196
Tag Anti-Collision Resolution for Improved Quality of RFID Data Streams Prapassara Pupunwiwat BIT (Hons) School of Information and Communication Technology Science, Environment, Engineering and Technology Griffith University A Thesis submitted in fulfillment of the requirements of the degree of Doctor of Philosophy September 2011

Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

Embed Size (px)

Citation preview

Page 1: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

Tag Anti-Collision Resolution for Improved

Quality of RFID Data Streams

Prapassara Pupunwiwat

BIT (Hons)

School of Information and Communication Technology

Science, Environment, Engineering and Technology

Griffith University

A Thesis submitted in fulfillment

of the requirements of the degree of

Doctor of Philosophy

September 2011

Page 2: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems
Page 3: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

Abstract

Radio Frequency Identification (RFID) is a technology that allows automatic identification

of people or objects by incorporating the use of radio frequency waves to transmit data

between networked electromagnetic readers and tags. RFID is considered an emerging

technology for advancing a wide range of applications, such as supply chain management

and distribution. However, despite the extensive development of the RFID technology in

many areas, the RFID tags collision problems remain a serious issue. Collision problems

occur due to the simultaneous presence of multiple numbers of tags within the reader zone.

To solve collision problems, different anti-collision methods have been mentioned in

literature. These methods are either insufficient or too complex, with a high overhead cost

of implementation. In this work, in order to improve the quality of RFID data collection,

we propose novel deterministic and probabilistic anti-collision approaches.

The main contributions of this study are summarised as follows:

• We propose two novel deterministic anti-collision algorithms using combinations of

Q-ary trees (Pupunwiwat and Stantic, 2009a,b, 2010c), with the intended goal to

minimise memory usage queried by the RFID reader. By reducing the size of queries,

the RFID reader can preserve memories, and the identification time can be improved.

• We propose a novel frame-size estimation technique (Pupunwiwat and Stantic,

2010a,b) to minimise the number of slots and frames queried by the RFID reader

and to maximise the system efficiency. In addition, we introduce the probabilistic

group-based anti-collision method (Pupunwiwat and Stantic, 2010d) to improve

the overall performance of the tag recognition process.

• We evaluate our proposed anti-collision techniques and perform a comparative anal-

ysis, in order to find the benefits and disadvantages of each method. Additionally, in

order to identify the best selection of anti-collision method, we propose two strate-

gies for selective anti-collision technique management, i.e. a Novel Decision Tree

Strategy and a Six Thinking Hats Strategy (Pupunwiwat et al., 2011). By correctly

identifying the most suitable anti-collision method for specific scenarios, the quality

of data collection can be improved.

Page 4: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems
Page 5: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

Statement of Originality

This work has not previously been submitted for a degree or diploma in any university. To

the best of my knowledge and belief, the thesis contains no material previously published

or written by another person except where due reference is made in the thesis itself.

Signed:

Prapassara Pupunwiwat

September 19, 2011

Page 6: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems
Page 7: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

Acknowledgements

First and foremost, I would like to thank my supervisor Dr Bela Stantic, for his extraor-

dinary support and encouragement. During the past four years, I learned a lot from Dr

Stantic about good research works and what it takes to accomplish them. He directed me

though this journey and I would not be where I am now without his guidance.

I would also like to thank Professor Abdul Sattar, for his valuable comments on my

research. My thank also to the School of Information and Communication Technology for

providing such a good research environment and allowing me to gain academic skills in

casual tutoring.

I would like to specifically thank Mrs Rohana Wendt for her precious feedback on the

writing aspect of my thesis. Also, I would like to thank all my colleagues and university

friends for their mental support, especially Mr Peter Darcy who helped me through difficult

times.

My thank also to my childhood friends and my brother, who never fail to cheer me

up when I least expected them. Also, my special gratitude to Mr Herman Wendt, who

consoled me and being there for me when I feel distressed, and for understanding my need

to devote most of my time to my thesis.

Finally, my special appreciation and thanks to my mum and dad, who have been a

tower of strength throughout my studies, and for their support and understanding. I

would never become who I am now without their dedication and love.

Page 8: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems
Page 9: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

List of Publications

List of Book Chapter

P. Pupunwiwat and B. Stantic, (2012). Managing Tag Collision in RFID Data

Streams using Smart Tag Anti-Collision Techniques. Chipless and Chipped Radio

Frequency Identification: Systems for Ubiquitous Tagging, IGI Global, (in press).

P. Darcy, P. Pupunwiwat and B. Stantic, (2012). The Fusion of Pre/Post RFID

Correction Techniques to Reduce Anomalies. Intelligent Sensor Networks: Across

Sensing, Signal Processing, and Machine Learning, CRC Press, (in press).

P. Darcy, P. Pupunwiwat, and B. Stantic, (2011). The Challenges and Issues

facing the Deployment of RFID Technology. Deploying RFID Challenges, Solutions, and

Open Issues (InTech2011), Rijeka, Croatia, InTech, Pages 1-26.

List of Journal

P. Pupunwiwat, P. Darcy, and B. Stantic, (2011). Conceptual Selective RFID

Anti-Collision Technique Management. Procedia Computer Science, volume 5, Ontario,

Canada, ELSEVIER, Pages 827-834.

P. Pupunwiwat and B. Stantic, (2007). Location Filtering and Duplication

Elimination for RFID Data Streams. The International Journal of Principles and

Applications in Information Science and Technology (PAIST), volume 1, Auckland,

Albany, New Zealand, PAIST Press, Pages 29-43.

Page 10: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

List of Conferences

P. Pupunwiwat and B. Stantic, (2010). Joined Q-ary Tree Anti-Collision for

Massive Tag Movement Distribution. Thirty-Third Australasian Computer Science

Conference (ACSC 2010), Brisbane, Australia, Pages 99-108.

P. Pupunwiwat and B. Stantic, (2010). Dynamic Framed-Slot ALOHA

Anti-Collision using Precise Tag Estimation Scheme. Twenty-First Australasian

Database Conference (ADC 2010), Brisbane, Australia, Pages 19-28.

P. Pupunwiwat and B. Stantic, (2010). A RFID Explicit Tag Estimation Scheme

for Dynamic Framed-Slot ALOHA Anti-Collision. Sixth Wireless Communications,

Networking and Mobile Computing (WiCOM 2010), Chengdu, China, Pages 1-4.

P. Pupunwiwat and B. Stantic, (2010). Resolving RFID Data Stream Collisions

using Set-Based Approach, Sixth International Conference on Intelligent Sensors, Sensor

Networks and Information Processing (ISSNIP 2010), Brisbane, Australia, Pages 61-66.

P. Pupunwiwat and B. Stantic, (2009). Unified Q-ary Tree for RFID Tag

Anti-Collision Resolution. Twentieth Australasian Database Conference (ADC 2009),

Wellington, New Zealand, Pages 47-56.

P. Pupunwiwat and B. Stantic, (2009). Performance Analysis of Enhanced Q-ary

Tree Anti-Collision Protocols. First Malaysian Joint Conference on Artificial

Intelligence (MJCAI 2009), Kuala Lumpur, Malaysia, Pages 229-238.

Page 11: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

Contents

1 Introduction 1

2 RFID Background 5

2.1 History of RFID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

2.2 RFID Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2.2.1 Elements of Radio Frequency Communication . . . . . . . . . . . . . 7

2.2.2 Radio Spectrum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2.2.3 Interference and Multipath of RF waves . . . . . . . . . . . . . . . . 7

2.3 RFID Technology Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2.3.1 RFID System Mechanism . . . . . . . . . . . . . . . . . . . . . . . . 10

2.3.2 Characteristic of RFID data . . . . . . . . . . . . . . . . . . . . . . . 11

2.3.3 Main RFID Commercial Applications . . . . . . . . . . . . . . . . . 11

2.3.4 RFID Technology in Supply Chain . . . . . . . . . . . . . . . . . . . 12

2.4 RFID Core Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

2.4.1 RFID Antenna . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

2.4.2 RFID Reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

2.4.3 RFID Tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

2.5 RFID Data Management Issues . . . . . . . . . . . . . . . . . . . . . . . . . 22

2.5.1 Data Capturing Process . . . . . . . . . . . . . . . . . . . . . . . . . 23

2.5.2 Data Processing and Event Management . . . . . . . . . . . . . . . . 23

2.5.3 Data Warehousing and Data Mining . . . . . . . . . . . . . . . . . . 23

2.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Page 12: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3 RFID Data Streams Management Techniques 25

3.1 Filtering of RFID Data Streams . . . . . . . . . . . . . . . . . . . . . . . . . 25

3.1.1 Unreliable Reads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

3.1.2 Noises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

3.1.3 Duplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

3.1.4 Missed Reads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

3.2 Collision Handling in RFID Data Streams . . . . . . . . . . . . . . . . . . . 31

3.2.1 RFID Collision Types . . . . . . . . . . . . . . . . . . . . . . . . . . 32

3.2.2 Division Classification for Multi-Access . . . . . . . . . . . . . . . . 33

3.2.3 Taxonomy of RFID Tag Anti-Collision Protocols . . . . . . . . . . . 34

3.3 Deterministic Anti-Collision Protocols . . . . . . . . . . . . . . . . . . . . . 35

3.3.1 Binary Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

3.3.2 Bit Arbitration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

3.3.3 Tree Splitting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

3.3.4 Query Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

3.4 Probabilistic Anti-Collision Protocols . . . . . . . . . . . . . . . . . . . . . . 42

3.4.1 BFSA Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

3.4.2 DFSA Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

3.4.3 EDFSA Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

3.4.4 Other ALOHA-Based Methods . . . . . . . . . . . . . . . . . . . . . 45

3.4.5 Backlog Estimation Techniques . . . . . . . . . . . . . . . . . . . . . 46

3.5 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

3.5.1 Limitations of Existing Methods . . . . . . . . . . . . . . . . . . . . 48

3.5.2 Research Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

3.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

4 Deterministic Anti-Collision Approaches 53

4.1 EPC Encoding Schemes Analysis . . . . . . . . . . . . . . . . . . . . . . . . 53

4.1.1 General Identifier 96 Bits . . . . . . . . . . . . . . . . . . . . . . . . 54

4.1.2 Serialised Global Trade Item Number 96 Bits . . . . . . . . . . . . . 54

4.1.3 Global Individual Asset Identifier 96 Bits . . . . . . . . . . . . . . . 55

4.2 Warehouse Distribution Scenarios . . . . . . . . . . . . . . . . . . . . . . . . 56

Page 13: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.2.1 Unique Item-Level Scenario . . . . . . . . . . . . . . . . . . . . . . . 56

4.2.2 Unique Container-Level Scenario . . . . . . . . . . . . . . . . . . . . 57

4.2.3 Unique Company-Level Scenario . . . . . . . . . . . . . . . . . . . . 57

4.2.4 Unique Warehouse-Level Scenario . . . . . . . . . . . . . . . . . . . 58

4.3 Splitting Fitness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

4.3.1 Worst-Case Splitting . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

4.3.2 Perfect Splitting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

4.3.3 Random Splitting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

4.4 Unified Q-ary Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

4.4.1 Unified Q-ary Tree Fundamental . . . . . . . . . . . . . . . . . . . . 60

4.4.2 Computation of Naive approach and Unified approach . . . . . . . . 61

4.4.3 Experimental Evaluation . . . . . . . . . . . . . . . . . . . . . . . . 64

4.4.4 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

4.5 Joined Q-ary Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

4.5.1 EPC Bits Prediction and Classification . . . . . . . . . . . . . . . . . 73

4.5.2 Unique Bits Computation . . . . . . . . . . . . . . . . . . . . . . . . 75

4.5.3 Tags Splitting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

4.5.4 Experimental Evaluation . . . . . . . . . . . . . . . . . . . . . . . . 77

4.5.5 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

4.6 Overall Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

4.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

5 Probabilistic Anti-Collision Approaches 89

5.1 Mathematic Fundamental for ALOHA-based Tag Estimation . . . . . . . . 89

5.2 Precise Tag Estimation Scheme . . . . . . . . . . . . . . . . . . . . . . . . . 90

5.2.1 Slot Observation and Initial Q Value . . . . . . . . . . . . . . . . . . 91

5.2.2 Suggested Threshold for Frame-Size . . . . . . . . . . . . . . . . . . 91

5.2.3 PTES approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

5.2.4 Sample Tag Estimation and Allocation . . . . . . . . . . . . . . . . . 96

5.2.5 Experimental Evaluation . . . . . . . . . . . . . . . . . . . . . . . . 101

5.2.6 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

5.3 Probabilistic Cluster-Based Technique . . . . . . . . . . . . . . . . . . . . . 109

Page 14: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3.1 Probabilistic Anti-Collision Algorithm using PTES . . . . . . . . . . 109

5.3.2 PCT Preliminary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

5.3.3 Sample Boundary Computation . . . . . . . . . . . . . . . . . . . . . 114

5.3.4 PCT Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

5.3.5 Experimental Evaluation . . . . . . . . . . . . . . . . . . . . . . . . 124

5.3.6 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

5.4 Overall Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

5.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

6 Conceptual Selective Technique Management 131

6.1 Chain Reaction from Data Collection Process . . . . . . . . . . . . . . . . . 131

6.2 Comparative Analysis of Deterministic and Probabilistic Techniques . . . . 132

6.2.1 Data sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

6.2.2 Comparative Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 134

6.3 Strategies for Choosing Suitable Anti-Collision Techniques . . . . . . . . . . 136

6.3.1 Novel Decision Tree for Anti-Collision Methods Selection . . . . . . 137

6.3.2 Extended Solution for Complex Anti-Collision Methods Selection . . 141

6.3.3 Six Thinking Hats for Complex Anti-Collision Methods Selection . . 144

6.4 Applicability of Anti-Collision Techniques in Real World Scenario . . . . . . 149

6.4.1 Wine Warehouse Tag-and-Ship Scenario . . . . . . . . . . . . . . . . 149

6.4.2 Document Warehouse Scenario . . . . . . . . . . . . . . . . . . . . . 152

6.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

7 Conclusions 155

7.1 Summary of Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

7.2 Future Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

Bibliography 160

Page 15: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

List of Figures

2.1 RFID Operational Frequencies . . . . . . . . . . . . . . . . . . . . . . . . . 8

2.2 An example of: a) Refraction, b) Reflection, and c) Scattering . . . . . . . . 9

2.3 An example of how RFID tag, reader, middleware and application operate 10

2.4 An example of RFID-enabled Supply Chain System . . . . . . . . . . . . . 12

2.5 An example of: a) Simple antenna pattern, and b) Antenna pattern con-

taining protrusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

2.6 Proper tag orientation for a linearly polarised antenna . . . . . . . . . . . . 15

2.7 Proper tag orientation for a circularly polarised antenna . . . . . . . . . . 16

2.8 Various types of anti-collision methods . . . . . . . . . . . . . . . . . . . . 18

2.9 An example of: a) Passive Tag, b) Semi-passive/Semi-active Tag, and c)

Active Tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

3.1 An example of three readers deployment, where R1 and R2 covered S1, and

R2 and R3 covered S2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

3.2 Collision Problems in RFID System: a) Reader-Reader Collision, b) Reader-

Tag Collision, and c) Tag-Tag Collision . . . . . . . . . . . . . . . . . . . . 32

3.3 Taxonomy of RFID Readers anti-collision protocols . . . . . . . . . . . . . 33

3.4 Taxonomy of RFID Tags anti-collision protocols . . . . . . . . . . . . . . . 35

3.5 Binary Tree Memory based anti-collision protocol . . . . . . . . . . . . . . 38

3.6 Query Tree Memoryless based anti-collision protocol . . . . . . . . . . . . . 39

3.7 The starting point of tag identification in tree-based protocols . . . . . . . 40

3.8 Tree-based protocols: a) Query tree protocol, b) 4-ary tree protocol . . . . 41

3.9 A sample procedure of Frame-slotted ALOHA . . . . . . . . . . . . . . . . 42

3.10 Empty Slot, Successful Slot, and Collision Slot in EPC Class 1 Generation

2 Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Page 16: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.1 Crystal Warehouse Scenario: a) Unique Item-Level, b) Unique Container-

Level, c) Unique Company-Level, and d) Unique Warehouse-level . . . . . 56

4.2 Splitting Fitness: a) Worst-Case Splitting, b) Perfect Splitting, and c) Ran-

dom Splitting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

4.3 A sample of 16 tags from the same pallet with the same Object Class and

16 unique Serial Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

4.4 A sample of: a) Naive 4-ary Tree, and b) Unified 4-ary & 8-ary Tree . . . . 61

4.5 Identification processes of: a) Naive 2-ary Tree, b) Naive 4-ary Tree, c)

Unified 2-ary & 4-ary Tree, and d) Unified 4-ary & 2-ary Tree, . . . . . . . 62

4.6 Level-Packaging: a) a case with 6 glasses, and b) a pallet with 27 cases . . . 65

4.7 Performances of Naive Q-ary Trees on different set of tags . . . . . . . . . 66

4.8 Performances of sixteen combination of Q-ary Trees (4 Naive and 12 Uni-

fied) where F = 36 and S = 60 . . . . . . . . . . . . . . . . . . . . . . . . . 68

4.9 Results of two Naive approaches (2-ary, 4-ary) and two Unified approaches

(2-ary & 4-ary, 4-ary & 2-ary) for number of Idle cycles, Collision cycles,

Successful cycles, and Overall cycles . . . . . . . . . . . . . . . . . . . . . . 69

4.10 Results of two Naive approaches (2-ary, 4-ary) and two Unified approaches

(2-ary & 4-ary, 4-ary & 2-ary) for Number of bits queried for Idle cycles,

Collision cycles, Successful cycles, and Overall cycles . . . . . . . . . . . . . 70

4.11 Performance Analysis of 2-ary Tree vs. 4-ary Tree on Unique bits of EPC,

Bit 61 - 68, until all tags are identified. Results of Overall cycles are displayed 71

4.12 A sample of: a) a Naive 4-ary Tree, b) a Naive 2-ary Tree, and c) a Joined

Q-ary Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

4.13 Joined Q-ary Tree structure for GID-96 bits EPC . . . . . . . . . . . . . . 74

4.14 Joined Q-ary Tree structure for GID-96 bits EPC with 36 Identical bits

Header and GMN, 20 Identical bits OC, 4 Unique bits OC, 30 Identical bits

SN, and 6 Unique bits SN . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

4.15 Performances comparison (GID-96) between Naive approaches and Joined

Q-ary approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

4.16 Percentage of improvement (GID-96) of Joined Q-ary Tree compared with

Naive 2-ary Tree and Naive 4-ary Tree . . . . . . . . . . . . . . . . . . . . . 82

4.17 Accumulative Bits Length (GID-96) of three approaches: a) Naive 2-ary

Tree, b) Naive 4-ary Tree, and c) Joined Q-ary Tree on different tag sets . . 83

4.18 Performances comparison between Naive approaches and Joined Q-ary ap-

proach using different Encoding Scheme: a) GID-96 bits, b) SGTIN-96 bits,

and c) GIAI 96 bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Page 17: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.19 Percentage of improvement of Joined Q-ary Tree compared with Naive 2-

ary Tree and Naive 4-ary Tree, using different Encoding Scheme: a) GID-96

bits, b) SGTIN-96 bits, and c) GIAI 96 bits . . . . . . . . . . . . . . . . . . 87

5.1 Variable V1 and V2 for Collision slot and Empty slot calculation for

PTES[CE] method. There are ninety-nine possible combinations of V1 and

V2, in order to find optimal parameters for c and e prediction . . . . . . . . 94

5.2 A sample first round of tag allocation with Initial Q of 4. Collision slot c

= 7, Empty slot e = 4, and Successful slot s = 5 . . . . . . . . . . . . . . . 97

5.3 A sample of Q-adjust in each round of identification until all tags are identified 98

5.4 A sample second round of tag allocation with Initial Q of 4, V1 = 2.0, and

V2 = 0.5. Collision slot c = 2, Empty slot e = 5, and Successful slot s = 9 . 100

5.5 A sample third round of tag allocation with Initial Q of 3, V1 = 2.0, and

V2 = 0.5. Collision slot c = 1, Empty slot e = 3, and Successful slot s = 4 . 101

5.6 A sample fourth (final) round of tag allocation with Initial Q of 2, V1 =

2.0, and V2 = 0.5. Collision slot c = 0, Empty slot e = 2, and Successful

slot s = 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

5.7 Performance efficiency of PTES[C], Sch, and LB methods, using different

Initial Q: a) PTES[C] 200 tags and b) PTES[C] 300 tags . . . . . . . . . . . 103

5.8 Performance efficiency of PTES[CE], PTES[CCE], Sch, and LB methods,

using different Initial Q: a) PTES[CE] 200 tags, b) PTES[CE] 300 tags, c)

PTES[CCE] 200 tags and d) PTES[CCE] 300 tags . . . . . . . . . . . . . . 104

5.9 Performance efficiency (a) and Number of frames (b) of PTES[C] (V1 =

2.3 to 2.5) versus Sch methods, using Initial Q of 8 on different tag sets . . 106

5.10 Results of PTES[CE] and PTES[CCE] (V1 = 2.3, V2 = 0.1) versus Sch

methods using Initial Q of 8 on different tag sets: Performance efficiency

(a: PTES[CE], c: PTES[CCE]) and Number of frames (b: PTES[CE], d:

PTES[CCE]) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

5.11 Performance efficiency of different frame-size on different number of tags . 111

5.12 The minimum and maximum boundaries and their correlated percentage

of efficiency for frame-size of 256 . . . . . . . . . . . . . . . . . . . . . . . . 113

5.13 Number of slots comparison (a) and Performance efficiency (b) for DFSA,

EDFSA, PCT128, PCT256, and PCT-E methods on different number of tags126

5.14 Percentage of improvement of PCT compared with DFSA and EDFSA

methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

Page 18: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.1 Comparative analysis of deterministic versus probabilistic anti-collision

methods: a) Number of slots comparison and b) Performance efficiency . . 135

6.2 Novel Decision Tree for Anti-Collision Methods Selection . . . . . . . . . . 137

6.3 Novel Decision Tree for Local Pen Maker Company (SME) Anti-Collision

Methods Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

6.4 Novel Decision Tree for Local Notebook Manufacturer (SME)

Anti-Collision Methods Selection . . . . . . . . . . . . . . . . . . . . . . . . 139

6.5 Novel Decision Tree for International Stationery Enterprise Anti-Collision

Methods Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

6.6 Novel Decision Tree for International A-Grade Filing and Storage Group

Anti-Collision Methods Selection . . . . . . . . . . . . . . . . . . . . . . . . 141

6.7 Six Thinking Hats Framework . . . . . . . . . . . . . . . . . . . . . . . . . 143

6.8 Six Thinking Hats: Global Trading Enterprise (GTE) Scenario . . . . . . . 146

6.9 Wine Warehouse Tag-and-Ship Scenario . . . . . . . . . . . . . . . . . . . . 150

6.10 Document Warehouse Scenario . . . . . . . . . . . . . . . . . . . . . . . . . 153

Page 19: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

List of Tables

2.1 The Uniform Resource Identifier (URI) encoding complements the EPC Tag

Encodings defined for use within RFID tags and other low-level architec-

tural components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

3.1 A sample of noise where * indicates a noise reading. Since the noise thresh-

old equals to 3 and the tag catch is only for GID encoding, any tag that

appears less than three times within a specific time frame or does not satisfy

tag catch requirement, is classified as noise . . . . . . . . . . . . . . . . . . 27

3.2 A sample of data duplication, where TagE is captured twice and TagF is

captured three times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

3.3 A sample of Missed reads where at time 500msec, 800msec and 1000msec,

readings of TagA are missing . . . . . . . . . . . . . . . . . . . . . . . . . . 30

3.4 Identification process of Query Tree versus Hybrid Query Tree . . . . . . . 41

3.5 EDFSA Rule - The number of unread tags, optimal frame-size, and number

of group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

4.1 The GID-96 includes three fields in addition to the Header, with a total of

96-bits binary value. Only ‘H’ is shown in Binary, while the rest are shown

in Decimal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

4.2 The SGTIN-96 includes six fields with a total of 96-bits binary value. Only

‘H’ is shown in Binary, while the rest are shown in Decimal . . . . . . . . . 54

4.3 SGTIN-96 and GIAI-96 Partitions in bits . . . . . . . . . . . . . . . . . . . 55

4.4 The GIAI-96 includes five fields with a total of 96-bits binary value. Only

‘H’ is shown in Binary, while the rest are shown in Decimal . . . . . . . . . 55

4.5 The Unified Q-ary Tree can be merged into twelve different combinations.

1, 2, 3, and 4 represent the Number of bits queries each time for splitting

tags when collision occurred . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Page 20: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.6 Calculation of Total memory bits required for two Naive and two Unified Q-

ary Trees. TNBL shows the Total Number of Bits required for the specific

Q-ary Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

4.7 Sample Outcomes for 5 tags identification using Naive and Unified approaches 63

4.8 This Table shows Total Memory Bits required for each Q-ary Tree for 192

tags set identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

4.9 Performance Analysis of 2-ary Tree vs. 4-ary Tree on Unique bits of EPC,

Bit 61 - 68, until all tags are identified . . . . . . . . . . . . . . . . . . . . . 72

4.10 Formal structure of bits classification of EPC GID-96 bits. *UOC is number

of Unique bits within Object Class and **USN is number of Unique bits

within Serial Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

4.11 Sample bits classification of EPC GID-96 bits, where Object Class = 12

and Serial Number = 60 (Total of 720 tags) . . . . . . . . . . . . . . . . . . 75

4.12 Sample 36 bits tags with 24 Identical bits and 8 Unique bits . . . . . . . . . 76

4.13 Identification process of 2-ary Tree and 4-ary Tree on Identical bits and

Unique bits of EPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

4.14 Calculation of Total Bits Length required for two Naive Q-ary Trees and a

Joined Q-ary Tree. TNBL shows the Bits Length required for the specific

Naive/Joined Q-ary Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

4.15 Performance Analysis of Naive 2-ary Tree, Naive 4-ary Tree, and Joined

Q-ary Tree on set of 10 sample tags . . . . . . . . . . . . . . . . . . . . . . 77

4.16 Chosen EPC Pattern for Experiment One . . . . . . . . . . . . . . . . . . . 78

4.17 Identical and Unique Bits classification of EPC GID-96 bits for Experiment

one - Test case A, B, and C. I = Identical bits, U = Unique bits . . . . . . 79

4.18 Actual Separating Point for Experiment one - Test case A, B, and C. At a

specific SP, Joined Q-ary Tree will adjust its branch to either 2-ary or 4-ary

Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

4.19 Chosen EPC Pattern for Experiment Two . . . . . . . . . . . . . . . . . . . 80

4.20 Percentage improvement of the proposed Joined Q-ary Tree versus existing

Naive 2-ary (N2) and Naive 4-ary (N4) approaches . . . . . . . . . . . . . . 81

4.21 Accumulative Bits Length of three approaches: Naive 2-ary Tree, Naive

4-ary Tree, and Joined Q-ary Tree . . . . . . . . . . . . . . . . . . . . . . . 82

4.22 Number of bits length of three approaches using different Encoding Scheme:

a) GID-96 bits, b) SGTIN-96 bits, and c) GIAI 96 bits . . . . . . . . . . . . 84

Page 21: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.23 Percentage of improvement of Joined Q-ary Tree versus two Naive ap-

proaches using different Encoding Scheme: a) GID-96 bits, b) SGTIN-96

bits, and c) GIAI 96 bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

5.1 Suggested frame-size boundary (B) and minimum and maximum number

of tags (NT) for specific estimated number of tags . . . . . . . . . . . . . . 91

5.2 PTES methods comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

5.3 Sample tag estimation and frame-size (Q) adjustment after the first round

of identification, using PTES[C] method . . . . . . . . . . . . . . . . . . . . 97

5.4 Sample tag estimation and frame-size (Q) adjustment after the second

round of identification, using PTES[C] method . . . . . . . . . . . . . . . . 98

5.5 Sample tag estimation and frame-size (Q) adjustment after the third round

of identification, using PTES[C] method . . . . . . . . . . . . . . . . . . . . 99

5.6 Sample tag estimation and frame-size (Q) adjustment after the fourth round

of identification, using PTES[C] method . . . . . . . . . . . . . . . . . . . . 99

5.7 Sample tag estimation and frame-size (Q) adjustment after the fifth round

of identification, using PTES[C] method . . . . . . . . . . . . . . . . . . . . 99

5.8 Chosen Parameters for Experiment One . . . . . . . . . . . . . . . . . . . . 102

5.9 Chosen Parameters for Experiment Two . . . . . . . . . . . . . . . . . . . . 102

5.10 Performance efficiency of PTES[C], Sch, and LB methods, using Initial of

8 on different sets of tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

5.11 Performance efficiency of PTES[CE], PTES[CCE], Sch, and LB methods,

using Initial of 8 on different sets of tags . . . . . . . . . . . . . . . . . . . . 107

5.12 Available Information and Missing fields on System Efficiency. MinB =

Minimum point of occurrence, MaxB = Maximum point of occurrence . . . 112

5.13 Derived Equations for Missing fields on System Efficiency. MinB = Mini-

mum point of occurrence, MaxB = Maximum point of occurrence . . . . . . 114

5.14 The conversion of PCT rules to β Beta, κ Kappa, and µ Mu . . . . . . . . . 114

5.15 PCT256 Boundary Computation - number of group (Frame-Size 256 and

128), and minimum and maximum boundaries . . . . . . . . . . . . . . . . . 119

5.16 PCT256 Rule - The number of unread tags, optimal frame-size (A and B),

and number of group (A and B) . . . . . . . . . . . . . . . . . . . . . . . . . 120

5.17 PCT128 Boundary Computation - number of group (Frame-Size 128 and

64), and minimum and maximum boundaries . . . . . . . . . . . . . . . . . 121

5.18 PCT128 Rule - The number of unread tags, optimal frame-size (A and B),

and number of group (A and B) . . . . . . . . . . . . . . . . . . . . . . . . . 121

Page 22: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.19 PCT-E Boundary Computation - number of group (Frame-Size 256, 128

and 64), and minimum and maximum boundaries . . . . . . . . . . . . . . . 123

5.20 PCT-E Rule - The number of unread tags, optimal frame-size (A, B, C),

and number of group (A, B, C) . . . . . . . . . . . . . . . . . . . . . . . . . 123

5.21 Chosen Parameters for Experiment Three . . . . . . . . . . . . . . . . . . . 125

5.22 Number of slots comparison and Performance efficiency for DFSA, EDFSA,

PCT128, PCT256, and PCT-E methods on different number of tags . . . . 125

5.23 Percentage improvement of the proposed PCT128, PCT256, and PCT-E

versus existing EDFSA (ED) and DFSA (D) techniques . . . . . . . . . . . 127

6.1 Chosen EPC Pattern of Tree-based anti-collision methods for Comparative

Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

6.2 Chosen Parameters of ALOHA-based anti-collision methods for Compara-

tive Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

6.3 Number of slots and performance analysis for Joined Q-ary Tree (100 tags),

Joined Q-ary Tree (50 tags), PCT256 no group, and PCT256 on different

number of tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136

6.4 Preferred Anti-Collision Method for Each Location (Zone 1 - 4) in GTE

scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

6.5 Selected Anti-Collision Method using Decision Tree and Six Thinking Hats

Strategies. Joined Q-ary Tree = JQT; PCT Group = PCT-G; PCT no

Group = PCT-NG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

Page 23: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

Abbreviations and Symbols

List of Abbreviations

AABS Adaptive Binary SplittingAQS Adaptive Query Splitting

BBA Bit ArbitrationBBT Bit-by-Bit Binary TreeBFSA Basic Framed-Slotted ALOHABS Binary SplittingBTS Binary Tree Splitting

CCDMA Code Division Multiple AccessCEP Complex Event ProcessingCP Company Prefix

DDBSA Dynamic Binary Search AlgorithmDFSA Dynamic Framed-Slotted ALOHADoD DoD IdentifierDSPI Device Service Provider Interface

EEAS Electronic Article SurveillanceEBBT Extended Bit-by-Bit Binary TreeEDFSA Enhanced Dynamic Framed-Slotted ALOHAEM ElectromagneticEPC Electronic Product CodeESP Extensible Sensor Stream Processing

FFDMA Frequency Division Multiple AccessFV Filter Value

Page 24: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

GGIAI Global Individual Asset IdentifierGID General Identifier NumberGMN General Manager NumberGRAI Global Returnable Asset IdentifierGTE Global Trading Enterprise

HH HeaderHF High FrequencyHQT Hybrid Query Tree

IIAR Individual Asset ReferenceID-BTS ID Binary Tree StackImpQT Improved QTIntQT Intelligent Query TreeIR Item ReferenceIRE Institute of Radio EngineeringISO International Organisation of StandardsIT Information Technology

JJQT Joined Query Tree

LLB Lower Bound methodLBT Listen Before TalkLF Low Frequency

MMBBT Modified Bit-by-Bit Binary TreeMF Microwave Frequency

NNBL Number of Bits per LevelNBQ Number of Bits per QueryNCN Number of Child Node

OOC Object Class

PPCT Probabilistic Cluster-Based TechniquePOS Point of SalePT PartitionPTES Precise Tag Estimation Scheme

Page 25: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

QQT Query TreeQTR QT-based Reservation

RRF Radio FrequencyRFID Radio Frequency IdentificationRRE Redundant Reader EliminationRTLS Real-Time Location Systems

SSch Schoute methodSDMA Space Division Multiple AccessSGLN Serialised Global Location NumberSGTIN Serialised Global Trade Item NumberSME Small and Medium EnterpriseSN Serial NumberSP Separating PointSSCC Serialised Shipping Container Code

TTDMA Time Division Multiple AccessTNBL Total Bits Length/Total Number of BitsTS Tree Splitting

UUHF Ultra High FrequencyUOC Unique bits within Object ClassURI Uniform Resource IdentifierUSN Unique bits within Serial Number

List of Symbols

d e Ceiling (Round Up)β Betaκ Kappamax Maximummin MinimumQ Frame-Sizeµ MuV Variable

Page 26: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems
Page 27: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

1Introduction

Radio Frequency Identification (RFID) technology uses radio frequency waves to auto-

matically identify people or objects. The main RFID systems consist of fast capturing

radio frequency tags and networked electromagnetic readers. RFID technology is cur-

rently emerging as an important technology for advancing a wide range of applications.

It has the potential to improve the efficiency of business processes by providing automatic

identification and data capture. The technology that forms the basis for RFID was first

developed during World War II where it was used to distinguish between friendly and

enemy aircrafts, or also known as Friend-or-Foe (Landt, 2001). The current interest in

RFID technology has grown rapidly and can now be certified by CompTIA RFID+ certi-

fication in order to validate the knowledge and skills of professionals who work with RFID

technology (CompTIA-RFID+, 2008). In the modern world, RFID technology is used in

different applications such as distribution and retail packaging, security, library system,

defence and military, health care, and baggage and passenger tracing at the airport.

RFID system mainly comprises the following components:

• Tag, which has a microchip attached to an antenna that transmits and responds to

radio signals of a particular frequency;

• Reader, which sends and receives RFID data to and from tags via antennas;

• Middleware, which preprocesses the RFID data and converts it into a meaningful

data; and

• Application software, which is a specific component that resides on host computer.

1

Page 28: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 1. INTRODUCTION

RFID reader retrieves information from tags and sends that information back to host

computer via middleware. RFID data streams, which is captured by readers, can be

accumulated very fast and does not carry much information because it is raw. These data

are inaccurate and need to be filtered in order to improve its database management.

In the past, RFID systems used proprietary technologies where no worldwide open

standards existed (Brown et al., 2007). There was only small inter-connectivity between

different RFID vendors’ products. Every vendor had their own readers, tags, antennas, and

equipment but none of the equipment could work together. This lack of inter-connectivity

made it challenging for companies to deploy RFID technology in a large global supply

chain. However, since 2006, many international and industrial organisations have created

open standards, which allow the problem to quickly disappear.

There are several methods of identification but the most common is to store a serial

number that uniquely identifies a person or object such as Electronic Product Code (EPC).

All EPC numbers contain strings of binary numbers, which provide a unique identity for

every physical object. All data captured by RFID readers before any further process are

known as dirty data. In order to improve efficiency of database, dirty data must be filtered

at the earlier stage soon after they were captured. The filtering of RFID data streams is

known as filtering at the edge, where data are still meaningless and easier to eliminate.

The main issue that usually arises in RFID data streams is the data stream errors.

There are four typical errors, which include unreliable reads, noises, missed reads, and

duplications/redundancies.

Unreliable reads occur when a deployment of RFID tags and readers has an environ-

mental interference such as metal or water nearby (Fishkin et al., 2004). It also occurs

due to the orientation or rotation of tags and readers, distance between tags and read-

ers, number of tags and readers in the interrogation zone, and number of objects moving

simultaneously. Noises occur when additional unexpected readings are generated. This

can be caused by RFID tags outside the normal reading scope accidentally captured by

the reader (Bai et al., 2006). Duplications or Redundancies can happen at two different

levels: Redundancy at reader level and Redundancy at data level (Derakhshan et al.,

2007). Redundancy at reader level occurs when there is more than one reader deployed to

cover a specific location, whilst Redundancy at data level occurs when data streams are

simultaneously captured more than once by a reader.

Several techniques for filtering RFID data have been proposed in literatures. However,

these techniques only filter specific kind of errors generated. Therefore, the amount of

wrong data is still recorded into the database. The most common errors are missed reads,

which usually happen in a situation of low-cost and low power hardware that lead to

a frequently dropped reads (Derakhshan et al., 2007). Another cause of missed reads is

simultaneous transmissions in RFID systems, which lead to collisions as the readers and

tags typically operate on the same channel. Tag collisions in RFID systems happen when

2

Page 29: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

multiple tags simultaneously reflect their respective signals back to the reader at the same

time, preventing the reader from identifying all tags. Filling in dropped reads is one way

to alter missed reads but it is sufficient to prevent missing data from the beginning. RFID

collision problem can be solved by using anti-collision techniques, to prevent two or more

tags from responding to a reader at the same time, and to re-identify them again when

collisions occurred.

The current deterministic anti-collision methods suffer from identification delay and

high memories usage during the identification process, while the probabilistic anti-collision

methods suffer from tag starvation problems due to inaccurate frame-size estimation and

low performance efficiency. In this research, a “Unified Q-ary tree” and a “Joined Q-ary

tree” anti-collision schemes are proposed, based on deterministic Q-ary Tree. The mo-

tivation of this work is the improvement of data quality obtained, and the minimal use

of memories required per complete identification. Methodologies for Unified and Joined

Q-ary Tree are first derived and experimental evaluations are then conducted, in order to

prove the efficiency of the proposed techniques. The results and analysis of the experi-

ments have indicated that both Unified and Joined Q-ary Tree can effectively reduce total

memories required, compared with current state-of-the-art techniques, which then results

in the minimal identification delay.

Additionally, we propose a new “Precise Tag Estimation Scheme” (PTES) for Backlog

estimation and frame-size prediction compatible with any probabilistic anti-collision tech-

nique. The motivation of this work is to achieve a more accurate estimation of number of

tags within an interrogation zone, which leads to a more accurate frame-size prediction

and system efficiency. The methodology for PTES is first derived, and experiments are

then conducted in order to prove the efficiency of the proposed technique. We also intro-

duce a group-selection approach called a “Probabilistic Cluster-Based Technique” (PCT)

method, to improve identification time and minimise number of frames and slots used

during an identification process. The experiment results have indicated that PTES, using

various parameters, has an impact on probabilistic anti-collision system efficiency. There-

fore, to achieve the best performance and solve the tag starvation problem, tags should be

grouped into specific size according to PCT threshold and the parameters for frame-size

prediction should be dynamically adjusted over the identification process.

