SlideShare a Scribd company logo
1 of 24
RFID Anti-collision algorithm Based on
Bi-directional Binary Exponential Index
YU Song-sen, ZHAN Yi-ju, WANG Yong-
hua
Contents
 1.Introduction
 2.Algorithm Principle
 3.Mathematical Analysis
 4.The Simulated Analysis of the Algorithmic
Model
 5.Conclusion
1.Introduction
 Problem:tag collision
Stochastic collision algorithm : ALOHA ; Slotted-
ALOHA resolutions
deterministic collision algorithm : tree searching
algorithm

Our proposed algorithm bi-directional binary exponential index that
comes from the binary exponential backoff algorithm of the
computer network IEEE802.3 protocol is belongs to Stochastic
collision algorithm.
2.Algorithm Principle
2.1 Algorithm Definitions
 (1)Interval :The period from the reader sending out request order to
tag answering information is called an interval.
request answer
trequest t answer
t interval
Fi gure 1 the composi ti on of i nterval
 (2)Request order: Request_under_success, Request_under_failure,
Request_under_idle
 (3)Shield command――Shield (EPC)
2.1 Algorithm Definitions
 (4)tag’s state:Active state and shielded state .
 (5) The probability of the tag’s answer is a series of discrete values.
In this paper:
1
[ , , , , , , , , , , , ]
2 4 8 16 32 64 128 256 2k
q q q q q q q q q
p q −
∈ L L
q presents a constant.
 The adjust principal :
 While the reader sends Request_under_idle command, the
probability of tag doubles;
 While the reader sends Request_under_success command, the
probability of tag doesn’t change;
 While the reader sends Request_under_failure command, the
probability of tag is cut half.
2.2Algorithm Description
 Firstly, the reader sends request command at each
interval to ask the tags to answer, and decides the next
request command according to the tags answering; at the
same time, if the reader successfully identifies a tag, it
will sent a shield command to shield the tag.
 Secondly, the tags monitor the reader’s request command
and adjust the answering probability, then answer at the
probability in the answering period.
 While the tags continuously enter into the reader’s
district, the radio frequency identifying process of this
algorithm is showed in the figure 2:
2.2Algorithm Description
TR1
n1
p1
TR2
n2
p2
TR3
n3
p3
TRm
nm
pm
TRK-2
nK-2
pK-2
TRK-1
nK-1
pK-1
t ags
Answer i ng
pr obabi l i t y
TRk
r eader
Fig.2 Anti-collision algorithm Based on bi-directional Binary Exponential Index
3 Mathematical Analysis
 From the model of the algorithm it can be seen that the
state of the tag is stochastic, and the state from this interval
to next interval will stochastically change according to
some probability, and the state of next interval only lies in
the state of this interval and the transfer probability.
Therefore the model of this algorithm is a typical model of
Markov chain.
 Additionally, the final aim of the tag is to be identified by
the reader, and once being identified it will keep silent. So,
this Markov chain is an absorbing chain.
3 Mathematical Analysis
 Converting the time into discrete intervals, for each m (m=0,1,2,…),
the state of the tag is expressed as the stochastic variable .mTR
ln mTR l=
lp
Obviously, the commonly process of the reader identifying the tags is
that there are tags in each state of , and the tags in this state
will answer at the probability .
ln
mTR
l lpmTR
l
 is the number of the tags whose tag state variable is ; is the
probability of the tags whose tag state variable is .
mTR i= 1mTR j+ = 1( | )ij m mq Q TR j TR i+= = =From to the probability marks as
that is the transfer probability.
mTR
( ) ( )i ma m Q TR i= =
mTRAssume the has k discrete values ( =1,2,…,k), and marks that
, that is the state probability.
3 Mathematical Analysis
1coll idle sucp p p= − −
The probability of the channel collision:
11
1
1 1,
( (1 ) (1 ) )l i
kk
n n
suc l l l i
l i i l
p n p p p
−−
−
= = ≠
= • • − • −∑ ∏
The probability of the channel successfully identifying
a tag:

(2)
1
1
(1 ) i
k
n
idle i
i
p p
−
=
= −∏
 The probability of idle channel:
 (1)
3 Mathematical Analysis
 in the situation that the channel successfully identified a tag,
the probability of this tag coming from the state is:
(3)
mTR l=
1
1
1,
( / ) 11
1
1 1,
(1 ) (1 )
( (1 ) (1 ) )
l i
m
l i
k
n n
l l l i
i i l
TR l succ kk
n n
l l l i
l i i l
n p p p
p
n p p p
−
−
= ≠
= −−
−
= = ≠
• • − • −
=
• • − • −
∏
∑ ∏
1 l k≤ <
( / ) ( / )( 1) (1 )
(1 0)
0 (1 0)
m ml suc TR l succ l suc TR l succ
l
l l
l
n p p n p p
l k and n
u n
l k and n
= =− • • + • • −
≤ < × × ≠
= 
 ≤ < × ×
L
LLL =
the probability that tags whose state is are still in state
( ) in the next interval is :
(4)
mTR l=
3 Mathematical Analysis
( 1 1)
( 1)
( 1 )
idle
ij i
coll
p i j and j k
q u i j and j k
p i j and j k
= + × × ≤ < −

