SlideShare a Scribd company logo
1 of 14
RFID ESTIMATION PROBLEM
Lee, Gunhee
SURVEY
REFERENCES
• Energy Efficient Algorithms for the RFID Estimation
Problem
– Tao Li, Samuel Wu, Shigang Chen and Mark Yang
– University of Florida, Gainesville, FL, USA
– IEEE INFOCOM 2010
• Fast and Reliable Estimation Schemes in RFID
Systems
– M. Kodialam and T. Nandagopal
– Bell Labs, Lucent Technologies
– ACM MOBICOM 2006
BACKGROUND
• RFID technology is widely used in various commercial
applications, including inventory control, object
tracking, and supply chain management
• It is very desirable to have a quick way of counting
the number of items in the warehouse or in each
section of the warehouse
• To timely detect theft or management errors, such
counting may be performed frequently
PROBLEM
• It is both time and energy consuming to read the actual
IDs of all tags (what if there are thousands of tags)
• Kodialam and Nandagopal showed that the reading time
can be greatly reduced through probabilistic methods that
estimate the number of tags(N) with an accuracy that can
be arbitrarily set
• This is called RFID estimation problem
• Tao Li, et al. suggested an energy efficient solution of RFID
estimation problem
PROBLEM DEFINITION
ˆ ˆ
) )
((1 ) (1
N N
P N
rob   
   

Estimate whose accuracy is specified by a confidence interval
with two parameters, a probabili
ˆ
and an erro
ty va r bou
lue nd .
N
 
ˆ ˆ
( )
N N

 ˆ ˆ
( )
N N


There is N somewhere in this interval
with probability greater than α
N
SYSTEM MODEL
• Only interested in Active RFID
• Because a reader should move around whole area
which is very time consuming, and there is no energy
consumption constraint in Passive RFID
• There is a reader and tags, and estimation is based on
a polling protocol
• Slotted time frame contention polling is used
POLLING PROTOCOL
• Polling procedure uses three types of slots
– Empty slots
– Singleton slots
– Collision slots
• Contention probability p and frame size f should be chosen
carefully to estimate N succesfully
• This protocol only counts empty or non-empty, so 1-bit reply is
enough (this reduces energy and time consumption)
} Non-empty slots
Time
Non-empty slots (1 or more replies)
ALGORITHM
• Maximum Likelihood Estimation Algorithm (MLEA) uses
fixed frame size f = 1 slot.
• If we know lower bound Nmin , we can estimate more
efficiently and accurately
• At the beginning of a polling, each tag makes a
probabilistic decision:
– Sleep with probability
– Wake up with probability ,
and respond with probability
1
1
min
N

1
min
N
min
p N

MAXIMUM LIKELIHOOD ESTIMATION
• Initialization phase
– Quickly produces a coarse estimation of N
• Iteration phase
– Refines the contention probability and generates the estimation results
• Let pi be the contention probability of the ith polling, and let zi
be the slot state of the ith polling.
• The sequence of zi forms the response vector.
• 0 means empty slot and 1 means non-empty slots.
• As will be discussed shortly, authors analysis shows that the
optimal contention probability is
{ 1} 1 (1 ) 1 i
Np
N
i i
Prob z e
p 
   
 
lim(1 )
x
n
n
e 




 
1.594 /
i
p N

INITIALIZATION PHASE
• We want to pick a small value for the initial contention
probability p1, because if p1 is too large, a lot of tags will
respond, which is wasteful of energy
• Upper bound Nmax is often available in practice, such as
from physical limit, financial limit, or company policy. Nmax
can be much bigger than N
• If zi = 0, we multiply contention probability pi by C(>1)
after each polling until a non-empty slot is observed
• When that happens, say at the Lth polling, we have a
coarse estimation of N to be 1/pL
ITERATION PHASE
• This phase iteratively refines the estimation results after each
polling, and terminates when the specified accuracy requirement
is met
• The reader performs three tasks
– Sets contention probability based on previous estimate of N
– Based on the received zi , the reader finds the new estimate of N
that maximizes the following likelihood function
– After computing new estimate of N, the reader has to determine if
the confidence interval of the estimation meets the requirement
1 1
1.5
ˆ
94
ˆ
i
i i
N N
p

 