We also assess our two proposed anti-collision techniques and carry out the compar-

ative analysis in order to find the benefits and disadvantages of each method. We then

propose two strategies for selective anti-collision technique management, in order to ob-

tain the optimal outcome of anti-collision method selection. From the investigation, we

have discovered that different anti-collision method has advantage over the other in some

cases. We found that, by correctly identifying the most suitable anti-collision technique

using our proposed “Novel Decision Tree Strategy” and “Six Thinking Hats Strategy”,

the data collection process can be improved; and the chain reaction toward the next level

of data transformation, aggregation, and event processing can be decreased. Thus, it is

3

Page 30: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 1. INTRODUCTION

important that the correct type of anti-collision algorithm is applicable to different sce-

narios. In addition, we also demonstrated the applicability of our proposed techniques

toward real world scenarios.

The remainder of this thesis is organised as follows:

In Chapter 2, some background information is provided on RFID including a brief

history of RFID, the fundamentals and technology overview, system components, and

RFID data management issues. The focus is particularly on the use and issues of RFID

technology in supply chain because there has been a great deal of interest in the topic

mainly over the past few years. The main components of RFID system including tags,

readers, and antennas are also described in depth.

In Chapter 3, four typical errors and their causes in RFID data streams are identified.

A literature on some current methods and their drawback are also discussed. These include

errors handling techniques for unreliable reads, noises, missed reads, and duplications.

Particularly, we focus on discussion of specific anti-collision methods for missed reads

caused by collisions. The shortcomings of existing methods are identified, and research

question is also proposed in this chapter.

In Chapter 4, major problems are investigated on existing deterministic anti-collision

schemes. Two proposed novel tree-based anti-collision methods, the Unified Q-ary Tree

and the Joined Q-ary Tree, are described and analysed. From experimental evaluation,

these approaches overcome the limitation of previously proposed approaches, and also

significantly preserve memories and improved the identification time. We have also iden-

tified and confirmed certain properties of importance for the deterministic anti-collision

methods in general.

In Chapter 5, main issues are addressed on existing probabilistic anti-collision schemes.

We discussed our proposed frame-size estimation method, PTES, and identified strategies

to overcome limitations of inaccurate Backlog estimation technique. Furthermore, we

described and analysed the PCT approach, to improve identification time and minimise

number of frames and slots used during an identification process. Certain properties of

importance for the probabilistic anti-collision methods in general, are also clarified in this

chapter.

In Chapter 6, comparative analysis is conducted between the deterministic Joined Q-

ary Tree and the probabilistic PCT. We discovered that both methods have advantages and

disadvantages over one another, depending on each specific case. We then introduced two

strategies, the Novel Decision Tree and the Six Thinking Hats, in order to find the optimal

method for specific scenarios. Additionally, we form a new concept and applicability of

each type of anti-collision approach, which we then apply to a sample real-world scenario.

Finally in Chapter 7, we conclude the thesis with a summary of the main findings of

our study and a discussion of future research plan.

4

Page 31: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

2RFID Background

In this chapter, we present an overview of some background information including the

history of Radio Frequency Identification, the fundamentals and technology overview,

system components, and RFID data management issues.

2.1 History of RFID

Although many people believe that RFID is a new technology, it has an extensive history.

A more precise description of RFID is as an emerging technology, and its emergence is

best recognised by evaluating the history of RFID.

RFID systems are complex technologies that can be utilised in many ways. Some

RFID technologies have existed for a long time and have become more pervasive in the

supply chain. Other RFID technologies have been utilised in other industries such as

animal tracking, and they have unique advantages (Jones and Chung, 2008). Although

the history of RFID can be traced to the 1930s, the technology underlying RFID finds its

roots back in 1897, when Guglielmo Marconi invented the radio (Bhuptani and Moradpour,

2005).

In order to better define the development of RFID technology, the time-line summaries

are shown below (Hunt et al., 2007).

Pre 1940s: Beginning in 1896, Marconi, Alexanderson, Baird, Watson, and many

others, had tried to apply Electromagnetic Energy laws in radio communications and

radar. The work undertaken during this period had become the core of RFID technology.

5

Page 32: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 2. RFID BACKGROUND

1940s: After World War II, scientists and engineers continued the research in radio

frequency communications and radar. In October 1948, Harry Stockman published a paper

in the Proceedings of the Institute of Radio Engineering (IRE) called “Communications

by Means of Reflected Power”.

1950s: During the 1950s, many of the technologies related to RFID were explored by

researchers. For example, Harris Patent published a paper called “Radio Transmission

Systems with Modulatable Passive Responders”. The United States military also began

to implement an early form of aircraft, using RFID technology called “Friend-or-Foe”.

1960s: Some commercial activities began in the late 1960s, such as Sensormatic and

Checkpoint, which developed Electronic Article Surveillance (EAS) equipment for an-

titheft and security applications. EAS later became the first widespread commercial use

of RFID.

1970s: Government laboratories, academic institutions and companies, became in-

creasingly involved in RFID. In 1975, a paper titled “Short-Range Radio-telemetry for

Electronic Identification Using Modulated Backscatter”, written by Alfred Koelle, Steven

Depp, and Robert Freyman was released by Los Alamos Scientific Laboratory. By 1978,

a passive microwave tag had been accomplished and in 1979, these tags were used for

Animal Tagging.

1980s: The first widespread commercial use of the RFID systems began in the 1980s.

The systems were simple, such as livestock management, keyless entry, and personnel

access systems. In 1987, the world’s first Motor Vehicle Toll Collection was implemented

in Norway; and also in Dallas in 1989. However, all of the RFID systems implemented

in the 1980s were proprietary systems, which kept costs high and slowed down industry

growth.

1990s: By 1994, RFID toll systems could operate at highway speeds, which mean that

drivers could pass through toll points without the need to slow down. During this time,

several standards organisations also worked on publishing guidelines, including the Inter-

national Organisation of Standards (ISO). In 1999, the Auto-ID Center at Massachusetts

Institute of Technology (MIT) was also established for standard organisation purposes.

2000s: By early 2000, 5-cents tags had become a possible picture, and RFID tech-

nology could someday replace barcode systems. In 2003, both the world’s largest retailer

(Wal-Mart) and the world’s largest supply chain (the DoD) issued RFID mandates requir-

ing suppliers to begin employing RFID technology by 2005. Furthermore, the Auto-ID

Center was merged into EPCGlobal in 2006, and all standards were converted to one that

serves to increase competition among players in the industry, lower the costs of RFID, and

quicken the deployment of RFID technology.

2010s: Many industries continuously adopt and integrate RFID technology toward

their organisations. Challenges and opportunities that have arisen in RFID system have

been constantly tackled and improved.

6

Page 33: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

2.2. RFID FUNDAMENTALS

2.2 RFID Fundamentals

Radio frequency uses the electromagnetic (EM) waves with different frequencies for com-

munication. Radio frequencies involve a small portion of a larger EM spectrum, where

the radio signals are affected in many ways. The total EM spectrum includes other higher

frequency waves such as light, ultraviolet, X-ray, gamma-ray, and cosmic-ray. This section

explains further elements of RF communication, the radio spectrum, and the interference

and Multipath of RF waves.

2.2.1 Elements of Radio Frequency Communication

Radio frequency (RF) communication uses the electromagnetic waves with frequencies

from a specific part of the EM frequency spectrum (Sanghera et al., 2007). Therefore, the

underlying physics behind RF communication is the same as for any communication that

uses electromagnetic waves to carry information.

The followings are the four major elements that make this communication happen:

• Data signal: This is the wave that actually contains the information that needs to

be sent to the receiver.

• Carrier signal: This is the wave that carries the data signal.

• Modulation: This is the process that encodes the data signal into the carrier signal

and creates the radio wave that is actually transmitted by the antenna.

• Antenna: This is a device used to transmit and receive signals.

2.2.2 Radio Spectrum

Within the radio spectrum is an enormous range of frequencies. To categorise and man-

age the different areas of the spectrum, the radio spectrum is split into many different

segments, but RFID technology uses only four of these segments, as shown in Figure 2.1.

Figure 2.1 shows multiple frequencies in relation to the entire radio spectrum. Only

frequencies between 125-134kHz, 13.56MHz, 860-960MHz, and 2.45GHz & 5.8GHz from

Low Frequency (LF), High Frequency (HF), Ultra High Frequency (UHF) and Microwave

Frequency (MF) are used respectively.

2.2.3 Interference and Multipath of RF waves

Radio signals are affected in many ways by objects in their path and by the media through

which they travel (Brown et al., 2007). Interference is the interaction of two or more

radio waves resulting in a new wave pattern. When waves generated due to propagation

7

Page 34: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 2. RFID BACKGROUND

Figure 2.1: RFID Operational Frequencies

effects take a different path than the original wave, it is called Multipath. As radio waves

travel, they interact with objects and the media they encounter. This interaction causes

absorption, diffraction, refraction, reflection, scattering, and free space loss of the wave

(Brown et al., 2007; Sanghera et al., 2007).

Absorption When an RF wave hits a material object, some of its energy will be ab-

sorbed by that object, depending on the frequency of the wave and the material of the

object. Water and objects containing water such as liquid products and metal objects, are

likely to absorb the RF waves. UHF waves, due to their shorter wavelengths, are more at

risk to absorption than LF and HF waves.

Diffraction Diffraction refers to the bending of an EM wave when it comes into contact

with the sharp edges or when it passes through narrow gaps.

Refraction Refraction is the change in direction of a wavefront when it hits the interface

of two different media but it does not return to the medium. Instead, it passes from one

medium into another. Figure 2.2a) illustrates refraction.

Reflection Reflection is the change in direction of a wavefront when it hits the interface

of two different media; and returns into the medium which it hits. When a radio signal is

8

Page 35: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

2.3. RFID TECHNOLOGY OVERVIEW

Figure 2.2: An example of: a) Refraction, b) Reflection, and c) Scattering

reflected, some loss of signal normally happened, either through absorption or as a result

of signal passing into the medium. Figure 2.2b) illustrates reflection.

Scattering Scattering occurs when the medium, which the wave travels through, have

smaller dimensions compared to the wavelength. When RF wave is scattered due to rough

surfaces of small objects, it results in the loss of the signal or dispersion of the wave, as

shown in Figure 2.2c).

Free Space Loss If the space through which the RF wave travels is free of all obstructing

material, there will be no absorption, refraction, reflection, diffraction or scattering effects.

However, there will still be some loss in signal strength called free space loss.

2.3 RFID Technology Overview

RFID technology is an automated wireless technology that incorporates the use of the

electromagnetic spectrum to uniquely identify people or objects. There are several meth-

ods of identification but the most common is to store a serial number that identifies a

person or object such as Electronic Product Code (EPC). RFID may only consist of a tag

and a reader but a complete RFID system involves many other technologies, for example,

computer, network, Internet, and software such as middleware and user applications. The

term data streams in this thesis refer to the raw data, which is being communicated and

exchanged between RFID readers and tags. The raw data has no meaningful informa-

tion and needs to be further processed, extracted, integrated or transformed, before being

stored into the database. RFID data streams also have common characteristics, which is

fundamental for RFID data management.

This section explains further on RFID system mechanism, the characteristic of RFID

data, the main commercial applications in RFID, and the RFID technology in supply

chain.

9

Page 36: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 2. RFID BACKGROUND

2.3.1 RFID System Mechanism

A typical RFID system is divided into two layers: the physical layer or device layer and

Information Technology (IT) layer or application layer (Brown et al., 2007; Bornhovd

et al., 2005).

The physical layer consists of:

• one or more reader antennas;

• one or more readers (Interrogator);

• one or more tags (Transponder); and

• a deployment environment.

The IT layer consists of:

• one or more host computers connected to readers (directly or through a network);

and

• appropriate software such as device drivers, filters, middleware, databases, and user

applications.

Nevertheless in some cases, the middleware is classified as its own separate layer, and

involved data integration and aggregation.

Figure 2.3: An example of how RFID tag, reader, middleware and application operate

Figure 2.3 shows how RFID reader retrieves information from tag and sends that

information back to host computer via middleware. Middleware first needs to convert raw

data retrieved by the reader to a meaningful data, before sending them to an application

layer.

10

Page 37: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

2.3. RFID TECHNOLOGY OVERVIEW

2.3.2 Characteristic of RFID data

RFID data share common characteristics, which is fundamental for RFID data manage-

ment. These characteristics are as follows:

Streaming and raw data RFID does not carry much information as it is raw. In order

to transform this raw data into a meaningful data, several level of inference must be done.

Large in volume nature RFID data are generated automatically and accumulated

very fast. Some of this data must be filtered and will require a scalable storage scheme to

ensure efficient queries and updates.

Temporal and dynamic RFID applications dynamically generate observations and the

data carry state changes (Wang and Liu, 2005; Wang et al., 2006, 2010; Liu et al., 2006).

Thus, it is crucial to model such information in an expressive data that is suitable for

application level including tracking and monitoring data.

Implicit and inaccuracy of data When the observation occurs in an RFID system,

a reader observed EPC, EPC value, and the timestamp. These data carry implicit in-

formation, such as changes of states and locations. It is also inaccurate since the real

world deployment is often in 60-70 percent range, which means that 30 percent of data are

discarded (Derakhshan et al., 2007; Jeffery et al., 2005, 2006a,b). Thus, raw observations

data need to be transformed into business logic data. At this stage, erroneous readings

should be handled, such as unreliable reads, duplicate reads, missed reads, and noises.

2.3.3 Main RFID Commercial Applications

There are many applications in modern days that integrate the use of RFID technology

in order to improve their business process. Some of the major benefits that the RFID

system provides are security and authentication, safety, convenience, and process efficiency

(Bhuptani and Moradpour, 2005).

The following describes application areas, which are currently used in RFID technology

(Polniak, 2007; Finkenzeller, 2003; Ahson and Ilyas, 2008; Chawathe et al., 2004; Collins,

2006; Harrop, 2005; Swedberg, 2005; Ferguson, 2006; Chiesa et al., 2002):

• Transportation and Distribution: Fixed Asset, Tracking Aircraft, Vehicles, Rail

Cars, Containers Equipment, Real-Time Location Systems, and Healthcare Manage-

ment.

• Retail and Consumer Packaging: Supply Chain Management, Carton Tracking,

Crate/Pallet Tracking, Item Tracking, and Smart shelves.

11

Page 38: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 2. RFID BACKGROUND

• Security and Access Control: Child Tracking, Animal Tracking, Airport and Bus

Baggage, Anti-Counterfeiting, Computer Access, Employee Identification, Forgery

Prevention, Branded Replication, Parking Lot, Access Room, Laboratory and Facil-

ity Access, Toll collection, Library System.

• Monitoring and Sensing: Pressure, Temperature, Volume, Weight Special, Facil-

ity Access, Facility Security Access, and Location within Facility Monitoring.

• Point of Sale (POS): Automated Payments, Customer Recognition, Smart Card,

and RFID Security.

Figure 2.4: An example of RFID-enabled Supply Chain System

2.3.4 RFID Technology in Supply Chain

Over the past few years, there has been a great deal of interest in RFID technology,

mainly within the retail industry. Most of the leading supplier claim to provide some level

of RFID systems (Derakhshan et al., 2007). Indeed, RFID will help companies leverage

real-time information about their stock level and help them improve their replenishment

process (Myerson, 2007). For example, the following are some of the benefits from using

RFID technology in supply chain management and retailers:

Inventory shrinking Retailers’ replenishment decisions are based on the inventory

stock level stored in the supply chain, which is assumed to be accurate. However, the

count in the inventory system sometimes does not reflect the correct amount of items in

the actual inventory, due to shrinkage or loss of stock. Moreover, handling this type of

problem is a very costly operation that requires a regular manual stock take (Lee et al.,

2005a). With RFID technology, the cost of a regular stock take can be decreased by

maintaining the most accurate amount of stock stored in the data warehouse.

12

Page 39: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

2.4. RFID CORE COMPONENTS

Inventory replenishment Inventory management is a critical task for retail businesses.

Most of the time, items on the store’s shelves are out of stock while there is a lot of stock

available in the business storage. This is because there is no automatic process for detecting

items out of stock and restocking the shelf once it becomes empty. However, with RFID

technology, shelf inventory can be tracked automatically (Lee et al., 2005a).

Visibility of inventory across the supply chain The RFID technology provides a

visibility of inventory throughout the entire supply chain. Figure 2.4 shows an example

of an RFID-enabled supply chain system. Each product is tagged so that items that

move around a business can be monitored from the supplier’s warehouse to the store’s

shelves until the item is checked out at the register. These items tend to move and stay

together through different locations especially in an earlier stage of distribution, as seen in

Figure 2.4 (Gonzalez et al., 2006b,c,a, 2007). Nevertheless, the advantage of bulky items’

movement is that all items from the same company, pallet, and case, will have the same

pattern of encoding (more explanation in Section 2.4.3.3) and will be easier to monitor

and manage as data streams.

2.4 RFID Core Components

RFID involves detecting and identifying a tagged object through the data it transmits.

This requires a tag (transponder), a reader (interrogator) and antennae (coupling devices)

located at each end of the system. The reader is usually connected to a host computer

or other device which will further process the data captured. One key element of RFID

operation is data transfer. This occurs with the connection between a tag and a reader, also

known as coupling, through the antenna on either end (Bhuptani and Moradpour, 2005;

Karmakar, 2010). In this section, we describe the three common hardware components

present in all RFID systems, antenna, reader, and tag.

2.4.1 RFID Antenna

An antenna is a conductive structure that radiates an EM wave when an electrical current

is applied to it; and its electronic component is designed to transmit or receive radio

waves. It converts electrical energy into a radiating field that extends infinitely outward

(Brown et al., 2007; Sweeney, 2005; Karmakar et al., 2008). All RFID systems include

two different types of antennas: the reader antenna and the tag antenna. The antenna

performance characteristic is one of the most critical elements of any RFID installation

because the antenna transfers power and data from the reader to the passive RFID tags

(more explanation in Section 2.4.3.1) and receives the tags’ reply.

13

Page 40: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 2. RFID BACKGROUND

2.4.1.1 Antenna Footprint (pattern)

The footprints of the reader’s antennas determine the interrogation zone (reader zone)

of a reader. In general, an antenna footprint, also called an antenna pattern, is a three-

dimensional region shaped to look like a balloon projecting out from the front of the

antenna. In the real world, the balloon is distorted by interference patterns of radio waves

reflected from surrounding objects. Within the reader zone, the antenna’s energy is most

effective and a reader can read a tag placed inside this region with the least difficulty.

Figure 2.5a) shows an example of a simple antenna pattern.

Figure 2.5: An example of: a) Simple antenna pattern, and b) Antenna pattern containingprotrusions

In reality, because of the antenna’s characteristics, the footprint of an antenna is never

uniformly shaped like a balloon but almost always contains protrusions. Each protrusion

is surrounded by dead zones, and such dead zones are also called nulls (Lahiri, 2005). A

tag placed in one of the protruded regions will read but not when the tag shifts into the

dead zone. Because of the irregular shape of the antenna footprint, an RFID tag may be

readable or not readable based on tiny changes in location or orientation. Therefore, it is

important to place the tag within the main interrogation zone without depending on the

protruded zone. Some of the read range has to be sacrificed but better read rate will be

provided as a result. Figure 2.5b) shows an example of an antenna with protrusions.

2.4.1.2 Polarisation

The readability of the tag greatly depends on the polarisation of the antenna and the angle

the tag makes with the reader. For a maximum transfer of power, the reader and the tag

antennas should have the same polarisation. For example, if the transmitting antenna

is horizontally polarised and the receiving antenna is vertically polarised (or vice versa),

not much power can be transferred. If the receiving antenna is circularly polarised, it will

receive some radiation regardless of the polarisation of the transmitting antenna. This is

because a circular polarisation has both components of the linear polarisation; horizontal

and vertical.

14

Page 41: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

2.4. RFID CORE COMPONENTS

Linearly polarised antennas Linear polarisation is relative to the surface of the earth

where horizontally polarised waves travel parallel to the ground; and vertically polarised

waves travel perpendicular to the ground (Lahiri, 2005). A linearly polarised antenna has

a narrower radiation beam with a longer read range compared to a circularly polarised

antenna. A narrower radiation beam helps a linearly polarised antenna to read tags within

a longer, narrow but well-defined read region, instead of reading tags randomly from its

surroundings. A linearly polarised antenna is sensitive to tag orientation with respect to

its polarisation’s direction. These types of antenna are therefore useful in applications

where the tag orientation is fixed and predictable. Figure 2.6 shows how a tag should be

oriented with respect to a linear antenna for its proper reading.

Figure 2.6: Proper tag orientation for a linearly polarised antenna

Circularly polarised antennas A circularly polarised wave basically spins as it trav-

els. If the wave rotates in right-hand/left-hand manner, the antenna is considered to be

right-hand/left-hand circularly polarised (Brown et al., 2007; Lahiri, 2005). A circularly

polarised antenna has a wider radiation beam and hence reads tags in a wider area com-

pared to a linearly polarised antenna. A circularly polarised antenna is largely unaffected

by tag orientation. In a mixed environment where orientation cannot be controlled, cir-

cular antennas work best. A circularly polarised antenna is preferred for an RFID system

that uses high UHF or microwave frequencies in an operating environment, where there

is a high degree of RF reflectance (due to presence of metals and/or waters). Figure

2.7 shows how a tag should be oriented with respect to a circular antenna for its proper

reading.

2.4.2 RFID Reader

The reader, also referred to as the interrogator, is a device that captures and processes tag

data. Although some readers can also write data onto a tag, the device is still referred to

15

Page 42: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 2. RFID BACKGROUND

Figure 2.7: Proper tag orientation for a circularly polarised antenna

as a reader or interrogator (Bhuptani and Moradpour, 2005; Finkenzeller, 2003; Karmakar,

2010). The reader is also responsible for interfacing with a host computer.

2.4.2.1 Reader Types

Readers come in multiple formats, which can be separated into three main categories

(Sanghera et al., 2007):

Fixed readers Fixed readers are fixed-position interrogators mounted at specific loca-

tions through which the tagged items are expected to pass, such as conveyors, dock doors,

and retail store checkout points. The advantage of a fixed-mount reader is that the tags

are read automatically, and the disadvantage is the possibly harsh environment that comes

with the location where the reader is mounted.

Handheld readers Handheld readers are mobile interrogators. Therefore, they contain

all the basic elements in one device, including antenna and application software. The

information collected from the tags is stored in the reader and later transferred to a data

processing system, if the application requires it. The advantage of handheld reader is that

a user can bring the reader close to the tagged item and collect the information. The

disadvantage is that the read range is less than that of a fixed reader. Handheld readers

can be used for applications such as tracking and scanning items in medical, office, and

retail environments because they can be easily moved around.

Vehicle-mount readers Vehicle-mount readers are mobile mount interrogators that

can be mounted on a vehicle such as a forklifts, paper trucks, cargo trucks, and pallet

jacks. The advantage of vehicle-mount reader is that its read range is larger than that of

a handheld reader, and can cover more area than fixed-mount reader. The disadvantage is

16

Page 43: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

2.4. RFID CORE COMPONENTS

that it might have to work in the vicinity of metallic materials. This could pose a challenge

because metals can reflect the RF signal. In addition, a vehicle-mount reader usually has

a special shape for easier installation on a vehicle, and a rugged design to survive the

vibrations and other environmental conditions.

2.4.2.2 Dense Reader Mode

Dense reader mode or dense interrogator mode allows for operation of multiple readers

located within close proximity of each other, without causing reader interference. Dense

reader mode allows for coordination of readers so that no two readers are transmitting

at the exact same moment using exactly the same frequency, which causes interference

(Brown et al., 2007). To do this, many readers perform frequency hopping and support a

function known as Listen Before Talk (LBT).

LBT is often used with frequency hopping, a technology that forces a reader to change

channels constantly within each frequency. LBT is where readers use an antenna to listen

for the frequency on which the reader is about to transmit. If another reader is communi-

cating in that channel, the reader will automatically switch to the next available channel

and transmit there instead. Another way to avoid failed communication between reader

and tag is by using anti-collision protocol, especially when passive tags are used in UHF

frequency.

2.4.2.3 Authentication and Data Encryption/Decryption

High-security systems also require the reader to authenticate system users. For instance,

Point of Sale (POS) systems, in which money is exchanged and transferred, would be prone

to fraud if precaution were not taken. There are two types of RFID authentications; mutual

symmetrical and derived keys (Hunt et al., 2007). In both of these systems, an RFID tag

provides a key code to the reader, in order to determine if the key is correct and if the tag

is authorised to access the system.

Data Encryption/Decryption is another security measure that must be taken to prevent

external attacks to the system. In the POS example, if user’s key is stolen by a criminal,

that information can be used to make fraudulent purchases. The reader must implements

data encryption and decryption, in order to protect the integrity of data transmitted

wirelessly, and to prevent interception by a third party.

2.4.2.4 Anti-Collision

Most reader operates within UHF band and must have some sort of tag anti-collision

algorithms. This is because in UHF band, tags can be captured faster by reader, which

may cause collision, and no tag would be identified. The various types of tag anti-collision

17

Page 44: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 2. RFID BACKGROUND

methods can be reduced to two basic types, deterministic and probabilistic, as shown in

Figure 2.8. Tag anti-collision is needed to prevent two or more tags to response to a

reader at the same time (Bhatt and Glover, 2006). These anti-collision techniques will be

explained in detailed in Chapter 3.

Figure 2.8: Various types of anti-collision methods

2.4.3 RFID Tag

RFID tags come in many different designs, shapes, and sizes. A tag is designed for

a particular application depending on the object or material to which the tag is to be

attached. The frequency of operation, functionality, and read range of a tag also varies

(Bhuptani and Moradpour, 2005; Bhatt and Glover, 2006; Sweeney, 2005).

2.4.3.1 Tag Types

Tags may be classified under different categories, depending on how the tags obtain power,

the frequency at which they operate, and the various functionalities implemented on the

tags. RFID tags are mainly categorised into Chipped and Chipless tags. This thesis

focuses on Chipped RFID tags because Chipless tags do not contain a chip or electronic

circuit, and thus store information purely in the electromagnetic materials which comprise

the tag (Preradovic et al., 2009; Balbin and Karmakar, 2009). Since the absence of an

electronic circuit makes it more difficult to store information in a compact area, chipless

RFID tags are generally limited to a data capacity of less than 32 bits, although in some

cases more bits are possible.

Chipped RFID Tag types are separated into three categories known as Passive Tag,

Semi-Passive Tag, and Active Tag.

Passive tag Passive tag (Figure 2.9a) does not have its own power source, and it has

no battery on-board (Lahiri, 2005). The tag obtains power from radio waves received

from the reader. Passive Tags are small and light weight, and their functionalities are

18

Page 45: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

2.4. RFID CORE COMPONENTS

Figure 2.9: An example of: a) Passive Tag, b) Semi-passive/Semi-active Tag, and c) ActiveTag

limited due to power source. Due to a lack of enough power, it cannot support an active

transmitter to communicate with the reader. In addition, passive tags do not contribute

to radio noise due to lack of transmitter; and they also have longer life of around 20 years

compared to semi-passive and active tag. The read range of passive tags is around few

inches to 20 feet. In RFID applications, passive RFID tags are often used. Moreover,

passive tags are well suited in applications for which tags are not reusable, because of

their low cost. The tags become part of the object to which they are attached and have

the same life cycle as the object itself.

Semi-passive tag Semi-passive tag (Figure 2.9b) is also called semi-active tag (Brown

et al., 2007). This tag has an on-board battery but similar to a passive tag, it does not

have an active transmitter. It modulates the reflection of the waves from the reader and

requires a reader to send data. Semi-passive tags have a longer read range of more than

100 feet compared to passive tags. Since no transmitter is present, semi-passive tags does

not contribute to radio noise but they can have more memory compared to passive tag, and

can store more data. The extra functionalities of an on-tag battery creates a few problem

such as extra weight, larger size, higher cost, shorter life, and temperature sensitivity. An

integrated battery means the tag dies when the battery dies. The battery life lasts around

2 to 7 years.

Active tag Active tag (Figure 2.9c) has an on-board power source, usually a battery

and an active transmitter (Sanghera et al., 2007). It does not need emitted power or radio

signals from the reader to transmit its data. Its typical read range is 300 to 750 feet.

The read range depends on the battery power and type of transmitter on the tag. An

active tag, similar to a semi-passive tag, may have on-board sensors or external sensors

connected to it. With more processing power, the tag may collect data from the sensors

and locally process the data before broadcasting. Active tags are often used by Real-Time

Location Systems (RTLSs).

19

Page 46: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 2. RFID BACKGROUND

2.4.3.2 Tag Frequencies

RFID tags are categorised according to the frequency at which they are designed to oper-

ate. Primary frequency ranges are allocated into four categories for use by RFID systems

(previously mentioned in Section 2.2.2).

Low Frequency (LF) Tags within the LF range include frequencies from 30 to 300kHz,

but only 125kHz to 134kHz are commonly used. A typical LF RFID system operates at

125kHz or 134.2kHz, and this range is available all over the world. The LF tags are passive

tags that have no or limited anti-collision capabilities. Therefore, reading multiple tags

simultaneously in the interrogator zone is impossible or very difficult. However, the LF

tags can be easily read while attached to objects containing water, metal, wood, and

liquids because they are not sensitive to radio noise. LF tags are used in access control,

asset tracking, animal identification, automotive control, healthcare, and various point-of-

sale applications. The automotive industry is the largest user of LF tags where LF tag is

embedded inside the ignition key. When that key is inserted into the key hole and tag ID

is correct, the car can be started.

High Frequency (HF) The HF ranges from 3 to 30MHz, while the only typical fre-

quency being used for HF RFID systems is 13.56MHz. This frequency is now available

for RFID applications worldwide. HF tags are passive tags that may have anti-collision

capability which allow reading of multiple tags simultaneously in the interrogator zone.

However, since the read range of many HF tags and readers is small, they usually do not

implement anti-collision. HF tags are ideal choice for applications such as a smart shelf,

credit cards, smart cards, library books, airline baggage, and asset tracking. Due to no

restrictions on the use of HF frequency, HF tags are currently the most widely used tags

around the world.

Ultra High Frequency (UHF) The UHF range includes frequencies from 300 to

1000MHz, but only two frequency ranges, 433MHz and 860-960MHz, are used for UHF

RFID systems. The 433MHz frequency is used for active tags, while the 860-960MHz

range is used for passive tags or semi-passive tags. All the protocols in the UHF range

have some type of anti-collision capability, which allow multiple tags to be read simulta-

neously within the interrogator zone. However, the UHF tags cannot be easily read while

attached to objects containing water or metal because they absorb UHF waves and detune

the tag.

Microwave Frequency (MF) The MF range includes frequencies from 1 to 10GHz,

but only two frequency ranges of around 2.45GHz and 5.8 GHz are used for Microwave

RFID systems. Microwave tags are available as passive, semi-passive, and active types.

20

Page 47: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

2.4. RFID CORE COMPONENTS

Japan is the largest user of passive microwave tags. The 2.4GHz frequency range is called

Industry, Scientific, and Medical (ISM) band and is accepted worldwide.

2.4.3.3 Tag Identification Method

There are several methods of identification but the most common is to store a serial number

that uniquely identifies a person or object such as Electronic Product Code (EPC). The

EPC is designed as a universal identifier that provides a unique identity for every physical

object globally. Its structure is defined in the EPCglobal Tag Data Standard (EPCGlobal,

2006, 2005, 2008), which is an open standard, and is freely available. The EPC Class 1

Generation 2 is widely used in the UHF range for communications at 860-960MHz. The

passive RFID tag used within the UHF range is sometime referred to as EPC Gen-2 tag.

An EPC tag contains a 96-bit unique identifier, which is a really big number that will

never be repeated or allocated to anything except that tag. The two primary reasons why

EPC numbers contain only a unique identifier, as opposed to actual information about

the product, are security and cost (Sweeney, 2005).

The most common encoding scheme with 96 bits encoding currently used includes: the

General Identifier (GID-96), the Serialised Global Trade Item Number (SGTIN-96), the

Serialised Shipping Container Code (SSCC-96), the Serialised Global Location Number

(SGLN-96), the Global Returnable Asset Identifier (GRAI-96), the Global Individual Asset

Identifier (GIAI-96), and the DoD Identifier (DoD-96).

In order to manage and monitor the traffic of RFID data effectively, the EPC pattern

is usually used to keep the unique identifier on each of the items arranged within a specific

range (Darcy et al., 2011). The EPC pattern does not represent a single tag encoding,

but rather refers to a set of tag encodings. For instance, the General Identifier (GID-

96) includes three fields in addition to the Header with a total of 96-bits binary value.

25.1545.[3456-3478].[778-795] is a sample of the EPC pattern in decimal, which later will be

encoded to binary and embedded onto tags. Thus, within this sample pattern, the Header

is fixed to 25 and the General Manager Number is 1545, while the Object Class can be

any number between 3456 and 3478, and the Serial Number can be anything between 778

and 795.

Within each EPC, the Uniform Resource Identifier (URI) encoding complements the

EPC Tag Encodings, defined for use within RFID tags and other low-level architectural

components. URIs provide an information for application software to influence EPC in

a way that is independent of any specific tag-level representation. The URI forms are

also provided for pure identities, which contain just the EPC fields which are used to

distinguish one item from another. For instance, for the EPC GID-96, the pure identity

URI representation is as follows:

urn:epc:id:gid:GeneralManagerNumber.ObjectClass.SerialNumber

21

Page 48: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 2. RFID BACKGROUND

In this representation, the three fields GeneralManagerNumber, ObjectClass, and Seri-

alNumber correspond to the three components of an EPC General Identifier (EPCGlobal,

2008). There are also pure identity URI forms defined for identity types that correspond

to certain encodings. The URI representations corresponding to these identifiers are as

shown in Table 2.1.

Table 2.1: The Uniform Resource Identifier (URI) encoding complements the EPC TagEncodings defined for use within RFID tags and other low-level architectural components

Encoding Scheme Uniform Resource IdentifierGID urn:epc:id:gid:GeneralManagerNumber.ObjectClass.SerialNumber

SGTIN urn:epc:id:sgtin:CompanyPrefix.ItemReference.SerialNumberSSCC urn:epc:id:sscc:CompanyPrefix.SerialReferenceSGLN urn:epc:id:sgln:CompanyPrefix.LocationReference.ExtensionComponentGRAI urn:epc:id:grai:CompanyPrefix.AssetType.SerialNumberGIAI urn:epc:id:giai:CompanyPrefix.IndividualAssetReferenceDoD urn:epc:id:usdod:CAGECodeOrDODAAC.serialNumber

An example encoding of GRAI is demonstrates as follows:

urn:epc:id:grai:0652642.12345.1234

From the above example, the corresponding GRAI is 06526421234581234. Referring

to Table 2.1, the CompanyPrefix, AssetType, and SerialNumber of GIAI are represented

as 0652642, 12345, and 1234 respectively. Some of the major encoding schemes, which are

used and incorporated within our methodology, will be further explain within the thesis.

2.5 RFID Data Management Issues

RFID data management is one of many issues surrounding the deployment of RFID.

Palmer (2004) stated that data should be absorbed closer to the source, which caters

to the need for pre-processed data, so that only relevant and meaningful information is

passed to the application software. This is where the raw data had been collected and

should be filtered before being passed into the applications. Filtering must be done in

this capture layer, and the data captured at this layer is considered to be Dirty data.

This theory is supported in (Derakhshan et al., 2007) where it is described that, in RFID

data management, Dirty data appears in four general forms: unreliable reads, missed

reads, noise, and duplication. After the data has been filtered, it is then turned into more

meaningful data and stored into the databases.

RFID data management is classified into three stages: 1) Data Capturing Process

where Dirty data are being captured by RFID devices; 2) Data Processing and Event

Management where Dirty data are being computed, transformed, aggregated, and inte-

grated into meaningful data; and 3) Data Warehousing and Data Mining where data are

stored into the database for a later use (Melski et al., 2007).

22

Page 49: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

2.6. SUMMARY

2.5.1 Data Capturing Process

Data capturing process is considered as the most important stage in RFID system. This is

because any data captured during this stage will be used for further process by the other

two stages. The data capture layer is responsible for coordinating and detecting multiple-

tagged objects and filtering incoming data before sending to the next layer (Derakhshan

et al., 2007). Therefore, any errors that occur in data capturing level will be carried on

toward the rest of the procedure. Such data stream errors are: unreliable reads, missed

reads, noise, and duplication.

2.5.2 Data Processing and Event Management

Simple and complex event detection is one of the primary roles played by data processing

and event management stage. Simple events in RFID applications are those which are

generated during the interactions between readers and tagged objects (Derakhshan et al.,

2007). In order to detect more complex events, we need to filter and correlate massive

number of simple events. To model the process of complex events, we need to define a

language that would we able to filter and correlate the events. Complex event languages

have been discussed in different contexts in order to transform, aggregate, and integrate

Dirty data into meaningful data (Abadi et al., 2004; Wu et al., 2006; Gyllstrom et al.,

2007).

2.5.3 Data Warehousing and Data Mining

The final stage in RFID system management is the data warehousing and data mining.

Data warehousing is defined as a process of centralised data management and retrieval.

Data warehousing represents an ideal vision of maintaining a central warehouse of all

organisational data. All data from the data warehouse must be cleaned before they can

be effectively used by the business application. Data mining, on the other hand, is the

process of analysing data from data warehouse and summarising it into useful information.

This step of data management is also important as some errors from data capturing and

event processing may remains (Darcy et al., 2009, 2010a,b).

2.6 Summary

In this chapter, an overview of some background information such as history of RFID,

RFID basics and technology overview, were presented. Particular attention was given to

the component of RFID systems, which are Antenna, Reader, and Tag. Current appli-

cations that are currently in use, such as RFID technology in supply chain, were also

discussed.

23

Page 50: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 2. RFID BACKGROUND

Some data management prospective was also identified in this chapter. RFID data are

raw, implicit and inaccurate, and accumulates very fast. In order to manage these data

efficiently and effectively, these data must be cleaned and filtered before storing them

into the database. Therefore, in this research, the focus will be on data capturing level

where RFID data is being collected before any further process. The specific issues and the

current methods for filtering RFID data streams, particularly Anti-Collision techniques,

will be discussed in the next chapter.

24

Page 51: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3RFID Data Streams Management Techniques

In this chapter, we examine different types of data stream filtering techniques, particularly

the anti-collision methods. We survey existing filtering approaches for different types of

RFID data stream errors, and analyse missed reads caused by data collision, which is the

most crucial type of error. We also discuss the anti-collision techniques, and conclude this

chapter with discussion on the research problems and limitation of existing methods.

3.1 Filtering of RFID Data Streams

Due to the low-power and low-cost constraints of RFID passive tags, the reliability of

RFID data capture process has become more challenging in many circumstances (Brusey

et al., 2003). There are several data filtering processes that handled different types of

data stream errors. This section describes and discusses four major data stream errors

including Unreliable reads, Missed reads, Noise, and Duplication.

3.1.1 Unreliable Reads

In an RFID deployment, environmental interference such as metal or water can sometimes

cause unreliable reads. Moving tags (objects) is also a common problem that causes

unreliable reads. For instance, baggage with RFID tags in airports can move too fast on

conveyor belts and is not properly detected by the reader.

25

Page 52: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

Tag deployment affects the RFID data capturing process in many ways and also caused

unreliable reads, as described below:

• Tag Orientation and Location: Tag performance is affected by the orientation of

the tag, relative to the reader’s antenna. The best tag orientation occurs when

the tag orientation and the antenna orientation are parallel to each other. As the

tag is rotated away from parallel position, it collects less power and the tag read

range decreases as the collected power decreases. The location of the tag within the

interrogator zone also affects the tag’s performance (Sweeney, 2005).