= = × × ≤ < −
 = − × × ≤ <
LL
LL
LL
1
2
2
According to the principal of the bi-directional binary exponential
index and the adjustable rules of the tags answering probability,
we can get that:
(6)
( / )1
1 0)
0 1 0)
msuc TR l succ
l
l l
l
p p
l k and n
v n
l k and n
=• •
≤ < × × ≠
= 
 ≤ < × × =
LL
LLL
(
(
The probability that tags, whose state are , are in
state ( ) in the next interval is:
(5)
ln
mTR l=
k 1mTR k+ =
3 Mathematical Analysis
Therefore, the state transfer matrix of the algorithm is:
(8)
1
1
( 1 1)
( 1)
0 ( | 2 , [1, 1])
0 ( 1)
( 1 1)
1 ( )
idle
i
ij
k coll
u p i and j
v j k and i k
i j and i j k
q
i k and j k
u p i k and j k
i k and k
−
+ = × × =
 = × × ≤ ≤ −
 − ≥ × × ∈ −
=
= × × ≤ ≤ −
 + = − × × = −

= × × =
LL
LLLL
LLLL
LLLL
L
LLLL
1
|
1
j
11 12 13 1 1 1
21 22 23 2 2 2
31 32 3
1
1 2
, 0 0
, , ,0
0 ,
, ,
k idle coll
k idle coll
idle
idle k coll
k k kk
q q q q u p p
q q q q p u p
q q p u
Q
p u p
q q q
−
+ 
 
 
 
=  
 
  +
 
  
LL LLL
LL LLLL
OLLLM OLLLLLLM
MLLLLOLLM LLLLOLLLLLLLM
MLLLLLOLM MLLLLO
LLLL
, , , ,,v
, , ,v
, ,
=
,
1
0 0, 0 01
kv −
 
 
 
 
 
 
 
 
  LLLLLLLLL, ,,
Additionally:
(7)
3 Mathematical Analysis
1
( 1) ( ) 1,2, ,
k
i j ji
j
a m a m q i k
=
= =∑ L+ ,
Therefore, if the original state has been presented, the state of
any interval m can be calculated by the expressions ( 8 )~
( 11 ) , and the intervals that the system need to identify all the
tags can be calculated, then we can know the efficiency of the
identification.
( 1) ( )a m a m Q+ = •
Then the basic equation ( 9 ) can be expressed as:
(11)
1 2( ) ( ( ), ( ), , ( ))ka m a m a m a m= L
The state probability vector (row vector) is used as the following:
(10)
The basic state probability equation of the model is:
(9)
4.The Simulated Analysis of the Algorithmic Model
The difference of this algorithmic model to common Markov
chain model is that: of different states at different intervals will
dynamically change, it will result in that the value of transfer
matrix is different at different interval, therefore the analysis of
the efficiency can’t be deduced directly from the mathematical
way. So we used the experimental measure and the computer
simulation to analyze some typical applied example.
ln
In the following analysis of the model, it assumes that is
twelve, the result is the average value after the model run ten
thousand times.
k
4.1tags entering dynamically by the linear function
 in the rapid operative product line,the process of the tags
passing the reader can be abstracted as the linear function:

