA and
FCMBG.
Table 3. RFID tag coding
EPC 96-bit ID Version no. Domain Management Object Class Serial no.
No. of bits 8 28 24 36
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 5848-5860
5856
The simulation was under a single reader and multiple tags scenario with assumed error-free
channel. Also, part of the assumption was that no tags leave or enter the RFID read range. We set up a high
tag density RFID scenario with one reader. The tags ranges from 100 to 1,000 same as in [9]. The parameters
used in the simulation are in conformity with EPC C1G2 and are listed in Table 4. So, at the time of
simulation, 1,000 groups of 16-bit binary data were generated at random with the MATLAB software to
simulate the EPC code of RFID tags. Noteworthy is the fact that like in EPC C1G2 specifications, in our
evaluation, the different grouping algorithms were implemented using the different correct time slots value
for the success slot, collision slot and idle slots T1, T2 and T3, respectively.
Table 4. Simulation parameters
Parameters Value Parameters Value
Reader-to-tag data-0 1 Tari RTcal 37.5 µs
Reader-to-tag data-1 2 Tari TRcal 50 µs
Reader-to-tag rate 80 Kbps T1 62.5 µs
Tag-to-reader rate 160 Kbps T2 62.5 µs
Tpri 6.25 µs T3 100 µs
Tari 12.5 µs Probe 4 bits
feedback 3 bits RN16 16 bits
Query 22 bits ID 96 bits
Query Adj 9 bits Ack 18 bits
R-T Preamble 112.5 µs QueryRep 4 bits
T-R Preamble 37.5 µs Framesync 62.5 µs
3.2. Results and discussion
In the experiment we performed the effect of tag density on throughput rate of the RFID system
using the throughput rate formula in (20):
𝑇ℎ𝑟 =
𝑆𝑠.𝑇𝑠
𝑆𝑖.𝑇𝑖+𝑆𝑠.𝑇𝑠+𝑆𝑐.𝑇𝑐
(20)
where 𝑆𝑠 𝑎𝑛𝑑 𝑇𝑠 represent the value and time of success slots per query cycle, 𝑆𝑖 𝑎𝑛𝑑 𝑇𝑖 represent the value
and time of idle slots per query cycle and lastly 𝑆𝑐 𝑎𝑛𝑑 𝑇𝑐 represent the value and time of collisions slots per
query cycle.
As can be seen in Figure 5, different frame sizes 𝐿, were used to evaluate the throughput rate result
of the four algorithms. In Figure 5(a), given a frame size of 64, FCMBG shows edge over the other three
algorithms recording a throughput rate of over 55% which is far better than traditional DFSA which gives a
result of about 35% throughput while GBSA followed FCMBG with about 50% throughput rate. It can also
be seen in Figure 5(b) that GBSA shows more stability in throughput rate with very high tag density of 800
and above than FCMBG that shows decline in throughput rate. This can be attributed to tag starvation
problem of DFSA based protocols. A situation where some tags might never be read by the reader due to
very high population of tags unlike tree based protocols [27]. Consequently, this study discovers that the
sharp decline occurred only when frame size was minimal 𝐿=64. This means that whereas FCMBG gives an
improved throughput than traditional DFSA with increasing tag density, FCMBG works best when the tag
density is high and when the frame size is as large as the number of tags as seen in Figures 5(c) and 5(d).
This finding is in agreement with the theoretically analysis in (11).
Furthermore, in Figures 5(b), 5(c) and 5(d), given frame sizes 𝐿=128, 𝐿=256 and 𝐿=512
respectively, FCMBG shows highest throughput rate among the four algorithms while the other two
grouping-based algorithms; GB-DFSA and GBSA closely followed. DFSA throughput rate crashed with
increasing tag density. This huge difference in throughput rate between DFSA and the other three algorithms
is because unlike DFSA, tag grouping in the other algorithms is a proactive means of minimizing collision
even before the tags randomly respond to reader queries. Hence, from our study we deduce that using fuzzy
C-means algorithm to group or cluster RFID tags before running traditional DFSA yields a better throughput
rate when the number of RFID tags to be identified by the RFID reader are of high density.
Slot efficiency also referred to as channel utilization factor is the ratio of not empty slots and total
timeslot (frame). Slot efficiency expressed in (2) is a measure of whether a given protocol wastes
communication channel or not in the identification process. In DFSA based RFID anti-collision, the shared
channel is divided into time slots and a tag can only reply to reader queries using a slot. The more slots a
particular protocol uses to identify all of a given set of tags the lesser its channel efficiency [9], [12].