• Tag Placement: Placement of the tag on an object affects the tag’s performance

especially for passive tag used in supply chain warehouse. This is because radio

wave will be mostly absorbed if located near liquids and metals. The best place

to attach a passive tag on cases (at case-level tagging) is where the item packaging

provides the most separation from the liquids inside. Various test methods must be

used in order to determine the best tag location for specific product types (Brown

et al., 2007).

• Tag Stacking/shadowing: Tag stacking occurs when several tags are placed close to

each other. For example, item B is placed behind item A. From the perspective of

the reader, tag A that is closer to the antenna, absorbs and reflects most of the radio

energy. Therefore, tag B receives a very weak signal and could be missed by the

reader. To avoid this problem, packaging method should be designed carefully and

the case should be rotated in front of several antennas, installed at various angles to

the case. Tag stacking is also referred to as tag shadowing (Sanghera et al., 2007).

According to Fishkin et al. (2004) and D’Mello et al. (2008), the experiment testings

have shown that some deployment of tags and readers can result in the way reader emits

a low-power radio signal through its antenna to the passive tag. These studies can help

solve some unreliable reads, which is caused by different environment.

Unreliable reads can be solved at the hardware level, where relative parameters can

be set according to specific guidelines. The followings are parameters that affect the way

tags received power from readers:

• Flooring: Metal floor results in reader failure to detect tags.

• Distance between tag and reader: If tags are out of reader’s range (or in a weak

range), the percentage of tags detected by reader are very low (or 0).

• Number of tags on an object and their placement on that object: A certain number

of tags can increase accuracy to the reading but too many tags in reading scope can

result in tag collisions.

26

Page 53: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.1. FILTERING OF RFID DATA STREAMS

• Number of readers and their deployment topology: Too many readers covering the

same area can result in a lot of duplication.

• Number of nearby tags: Nearby tags may be detected by a reader outside their

range. This resulted in noisy readings.

• Number of objects moved simultaneously: The experiment shows that by using

handheld reader walking passed tags, most tags are detected by the handheld reader

especially those tags facing directly to the handheld reader.

• Tag orientation and rotation: A rotation of 30 and 60 degrees results in all tags being

detected by an RFID reader. However, a 90 degrees rotation of a reader results in

no tags being captured.

3.1.2 Noises

Noises refer to the additional unexpected readings generated. This can be caused by an

RFID tag outside the normal reading scope of a reader being captured for unknown reason

(Bai et al., 2006). Table 3.1 shows that since three tags i.e. TagD, TagF, and TagG, are

below the specific threshold, these tags are classified as noise readings. In addition, TagB

(SGTIN encoding) and TagH (GRAI encoding) are also classified as noise as these tags

have different encoding schemes.

Table 3.1: A sample of noise where * indicates a noise reading. Since the noise thresholdequals to 3 and the tag catch is only for GID encoding, any tag that appears less than threetimes within a specific time frame or does not satisfy tag catch requirement, is classifiedas noise

Tag EPC(CATCH:gid:1000.101.101-115) Count threshold = 3TagA urn:epc:id:gid:1000.101.101 Count1TagA urn:epc:id:gid:1000.101.101 Count2TagA urn:epc:id:gid:1000.101.101 Count3TagB urn:epc:id:sgtin:3000.203.100* Count1TagA urn:epc:id:gid:1000.101.101 Count4TagC urn:epc:id:gid:1000.101.103 Count1TagC urn:epc:id:gid:1000.101.103 Count2TagD urn:epc:id:gid:1000.101.104 Count1TagD urn:epc:id:gid:1000.101.104 Count2*TagC urn:epc:id:gid:1000.101.103 Count3TagE urn:epc:id:gid:1000.101.105 Count1TagE urn:epc:id:gid:1000.101.105 Count2TagE urn:epc:id:gid:1000.101.105 Count3TagF urn:epc:id:gid:1000.101.106 Count1*TagG urn:epc:id:gid:1000.101.107 Count1TagG urn:epc:id:gid:1000.101.107 Count2*TagH urn:epc:id:grai:2000.302.100* Count1

From literature survey, Bai et al. (2006) proposed several algorithms including both

noise removal and duplication elimination. Three sliding window based algorithms for

27

Page 54: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

denoising were proposed in the paper. According to the authors, a sliding window is a

window with certain size that moves with time. RFID reading tags will enter the window

and will expired at certain time. The noise readings are readings with count of distinct

tag EPC values below a threshold. The following briefly summarised the three algorithms:

• First algorithm is “Baseline denoising”. For each incoming reading of value R, a full

scan of window size is performed. If R is higher than a threshold, it is classified

as a non-noise reading. The readings of the same key are then output if threshold

condition is satisfied. To ensure a particular reading is never output more than

once, a state-of-output with each reading in the window buffer, is kept and set to

true when it is output once.

• Second algorithm, “Lazy denoising”, is an improved version of the first algorithm.

The output from Baseline denoising algorithm can be out of order. This affects

all further RFID data processing where correct ordering of observations is critical,

such as complex RFID event detections for real-time RFID applications, and RFID

data aggregation. To solve this out-of-order problem, a Lazy denoising algorithm

is proposed using hash table, along with output order preserving. The output from

this algorithm will be delayed until they expire from sliding window, to ensure that

everything will be output in order.

• Third algorithm, “Eager denoising”, is an improved version from Lazy denoising

algorithm and is also implemented with output order preserving. In the second

algorithm, the output was delayed until the window expires. This could be a problem

when the width of window is quite long. This third algorithm can output data earlier

while preserving correct time order. This is because the issue of wrong order occurs

only when a reading has been output, before the change of labeling on some earlier

reading within the window. Therefore, for a non-noise reading that is known as no

other earlier noise reading presented in the sliding window, it can be safely output

without the risk of order problems.

3.1.3 Duplications

As stated by Derakhshan et al. (2007), the Duplication problem is recognised as a seri-

ous issue in RFID and sensor networks because it often cause the reduction in system

robustness. Duplication can happen at two different levels: duplication at reader level and

duplication at data level :

3.1.3.1 Duplication at reader level

Duplication at reader level occurs when there is more than one reader deployed to cover

a specific location. Figure 3.1 shows that readers R1 and R2 cover the same shaded area

28

Page 55: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.1. FILTERING OF RFID DATA STREAMS

on the left (S1 ); and readers R2 and R3 cover the same shaded area on the right (S2 ).

Figure 3.1: An example of three readers deployment, where R1 and R2 covered S1, andR2 and R3 covered S2

Carbunar et al. (2005) proposed an algorithm called “Redundant Reader Elimination”

(RRE), which is a randomised, decentralised, and localised approximation algorithm for

the RRE problem. This has been done to eliminate duplication at the reader level. The

RRE algorithm has three different steps. Firstly, the algorithm detects the set of RFID

tags placed around the covered area of reader. Secondly, each RFID reader attempts to

write a number of covered tags count onto all of its covered tags. The reader that issued

the highest count for a tag will mark the tag. Finally, each reader queries all its covered

tags and determines the one it has marked. A reader that has not marked any of its

covered tags is declared as a duplicate reader.

3.1.3.2 Duplication at data level

Duplication at data level occurs as data streams. The RFID data can be captured very

fast and usually less meaningful without transformation. Some of these data had been

captured more than once, so it is possible to identify and eliminate them before passing

it to the application. Table 3.2 shows that TagE is captured twice and TagF is captured

three times. Since these duplicated reads are close to each other, it is assumed that this

may happen because the tag remained in the scope of a reader for a long time and is read

by the same reader multiple times.

Two algorithms for duplication removal at data level called “Baseline merge” and

“Hash merge” were proposed by Bai et al. (2006). Baseline merge eliminates duplication

by maintaining a timestamp to indicate the last time a reading, with the same key as the

incoming reading, appears. Hash merge uses hash table to keep the last appearance times-

tamp for each distinct key value. For each incoming reading, its timestamp is compared

with the corresponding entry for this key in the hash table. The reading is determined to

be a new tag reading if the key does not appear in the table, or the time distance is larger

than threshold. Furthermore, Pupunwiwat and Stantic (2007), also proposed a “Location

Filtering and Duplication Elimination” technique to eliminate any data duplication, and

at the same time located where the data has been captured.

29

Page 56: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

Table 3.2: A sample of data duplication, where TagE is captured twice and TagF iscaptured three times

Tag EPC(CATCH:gid:1000.101.101-115) Count = 1TagA urn:epc:id:gid:1000.101.101 Count1tagB urn:epc:id:gid:1000.101.102 Count1TagC urn:epc:id:gid:1000.101.103 Count1TagD urn:epc:id:gid:1000.101.104 Count1TagE urn:epc:id:gid:1000.101.105 Count1TagE urn:epc:id:gid:1000.101.105 Count2*TagF urn:epc:id:gid:1000.101.106 Count1TagF urn:epc:id:gid:1000.101.106 Count2TagF urn:epc:id:gid:1000.101.106 Count3*TagG urn:epc:id:gid:1000.101.107 Count1TagH urn:epc:id:gid:1000.101.108 Count1TagI urn:epc:id:gid:1000.101.109 Count1

3.1.4 Missed Reads

Missed Reads are very common in RFID applications and often happened in a situation

of low-cost and low power hardware, which leads to a frequently dropped readings referred

to in other work (Derakhshan et al., 2007). Another source of missed reads is when

multiple tags are detected by a reader and Radio Frequency (RF) collisions occur, causing

RF signals to interfere with each other and preventing the reader from identifying any

tags (Bai et al., 2006). Dropped reading can be easily filtered using Smoothing techniques,

where missing data from specific time can be filled (Jeffery et al., 2005, 2006a,b). However,

preventing data resulting from RF collisions can be hard. In order to solve this problem,

anti-collision is usually performed at the edge, to prevent two or more tags from responding

to a reader at the same time. Tag anti-collision protocols or sometimes referred to as

Multi-Access, can be classified into probabilistic and deterministic methods, which will be

explained further in Section 3.2. Table 3.3 shows an example of missed read where at time

500msec, 800msec and 1000msec, a reading of TagA is missing.

Table 3.3: A sample of Missed reads where at time 500msec, 800msec and 1000msec,readings of TagA are missing

Time (msec) Tag EPC(CATCH:gid:1000.101.101-115)100 TagA urn:epc:id:gid:1000.101.101200 TagA urn:epc:id:gid:1000.101.101300 TagA urn:epc:id:gid:1000.101.101400 TagA urn:epc:id:gid:1000.101.101500 - -600 TagA urn:epc:id:gid:1000.101.101700 TagA urn:epc:id:gid:1000.101.101800 - -900 TagA urn:epc:id:gid:1000.101.1011000 - -

As mentioned earlier, Smoothing technique can be used to handle missed reads.

Smoothing technique is part of a proposed technique called “Extensible Sensor stream

30

Page 57: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.2. COLLISION HANDLING IN RFID DATA STREAMS

Processing” (ESP), which focuses on cleaning data at the edge of the network. It allows

raw data to be cleaned by processing multiple data streams, and exploiting the temporal

aspect of data to produce a single improved output stream that can be used directly by

applications. In addition, a duplication elimination method called Arbitrate stage of ESP

is proposed by the authors.

According to the surveys (Jeffery et al., 2005, 2006a,b), ESP has five different stages

for data filtering:

• The Point stage filter individual values e.g. RFID tags or obvious Missed reads;

• At Smoothing stage, ESP interpolates for lost reading within a temporal granule.

ESP runs this query over each reader data stream. The query begins by breaking

the streams into smaller slices that correspond with the size of granule. Through

these slices window operation, smooth filled in Dropped readings for any tags, that

are seen at least once in slice time period;

• The Merge stage corrects the Missed reads and removes outliers spatially;

• The Arbitrate stage deals with conflicts, such as duplication;

• The Virtualise stage combines readings from different types of devices together.

Floerkemeier and Lampe (2004) and Floerkemeier and Lampe (2005) have identified a

solution to reduce a tag collision that causes a missed reads, using a playing card scenario.

Based on a “Framed-ALOHA” technique, the authors used a different layout of playing

card to determine the tag captured by reader within a set time period. The result indi-

cated that stacked card has the worst tag recognition rate since it has the most collision

when stacked together. To reduce the missed reads that arise from the tag collisions, the

bandwidth of RFID technology should be increased. Since the 900 MHz in UHF band

offers significantly more bandwidth in the communication from the reader to the tag than

the regulations on the 13.56 MHz in HF band, an RFID system operating in the UHF

band can detect tags much faster. Nevertheless, tag collision issues remain a challenging

topic in current research.

3.2 Collision Handling in RFID Data Streams

RFID collision handling is one of the most heavily researched topics because it is a very

important step to determine a quality of captured data. The better quality of data at the

earlier stage of data processing means less complex algorithms are needed for RFID event

process and database management. This section explains the type of each collision, clas-

sification of Multi-Access, taxonomy of RFID tag anti-collision protocols, and literature

surveys on existing deterministic and probabilistic anti-collision methods.

31

Page 58: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

3.2.1 RFID Collision Types

Simultaneous transmissions in RFID systems lead to collisions as the readers and tags

typically operate on the same channel. Three types of collisions are possible: Reader-

Reader collision, Reader-Tag collision, and Tag-Tag collision.

Figure 3.2: Collision Problems in RFID System: a) Reader-Reader Collision, b) Reader-Tag Collision, and c) Tag-Tag Collision

3.2.1.1 Reader Collisions

There are two types of Reader collision: 1) Reader-to-Reader, and 2) Reader-to-Tag (Leong

et al., 2005; Jain and Das, 2006).

Reader-to-Reader Collisions Interference occurs when one reader transmits a signal

that interferes with the operation of another reader, and prevents the second reader from

communicating with tags in its interrogation zone (Jain and Das, 2006). Reader-to-reader

collision can be easily avoided by determining the appropriate reader’s deployment that

prevents direct signal interference between two or more readers. Figure 3.2a) shows an

example of Reader-to-Reader collision.

Reader-to-Tag Collisions Interference occurs when one tag is simultaneously located

in the interrogation zone of two or more readers, where more than one reader attempts to

communicate with that tag at the same time (Jain and Das, 2006). Figure 3.2b) shows

an example of Reader-to-Tag collision.

The classification and solution of Reader collisions problems are illustrated in Figure

3.3.

32

Page 59: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.2. COLLISION HANDLING IN RFID DATA STREAMS

Figure 3.3: Taxonomy of RFID Readers anti-collision protocols

3.2.1.2 Tag Collisions

Tag collision in RFID systems, sometimes known as Multi-Access, happens when multiple

tags are energised by the RFID reader simultaneously, and reflect their respective signals

back to the reader at the same time. This problem is often seen whenever a large volume

of tags must be read together in the same reader zone. The reader is unable to differentiate

these signals. Figure 3.2c) shows an example of Tag-to-Tag collision.

3.2.2 Division Classification for Multi-Access

Tag collisions or Multi-Access problem is more complex than those within reader collision

categories. There are several techniques in the literature (Shih et al., 2006; Tang and

He, 2007; Liu, 2010) that explain and differentiate between each type of Multi-Access

Divisions. These divisions are summarised below:

SDMA (Space Division Multiple Access): The term SDMA relates to techniques

that reuse a certain resource, such as channel capacity in spatially separated areas (Shih

et al., 2006; Tang and He, 2007). One method is to reduce the range of a single reader,

but to remain the capability of certain coverage area by grouping together a large number

of readers to form an array. As a result, the channel capacity of attaching readers is made

available simultaneously. A disadvantage of the SDMA technique is high implementa-

tion cost of the complicated reader’s deployment. The use of this type of anti-collision

procedure is therefore restricted to a few specialised applications.

FDMA (Frequency Division Multiple Access): The term FDMA relates to tech-

niques in which several transmission channels on various carrier frequencies are simulta-

neously available to the communication members (Shih et al., 2006; Tang and He, 2007).

In RFID systems, this can be achieved using tags with a freely adjustable transmission

frequency. One disadvantage of the FDMA procedure is the high cost of the readers,

33

Page 60: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

since a specific receiver must be provided for every reception channel. This anti-collision

procedure also remains limited to a few specialised applications.

CDMA (Code Division Multiple Access): There are actually a number of different

subtypes to CDMA depending on how the spreading is done. The common factor is that

CDMA uses spread spectrum modulation techniques based on pseudo random codes, to

spread the data over the entire spectrum. Even though CDMA would be ideal in many

ways, the disadvantage is that it adds a high number of complexity and would be too

computationally intense for RFID tags (Shih et al., 2006; Tang and He, 2007; Dabas

et al., 2009).

TDMA (Time Division Multiple Access): The term TDMA relates to techniques

in which the entire available channel capacity is divided chronologically between the par-

ticipants (Shih et al., 2006; Tang and He, 2007). In RFID systems, TDMA procedures are

the largest group of anti-collision procedures. Tag-driven and reader-driven procedures

have been differentiated as follows:

• Tag-driven: Tag-driven procedures function asynchronously because the reader

does not control the data transfer. For example, in the Pure ALOHA procedure,

a tag begins transmitting as soon as it is ready and has data to send. Tag-driven

procedures are naturally very slow and inflexible.

• Reader-driven: Most applications use procedures that are controlled by the reader

as the master. These procedures can be considered as synchronous, since all tags

are controlled and checked by the reader simultaneously. An individual tag is first

selected from a large group of tags in the interrogation zone; and then communication

takes place between the selected tag and the reader. Examples of algorithms using

reader-driven procedure are the deterministic algorithm, such as Query Tree; and

the probabilistic algorithm, such as Framed-Slotted ALOHA.

3.2.3 Taxonomy of RFID Tag Anti-Collision Protocols

The various types of anti-collision methods for multi-access/tag collision can be reduced

to two basic types: probabilistic method and deterministic method (Klair et al., 2007;

Choi and Lee, 2007; Bang et al., 2009; Alotaibi et al., 2009; Li et al., 2009; Klair et al.,

2010; Zhu and Yum, 2011).

In probabilistic methods, tags respond at randomly generated times. If a collision

occurs, colliding tags will have to identify themselves again after waiting for a random

period of time. This technique is faster than deterministic but suffers from tag starvation

problem where not all tags can be identified due to the random nature of chosen time.

34

Page 61: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.3. DETERMINISTIC ANTI-COLLISION PROTOCOLS

The deterministic method begins an identification process by issuing a prefix until it

gets matching tags. Then it continues to ask for additional prefixes until all tags within

the region are found. This method is slow but leads to fewer collisions and have high

successful identification rate.

There are also some hybrid anti-collision protocols that combine the advantages of

tree-based and ALOHA-based approaches. From literature, it is clear that most hybrid

protocols combine the Query Tree protocol with ALOHA variant (Klair et al., 2010).

Figure 3.4 shows the classification of tag anti-collision protocols implemented in

TDMA, including probabilistic and deterministic methods. Deterministic method is also

divided into Memory and Memoryless protocols; where Memory protocols need

additional memory other than tags’ ID, while Memoryless only need an ID of tag for the

whole identification process. The most advanced and efficient probabilistic anti-collision

is the Framed-Slotted ALOHA approach, while the memoryless Query Tree is the

simplest and most robust technique. The literature survey on both deterministic and

probabilistic anti-collisions are explained in detail in the next two sections.

Figure 3.4: Taxonomy of RFID Tags anti-collision protocols

3.3 Deterministic Anti-Collision Protocols

Deterministic methods can be classified into a Memory tree-based algorithm and a Mem-

oryless tree-based algorithm. In the Memory algorithm, which can be grouped into “Tree

Splitting”, “Binary Search”, and “Bit Arbitration”, the reader’s inquiries and the re-

sponses of the tags are stored and managed in the tag memory. This results in an equip-

ment cost increase especially for RFID tags. In contrast, in the Memoryless algorithm,

the responses of the tags are not determined by the reader’s previous inquiries. The tags’

responses are determined only by the present reader’s inquiries so that the cost for the

tags can be minimised. “Query Tree” is classified as Memoryless algorithm.

35

Page 62: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

Depending on the number of tags that respond to the interrogator, there are three

cycles of communication between tag and reader in deterministic approaches.

• Collision cycle: Collision cycle occurs when the number of tags that respond to

the reader is more than one. The reader cannot identify the ID of tags.

• Idle cycle: Idle cycle occurs when there is no response from any tag to the reader.

This type of cycle is unnecessary and should be minimised.

• Successful cycle: Successful cycle happens when exactly one tag responds to the

reader and the reader can identify the ID of that tag.

The rest of this section discusses each type of tree-based anti-collision algorithm and

their benefits and drawbacks.

3.3.1 Binary Search

“Binary Search” (BS) algorithm (Finkenzeller, 2003) involves the reader transmitting a

string of EPC to tags, which the tag then compare against its ID. Those tags respond, with

ID equal to or lower than the requested string. The reader then monitors tags’ responses

bit by bit using Manchester coding, where the value of bit is defined by the change in level

(negative or positive transition) within a bit window. A logic 0 is coded by a positive

transition, while a logic 1 is coded by a negative transition. The no transition state is

not permissible during data transmission and is recognised as an error. Once a collision

occurs in BS, the reader splits tags into subsets, based on collided bits.

The enhanced version of the BS protocol is called the “Dynamic Binary Search Algo-

rithm” (DBSA) (Finkenzeller, 2003). In DBSA, the reader and tags do not use the entire

length of EPC and tags ID during the identification process. For example, if a reader

receives the response 01X, tags only need to transmit the remaining part of their ID since

the reader has already identified the prefix 01. This enhancement effectively reduces the

amount of data sent by the reader to tags.

Additionally, there are several improved and enhanced BS algorithms (Yu et al., 2005;

Liu et al., 2005; Chen and Liao, 2010), which introduce higher complexity in implemen-

tation. Nevertheless, all types of BS algorithms require extra memories beside the EPC

data itself, especially the most enhanced version, which requires additional memory to

store information on current stage of reading process.

3.3.2 Bit Arbitration

“Bit Arbitration” (BA) algorithms are memory-based anti-collision and are less robust

than those within memoryless category. The key feature of BA algorithms is that bit

36

Page 63: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.3. DETERMINISTIC ANTI-COLLISION PROTOCOLS

replies are synchronised, meaning that multiple tags’ responses of the same bit value will

result in no collision. A collision is observed only if two tags respond with different bit

values. Moreover, the reader has to specify the bit position it wants to read. There are

several algorithms in this category including “ID Binary Tree Stack”, “Bit-by-bit Binary

Tree”, “Modified Bit-by-Bit Binary Tree”, and “Enhanced Bit-by-Bit Binary Tree” (Klair

et al., 2010).

In the “ID Binary Tree Stack” (ID-BTS) (Feng et al., 2006), the reader uses a stack

to store tags position on the tree, while a tag has a counter to record the depth of the

reader’s stack. Based on this counter value, a tag determines whether it is in the transmit

or wait state. In other words, a counter value of zero moves a tag into the transmit state;

otherwise, the tag enters the wait state. Once a tag is identified, it enters the sleep state.

This technique needs a highly preserved memory in the reader, due to the heavy use of

stack.

Jacomet et al. (1999) presented a “Bit-by-Bit Binary Tree” (BBT) arbitration method,

where a separate channel is used for binary 0 and 1. When requested, each tag transmits

the specified bit in one of these channels. If the reader receives a different response from

both channels, it sends a control bit silencing the subset of tags that replied with 0 or 1.

On the other hand, if the reader receives a response of bit in only one of the two channels,

that bit is then successfully identified. Similar to ID-BTS, the reader has a stack and each

tag has a counter to store its tree position.

Choi et al. (2004) proposed the “Modified Bit-by-Bit Binary Tree” (MBBT), which

operates in a similar manner to the BBT algorithm. The key difference is that MBBT does

not use multiple time-slots to receive binary 0s and 1s. Moreover, Choi et al. (2004) also

proposed an “Enhanced Bit-by-Bit Binary Tree” (EBBT). In EBBT, a reader first requests

tags to respond with their complete ID. The assumption here is that tags’ responses are

synchronised. From these responses, the reader identifies collided and non-collided ID bits.

The reader then uses MBBT to identify the collided bits.

3.3.3 Tree Splitting

“Tree Splitting” (TS) protocols operate by splitting responding tags into multiple subsets,

using a random number generator. In this category of anti-collision, the reader needs

less preserving memory than those within Binary Search and Bit Arbitration categories

because TS only needs to store information of random binary numbers. We present two

algorithms in this category: “Binary Tree Splitting” and “Adaptive Binary Splitting”.

3.3.3.1 Binary Tree Splitting

The “Binary Tree Splitting” (BTS) uses random binary numbers generated for the splitting

procedure (Myung and Lee, 2006a). The tag has a counter initialised to 0 at the beginning

37

Page 64: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

of the process. The tag transmits ID when the counter value is 0. The reader transmits a

response to inform tags of the event of tag collision. The tag randomly generates a binary

number when its transmission causes collision. By adding the selected binary number to

the counter, a set is split into two subsets, ‘0’ or ‘1’ as shown in Figure 3.5.

Figure 3.5: Binary Tree Memory based anti-collision protocol

3.3.3.2 Adaptive Binary Splitting

Tag identification in BTS protocols starts from one tag set including all tags, which cause

more tag collisions for splitting tag sets. The colliding tag needs to re-transmit ID when-

ever tag collision occurs. The “Adaptive Binary Splitting” (ABS) uses information on the

last frame of the tree and makes a new tag identification start from multiple tags sets.

Hence, the reader can recognise tags with less collision. ABS begins tag identification

from only readable cycles of the last frame and uses random numbers for splitting tag

sets. This technique is an improvement on the BTS protocol. However, it requires extra

memory to store information from previous frame. ABS requires tags to support both the

transmission and reception at the same time.

3.3.4 Query Tree

In TS variants, tags require a random number generator and a counter to track their

tree position, thus making them costly and computationally complex. “Query Tree” (QT)

algorithms overcome these problems by storing tree construction information at the reader,

and tags only need to have a prefix matching circuit. Numerous variants of query tree

algorithms exist. Among all tree protocols, QT protocols promise the simplest tag design

(Klair et al., 2010).

For the tree-based anti-collision, we focus on QT-based protocols because it is the

most acceptable and is an effective anti-collision technique for passive UHF tags (Klair

et al., 2010). There are several improved anti-collision methods based on QT, such as an

“Adaptive Query Splitting” (AQS) proposed by Myung and Lee (2006b), and a “Hybrid

38

Page 65: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.3. DETERMINISTIC ANTI-COLLISION PROTOCOLS

Query Tree” (HQT) proposed by Ryu et al. (2007). The AQS requires tags to support

both the transmission and reception at the same time, thereby making it difficult to apply

to low-cost passive RFID systems. On the other hand, the HQT managed to reduce

collision cycles but at the same time introduce too many idle cycles. Accordingly, the QT

Algorithm, which is currently adopted as the anti-collision protocol in EPC Class 1, may

be limited to the tree based anti-collision protocol that can be implemented effectively

(Choi et al., 2008).

The QT (Law et al., 2000) is a data structure for representing prefixes that is sent by

the RFID reader. The QT algorithm consists of loops, and in each loop, the reader issues a

query with specific prefixes, and the matching tags respond with their information. If only

one tag replies, the reader successfully recognises the tag. If more than one tag tries to

respond to reader’s query, tag collision occurs and the reader cannot get any information

about the tags. The reader, however, can recognise the existence of tags to have ID that

matches the query. To further identify collided tags, the QT algorithm tries to query with

1-bit longer prefixes in next round of identification. By extending the prefixes, the reader

can recognise all the tags.

Figure 3.6: Query Tree Memoryless based anti-collision protocol

Figure 3.6 displays an example of a QT procedure. An identification process starts

at Level one of tree, where QT uses tag IDs to split a tag set. It can be seen that Tag

1010 is successfully identified in the first round because from all three tags, only Tag 1010

has ‘1’ for the first bit of string. In the second round of identification, idle cycle was

created, as there was no tag starting with ‘00’ for the first two bits. In the third round of

identification, the other two tags, Tag 0100 and Tag 0111, are successfully identified.

3.3.4.1 Adaptive Query Splitting

The “Adaptive Query Splitting” (AQS) uses information on the last frame of the tree

for tag identification, so that the reader can recognise tags with less collision. The AQS

recognises tags with query that is sent by a reader, which includes a bit string. The basic

idea of AQS is based on QT where tag responds with its ID when its first bits of ID are

39

Page 66: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

equal to the bit string of the query. The reader has queued Q, which maintains bit strings

for queries. At the beginning of the frame, Q is initialised with queries of all the leaf

nodes in the tree of the last frame. AQS keeps information that is acquired during the

last identification process, in order to shorten the collision period. This technique also

requires tags to support both the transmission and reception at the same time as in ABS.

In addition, according to Bhatt and Glover (2006), the adaptive splitting protocol is only

compatible with EPC class 0 and class 1 generation 1; and is more complex than basic

BTS and QT.

Figure 3.7 shows that ABS (Refer to Tree Splitting Section) and AQS start the tree

search from the leaf nodes of the tree from the last frame.

Figure 3.7: The starting point of tag identification in tree-based protocols

3.3.4.2 Hybrid Query Tree

“Hybrid Query Tree” (HQT) utilises a 4-ary query tree instead of a binary query tree

(Ryu et al., 2007). Figure 3.8 shows an example of identification process between QT (a)

and HQT (b). This technique increases too many idle cycles despite reducing collision

cycles, while extra memory needed also increases, as an identification process gets longer.

This is because each query increases the prefixes by 2-bits instead of 1-bit.

Table 3.4 compares operations of the QT protocol and HQT protocol from Figure 3.8

sample. As we can see, HQT reduces the number of query commands as well as the number

of collisions. However, the number of idle cycles had been increased as a side-effect.

There is a basic Idle cycles elimination (slotted back-off tag response mechanism) for

HQT, but this requires more time and memory. The extended version of HQT also requires

extra memory, since it mimics the AQS for the last identification information to be kept.

Nevertheless, HQT is better than QT in reducing collision between tags, especially at

higher number of tags.

40

Page 67: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.3. DETERMINISTIC ANTI-COLLISION PROTOCOLS

Figure 3.8: Tree-based protocols: a) Query tree protocol, b) 4-ary tree protocol

Table 3.4: Identification process of Query Tree versus Hybrid Query TreeQuery Tree Protocols

Step Query string Query result Query queue1 0 collision 1,00,012 1 collision 00,01,10,113 00 successful 01,10,114 01 successful 10,115 10 collision 11,100,1016 11 idle 100,1017 100 successful 1018 101 successful empty

Hybrid Query Tree ProtocolsStep Query string Query result Query queue

1 empty string collision 00,01,102 00 successful 01,103 01 successful 104 10 collision 1000,1001,10105 1000 successful 1001,10106 1001 idle 10107 1010 successful empty

3.3.4.3 Other Query Tree-Based Algorithms

There are other improved version of QT, which enhances the performance but increases

implementation cost, due to the more complex execution algorithms. These techniques

include the “Improved QT” (ImpQT) algorithm (Zhou et al., 2004), the “QT-based Reser-

vation” (QTR) algorithm (Choi et al., 2007), and the “Intelligent Query Tree” (IntQT)

(Bhandari et al., 2006).

For the deterministic anti-collision approaches, it is preferred that the algorithms are

simple, since the adoption of the tree-based techniques are in the older RFID system. The

recent technology uses ALOHA-based anti-collision algorithms rather than the tree-based.

From the observation and literature survey, we discover that for tree-based approaches,

41

Page 68: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

Figure 3.9: A sample procedure of Frame-slotted ALOHA

the number of identification cycles, the total memory bits required, and the similarity of

IDs, mostly affects the delay of tags’ identification. Therefore, we make the assumption

that by taking advantage of EPC pattern and bulky movement of items (see Chapter 2),

the identification ability of the reader can be improved without the need for complex

anti-collision algorithm.

3.4 Probabilistic Anti-Collision Protocols

In a probabilistic approach, tags respond to readers at randomly generated times. If a col-

lision occurs, colliding tags will have to identify themselves again after waiting a random

period of time (Choi and Lee, 2007; Li et al., 2009; Bang et al., 2009; Klair et al., 2010).

When we mentioned the probabilistic anti-collision approach in RFID, we usually refer to

the ALOHA-based approach, which is the most widely used type of anti-collision. “Slotted

ALOHA” (Quan et al., 2006), which initiates discrete time-slots for tags to be identified by

reader at the specific time, was first employed as an anti-collision method in an early days

of RFID technology. The principle of Slotted ALOHA techniques is based on the “Pure

ALOHA” introduced in early 1970s (Abramson, 1970), where each tag is identified ran-

domly. To improve the performance and throughput rate, different anti-collision schemes

were suggested in the past literature. “Framed-Slotted ALOHA” technique is the most

improved ALOHA-based technique currently applied in many applications. The three

most accepted Framed-Slotted ALOHA techniques are “Basic Framed-Slotted ALOHA”,

“Dynamic Framed-Slotted ALOHA”, and “Enhanced Dynamic Framed-Slotted ALOHA”.

Several researchers (Wang et al., 2007; Lee et al., 2005b, 2008a; Cho et al., 2007) have also

attempted to improve the throughput rates by implementing a more accurate Frame-size

Estimation algorithms.

Figure 3.9 shows an example of Frame-slotted ALOHA anti-collision protocols. Each

frame is formed of specific number of slots that is used for communication between the

readers and the tags. Any slot that has more than one tags responding to it is classified

as a collision slot, while any slot that has exactly one tag responding to it is a successful

slot. Empty slot occurs when no tag respond within that specific time slot. Figure 3.9

42

Page 69: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.4. PROBABILISTIC ANTI-COLLISION PROTOCOLS

shows that Slot 1 and 2 of Frame one and, Slot 5 of Frame two, are collision slots; Slot

3 of Frame one, Slot 4 of Frame two, and Slot 6 of Frame three, are successful slots; and

Slot 7 of Frame three is an empty slot.

The rest of this section describes each type of ALOHA-based anti-collision algorithms

and their benefits and limitations.

3.4.1 BFSA Method

The “Basic Framed-Slotted ALOHA” (BFSA) is the most basic ALOHA-based algorithms

that use a fixed frame-size throughout the identification round. The reader offers infor-

mation to the tags, including the frame-size specification and the random number selected

by each slot within the frame. Each tag selects a slot using the random number and then

sends its ID back to the reader (Ding and Liu, 2009; Lee and Lee, 2006; Lee et al., 2008b).

Since the frame-size of the BFSA is fixed, its implementation is simplistic. However, the

system’s efficiency drops significantly in the event of there being too large or too small

tag counts. For instance, no tag may be identified in a read cycle if there are too many

tags within the interrogation zone. On the other hand, under small tag counts where

large frame-size is used, lots of empty slots are produced resulting in decreased system

efficiency.

3.4.2 DFSA Method

The “Dynamic Framed-Slotted ALOHA” (DFSA) overcomes the problems associated with

BFSA, by dynamically changing the frame-size according to estimated number of Backlog,

which is a number of tags that have not been read. In DFSA, each tag in an interrogation

zone selects one of the given N slots to transmit its identifier; and all tags will be recognised

after a few frames. Each frame is formed of specific number of slots that is used for

communication between the readers and the tags. To determine the frame-size, it gathers

and uses information such as number of successful slots, empty slots, and collision slots

from previous round, to predict the appropriate frame-size for the next identification

round (Ding and Liu, 2009; Lee and Lee, 2006; Devarapalli et al., 2007; Fan et al., 2008a).

DFSA can identify the tag efficiently because the reader adjusts the frame-size according

to the estimated number of tags. However, the frame-size change alone cannot sufficiently

reduce the tag collision when there are a number of tags because it cannot increase the

frame-size indefinitely. DFSA has various versions depending on different tag estimation

methods used. There have been several researches to improve the accuracy of frame-size

by implementing a frame-size estimation techniques (Lee et al., 2005b, 2008a; Cho et al.,

2007; Fan et al., 2008b). According to the DFSA protocol, the reader picks tag within an

interrogation zone by the command “Select”, then issues “Query”, which contains a ‘Q’

parameter to specify the frame-size (frame-size F = 2Q - 1). Each selected tag will pick

a random number between 0 to 2Q - 1 and put it into its slot counter. The tag, which

43

Page 70: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

picks zero as its slot number, will respond and backscatter its EPC to reader. Then, reader

issues “QueryRep” or “QueryAdjust” command to initiate another slot (Wang et al., 2007;

Zhu and Yum, 2009).

Similar to the Tree-based anti-collision, there are three kinds of slot in ALOHA-based

anti-collision, as shown in Figure 3.10: 1) Empty slot where there is no tag reply; 2)

Successful slot where there is only one tag reply; and 3) Collision slot where there is more

than one tag reply. The term initial Q refers to the first ‘Q’ or frame-size, which applies

to a specific identification cycle. In Figure 3.10a), the reader first initiates a “Query” and

broadcasts the signal to nearby tags. Since there is no tag that picks zero as its slot counter,

the slot is counted as an empty slot. Figure 3.10b) shows that, after the first “Query” was

sent, each tag deducted its slot counter by one. The reader then sends “QueryRep” to

tags in close proximity; and any tag that has zero as its slot counter replies. When there

is only one tag that responds, a successful slot occurs and the tag replies to the reader

with its RN16. Figure 3.10c) demonstrates that when two tags respond to the reader at

the same time, a collision slot occurs and in this case, no information is transmitted.

Figure 3.10: Empty Slot, Successful Slot, and Collision Slot in EPC Class 1 Generation 2Protocol

44

Page 71: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.4. PROBABILISTIC ANTI-COLLISION PROTOCOLS

3.4.3 EDFSA Method

The DFSA algorithms change the frame-size to increase the performance efficiency of the

tag identification. However, as the number of tags becomes larger than the frame-size, the

probability of collision increases rapidly. If the number of unread tags can be estimated

accurately, frame-size can be determined to maximise the system efficiency or minimise the

tag collision probability. For instance, when the number of tags is large, the probability of

tag collision can be reduced by increasing the frame-size. However, the frame-size cannot

be increased indefinitely. When the number of unread tags is too large to achieve high

system efficiency, the number of responding tags somehow must be restricted so that the

optimal number of tags responds to the given frame-size (Lee et al., 2005b; Lee and Lee,

2006).

The “Enhanced Dynamic Framed-Slotted ALOHA” (EDFSA) first estimates the num-

ber of unread tags. If the number of tags within the interrogation zone is larger than the

maximum frame-size, the EDFSA algorithm splits the number of Backlog into number of

groups and allows only one group of tags to respond. When the reader limits the number

of responding tags, it transmits the number of tag sets and a random number to the tags,

when it issues the query. Only the tag that picks zero as its slot counter responds to the

request. If the number of estimated Backlog is below the threshold, the reader adjusts the

frame-size without grouping the unread tags. After each read cycle, the reader estimates

the number of unread tags and adjusts its frame-size. This procedure repeats until all the

tags are read (Lee et al., 2005b; Lee and Lee, 2006).

Table 3.5 shows the derived rule for tag grouping of EDFSA method. The table

demonstrates that if the number of estimated unread tags is equal to or less than 354

tags, the EDFSA algorithm will not split tag into group. However, according to the rule,

if there are more than 354 tags remaining in the interrogation zone, the EDFSA algorithm

will split unread tags into groups. For instance, if there are 1245 estimated remaining

tags, the EDFSA algorithm will divide tag into four groups (refer to the rule in Table 3.5).

The problem with EDFSA method is that it assumes that 256 is the optimal frame-size

and splits tags into group by using the power of two (2,4,8...). This results in decreased

system efficiency when the number of tags is just above the threshold and the number of

group doubled.