 presents the discrete interval
s n t= •
t
 Firstly, it assumes that the linear velocity of the tags entering is
0.1 、 0.15 、…、 0.95 、 1 、 2 、…、 10 in turn, the total
number of tags is 20, the original answer probability of tags is =
1/16 . Its identified probability , which is equal to the total
number of tags, comparing to the total number of consumed
intervals is showed in the figure 3:
4p
efficp
 in the begin, the velocity of tag entering is low and the is
comparatively low;
efficp
This indicated that this algorithm has a strong self-adaptability.
efficpafter that the dropped little, and finally kept at 0.321. The
reason is that the probability of tags can diffuse dynamically
according to the congested situation of current signal channel;
consequently the whole capability of reader can stay in the
saturated state.
efficpwith the velocity of tag increasing, the was improved
gradually and reached the culmination 0.3273 while n is 0.4;
It can be seen from figure 4 that: along with the number of tag
increasing, the identifying efficiency of reader didn’t decrease
and stabilized at 0.322. This also indicated that this algorithm
was very stable.
 Secondly, it assumes that the linear velocity of the tags
entering is 0.35, the total number of tags is 5 、 10 、…、 500 in
turn, the original answering probability of tags is , the identified
probability is showed in the figure 4:
4.2 tags entering abruptly by impulse function
 There will be the situation that a batch of tags enter abruptly,
that can be abstracted as impulse function:
 m is the discrete interval
( )s n mδ= •
 It assumes that the original answering probability of tags is
,the number of tags is 5 ~ 500, the successfully identifying
probability is showed in the figure 6:
4p
efficp
It can be seen From figure 6 that: while the tags enter abruptly,
the efficiency was the highest in the range of 36.2~41.3% when n
was lower than 15. Thereafter, the efficiency decreased slowly
while the number of tags increasing; but it decreased by a certain
value, the efficiency didn’t decrease with the number of tags
increasing, and finally stabilized at 0.322.
 Assuming the number of tags is 20, the original answering
probability of tags is , the changes from 0.3 to 0.95, the
successful identifying probability is showed in the figure 7:
It can be seen from figure 7 that :while the is 0.45 ~ 0.75,
the efficiency was the highest and above 0.35, when the original
answering probability of tags was in the two side value, the
efficiency was a little lower; the fluctuating range didn’t exceed
1.43%.
1p
4p 1p
efficp
5 Conclusion
From our analysis, the features of this algorithm
included:
 (1) In the ideal static state, the efficiency of this
algorithm was lower than that of tree searching
algorithm, but was higher than that of dynamic
slotted- ALOHA algorithm.
 (2) In the dynamic situation, the efficiency of this
algorithm was higher than that of dynamic slotted-
ALOHA algorithm, and extraordinarily higher than
that of tree searching algorithm.
5 Conclusion
 (3) The performance of this algorithm was very stable. While
tags entered with different original answering probability, the
efficiency of identification fluctuated little. When the number of
tags increased greatly, the efficiency of identification dropped
slowly in the beginning, but quickly attained to a stable value
and didn’t decrease again, unlike that of the ALOHA algorithm
drops sharply.
 (4) This algorithm is impartial to all the tags. The case that
while adopting the binary exponential backoff algorithm in the
IEEE802.3 protocol the tag entering latter will be identified
firstly didn’t exist. Selecting the original answering probability
properly, it is useful to form the situation that the one entering
first is identified first. This is also superior to the all-equal
service of the ALOHA algorithm.
THANKS!

More Related Content

What's hot

01 Notes Introduction Analysis of Algorithms Notes
01 Notes Introduction Analysis of Algorithms Notes01 Notes Introduction Analysis of Algorithms Notes
01 Notes Introduction Analysis of Algorithms NotesAndres Mendez-Vazquez
 
Design of ternary sequence using msaa
Design of ternary sequence using msaaDesign of ternary sequence using msaa
Design of ternary sequence using msaaEditor Jacotech
 
Pairwise testing sagar_hadawale
Pairwise  testing sagar_hadawalePairwise  testing sagar_hadawale
Pairwise testing sagar_hadawaleSagar Hadawale
 
Measuring algorithm performance
Measuring algorithm performanceMeasuring algorithm performance
Measuring algorithm performanceHabitamuAsimare
 
PPT - Adaptive Quantitative Trading : An Imitative Deep Reinforcement Learnin...
PPT - Adaptive Quantitative Trading : An Imitative Deep Reinforcement Learnin...PPT - Adaptive Quantitative Trading : An Imitative Deep Reinforcement Learnin...
PPT - Adaptive Quantitative Trading : An Imitative Deep Reinforcement Learnin...Jisang Yoon
 
design and analysis of algorithm
design and analysis of algorithmdesign and analysis of algorithm
design and analysis of algorithmMuhammad Arish
 
PPT - Enhancing the Locality and Breaking the Memory Bottleneck of Transforme...
PPT - Enhancing the Locality and Breaking the Memory Bottleneck of Transforme...PPT - Enhancing the Locality and Breaking the Memory Bottleneck of Transforme...
PPT - Enhancing the Locality and Breaking the Memory Bottleneck of Transforme...Jisang Yoon
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound techniqueishmecse13
 
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKSFEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKSieijjournal
 
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...Behzad Samadi
 

What's hot (20)

01 Notes Introduction Analysis of Algorithms Notes
01 Notes Introduction Analysis of Algorithms Notes01 Notes Introduction Analysis of Algorithms Notes
01 Notes Introduction Analysis of Algorithms Notes
 
03 notes
03 notes03 notes
03 notes
 
algorithm unit 1
algorithm unit 1algorithm unit 1
algorithm unit 1
 
algorithm Unit 5
algorithm Unit 5 algorithm Unit 5
algorithm Unit 5
 
Design of ternary sequence using msaa
Design of ternary sequence using msaaDesign of ternary sequence using msaa
Design of ternary sequence using msaa
 
Pairwise testing sagar_hadawale
Pairwise  testing sagar_hadawalePairwise  testing sagar_hadawale
Pairwise testing sagar_hadawale
 