(1 )
1
(1 ) (1 (1 ) )
j j
i
N z z
N
i j j
j
L p p


   
 arg ax{ }
ˆ m
i i
N L
N 
ˆ
2
1 ˆ
· ·
i i
i
p
N
i
e
Z
ip
N
 


2
2
1.544·Z
i 


EFFECTS
• We can estimate the total number of RFID tags by using a
probabilistic method
• This enables frequent monitoring of the number of stocks
in faster time and lower energy consumption
• It can prevent theft and managerial mistakes and has many
other advantages
• This method can be modified to fit other networks easily
(e.g., wireless sensor networks, adhoc networks)
DISCUSSION
• The authors only considered Active RFIDs. How about Passive
RFID? Moving receivers can adopt similar approach to the
number of estimate RFID tags.
• How to synchronize the timers of whole tags and readers?
Synchronizing or pre-determined timer is essential to use time-
slotted frame communication. And how to detect collision if
there are too many transmitted signals? Its SINR may be very low.
• We need context-sensitive information such as Nmin and Nmax in
MLEA. How to determine Nmin and Nmax to be more accurate and
more reasonable?
CONCLUSION
• This paper successfully applied probabilistic methods on
RFID technology
• In networks such as RFID network and Wireless Sensor
Network, time and energy consumption of polling
protocol should be regarded as main constraints
• There are advanced algorithms such as Average Sum
Estimation and Enhanced Maximum Likelihood Estimation in
the paper
• But due to highly complicated mathematical reasoning and
not significant performance difference, we skipped these
advanced variants of MLEA

More Related Content

Similar to RFID Estimation Problem in RFID system.ppt

FALLSEM2022-23_BCSE202L_TH_VL2022230103292_Reference_Material_I_25-07-2022_Fu...
FALLSEM2022-23_BCSE202L_TH_VL2022230103292_Reference_Material_I_25-07-2022_Fu...FALLSEM2022-23_BCSE202L_TH_VL2022230103292_Reference_Material_I_25-07-2022_Fu...
FALLSEM2022-23_BCSE202L_TH_VL2022230103292_Reference_Material_I_25-07-2022_Fu...
AntareepMajumder
 
Sequence Modelling with Deep Learning
Sequence Modelling with Deep LearningSequence Modelling with Deep Learning
Sequence Modelling with Deep Learning
Natasha Latysheva
 
Queuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depthQueuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depth
IdcIdk1
 
Understanding RFID Counting Protocols.ppt
Understanding RFID Counting Protocols.pptUnderstanding RFID Counting Protocols.ppt
Understanding RFID Counting Protocols.ppt
novrain1
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
Nitesh Singh
 

Similar to RFID Estimation Problem in RFID system.ppt (20)

FALLSEM2022-23_BCSE202L_TH_VL2022230103292_Reference_Material_I_25-07-2022_Fu...
FALLSEM2022-23_BCSE202L_TH_VL2022230103292_Reference_Material_I_25-07-2022_Fu...FALLSEM2022-23_BCSE202L_TH_VL2022230103292_Reference_Material_I_25-07-2022_Fu...
FALLSEM2022-23_BCSE202L_TH_VL2022230103292_Reference_Material_I_25-07-2022_Fu...
 
Slides [DAA] Unit 2 Ch 2.pdf
Slides [DAA] Unit 2 Ch 2.pdfSlides [DAA] Unit 2 Ch 2.pdf
Slides [DAA] Unit 2 Ch 2.pdf
 
Algorithms & Complexity Calculation
Algorithms & Complexity CalculationAlgorithms & Complexity Calculation
Algorithms & Complexity Calculation
 
Algorithm Analysis.pdf
Algorithm Analysis.pdfAlgorithm Analysis.pdf
Algorithm Analysis.pdf
 
Neural network for real time traffic signal control
Neural network for real time traffic signal controlNeural network for real time traffic signal control
Neural network for real time traffic signal control
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Digial instrumentation fnal
Digial instrumentation fnalDigial instrumentation fnal
Digial instrumentation fnal
 
Sequence Modelling with Deep Learning
Sequence Modelling with Deep LearningSequence Modelling with Deep Learning
Sequence Modelling with Deep Learning
 
ANN ARIMA Hybrid Models for Time Series Prediction
ANN ARIMA Hybrid Models for Time Series PredictionANN ARIMA Hybrid Models for Time Series Prediction
ANN ARIMA Hybrid Models for Time Series Prediction
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Data structures and algorithms Module-1.pdf
Data structures and algorithms Module-1.pdfData structures and algorithms Module-1.pdf
Data structures and algorithms Module-1.pdf
 
DAA Slides for Multiple topics such as different algorithms
DAA Slides for Multiple topics such as different algorithmsDAA Slides for Multiple topics such as different algorithms
DAA Slides for Multiple topics such as different algorithms
 
Av 738 - Adaptive Filtering Lecture 1 - Introduction
Av 738 - Adaptive Filtering Lecture 1 - IntroductionAv 738 - Adaptive Filtering Lecture 1 - Introduction
Av 738 - Adaptive Filtering Lecture 1 - Introduction
 
Quant trading with artificial intelligence
Quant trading with artificial intelligenceQuant trading with artificial intelligence
Quant trading with artificial intelligence
 