3.4.4 Other ALOHA-Based Methods

There has been a number of methodologies proposed to improve the performance efficiency

of ALOHA-based anti-collision methods. This includes partitioning algorithms (Shin and

Kim, 2007; Kim, 2008), which have claimed to have had higher efficiency than the EDFSA

approach, but lacks signaling robustness. Despite the wide array of approaches, only the

BFSA, DFSA and EDFSA methods (Klair et al., 2010; Cheng and Jin, 2007) are com-

45

Page 72: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

Table 3.5: EDFSA Rule - The number of unread tags, optimal frame-size, and number ofgroup

The number of unread tags Frame-Size Group.... .... ....

708 to 1416 256 4355 to 707 256 2177 to 354 256 182 to 176 128 141 to 81 64 120 to 40 32 112 to 19 16 16 to 11 8 1

.... .... ....

monly used for comparative analysis in past literature. Additionally, Backlog estimation

approaches have also been a popular research topic in this domain.

3.4.5 Backlog Estimation Techniques

In order to predict accurate number of unread tags and to determine the new frame-

size for the next identification round, BFSA, DFSA, and EDFSA algorithms gather and

use information such as number of successful slots, empty slots, and collision slots from

previous round. There have been several other methods mentioned in literature related

to Backlog estimation, including Schoute method (Schoute, 1983), Lowerbound method,

Chen1 and Chen2 methods (Chen, 2006), Vogt method (Vogt, 2002), and Bayesian method

(Floerkemeier, 2007). Some of these methods are either having worse performances than

simple Schoute and Lowerbound methods, or are too complicated to be implemented for

RFID system. These methods are explained as follows:

3.4.5.1 Schoute Backlog Estimation Technique

Schoute (1983) developed a Backlog estimation technique for Dynamic Framed-Slotted

ALOHA using Poisson distribution. The Backlog, after the current frame Bt, is given by

equation:

Bt = 2.39× c

Where c represents the number of collided slot in the current frame, and Bt represents the

remaining Backlog. This technique has the best performance where fewest frames were

used, compared with other algorithms.

Schoute method is the simplest, easy to implement with low overhead computation,

and provides accurate tag estimation.

46

Page 73: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.4. PROBABILISTIC ANTI-COLLISION PROTOCOLS

3.4.5.2 Lowerbound Backlog Estimation Technique

The Lowerbound estimation function is obtained under the assumption that a collision

involves at least two different tags. Therefore, Backlog after the current frame Bt is

defined by equation:

Bt = 2× c

Where c is the number of collided slot in the current frame, and Bt represents the

remaining Backlog.

Lowerbound method is also simple, easy to implement with low overhead computation,

and provides accurate tag estimation.

3.4.5.3 Chen1 and Chen2 Estimation Techniques

Most of the static algorithms estimate the Backlog with the number of collided slot.

However, Chen1 method (Chen, 2006) estimates the Backlog, based on the empty slot

information, through the probability of finding h empty slots after completing a frame.

Chen2 method (Chen, 2006) is a simpler way to estimate the number of tags, which is

illustrated by the following equation:

n = (L− 1)× s

h

Where n is the number of Backlog, L is frame length, s is the number of successful slots,

and h is the number of empty slots. If h = 0, n is set to a certain upper bound for the

tag’s estimate.

According to Wang et al. (2007), Chen1 and Chen2 methods have worse performances

than simple Schoute method. Chen1 method also requires complex computation, which

leads to high overhead and delays the tag identification process.

3.4.5.4 Vogt Estimation Techniques

In (Vogt, 2002), a procedure to estimate Backlog is presented by minimising the difference

between the observed value, including number of empty slot h, successful slot s, collision

slot c, and the expected value E(H), E(S), E(C). In order to find the comparative precise

Backlog, the reader needs to resolve the equation below:

47

Page 74: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

min

h

s

c

− EN (H)

EN (S)

EN (C)

Vogt method presents the most accurate tag estimation. However, the complexity of

the algorithm resulted in high overhead and therefore cannot be applied to EPC Gen2

protocol (Lee et al., 2008b).

3.4.5.5 Bayesian Estimation Techniques

Bayesian method (Floerkemeier, 2007; Wu and Zeng, 2010) first computes the frame size

L, based on the current probability distribution of the random variable N that represents

the number of tags transmitting. Then it starts frame with L slots, waits for tag replies,

and updates probability distribution of N, based on evidence from the reader at the end

of the frame. The evidence comprises the number of empty slots, successful slots, and

collision slots in the last frame. The method then adjusts probability distribution N by

considering newly arrived tags and departing tags, including the ones that successfully

replied and did not transmit in subsequent slots. Bayesian method requires the most

complex computation and implementation of algorithm. This results in high overhead

and therefore delays the identification process.

3.5 Discussion

In this section, we analyse the shortcomings of existing data stream filtering and anti-

collision methods. We also identify research issues, and outline the research problems

being investigated in this thesis.

3.5.1 Limitations of Existing Methods

There are approaches previously discussed that can be applied to handle unreliable reads,

noises and duplications. However, many challenges remained for missed reads, which is the

most crucial issue in RFID applications, and is the hardest to identify and filtered. Filling

in dropped readings is one way to alter missed reads, but it is easier to fix the error from

the source where data is missing in the first place. The cause of these missed reads is the

RF collision, which occurs when two or more tags attempt to respond to a reader at the

same time. To solve RF collision problem, several anti-collision protocols are proposed in

the literature. However, these approaches still suffer from performance inefficiency, high

delay in identification time, and overhead computation of algorithms.

48

Page 75: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.5. DISCUSSION

3.5.1.1 Limitation on Data Stream Filtering Techniques

Literature surveys on unreliable reads demonstrate that, if physical equipment including

tags, readers, and antennas are set up accordingly, the unreliable reads can be avoided in

most cases. The environmental selection for the RFID hardware deployment is also very

crucial to minimise the fault readings.

Noise readings can be simply filtered by scheduling a specific sliding window, which

expires over a certain time. If the count of a certain tag falls below the threshold, it is safe

to assume that the tag is outside the normal reading zone and is accidentally captured by

the reader.

Duplication at reader level can be avoided using the algorithm that identified the

unnecessary readers, and disabled them to minimise the number of reader within one

reading zone. In addition, duplication at data level can be filtered using several techniques

proposed in literatures. For instance, if the same set of tags are captured several times

within a specific time-frame, it is safe to assume that these tags are redundant and must

be removed.

As for missed reads, which is the most critical issue in RFID applications, several

techniques have been proposed to surrogate the missing data. However, it is preferred

that the missed read does not occur from the beginning. The common cause of missed

reads is the RF collision, which can be solved by applying anti-collision protocols to

prevent two or more tags from communicating to a reader at the same time. The two

types of tag anti-collision algorithms accepted and widely used in RFID systems are the

tree-based anti-collision, and the ALOHA-based anti-collision techniques.

3.5.1.2 Limitation on Tree-based Anti-Collision Techniques

There are several tree-based anti-collision techniques that can effectively prevent tag col-

lisions. Most memory anti-collision algorithms including “Binary Search”, “Bit Arbitra-

tion”, and “Tree Splitting”, require higher computational complexity compared with the

memoryless “Query Tree”. Nevertheless, some techniques from QT category still have

drawbacks and limitations, as described below:

• “Query Tree” protocols suffer from a long identification delay in the case where there

are a large number of tags within an interrogation zone. The delay is also caused

by similarity of ID and mobility of tags, where tags are not static (stay at the same

spot at all time).

• “Adaptive Query Splitting” technique introduces more complexity than QT because

information on last identification must be kept, in order to accelerate identification

process. This technique also requires tags to support both the transmission and

49

Page 76: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

reception at the same time, thereby making it difficult to apply to low-cost passive

RFID systems.

• “Hybrid Query Tree” reduces collision cycles by querying 2-bits of prefixes for each

loop instead of 1-bit as in QT. However, it produces even more idle cycles than QT

because at one level it generates 4-leaf nodes, especially if there are not many tags

in the interrogation zone.

• There is a basic Idle cycles elimination (slotted back-off tag response mechanism)

for HQT, but this requires more time and memory. The extended version of HQT

also requires extra memory since it mimics the AQS based for last identification

information to be kept. However, HQT is better than QT in reducing collision

between tags, especially at higher number of tags.

3.5.1.3 Limitation on ALOHA-based Anti-Collision Techniques

ALOHA-based anti-collision technique is the most widely used type of anti-collision within

the probabilistic category. The earlier type of ALOHA anti-collision such as “Pure

ALOHA” and “Slotted ALOHA” performe poorly, while the more advanced “Framed-

Slotted ALOHA” has better performance. However, some techniques from Framed-Slotted

ALOHA category still have drawbacks and limitations, as described below:

• “Basic Framed-Slotted ALOHA” has the worst performance compared with other

Framed-Slotted ALOHA methods. This approach suffer from inaccurate frame-size

for each round of identification because it uses fixed frame-size. Therefore, the

system’s efficiency drops significantly in the event of there being too large or too

small tag counts.

• “Dynamic Framed-Slotted ALOHA” suffers from different level of insufficiency, de-

pending on frame-size prediction technique applied. If the number of unread tags are

not estimated accurately, correct frame-size cannot be determined to maximise the

system efficiency or minimise the tag collision probability. Thus, the performance of

DFSA depends highly on the selection of frame-size estimation technique.

• “Enhanced Dynamic Framed-Slotted ALOHA” assumes that the optimal frame-size

is fixed to 256. The number of group in EDFSA increases, using the power of two

(2,4,8...), which results in decreased system efficiency when the number of tags is

just above the threshold, and the number of group doubled-up.

• Current “Backlog Estimation” methods suffer from low performances or are too

complicated to be implemented for RFID system. Schoute’s method is the simplest,

easy to implement with low overhead computation, and provides accurate tag es-

timation. Other Backlog Estimation methods such as Chen1 and Chen2 methods,

50

Page 77: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

3.5. DISCUSSION

Vogt method, and Bayesian method, have good simulated performance but cannot

be realistically applied to the actual passive RFID system. Specifically, the Bayesian

method requires the most complex computation and implementation of algorithm.

Overall, the literature review on current state-of-the-art techniques demonstrates that

some of the existing techniques are inefficient, while other methods are too complex with

high overhead cost of implementation. Some approaches cannot be further improved but

we can take advantage of other constraints, to improve their capability. For instance, a

basic tree-based methods such as QT (2-ary) and HQT (4-ary) are the best naive tree-

based methods but cannot be improved any further, in terms of simplicity, without the

need for complex algorithm. Thus, we need to take advantage of other constraints such as

EPC pattern, and a possible use of a combination of two trees, in order to improve memory

and power efficiency. Additionally, for probabilistic anti-collision, the DFSA method is

the simplest and most accurate method. However, in this case, to keep the simplicity of

the DFSA algorithm, only frame-size prediction scheme can be further improved.

3.5.2 Research Problem

It remains an open problem to find optimal solutions, to improve performance of the cur-

rent RFID anti-collision techniques. Two main goals for both tree-based deterministic and

ALOHA-based probabilistic anti-collision methods are to achieve the maximum efficiency

and to minimise identification time and resource wasted during the identification process.

Structuring anti-collision methods in RFID system is extremely important because it is a

step that determines the effectiveness and the overall quality of data captured.

In this thesis, the research problem is to investigate a suitable structure of tree-based

deterministic and ALOHA-based probabilistic anti-collision approaches such that new

efficient methods can be developed to improve performance of anti-collision technique in

RFID system. Given the limited resources of RFID components including the readers

and the tags, it is important to develop the anti-collision method that minimises power

and memory usage in the RFID reader, and to simplify the structure of algorithm so that

identification time can be minimised.

There are two main constraints in developing effective anti-collision algorithms. These

include limited power source from RFID reader and limited memory in both readers and

tags. By constructing complex anti-collision algorithms, high memory capacity and power

sources are needed, which is impractical in RFID system. Therefore, our aim is to de-

velop anti-collision schemes that are simple, with low overhead computation, and perform

effectively, compared with existing techniques.

To address our research problem, we compare our newly proposed methods to specific

existing approaches, which have simple algorithm structure, high robustness, and accom-

plished high performance with minimum time requirement. We also compare our proposed

51

Page 78: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 3. RFID DATA STREAMS MANAGEMENT TECHNIQUES

tree-based method and ALOHA-based method, and analyse the benefit and detriment

of both methods toward different circumstances. Additionally, we introduced two novel

conceptual selective technique management, to employ the correct type of anti-collision

algorithm for specific scenario.

3.6 Summary

In this chapter, we have investigated different types of data stream errors including du-

plication, noise, unreliable reads, and missed reads. Particular attention was given to the

filtering of missed reads, which is the most crucial type of data stream error, mainly caused

by collision. We first described existing data stream filtering methods and anti-collision

methods, and categorised them into different classes. We then discovered and analysed

the shortcoming and limitations of these methods. Furthermore, we identified interest-

ing research issues concerning tag anti-collisions for RFID data stream. These research

problems are then addressed in this thesis.

The next three chapters describe a detailed investigation of tree-based and ALOHA-

based anti-collision, and the selective technique management.

52

Page 79: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4Deterministic Anti-Collision Approaches

In this chapter, we tackle problems on existing deterministic tree-based anti-collision

schemes including the amount of identification cycles produced and total memories used

during the identification process. We introduce two main methods derived from the fun-

damental of tree-based anti-collision protocols; 1) a Unified Q-ary Tree (Pupunwiwat and

Stantic, 2009a), (Pupunwiwat and Stantic, 2009b) and 2) a Joined Q-ary Tree (Pupunwi-

wat and Stantic, 2010c) with the intended goal to minimise memory usage queried by the

RFID reader. As mentioned in literature, most implementation of Tree-based algorithms

are deployed with older type of EPC class 1, which has limited memory and capability.

Although recent technology uses ALOHA-based anti-collision algorithms rather than the

Tree-based, we decided to improve the Tree-based approach with simple implementation

in order to suit the backward compatibility for older RFID systems. The remaining of

this chapter comprises the explanation on different types of EPC encoding schemes, the

typical scenarios discussion, the Splitting Fitness justification, the foundation of Unified

Q-ary Tree and Joined Q-ary Tree, and the experimentation evaluations.

4.1 EPC Encoding Schemes Analysis

There are many types of encoding schemes compatible with RFID passive tags. The most

common type of encoding is the General Identifier 96 bits scheme, which is independent of

any existing identity specification or convention and can be used in most events. There are

also different types of encoding designed specifically for special instances such as Serialised

Global Trade Item (SGTIN) 96 bits, which permit the direct embedding of GS1 System

53

Page 80: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

standard GTIN and serial number codes on EPC tags (EPCGlobal, 2008). In this thesis,

we observe three different types of encoding schemes and conduct experiments to find

impacts of each type of encoding. For the main part of our methodology, we use General

Identifier as our major encoding scheme since it is the most general form of encoding. We

select the other two encoding schemes based on their bit lengths and number of fields.

The three chosen encoding schemes are explained in the following subsections.

4.1.1 General Identifier 96 Bits

The General Identifier (GID) is defined for a 96-bit EPC, and is independent of any

existing identity specification or convention. In addition to the Header which guarantees

uniqueness of the encoding type, the General Identifier is composed of three fields; the

General Manager Number (GMN), Object Class (OC) and Serial Number (SN), as shown

in Table 4.1.

Table 4.1: The GID-96 includes three fields in addition to the Header, with a total of96-bits binary value. Only ‘H’ is shown in Binary, while the rest are shown in Decimal

GID-96 Bit Max.Decimal/BinaryHeader (H) 8 0011 0101

General Manager Number (GMN) 28 268,435,455Object Class (OC) 24 16,777,215

Serial Number (SN) 36 68,719,476,735

Table 4.1 shows an example of GID-96 EPC generation 2 encoding scheme. The

general structure of EPC tag encodings is a string of bits, consisting of a fixed length

(8-bit) Header followed by a series of numeric fields whose overall length, structure, and

function are completely determined by the Header value. There are four major fields in

the GID-96 bits.

Table 4.2: The SGTIN-96 includes six fields with a total of 96-bits binary value. Only ‘H’is shown in Binary, while the rest are shown in Decimal

SGTIN-96 Bit Max.Decimal/BinaryHeader (H) 8 0011 0000

Filter Value (FV) 3 Various depend on type000, 001, 010, 011, 100, 101, or 110

Partition (PT) 3 Various depend on typeRefer to Table 4.3

Company Prefix (CP) 20 - 40 999,999 - 999,999,999,999Item Reference (IR) 24 - 4 9,999,999 - 9Serial Number (SN) 38 274,877,906,943

4.1.2 Serialised Global Trade Item Number 96 Bits

The EPC tag encoding scheme for Serialised Global Trade Item Number (SGTIN) permits

the direct embedding of GS1 System standard GTIN and serial number codes on EPC tags.

54

Page 81: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.1. EPC ENCODING SCHEMES ANALYSIS

In addition to a Header, the SGTIN-96 is composed of five fields: the Filter Value (FV),

Partition Value (PV), Company Prefix (CP), Item Reference (IR), and Serial Number

(SN), as shown in Table 4.2.

Table 4.2 shows an example of SGTIN-96 EPC generation 2 encoding scheme. The

general structure of EPC tag encodings is a string of bits, with a Header in binary value

of 0011 0000. The FV is not part of the SGTIN pure identity but is an additional data

that is used for fast filtering of basic logistics types. The available values of PV and the

corresponding sizes of the CP and IR fields are defined in Table 4.3. The CP contains

a literal embedding of the GS1 company prefix and the IR contains a literal embedding

of the GTIN item reference number. Finally, the SN contains a unique serial number of

each individual item being tagged by the RFID passive tag.

Table 4.3: SGTIN-96 and GIAI-96 Partitions in bitsPartition Company Prefix Item Reference Individual Asset Reference

(PT) (CP) (IR) - SGTIN96 (IAR) - GIAI-96000 40 4 42001 37 7 45010 34 10 48011 30 14 52100 27 17 55101 24 20 58110 20 24 62

Table 4.3 shows a SGTIN-96 bits and GIAI-96 (explained in the next subsection)

partition values. The Partition is an indication of where the subsequent CP and IR or

IAR are divided.

4.1.3 Global Individual Asset Identifier 96 Bits

The EPC tag encoding scheme for Global Individual Asset Identifier (GIAI) permits the

direct embedding of GS1 System standard GIAI codes on EPC tags. In addition to a

Header, the EPC GIAI-96 is composed of four fields: the FV, PV, CP, and Individual

Asset Reference (IAR), as shown in Table 4.4.

Table 4.4: The GIAI-96 includes five fields with a total of 96-bits binary value. Only ‘H’is shown in Binary, while the rest are shown in Decimal

GIAI-96 Bit Max.Decimal/BinaryHeader (H) 8 0011 0100

Filter Value (FV) 3 Various depend on type000, 001, 010, 011, 100, 101, or 110

Partition (PT) 3 Various depend on typeRefer to Table 4.3

Company Prefix (CP) 20 - 40 999,999 - 999,999,999,999Individual AssetReference (IAR) 62 - 42 4,611,686,018,427,387,903 - 4,398,046,511,103

55

Page 82: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

Table 4.4 shows an example of GIAI-96 EPC generation 2 encoding scheme. The

general structure of EPC tag encodings is a string of bits, with a Header in binary value

of 0011 0100. The FV is not part of the GIAI pure identity but is an additional data

that is used for pre-selection of basic logistics types. The available values of PV and

the corresponding sizes of the CP and IAR numbers are defined in Table 4.3. The CP

contains a literal embedding of the GS1 company prefix and the IAR is a mandatory

unique number for each individual instance.

The difference between the SGTIN-96 bits and the GIAI-96 bits is that the GIAI-

96 contains one less field compared with SGTIN-96, since it uses only IAR as a unique

identifier instead of IR and SN. Thus, we chose the two encoding schemes for our experi-

mentation evaluation to see if there is any impact on our proposed tree-based anti-collision

methods. For the remaining of this chapter, all samples and methodology clarification will

use GID-96 bits encoding scheme, and the SGTIN-96 bits and the GIAI-96 bits will be

used in our experiment.

4.2 Warehouse Distribution Scenarios

In this chapter, we are examining specific scenarios based on the assumption that items

tend to move and stay together through different locations especially in a large warehouse.

We focus on Crystal warehouse scenario using GID-96 bits encoding scheme, which can be

classified into four different scenarios: 1) Unique Item-Level, 2) Unique Container-Level,

3) Unique Company-Level, and 4) Unique Warehouse-Level.

Figure 4.1: Crystal Warehouse Scenario: a) Unique Item-Level, b) Unique Container-Level, c) Unique Company-Level, and d) Unique Warehouse-level

4.2.1 Unique Item-Level Scenario

This scenario occurs when two collided tags (GID-96 encoding) are captured and they have

the same Encoding Scheme/Header (=), same GMN (=), same OC (=), but different SN

56

Page 83: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.2. WAREHOUSE DISTRIBUTION SCENARIOS

( 6=). We can assume that all items are from the same warehouse that uses the same

encoding scheme throughout the warehouse, and the warehouse also keeps different kind

of products from different companies.

Figure 4.1 illustrates a sample Crystal warehouse scenario where:

a) Unique Item-Level: Two containers of crystal red-wine have the same Header (=),

GMN (=), and OC (=), but different SN (6=)

b) Unique Container-Level: Crystal white-wine and crystal red-wine containers have

the same Header (=) and GMN (=), but different OC ( 6=) and SN (6=)

c) Unique Company-Level: Crystal white-wine and crystal plate containers have the

same Header (=), but different GMN ( 6=), OC (6=), and SN (6=)

d) Unique Warehouse-level: Crystal plate and plastic plate containers have different

Header ( 6=), GMN (6=), OC (6=), and SN (6=)

As for Unique Item-Level circumstance, by using the Crystal warehouse scenario ex-

ample from Figure 4.1a), it can be seen that two collided tags are captured with the same

Encoding Scheme, General Manager Number, and Object Class. We believe that both tags

are each attached to two different cases of red-wine.

4.2.2 Unique Container-Level Scenario

The Unique Container-Level Scenario takes place when two collided tags are captured and

they have the same Header (=), same GMN (=), different OC (6=), and different SN (6=).

Figure 4.1b) shows that crystal red-wine glasses and crystal white-wine glasses are packed

in different case and pallet because they are different type of wine glasses. Within this

scenario, each case of wine glasses will have a unique SN attached to it, with different OC

for each pallet of white-wine or red-wine.

4.2.3 Unique Company-Level Scenario

The Unique Company-Level Scenario is illustrated in Figure 4.1c). Two collided tags are

captured and they have the same Header (=), and unique GMN ( 6=), OC (6=), and SN (6=).

We believe that one tag is attached to crystal plate case, while the other tag is attached

to white-wine case. We can assume that there are two different companies producing

separate crystal ware; and the wine glasses and plates are from different companies but

share the same warehouse because they are both crystal.

57

Page 84: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

4.2.4 Unique Warehouse-Level Scenario

Unique Warehouse-Level Scenario occurs when two collided tags are captured and they

have different Header ( 6=), GMN (6=), OC (6=), and SN (6=). We can assume that all items

are from different companies that use different encoding schemes. For example, Figure

4.1d) shows that two wine glasses with different sculpture, one made from crystal and the

other from plastic, are allocated in the same warehouse. This Unique Warehouse-Level

scenario will not be discussed any further in this chapter because we are only looking at a

large warehouse distribution where most items move together as a group. Therefore, most

items from the same type of manufacturing will stick together until they are deployed to

smaller retailer.

4.3 Splitting Fitness

Splitting Fitness is the measurement level for the performance of our proposed tree-based

anti-collision methods. Splitting Fitness can be classified into Worst-Case splitting, Per-

fect splitting, and Random splitting. All three cases are discussed in the following subsec-

tions.

Figure 4.2: Splitting Fitness: a) Worst-Case Splitting, b) Perfect Splitting, and c) RandomSplitting

4.3.1 Worst-Case Splitting

Worst-Case splitting is when tags spliced into an unbalanced tree, where one child node

has no further node in a binary tree case. Figure 4.2a) shows that there are 16 tags at

Level 0 tree; then at Level 1, tags spliced into 16 tags on the left-hand node and no tag

on the right-hand node. As there is no tag left, no further splitting is necessary on the

right-hand node. This case of splitting will likely happen for the first few bits of EPC

identification in real world warehouse environment because most items have Massive tag

movement and usually belong to the same EPC pattern with similar ID. The Worst-Case

58

Page 85: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.3. SPLITTING FITNESS

splitting caused more Idle cycles because all tags will be traveling down to only one side

of the tree, which results in further collision.

4.3.2 Perfect Splitting

Perfect splitting happens when a set of tags spliced to the left and right child node equally.

Figure 4.2b) shows that there are 16 tags at Level 0 tree; then at Level 1, tags spliced

equally into 8 nodes. Further splitting is required for both left-hand and right-hand

nodes until only one tag is left. This case of splitting is almost impossible in real world

scenario but will be the closest case to the latter stages (bits) of EPC identification within

warehouse environment because most items belong to the same group of EPC pattern. For

example, one pallet of white-wine glasses containing 20 cases move into one interrogation

zone. All items from the pallet will have the same OC and will travel along the same side

of child node at earlier levels; resulting in Worst-Case Splitting. However, the remaining

few bits will be unique for each EPC because they belong to SN. These remaining bits

encoded within the same EPC pattern will split almost equally to the left and right child

nodes. Both child nodes of left-hand side and right-hand side of binary tree will not be

exactly equal since data captured are not always even. Therefore, we call this situation

Partial-Perfect splitting.

Figure 4.3: A sample of 16 tags from the same pallet with the same Object Class and 16unique Serial Numbers

Figure 4.3 shows an example of warehouse environment tags splitting process. It can

be seen that there are 16 tags at the start; then at Level 1 to Level 3, all tags only move

down the left-hand child node while no tag moves down the right-hand node. We can

make the assumption that all of these tags have the same Header, same GMN, and same

OC. However, from Level 4 onward, tags start splitting into the left and right child nodes

59

Page 86: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

of binary tree, which means that the query reached unique bits of tags that are SN so the

EPC ID becomes similar but no longer identical. At Level 7, all 16 tags are successfully

identified. Note that this Figure only shows an ideal sample of the identification process.

However, in the real world scenarios, tags will most likely spliced into Partial-Perfect

splitting from Level 4 to Level 7.

4.3.3 Random Splitting

Random splitting happens when a set of tags spliced to the left and right child node

randomly and splitting pattern cannot be found. Figure 4.2c) shows that there are 16 tags

at Level 0 tree; then at Level 1, tags spliced into 5 and 11 tags. Further at Level 2, tags

spliced into 2, 3, 4, and 7 where no specific splitting pattern exists. Thus, this situation

is called Random Splitting, which will likely happen in retail distribution environments

(belong to Unique Warehouse-Level Scenario) because all items usually come from different

locations. Therefore, this splitting case will not be further discussed as this chapter will

only focus on warehouse environment.

4.4 Unified Q-ary Tree

Instead of using a plain Q-ary tree, which uses every 1 (2-ary), 2 (4-ary), 3 (8-ary), or 4 (16-

ary) bits of tag ID to split a tag set, we propose a “Unified Q-ary Tree” or a combination

of two Q-ary trees (12 combinations), which can reduce more collision and at the same

time, memory usage can be minimised. For example, we can combine 4-ary tree with 8-ary

tree and apply this anti-collision to 96-bits EPC where the challenge is to configure the

right partition, so that 4-ary tree can be applied to the first half bits of EPC and 8-ary

tree can be applied to the remaining bits.

The remainder of this section will focus on two approaches: 1) a Naive approach,

where Q-ary tree is non-unified and only a single Q-ary tree is used as an anti-collision;

and 2) a Unified approach, where two Q-ary trees are combined as an anti-collision with

12 possible combinations.

4.4.1 Unified Q-ary Tree Fundamental

Our proposed Unified Q-ary Tree combined 2-ary, 4-ary, 8-ary, and 16-ary tree together

with 12 possible combinations. This approach will be applied on each collided tags EPC,

which will be split using every 1, 2, 3, or 4-bits of tag ID for the first few queries; and then

at one point every 1, 2, 3, or 4-bits will be queried. With the fact that most items from a

warehouse have bulky movement, the first few bits of EPC will be identical. Based on the

GID-96 bits encoding scheme, the first 8-bits of EPC are Header, which will be the same

for all items using the same encoding and they usually came from the same company and

60

Page 87: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.4. UNIFIED Q-ARY TREE

in the same pallet. These 8-bits of EPC can be bypassed faster using 4-ary tree instead

of 2-ary tree but by doing so, too many Idle cycles will be produced. By using 4-ary tree

instead of 2-ary tree, the Number of bits needed for each query also accumulates faster.

Thus, we need to optimise the performance of Unified Q-ary Tree by configuring the right

separating point between the two Q-ary trees. The objective of Unified Q-ary tree is

to maintain the minimal number of cycles, and to minimise the Number of bits used for

querying all tags within an interrogation zone in order to improve the overall identification

time. Figure 4.4 shows the example of the Naive 4-ary tree (4.4a) and the Unified 4-ary

& 8-ary tree (4.4b).

Figure 4.4: A sample of: a) Naive 4-ary Tree, and b) Unified 4-ary & 8-ary Tree

Table 4.5: The Unified Q-ary Tree can be merged into twelve different combinations. 1, 2,3, and 4 represent the Number of bits queries each time for splitting tags when collisionoccurred

2-ary 4-ary 8-ary 16-aryF S F S F S F S

2-ary - 2 1 3 1 4 14-ary 1 2 - 3 2 4 28-ary 1 3 2 3 - 4 316-ary 1 4 2 4 3 4 -

For Number of cycles and Number of bits computation purposes, let ‘F’ be the first

half of EPC where bits are identical; and let ‘S’ be the second half of EPC where bits

are unique. Table 4.5 shows possible combinations between four of the Q-ary trees; 2-ary,

4-ary, 8-ary, and 16-ary.

4.4.2 Computation of Naive approach and Unified approach

To observe the difference between the processes of the Naive approach versus the Unified

approach, we initiate a computational process between the two approaches using two Naive

and two Unified Q-ary Trees as an example. The Naive 2-ary tree, Naive 4-ary tree, Unified

2-ary & 4-ary tree, and Unified 4-ary & 2-ary tree, are selected for the sample case.

61

Page 88: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

Figure 4.5 shows a comparison between Unified approach (2-ary & 4-ary, 4-ary & 2-

ary) and Naive approach (4-ary, 2-ary) on the five EPC data. We can see that the Naive

4-ary tree has the shortest level of tree; however, by examining Table 4.7, 4-ary tree does

not have the lowest Total number of bits. This proves that levels of tree have an impact

on the Total number of bits and Overall cycles, but does not necessarily result in the best

performance of tree.

Figure 4.5: Identification processes of: a) Naive 2-ary Tree, b) Naive 4-ary Tree, c) Unified2-ary & 4-ary Tree, and d) Unified 4-ary & 2-ary Tree,

In order to calculate a Total number of bits required for the whole identification process,

information on Number of Child Nodes (NCN) for each level of tree and Number of Bits

per Query (NBQ) for that specific level is needed. Number of Bits per Level (NBL) can

be calculated as follows:

62

Page 89: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.4. UNIFIED Q-ARY TREE

NBL = NCN ×NBQ (4.1)

Table 4.6: Calculation of Total memory bits required for two Naive and two Unified Q-aryTrees. TNBL shows the Total Number of Bits required for the specific Q-ary Tree

Level 2 2, 4 4, 2 41 2 2 8 82 4 4 16 163 6 6 24 244 8 8 32 325 10 10 18 406 12 12 40 487 14 14 22 -8 16 16 24 -9 18 40 - -10 40 48 - -11 22 - - -12 24 - - -

TNBL 176 160 184 168

After calculating the NBL for each level of tree, the Total number of bits (TNBL)

required can be found by doing the summation of all NBL. For example, in Figure 4.5a) it

can be seen that the tree has twelve levels where all levels, except Level 10, have two child

nodes each. For each Level, NBQ increased by 1-bit since this is a Naive 2-ary tree. Thus,

NBL for each level are (NCN x NBQ): 2 or (2x1), 4 or (2x2), 6 or (2x3), 8 or (2x4), 10 or

(2x5), 12 or (2x6), 14 or (2x7), 16 or (2x8), 18 or (2x9), 40 or (4x10), 22 or (2x11), 24 or

(2x12) respectively. After adding all NBL together, the TNBL of 176-bits is as shown in

Table 4.6.

Table 4.7: Sample Outcomes for 5 tags identification using Naive and Unified approachesCombination 2 2, 4 4, 2 4

Collision Cycles (F) 8 8 4 4Collision Cycles (S) 4 1 4 1

Total Collision Cycles 12 9 8 5Idle Cycles (F) 8 8 12 12Idle Cycles (S) 1 2 1 2

Total Idle Cycles 9 10 13 14Successful Cycles (F) 0 0 0 0Successful Cycles (S) 5 5 5 5

Total Successful Cycles 5 5 5 5Overall Cycles 26 24 26 24

Number of bits (F) 72 72 80 80Number of bits (S) 104 88 104 88

Total number of bits 176 160 184 168

Table 4.7 shows that both Naive 2-ary tree and Unified 4-ary & 2-ary tree have the

same number of Overall cycles. However, the Total number of bits for the two approaches

63

Page 90: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

is different. The same goes with Naive 4-ary tree and Unified 2-ary & 4-ary tree where

Overall cycles are the same but have a different Total number of bits. As for the impact

of EPC data, we can see that when EPC IDs are identical (bit 1-8), the 2-ary tree works

better since it uses less Number of bits than the 4-ary tree. This difference cannot be

seen without calculating a proper Total number of bits because for the ‘F’, both 2-ary and

4-ary trees have the same number of Collision cycles and Idle cycles. However, for each

of these cycles, different Number of bits is used for querying, thus 4-ary tree uses more

bits than 2-ary tree. For ‘S’, 4-ary tree uses less Number of bits than 2-ary tree since the

number of Collision cycles happened more in 2-ary tree. Although a 4-ary tree produces

more Idle cycles than 2-ary tree in the ‘S’, it still produces less total number of Collision

cycles and Idle cycles. We can now assume that for Identical bits of EPC, lower level tree

(2-ary) can perform better than the higher level (4-ary) and for Unique bits of EPC, a

higher level tree is more suitable.

4.4.3 Experimental Evaluation

In order to show the significance of our proposed Unified Q-ary Tree methods, we con-

ducted three experimental evaluations and compared our methods with existing tech-

niques. There are three major data sets in the experiments. We performed ten runs on

each test case and presented the average results.

4.4.3.1 Environment

To study the proposed Unified Q-ary Tree method, all experiments are performed accord-

ing to a Crystal warehouse scenario. The experiments are assumed to be set up in a well

controlled environment where there is no metal or water nearby. We randomly generate all

data sets with assumptions that a UHF RFID reader is used and mounted on a dock door

at the end of a conveyor belt. Passive RFID tags are attached to each case of crystal ware.

Each pallet of wine glasses, plates, and bowls are moved along this conveyor belt. At this

stage, we assume that all pallets move in and out at the same time to an interrogation

zone, and no arriving tag or leaving tags are present during each identification round.

4.4.3.2 Experiment One Data sets

For the first experiment, the impact of different number of tags in an interrogation zone

is examined. The aim of this experiment is to find the best and the worst performance

of Q-ary tree for specific set of tags; therefore, only four Naive Q-ary trees are examined.

There are four test cases used in this experiment:

• Test case A: 2 pallets, 24 cases each, total 48 tags

• Test case B: 4 pallets, 24 cases each, total 96 tags

64

Page 91: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.4. UNIFIED Q-ARY TREE

Figure 4.6: Level-Packaging: a) a case with 6 glasses, and b) a pallet with 27 cases

• Test case C: 6 pallets, 24 cases each, total 144 tags

• Test case D: 8 pallets, 24 cases each, total 192 tags

4.4.3.3 Experiment Two Data sets

In experiment two, the impact of Separating Point for a specific set of tags is examined.

The aim of this experiment is to find the best and the worst performance of the Naive

and Unified Q-ary Tree under different Separating Point. Thus, number of tags in an

interrogation zone is fixed to 192 tags (8 pallets of 24 cases each). There are three test

cases used in this experiment:

• Test case A: ‘F’ = 36 bits and ‘S’ = 60 bits

• Test case B: ‘F’ = 60 bits and ‘S’ = 36 bits

• Test case C: ‘F’ = 88 bits and ‘S’ = 8 bits

4.4.3.4 Experiment Three Data sets

After we identified the best Q-ary trees from the two experiments, the aim of the third

experiment is to compare the performance of the best Unified Q-ary Tree versus the Naive

Q-ary Tree. Results presented in this experiment are related to the Unique Item-Level

scenario mentioned earlier in Section 4.2. For the data set, there are 81 tags/EPC used

in this experiment. Each tag contains 60 Identical bits for ‘F’ and 36 Unique bits for ‘S’.

Each pallet contains 27 tags (See Figure 4.6) and three pallets are assumed to be visible

to the reader each time. We applied two Naive approaches, 2-ary and 4-ary trees, to the

data set with no partition. On the other hand, we applied Unified approaches to the data

set using ‘x’ = 60 and ‘y’ = 36 based on the nature of Unique Item-Level scenario where

the first 60-bits are identical.

65

Page 92: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

Figure 4.7: Performances of Naive Q-ary Trees on different set of tags

Figure 4.6 displays a level-packaging, where each case contains 6 glasses and each

pallet contains 27 cases. Each case has different Serial Number and same Object Class if

in the same pallet. For our experiment, three of these pallets will be visible to the reader

attached to the dock’s door next to the conveyor belt.

4.4.4 Results

This section presents the results and performance measurement of Unified Q-ary Tree.

These results are displayed as follows:

4.4.4.1 Experiment One Results

Based on the experiment simulation, Figure 4.7 shows the result of four Naive Q-ary Trees:

2-ary, 4-ary, 8-ary, and 16-ary, using four different data sets with specific number of tags.

From Figure 4.7, we can see that the Naive 4-ary tree requires the least Total memory

bits, while the Naive 16-ary tree requires the most, regardless of number of tags within an

interrogation zone. The Total memory bits increased, providing the increment of number

of tags although the best performance tree is still 4-ary tree. It can now be concluded

that the best performing tree out of the four Q-ary trees is 4-ary tree, while number of

tags within the interrogation zone have no impact on the performance.

66

Page 93: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.4. UNIFIED Q-ARY TREE

4.4.4.2 Experiment Two Results

Table 4.8 shows all results in Total memory bits required for the Naive and Unified Q-ary

trees. According to Table 4.8 and Figure 4.8, we can see that when the Separating Point

is between bit 36 and 37 (‘F’ = 36, ‘S’ = 60), a Unified 2-ary & 4-ary tree requires the

least Total memory bits, while the Naive 16-ary requires the most. This supports the

result from experiment one where the Naive 16-ary tree has the worst performance, and

the Naive 4-ary and the Naive 2-ary tree perform best respectively.