Measuring algorithm performance
Measuring algorithm performanceMeasuring algorithm performance
Measuring algorithm performance
 
PPT - Adaptive Quantitative Trading : An Imitative Deep Reinforcement Learnin...
PPT - Adaptive Quantitative Trading : An Imitative Deep Reinforcement Learnin...PPT - Adaptive Quantitative Trading : An Imitative Deep Reinforcement Learnin...
PPT - Adaptive Quantitative Trading : An Imitative Deep Reinforcement Learnin...
 
design and analysis of algorithm
design and analysis of algorithmdesign and analysis of algorithm
design and analysis of algorithm
 
Daa unit 2
Daa unit 2Daa unit 2
Daa unit 2
 
PPT - Enhancing the Locality and Breaking the Memory Bottleneck of Transforme...
PPT - Enhancing the Locality and Breaking the Memory Bottleneck of Transforme...PPT - Enhancing the Locality and Breaking the Memory Bottleneck of Transforme...
PPT - Enhancing the Locality and Breaking the Memory Bottleneck of Transforme...
 
I1803014852
I1803014852I1803014852
I1803014852
 
algorithm Unit 2
algorithm Unit 2 algorithm Unit 2
algorithm Unit 2
 
main
mainmain
main
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound technique
 
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKSFEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
 
algorithm Unit 4
algorithm Unit 4 algorithm Unit 4
algorithm Unit 4
 
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
 
Network Security CS3-4
Network Security CS3-4 Network Security CS3-4
Network Security CS3-4
 
Daa unit 2
Daa unit 2Daa unit 2
Daa unit 2
 

Viewers also liked

5 Top Collection of Diamond Engagement Rings by Adiamor
5 Top Collection of Diamond  Engagement Rings by Adiamor5 Top Collection of Diamond  Engagement Rings by Adiamor
5 Top Collection of Diamond Engagement Rings by AdiamorEddie R Runner
 
Speciella relativitetsteorin
Speciella relativitetsteorinSpeciella relativitetsteorin
Speciella relativitetsteorinHåkan Elderstig
 
Mihai Eminescu economist
Mihai Eminescu economistMihai Eminescu economist
Mihai Eminescu economistCitesteLiber
 
Ympäristöohjelma majoitus ja tilapalvelut 2018, Green Tourism of Finland GTF®
Ympäristöohjelma majoitus ja tilapalvelut 2018, Green Tourism of Finland GTF®Ympäristöohjelma majoitus ja tilapalvelut 2018, Green Tourism of Finland GTF®
Ympäristöohjelma majoitus ja tilapalvelut 2018, Green Tourism of Finland GTF®Green Tourism of Finland GTF® Ecolabel
 
Perilaku Nonverbal by Sahid
Perilaku Nonverbal by SahidPerilaku Nonverbal by Sahid
Perilaku Nonverbal by SahidSahid Mamminasa
 
Prevención del sida en la escuela secundaria
Prevención del sida en la escuela secundariaPrevención del sida en la escuela secundaria
Prevención del sida en la escuela secundarialucmcgreb
 
Weatheringnotes
Weatheringnotes Weatheringnotes
Weatheringnotes ranjithtr
 
The best that England has to offer - Scot Carson
The best that England has to offer - Scot CarsonThe best that England has to offer - Scot Carson
The best that England has to offer - Scot CarsonBruce Henderson
 
When the faith rubber meets the road mile 3
When the faith rubber meets the road   mile 3When the faith rubber meets the road   mile 3
When the faith rubber meets the road mile 3Donald Jacobs
 
Satelliet meubelen - Zien en gezien worden - 29 en 30 oktober 2014
Satelliet meubelen - Zien en gezien worden - 29 en 30 oktober 2014Satelliet meubelen - Zien en gezien worden - 29 en 30 oktober 2014
Satelliet meubelen - Zien en gezien worden - 29 en 30 oktober 2014Kim van Velzen
 
How Can Web-Based Labor Scheduling Help Your Restaurant
How Can Web-Based Labor Scheduling Help Your RestaurantHow Can Web-Based Labor Scheduling Help Your Restaurant
How Can Web-Based Labor Scheduling Help Your Restaurantwtmwebmarketing
 

Viewers also liked (20)

5 Top Collection of Diamond Engagement Rings by Adiamor
5 Top Collection of Diamond  Engagement Rings by Adiamor5 Top Collection of Diamond  Engagement Rings by Adiamor
5 Top Collection of Diamond Engagement Rings by Adiamor
 
Formular aplicare pentru experti amare phrala
Formular aplicare pentru experti   amare phralaFormular aplicare pentru experti   amare phrala
Formular aplicare pentru experti amare phrala
 
Speciella relativitetsteorin
Speciella relativitetsteorinSpeciella relativitetsteorin
Speciella relativitetsteorin
 