Therefore, slot efficiency is a very important metric in evaluating the performance of any RFID anti-collision
protocol. In our simulation result shown in Figures 6(a) to 6(d) unsurprisingly, GBSA has perfect slot
10. Int J Elec & Comp Eng ISSN: 2088-8708
Grouping based radio frequency identification anti-collision protocols for dense … (Nnamdi H. Umelo)
5857
efficiency. This is because tree-based protocols have the advantage of utilizing the channel well albeit, with a
consequential trade off which is too much time delay as seen in Figure 7. This delay is due to fact that
tree-based protocols are deterministic and cause too much computational space to implement. Hence, the
choice of DFSA in EPC C1G2 protocol due to limited computational space of passive tags. However,
FCMBG performed better than the other two DFSA based algorithms in terms of channel utilization.
(a) (b)
(c) (d)
Figure 5. System throughput rate comparison for the different algorithm using (a) frame size of 64, (b) frame
size of 128, (c) frame size of 256, and (d) frame size of 512
(a) (b)
(c) (d)
Figure 6. Slot efficiency (channel utilization factor) for the different algorithms using (a) frame size of 64,
(b) frame size of 128, (c) frame size of 256, and (d) frame size of 512
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 5848-5860
5858
In comparing identification time used by each algorithm to identify all the tags, there is
inconsistencies among different authors in literature. For instance [19], [20] in presenting their results define
identification time as the total time slot number used in identifying all the tags while [28] considered both
total time slot number and total query rounds. However, for the purpose of this evaluation we define
Identification time as total number of timeslots utilized by each algorithm to identify all the tags. This is in
accordance with [19] because the work is part of our performance comparison. Going by the result presented
in Figure 7 and as expected GBSA which uses modified binary splitting consumes the highest time to
identify all tags.
Figure 7. Identification time for the different algorithms
However, it was surprising to observe that even when the tag density was as low as 100, GBSA
shows a result of over 200% more time to identify all 100 tags. This is associated with the recursive nature of
breaking collision slots into ones and zeros continuously to form a tree-like structure of tree-based algorithms
and binary splitting in particular. Based on this observation, we infer that for IoT application of RFID where
time and computational space is a challenge, binary splitting algorithms might not be suited.
On the other hand, FCMBG which uses fuzzy C-means machine learning to group tags performed
best in terms of identification time when the tag number is very dense (over 500). Initially when the tag
density was less than 300, the traditional DFSA, GB-DFSA and FCMBG all show low identification time.
But as the tag density increases to 500 and to 1,000, FCMBG shows much lower time than all the other three
algorithms. This could be attributed to the fact that unlike the traditional DFSA, FCMBG uses the uniqueness
of tags EPC (RN16 code) to group tags effectively, making it less probable for tags to randomly select same
time slot (collision). Consequently, minimal collision means minimal retransmission by the reader and lesser
time used in identifying all the tags within the read range of the reader.
4. CONCLUSION
Firstly, this paper validates through simulation the assertion that the efficiency of the RFID system
is maximum when the number of tags is almost equal to the frame size the reader uses to query the tags. The
paper also demonstrates the edge grouping-based RFID anti-collision algorithms have over traditional RFID
anti-collision algorithm when the number of tags to be identified are large like in IoT. The paper shows that
when the unique serial number of RFID tags are used to classify or group tags like in FCMBG protocol,
collision is further mitigated while system throughput and time delay are enhanced. Because RFID tags have
unique EPC codes, binary 16-bit codes were generated in MATLAB to model the tags, while different
grouping algorithms (FCMBG, GB-DFSA, GBSA) were implemented in MATLAB including traditional
DFSA algorithm. Results show that all the three selected grouping-based RFID anti-collision algorithms gave
better performances than traditional DFSA when tag density is high in terms of throughput rate, channel
utilization while FCMBG and GB-DFSA performed better in terms of identification time. The study also
demonstrates that machine learning could be the most efficient technique in performing RFID tag grouping
12. Int J Elec & Comp Eng ISSN: 2088-8708
Grouping based radio frequency identification anti-collision protocols for dense … (Nnamdi H. Umelo)
5859
since FCMBG gave the best result among the selected algorithms. Therefore, grouping based RFID
anti-collision algorithms are promising and could be the sine qua non for RFID MAC protocol development
for IoT application.
REFERENCES
[1] D. Evans, “How the next evolution of the internet is changing everything,” Cisco Internet Business Solutions Group (IBSG), no.
April, 2011.
[2] S. M. Florence, M. Uma, C. Fancy, and G. Saranya, “A study of remotely booking slot for vehicle using internet of things,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 5, pp. 5392–5399, Oct. 2020, doi:
10.11591/ijece.v10i5.pp5392-5399.
[3] H. A. Khan, R. Abdulla, S. K. Selvaperumal, and A. Bathich, “IoT based on secure personal healthcare using RFID technology
and steganography,” International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 4, pp. 3300–3309, Aug.