Algorithms Analysis.pdf
Algorithms Analysis.pdfAlgorithms Analysis.pdf
Algorithms Analysis.pdf
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
 
Queuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depthQueuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depth
 
Understanding RFID Counting Protocols.ppt
Understanding RFID Counting Protocols.pptUnderstanding RFID Counting Protocols.ppt
Understanding RFID Counting Protocols.ppt
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
Protecting Your API with Redis by Jane Paek - Redis Day Seattle 2020
Protecting Your API with Redis by Jane Paek - Redis Day Seattle 2020Protecting Your API with Redis by Jane Paek - Redis Day Seattle 2020
Protecting Your API with Redis by Jane Paek - Redis Day Seattle 2020
 

More from novrain1

Chuong 2- Tin & Luong tin.ppt slide for teaching
Chuong 2- Tin & Luong tin.ppt slide for teachingChuong 2- Tin & Luong tin.ppt slide for teaching
Chuong 2- Tin & Luong tin.ppt slide for teaching
novrain1
 
Channel coding chuong 6 ma hoa kenh phan ma chap.ppt
Channel coding chuong 6 ma hoa kenh phan ma chap.pptChannel coding chuong 6 ma hoa kenh phan ma chap.ppt
Channel coding chuong 6 ma hoa kenh phan ma chap.ppt
novrain1
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
novrain1
 
mobile communication for student and lecture
mobile communication for student and lecturemobile communication for student and lecture
mobile communication for student and lecture
novrain1
 
random variable and probability distributions
random variable and probability distributionsrandom variable and probability distributions
random variable and probability distributions
novrain1
 
Fast and Reliable Estimation Schemes in RFID Systems.ppt
Fast and Reliable Estimation Schemes in RFID Systems.pptFast and Reliable Estimation Schemes in RFID Systems.ppt
Fast and Reliable Estimation Schemes in RFID Systems.ppt
novrain1
 
discrete and continuous probability distributions pptbecdoms-120223034321-php...
discrete and continuous probability distributions pptbecdoms-120223034321-php...discrete and continuous probability distributions pptbecdoms-120223034321-php...
discrete and continuous probability distributions pptbecdoms-120223034321-php...
novrain1
 

More from novrain1 (9)

Chuong 2- Tin & Luong tin.ppt slide for teaching
Chuong 2- Tin & Luong tin.ppt slide for teachingChuong 2- Tin & Luong tin.ppt slide for teaching
Chuong 2- Tin & Luong tin.ppt slide for teaching
 
Channel coding chuong 6 ma hoa kenh phan ma chap.ppt
Channel coding chuong 6 ma hoa kenh phan ma chap.pptChannel coding chuong 6 ma hoa kenh phan ma chap.ppt
Channel coding chuong 6 ma hoa kenh phan ma chap.ppt
 
Xu ly tin hieu am thanh và hình ảnh giảng dạy slide
Xu ly tin hieu am thanh và hình ảnh giảng dạy slideXu ly tin hieu am thanh và hình ảnh giảng dạy slide
Xu ly tin hieu am thanh và hình ảnh giảng dạy slide
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
 
mobile communication for student and lecture
mobile communication for student and lecturemobile communication for student and lecture
mobile communication for student and lecture
 
Introduce mobile communication generation.ppt
Introduce mobile communication generation.pptIntroduce mobile communication generation.ppt
Introduce mobile communication generation.ppt
 
random variable and probability distributions
random variable and probability distributionsrandom variable and probability distributions
random variable and probability distributions
 
Fast and Reliable Estimation Schemes in RFID Systems.ppt
Fast and Reliable Estimation Schemes in RFID Systems.pptFast and Reliable Estimation Schemes in RFID Systems.ppt
Fast and Reliable Estimation Schemes in RFID Systems.ppt
 
discrete and continuous probability distributions pptbecdoms-120223034321-php...
discrete and continuous probability distributions pptbecdoms-120223034321-php...discrete and continuous probability distributions pptbecdoms-120223034321-php...
discrete and continuous probability distributions pptbecdoms-120223034321-php...
 