Mihai Eminescu economist
Mihai Eminescu economistMihai Eminescu economist
Mihai Eminescu economist
 
Ympäristöohjelma majoitus ja tilapalvelut 2018, Green Tourism of Finland GTF®
Ympäristöohjelma majoitus ja tilapalvelut 2018, Green Tourism of Finland GTF®Ympäristöohjelma majoitus ja tilapalvelut 2018, Green Tourism of Finland GTF®
Ympäristöohjelma majoitus ja tilapalvelut 2018, Green Tourism of Finland GTF®
 
Building Your Faith
Building Your FaithBuilding Your Faith
Building Your Faith
 
DAKTARI Newsletter - October, November, December 2014
DAKTARI Newsletter - October, November, December 2014DAKTARI Newsletter - October, November, December 2014
DAKTARI Newsletter - October, November, December 2014
 
Technology table
Technology tableTechnology table
Technology table
 
Perilaku Nonverbal by Sahid
Perilaku Nonverbal by SahidPerilaku Nonverbal by Sahid
Perilaku Nonverbal by Sahid
 
Prevención del sida en la escuela secundaria
Prevención del sida en la escuela secundariaPrevención del sida en la escuela secundaria
Prevención del sida en la escuela secundaria
 
Weatheringnotes
Weatheringnotes Weatheringnotes
Weatheringnotes
 
The best that England has to offer - Scot Carson
The best that England has to offer - Scot CarsonThe best that England has to offer - Scot Carson
The best that England has to offer - Scot Carson
 
When the faith rubber meets the road mile 3
When the faith rubber meets the road   mile 3When the faith rubber meets the road   mile 3
When the faith rubber meets the road mile 3
 
Satelliet meubelen - Zien en gezien worden - 29 en 30 oktober 2014
Satelliet meubelen - Zien en gezien worden - 29 en 30 oktober 2014Satelliet meubelen - Zien en gezien worden - 29 en 30 oktober 2014
Satelliet meubelen - Zien en gezien worden - 29 en 30 oktober 2014
 
DAKTARI Newsletter - April, May, June 2014
DAKTARI Newsletter - April, May, June 2014DAKTARI Newsletter - April, May, June 2014
DAKTARI Newsletter - April, May, June 2014
 
Geet, Maan
Geet, MaanGeet, Maan
Geet, Maan
 
Daktari Newsletter May-June 2012
Daktari Newsletter May-June 2012Daktari Newsletter May-June 2012
Daktari Newsletter May-June 2012
 
Addventure
AddventureAddventure
Addventure
 
Filosofie
FilosofieFilosofie
Filosofie
 
How Can Web-Based Labor Scheduling Help Your Restaurant
How Can Web-Based Labor Scheduling Help Your RestaurantHow Can Web-Based Labor Scheduling Help Your Restaurant
How Can Web-Based Labor Scheduling Help Your Restaurant
 

Similar to Rfid presentation in internet

2012 mdsp pr06  hmm
2012 mdsp pr06  hmm2012 mdsp pr06  hmm
2012 mdsp pr06  hmmnozomuhamada
 
Computational intelligence based simulated annealing guided key generation in...
Computational intelligence based simulated annealing guided key generation in...Computational intelligence based simulated annealing guided key generation in...
Computational intelligence based simulated annealing guided key generation in...ijitjournal
 
Turbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statisticsTurbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statisticsijwmn
 
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)Ravikiran A
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesAndrea Tassi
 
Chaotic Communication for mobile applica
Chaotic Communication for mobile applicaChaotic Communication for mobile applica
Chaotic Communication for mobile applicaYaseenMo
 
Count-Distinct Problem
Count-Distinct ProblemCount-Distinct Problem
Count-Distinct ProblemKai Zhang
 
Conditional Random Fields
Conditional Random FieldsConditional Random Fields
Conditional Random Fieldslswing
 
Convolutional Error Control Coding
Convolutional Error Control CodingConvolutional Error Control Coding
Convolutional Error Control CodingMohammed Abuibaid
 
CS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsCS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsKrishnan MuthuManickam
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
 
On Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service MulticastingOn Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service MulticastingAndrea Tassi
 
Hidden Markov Models with applications to speech recognition
Hidden Markov Models with applications to speech recognitionHidden Markov Models with applications to speech recognition
Hidden Markov Models with applications to speech recognitionbutest
 

Similar to Rfid presentation in internet (20)

2012 mdsp pr06  hmm
2012 mdsp pr06  hmm2012 mdsp pr06  hmm
2012 mdsp pr06  hmm
 
adaptive equa.ppt
adaptive equa.pptadaptive equa.ppt
adaptive equa.ppt
 
Computational intelligence based simulated annealing guided key generation in...
Computational intelligence based simulated annealing guided key generation in...Computational intelligence based simulated annealing guided key generation in...
Computational intelligence based simulated annealing guided key generation in...
 
Turbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statisticsTurbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statistics
 
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)
 
Section6 stochastic
Section6 stochasticSection6 stochastic
Section6 stochastic
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast Services
 
Detecting crypto
Detecting cryptoDetecting crypto
Detecting crypto
 
lecture_01.ppt
lecture_01.pptlecture_01.ppt
lecture_01.ppt
 
Chaotic Communication for mobile applica
Chaotic Communication for mobile applicaChaotic Communication for mobile applica
Chaotic Communication for mobile applica
 
Markov chains1
Markov chains1Markov chains1
Markov chains1
 
Count-Distinct Problem
Count-Distinct ProblemCount-Distinct Problem
Count-Distinct Problem
 
Conditional Random Fields
Conditional Random FieldsConditional Random Fields
Conditional Random Fields
 
Convolutional Error Control Coding
Convolutional Error Control CodingConvolutional Error Control Coding
Convolutional Error Control Coding
 
CS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsCS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of Algorithms
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
On Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service MulticastingOn Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service Multicasting
 
con-dif2
con-dif2con-dif2
con-dif2
 
Hidden Markov Models with applications to speech recognition
Hidden Markov Models with applications to speech recognitionHidden Markov Models with applications to speech recognition
Hidden Markov Models with applications to speech recognition
 

More from Ali Azarnia

Guide to thesis preparation (ver. 2013)
Guide to thesis preparation (ver. 2013)Guide to thesis preparation (ver. 2013)
Guide to thesis preparation (ver. 2013)Ali Azarnia
 
Mabani mokhaberat
Mabani mokhaberat Mabani mokhaberat
Mabani mokhaberat Ali Azarnia
 
Advanced computer networks(1)
Advanced computer networks(1)Advanced computer networks(1)
Advanced computer networks(1)Ali Azarnia
 
Multimedia communications by fred halsal we learnfree
Multimedia communications by fred halsal we learnfreeMultimedia communications by fred halsal we learnfree
Multimedia communications by fred halsal we learnfreeAli Azarnia
 

More from Ali Azarnia (12)

Book
BookBook
Book
 
047067220 x 113
047067220 x 113047067220 x 113
047067220 x 113
 
K.chart
K.chartK.chart
K.chart
 
Guide to thesis preparation (ver. 2013)
Guide to thesis preparation (ver. 2013)Guide to thesis preparation (ver. 2013)
Guide to thesis preparation (ver. 2013)
 
Check shavad
Check shavadCheck shavad
Check shavad
 
10.1.1.150.595
10.1.1.150.59510.1.1.150.595
10.1.1.150.595
 
Mabani mokhaberat
Mabani mokhaberat Mabani mokhaberat
Mabani mokhaberat
 
Advanced computer networks(1)
Advanced computer networks(1)Advanced computer networks(1)
Advanced computer networks(1)
 
Forouzan part1
Forouzan part1Forouzan part1
Forouzan part1
 
Java farsi
Java farsi Java farsi
Java farsi
 
Jalase1
Jalase1Jalase1
Jalase1
 
Multimedia communications by fred halsal we learnfree
Multimedia communications by fred halsal we learnfreeMultimedia communications by fred halsal we learnfree
Multimedia communications by fred halsal we learnfree
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Rfid presentation in internet