Table 4.8: This Table shows Total Memory Bits required for each Q-ary Tree for 192 tagsset identification

F=36, S=60 F=60, S=36 F=88, S=8Naive 2-ary 81792 81792 81792Naive 4-ary 71352 71352 71352Naive 8-ary 87696 87696 87696Naive 16-ary 120128 120128 1201282-ary & 4-ary 71316 71522 712982-ary & 8-ary 87156 86762 755302-ary & 16-ary 118580 115634 809144-ary & 2-ary 81828 81622 818464-ary & 8-ary 87192 86592 741124-ary & 16-ary 118616 115464 809688-ary & 2-ary 82332 82726 939588-ary & 4-ary 71856 72456 849368-ary & 16-ary 119120 116568 9736816-ary & 2-ary 83340 86286 12100616-ary & 4-ary 72864 76016 11051216-ary & 8-ary 88704 91256 110456

When the two trees, 2-ary and 4-ary are combined (Figure 4.8 Case e), the Total

memory bits required are slightly reduced from the Naive 4-ary and greatly reduced from

the Naive 2-ary tree. However, when combining and applying 4-ary tree on the ‘F’ and

2-ary tree on the ‘S’ (Figure 4.8 Case h), the Total memory bits are increased from the

Naive 2-ary and the Naive 4-ary tree. This happens because ‘F’ mostly engage Worst-Case

Splitting (Referred to 4.3), where a higher level tree produced more cycles in each level

than lower level tree. Thus, when applying 4-ary tree on the ‘F’, four nodes are produced

instead of two as in 2-ary tree; and three of the four nodes are Idle cycles which are waste

of resources and increase Number of bits required. On the contrary, by applying 4-ary

tree on the ‘S’, Number of bits required are less than 2-ary tree, which result in less Total

memory bits needed when combining 2-ary and 4-ary tree together.

The results of other Unified Q-ary Trees also show improvement to one of their Naive

methods. For example, Figure 4.8 Case k: 8-ary & 2-ary tree (82,332) outperformed the

Naive 8-ary tree (87,636) but did not outperformed the Naive 2-ary tree (81,792). The

same outcome also applied to other trees (Case f, g, i-p), which demonstrated that our

proposed Unifed Q-ary Trees contain significant improvement compared with the existing

anti-collision algorithms.

67

Page 94: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

Figure 4.8: Performances of sixteen combination of Q-ary Trees (4 Naive and 12 Unified)where F = 36 and S = 60

Table 4.8 also shows the performances of both Naive Q-ary Trees and Unified Q-ary

Trees where ‘F’ = 60 and ‘S’ = 36. It can be seen that the Naive 4-ary tree requires the

least Total memory bits out of the sixteen approaches. Both Unified 2-ary & 4-ary and

4-ary & 2-ary did not outperformed the Naive 4-ary since the Separating Point is different

between Test case A and Test case B. According to the test case applied, we know

that all data have the same Header and GMN, which are the first 36-bits of EPC only.

OC is different for each pallet, thus eight pallets requires eight different OC (Bit 37 to

Bit 60). The Separating Point of these results is between bit 60 and 61, which already

pass the OC. Therefore, a 2-ary tree requires higher Number of bits than 4-ary tree for ‘F’,

resulting in higher Total memory bits required when combining the two trees together.

The performances of both Naive Q-ary Trees and Unified Q-ary Trees, where ‘F’ = 88

and ‘S’ = 8, are displayed in Table 4.8. The result shows that the Unified 2-ary & 4-ary

tree requires the least Total memory bits, while a Unified 16-ary & 2-ary tree requires the

most. This is because after tags spliced into eight different pallets, the remaining bits of

EPC became identical again until almost the last few bits. Therefore, 2-ary tree requires

less Number of bits than 4-ary tree for ‘F’, resulting in less Total memory bits required for

the Unified 2-ary & 4-ary tree.

From experimental evaluation, we can now summarise that a Unified 2-ary & 4-ary

Tree performed the best overall by reducing the Total memory bits required, where it

68

Page 95: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.4. UNIFIED Q-ARY TREE

Figure 4.9: Results of two Naive approaches (2-ary, 4-ary) and two Unified approaches(2-ary & 4-ary, 4-ary & 2-ary) for number of Idle cycles, Collision cycles, Successful cycles,and Overall cycles

outperformed both of its Naive methods, which means that identification time can be

minimised.

4.4.4.3 Experiment Three Results

Figure 4.9 shows the average results, from ten runs, on all four combinations: Naive 2-ary,

Unified 2-ary & 4-ary, Unified 4-ary & 2-ary, and Naive 4-ary tree. From the figure, we

can see that the Naive 4-ary tree produced the most Idle cycles while the Naive 2-ary

tree produced the least. In contrast, the Naive 2-ary tree produced the most Collision

cycles while the Naive 4-ary tree produced the least. Both Naive 2-ary and Unified 4-ary

& 2-ary have the same total number of cycles, which corroborate our methodology. In

addition, the total number of cycles for Naive 4-ary tree and Unified 2-ary & 4-ary tree

are also equal. The total number of cycles can, at one point, clarify the performance of all

four methods. We notice that both Naive 4-ary tree and Unified 2-ary & 4-ary tree have

less total cycles than 2-ary and 4-ary & 2-ary. This means that the first two methods will

use less Number of bits in querying for all 81 tags than the other two. However, without

looking into the actual results of Number of bits, we still cannot conclude which of the two

methods will achieve the least identification time for querying.

Based on Figure 4.9, we are now aware that Successful cycles of all four methods are all

equal to 81, which means that all tags in the interrogation zone are 100 percent identified.

69

Page 96: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

Figure 4.10: Results of two Naive approaches (2-ary, 4-ary) and two Unified approaches(2-ary & 4-ary, 4-ary & 2-ary) for Number of bits queried for Idle cycles, Collision cycles,Successful cycles, and Overall cycles

We can also see that all 81 tags were recognised at the later stages, where all bits (bit

no. 61-82) are unique. As for Identical bits of Idle cycles and Collision cycles, the sum

of Idle cycles and Collision cycles have an outcome of 120 cycles, which means that both

methods of 2-ary or 4-ary tree have no impact in the sense of cycles count. However, as

mentioned earlier, we need to calculate the actual Number of bits in order to clarify the

difference of the performance of both methods. The next Figure (Figure 4.10) shows the

Number of bits for Idle cycles, Collision cycles, Successful cycles, and Overall cycles, of

each method.

Figure 4.10 shows all the actual bits for all queries that occur during tags identification.

It can be seen that the Unified 2-ary & 4-ary tree has the lowest Number of bits queried

for entire identification process. This verify our theory that by using a lower level tree

for Identical bits of EPC and higher level tree for Unique bits of EPC, Number of bits

queried can be minimised and identification process can be accelerated. There is not much

difference in results but we can assume that as the number of tags in an interrogation zone

increases, and when our proposed Joined Q-ary Tree (Section 4.5) is applied instead of

the Unified Q-ary Tree, we will be able to see more differences in the outcome.

For Identical bits of EPC, there is a slight difference between the Number of bits queried

by the four methods. While Figure 4.9 shows that there is no difference between total

number of cycles for Identical bits for all four methods, we can see clearly that the Total

70

Page 97: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.4. UNIFIED Q-ARY TREE

Figure 4.11: Performance Analysis of 2-ary Tree vs. 4-ary Tree on Unique bits of EPC,Bit 61 - 68, until all tags are identified. Results of Overall cycles are displayed

number of bits is different for each case in Figure 4.10. This is because each query inquired

each time issues different Number of bits. For example, 4-ary tree issues two extra bits

from the last query (from the parent node), while 2-ary tree only append one extra bit

to the last query. The Unified 2-ary & 4-ary tree performed the best overall and required

60 bits less than the Naive 4-ary tree, and 924 bits less than the Naive 2-ary tree. In

contrast, the Unified 4-ary & 2-ary tree performed the worst out of all four methods. This

is because a higher level tree was used at the earlier stages of identification where all bits

are identical. This means that more than 75 percent of the queries were Idle cycles which

are waste of resources (See Figure 4.10 - 4-ary & 2-ary; Idle cycles:Collision cycles = Ratio

of 3:1 or 75%:25%). By using 2-ary tree instead of 4-ary tree for Identical bits, 60 bits of

queries were reduced (3720 minus 3660).

For Unique bits of EPC, Number of bits query rises rapidly compared with Identical

bits. Figure 4.10 shows that, by using 4-ary tree for Unique bits of EPC, Number of bits

were slightly reduced (see Total bits queried for unique bits). The performance of each

method on Unique bits of EPC will be specified in detail in Figure 4.11 and Table 4.9.

Figure 4.11 and Table 4.9 show the number of Idle cycles, Collision cycles, Successful

cycles and Overall cycles produced in each query round. We can see that at bit 63-64 to

bit 65-66, the difference between Overall cycles of 2-ary and 4-ary tree grows. After bit

67-68, there is not much difference between the two methods. From bit 73-74 to bit 79-80,

there are no Successful cycles for both methods; thus, there are no differences for their

71

Page 98: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

Table 4.9: Performance Analysis of 2-ary Tree vs. 4-ary Tree on Unique bits of EPC, Bit61 - 68, until all tags are identified

Bit 61, 62 Bit 63, 64 Bit 65, 66 Bit 67, 682-ary 4-ary 2-ary 4-ary 2-ary 4-ary 2-ary 4-ary

Idle Cycles 0 0 0 0 8 16 35 59Collision Cycles 6 4 23 15 45 23 42 20

Successful Cycles 0 0 1 1 21 21 13 13Overall Cycles 6 4 24 16 74 60 90 92

Bit 69, 70 Bit 71, 72 Bit 73, 74 Bit 75, 762-ary 4-ary 2-ary 4-ary 2-ary 4-ary 2-ary 4-ary

Idle Cycles 36 56 36 57 38 57 38 57Collision Cycles 40 20 38 19 38 19 38 19

Successful Cycles 4 4 4 4 0 0 0 0Overall Cycles 80 80 78 80 76 76 76 76

Bit 77, 78 Bit 79, 80 Bit 81, 822-ary 4-ary 2-ary 4-ary 2-ary 4-ary

Idle Cycles 38 57 38 57 19 38Collision Cycles 38 19 38 19 19 0

Successful Cycles 0 0 0 0 38 38Overall Cycles 76 76 76 76 76 76

Overall cycles. We can now assume that at bit 61-62 to bit 71-72, the EPC are similar but

not identical, which results in the unstable change in number of Overall cycles. On the

other hand, at bit 73-74 to bit 79-80, we can assume that all bits become identical again,

resulting in no change in Overall cycles. The number of collided tags at bit 73-74 to bit

79-80 are exactly two, since the ratio of Idle cycles to Collision cycles is 1:1 for 2-ary tree

and 3:1 for 4-ary tree respectively. Finally, all tags were identified at bit 81-82, resulting

in the same number of Overall cycles for both 2-ary tree and 4-ary tree.

From the experiments, we can now conclude that by using a lower level 2-ary tree for

Identical bits of EPC, and by using a higher level 4-ary tree for Unique bits of EPC, the

Total number of bits for querying can be decreased. By reducing the Total number of bits,

identification time for each round can be minimised.

4.5 Joined Q-ary Tree

The Joined Q-ary Tree employs the right combination of Q-ary trees for each specific

scenario. The joined Q-ary Tree adaptively adjust its tree branches to suit EPC pattern

rather than only split once as in the Unified Q-ary Tree. This procedure will further

reduce accumulative bits from the reader’s queries and improve the robustness of the

overall identification process.

The Joined approach is a combined Q-ary trees, specifically 2-ary tree and 4-ary tree,

which have been identified to be the best Q-ary trees in our previous researches (See

experiment on Unified Q-ary Tree: Section 4.4.4). The Joined approach will be applied

72

Page 99: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.5. JOINED Q-ARY TREE

on each collided tags EPC, which will be split using every 1 or 2-bits of tag ID for the first

few queries; and then at one point, every 1 or 2-bits will be queried. In order to optimise

the performance of Joined Q-ary Tree, the right Separating Point (SP) between the two

Q-ary trees needs to be configured. The objective of Joined Q-ary Tree is to reduce the

Bits Length queried by a reader so that identification time can be minimised. In this

section, we will investigate and compare the “Naive Q-ary Tree” approach and our newly

proposed “Joined Q-ary Tree”.

Figure 4.12: A sample of: a) a Naive 4-ary Tree, b) a Naive 2-ary Tree, and c) a JoinedQ-ary Tree

Figure 4.12 shows the example of a) Naive 2-ary, b) Naive 4-ary, and c) Joined Q-ary

Tree. Joined Q-ary Tree bonded both 2-ary and 4-ary trees together and applied to specific

bits of EPC, depending on how Identical or Unique they are.

4.5.1 EPC Bits Prediction and Classification

In warehouse distribution environment according to Unique Item-Level and Unique

Container-Level Scenarios, it is known that the first 36-bits of EPC (Header and GMN)

are definitely identical. However, 24-bits of OC can be both Identical and Unique for all

tags, depending on how many pallets existed within one interrogation zone. For example,

if there are five pallets of 12 cases each in the interrogation zone, there will be five

different OC and sixty unique SN for all sixty items (cases).

Since OC involved 24-bits of EPC (allow 16,777,215 unique tags) but only five unique

OC is needed, we must calculate a certain number of Unique bits needed in order to apply

the right Q-ary tree. This also applies to SN that contains 36-bits of string. Assuming

that EPC pattern is used, not all 36-bits of these strings will be Unique.

Table 4.10 shows a formal structure for bits classification of GID-96 bits EPC. It can

be seen that the Identical bits of EPC always equal to 36-bits for the first 36-bits of EPC.

This includes 8-bits of Header and 28-bits of GMN, which are always the same for all tags.

For Object Class, 24-bits are available where Unique bits within Object Class (UOC) can

73

Page 100: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

be predicted using Equation 4.2. In addition, Unique bits within Serial Number (USN)

with 36-bits can also be predicted using the same Equation.

Table 4.10: Formal structure of bits classification of EPC GID-96 bits. *UOC is numberof Unique bits within Object Class and **USN is number of Unique bits within SerialNumber

Length Identical UniqueHeader 8 8 0

General Manager Number 28 28 0Object Class 24 24 - UOC UOC*

Serial Number 36 36 - USN USN**

Our method is executed based on the assumption that the approximate number of tags

(pallets, cases) is known, prior to the identification process. This information is needed for

Unique bits calculation: UOC, and USN from Table 4.10. However, in most circumstances,

number of tags is usually unknown until the first query is issued by the reader. Therefore,

UOC and USN of Joined Q-ary Tree can be initially set to zero and after the first round

of identification, these two parameters can be computed.

Joined Q-ary Tree adaptively adjusts their tree branches at specific SP. These SP is

configured according to Identical bits and Unique bits within an EPC data. In order to

calculate the estimated number of Unique bits within an EPC, we need the average number

of tags within an interrogation zone, and then to apply the equation below:

B = log2(N) (4.2)

Where N = Number of tags, B = Unique Bits of EPC.

Figure 4.13: Joined Q-ary Tree structure for GID-96 bits EPC

Figure 4.13 illustrates tag splitting behaviour of massive tag within a warehouse. The

first 36-bits of EPC belongs to Header and GMN, therefore 2-ary tree is applied to these

bits since it is simplified to be the most suitable tree for Identical bits of EPC. UOC and

74

Page 101: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.5. JOINED Q-ARY TREE

USN on the other hand, can be split using 4-ary tree since it is proven as the most suitable

tree for Unique bits of EPC.

4.5.2 Unique Bits Computation

To demonstrate a calculation of Unique bits of EPC, we examine a Massive tag movement

of 720 tags within 12 pallets (OC). By using Equation 4.2, UOC and USN can be calculated

as follows:

UOC = log2(N) =log10(N)

log10(2)=

log10(12)

log10(2)≈ 4

USN = log2(N) =log10(N)

log10(2)=

log10(60)

log10(2)≈ 6

Therefore, number of Unique bits required to cover all unique OC is approximately

4-bits and approximately 6-bits for SN.

Table 4.11: Sample bits classification of EPC GID-96 bits, where Object Class = 12 andSerial Number = 60 (Total of 720 tags)

Length Identical UniqueHeader 8 8 0GMN 28 28 0

Object Class 24 20 4Serial Number 36 30 6

Figure 4.14: Joined Q-ary Tree structure for GID-96 bits EPC with 36 Identical bitsHeader and GMN, 20 Identical bits OC, 4 Unique bits OC, 30 Identical bits SN, and 6Unique bits SN

Table 4.11 shows a sample structure for bits classification of 720 tags with GID-96 bits

EPC encoding scheme. Corresponding with Figure 4.14, we can see that the Identical bits

of EPC always equal to 36-bits for the first 36-bits of EPC. 2-ary tree is applied to these

75

Page 102: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

bits. Identical bits of OC (20-bits) and SN (30-bits) are also spliced by 2-ary tree. UOC

(4-bits) and USN (6-bits) on the other hand, can be split using 4-ary tree.

4.5.3 Tags Splitting

We are now initiating a sample comparison between the performance of Naive 2-ary tree,

Naive 4-ary tree, and Joined Q-ary Tree. Table 4.12 shows ten sample EPC of 36-bits

tags with 24-bits Identical and 8-bits Unique. We assumed that all Identical bits of EPC

belong to Header and GMN, while Unique bits of EPC belong to OC and SN.

Table 4.12: Sample 36 bits tags with 24 Identical bits and 8 Unique bitsIdentical bits Unique bits

0011 0101 1010 1101 0000 1010 1011 01010011 0101 1010 1101 0000 1010 0100 10110011 0101 1010 1101 0000 1010 1101 11000011 0101 1010 1101 0000 1010 0010 01000011 0101 1010 1101 0000 1010 1100 10000011 0101 1010 1101 0000 1010 0001 01000011 0101 1010 1101 0000 1010 0011 00110011 0101 1010 1101 0000 1010 1110 10100011 0101 1010 1101 0000 1010 1111 00100011 0101 1010 1101 0000 1010 0000 0110

4.5.3.1 Tag Identification

After applying different trees on the sample tag sets, we can see that the Naive 2-ary tree

has the best performance on Identical bits of EPC by using smallest number of queries

(Bits Length) as shown in Table 4.13. On the other hand, 4-ary tree performed better on

Unique bits than 2-ary tree.

Table 4.13: Identification process of 2-ary Tree and 4-ary Tree on Identical bits and Uniquebits of EPC

Performances on Identical bitsQ-ary Idle Collision Successful Total BitsTree Cycles Cycles Cycles Cycles Length2-ary 24 24 0 48 6004-ary 36 12 0 48 624

Performances on Unique bitsQ-ary Idle Collision Successful Total BitsTree Cycles Cycles Cycles Cycles Length2-ary 0 8 10 18 364-ary 2 0 10 12 32

76

Page 103: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.5. JOINED Q-ARY TREE

4.5.3.2 Bits Length Calculation

In order to calculate a Total Bits Length required for the whole identification process

for 2-ary tree, 4-ary tree, and Joined Q-ary Tree, information on Number of Child Nodes

(NCN) for each level of tree and Number of Bits per Query (NBQ) for that specific level,

is needed. Number of Bits per Level (NBL) can be calculated using Equation 4.1:

NBL = NCN ×NBQ

After calculating the NBL for each level of tree, the Total Bits Length (TNBL) required

can be found by doing the summation of all NBL. After adding all NBL together, the

TNBL of 828-bits, 848-bits, and 728-bits, are shown in Table 4.14 respectively for 2-ary

tree, 4-ary tree, and Joined Q-ary Tree.

Table 4.14: Calculation of Total Bits Length required for two Naive Q-ary Trees and aJoined Q-ary Tree. TNBL shows the Bits Length required for the specific Naive/JoinedQ-ary Tree

Level Naive 2-ary Naive 4-ary Joined Q-ary1-12 156 624 15613-14 54 224 5415-24 390 0 39025-26 104 0 12827-28 124 0 0

TNBL 828 848 728

Table 4.15: Performance Analysis of Naive 2-ary Tree, Naive 4-ary Tree, and Joined Q-aryTree on set of 10 sample tags

Different Q-ary Tree on Sample TagsQ-ary Idle Collision Successful Total Identical Unique TotalTree Cycles Cycles Cycles Cycles Bits Bits Bits2-ary 24 32 10 66 600 228 8284-ary 38 12 10 60 624 224 848

Joined 26 24 10 60 600 128 728

Table 4.15 shows the overall calculation of Bits Length queried on Identical bit and

Unique bits of EPC. We can see that the Joined Q-ary Tree required the least Total Bits

Length compared with the two Naive Q-ary Trees. Joined Q-ary Tree reduced Bits Length

by almost 15 percent compared with Naive 4-ary tree and by 12 percent compared with

Naive 2-ary tree.

4.5.4 Experimental Evaluation

In order to show the significance of our proposed Joined Q-ary Tree methods, we conducted

two experimental evaluations and compared our methods with existing techniques. There

77

Page 104: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

are two major data sets in the experiments. We performed ten runs on each test case and

presented the average results.

4.5.4.1 Environment

To study the proposed Joined Q-ary Tree method, all experiments were performed accord-

ing to a Crystal warehouse scenario and were assumed to be under the same environment

as for the experimental evaluation of the Unified Q-ary Tree (Section 4.4.3).

4.5.4.2 Experiment One Data sets

In the first experiment, we conducted an experiment using three different tag sets: 288

tags, 576 tags, and 864 tags. The impact of different number of tags in an interrogation

zone and performances of Joined Q-ary Tree approach is to be evaluated. Data sets using

EPC pattern from Table 4.16 are applied:

Table 4.16: Chosen EPC Pattern for Experiment OneEPC Pattern

H 0011 0101GMN 104,426,055OC [9,872,273 - 9,872,308]SN [26,292,755,245 - 26,292,755,268]

There are three test cases used in this experiment:

• Test case A: 12 pallets, 24 cases each, total 288 tags

• Test case B: 24 pallets, 24 cases each, total 576 tags

• Test case C: 36 pallets, 24 cases each, total 864 tags

For the joined Q-ary Tree approach, the SP of each test case must be calculated using

Equation 4.2.

Theoretical Bits Prediction Assuming that the existence of tags are known before

identification process, by using Equation 4.2, UOC and USN of Test case A, B, and C

can be calculated as follows:

Test case A:

UOC = log2(12) ≈ 4 , USN = log2(24) ≈ 5

78

Page 105: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.5. JOINED Q-ARY TREE

Test case B:

UOC = log2(24) ≈ 5 , USN = log2(24) ≈ 5

Test case C:

UOC = log2(36) ≈ 6 , USN = log2(24) ≈ 5

Therefore, number of Unique bits required to cover all unique OC and SN are as

shown in Table 4.17.

Table 4.17: Identical and Unique Bits classification of EPC GID-96 bits for Experimentone - Test case A, B, and C. I = Identical bits, U = Unique bits

288 tags 576 tags 864 tagsI U I U I U

H 8 0 8 0 8 0GMN 28 0 28 0 28 0OC 20 4 19 5 18 6SN 31 5 31 5 31 5

Actual Separating Point Configuration After theoretical bits estimation, we as-

sumed that the actual encoding of Unique bits may be 1 to 2-bits longer than predicted.

Therefore, we added 2-bits to the predicted Unique bits of each data set. If the predicted

bits added up as odd number, one more bit is further attached. For example, UOC of

data set two (576 tags) is predicted to be 5-bits long. By affixing additional 2-bits, total

of 7-bits are applied to UOC. However, this added up as odd number, therefore, one more

bit is further attached (Total 8-bits). Table 4.18 shows an actual SP for each data set.

At specific SP, the Joined Q-ary Tree will adaptively change its branch to 2-ary or 4-ary.

Since 2-ary tree is applied from SP1 to SP3, the Joined Q-ary Tree only needs to adjust

its branch at SP4, SP5, and SP6.

Table 4.18: Actual Separating Point for Experiment one - Test case A, B, and C. At aspecific SP, Joined Q-ary Tree will adjust its branch to either 2-ary or 4-ary Tree

288 tags 576 tags 864 tagsSP 2 4 2 4 2 4

H 1 0 - 0 - 0 -GMN 2 0 - 0 - 0 -OC(I) 3 37 - 37 - 37 -OC(U) 4 - 55 - 53 - 53SN(I) 5 61 - 61 - 61 -SN(U) 6 - 89 - 89 - 89

79

Page 106: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

4.5.4.3 Experiment Two Data sets

We conducted a second experiment using three different tag sets: 288 tags, 576 tags, and

864 tags. The impact of different encoding schemes and performances of Joined Q-ary Tree

approach is to be evaluated. Data sets using EPC pattern from Table 4.19 are applied:

Table 4.19: Chosen EPC Pattern for Experiment TwoGID-96 bits EPC Pattern

H 0011 0101GMN 104,426,055OC [9,872,273 - 9,872,308]SN [26,292,755,245 - 26,292,755,268]

SGTIN-96 bits EPC PatternH 0011 0000

FV 011PT 101CP 9,352,006IR [595,914 - 595,949]SN [121,705,236,366 - 121,705,236,389]

GIAI-96 bits EPC PatternH 0011 0100

FV 011PT 011CP 581,162,659IAR [815,223,149,060,764 - 815,223,149,061,627]

There are three test cases used in this experiment:

• Test case A: 12 pallets, 24 cases each, total 288 tags

• Test case B: 24 pallets, 24 cases each, total 576 tags

• Test case C: 36 pallets, 24 cases each, total 864 tags

4.5.5 Results

This section presents the results and performance measurement of Joined Q-ary Tree.

These results are displayed as follows:

4.5.5.1 Experiment One Results

Based on the experiment results shown in Figure 4.15, the Joined Q-ary Tree always

performed the best out of the three approaches considered, while the 4-ary tree has the

worst performance, regardless of number of tags within an interrogation zone. This corre-

sponds with our methodology that if the Separating Point and the Q-ary trees are applied

correctly to the EPC data, the optimal results can be achieved by the Joined Q-ary Tree.

80

Page 107: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.5. JOINED Q-ARY TREE

Figure 4.15: Performances comparison (GID-96) between Naive approaches and JoinedQ-ary approach

Table 4.20 demonstrates that 2-ary tree has the better performance than 4-ary tree

by about 1 percent, while Joined Q-ary Tree’s performance is approximately 12 percent

better than the 2-ary tree. The 4-ary tree has the worst performance out of the three

approaches considered.

Table 4.20: Percentage improvement of the proposed Joined Q-ary Tree versus existingNaive 2-ary (N2) and Naive 4-ary (N4) approaches

2-ary Tree 4-ary Tree Joined Q-aryImproved Improved Improved Improved Improved Improvedfrom N2 from N4 from N2 from N4 from N2 from N4

288 0 1.04 -1.05 0 11.72 12.64576 0 0.92 -0.93 0 12.37 13.18864 0 0.52 -0.52 0 13.02 13.47

Figure 4.16 illustrates the improvement in percentage of Joined Q-ary Tree compared

with the 2-ary tree and the 4-ary tree. The percentage of improvement increases more

slowly once the number of tags within the interrogation zone gets higher.

To further analyse and compare performances of Naive Q-ary approaches and Joined

Q-ary approach, Table 4.21 shows Accumulative Bits Length of each approach until all

tags were identified. We can see that the number of Bits Length accumulates faster

when the identification reached SP4. This is when EPC data became more Unique and

larger Bits Length issued by reader were required. All three approaches have the same

pattern of increment, where number of tags in an interrogation zone has no impact on the

81

Page 108: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

Figure 4.16: Percentage of improvement (GID-96) of Joined Q-ary Tree compared withNaive 2-ary Tree and Naive 4-ary Tree

Table 4.21: Accumulative Bits Length of three approaches: Naive 2-ary Tree, Naive 4-aryTree, and Joined Q-ary Tree

2-ary Tree288 tags 576 tags 864 tags

SP1 72 72 72SP2 1332 1332 1332SP3 2970 2756 2756SP4 3682 3730 3926SP5 17178 27642 38310SP6 25642 43690 61958

4-ary Tree288 tags 576 tags 864 tags

SP1 80 80 80SP2 1368 1368 1368SP3 3024 2808 2808SP4 3736 3776 3816SP5 17400 27968 38536SP6 25912 44096 62280

Joined Q-ary Tree288 tags 576 tags 864 tags

SP1 72 72 72SP2 1332 1332 1332SP3 2970 2756 2756SP4 3358 3308 3348SP5 17246 27948 38628SP6 22638 38284 53892

82

Page 109: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.5. JOINED Q-ARY TREE

Figure 4.17: Accumulative Bits Length (GID-96) of three approaches: a) Naive 2-ary Tree,b) Naive 4-ary Tree, and c) Joined Q-ary Tree on different tag sets

performances when EPC data were identical. This pattern can be seen in Figure 4.17,

where Accumulative Bits Length of the Joined Q-ary Tree approach is displayed. There

are no or little difference between SP1 to SP4 on all data sets, however, number of Bits

Length started to increase rapidly once it reaches SP5 and SP6.

Out of the three approaches, the Joined Q-ary Tree has the slowest incremental rate

between SP4 and SP6 for all data sets. The incremental Bits Length also slows down once

number of tags within the interrogation zone gets bigger. Therefore, the performance of

Joined Q-ary Tree will increase for larger set of tags compared with the Naive approaches.

83

Page 110: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

Since the Joined Q-ary Tree accumulated least Bits Length out of the three approaches,

it can be concluded that the best performing approach, using GID-96 bits encoding scheme,

is the Joined Q-ary Tree. Also, the number of tags within the interrogation zone has no

impact on Identical bits of EPC data. Additionally, by applying the right Q-ary tree on

specific bits of EPC, performance of Joined Q-ary Tree is improved.

4.5.5.2 Experiment Two Results

We observed three types of EPC encoding scheme in this experiment. Table 4.22 and

Figure 4.18 demonstrate results of the Joined Q-ary Tree using the three encoding schemes

on different number of tags versus the two Naive Q-ary Trees. From both Figure and

Table, it can be seen that the Joined Q-ary Tree always performed the best out of the

three approaches considered, while the 4-ary tree has the worst performance for GID-96

bits (Figure 4.18a) and SGTIN-96 bits (Figure 4.18b) encoding schemes. For GIAI-96 bits

encoding (Figure 4.18c), the Naive 2-ary tree has the worst performance compared with

the Naive 4-ary tree and the Joined Q-ary Tree.

Table 4.22: Number of bits length of three approaches using different Encoding Scheme:a) GID-96 bits, b) SGTIN-96 bits, and c) GIAI 96 bits

GID-96 bits288 tags 576 tags 864 tags

2-ary 25642 43690 617344-ary 25912 44096 62280

Joined 22638 38284 53892SGTIN-96 bits

288 tags 576 tags 864 tags2-ary 27490 47396 670504-ary 27736 47584 67264

Joined 24556 41694 58494GIAI-96 bits

288 tags 576 tags 864 tags2-ary 10424 11592 127104-ary 10392 11448 12440

Joined 9300 10356 11348

The differences in the results for GIAI-96 bits against the other two encoding schemes

can be explained by the number of fields involved in the EPC pattern. From all 96 bits of

the EPC data, the GIAI-96 bits scheme only has the IAR (Item-Level) field that involved

both Identical and Unique bits of EPC. The other four fields engaged only Identical bits

(See Table 4.19). This is different from the other two encoding schemes where there are

two partitions that engaged Unique bits of EPC data; 1) OC and 2) SN in GID-96 bits

and 1) IR and 2) SN in SGTIN-96 bits. Therefore, the Unique part of EPC in GIAI-96

bits encoding scheme is in the latter stage of EPC data, which results in higher number

of queries being issued by both 2-ary and 4-ary trees.

Since the 4-ary tree performs better in Unique bits, it needs less queries for IAR field

84

Page 111: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.5. JOINED Q-ARY TREE

Figure 4.18: Performances comparison between Naive approaches and Joined Q-ary ap-proach using different Encoding Scheme: a) GID-96 bits, b) SGTIN-96 bits, and c) GIAI96 bits

compared with the 2-ary tree. The nature of GIAI-96 bits encoding scheme also resulted

in minimal number of queries issued, compared with the other two encoding schemes, as

it involves less partitions. Nevertheless, the Joined Q-ary Tree still outperformed both

Naive 2-ary and Naive 4-ary trees regardless of the encoding scheme used. This is because

the Joined Q-ary Tree adapts the best tree to suit the circumstance of each part of the

EPC data, which resulted in the lowest number of queries issued by the RFID readers.

85

Page 112: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

Table 4.23: Percentage of improvement of Joined Q-ary Tree versus two Naive approachesusing different Encoding Scheme: a) GID-96 bits, b) SGTIN-96 bits, and c) GIAI 96 bits

GID-96 bits288 tags 576 tags 864 tags

Improved from 2-ary 11.72 12.37 12.70Improved from 4-ary 12.64 13.18 13.47

SGTIN-96 bits288 tags 576 tags 864 tags

Improved from 2-ary 10.67 12.03 12.76Improved from 4-ary 11.47 12.38 13.04

GIAI-96 bits288 tags 576 tags 864 tags

Improved from 2-ary 10.78 10.66 10.72Improved from 4-ary 10.51 9.54 8.78

Table 4.23 demonstrates that the Joined Q-ary Tree performs better than the 2-ary

tree by about 10 to 13 percent, and achieve around 8 to 13 percent better than the 4-ary

tree. These all depend on different number of tags within the interrogation zone and

the chosen encoding scheme. Figure 4.19 illustrates the improvement in percentage of

Joined Q-ary Tree compared with the 2-ary tree and the 4-ary tree. The percentage of

improvement increases more slowly for GID-96 bits and SGTIN-96 bits schemes, once the

number of tags within the interrogation zone gets higher. On the other hand, for GIAI-96

bits encoding, there is no decrease in system efficiency in the Joined Q-ary Tree, but the

performance of the naive trees increase once the number of tags increase. Since the Joined

Q-ary Tree accumulated least Bits Length out of the three approaches, regardless of the

encoding scheme and the number of tags within the interrogation zone, it can now be

concluded that the best performing approach is Joined Q-ary Tree.

4.6 Overall Analysis

A total of five experiments were conducted for the tree-based anti-collision approaches.

The first three experimental evaluations were to verify the performance and capability

of our proposed Unified Q-ary Tree, and the remaining two experiments were to proof

the concept of the Joined Q-ary Tree. From experiment one to three, we determined

that out of twelve combinations of Unified Q-ary Trees, the Unified 2-ary & 4-ary tree

performed the best overall, in terms of system robustness that preserves memories usage

during identification process. We then verified that by using a 2-ary tree for Identical bits

of EPC, and by using a 4-ary tree for Unique bits of EPC, the Total number of bits for

querying can be decreased.

In addition to the first three experiments, the fourth and fifth demonstrate that the best

performing approach is the Joined Q-ary Tree, using GID-96 bits encoding scheme. The

results acquired have shown that the Joined Q-ary Tree has far more superior performance

compared with our proposed Unified Q-ary Tree and existing Naive Q-ary Trees. Moreover,

86

Page 113: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

4.6. OVERALL ANALYSIS

Figure 4.19: Percentage of improvement of Joined Q-ary Tree compared with Naive 2-aryTree and Naive 4-ary Tree, using different Encoding Scheme: a) GID-96 bits, b) SGTIN-96bits, and c) GIAI 96 bits

we also discovered that the Joined Q-ary Tree achieves the best performance, regardless

of the type of encoding scheme.

From the analysis of all experiments, we recognised certain properties of importance

for tree-based anti-collision methods, which are: 1) similarity of EPC pattern, 2) number

of tags within one group of the EPC pattern, and 3) overall number of tags within the

interrogation zone.

87

Page 114: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 4. DETERMINISTIC ANTI-COLLISION APPROACHES

4.7 Summary

In this chapter, we have investigated the problems on existing deterministic anti-collision

schemes, and we proposed two new tree-based anti-collision methods in order to eliminate

shortcomings of existing techniques. The main contributions and findings of this Chapter

are as follows:

• We have proposed a Unified Q-ary Tree (Pupunwiwat and Stantic, 2009a), (Pupunwi-

wat and Stantic, 2009b), which is a combination of two Q-ary trees; and we identified

the best Q-ary tree for specific circumstances. We found that a 2-ary tree suits best

when the EPC bits are identical, and the use of 4-ary tree can be optimised when

the EPC bits are unique. The best combination of 2-ary and 4-ary trees are then

used for construction of a Joined Q-ary Tree.

• Based on findings from the Unified Q-ary Tree experiment, we then proposed a

Joined Q-ary Tree (Pupunwiwat and Stantic, 2010c) to further minimised the total

memories usage during the identification process. We discover that the Joined Q-ary

Tree performed the best compared with existing tree-based anti-collision techniques,

regardless of number of tags within the reader zone and the encoding scheme used.

• We have confirmed that the similarity of EPC pattern, the number of tags within

one group of the EPC pattern, and the overall number of tags within the inter-

rogation zone, have impacted on the performance of any tree-based anti-collision

schemes. Nevertheless, the best performing technique, in terms of memory usage

and robustness of the RFID system, are our proposed deterministic anti-collision

techniques.

88

Page 115: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5Probabilistic Anti-Collision Approaches

In this chapter, we tackle issues of existing probabilistic anti-collision schemes, such as the

amount of slots and frames produced during each identification process, and the perfor-

mance efficiency. Firstly, we introduce a Precise Tag Estimation Scheme (PTES) (Pupun-

wiwat and Stantic, 2010a), (Pupunwiwat and Stantic, 2010b) to minimise the number

of slots and frames queried by the RFID reader, and to maximise the system efficiency.

Secondly, we introduce the Probabilistic Cluster-Based Technique (PCT) (Pupunwiwat

and Stantic, 2010d) anti-collision method to improve the performance of tag recognition

process and provide a sufficient performance over existing methodologies. Finally, the

remaining of this chapter comprise the mathematic fundamental for probabilistic anti-

collision schemes, the foundations of the proposed PTES and PCT methods, and the

experimental evaluation.

5.1 Mathematic Fundamental for ALOHA-based Tag Estimation

In the Framed-Slotted ALOHA based probabilistic scheme, to estimate the number of

present tags, Binomial distribution is a good fundamental method. For a given initial

Q in a frame with F slots and n tags, the expected value of the number of slots with

occupancy number x is as follows:

ax = n× Cxn(

1

F)x(1− 1

F)n−x

89

Page 116: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Therefore, the expected number of Empty slot e, Successful slot s, and Collision slot c

is given by the following equations:

e = a0 = F (1− 1

F )n

s = a1 = n(1− 1F )n−1

c = ak = F − a0 − a1

Thus, the system efficiency (E) is defined as the ratio between the number of Successful

slot and the frame-size, as per the following equations:

E =s

F=

n(1− 1F )n−1

F= n

1

F(1− 1

F)n−1

It has been proven that the highest efficiency can be obtained if the frame-size F is

equal to the number of tags n, provided that all slots have the same fixed length:

F (optimal) = n

Therefore, we make the assumption that by keeping the number of tags close to the

available frame-size, the optimal performance efficiency can be obtained. According to

literatures, it is possible to achieve the theoretically optimal efficiency of 36.8 percent in

ALOHA-based systems.

5.2 Precise Tag Estimation Scheme

A frame-size prediction stage is one of the most crucial processes that determine the

performance of the probabilistic anti-collision technique. In order to overcome shortcom-

ings of existing methods for frame-size prediction, we propose a Precise Tag Estimation

Scheme (PTES) that is compatible with any ALOHA-based anti-collision protocols. The

aims of PTES are to obtain optimal tunable parameters that produce minimum number of

frames and slots; and to find the impact of collision slots and empty slots toward Backlog

estimation. After obtaining initial results for PTES, the optimal parameters found will

be incorporated within our proposed PCT, in order to further improve the performance

efficiency.

This section will describe the newly proposed PTES; the specific requirements for tag

estimation; initial Q value; suggest frame-size; and sample tag estimation and allocation.

90

Page 117: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.2. PRECISE TAG ESTIMATION SCHEME

5.2.1 Slot Observation and Initial Q Value

For general probabilistic anti-collision algorithm, the reader picks tag within an interroga-

tion zone by the command “Select”; then issues “Query”, which contains a ‘Q’ parameter

to specify the frame-size, [F = 2Q - 1]. For our PTES methodology, we have chosen initial

Q value to be any number between 1 and 15, giving enough maximum number of slots

of 32768 per frame. After the first round of identification, collision slots and empty slots

will be observed and used, to estimate remaining number of tags. After the number of

tags has been estimated, frame-size for the next identification round can be configured in

accordance to the suggested frame-size threshold.