2021, doi: 10.11591/ijece.v11i4.pp3300-3309.
[4] A. Abdulkareem, C. Awosope, and A. Tope-Ojo, “Development and implementation of a miniature RFID system in a shopping
mall environment,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 2, pp. 1374–1378, Apr.
2019, doi: 10.11591/ijece.v9i2.pp1374-1378.
[5] S. Hodges and M. Harrison, “Demystifying RFID: principles and practicalities, auto-ID centre,” Institute for Manufacturing,
University of Cambridge, pp. 1–23, 2004.
[6] X. Wang, “A fast hybrid strategy-based RFID tag identification protocol,” Wireless Communications and Mobile Computing,
vol. 2021, pp. 1–7, Feb. 2021, doi: 10.1155/2021/6646812.
[7] G. EPCglobal, “Epc radio-frequency identity protocols generation-2 uhf rfid; specification for RFID air interface protocol for
communications at 860 mhz-960 mhz,” EPCglobal Inc., November, vol. 1, no. 3, 2013.
[8] H.-Y. Chien and C.-H. Chen, “Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards,”
Computer Standards and Interfaces, vol. 29, no. 2, pp. 254–259, Feb. 2007, doi: 10.1016/j.csi.2006.04.004.
[9] J. Su, Z. Sheng, A. X. Liu, Y. Han, and Y. Chen, “A group-based binary splitting algorithm for UHF RFID anti-collision
systems,” IEEE Transactions on Communications, vol. 68, no. 2, pp. 998–1012, Feb. 2020, doi: 10.1109/TCOMM.2019.2952126.
[10] Z. Jiang, B. Li, M. Yang, and Z. Yan, “LC-DFSA: low complexity dynamic frame slotted aloha anti-collision algorithm for RFID
system,” Sensors, vol. 20, no. 1, Dec. 2019, doi: 10.3390/s20010228.
[11] W. H. Zhou, N. De Jiang, and C. C. Yan, “Research on anti-collision algorithm of RFID tags in logistics system,” Procedia
Computer Science, vol. 154, pp. 460–467, 2019, doi: 10.1016/j.procs.2019.06.065.
[12] J. Su, Z. Sheng, L. Xie, G. Li, and A. X. Liu, “Fast splitting-based tag identification algorithm for anti-collision in UHF RFID
system,” IEEE Transactions on Communications, vol. 67, no. 3, pp. 2527–2538, Mar. 2019, doi:
10.1109/TCOMM.2018.2884001.
[13] X. Jia, M. Bolic, Y. Feng, and Y. Gu, “An efficient dynamic anti-collision protocol for mobile RFID tags identification,” IEEE
Communications Letters, vol. 23, no. 4, pp. 620–623, Apr. 2019, doi: 10.1109/LCOMM.2019.2895819.
[14] Z. Huang et al., “A novel cross layer anti-collision algorithm for slotted ALOHA-based UHF RFID systems,” IEEE Access,
vol. 7, pp. 36207–36217, 2019, doi: 10.1109/ACCESS.2019.2900739.
[15] Y. Qiu, Y. Xu, L. Yang, J. Lu, and D. Li, “Improved anti-collision algorithm for the application on intelligent warehouse,”
Applied Sciences, vol. 9, no. 8, Apr. 2019, doi: 10.3390/app9081596.
[16] L. Zhao, L. Wang, and S. Du, “An efficient-algorithm for RFID tag anticollision,” Wireless Communications and Mobile
Computing, vol. 2021, pp. 1–7, May 2021, doi: 10.1155/2021/9967739.
[17] D. Benedetti, G. Maselli, C. Petrioli, and M. Piva, “The impact of external interference on RFID anti-collision protocols,” IEEE
Networking Letters, vol. 1, no. 2, pp. 76–79, Jun. 2019, doi: 10.1109/LNET.2019.2909814.
[18] Y.-H. Chen, R.-Z. Hung, L.-K. Chen, P.-T. Jan, and Y.-R. Su, “Channel-quality aware RFID tag identification algorithm to
accommodate the varying channel quality of IoT environment,” Applied Sciences, vol. 9, no. 2, Jan. 2019, doi:
10.3390/app9020321.
[19] B. Zhi, W. Sainan, and H. Yigang, “A novel anti-collision algorithm in RFID for internet of things,” IEEE Access, vol. 6,
pp. 45860–45874, 2018, doi: 10.1109/ACCESS.2018.2863565.
[20] H.-W. Wang, “Efficient DFSA algorithm in RFID systems for the internet of things,” Mobile Information Systems, vol. 2015,
pp. 1–10, 2015, doi: 10.1155/2015/942858.