Recently uploaded

Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

RFID Estimation Problem in RFID system.ppt

  • 2. REFERENCES • Energy Efficient Algorithms for the RFID Estimation Problem – Tao Li, Samuel Wu, Shigang Chen and Mark Yang – University of Florida, Gainesville, FL, USA – IEEE INFOCOM 2010 • Fast and Reliable Estimation Schemes in RFID Systems – M. Kodialam and T. Nandagopal – Bell Labs, Lucent Technologies – ACM MOBICOM 2006
  • 3. BACKGROUND • RFID technology is widely used in various commercial applications, including inventory control, object tracking, and supply chain management • It is very desirable to have a quick way of counting the number of items in the warehouse or in each section of the warehouse • To timely detect theft or management errors, such counting may be performed frequently
  • 4. PROBLEM • It is both time and energy consuming to read the actual IDs of all tags (what if there are thousands of tags) • Kodialam and Nandagopal showed that the reading time can be greatly reduced through probabilistic methods that estimate the number of tags(N) with an accuracy that can be arbitrarily set • This is called RFID estimation problem • Tao Li, et al. suggested an energy efficient solution of RFID estimation problem
  • 5. PROBLEM DEFINITION ˆ ˆ ) ) ((1 ) (1 N N P N rob         Estimate whose accuracy is specified by a confidence interval with two parameters, a probabili ˆ and an erro ty va r bou lue nd . N   ˆ ˆ ( ) N N   ˆ ˆ ( ) N N   There is N somewhere in this interval with probability greater than α N
  • 6. SYSTEM MODEL • Only interested in Active RFID • Because a reader should move around whole area which is very time consuming, and there is no energy consumption constraint in Passive RFID • There is a reader and tags, and estimation is based on a polling protocol • Slotted time frame contention polling is used
  • 7. POLLING PROTOCOL • Polling procedure uses three types of slots – Empty slots – Singleton slots – Collision slots • Contention probability p and frame size f should be chosen carefully to estimate N succesfully • This protocol only counts empty or non-empty, so 1-bit reply is enough (this reduces energy and time consumption) } Non-empty slots Time Non-empty slots (1 or more replies)
  • 8. ALGORITHM • Maximum Likelihood Estimation Algorithm (MLEA) uses fixed frame size f = 1 slot. • If we know lower bound Nmin , we can estimate more efficiently and accurately • At the beginning of a polling, each tag makes a probabilistic decision: – Sleep with probability – Wake up with probability , and respond with probability 1 1 min N  1 min N min p N 
  • 9. MAXIMUM LIKELIHOOD ESTIMATION • Initialization phase – Quickly produces a coarse estimation of N • Iteration phase – Refines the contention probability and generates the estimation results • Let pi be the contention probability of the ith polling, and let zi be the slot state of the ith polling. • The sequence of zi forms the response vector. • 0 means empty slot and 1 means non-empty slots. • As will be discussed shortly, authors analysis shows that the optimal contention probability is { 1} 1 (1 ) 1 i Np N i i Prob z e p        lim(1 ) x n n e        1.594 / i p N 
  • 10. INITIALIZATION PHASE • We want to pick a small value for the initial contention probability p1, because if p1 is too large, a lot of tags will respond, which is wasteful of energy • Upper bound Nmax is often available in practice, such as from physical limit, financial limit, or company policy. Nmax can be much bigger than N • If zi = 0, we multiply contention probability pi by C(>1) after each polling until a non-empty slot is observed • When that happens, say at the Lth polling, we have a coarse estimation of N to be 1/pL
  • 11. ITERATION PHASE • This phase iteratively refines the estimation results after each polling, and terminates when the specified accuracy requirement is met • The reader performs three tasks – Sets contention probability based on previous estimate of N – Based on the received zi , the reader finds the new estimate of N that maximizes the following likelihood function – After computing new estimate of N, the reader has to determine if the confidence interval of the estimation meets the requirement 1 1 1.5 ˆ 94 ˆ i i i N N p      (1 ) 1 (1 ) (1 (1 ) ) j j i N z z N i j j j L p p        arg ax{ } ˆ m i i N L N  ˆ 2 1 ˆ · · i i i p N i e Z ip N     2 2 1.544·Z i   
  • 12. EFFECTS • We can estimate the total number of RFID tags by using a probabilistic method • This enables frequent monitoring of the number of stocks in faster time and lower energy consumption • It can prevent theft and managerial mistakes and has many other advantages • This method can be modified to fit other networks easily (e.g., wireless sensor networks, adhoc networks)
  • 13. DISCUSSION • The authors only considered Active RFIDs. How about Passive RFID? Moving receivers can adopt similar approach to the number of estimate RFID tags. • How to synchronize the timers of whole tags and readers? Synchronizing or pre-determined timer is essential to use time- slotted frame communication. And how to detect collision if there are too many transmitted signals? Its SINR may be very low. • We need context-sensitive information such as Nmin and Nmax in MLEA. How to determine Nmin and Nmax to be more accurate and more reasonable?
  • 14. CONCLUSION • This paper successfully applied probabilistic methods on RFID technology • In networks such as RFID network and Wireless Sensor Network, time and energy consumption of polling protocol should be regarded as main constraints • There are advanced algorithms such as Average Sum Estimation and Enhanced Maximum Likelihood Estimation in the paper • But due to highly complicated mathematical reasoning and not significant performance difference, we skipped these advanced variants of MLEA