5.2.2 Suggested Threshold for Frame-Size

The suggested frame-size threshold to be used in our methodology is set according to

estimated number of tags. For example, if the estimated number of tags is 100 tags, the

suggested frame-size would have a Q value of 7. Since the frame-size is calculated by 2Q

- 1, the frame-size where Q = 7 will allow at most 128 tags (boundary 0 to 27 - 1) to

be identified. Therefore, if the estimated number of tags is between 65 and 128 tags, the

suggested initial Q would equal to 7.

Table 5.1 shows Minimum and Maximum number of tags allowed per suggested frame-

size, and Minimum and Maximum boundary of random numbers generated per frame-size.

Maximum number of tags allowed in each frame-size is calculated by 2Q and minimum

number of tags allowed is calculated by 2Q−1 + 1. The maximum frame-size boundary

is calculated by 2Q - 1, while the minimum frame-size boundary is always 0. The Table

only demonstrates up to Q = 15.

Table 5.1: Suggested frame-size boundary (B) and minimum and maximum number oftags (NT) for specific estimated number of tags

Q = 1 Q = 2 Q = 3 Q = 4 Q = 5NT B NT B NT B NT B NT B

Min 1 0 3 0 5 0 9 0 17 0Max 2 1 4 3 8 7 16 15 32 31

Q = 6 Q = 7 Q = 8 Q = 9 Q = 10NT B NT B NT B NT B NT B

Min 33 0 65 0 129 0 257 0 513 0Max 64 63 128 127 256 255 512 511 1024 1023

Q = 11 Q = 12 Q = 13 Q = 14 Q = 15NT B NT B NT B NT B NT B

Min 1025 0 2049 0 4097 0 8193 0 16385 0Max 2048 2047 4096 4095 8192 8191 16384 16383 32768 32767

91

Page 118: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

5.2.3 PTES approaches

In this chapter, we propose three tag estimation methods for a Precise Tags Estimation

Scheme (PTES). In method one - PTES[C], we use a fixed parameter to calculate collision

slot and use a variable to predict empty slot for the next round of identification. In method

two - PTES[CE], we use two variables to predict collision slot and empty slot for the new

identification round. Finally, in method three - PTES[CCE], we use a fixed parameter to

calculate collision slot for the first round of identification, then we use two variables to

predict collision slot and empty slot from the second identification round onward.

The aims of all PTES methods are to clarify that both collision slots and empty slots

have an impact on Backlog prediction; and that more than one variable can be used to

predict frame-size for an upcoming round effectively, depending on the chosen Initial Q.

The three methods are explained within this sub-section.

5.2.3.1 PTES[C]

A PTES[C] uses various parameters to predict collision slots for the new identification

round. PTES[C] method aims to obtain the optimal parameter in order to calculate and

predict the closest number of remaining tags for the next round of identification. We

assume that for the current identification round, each collision slot has at least two tags

collided. However, it is impossible to distinguish certain number of tags that actually

caused the collision. There is exactly one tag per successful slot, therefore, we do not take

successful slots into consideration. In addition, an empty slot does not engage any tag.

Accordingly, we also do not take empty slots into consideration in this method. PTES[C]

focuses on finding optimal parameters to calculate and predict the number of collision

slots for the next identification round.

The PTES[C] method uses different parameter between 2.0 and 3.0 to predict the

number of collision slots. Since a collision slot engages at least two tags, we assume that

the parameter for collision slots calculation falls between 2.0 and 3.0 (more than two tags

but possibly less than three tags). However, in reality, the number of tags per collision

slot can be more than three tags. According to Schoute’s method, which is a simple and

accurate Backlog estimation technique, the parameter 2.39 for collision slots prediction is

used. Therefore, we select our collision slots variable to be between 2.0 and 3.0.

Equation 5.1 shows Backlog estimation using variable 2.0 <= V1 <= 3.0 for collision

slots prediction. The variable V1 is the tunable parameters to predict the number of

remaining tags, using information of collision slots from the previous frame.

Backlog = d(V1 × c)e (5.1)

92

Page 119: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.2. PRECISE TAG ESTIMATION SCHEME

Where c is the number of Collision Slot ; and V1 is variable between 2.0 and 3.0 with

increments of 0.1.

Backlog = d( 2.0 ∗ c )e

Backlog = d( 2.1 ∗ c )e

.......

Backlog = d( 3.0 ∗ c )e

Therefore, there are eleven possible optimal V1 for PTES[C] method. The estimated

number of slots is rounded-up to the nearest integer.

Algorithm 1 demonstrates the PTES[C] algorithm applied for the number of Backlog

estimation, and either keep the current frame-size or re-adjust the frame-size for the the

next identification cycle.

Input: c = Collision Slots, BacklogOutput: Q = Frame− Size Adjustmentfor (Frame-Size prediction procedure) do

Backlog = (V1 * c);while Looking up Suggested Threshold for Frame-Size Table do

if Found Matched Q for specific Backlog thenRe-adjust Q Value;

end

endOutput Q Adjust Value;

endAlgorithm 1: PTES(C) Algorithm

5.2.3.2 PTES[CE]

Similar to PTES[C] method, the PTES[CE] method aims to obtain the optimal parameter

in order to calculate and predict the closest Backlog for the next identification round. We

assume that for the current identification round, each collision slot has at least two tags

collided. However, we cannot know for sure how many tags actually caused the collision.

There is exactly one tag per successful slot, thus, we do not take successful slots into

consideration. On the other hand, we assume that empty slots will continuously occur

during the next rounds of identification despite the frame-size. Thus, PTES[CE] method

is created to find the optimal parameter and to predict the number of remaining tags

for upcoming round, using information from both collision slots and empty slots of the

current frame.

The PTES[CE] method uses any variable between 2.0 and 3.0 to predict the number

of collision slots. Variables between 0.1 and 0.9 are also used to predict the number of

93

Page 120: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

2.0c, 0.1e 2.0c, 0.2e 2.0c, 0.3e 2.0c, 0.4e 2.0c, 0.5e 2.0c, 0.6e 2.0c, 0.7e 2.0c, 0.8e 2.0c, 0.9e2.1c, 0.1e 2.1c, 0.2e 2.1c, 0.3e 2.1c, 0.4e 2.1c, 0.5e 2.1c, 0.6e 2.1c, 0.7e 2.1c, 0.8e 2.1c, 0.9e2.2c, 0.1e 2.2c, 0.2e 2.2c, 0.3e 2.2c, 0.4e 2.2c, 0.5e 2.2c, 0.6e 2.2c, 0.7e 2.2c, 0.8e 2.2c, 0.9e2.3c, 0.1e 2.3c, 0.2e 2.3c, 0.3e 2.3c, 0.4e 2.3c, 0.5e 2.3c, 0.6e 2.3c, 0.7e 2.3c, 0.8e 2.3c, 0.9e2.4c, 0.1e 2.4c, 0.2e 2.4c, 0.3e 2.4c, 0.4e 2.4c, 0.5e 2.4c, 0.6e 2.4c, 0.7e 2.4c, 0.8e 2.4c, 0.9e2.5c, 0.1e 2.5c, 0.2e 2.5c, 0.3e 2.5c, 0.4e 2.5c, 0.5e 2.5c, 0.6e 2.5c, 0.7e 2.5c, 0.8e 2.5c, 0.9e2.6c, 0.1e 2.6c, 0.2e 2.6c, 0.3e 2.6c, 0.4e 2.6c, 0.5e 2.6c, 0.6e 2.6c, 0.7e 2.6c, 0.8e 2.6c, 0.9e2.7c, 0.1e 2.7c, 0.2e 2.7c, 0.3e 2.7c, 0.4e 2.7c, 0.5e 2.7c, 0.6e 2.7c, 0.7e 2.7c, 0.8e 2.7c, 0.9e2.8c, 0.1e 2.8c, 0.2e 2.8c, 0.3e 2.8c, 0.4e 2.8c, 0.5e 2.8c, 0.6e 2.8c, 0.7e 2.8c, 0.8e 2.8c, 0.9e2.0c, 0.1e 2.9c, 0.2e 2.9c, 0.3e 2.9c, 0.4e 2.9c, 0.5e 2.9c, 0.6e 2.9c, 0.7e 2.9c, 0.8e 2.9c, 0.9e3.0c, 0.1e 3.0c, 0.2e 3.0c, 0.3e 3.0c, 0.4e 3.0c, 0.5e 3.0c, 0.6e 3.0c, 0.7e 3.0c, 0.8e 3.0c, 0.9e

Figure 5.1: Variable V1 and V2 for Collision slot and Empty slot calculation for PTES[CE]method. There are ninety-nine possible combinations of V1 and V2, in order to find optimalparameters for c and e prediction

empty slots for the upcoming round. Since an empty slot does not engage any tag, we

assume that the parameter for empty slots calculation will fall between 0.1 and 0.9 (no

more than one tag). Equation 5.2 shows Backlog estimation using variable V1 for collision

slots prediction and variable V2 for empty slots prediction. Both variables V1 and V2 are

tunable parameters to predict the number of remaining tags, using information of collision

slots and empty slots from the previous frame.

Backlog = d(V1 × c+ V2 × e)e (5.2)

where c is the number of Collision Slot ; e is the number of Empty slot ; V1 is variable

between 2.0 and 3.0; and V2 is variable between 0.1 and 0.9 with increments of 0.1.

Backlog = d( 2.0 ∗ c + 0.1 ∗ e )e

.......

Backlog = d( 2.0 ∗ c + 0.9 ∗ e )e

Backlog = d( 2.1 ∗ c + 0.1 ∗ e )e

.......

.......

Backlog = d( 3.0 ∗ c + 0.9 ∗ e )e

Therefore, there are ninety-nine possible optimal V1 and V2 variables for this method.

The estimated number of slots is rounded-up to the nearest integer.

Figure 5.1 shows ninety-nine possible optimal V1 and V2 variables for c and e.

94

Page 121: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.2. PRECISE TAG ESTIMATION SCHEME

Algorithm 2 demonstrates the PTES[CE] algorithm applied for the number of Backlog

estimation; and either keep the current frame-size or re-adjust the frame-size for the the

next identification cycle.

Input: c = Collision Slots, e = Empty Slots, BacklogOutput: Q = Frame− Size Adjustmentfor (Frame-Size prediction procedure) do

Backlog = (V1 * c + V2 * e);while Looking up Suggested Threshold for Frame-Size Table do

if Found Matched Q for specific Backlog thenRe-adjust Q Value;

end

endOutput Q Adjust Value;

endAlgorithm 2: PTES(CE) Algorithm

5.2.3.3 PTES[CCE]

The PTES[CCE] method uses parameter 2.0 to predict the number of collision slots after

the first round of identification. Parameter 2.0 is chosen according to the assumption

that at least two tags collided per collision slot. Since the number of tags is supposedly

unknown at the beginning, a simple frame-size prediction using variable 2.0 is chosen for

the next Q adjust value. Equation 5.1 with variable V1 = 2.0 is applied for collision slots

prediction.

Backlog = d(2.0× c)e

Where c is the number Collision Slot.

The PTES[CCE] uses Equation 5.2 to predict the number of collision slots and empty

slots from second round onward. Equation 5.2 shows Backlog estimation using variable

V1 for collision slots prediction and variable V2 for empty slots prediction.

Backlog = d(V1 × c+ V2 × e)e

where c is the number of Collision Slot ; e is the number of Empty slot ; V1 is variable

between 2.0 and 3.0; and V2 is variable between 0.1 and 0.9 with increments of 0.1.

Algorithm 3 demonstrates the PTES[CCE] algorithm applied for the number of Backlog

estimation; and either keep the current frame-size or re-adjust the frame-size for the the

next identification cycle.

95

Page 122: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Input: c = Collision Slots, e = Empty Slots, Backlog, RoundcountOutput: Q = Frame− Size Adjustmentfor (Frame-Size prediction procedure) do

if Roundcount == 0 thenBacklog = (2.0 * c);

endelse

Backlog = (V1 * c + V2 * e);endRoundcount = Roundcount + 1;while Looking up Suggested Threshold for Frame-Size Table do

if Found Matched Q for specific Backlog thenRe-adjust Q Value;

end

endOutput Q Adjust Value;

endAlgorithm 3: PTES(CCE) Algorithm

Table 5.2 displays the comparison between our three proposed PTES methods. From

the Table, the PTES[C] only uses variable V1 for tag estimation while the other two

PTES use both V1 and V2. The difference between PTES[CE] and PTES[CCE] is in the

first round of tag prediction where PTES[CCE] introduces discrete estimation, using only

variable V1 for the first round of identification; then from the second round all procedures

are the same as in PTES[CE].

Table 5.2: PTES methods comparisonMethod Round Variable V1 Variable V2

PTES[C] All 2.0 - 3.0 N/APTES[CE] All 2.0 - 3.0 0.1 - 0.9

PTES[CCE] First 2.0 N/ASecond onward 2.0 - 3.0 0.1 - 0.9

5.2.4 Sample Tag Estimation and Allocation

This section describes a sample tag allocation and estimation for all three PTES methods.

For instance, there are twenty tags to be identified. However, while performing the prob-

abilistic anti-collision algorithm, the number of tags is supposedly unknown. The initial

Q value for this example is set to 4; thus, the number of available slots for the first round

of identification is equal to 16 (0 to 24 - 1).

Figure 5.2 shows a sample of first round tag allocation, where seven collision slots,

four empty slots, and five successful slots occurred. For each collision slot, two or more

tags collided while an empty slot engaged no tag. Each successful slot holds exactly one

tag per slot. After the first round of tag allocation, PTES equations are applied, in order

to find an estimated frame-size for the next round.

96

Page 123: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.2. PRECISE TAG ESTIMATION SCHEME

Figure 5.2: A sample first round of tag allocation with Initial Q of 4. Collision slot c = 7,Empty slot e = 4, and Successful slot s = 5

5.2.4.1 Sample Tag Estimation - PTES[C]

After the first round of identification shown in Figure 5.2, we applied PTES[C] method

with variable V1 between 2.0 to 3.0, to estimate collision slots for the upcoming round.

The actual remaining tags from this round are fifteen tags. For instance, after applying

Equation 5.1 using V1 = 2.2, number of estimated tags for the next round can be calculated

as follows:

Backlog = d( 2.2 ∗ 7 )e = 15

Therefore, the estimated number of tags for the next round is equal to fifteen tags.

Hence, the new Q adjust is equal to 4 (see Table 5.1 for suggested frame-size).

Nevertheless, if different variable V1 is used, number of estimated tags and the new Q

adjust would be different, as shown in Table 5.3.

Table 5.3: Sample tag estimation and frame-size (Q) adjustment after the first round ofidentification, using PTES[C] method

Round one (c = 7)Variable (V1) Tag Estimation Q Adjust

2.0 14 42.1 15 42.2 15 42.3 16 42.4 17 52.5 18 52.6 18 52.7 19 52.8 20 52.9 20 53.0 21 5

Subsequent to the first round of identification, according to Table 5.3, the adjustment

of Q value for parameters V1 = 2.0 - 2.3 is equal to 4, while the Q value for V1 = 2.4 -

3.0 is equal to 5. In order to identify all tags within the interrogation zone, PTES[C] with

variable V1 is applied until no more collision occurs. Corresponding to Figure 5.3, we can

97

Page 124: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

see that the second round of identification split into two using Q adjust of 4 and 5.

Figure 5.3: A sample of Q-adjust in each round of identification until all tags are identified

Table 5.4: Sample tag estimation and frame-size (Q) adjustment after the second roundof identification, using PTES[C] method

Round two (c = 4)Variable (V1) Tag Estimation Q Adjust

2.0 8 32.1 8 32.2 9 42.3 9 4

Round two (c = 3)Variable (V1) Tag Estimation Q Adjust

2.4 7 32.5 8 32.6 8 32.7 8 32.8 8 32.9 9 43.0 9 4

Table 5.4 shows the second round of identification. After the second round, the Q

adjust for variable V1 = 2.0, 2.1, 2.4, 2.5, 2.6, 2.7, and 2.8 is equal to 3, while the Q adjust

for variable V1 = 2.2, 2.3, 2.9, and 3.0 is equal to 4. Corresponding to Figure 5.3, we can

see that the third round of identification split further into four Q adjust.

Similar to the first two rounds of identification, Table 5.5 shows the third round of

identification. In this round, some tags identification are completed using variable V1 =

2.9 and 3.0. However, identification using variable V1 between 2.0 to 2.8 required further

recognition. Q adjust for all variable except V1 = 2.2 is equal to 3. Figure 5.3 shows that

the fourth round of identification split further into four Q adjust.

More identification is completed within the fourth round as shown in Table 5.6. Only

variable V1 between 2.0 to 2.2 required further identification. Figure 5.3 shows that the

fifth round only split into two Q adjust.

In the last round of identification, all tags can be recognised using variable V1 = 2.0,

2.1, and 2.2; as shown in Table 5.7.

98

Page 125: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.2. PRECISE TAG ESTIMATION SCHEME

Table 5.5: Sample tag estimation and frame-size (Q) adjustment after the third round ofidentification, using PTES[C] method

Round three (c = 3)Variable (V1) Tag Estimation Q Adjust

2.0 6 32.1 6 3

Round three (c = 2)Variable (V1) Tag Estimation Q Adjust

2.2 4 22.3 5 32.4 5 32.5 5 32.6 5 32.7 5 32.8 6 3

Round three (c = 0)Variable (V1) Tag Estimation Q Adjust

2.9 0 Completed3.0 0 Completed

Table 5.6: Sample tag estimation and frame-size (Q) adjustment after the fourth roundof identification, using PTES[C] method

Round four (c = 1)Variable (V1) Tag Estimation Q Adjust

2.0 2 12.1 2 12.2 2 1

Round four (c = 0)Variable (V1) Tag Estimation Q Adjust

2.3 0 Completed2.4 0 Completed2.5 0 Completed2.6 0 Completed2.7 0 Completed2.8 0 Completed

Table 5.7: Sample tag estimation and frame-size (Q) adjustment after the fifth round ofidentification, using PTES[C] method

Round five (c = 0)Variable (V1) Tag Estimation Q Adjust

2.0 0 Completed2.1 0 Completed2.2 0 Completed

Since samples tag identification using PTES[C] mostly explain how our proposed meth-

ods estimated number of tags in each round, we will show the actual tag allocation using

PTES[CE] in the next sub-section.

99

Page 126: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

5.2.4.2 Sample Tag Allocation - PTES[CE]

After the first round of identification shown in Figure 5.2, PTES[CE] method uses variable

V1 between 2.0 to 3.0, to estimate collision slots; and variable V2 between 0.1 to 0.9, to

estimate empty slots for the next round. The actual remaining tags from this round are

fifteen tags. For example, after applying Equation 5.2 using V1 = 2.0 and V2 = 0.5,

number of estimated tags for the next round can be calculated as follows:

Backlog = d( 2.0 ∗ 7 + 0.5 ∗ 4 )e = 16

Therefore, the estimated number of tags for the next round is equal to sixteen tags.

Hence, the new Q adjust is equal to 4 (see Table 5.1 for suggested frame-size).

Following the first round, the adjustment of Q value for estimated tag between 12 and

16 is equal to 4, while the Q value for estimated tag between 17 and 25 is equal to 5. In

order to identify all tags within the interrogation zone, PTES[CE] with variable V1 and

V2 is applied for each identification round until no more collision occurs and all tags are

identified.

Figure 5.4: A sample second round of tag allocation with Initial Q of 4, V1 = 2.0, and V2

= 0.5. Collision slot c = 2, Empty slot e = 5, and Successful slot s = 9

Figures 5.4, 5.5, and 5.6 show examples of further identification process using variables

V1 = 2.0 and V2 = 0.5. Figure 5.4 shows a sample of second round tag allocation where two

collision slots, five empty slots, and nine successful slots, occurred. The actual remaining

tags from this round are six tags. The number of estimated tag for round three can be

calculated as follows:

Backlog = d( 2.0 ∗ 2 + 0.5 ∗ 5 )e = 7

Therefore, the estimated number of tags for the next round is equal to seven tags. The

new Q adjust is equal to 3.

Figure 5.5 shows a sample of third round tag allocation where one collision slot, three

empty slots, and four successful slots, occurred. The actual remaining tags from this round

are two tags. The number of estimated tag for round three can be calculated as follows:

100

Page 127: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.2. PRECISE TAG ESTIMATION SCHEME

Figure 5.5: A sample third round of tag allocation with Initial Q of 3, V1 = 2.0, and V2

= 0.5. Collision slot c = 1, Empty slot e = 3, and Successful slot s = 4

Backlog = d( 2.0 ∗ 1 + 0.5 ∗ 3 )e = 4

The estimated number of tags for the next round is equal to four tags. Therefore, the

new Q adjust is equal to 2.

Figure 5.6: A sample fourth (final) round of tag allocation with Initial Q of 2, V1 = 2.0,and V2 = 0.5. Collision slot c = 0, Empty slot e = 2, and Successful slot s = 2

Figure 5.6 shows a sample of final round tag allocation where no collision slot, two

empty slots, and two successful slots, occurred. There are no more tag remaining since no

collision occurred; thus, the identification process using probabilistic anti-collision algo-

rithm terminated after this round.

5.2.5 Experimental Evaluation

In order to show the significance of our proposed PTES methods, we conducted two

experimental evaluations and compared our methods with existing techniques.

5.2.5.1 Preliminary

To study the Precise Tag Estimation Scheme, all experiments are assumed to be set up

in a well-controlled environment where there is no metal or water nearby. We randomly

generated all data sets with assumptions that a UHF RFID reader is used and passive

RFID tags are attached to each item. At this stage, we assume that all items are static

and no other type of interference beside collision itself is presented. It is also assumed

that other type of data stream errors, such as data duplication, have been filtered at the

101

Page 128: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

earlier stage. Different tag sets are simulated for each experiment. While performing each

anti-collision algorithm, number of tags is supposedly unknown. We performed ten runs

on each test case and presented the average results.

5.2.5.2 Experiment One Data Set

The aim of the first experiment is to find the impact on system efficiency of different initial

Q used by PTES method versus existing methods. There are 200 and 300 tags utilised

in the experiment. Different initial Q of 6, 7, 8 and 9 are applied on each tag set. The

data sets and initial Q parameters are selected, based on the supposition of the capability

of the UHF RFID reader and passive tags read rates. Table 5.8 demonstrates the type

of Backlog prediction applied to different number of tags, different initial Q, and tunable

parameters. All methods are applied separately to different randomly generated data sets,

giving a total of 1688 test cases within this experiment.

Table 5.8: Chosen Parameters for Experiment OneBacklog Prediction No. Tags V1 V2 Initial Q Total Test Case

PTES[C] 200 - 300 2.0 - 3.0 - 6 - 9 88PTES[CE] 200 - 300 2.0 - 3.0 0.1 - 0.9 6 - 9 792

PTES[CCE] 200 - 300 2.0 - 3.0 0.1 - 0.9 6 - 9 792Shoute 200 - 300 2.39 - 6 - 9 8

Lowerbound 200 - 300 2.0 - 6 - 9 8

5.2.5.3 Experiment Two Data Set

The second experiment is to find the optimal parameters of PTES that produce the min-

imal number of slots and frames, and generate the highest system efficiency, compared

with the existing methods. There are five tag sets comprising 100, 200, 300, 400, and 500

tags. The initial Q of this experiment is fixed to 8. Table 5.9 displays the type of Backlog

prediction applied to different number of tags, fixed initial Q, and tunable parameters. All

methods are applied separately to different randomly generated data sets, giving a total

of 1055 test cases within this experiment.

Table 5.9: Chosen Parameters for Experiment TwoBacklog Prediction Initial Q V1 V2 No. Tags Total Test Case

PTES[C] 8 2.0 - 3.0 - 100 - 500 55PTES[CE] 8 2.0 - 3.0 0.1 - 0.9 100 - 500 495

PTES[CCE] 8 2.0 - 3.0 0.1 - 0.9 100 - 500 495Schoute 8 2.39 - 100 - 500 5

Lowerbound 8 2.0 - 100 - 500 5

102

Page 129: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.2. PRECISE TAG ESTIMATION SCHEME

5.2.6 Results

This section presents the evaluation of impacts of different initial Q on chosen frame-size

prediction methods, and demonstrates the impacts of different number of tags within an

interrogation zone toward anti-collision approaches. These results are displayed as follows:

5.2.6.1 Results - Impacts of Different Initial Q

In the first experiment, we compared our PTES algorithm with Schoute (Sch) and Lower-

bound (LB) methods. In accordance to our surveys, the two methods are simple and give

accurate Backlog prediction. We divide our results into two parts. In the first part, we

present results on PTES[C] method; and for the second part, we demonstrate results on

PTES[CE] and PTES[CCE] methods. We present results separately for PTES[C] because

it is the only method that involved single parameter (V1), while the other two PTES

methods occupied both parameters V1 and V2.

Figure 5.7: Performance efficiency of PTES[C], Sch, and LB methods, using differentInitial Q: a) PTES[C] 200 tags and b) PTES[C] 300 tags

Part I Experiment results, as shown in Figure 5.7, illustrate that different initial Q have

individual impact on system efficiency for PTES[C] method. All PTES[C]’s parameters

(V1 2.0 to 3.0) are displayed in the figure. Considering different number of tags (See Figure

5.7a and 5.7b), the results show that initial Q of 8 is the optimal Q for all approaches.

According to both figures, the maximum performance efficiency using different methods,

including Sch, LB, and PTES[C] methods, can be achieved when the initial Q is set to 8.

103

Page 130: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Theoretically, the optimal performance efficiency can be achieved when the number of

tags is equal to the size of the frame length. This is proven to be true in Figure 5.7a),

where the optimal performance was reached with initial Q of 8 regardless of any method

applied. When the number of tags is equal to 200 tags, Q = 8 is the best candidate since

it is the nearest frame length available. Similarly, when the number of tags increased to

300 tags, initial Q of 8 is still the best option as it has the closest frame length.

Figure 5.8: Performance efficiency of PTES[CE], PTES[CCE], Sch, and LB methods, usingdifferent Initial Q: a) PTES[CE] 200 tags, b) PTES[CE] 300 tags, c) PTES[CCE] 200 tagsand d) PTES[CCE] 300 tags

104

Page 131: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.2. PRECISE TAG ESTIMATION SCHEME

Part II From Figure 5.8, it can be seen that different initial Q also have individual

impact on system efficiency for both PTES[CE] and PTES[CCE] methods. The best

parameters V1 between 2.0 to 2.5 and V2 between 0.1 to 0.2 are displayed in the figure.

Similar to PTES[C], Figure 5.8 illustrates that the maximum performance efficiency using

different methods (Sch, LB, PTES[CE], and PTES[CCE]) can be achieved when the initial

Q is 8. In addition, it is noticeable that most variables of PTES[CCE] perform more

stably compared with the PTES[CE] approach. For instance, Figure 5.8c) shows more

lines overlap than Figure 5.8a), which means that all parameters of PTES[CCE] generate

more constant results than the PTES[CE].

The challenge of choosing the initial Q is to take into consideration the amount of

actual tags, which will be presented to the reader at the beginning of the read cycle.

From results of both parts of the first experiment, we verified that the initial Q of 8 is

the most suitable Q on average for our proposed PTES methods. Nevertheless, the

selected initial Q is mainly appropriate for PTES method that is incorporated with any

probabilistic anti-collision approach, without grouping strategy. For other probabilistic

anti-collision methods that involved grouping rules, such as EDFSA and PCT, different

initial Q may be more suitable for specific tag groups.

5.2.6.2 Results - Impacts of Different Number of Tags

The second experiment verifies that different number of tags also have impacts on perfor-

mances of each anti-collision techniques. Initial Q of 8 is used in this experiment since

it gives maximum performance efficiency according to the first experiment. We compared

our PTES algorithm with Sch method since it is simple and gives accurate Backlog predic-

tion. The LB method is not considered in this experiment due to the excessive number of

frames required from initial test case compared with Schoute method. In this experiment,

we also divide our results into two parts. In the first part, we present results on PTES[C]

method; and for the second part, we demonstrate results on PTES[CE] and PTES[CCE]

methods.

Part I To measure the performance efficiency of PTES[C] approach, we performed test-

ing on data sets of 100 to 500 tags, and compared the results against Sch method. From

Table 5.10, it can be seen that when the number of tags is equal to 200 tags, every anti-

collision methods achieved highest system efficiency. Relatively to the first experiment,

this result also validates the Binomial distribution fundamental where the optimal effi-

ciency can be obtained if the frame-size is equal to the number of tags. Nevertheless,

for 200 to 500 tags, all methods maintain their system efficiency above 30 percent. The

Table also demonstrates that the optimal parameters V1 for PTES[C] is 2.5, where these

parameters give highest system efficiency compared with other variables. In addition, pa-

105

Page 132: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Table 5.10: Performance efficiency of PTES[C], Sch, and LB methods, using Initial of 8on different sets of tags

EfficiencyAnti-Collision Approaches 100 tags 200 tags 300 tags 400 tags 500 tags

PTES[C]: 2.0 0.28409 0.37037 0.33557 0.35273 0.35461PTES[C]: 2.1 0.28409 0.36496 0.33557 0.33167 0.35461PTES[C]: 2.2 0.27174 0.36765 0.33259 0.33167 0.35511

PTES[C]: 2.3 0.26882 0.36765 0.33186 0.32051 0.35511PTES[C]: 2.4 0.26882 0.36765 0.33186 0.32051 0.35511PTES[C]: 2.5 0.26882 0.37313 0.33186 0.32051 0.35511PTES[C]: 2.6 0.26882 0.37313 0.34247 0.32051 0.32468PTES[C]: 2.7 0.26882 0.37313 0.34247 0.32051 0.32468PTES[C]: 2.8 0.27473 0.37313 0.34247 0.31847 0.32468PTES[C]: 2.9 0.27473 0.37313 0.34091 0.31847 0.32468PTES[C]: 3.0 0.27473 0.36765 0.34091 0.31847 0.30788

Schoute 0.26882 0.36765 0.33186 0.32051 0.35511

rameters V1 of 2.3 and 2.4 give equivalent efficiency for all tag sets compared with Sch

method. Since Sch method uses 2.39 for variable V1, it is rational for parameters 2.3 and

2.4 to perform correspondingly to Sch method. However, our results show that 2.5 is the

optimal V1 parameter, which contradict with Sch method that claims 2.39 as its optimal

value. We verify this result as dependent upon the chosen initial Q in our experiment.

However, it can be assumed that Sch method considers its performance toward all Qs,

while we only consider optimal Q in our case. Since initial Q is tunable to the user’s

favour, we decided that it is only necessary to find optimal V1 for specific initial Q.

Figure 5.9: Performance efficiency (a) and Number of frames (b) of PTES[C] (V1 = 2.3to 2.5) versus Sch methods, using Initial Q of 8 on different tag sets

106

Page 133: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.2. PRECISE TAG ESTIMATION SCHEME

After considering performance efficiency, we also look into total number of frames

produced by each method. The number of frames determines the initiative time in each

identification cycle; the higher the number of frame means the longer identification delay.

According to Figure 5.9b), it can be seen that PTES[C] with the optimal parameter

V1 of 2.5 also used the lowest number of frames for all number of tags. Judging from

both performance efficiency (Figure 5.9a) and number of frames (Figure 5.9b) queried, we

conclude that PTES[C] with optimal parameters V1 = 2.5 and optimal initial Q of 8 can

achieve the best system efficiency compared with Sch method.

Table 5.11: Performance efficiency of PTES[CE], PTES[CCE], Sch, and LB methods,using Initial of 8 on different sets of tags

EfficiencyAnti-Collision Approaches 100 tags 200 tags 300 tags 400 tags 500 tags

PTES[CE]: 2.0, 0.1 0.27174 0.36765 0.33186 0.35211 0.35511PTES[CE]: 2.0, 0.2 0.24038 0.36765 0.33186 0.33333 0.34530PTES[CE]: 2.1, 0.1 0.26882 0.36765 0.33186 0.31847 0.35511PTES[CE]: 2.1, 0.2 0.24038 0.37879 0.31780 0.31646 0.34530PTES[CE]: 2.2, 0.1 0.27473 0.36765 0.33186 0.31847 0.34626PTES[CE]: 2.2, 0.2 0.24038 0.36765 0.31780 0.31646 0.30637

PTES[CE]: 2.3, 0.1 0.27473 0.37313 0.34091 0.31847 0.36550PTES[CE]: 2.3, 0.2 0.24038 0.36765 0.32328 0.31646 0.29481PTES[CE]: 2.4, 0.1 0.27473 0.37313 0.34091 0.31847 0.30788PTES[CE]: 2.4, 0.2 0.24038 0.36765 0.32328 0.31646 0.29481PTES[CE]: 2.5, 0.1 0.27473 0.37313 0.32328 0.31847 0.30788PTES[CE]: 2.5, 0.2 0.24038 0.34722 0.32328 0.31646 0.29481

PTES[CCE]: 2.0, 0.1 0.27174 0.36765 0.33186 0.35211 0.35511PTES[CCE]: 2.0, 0.2 0.27473 0.36765 0.33186 0.33333 0.34530PTES[CCE]: 2.1, 0.1 0.26882 0.36765 0.33186 0.33333 0.35511PTES[CCE]: 2.1, 0.2 0.27174 0.37879 0.32328 0.32895 0.34530PTES[CCE]: 2.2, 0.1 0.27473 0.36765 0.33186 0.33333 0.34626PTES[CCE]: 2.2, 0.2 0.27174 0.36765 0.32328 0.32895 0.30637

PTES[CCE]: 2.3, 0.1 0.27473 0.37313 0.34091 0.33333 0.36550PTES[CCE]: 2.3, 0.2 0.27174 0.36765 0.32328 0.32895 0.29481PTES[CCE]: 2.4, 0.1 0.27473 0.37313 0.34091 0.33333 0.30788PTES[CCE]: 2.4, 0.2 0.27174 0.36765 0.32328 0.32895 0.29481PTES[CCE]: 2.5, 0.1 0.27473 0.37313 0.32328 0.33333 0.30788PTES[CCE]: 2.5, 0.2 0.27174 0.36765 0.32328 0.32895 0.29481

Schoute 0.26882 0.36765 0.33186 0.32051 0.35311

Part II From Table 5.11, it can be seen that for 200 to 500 tags, all methods including

Sch, PTES[CE], and PTES[CCE], maintain their performance efficiency above 30

percent. The Table also demonstrates that both PTES[CE] and PTES[CCE] with

parameters V1 and V2 equal to 2.3 and 0.1 respectively, give the highest system efficiency.

The two PTES methods perform equivalently for all data sets except for 400 tag sets.

107

Page 134: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Specifically, looking closely at Figure 5.10a), we can see that PTES[CE] method

obtained lower efficiency for 400 tags compared with Sch method, despite the optimal

parameters used. On the other hand, we can see from Figure 5.10c) that the PTES[CCE]

still maintains its performance against Sch method regardless of number of tags. From

these results, we now summarise that for both PTES[CE] and PTES[CCE], parameters

V1 = 2.3 and V2 = 0.1 can achieve the best system efficiency. Nevertheless, the

PTES[CCE] has the most stable performance compared with other approaches.

Figure 5.10: Results of PTES[CE] and PTES[CCE] (V1 = 2.3, V2 = 0.1) versus Schmethods using Initial Q of 8 on different tag sets: Performance efficiency (a: PTES[CE],c: PTES[CCE]) and Number of frames (b: PTES[CE], d: PTES[CCE])

After considering performance efficiency, we are now looking into total number of

frames produced by each method. According to Figure 5.10b) and Figure 5.10d), it can

be seen that PTES[CE] and PTES[CCE] with optimal parameters, also used the lowest

number of frames for all number of tags. These results are far more superior, in terms of

108

Page 135: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3. PROBABILISTIC CLUSTER-BASED TECHNIQUE

performance and number of frames required, compared with the performance of PTES[C]

discussed in Part I. This is due to the fact that the PTES[C] only used one variable

that only consider the impact of collision slots, while the other two PTES methods also

take into consideration the impact of empty slots from previous frames. Justified by both

system efficiency and number of frames, we conclude than PTES[CCE], with parameters

V1 = 2.3 and V2 = 0.1 and optimal initial Q of 8, is the best approach out of the three

proposed PTES. Therefore, PTES[CCE] approach is chosen as a frame-size prediction for

DFSA, EDFSA, and PCT methods for our PCT experiments.

5.3 Probabilistic Cluster-Based Technique

The PCT method employs a dynamic probabilistic algorithm concept, and uses group-

splitting rule, to split Backlog into group if the number of unread tags is higher than the

maximum frame-size.

The PCT approach first estimates the number of Backlog, or the remaining tags, within

the interrogation zone. If the number of Backlog is larger than the specific frame-size, it

splits the number of Backlog into a number of groups and allows only one group of tags to

respond. The reader then issues a “Query”, which contains a ‘Q’ parameter to specify the

frame-size (frame-size F(min) = 0; F(max) = 2Q - 1). Each selected tag in the group will

pick a random number between 0 to 2Q - 1 and put it into its slot counter. Only the tag

that picks zero as its slot counter responds to the request. When the number of estimated

Backlog is below the threshold, the reader adjusts the frame-size without grouping the

unread tags. After each read cycle, the reader estimates the number of Backlog using the

PTES algorithm and adjusts its frame-size.

5.3.1 Probabilistic Anti-Collision Algorithm using PTES

PCT approach first estimates the number of unread tags, then it decides if the number

of tags needs to be spliced or not. The probabilistic anti-collision algorithm using PTES

frame-size prediction is then applied to each selected group of tag.

Algorithm 4 demonstrates the probabilistic anti-collision algorithm applied to each

selected group of tags, where only one group of tags responds to the reader. There are

three kinds of slot:

1. Successful slot: Where there is only one tag reply, the reader sends ACK(RN16)

to a tag. The tag then backscatters its EPC to the reader and the reader issues

QueryRep for the next slot.

2. Empty slot: Where there is no tag reply, the reader then issues QueryRep for the

next slot.

109

Page 136: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Reader sends Queryfor (Identification procedure) do

Every tags generate RN16 and slot counter;for (Current frame) do

if (Slot counter == 0) thenTag replies its RN16;if (A single tag replies) then

Reader sends ACK(RN16) to a tag;if (RN16 received by tag == RN16 tag saved data) then

Tag sends (EPC+PC+CRC) to reader;endReader sends QueryRep;

endelse if (Multiple tags reply) then

Reader sends QueryRep;endelse if (No tag replies) then

Reader sends QueryRep;end

endif (Tag receives QueryRep) then

slot counter = slot counter - 1;end

endReader uses PTES algorithm to adjust the size of the new frame;Reader sends QueryAdjust;

endAlgorithm 4: Probabilistic anti-collision algorithm with PTES Frame-Size Prediction

3. Collision slot: Where there is more than one tag reply, the reader then issues

QueryRep for the next slot.

After “QueryRep” command is received, each tag decreases its slot counter by 1. At

the end of each frame, the reader checks if all tags have been identified. Then, the reader

estimates the number of Backlog using PTES algorithm, and adjust its frame-size.