[21] O. Bang, J. Hwan, D. Lee, and H. Lee, “Efficient novel anti-collision protocols for passive RFID tags,” AUTO-ID LABS White
Paper, 2009.
[22] Y. Chen, J. Su, and W. Yi, “An efficient and easy-to-implement tag identification algorithm for UHF RFID systems,” IEEE
Communications Letters, vol. 21, no. 7, pp. 1509–1512, Jul. 2017, doi: 10.1109/LCOMM.2017.2649490.
[23] C.-Y. Wang and C.-C. Lee, “A grouping-based dynamic framed slotted ALOHA anti-collision method with fine groups in RFID
systems,” in 2010 5th International Conference on Future Information Technology, 2010, pp. 1–5, doi:
10.1109/FUTURETECH.2010.5482699.
[24] F. Schoute, “Dynamic frame length ALOHA,” IEEE Transactions on Communications, vol. 31, no. 4, pp. 565–568, Apr. 1983,
doi: 10.1109/TCOM.1983.1095854.
[25] W. -T. Chen, “An accurate tag estimate method for improving the performance of an RFID anticollision algorithm based on
dynamic frame length ALOHA,” IEEE Transactions on Automation Science and Engineering, vol. 6, no. 1, pp. 9–15, Jan. 2009,
doi: 10.1109/TASE.2008.917093.
[26] H. Guo, C. He, N. Wang, and M. Bolic, “PSR: a novel high-efficiency and easy-to-implement parallel algorithm for anticollision
in RFID systems,” IEEE Transactions on Industrial Informatics, vol. 12, no. 3, pp. 1134–1145, Jun. 2016, doi:
10.1109/TII.2016.2554465.
[27] S.-C. Tsai, Y.-M. Hu, C.-H. Chai, and J.-S. Li, “Efficient tag reading protocol for large-scale RFID systems with pre-reading,”
Computer Communications, vol. 88, pp. 73–83, Aug. 2016, doi: 10.1016/j.comcom.2016.04.019.
[28] I. Onat and A. Miri, “A tag count estimation algorithm for dynamic framed ALOHA based RFID MAC protocols,” in 2011 IEEE
International Conference on Communications (ICC), Jun. 2011, pp. 1–5, doi: 10.1109/icc.2011.5962792.
13. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 5848-5860
5860
BIOGRAPHIES OF AUTHORS
Nnamdi H. Umelo is a PhD candidate in the Department of Computer and
Communication Systems Engineering, (WiPNET Lab) UPM, Malaysia. He holds MSc from
the Department of Computer Science and Engineering, OAU Ile-Ife, Nigeria in 2012,
5962792and a B.Engr. Computer Engineering from ESUT, Enugu, Nigeria in 2006. His
research interest is in RFID for IoT, WSN, Wireless Networks, and Smart homes. He can be
contacted at email: umelonnamdi@gmail.com.
Nor K. Noordin has been a Professor in UPM since 2012 where she had earlier in
2006 gotten her PhD. In 1987, she got her B.Sc. in Telecommunications Engineering from the
University of Alabama USA, and afterwards a M.Sc. degree from UTM Malaysia. She is
currently the Dean Faculty of Engineering, UPM, Malaysia. She has over 200 journal and
conference papers and has attracted and conducted over 30 research projects. She can be
contacted at email: nknordin@upm.edu.my.
Mohd Fadlee A. Rasid is currently a Professor in the Department of Computer
and Communications Systems Engineering, UPM. He received a B.Sc. in Electrical
Engineering from the Purdue University USA and a PhD in Elect/Elect Engineering (Mobile
Communications) from Loughborough University UK. He is the director of WSN research
group which focuses on wireless medical sensors in healthcare. He has been a research
consultant to different projects including British council UKIERI project on wireless sensor
medical research. He can be contacted at email is: fadlee@upm.edu.my.
Tan K. Geok received the B.E., M.E., and PhD. degrees all in Electrical
Engineering from UTM, Malaysia, in 1995, 1997, and 2000, respectively. He has been Senior
R&D engineer in EPCOS Singapore in 2000. In 2001–2003, he joined DoCoMo Euro-Labs in
Munich, Germany. He is currently academic staff in MMU, Malaysia. His research interests
include radio propagation for outdoor and indoor, RFID, multi-user detection technique for
multicarrier technologies, and A-GPS. He can be contacted at email: kgtan@mmu.edu.my.
Fazirulhisyam Hashim received his M.Sc. degree from Universiti Sains Malaysia
and Ph.D. degree in telecommunication engineering from the University of Sydney, Australia.
He is currently an Associate Professor with the Department of Computer and Communication
Systems Engineering, Universiti Putra Malaysia. His research interests include heterogeneous
wireless communication systems and network security. He can be contacted at email:
fazirul@upm.edu.my.