  • 1. RFID Anti-collision algorithm Based on Bi-directional Binary Exponential Index YU Song-sen, ZHAN Yi-ju, WANG Yong- hua
  • 2. Contents  1.Introduction  2.Algorithm Principle  3.Mathematical Analysis  4.The Simulated Analysis of the Algorithmic Model  5.Conclusion
  • 3. 1.Introduction  Problem:tag collision Stochastic collision algorithm : ALOHA ; Slotted- ALOHA resolutions deterministic collision algorithm : tree searching algorithm  Our proposed algorithm bi-directional binary exponential index that comes from the binary exponential backoff algorithm of the computer network IEEE802.3 protocol is belongs to Stochastic collision algorithm.
  • 4. 2.Algorithm Principle 2.1 Algorithm Definitions  (1)Interval :The period from the reader sending out request order to tag answering information is called an interval. request answer trequest t answer t interval Fi gure 1 the composi ti on of i nterval  (2)Request order: Request_under_success, Request_under_failure, Request_under_idle  (3)Shield command――Shield (EPC)
  • 5. 2.1 Algorithm Definitions  (4)tag’s state:Active state and shielded state .  (5) The probability of the tag’s answer is a series of discrete values. In this paper: 1 [ , , , , , , , , , , , ] 2 4 8 16 32 64 128 256 2k q q q q q q q q q p q − ∈ L L q presents a constant.  The adjust principal :  While the reader sends Request_under_idle command, the probability of tag doubles;  While the reader sends Request_under_success command, the probability of tag doesn’t change;  While the reader sends Request_under_failure command, the probability of tag is cut half.
  • 6. 2.2Algorithm Description  Firstly, the reader sends request command at each interval to ask the tags to answer, and decides the next request command according to the tags answering; at the same time, if the reader successfully identifies a tag, it will sent a shield command to shield the tag.  Secondly, the tags monitor the reader’s request command and adjust the answering probability, then answer at the probability in the answering period.  While the tags continuously enter into the reader’s district, the radio frequency identifying process of this algorithm is showed in the figure 2:
  • 7. 2.2Algorithm Description TR1 n1 p1 TR2 n2 p2 TR3 n3 p3 TRm nm pm TRK-2 nK-2 pK-2 TRK-1 nK-1 pK-1 t ags Answer i ng pr obabi l i t y TRk r eader Fig.2 Anti-collision algorithm Based on bi-directional Binary Exponential Index
  • 8. 3 Mathematical Analysis  From the model of the algorithm it can be seen that the state of the tag is stochastic, and the state from this interval to next interval will stochastically change according to some probability, and the state of next interval only lies in the state of this interval and the transfer probability. Therefore the model of this algorithm is a typical model of Markov chain.  Additionally, the final aim of the tag is to be identified by the reader, and once being identified it will keep silent. So, this Markov chain is an absorbing chain.
  • 9. 3 Mathematical Analysis  Converting the time into discrete intervals, for each m (m=0,1,2,…), the state of the tag is expressed as the stochastic variable .mTR ln mTR l= lp Obviously, the commonly process of the reader identifying the tags is that there are tags in each state of , and the tags in this state will answer at the probability . ln mTR l lpmTR l  is the number of the tags whose tag state variable is ; is the probability of the tags whose tag state variable is . mTR i= 1mTR j+ = 1( | )ij m mq Q TR j TR i+= = =From to the probability marks as that is the transfer probability. mTR ( ) ( )i ma m Q TR i= = mTRAssume the has k discrete values ( =1,2,…,k), and marks that , that is the state probability.
  • 10. 3 Mathematical Analysis 1coll idle sucp p p= − − The probability of the channel collision: 11 1 1 1, ( (1 ) (1 ) )l i kk n n suc l l l i l i i l p n p p p −− − = = ≠ = • • − • −∑ ∏ The probability of the channel successfully identifying a tag:  (2) 1 1 (1 ) i k n idle i i p p − = = −∏  The probability of idle channel:  (1)
  • 11. 3 Mathematical Analysis  in the situation that the channel successfully identified a tag, the probability of this tag coming from the state is: (3) mTR l= 1 1 1, ( / ) 11 1 1 1, (1 ) (1 ) ( (1 ) (1 ) ) l i m l i k n n l l l i i i l TR l succ kk n n l l l i l i i l n p p p p n p p p − − = ≠ = −− − = = ≠ • • − • − = • • − • − ∏ ∑ ∏ 1 l k≤ < ( / ) ( / )( 1) (1 ) (1 0) 0 (1 0) m ml suc TR l succ l suc TR l succ l l l l n p p n p p l k and n u n l k and n = =− • • + • • − ≤ < × × ≠ =   ≤ < × × L LLL = the probability that tags whose state is are still in state ( ) in the next interval is : (4) mTR l=
  • 12. 3 Mathematical Analysis ( 1 1) ( 1) ( 1 ) idle ij i coll p i j and j k q u i j and j k p i j and j k = + × × ≤ < −  = = × × ≤ < −  = − × × ≤ < LL LL LL 1 2 2 According to the principal of the bi-directional binary exponential index and the adjustable rules of the tags answering probability, we can get that: (6) ( / )1 1 0) 0 1 0) msuc TR l succ l l l l p p l k and n v n l k and n =• • ≤ < × × ≠ =   ≤ < × × = LL LLL ( ( The probability that tags, whose state are , are in state ( ) in the next interval is: (5) ln mTR l= k 1mTR k+ =
  • 13. 3 Mathematical Analysis Therefore, the state transfer matrix of the algorithm is: (8) 1 1 ( 1 1) ( 1) 0 ( | 2 , [1, 1]) 0 ( 1) ( 1 1) 1 ( ) idle i ij k coll u p i and j v j k and i k i j and i j k q i k and j k u p i k and j k i k and k − + = × × =  = × × ≤ ≤ −  − ≥ × × ∈ − = = × × ≤ ≤ −  + = − × × = −  = × × = LL LLLL LLLL LLLL L LLLL 1 | 1 j 11 12 13 1 1 1 21 22 23 2 2 2 31 32 3 1 1 2 , 0 0 , , ,0 0 , , , k idle coll k idle coll idle idle k coll k k kk q q q q u p p q q q q p u p q q p u Q p u p q q q − +        =       +      LL LLL LL LLLL OLLLM OLLLLLLM MLLLLOLLM LLLLOLLLLLLLM MLLLLLOLM MLLLLO LLLL , , , ,,v , , ,v , , = , 1 0 0, 0 01 kv −                   LLLLLLLLL, ,, Additionally: (7)