5.3.2 PCT Preliminary

Instead of splitting tags into group randomly, the PCT approach derived new rules using

particular equations, according to the optimal system efficiency obtained for specific num-

ber of tags. We first conducted an experiment to acquire optimal frame-size for specific

number of tags as shown in Figure 5.11. It can be seen that the optimal system efficiency

achieved by the probabilistic ALOHA method is approximately 38 percent and the opti-

mal number of tags is close to the maximum frame-size. Efficiency is calculated as shown

in Equation 5.3:

110

Page 137: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3. PROBABILISTIC CLUSTER-BASED TECHNIQUE

Figure 5.11: Performance efficiency of different frame-size on different number of tags

Efficiency = (S

S + C + E) (5.3)

Where S is the number of Successful slots, C is the number of Collision slots, and E is

the number of Empty slots.

From the results acquired for performance efficiency evaluation, we have developed

equations 5.4, 5.5, 5.6, 5.7 and 5.8 to find a minimum and maximum number of tags

suitable for particular frame-size. These minimum and maximum numbers of tags are

derived to acquire the optimal performance efficiencies, as in Figure 5.11. Each equation

is then used to exploit rules for PCT.

To show in detail, the derivation of equations 5.4, 5.5, 5.6, 5.7 and 5.8, Table 5.12

demonstrates given information found from Figure 5.11, and all missing fields. From

Table 5.12, it is visible that at optimal system efficiency of 38 percent, the number of

tags is equal to the available frame-size calculated by 2Q. We have set the minimum and

maximum boundary efficiencies at 33 percent. The information on maximum number of

tags at 33 percent is also available from Figure 5.11. For example, when Q is equal to

8, the optimal percentage efficiency can be obtain at 256 tags and the number of tags at

maximum boundary is equal to 352 tags.

111

Page 138: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

max = 2Q + 2(Q−1) − 2(Q−2) + 2(Q−3)

min = (2(Q−1) + 2(Q−2) − 2(Q−3) + 2(Q−4)) + 1 (5.4)

max = (2Q + 2(Q−1) − 2(Q−2) + 2(Q−3)) + (2(Q−2) + 2(Q−3) − 2(Q−4) + 2(Q−5))

min = (2Q + 2(Q−1) − 2(Q−2) + 2(Q−3)) + 1 (5.5)

max = (2Q + 2(Q−1) − 2(Q−2) + 2(Q−3)) + (2(Q−1) + 2(Q−2) − 2(Q−3) + 2(Q−4))

min = (2Q + 2(Q−1) − 2(Q−2) + 2(Q−3)) + 1 (5.6)

max = (2Q + 2(Q−1) − 2(Q−2) + 2(Q−3)) + (2(Q−1) + 2(Q−2) − 2(Q−3) + 2(Q−4))

min = [(2Q + 2(Q−1) − 2(Q−2) + 2(Q−3)) + (2(Q−2) + 2(Q−3) − 2(Q−4) + 2(Q−5))] + 1 (5.7)

max = (2Q + 2(Q−1) − 2(Q−2) + 2(Q−3)) + (2(Q−1) + 2(Q−2) − 2(Q−3) + 2(Q−4))+

(2(Q−2) + 2(Q−3) − 2(Q−4) + 2(Q−5))

min = [(2Q + 2(Q−1) − 2(Q−2) + 2(Q−3)) + (2(Q−1) + 2(Q−2) − 2(Q−3) + 2(Q−4))] + 1 (5.8)

Figure 5.12 illustrates the minimum and maximum boundaries and their correlated

percentage of efficiency for frame-size of 256. The figure shows that when the number of

tags equal 177 and 352, the percentage of efficiency is equal to 33 percent.

Table 5.12: Available Information and Missing fields on System Efficiency. MinB = Min-imum point of occurrence, MaxB = Maximum point of occurrence

Q MinB at 33% MaxB at 33% Optimal at 38%9 Unknown 704 5128 Unknown 352 2567 Unknown 176 1286 Unknown 88 645 Unknown 44 324 Unknown Unknown 163 Unknown Unknown 82 Unknown Unknown 41 Unknown Unknown 2

Table 5.13 demonstrates the derived answers for missing fields from Table 5.12. The

minimum boundary with 33 percent efficiency is calculated by the maximum boundary of

the previous frame plus 1. Thus, for Q8, the minimum boundary is equal to 177 (176 +

1). After finding all information needed, the reverse engineered equations for maximum

and minimum boundaries are derived for each Q. After we found all outcomes for each Q,

it is now possible to find the equation for two or more type of Qs.

In order to simplify the derived equations, we employ the use of β (Beta), κ (Kappa),

and µ (Mu), and assigned these three icons to express each rule. In this research, we

112

Page 139: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3. PROBABILISTIC CLUSTER-BASED TECHNIQUE

Figure 5.12: The minimum and maximum boundaries and their correlated percentage ofefficiency for frame-size of 256

proposed three rules for PCT: PCT256, PCT128, and PCT-E (PCT-Extended). All rules

split the number of Backlog into groups then used one of initial Q8 (frame-size 256), Q7

(frame-size 128), or Q6 (frame-size 64), to identify a current set of tags. Equation 5.9

shows the conversion of all three key sets, from equation 5.4 to 5.8, into β, κ, and µ.

β = 2Q + 2(Q−1) − 2(Q−2) + 2(Q−3)

κ = 2(Q−1) + 2(Q−2) − 2(Q−3) + 2(Q−4)

µ = 2(Q−2) + 2(Q−3) − 2(Q−4) + 2(Q−5) (5.9)

From equation 5.4, 5.5, 5.6, 5.7 and 5.8, we derived three key sets within these equa-

tions. These key sets are converted into β, κ, and µ and applied into each PCT rule, as

shown in Table 5.14. Table 5.14 displays the conversion of equations 5.4 to 5.8, with the

minimum and maximum boundaries for each rule. For instance, Equation 5.4 is applied

to all three rules: PCT256, PCT128, and PCT-E. However, Equation 5.5 only apply to

PCT-E.

113

Page 140: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Table 5.13: Derived Equations for Missing fields on System Efficiency. MinB = Minimumpoint of occurrence, MaxB = Maximum point of occurrence

MinB Reverse Engineered Calculation of the DerivedQ at 33% Equation for MinB Equation for MinB

9 353 (2(Q−1) + 2(Q−2) - 2(Q−3) + 2(Q−4)) + 1 (256 + 128 - 64 + 32) + 1 = 3538 177 (2(Q−1) + 2(Q−2) - 2(Q−3) + 2(Q−4)) + 1 (128 + 64 - 32 + 16) + 1 = 1777 89 (2(Q−1) + 2(Q−2) - 2(Q−3) + 2(Q−4)) + 1 (64 + 32 - 16 + 8) + 1 = 896 45 (2(Q−1) + 2(Q−2) - 2(Q−3) + 2(Q−4)) + 1 (32 + 16 - 8 + 4) + 1 = 455 23 (2(Q−1) + 2(Q−2) - 2(Q−3) + 2(Q−4)) + 1 (16 + 8 - 4 + 2) + 1 = 234 12 (2(Q−1) + 2(Q−2) - 2(Q−3) + 2(Q−4)) + 1 (8 + 4 - 2 + 1) + 1 = 123 6 (2(Q−1) + 2(Q−2) - 2(Q−3) + 2(Q−4)) + 1 (4 + 2 - 1 + 0) + 1 = 62 4 (2(Q−1) + 2(Q−2) - 2(Q−3) + 2(Q−4)) + 1 (2 + 1 - 0 + 0) + 1 = 41 2 (2(Q−1) + 2(Q−2) - 2(Q−3) + 2(Q−4)) + 1 (1 + 0 - 0 + 0) + 1 = 2

MaxB Reverse Engineered Calculation of the DerivedQ at 33% Equation for MaxB Equation for MaxB

9 704 2Q + 2(Q−1) - 2(Q−2) + 2(Q−3) 512 + 256 - 128 + 64 = 7048 352 2Q + 2(Q−1) - 2(Q−2) + 2(Q−3) 256 + 128 - 64 + 32 = 3527 176 2Q + 2(Q−1) - 2(Q−2) + 2(Q−3) 128 + 64 - 32 + 16 = 1766 88 2Q + 2(Q−1) - 2(Q−2) + 2(Q−3) 64 + 32 - 16 + 8 = 885 44 2Q + 2(Q−1) - 2(Q−2) + 2(Q−3) 32 + 16 - 8 + 4 = 444 22 2Q + 2(Q−1) - 2(Q−2) + 2(Q−3) 16 + 8 - 4 + 2 = 223 11 2Q + 2(Q−1) - 2(Q−2) + 2(Q−3) 8 + 4 - 2 + 1 = 112 5 2Q + 2(Q−1) - 2(Q−2) + 2(Q−3) 4 + 2 - 1 + 0 = 51 3 2Q + 2(Q−1) - 2(Q−2) + 2(Q−3) 2 + 1 - 0 + 0 = 3

5.3.3 Sample Boundary Computation

To demonstrate the computation of each PCT rule, we initiate sample calculation of each

rule that utilise equation 5.4 to 5.8 from Table 5.14.

Table 5.14: The conversion of PCT rules to β Beta, κ Kappa, and µ MuPCT256 PCT128 PCT-E

Max βMin κ + 1 (5.4)

β + µβ + 1 (5.5)

Max β + κ β + κMin β + 1 (5.6) [β + µ] + 1 (5.7)

β + κ + µ[β + κ] + 1 (5.8)

5.3.3.1 Equation 5.4 computation

In the case that only one type of ‘Q’, either 7 or 8 is applied during the identification cycle,

Equation 5.4 is used to calculate a minimum and maximum number of tags. Therefore, for

PCT256, PCT128 and PCT-E rules, we obtained the maximum and the minimum number

of tags by rewriting Equation 5.4, as shown in Table 5.15, 5.17 and 5.19. For instance, for

PCT256 where Q = 8, Equation 5.4 can be rewritten as follows:

114

Page 141: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3. PROBABILISTIC CLUSTER-BASED TECHNIQUE

max = β

= 28 + 2(8−1) − 2(8−2) + 2(8−3)

= 352

min = κ+ 1

= (2(8−1) + 2(8−2) − 2(8−3) + 2(8−4)) + 1

= 177

Therefore, for PCT256 after applying Equation 5.4, we obtained the maximum number of

tags of 352 and the minimum number of tags of 177.

Based on the same principle as PCT256, for PCT128 where Q = 7, Equation 5.4 can

be rewritten as follows:

max = β

= 27 + 2(7−1) − 2(7−2) + 2(7−3)

= 176

min = κ+ 1

= (2(7−1) + 2(7−2) − 2(7−3) + 2(7−4)) + 1

= 89

Thus, for PCT128 after applying Equation 5.4, we obtained the maximum number of tags

of 176 and the minimum number of tags of 89.

5.3.3.2 Equation 5.5 and 5.7 computations

Equations 5.5 and 5.7 are used to calculate a minimum and maximum number of tags for

PCT rules, in the case that two types of ‘Q’, either 8 & 7 or 8 & 6 are used during the

identification cycle. This rule only applies to PCT-E (See Table 5.14). After rewriting

Equation 5.5 or 5.7, we obtained the maximum and the minimum number of tags as shown

in Table 5.19. For example, for PCT-E where Q = 8, Equation 5.5 can be rewritten as

follows:

115

Page 142: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

max = β + µ

= (28 + 2(8−1) − 2(8−2) + 2(8−3)) + (2(8−2) + 2(8−3) − 2(8−4) + 2(8−5))

= 440

min = β + 1

= (28 + 2(8−1) − 2(8−2) + 2(8−3)) + 1

= 353

Thus, for PCT-E after applying Equation 5.5, we obtained the maximum number of tags

of 440 and the minimum number of tags of 353.

In addition, for PCT-E where Q = 8, Equation 5.7 can be rewritten as follows:

max = β + κ

= (28 + 2(8−1) − 2(8−2) + 2(8−3)) + (2(8−1) + 2(8−2) − 2(8−3) + 2(8−4))

= 528

min = β + µ+ 1

= (28 + 2(8−1) − 2(8−2) + 2(8−3)) + (2(8−2) + 2(8−3) − 2(8−4) + 2(8−5)) + 1

= 441

Therefore, for PCT-E after applying Equation 5.7, we obtained the maximum number of

tags of 528 and the minimum number of tags of 441.

5.3.3.3 Equation 5.6 computation

For the case where two types of ‘Q’, either 8 & 7 or 7 & 6 are used during the identification

cycle, Equation 5.6 is used to calculate a minimum and maximum number of tags for PCT

rules. This rule only applies to PCT256 and PCT128 but does not apply to PCT-E (See

Table 5.14). After rewriting Equation 5.6, we obtained the maximum and the minimum

number of tags as shown in Table 5.15 and 5.17. For example, for PCT256 where Q = 8,

Equation 5.6 can be rewritten as follows:

116

Page 143: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3. PROBABILISTIC CLUSTER-BASED TECHNIQUE

max = β + κ

= (28 + 2(8−1) − 2(8−2) + 2(8−3)) + (2(8−1) + 2(8−2) − 2(8−3) + 2(8−4))

= 528

min = β + 1

= (28 + 2(8−1) − 2(8−2) + 2(8−3)) + 1

= 353

Therefore, for PCT256 after applying Equation 5.6, we obtained the maximum number of

tags of 528 and the minimum number of tags of 353.

Also, for PCT128 where Q = 7, Equation 5.6 can be rewritten as follows:

max = β + κ

= (27 + 2(7−1) − 2(7−2) + 2(7−3)) + (2(7−1) + 2(7−2) − 2(7−3) + 2(7−4)

= 264

min = β + 1

= (27 + 2(7−1) − 2(7−2) + 2(7−3)) + 1

= 177

Therefore, for PCT128 after applying Equation 5.6, we obtained the maximum number of

tags of 264 and the minimum number of tags of 177.

5.3.3.4 Equation 5.8 computation

Equation 5.8 is used to calculate a minimum and maximum number of tags, in the case

of three types of ‘Q’, 6, 7, and 8 are applied in PCT-E rule. After rewriting Equation 5.8,

we obtained the maximum and the minimum number of tags as shown in Table 5.19. For

instance, for PCT-E where Q = 8, Equation 5.8 can be rewritten as follows:

117

Page 144: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

max = β + κ+ µ

= (28 + 2(8−1) − 2(8−2) + 2(8−3)) + (2(8−1) + 2(8−2) − 2(8−3) + 2(8−4))+

(2(8−2) + 2(8−3) − 2(8−4) + 2(8−5))

= 616

min = [β + κ] + 1

= [(28 + 2(8−1) − 2(8−2) + 2(8−3)) + (2(8−1) + 2(8−2) − 2(8−3) + 2(8−4))] + 1

= 529

Therefore, for PCT-E after applying Equation 5.8, we obtained the maximum number of

tags of 616 and the minimum number of tags of 529.

For both PCT256 and PCT-E rules, if the number of unread tags is larger than 352

and in order to achieve the optimal system efficiency, we must divide the tags into two or

more groups. For the number of unread tags smaller than 352, we must let every unread

tag responds.

Similarly, for PCT128 rule, if the number of unread tags is larger than 176 and in

order to achieve the optimal system efficiency, we must divide the tags into two or more

groups. By doing this, we can always obtain the expected system efficiency as displayed

in Figure 5.11.

5.3.4 PCT Rules

PCT approach derived new rules using particular equations expressed by β Beta, κ Kappa,

and µ Mu. All rules split the number of Backlog into groups then used one of Q8 (frame-

size 256), Q7 (frame-size 128), or Q6 (frame-size 64), to identify a current set of tags. We

make the assumption that the performance efficiency can be improved by dividing tags

into accurate number of groups, and then performing the tag identification separately

for each group. In this research, we have chosen the frame-size of 256, 128, and 64 for

our PCT rules since the initial Q of 8, 7 and 6 provide the most appropriate range for

the current RFID reader and passive tags specification. Generally, the UHF reader is

capable of capturing variety numbers of passive tags, depending on the reader type and

tag class (e.g. Class 0: Read-only tag). Thus, selected initial Qs are the most suitable

for our proposed rules. Each PCT rule, with the minimum and maximum boundaries, is

explained as follows:

118

Page 145: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3. PROBABILISTIC CLUSTER-BASED TECHNIQUE

5.3.4.1 PCT256

PCT256 uses either frame-size of 256 (Q = 8) or frame-size of 128 (Q = 7) for tag identifi-

cation. We assume that the identification time and performance efficiency of our proposed

PCT256 will advance from the existing probabilistic approaches. From the preliminary

for all PCT rules, we obtained specific equations to calculate minimum and maximum

boundaries for the PCT256 rule. These equations are applied as shown in Table 5.15.

Table 5.15: PCT256 Boundary Computation - number of group (Frame-Size 256 and 128),and minimum and maximum boundaries

PCT256 Boundary ComputationFS 256 FS 128 Minimum Bound Maximum Bound

.... .... .... ....4 - [3β + κ] + 1 4β3 1 3β + 1 3β + κ3 - [2β + κ] + 1 3β2 1 2β + 1 2β + κ2 - [β + κ] + 1 2β1 1 β + 1 β + κ1 - κ + 1 β

.... .... .... ....

Table 5.15 displays the relevant equations for minimum and maximum boundaries

calculation for the PCT256 rule. From the Table, we can see that there are two frame-

size, 256 and 128, for grouping division. For example, the minimum boundary is calculated

by 3β + 1 when the number of group division comprises three groups of 256 and one group

of 128, and the maximum boundary is calculated by 3β + κ. Following the computation,

the minimum and maximum boundaries are 1057 and 1232 respectively, as show in Table

5.16. The detailed calculation is present as follows:

max = 3β + κ

= 3(28 + 2(8−1) − 2(8−2) + 2(8−3)) + (2(8−1) + 2(8−2) − 2(8−3) + 2(8−4))

= 1232

min = 3β + 1

= 3(28 + 2(8−1) − 2(8−2) + 2(8−3)) + 1

= 1057

After applying specific equations for each group division, Table 5.16 shows the final

PCT rule for PCT256. For instance, if the number of Backlog equals to 900 tags, the

PCT256 algorithm will split the unread tags into three groups of Q8 (256).

Algorithm 5 demonstrates the group splitting algorithm using PCT256 rule, and either

keep tag in a single group or split tag into number of groups according to PCT256 rule.

119

Page 146: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Table 5.16: PCT256 Rule - The number of unread tags, optimal frame-size (A and B),and number of group (A and B)

PCT256 RuleBacklogs FS A Group A FS B Group B

.... .... .... .... ....1233 to 1408 256 4 - -1057 to 1232 256 3 128 1881 to 1056 256 3 - -705 to 880 256 2 128 1529 to 704 256 2 - -353 to 528 256 1 128 1177 to 352 256 1 - -89 to 176 128 1 - -45 to 88 64 1 - -23 to 44 32 1 - -12 to 22 16 1 - -6 to 11 8 1 - -

.... .... .... .... ....

Input: TagcountOutput: Number of Groupfor (Group Splitting procedure) do

if Tagcount less than 353 tags thenKeep tag into a single group;

endelse

while Looking up PCT256 Rule Table doif Found Matched rule for specific Backlog then

Split tags into groups;end

end

endOutput number of groups;

endAlgorithm 5: Group Splitting Algorithm using PCT256 Rule

5.3.4.2 PCT128

PCT128 uses either frame-size of 128 (Q = 7) or frame-size of 64 (Q = 6) for tag identifi-

cation. The PCT128 contains higher number of groups in some cases, compared with the

PCT256 method, which may result in worse performance efficiency for specific number of

tags. We calculate minimum and maximum boundaries for the PCT128 rule according to

specific equations. These equations are applied, as shown in Table 5.17.

Table 5.17 displays the relevant equations for minimum and maximum boundaries

calculation for the PCT128 rule. From the Table, it can be seen that there are two frame-

size, 128 and 64, for grouping division. For example, the minimum boundary is calculated

by 5β + 1 when the number of group division comprises five groups of 128 and one group

120

Page 147: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3. PROBABILISTIC CLUSTER-BASED TECHNIQUE

Table 5.17: PCT128 Boundary Computation - number of group (Frame-Size 128 and 64),and minimum and maximum boundaries

PCT128 Boundary ComputationFS 128 FS 64 Minimum Bound Maximum Bound

.... .... .... ....8 - [7β + κ] + 1 8β7 1 7β + 1 7β + κ7 - [6β + κ] + 1 7β6 1 6β + 1 6β + κ6 - [5β + κ] + 1 6β5 1 5β + 1 5β + κ5 - [4β + κ] + 1 5β4 1 4β + 1 4β + κ4 - [3β + κ] + 1 4β3 1 3β + 1 3β + κ3 - [2β + κ] + 1 3β2 1 2β + 1 2β + κ2 - [β + κ] + 1 2β1 1 β + 1 β + κ1 - κ + 1 β

.... .... .... ....

of 64, and the maximum boundary is calculated by 5β + κ. Following the computation,

the minimum and maximum boundaries are 881 and 968 respectively, as show in Table

5.18.

Table 5.18: PCT128 Rule - The number of unread tags, optimal frame-size (A and B),and number of group (A and B)

PCT128 RuleBacklogs FS A Group A FS B Group B

.... .... .... .... ....1321 to 1408 128 8 - -1233 to 1320 128 7 64 11145 to 1232 128 7 - -1057 to 1144 128 6 64 1969 to 1056 128 6 - -881 to 968 128 5 64 1793 to 880 128 5 - -705 to 792 128 4 64 1617 to 704 128 4 - -529 to 616 128 3 64 1441 to 528 128 3 - -353 to 440 128 2 64 1265 to 352 128 2 - -177 to 264 128 1 64 189 to 176 128 1 - -45 to 88 64 1 - -23 to 44 32 1 - -12 to 22 16 1 - -6 to 11 8 1 - -

.... .... .... .... ....

121

Page 148: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Table 5.18 shows the PCT rule for PCT128. For instance, if the number of Backlog

equals to 900 tags, the PCT128 algorithm will split the unread tags into five groups of Q7

(128) and one group of Q6 (64).

Algorithm 6 demonstrates the group splitting algorithm using PCT128 rule, and either

keep tag in a single group or split tag into number of groups according to PCT128 rule.

Input: TagcountOutput: Number of Groupfor (Group Splitting procedure) do

if Tagcount less than 177 tags thenKeep tag into a single group;

endelse

while Looking up PCT128 Rule Table doif Found Matched rule for specific Backlog then

Split tags into groups;end

end

endOutput number of groups;

endAlgorithm 6: Group Splitting Algorithm using PCT128 Rule

5.3.4.3 PCT-Extended

The rules of PCT-Extended (PCT-E) are more complex than the PCT256 and PCT128.

This is because the PCT-E identifies tags using three different frame-size of 256 (Q = 8),

128 (Q = 7), and 64 (Q = 6) instead of two. We assume that the performance efficiency

of PCT-E can improve further from the PCT256. However, the identification time may

increase due to the higher number of group applied in each identification round. From the

preliminary for all PCT rules, we obtained specific equations to calculate minimum and

maximum boundaries for the PCT-E rule. These equations are applied as shown in Table

5.19.

Table 5.19 presents the relevant equations for minimum and maximum boundaries

calculation for the PCT-E rule. From the Table, it is shown that there are three frame-

size, 256, 128 and 64, for grouping division. For instance, the minimum boundary is

calculated by [2β + κ] + 1 when the number of group division comprises two groups of

256, one group of 128, and one group of 64; and the maximum boundary is calculated by

2β + κ + µ. Following the computation, the maximum and minimum boundaries are 881

and 968 respectively, as shown in Table 5.20.

Table 5.20 displays the PCT-E rule. For instance, if the number of Backlog equals to

900 tags, the PCT-E algorithm will split the unread tags into two groups of Q8 (256), one

group of Q7 (128), and one group of Q6 (64).

122

Page 149: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3. PROBABILISTIC CLUSTER-BASED TECHNIQUE

Table 5.19: PCT-E Boundary Computation - number of group (Frame-Size 256, 128 and64), and minimum and maximum boundaries

PCT-E Boundary ComputationFS 256 FS 128 FS 64 Minimum Bound Maximum Bound

.... .... .... .... ....4 - - [3β + κ + µ] + 1 4β3 1 1 [3β + κ] + 1 3β + κ + µ3 1 - [3β + µ] + 1 3β + κ3 - 1 3β +1 3β + µ3 - - [2β + κ + µ] + 1 3β2 1 1 [2β + κ] + 1 2β + κ + µ2 1 - [2β + µ] + 1 2β + κ2 - 1 2β +1 2β + µ2 - - [β + κ + µ] + 1 2β1 1 1 [β + κ] + 1 β + κ + µ1 1 - [β + µ] + 1 β + κ1 - 1 β + 1 β + µ1 - - κ + 1 β

.... .... .... .... ....

Table 5.20: PCT-E Rule - The number of unread tags, optimal frame-size (A, B, C), andnumber of group (A, B, C)

PCT-E RuleBacklogs FS A Group A FS B Group B FS C Group C

.... .... .... .... .... .... ....1321 to 1408 256 4 - - - -1233 to 1320 256 3 128 1 64 11145 to 1232 256 3 128 1 - -1057 to 1144 256 3 - - 64 1969 to 1056 256 3 - - - -881 to 968 256 2 128 1 64 1793 to 880 256 2 128 1 - -705 to 792 256 2 - - 64 1617 to 704 256 2 - - - -529 to 616 256 1 128 1 64 1441 to 528 256 1 128 1 - -353 to 440 256 1 - - 64 1177 to 352 256 1 - - - -89 to 176 128 1 - - - -45 to 88 64 1 - - - -23 to 44 32 1 - - - -12 to 22 16 1 - - - -6 to 11 8 1 - - - -

.... .... .... .... .... .... ....

Algorithm 7 demonstrates the group splitting algorithm using PCT-E rule, and either

keep tag in a single group or split tag into number of groups according to PCT-E rule.

123

Page 150: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Input: TagcountOutput: Number of Groupfor (Group Splitting procedure) do

if Tagcount less than 353 tags thenKeep tag into a single group;

endelse

while Looking up PCT-E Rule Table doif Found Matched rule for specific Backlog then

Split tags into groups;end

end

endOutput number of groups;

endAlgorithm 7: Group Splitting Algorithm using PCT-E Rule

5.3.5 Experimental Evaluation

In order to show the significance of our proposed PCT method, we conducted an experi-

mental evaluation and compared our methods to existing techniques.

5.3.5.1 Preliminary

To study the Probabilistic Cluster-Based Technique, the experiment is assumed to be

under the same environment as for the experimental evaluation of the PTES (Section

5.2).

5.3.5.2 Experiment Data Set

The aim of the experiment is to compare the performance of our proposed PCT method to

the existing probabilistic DFSA and EDFSA anti-collision approaches. In this experiment,

we considered different number of tags, from 100 to 1400, within the interrogation zone.

The number of simulated tags are assumed to be no more than 1400 tags, due to maximum

range of UHF reader and passive tags. For each identification round, optimal tunable

parameters of PTES[CCE] is applied on different Initial Q. For instance, when PCT initial

a new frame with Initial Q of 8, the tunable parameter V1 is set to 2.3 and parameter V2

is set to 0.1. Table 5.21 displays the type of ALOHA-based anti-collision methods applied

to different number of tags and tunable initial Qs. All methods are applied separately to

different randomly generated data sets, giving a total of 70 test cases (14 for each method)

within this experiment.

124

Page 151: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3. PROBABILISTIC CLUSTER-BASED TECHNIQUE

Table 5.21: Chosen Parameters for Experiment ThreeInitial Q Backlog Prediction No. Tags

DFSA 8 PTES[CCE] 100 to 1400EDFSA 8 PTES[CCE] 100 to 1400PCT256 tunable between 7, 8 PTES[CCE] 100 to 1400PCT128 tunable between 6, 7 PTES[CCE] 100 to 1400PCT-E tunable between 6, 7, 8 PTES[CCE] 100 to 1400

5.3.6 Results

Our experiment evaluates the performance of our proposed PCT method to existing DFSA

and EDFSA approaches. Corresponding between Table 5.22 and Figure 5.13a), it can be

seen that both PCT256 and PCT-E produced minimal number of slots during identifica-

tion process, compared with other methods. Specifically, PCT256 and PCT-E technique

minimised the number of slots from EDFSA approach when the number of tags is between

400 and 500, and between 800 and 1200 tags. This is because the number of group sets for

EDFSA will be doubled when the number of Backlog reached the specific threshold; while

PCT increased number of group slowly, according to the estimated number of unread tags.

As a result, the number of slots are minimised for PCT256. On the other hand, PCT128

performed better than DFSA but did not outperform the EDFSA. According to optimal

efficiency displayed in Figure 5.11, the initial Q of 8 (frame-size = 256) has a wider range

of optimal efficiency compared with the initial Q of 7. Therefore, PCT256 with initial

frame-size of 256, has a better performance than the PCT128 with initial frame-size of

128.

Table 5.22: Number of slots comparison and Performance efficiency for DFSA, EDFSA,PCT128, PCT256, and PCT-E methods on different number of tags

Number of Slots EfficiencyTags D ED P128 P256 P-E D ED P128 P256 P-E100 364 364 304 364 364 0.2747 0.2747 0.3289 0.2747 0.2747200 536 536 588 536 536 0.3731 0.3731 0.3401 0.3731 0.3731300 880 880 880 880 880 0.3409 0.3409 0.3409 0.3409 0.3409400 1200 1224 1186 1094 1098 0.3333 0.3268 0.3373 0.3656 0.3643500 1368 1408 1438 1350 1350 0.3655 0.3551 0.3477 0.3704 0.3704600 1776 1672 1758 1672 1670 0.3378 0.3589 0.3413 0.3589 0.3593700 2224 1880 2056 1880 1880 0.3147 0.3723 0.3405 0.3723 0.3723800 2552 2484 2302 2126 2126 0.3135 0.3221 0.3475 0.3763 0.3763900 2812 2672 2644 2416 2448 0.3201 0.3368 0.3404 0.3725 0.36761000 3504 3016 2936 2760 2760 0.2854 0.3316 0.3406 0.3623 0.36231100 3516 3104 3242 2974 2978 0.3129 0.3544 0.3393 0.3699 0.36941200 3800 3288 3494 3230 3230 0.3158 0.3650 0.3434 0.3715 0.37151300 4308 3552 3814 3552 3550 0.3018 0.3660 0.3408 0.3660 0.36621400 4688 3760 4112 3760 3760 0.2986 0.3723 0.3405 0.3723 0.3723

Table 5.22 shows that there is no improvement to our proposed methods compared

with existing methods when the number of tags are low (up to around 300 tags). This

is because PCT methods start dividing tags into groups only when the number of tags

125

Page 152: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Figure 5.13: Number of slots comparison (a) and Performance efficiency (b) for DFSA,EDFSA, PCT128, PCT256, and PCT-E methods on different number of tags

reaches the specific threshold. As a result, for certain tag sizes, the number of slots

and performance efficiency remained unchanged due to the same identification procedure,

compared with DFSA and EDFSA methods. Moreover, Table 5.22 also demonstrates that

the PCT128 is the only method that has different results when the number of tags are

100 and 200 tags. This is due to the fact that PCT128 is the only method that uses

initial frame-size of 128 to predict Backlog. Therefore, even when the number of tags is

still low, the PCT128 starts splitting tags into group, resulting in different tag outcomes.

Furthermore, when the number of tags is 100 tags, PCT128 shows the minimal number of

slots issues. The reason for the outcome is because PCT128 uses frame-size of 7 instead

126

Page 153: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.3. PROBABILISTIC CLUSTER-BASED TECHNIQUE

of 8, as used in other methods. Thus, when the number of tags are as low as 100 tags, the

PCT128 performs the best. However, we can see from Figure 5.13b) that the performance

efficiency of PCT128 stabilises and does not improve any further when the number of tags

increased.

Table 5.22 and Figure 5.13b) show that both PCT256 and PCT-E maintained their

system efficiency above other methods and have the most stable performance. Never-

theless, the PCT-E required additional number of group sets from the PCT256 method

throughout the identification process (see Table 5.16 versus Table 5.20). As a result, the

PCT-E required extra time to initiate a new group compared with the PCT256 method.

On the other hand, the DFSA’s efficiency dropped dramatically when the number of tags

increase, while the EDFSA’s efficiency become unstable during the time when number of

groups doubled-up from 1 to 2 and from 2 to 4. The PCT128 has steady performance but

does not perform as good as PCT256.

Table 5.23: Percentage improvement of the proposed PCT128, PCT256, and PCT-E versusexisting EDFSA (ED) and DFSA (D) techniques

PCT128 PCT256 PCT-Eimproved improved improved improved improved improvedfrom ED from D from ED from D from ED from D

100 16.48 16.48 0.00 0.00 0.00 0.00200 -9.70 -9.70 0.00 0.00 0.00 0.00300 0.00 0.00 0.00 0.00 0.00 0.00400 3.10 1.17 10.62 8.83 10.29 8.50500 -2.13 -5.12 4.12 1.32 4.12 1.32600 -5.14 1.01 0.00 5.86 0.12 5.97700 -9.36 7.55 0.00 15.47 0.00 15.47800 7.33 9.80 14.41 16.69 14.41 16.69900 1.05 5.97 9.58 14.08 8.38 12.941000 2.65 16.21 8.49 21.23 8.49 21.231100 -4.45 7.79 4.19 15.42 4.06 15.301200 -6.27 8.05 1.76 15.00 1.76 15.001300 -7.38 11.47 0.00 17.55 0.06 17.601400 -9.36 12.29 0.00 19.80 0.00 19.80

Average -1.66 5.93 3.80 10.80 3.69 10.70

Table 5.23 demonstrates the percentage of improvement of the proposed PCT method

versus EDFSA and DFSA methods. It can be seen that when the number of tags are

low and the PCT methods have not divided these tags into groups, there are no difference

between the outcome of our methods and existing methods, and the percentage of improve-

ment remain unchanged. However, during the time when number of groups doubled-up

from 1 to 2 (400 tags) and from 2 to 4 (800 tags), PCT256 and PCT-E show the highest

percentage of improvement compared with the EDFSA method. On the other hand, the

percentage of improvement increased more stably compared with the DFSA method, since

the DFSA method does not imply group splitting rules.

The PCT256 has a better performance than the EDFSA by about 4 percent on average,

while it is approximately 11 percent better than the DFSA approach as demonstrated in

127

Page 154: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 5. PROBABILISTIC ANTI-COLLISION APPROACHES

Figure 5.14: Percentage of improvement of PCT compared with DFSA and EDFSA meth-ods

Figure 5.14. The optimal percentage of improvement of PCT256 method can achieve

up to 14 percent and 21 percent compared with the EDFSA and DFSA respectively,

depending on the number of tags within the interrogation zone. Nevertheless, the PCT-E

method required additional number of groups from the PCT method, and acquired slightly

lower percentage of improvement, compared with the PCT method. On the other hand,

the PCT128 has a better performance than the DFSA method by around 6 percent on

average, but does not show any improvement from the EDFSA technique, as displayed in

Figure 5.14. However, the PCT128 still shows some improvement in some cases and is able

to achieve up to 16 percent compared with the EDFSA and DFSA methods. Therefore,

we conclude that our proposed PCT256 method is the most effective method, in terms of

system efficiency and number of slots minimisation.

5.4 Overall Analysis

A total of three experiments were conducted for the ALOHA-based anti-collision ap-

proaches. The first two experimental evaluations are to verify the performance of our

proposed Precise Tag Estimation Scheme and to identify the best tunable parameters for

the method. The third experiment is to compare the performance of our proposed Prob-

abilistic Cluster-Based Technique to existing ALOHA-based methods. From the first two

experiments, we determined that the initial Q of 8 is the most suitable initial Q on average

for our proposed PTES methods. Nevertheless, the selected initial Q is mainly appropriate

for PTES method, incorporated with the probabilistic approach with no grouping rules.

Additionally, we verified that PTES[CCE], with parameters V1 = 2.3 and V2 = 0.1 and

128

Page 155: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

5.5. SUMMARY

optimal initial Q of 8, is the best approach out of the three proposed PTES methods.

In addition to the first two experiments, the final experiment demonstrated that our

proposed PCT method is the most effective method in terms of system efficiency and

number of slots minimisation. Specifically, the PCT256 gives the highest performance

efficiency and outperforms existing ALOHA-based anti-collision methods.

From the analysis of all experiments, we recognised certain properties of importance for

ALOHA-based anti-collision methods, which are: 1) initial Q (frame-size) initialisation;

2) accuracy of Backlog prediction techniques; and 3) overall number of tags within the

interrogation zone.

5.5 Summary

In this chapter, we have investigated the problems on existing probabilistic anti-collision

approaches and proposed a new frame-size estimation scheme, in order to predict a more

precise frame-size to be used and incorporated with a probabilistic anti-collision technique.

We also proposed a new probabilistic anti-collision method, to eliminate shortcomings of

existing approaches. The main contributions and findings of this Chapter are as follows:

• We have proposed a Precise Tag Estimation Scheme (PTES) (Pupunwiwat and Stan-

tic, 2010a), (Pupunwiwat and Stantic, 2010b), which is a method that estimates pre-

cise number of remaining Backlog by using information of collision slots and empty

slots from the previous frame. We found that PTES with correctly tuned Q param-

eter and variable V1 and V2 can achieved optimal results and outperformed existing

frame-size estimation techniques.

• We also proposed a Probabilistic Cluster-Based technique (PCT) (Pupunwiwat and

Stantic, 2010d) to maximise efficiency of the tag identification process and to be

incorporated with our proposed PTES. We discovered that PCT performed the best

compared with existing ALOHA-based anti-collision techniques, regardless of num-

ber of tags within the interrogation zone.

• We have confirmed that the tunable initial Q, the accuracy of Backlog prediction

techniques with correct variables, and the overall number of tags within the interro-

gation zone, have impacted on the performance of any ALOHA-based anti-collision

schemes. Nevertheless, the best performing approach in terms of system efficiency

and robustness of the RFID system, are our proposed probabilistic anti-collision

techniques.

129

Page 156: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems
Page 157: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6Conceptual Selective Technique Management

In this chapter, we analyse our proposed deterministic and probabilistic anti-collision

approaches and determine the best-fit method for specific circumstances. Firstly, we com-

pared the Joined Q-ary Tree and the Probabilistic Cluster-Based Technique, and identified

the performance and certain properties of importance for both anti-collision methods in

general. Secondly, we proposed two new selective techniques management: 1) a Novel

Decision Tree Strategy; and 2) a Six Thinking Hats Strategy (Pupunwiwat et al., 2011).

We applied each selective technique toward the anti-collision method selection process, in

order to find the optimal method for specific scenarios. The benefit from choosing correct

anti-collision methods is that the Chain Reaction impact toward long-term RFID data

management can be reduced. Finally, we formed a new concept and applicability of each

type of anti-collision approach, then applied them to a sample real world scenario. The re-

maining of this chapter comprise the definition of Chain Reaction and why it is important

in RFID data management; the comparative analysis of Joined Q-ary Tree versus Proba-

bilistic Cluster-Based Technique; the foundation of two selective technique management;

and the sample applicability of each anti-collision approach toward real world scenario.

6.1 Chain Reaction from Data Collection Process

A chain reaction is a sequence of reactions where a reactive product or by-product causes

additional reactions to take place. In a chain reaction, positive feedback leads to a self-

amplifying chain of events. As for chain reaction toward RFID data management, the

most important step that will have the largest impact toward data is the RFID data

131

Page 158: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

collection process. If any error occurs at the data collection level, the impact will increase

all subsequent steps, such as data integration and aggregation; data query model and

event processing; and data warehousing and data mining.

Our main goal in this chapter is to identify which anti-collision method is the most

suitable for particular circumstances. In order to do so, we need a precise selective tech-

nique management to classify which anti-collision scheme is the most suitable for specific

scenario. After being able to optimise the anti-collision method selection process, the

Chain Reaction from data collection process can be reduced toward long-term RFID data

management.