  • 14. 3 Mathematical Analysis 1 ( 1) ( ) 1,2, , k i j ji j a m a m q i k = = =∑ L+ , Therefore, if the original state has been presented, the state of any interval m can be calculated by the expressions ( 8 )~ ( 11 ) , and the intervals that the system need to identify all the tags can be calculated, then we can know the efficiency of the identification. ( 1) ( )a m a m Q+ = • Then the basic equation ( 9 ) can be expressed as: (11) 1 2( ) ( ( ), ( ), , ( ))ka m a m a m a m= L The state probability vector (row vector) is used as the following: (10) The basic state probability equation of the model is: (9)
  • 15. 4.The Simulated Analysis of the Algorithmic Model The difference of this algorithmic model to common Markov chain model is that: of different states at different intervals will dynamically change, it will result in that the value of transfer matrix is different at different interval, therefore the analysis of the efficiency can’t be deduced directly from the mathematical way. So we used the experimental measure and the computer simulation to analyze some typical applied example. ln In the following analysis of the model, it assumes that is twelve, the result is the average value after the model run ten thousand times. k
  • 16. 4.1tags entering dynamically by the linear function  in the rapid operative product line,the process of the tags passing the reader can be abstracted as the linear function:   presents the discrete interval s n t= • t  Firstly, it assumes that the linear velocity of the tags entering is 0.1 、 0.15 、…、 0.95 、 1 、 2 、…、 10 in turn, the total number of tags is 20, the original answer probability of tags is = 1/16 . Its identified probability , which is equal to the total number of tags, comparing to the total number of consumed intervals is showed in the figure 3: 4p efficp
  • 17.  in the begin, the velocity of tag entering is low and the is comparatively low; efficp This indicated that this algorithm has a strong self-adaptability. efficpafter that the dropped little, and finally kept at 0.321. The reason is that the probability of tags can diffuse dynamically according to the congested situation of current signal channel; consequently the whole capability of reader can stay in the saturated state. efficpwith the velocity of tag increasing, the was improved gradually and reached the culmination 0.3273 while n is 0.4;
  • 18. It can be seen from figure 4 that: along with the number of tag increasing, the identifying efficiency of reader didn’t decrease and stabilized at 0.322. This also indicated that this algorithm was very stable.  Secondly, it assumes that the linear velocity of the tags entering is 0.35, the total number of tags is 5 、 10 、…、 500 in turn, the original answering probability of tags is , the identified probability is showed in the figure 4:
  • 19. 4.2 tags entering abruptly by impulse function  There will be the situation that a batch of tags enter abruptly, that can be abstracted as impulse function:  m is the discrete interval ( )s n mδ= •  It assumes that the original answering probability of tags is ,the number of tags is 5 ~ 500, the successfully identifying probability is showed in the figure 6: 4p efficp
  • 20. It can be seen From figure 6 that: while the tags enter abruptly, the efficiency was the highest in the range of 36.2~41.3% when n was lower than 15. Thereafter, the efficiency decreased slowly while the number of tags increasing; but it decreased by a certain value, the efficiency didn’t decrease with the number of tags increasing, and finally stabilized at 0.322.
  • 21.  Assuming the number of tags is 20, the original answering probability of tags is , the changes from 0.3 to 0.95, the successful identifying probability is showed in the figure 7: It can be seen from figure 7 that :while the is 0.45 ~ 0.75, the efficiency was the highest and above 0.35, when the original answering probability of tags was in the two side value, the efficiency was a little lower; the fluctuating range didn’t exceed 1.43%. 1p 4p 1p efficp
  • 22. 5 Conclusion From our analysis, the features of this algorithm included:  (1) In the ideal static state, the efficiency of this algorithm was lower than that of tree searching algorithm, but was higher than that of dynamic slotted- ALOHA algorithm.  (2) In the dynamic situation, the efficiency of this algorithm was higher than that of dynamic slotted- ALOHA algorithm, and extraordinarily higher than that of tree searching algorithm.
  • 23. 5 Conclusion  (3) The performance of this algorithm was very stable. While tags entered with different original answering probability, the efficiency of identification fluctuated little. When the number of tags increased greatly, the efficiency of identification dropped slowly in the beginning, but quickly attained to a stable value and didn’t decrease again, unlike that of the ALOHA algorithm drops sharply.  (4) This algorithm is impartial to all the tags. The case that while adopting the binary exponential backoff algorithm in the IEEE802.3 protocol the tag entering latter will be identified firstly didn’t exist. Selecting the original answering probability properly, it is useful to form the situation that the one entering first is identified first. This is also superior to the all-equal service of the ALOHA algorithm.