6.2 Comparative Analysis of Deterministic and Probabilistic

Techniques

To compare and analyse our proposed anti-collision methods, we identified certain

general properties of importance for anti-collision methods, they are:

Tree-based methods

• Similarity of EPC pattern

• Number of tags within one group of the EPC pattern

• Overall number of tags within the interrogation zone

ALOHA-based methods

• Initial Frame-size (Q) specification

• Accuracy of Backlog prediction techniques

• Overall number of tags within the interrogation zone

In this study, we have empirically compared the performance of the Joined Q-ary

Tree against the PCT anti-collision approach because our deterministic and probabilistic

methods have outperformed existing techniques in their own grounds (Pupunwiwat and

Stantic, 2010c,d). The Joined Q-ary Tree uses less resource, has no complexity in imple-

mentation, and needs low reader power and memory consumption, because it does not need

to keep memory during identification. On the other hand, the Probabilistic Cluster-Based

Technique works well in arbitrary situation, minimise resource used, and increase system

efficiency, without the need for complex implementation. We believe that this comparative

analysis is necessary to identify the best overall method for specific circumstances.

132

Page 159: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.2. COMPARATIVE ANALYSIS OF DETERMINISTIC AND PROBABILISTICTECHNIQUES

6.2.1 Data sets

There are two major test cases involved in our empirical evaluation, and these test cases

have been generated separately. The first test case considers specific EPC patterns (same

product) with 50 and 100 tags per pallet. The second test case, which has been used for

probabilistic approaches, had no specific EPC pattern (different products) nor a specific

number of tags per pallet. These two cases represent a typical situation in a warehouse

environment.

Our three main anti-collision schemes chosen for comparison are: 1) Joined Q-ary

Tree, 2) PCT256 no group, and 3) PCT256. The PCT256 no group does not imply any

group-splitting rule but still employ our proposed PTES as a tag estimation method. Since

it is verified previously that our methods perform better than existing approaches, it is

necessary to know which of our methods is the most suitable under particular condition

and environment. The data sets are explained as follows:

6.2.1.1 Joined Q-ary Tree method

For Joined Q-ary Tree anti-collision approach, there are ten pallets of inventories in test

case A, with each pallet contains 100 cases/tags, giving a total of 1000 tags. Similarly,

test case B also contains 1000 tags but each pallet only holds 50 cases/tags. The GID-96

bits EPC encoding scheme is used with the EPC pattern from Table 6.1.

• Test case A: Joined Q-ary Tree with 100 tags per pallet (Joined(100)) - 10 pallets,

100 cases each, total 1000 tags

• Test case B: Joined Q-ary Tree with 50 tags per pallet (Joined(50)) - 20 pallets,

50 cases each, total 1000 tags

Table 6.1: Chosen EPC Pattern of Tree-based anti-collision methods for ComparativeAnalysis

EPC Pattern (GID-96)H 0011 0101

GMN 104,426,055OC [9,872,273 - 9,872,292]SN [26,292,755,245 - 26,292,755,344]

6.2.1.2 PCT256 no group and PCT256 methods with PTES tag estimation

For both probabilistic anti-collision approaches, we considered different number of tags,

from 100 to 1000 tags. For each identification round, optimal tunable parameters of

PTES[CCE] is applied on different Initial Q. Table 6.2 demonstrates the type of ALOHA-

based anti-collision methods applied to different number of tags and tunable initial Qs.

133

Page 160: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

All methods are applied separately to different randomly generated data sets, giving a

total of 20 test cases (20 for each method) within this test case.

Table 6.2: Chosen Parameters of ALOHA-based anti-collision methods for ComparativeAnalysis

Initial Q Backlog Prediction No. TagsPCT256 no group 8 PTES[CCE] 100 to 1000

PCT256 tunable between 7, 8 PTES[CCE] 100 to 1000

6.2.2 Comparative Analysis

From the empirical study, we have investigated the performance of our proposed Joined

Q-ary Tree and PCT256 (group and no group). From Table 6.3 and Figure 6.1a), it is

shown that the number of slots of Joined Q-ary Tree increased linearly, depending on the

number of tags within the interrogation zone. On the other hand, the number of slots of

PCT256 methods increased with no specific pattern. This is due to the random nature of

slots generation in ALOHA-based approaches.

Figure 6.1a) illustrates that the difference in performance between each method in-

creased with the increased number of tags, and this has particularly become visible when

examining 1000 tags. The overall number of slot results have shown that the Joined Q-ary

Tree with 100 tags per pallet (Joined(100)) has obtained the minimal number of slots

throughout the whole experiment, which also obtained the shortest identification time re-

quired. In contrast, the Joined Q-ary Tree with 50 tags per pallet (Joined(50)) performed

poorly compared with the Joined(100)and PCT256. These results have proven that the

selection of the EPC pattern has a large impact on the performance of the Joined Q-ary

Tree. When the chosen EPC pattern involved has a very small group of tags (such as

50 tags per pallet), the performance of Joined Q-ary Tree cannot be optimised. Figure

6.1a) also demonstrates that the PCT256 performed better than both PCT256 no group

and Joined(50), but does not outperformed Joined(100). However, the PCT256 does not

rely on the restriction of EPC pattern and can be applied to any set of tags with different

encoding scheme. Moreover, the PCT256 no group also performs better than Joined(50)

when the number of tags is lower than 500 tags, but began to worsen when the number

of tags gets higher.

Table 6.3 and Figure 6.1b) show the performance efficiency of all methods. It can

be seen that the Joined(100) achieved close to 47 percent efficiency once the number

of tags reach 1000. Additionally, we can see than the performance efficiency of both the

Joined(100) and Joined(50) methods keep increasing, in accordance to the number of tags.

In contrast, the PCT256 cannot achieve a performance efficiency higher than 38 percent.

By examining Figure 6.1b), it can be assumed that the efficiency of the Joined Q-ary Tree

will increase slowly once the number of tags within the interrogation zone becomes very

134

Page 161: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.2. COMPARATIVE ANALYSIS OF DETERMINISTIC AND PROBABILISTICTECHNIQUES

Figure 6.1: Comparative analysis of deterministic versus probabilistic anti-collision meth-ods: a) Number of slots comparison and b) Performance efficiency

high. For the Joined(50), if the number of tags keeps increasing, it is possible that the

performance efficiency will achieve the same level as PCT256.

From the comparative analysis, we have identified certain properties of importance for

anti-collision methods in general. For deterministic methods, we have discovered that

there are impacts from similar EPC patterns; the number of tags within one group of the

EPC pattern; and the overall number of tags within the interrogation zone. For proba-

bilistic methods, we have determined that the performance of the anti-collision technique

depends on the Initial frame-size (or the Q value) specification; the accuracy of Backlog

135

Page 162: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

Table 6.3: Number of slots and performance analysis for Joined Q-ary Tree (100 tags),Joined Q-ary Tree (50 tags), PCT256 no group, and PCT256 on different number of tags

Number of Slots EfficiencyTags J100 J50 P256(N) P256 J100 J50 P256(N) P256100 320 392 348 348 0.3125 0.2551 0.2874 0.2874200 520 668 536 536 0.3846 0.2994 0.3731 0.3731300 720 940 880 880 0.4167 0.3191 0.3409 0.3409400 924 1216 1200 1094 0.4329 0.3289 0.3333 0.3656500 1124 1488 1368 1350 0.4448 0.3360 0.3655 0.3704600 1324 1760 1776 1672 0.4532 0.3409 0.3378 0.3589700 1524 2036 2224 1880 0.4593 0.3438 0.3147 0.3723800 1728 2308 2552 2126 0.4630 0.3466 0.3135 0.3763900 1928 2588 2812 2416 0.4668 0.3478 0.3201 0.37251000 2128 2860 3504 2760 0.4699 0.3497 0.2854 0.3623

prediction techniques; and the overall number of tags within the interrogation zone. We

conclude that the Joined Q-ary Tree method can achieve higher efficiency if the right EPC

pattern is configured. However, for arbitrary situations where EPC pattern cannot be

found, it is more preferable to use probabilistic approach rather than the deterministic

method.

6.3 Strategies for Choosing Suitable Anti-Collision Techniques

In this section, we clarify the importance of data collection process and why anti-collision

method selection process is a very important step for real world applications. We intro-

duce two novel strategies to choose the correct type of anti-collision algorithm for the

right situation. Most past literature only focus on improving specific type of anti-collision

technique, either deterministic or probabilistic; and also attempt to combine both schemes

together. While several literature focus heavily on improving anti-collision method alone,

there is no research done on how the data collection process can be optimised by employing

the correct anti-collision method for the right business. In another word, we have been

trying to improve something very eagerly without knowing how these improvements can

benefit real life scenarios. Thus, we propose two novel strategies for optimal anti-collision

method selection, which utilises Decision Tree (Investopedia, 2011) and the Six Thinking

Hats Strategy (Bono, 2000). By selecting a correct anti-collision method for the business,

the data collection procedure, which is the first and most important step in data manage-

ment, can be optimised. Thus, the resources requirement, cost, and complexity of RFID

system’s implementation for data transformation, data security, and data organisation,

can be minimised. Also, by selecting the correct anti-collision algorithm for a specific

scenario, we do not need the most complex and expensive algorithm, to be able to get the

most efficient collection of data.

136

Page 163: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.3. STRATEGIES FOR CHOOSING SUITABLE ANTI-COLLISION TECHNIQUES

6.3.1 Novel Decision Tree for Anti-Collision Methods Selection

There are always many factors that contribute to the outcome of the solution. A Decision

Tree can be used to clarify and find an answer to a non-complex problem. The structure of

Decision Tree allows users to take a problem with multiple possible solutions and displays

it in a simple format that shows the relationship between different events or decisions.

From literatures, a good Decision Tree can reach toward the same solution as complex

Fuzzy Logic. For scenario where not many RFID locations and constraint are involved, it

is wise to apply the Decision Tree to decide between either deterministic or probabilistic

anti-collision protocols.

6.3.1.1 Novel Decision Tree Architecture

In this study, we introduce the Novel Decision Tree Strategy for selective anti-collision

technique management, where either Joined Q-ary Tree, PCT no group, or PCT group

is applicable. PCT no group does not split tags into group as the number of tags may

not be high enough to require the splitting. Certain properties of importance for anti-

collision methods discovered from comparative analysis are to be integrated with the

decision-making progress.

Figure 6.2: Novel Decision Tree for Anti-Collision Methods Selection

137

Page 164: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

Figure 6.2 illustrates the steps of the decision-making process of the proposed Novel

Decision Tree. By taking certain properties found from our empirical study into consid-

eration, we have constructed a decision tree that reflected on the size of the company, the

number of tags per pallet, the total number of tags, the EPC pattern, and the relationship

between the suppliers and consumers. For instance, A Local Pen Maker Company is a

small company that produces any type of pens and exports them locally. The company

packs a group of pens into a box, and then allocates them into pallets. Each box contains

x pens and each pallet contains y boxes. We can use these provided information and travel

through each step of the decision tree, to reach the final outcome.

6.3.1.2 Sample Scenarios using Decision Tree Selection

Local Pen Maker Company (SME) A Local Pen Maker Company is a small company

that produces any type of pens and exports them locally. The company packs a group

of pens into a box, and then allocated them into pallets. Each box contains 30 pens and

each pallet contains 5 boxes. Each pen is tagged with individual RFID passive tag. Total

number of tags within a single interrogation zone equal to 600 tags (4 pallets).

By using Decision Tree from Figure 6.2 for the final outcome, a suitable anti-collision

method for a Local Pen Maker Company is a “Deterministic Joined Q-ary Tree”. A given

threshold t for this scenario equals to 100 tags, and the procedures are as follows:

• Question: Is this a SME or a large Enterprise? Answer: SME

• Question: Is this an international corporation? Answer: No

• Question: Are all items from different sources? Answer: No

• Question: Is the number of tag in a single pallet exceeding 100 tags? Answer:

Yes

• Outcome: The suitable anti-collision method is a “Deterministic Joined Q-ary

Tree”

Therefore, according to the decision tree outcome, a Local Pen Maker SME Company

should employ a deterministic Joined Q-ary Tree, as its anti-collision method (Figure 6.3).

Local Notebook Manufacturer (SME) A Local Notebook Manufacturer is a medium

size company that produces any type of notebooks, note pads, writing pads; and then

exports them locally. The company packs a group of notebooks into a box, and then

allocates them into pallets. Each box contains 10 notebooks and each pallet contains 5

boxes. Each notebook is tagged with individual RFID passive tag. Total number of tags

within a single interrogation zone equal to 250 tags (5 pallets).

138

Page 165: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.3. STRATEGIES FOR CHOOSING SUITABLE ANTI-COLLISION TECHNIQUES

Figure 6.3: Novel Decision Tree for Local Pen Maker Company (SME) Anti-CollisionMethods Selection

By using Decision Tree from Figure 6.2 for the final outcome, a suitable anti-collision

method for a Local Notebook Manufacturer is a “Probabilistic Cluster-Based Technique

with no grouping strategy”. A given threshold t for this scenario equals to 100 tags and

x equal to 300 tags. The procedures are as follows:

• Question: Is this a SME or a large Enterprise? Answer: SME

• Question: Is this an international corporation? Answer: No

• Question: Are all items from different sources? Answer: No

• Question: Is the number of tag in a single pallet exceeding 100 tags? Answer: No

• Question: Is the total number of tag in an interrogation zone exceeding 300 tags?

Answer: No

• Outcome: The suitable anti-collision method is a “Probabilistic Cluster-Based

Technique without grouping strategy”.

Thus, according to the decision tree outcome, a Local Notebook Manufacturer should

employ a PCT no group, as its anti-collision method (Figure 6.4).

Figure 6.4: Novel Decision Tree for Local Notebook Manufacturer (SME) Anti-CollisionMethods Selection

International Stationery Enterprise An International Stationery Enterprise is a

large business that imports any type of notebooks, pens, pencils, pencil cases; and then

139

Page 166: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

exports them internationally. The company packs a group of stationeries into a box, and

then allocates them into pallets. Each box contains different types of supplies and each

pallet contains several boxes. Each stationery is tagged with individual RFID passive tag.

Total number of tags within a single interrogation zone equals to 400 tags.

By using Decision Tree from Figure 6.2 for the final outcome, a suitable anti-collision

method for an International Stationery Enterprise is a “Probabilistic Cluster-Based Tech-

nique”. A given x for this scenario equals to 300 tags, and the procedures are as follows:

• Question: Is this a SME or a large Enterprise? Answer: Large Enterprise

• Question: Does the corporation involve trading? Answer: Yes

• Question: Is the Supplier to Consumer or Consumer to Supplier relationship a 1

to M relationship? Answer: No

• Question: Is the total number of tag in an interrogation zone exceeding 300 tags?

Answer: Yes

• Outcome: The suitable anti-collision method is a “Probabilistic Cluster-Based

Technique”.

Therefore, according to the decision tree outcome, an International Stationery Enter-

prise should employ a PCT as its anti-collision method (Figure 6.5).

Figure 6.5: Novel Decision Tree for International Stationery Enterprise Anti-CollisionMethods Selection

International A-Grade Filing and Storage Group An International A-Grade Filing

and Storage Group is a large business that imports any type of filing and storage materials,

and then exports them to a single local business. The company packs a group of materials

into a box, and then allocates them into pallets. Each box contains specific type of supplies

with 20 items and each pallet contains 6 boxes. Each product is tagged with individual

RFID passive tag. Total number of tags within a single interrogation zone equals to 350

tags.

By using Decision Tree from Figure 6.2 for the final outcome, a suitable anti-collision

method for an International Stationery Enterprise, is an integration of both “Deterministic

140

Page 167: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.3. STRATEGIES FOR CHOOSING SUITABLE ANTI-COLLISION TECHNIQUES

Joined Q-ary Tree” and “Probabilistic Cluster-Based Technique”. A given threshold t for

this scenario equal to 100 tags and x equals to 300 tags. The procedures are as follows:

• Question: Is this a SME or a large Enterprise? Answer: Large Enterprise

• Question: Does the corporation involve trading? Answer: Yes

• Question: Is the Supplier to Consumer or Consumer to Supplier relationship a 1

to M relationship? Answer: Yes

• Question: Is the number of tag in a single pallet exceeding 100 tags; and is the

total number of tag in an interrogation zone less than 300 tags? Answer: No

• Question: Is the number of tag in a single pallet exceeding 100 tags; and is the

total number of tag in an interrogation zone exceeding 300 tags? Answer: Yes

• Outcome: The suitable anti-collision methods are “Deterministic Joined Q-ary

Tree” and “Probabilistic Cluster-Based Technique”.

Therefore, according to the decision tree outcome, an International A-Grade Filing

and Storage Group should employed both Joined Q-ary Tree and PCT as its anti-collision

methods (Figure 6.6).

Figure 6.6: Novel Decision Tree for International A-Grade Filing and Storage Group Anti-Collision Methods Selection

6.3.2 Extended Solution for Complex Anti-Collision Methods Selection

This section introduces an alternative technique to be used, instead of the Novel Decision

Tree. It is possible that the Novel Decision Tree may not be the best for some complex

cases; and the complex decision-making process, which involves more than fact and num-

bers, will be required in order to obtain the best anti-collision selection. There are several

141

Page 168: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

everyday decision-making techniques available in modern day. However, we must select

the best technique that will allow the selective decision to be made precisely, and provide

the best solution based on information, feeling, and experiences.

6.3.2.1 Everyday decision making techniques

There are several existing everyday decision-making techniques available, which could pos-

sibly be applied to RFID anti-collision selection process. These techniques are described

as follows:

• Pros and Cons: This technique lists the advantages and disadvantages of each option.

• Simple Prioritisation: This method selects the alternative with the highest

probability-weighted utility for each alternative.

• Satisfaction: This technique accepts the first option that seems like it might achieve

the desired result. The decision is made according to a person in authority or an

expert.

• Flipism: Flipism includes decision making based on flipping a coin, cutting a deck

of playing cards, and other random or coincidental methods.

It is important to recognise the importance of anti-collision method selection. Thus,

any existing techniques in everyday decision-making should be considered. However, each

technique mentioned earlier only involves specific criteria in making the right decision.

Therefore, we must provide alternative methods that combine all decision-making tech-

niques together, in order to derive the best solution in anti-collision selecting process.

From past literature, we found the “Six Thinking Hats strategies” to be a useful decision-

making technique that include most decision-making process, and can be applied for ef-

fective complex anti-collision methods selection.

6.3.2.2 Six Thinking Hats Strategies

In this concept, there are six metaphorical hats; and the thinker can put on or take off one

of these hats to indicate the type of thinking used. Bono (2000) stated that putting on and

taking off these hats is essential. The hats must never be used to categorise individuals,

even though their behavior may seem to invite this (Bono, 2005, 2008). When done in

groups, everybody wears the same hat at the same time.

Figure 6.7 illustrates the Six Thinking Hats framework. The explanation of each hat

is as follows:

142

Page 169: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.3. STRATEGIES FOR CHOOSING SUITABLE ANTI-COLLISION TECHNIQUES

Figure 6.7: Six Thinking Hats Framework

• White Hat: The White Hat takes care of facts and numbers by thinking neutral

and objective, and by focusing on the data and information that are available or

needed.

• Red Hat: This covers intuition, emotions, feelings, and hunches. The red hat allows

the thinker to put forward an intuition without having to qualify or justify it.

• Black Hat: This is the hat of judgment and caution; and is a most valuable hat.

The black hat covers negative aspects, for example, why something cannot be done.

The black hat must always be logical.

• Yellow Hat: This is the logical positive, for example, why something will work

and why it will offer benefits. It can be used when looking forward to the results of

some proposed action, but can also be used to find something of value in what has

already happened.

• Green Hat: This is the hat of creativity, alternatives, proposals, what is interesting,

provocations, and changes.

• Blue Hat : This is the overview or process control hat. It looks not at the subject

itself but at the thinking about the subject. The blue hat takes care of the control

and the organisation of the process of thought. Also of the use of the other hats.

143

Page 170: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

To simplify the benefit of Six Thinking Hats strategies over existing everyday decision-

making methods, the following points demonstrate the applicability of each hat toward

existing everyday decision-making technique:

• Pros and Cons: Pros can be viewed through Yellow hat ; and Cons can be viewed

through Black hat.

• Simple Prioritisation: Simple Prioritisation can be examined through White hat,

which only represents fact and decision that is made according to the verification of

that fact.

• Satisfaction: This technique can be observed through White hat and Red hat, as the

decision is made according to the fact from an expert, and the likelihood of the first

option that seems like it might achieve the desired result.

• Flipism: Flipism solely based on luck and chances, thus, we classified this method

under the Red hat category.

6.3.3 Six Thinking Hats for Complex Anti-Collision Methods Selection

It is crucial that the RFID system must employ anti-collision protocols in readers, in order

to enhance the integrity of the captured data. However, the step of choosing the right anti-

collision protocol is also very important, since we cannot depend solely on the capability

of anti-collision protocol itself, but also on the suitability of each selected technique for

the specific scenario. This is why the Novel Decision Tree alone is not sufficient because it

is based solely on data figures. Therefore, we propose the Six Thinking Hats strategy for

complex selective technique management to clarify the choice from the decision tree. The

novelty of using Six Thinking Hats strategy and applying it for anti-collision selection is

that, we will get the optimal and more precise outcome of anti-collision method selection

for the specific scenario.

6.3.3.1 Preliminary

The one great enemy of the thought is the complexity because it leads to confusion. When

the thought is clear and simple, it is more pleasing and effective. Therefore, the concept

of the Six Thinking Hats is to think simply. First, the thinker must simplify the thought

by treating one thing later, rather than at the same time. The thinker can then face them

by separating the emotions, the logic, the information, the hope, and the creativity. The

intention of the Six Thinking Hats is to disassembly the thought, so that the thinker can

use a way to think on one thing at a time, instead of doing all at the same time.

For anti-collision selective process, each thinker must make decision separately. The

Blue hat thinker, who control the selective process, will make final decision for best anti-

collision techniques for the specific scenario.

144

Page 171: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.3. STRATEGIES FOR CHOOSING SUITABLE ANTI-COLLISION TECHNIQUES

The following shows how the six hats can be applied toward complex anti-collision

selective process:

• White hat - Facts & Information: When a thinker is wearing a White hat,

he/she is neutral and objective. The thinker does not make interpretations nor gives

opinions but instead imitate the computer that gives the facts and numbers. The

thinker must obtain information and complete the emptiness of existing information.

For anti-collision selective process, the thinker who wears White hat will rely solely

on information given from various sources, such as a Novel Decision Tree; and will

decide which anti-collision is most suitable for the current scenario.

• Red hat - Feelings & Emotions: The use of Red hat allows the thinker to feel

visible so that they can become partly of map, and also of the system of values, that

chooses the route in the map. The Red hat provides the thinker with an advisable

method to enter and to leave the way emotionally. Thus, it allows the thinker to

explore the feelings and never to make the attempt to justify the feelings or to base

them on the logic. For anti-collision selective process, the thinker who wears Red

hat will make decision based on hunch and guts feeling. Thus, it is important that

the person who wear Red hat has strong relationship with the enterprise.

• Black hat - Being Cautious & Pessimistic: Thinking with Black hat takes

care specifically of the negative judgment. The thinker of Black hat indicates what

is bad, incorrect, and erroneous. The thinker indicates that something does not

comply to the experience or to the knowledge accepted; and why something is not

going to work. For anti-collision selective process, the thinker who wears Black hat

points out the disadvantage of the selected anti-collision approach; and why it may

be necessary to change to a different technique.

• Yellow hat - Being Positive & Optimistic: - Thought of Yellow hat is positive

and constructive. The thinker of Yellow hat takes care of the positive evaluation,

the same way that the thought of Black hat takes care of the negative evaluation.

The thinker investigates and explores, in search of value and benefit and then find

logical endorsement for this value and benefit. For anti-collision selective process, the

thinker who wears Yellow hat point out the advantage of the selected anti-collision

technique, and why it is necessary to keep current decision.

• Green hat - New Ideas & Alternatives: - The Green hat is for the creative

thought. The search of alternatives is a fundamental aspect of the thought of Green

hat. For anti-collision selective process, the thinker of Green hat will provide al-

ternatives in the case of both deterministic and probabilistic algorithms, which have

the same weight of positive and negative impacts.

• Blue hat - The Big Picture: - The thinker of Blue hat will be thinking about

thinking, and set objective for each section. The Blue hat is the hat of the control.

145

Page 172: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

The thinker of Blue hat must organises the same thought, and to think about the

thought necessary to investigate the subject. The thinker of Blue hat is like a

conductor, who proposes and makes use of the other hats. For anti-collision selective

process, the thinker of Blue hat will decide who to put on each hat, and what are

the main scope of the overall selective process.

6.3.3.2 Global Trading Enterprise (GTE) Scenario

Global Trading Enterprise (GTE) is a large international business, with Many-to-Many

relationship between suppliers and consumers. GTE imports products from different coun-

tries then repackaged and exported them internationally and locally to different compa-

nies. The company involves large amount of inventories, which are stocked into special

warehouse with four different zones as shown in Figure 6.8.

Figure 6.8: Six Thinking Hats: Global Trading Enterprise (GTE) Scenario

After analysing information given from Figure 6.8, Table 6.4 displays the preferred

algorithm for each location that will provide the optimal quality of collected data from

GTE scenario.

146

Page 173: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.3. STRATEGIES FOR CHOOSING SUITABLE ANTI-COLLISION TECHNIQUES

Table 6.4: Preferred Anti-Collision Method for Each Location (Zone 1 - 4) in GTE scenarioLocation Joined Q-ary Tree PCT Group PCT no GroupZone One X X XZone Two X X X

Zone Three X X XZone Four X X X

6.3.3.3 Decision Making Phase

When applied Novel Decision Tree Strategy and Six Thinking Hats Strategy for GTE

scenario, different conclusions for anti-collision methods deployment were acquired. The

steps of decision-making processes are as follows:

• Question: Is this a SME or a large Enterprise? Answer: Large Enterprise

• Question: Does the corporation involve trading? Answer: Yes, GTE is a global

trading company

• Question: Is the Supplier to Consumer or Consumer to Supplier relationship a 1

to M relationship? Answer: No, GTE have more than one supplier and consumer

all over the world

• Question: Is the total number of tag in an interrogation zone exceeding x tags?

Answer: Yes, GTE’s warehouse stored numerous numbers of goods in storages and

used RFID system to monitor and control inventories.

• Outcome: The suitable anti-collision method is a “Probabilistic Cluster-Based

Technique”.

According to the decision tree outcome, GTE should employ a PCT group as its anti-

collision method for all locations.

Six Thinking Hats

• White Hat: For GTE scenario, the thinker who wears the White hat goes for

realistic data and stays with the Novel Decision Tree assessment, which is to select

the PCT deployment for all four zones.

• Red Hat: The Red hat is put on by local warehouse staff who knows the environ-

ment better than the board of directors. Thus, the Red hat wearer has decided that

different anti-collision techniques should be deployed for the different zones.

• Yellow Hat: In this scenario, the thinker who wears the Yellow hat points out the

advantage of the selected anti-collision technique and why it is necessary to keep

147

Page 174: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

the current decision. The thinker has decided on deploying only PCT, since it is

simple to order one lot of hardware and software from the same supplier, and to

avoid unnecessary procedures and time frames for implementation.

• Black Hat: Logically, at the unloading zone (zone one), trucks usually arrive from

the same company/suplier. In addition, at zone three where tagged items are moved

along the conveyer belt, realistically it is impossible to have more than one hundred

cases of alcohol sitting on the belt. Thus, the Black hat thinker decided that different

anti-collision algorithm must be deployed at both zones one and three.

• Green Hat: The Green hat wearer agrees with the Black and Red hat wearers

since the Green hat takes care of the old ideas and presents alternatives. However,

because the options are strictly limited to either deterministic or probabilistic for

each zone, Green hat decides on applying Joined Q-ary Tree to zone one instead

of PCT; and also suggests PCT no group for zone three, as not many tags will be

present on the conveyer belt.

• Blue Hat: The thinker of the Blue hat will be thinking about thinking and set

objectives for each section. For the anti-collision selective process, the thinker of

the Blue hat is to deicide who to put on each hat and what is the main scope of

the overall selective process. From the overall analysis, the Blue hat has decided to

employ both types of anti-collisions and to apply them to different zones.

According to the Six Thinking Hats Strategy, GTE should employ a PCT group at

zone two and zone four only, since these two zones are involved with arbitrary goods.

The Six Thinking Hats strategy has recommended that the Joined Q-ary Tree is deployed

instead of the PCT group at zone one because arriving items from supplier are usually

delivered from the same supplier. At zone three, it is recommended that the PCT no group

is implemented since this location is involved with arbitrary goods, but does not involve

a numerous number of tags.

6.3.3.4 Solution Phase

For a complex scenario such as GTE, complex kinds of thinking are needed, in order to

obtain the optimal result from each anti-collision algorithm. The Six Thinking Hats can

correctly identify the best algorithms for all four zones, as shown in Table 6.5. The Novel

Decision Tree, however, can only obtain correct algorithms for zones two and four. This

is because the Novel Decision Tree only takes into consideration the facts and figures

without any concern for special circumstances unforeseen, or for specific environmental

requirements. Thus, for zone one and zone three where the information provided is am-

biguous, the Novel Decision Tree cannot correctly identify the suitable algorithm.

148

Page 175: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.4. APPLICABILITY OF ANTI-COLLISION TECHNIQUES IN REAL WORLDSCENARIO

Table 6.5: Selected Anti-Collision Method using Decision Tree and Six Thinking HatsStrategies. Joined Q-ary Tree = JQT; PCT Group = PCT-G; PCT no Group = PCT-NG

Novel Decision Tree Six Thinking HatsLocation JQT PCT-G PCT-NG JQT PCT-G PCT-NGZone One X X X X X XZone Two X X X X X X

Zone Three X X X X X XZone Four X X X X X X

From the investigation, we have discovered that different anti-collision method has

advantage over the other in some cases. We found that by correctly identifying the most

suitable anti-collision technique, using our proposed Novel Decision Tree Strategy and

Six Thinking Hats Strategy, the data collection process can be improved; and the chain

reaction toward the next level of data transformation, aggregation, and event processing

can be decreased. Thus, it is important that the correct type of anti-collision algorithm

is applicable to different scenarios.

The next two sections explain the applicabilities of both Joined Q-ary Tree and Prob-

abilistic Cluster-Based Technique, in accordance with sample real world scenarios.

6.4 Applicability of Anti-Collision Techniques in Real World Sce-

nario

This section demonstrates sample scenarios, in which our proposed Joined Q-ary Tree

and Probabilistic Cluster-Based Technique, can be applied. The first scenario is a Wine

Warehouse Tag-and-Ship Scenario, where a deterministic Joined Q-ary Tree can be utilised

as an adequate anti-collision scheme. The Joined Q-ary Tree is deployed within the RFID

reader device and communicates with RFID passive tags presented within the interrogation

zone. The second scenario is a Document Warehouse Scenario, where a Probabilistic

Cluster-Based Technique is exploited as an anti-collision approach. Both scenarios are

explained in detail, in the following subsections.

6.4.1 Wine Warehouse Tag-and-Ship Scenario

The Wine Warehouse Tag-and-Ship Scenario is where a business decided to select its

own encoding scheme, reader type, tag type, EPC pattern, and middleware vendor. The

warehouse involves huge amount of inventory with many pallets of goods traveling trough

the supply chain. The tags must be printed according to selected EPC pattern within

the organisation. Then, after all tagged items are deployed around the warehouse, they

can be tracked and traced easily. The benefit of utilising a RFID system toward this

scenario is that, inventories within the warehouse can be tracked in real-time automatically,

which minimised cost of manual labour and maximised the visibility of items. In the

149

Page 176: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

Wine Warehouse Tag-and-Ship Scenario, the Joined Q-ary Tree is employed as an anti-

collision, because the scenario involves RFID data from the same source and has massive

tag movement.

Figure 6.9: Wine Warehouse Tag-and-Ship Scenario

Figure 6.9 illustrates a sample Wine Warehouse Tag-and-Ship Scenario, and the appli-

cability of Joined Q-ary Tree, as an anti-collision approach. The figure shows sample set

up including the environment area, items, readers, tags, middleware, and the operation

process. The detail of Figure 6.9 is explained as follows:

• Complex Event Processing - Complex Event Processing (CEP) consists of many

events that happen across all layers of a RFID organisation. It identifies the most

meaningful events within massive amount of events; analyses their impact; and takes

subsequent action in real time. Complex Event Processing refers to processed states,

the changes of state, or time. An event may be observed as a change of state with

any physical or logical, or otherwise other condition in a RFID system.

150

Page 177: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.4. APPLICABILITY OF ANTI-COLLISION TECHNIQUES IN REAL WORLDSCENARIO

• Device Service Provider Interface (DSPI) - A device service provider interface

(DSPI) component can provide a uniform manner to communicate and manage a

RFID device. The DSPI component can include a receiver component that receives

one or more RFID server data, and RFID device data. The interface can be defined

to handle discovery, configuration, communication, and connection management.

• RFID Printer - A printing device used to write data to a RFID tag that can also

print any graphics, barcodes and text onto the label.

• RFID Reader - A transmitter or receiver that reads the contents of RFID tags

in the proximity. The maximum distance between the reader’s antenna and the tag

varies, depending on the type of reader and tag, and the RFID application.

• Middleware - RFID middleware is placed between the reader and the enterprise

applications and database systems. According to EPC specifications, middleware ap-

plications handle the tag and reader data originating from different sources. RFID

middleware fulfills and supports the unique EPC data of the items that are being

tagged and aggregate massive amount of data before it reaches the enterprise appli-

cations. Data is routed and converted into formats, as per the requirements of the

various applications.

• Database - A database is a collection of information that is organised and stored

in a computer system so that it can easily be accessed, managed, and updated. In

one view, databases can be classified according to types of content: bibliographic,

full-text, numeric, and images.

• Application - An application is a computer software designed to perform a specific

function, singular or multiple related specific tasks, directly for end user. Exam-

ples of application programs include database programs, development tools, and

communication programs. Application programs use the services of the computer’s

operating system and other supporting programs.

• Untagged Item - Item newly arrived and has not yet been tagged.

• Tagged Item - Item that has been tagged by a RFID printer.

The detailed process of the Wine Warehouse Tag-and-Ship Scenario are as follows:

After the cases have been picked and are ready to be tagged, an operator uses a Tag

Printing application and an RFID Printer to print and apply tags onto each case of wine.

The Tag Printing application stores the information about the tags that it prints in the

CasesTagged database. When the user clicks “Print Tag” in the Tag Printing application,

the “Print Tag” command is processed in the following way:

• The Print Tag command with the tag information communicates with the event

processing engine.

151

Page 178: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

• The event processing engine sends the “Print Tag” command to the Printer Device’s

provider, and the “Print Tag” command is queued in the Command Processing

Thread of the provider.

• The Command Processing Thread converts the tag information from the DSPI stan-

dard format to the proprietary tag format of the Printer Device’s provider.

• The tag information including EPC number is transferred to the RFID Printer, using

the Printer Device Host protocol.

• The RFID Printer prints the tag, and the tag is applied to the case of wine, either

manually or by using an automated system.

• The Tag Printing application puts the information about the tag that was printed

in the CasesTagged database.

The tagged cases move along a conveyor belt toward the exit where a RFID Reader

is located. The Reader reads the tag on each case and sends all tag information through

middleware vendor. The middleware then stores each received tag in the CasesShipped

database. The information in this database is used for business analyses, such as comparing

information in the CasesTagged database and CasesShipped database. This ensures that

all cases of wine being shipped to the customer have been tagged. The tag information is

sent to the reader’s provider and is processed in the following way:

• The provider has a translating mechanism that converts the tag information from

the Reader Device’s provider proprietary format, into the DSPI standard format.

• During the data capturing process, the Reader Device performs the Joined Q-ary

Tree anti-collision protocol to reduce tag collision transmission, and also perform

other filtering algorithms to eliminate data errors.

• The tag-read event travels to the shipping process in RFID services, where the event

handler is pre-coded to send the tag information to the CasesShipped database.

• The CasesShipped database and CasesTagged database can be compared, to check

if all wine cases that entered the warehouse have reached the exit and have been

forwarded for shipping.

6.4.2 Document Warehouse Scenario

The Document Warehouse Scenario shows an example of an enterprise that receives items

from various vendors. The document warehouse involves huge amount of inventory where

data source can be from various locations and each tag requires specific encoding scheme,

but the enterprise does not produce its own printed tags. The benefit of utilising a RFID

152

Page 179: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

6.4. APPLICABILITY OF ANTI-COLLISION TECHNIQUES IN REAL WORLDSCENARIO

system toward this scenario is that inventories within the warehouse can be tracked in real-

time automatically, which minimise cost of manual labour and maximise the visibility of

items. In the Document Warehouse Scenario, the Probabilistic Cluster-Based Technique is

employed as an anti-collision, since the scenario involves RFID data from different sources

and has massive tag movement.

Figure 6.10: Document Warehouse Scenario

Figure 6.10 illustrates a sample Document Warehouse Scenario and the applicability

of Probabilistic Cluster-Based Technique as an anti-collision method. The figure shows

sample set up, including the environment area, items, readers, tags, middleware, and the

operation process. The definition of Complex Event Processing, DSPI, RFID Reader,

Middleware, and Database, were explained from the previous subsection. The detailed

process of the Document Warehouse Scenario are as follows:

The Document Warehouse Scenario does not involve printing process as in the Wine

Warehouse Tag-and-Ship Scenario. Several inventories, which have already been tagged,

153

Page 180: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 6. CONCEPTUAL SELECTIVE TECHNIQUE MANAGEMENT

are received from different vendors. After the tagged cases have been picked from several

locations, each document case moves along a conveyor belt toward the exit where a RFID

Reader is located. The Reader reads the tag on each case and sends all tag information

through middleware vendor. The middleware then stores each received tag in the Inventory

database. The information in this database is used for business analyses, such as document

tracking and tracing. This ensures that all document have been received and ready to be

sent out to other locations. The tag information is sent to the reader’s provider, and is

processed in the following way:

• The provider has a translating mechanism that converts the tag information from

the Reader Device’s provider proprietary format, into the DSPI standard format.

• During the data capturing process, the Reader Device performs the PCT anti-

collision protocol incorporates with PTES tag estimation scheme, to reduce tag

collision transmission and also perform other filtering algorithms to eliminate data

errors.

• The tag-read event travels to the inventory checking in RFID services, where the

event handler is pre-coded, to send the tag information to the Inventory database.

6.5 Summary

In this chapter, we have conducted a comparative analysis of our proposed deterministic

and probabilistic anti-collision approaches. Additionally, we introduced the novel con-

ceptual selective technique management for precise anti-collision methods selection. The

main contributions and findings of the chapter are as follows:

• We have performed a comparative analysis between our proposed Joined Q-ary Tree

and Probabilistic Cluster-Based Technique. We found that both methods have ad-

vantages and disadvantages over one another, depending on each specific case. The

Joined Q-ary Tree is more suitable for tags within specific EPC pattern, while Prob-

abilistic Cluster-Based Technique is more suitable for arbitrary tags.

• We proposed two novel strategies, 1) the Novel Decision Tree and 2) the Six Thinking

Hats, for anti-collision method selection process (Pupunwiwat et al., 2011). We de-

termine that correct anti-collision method for specific cases reduced Chain Reaction

impact toward long-term RFID data management.

• We also demonstrated the applicability of our proposed techniques toward real world

scenarios.

154

Page 181: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

7Conclusions

In this chapter, we concluded the thesis with a summary of our contributions and future

research directions.

7.1 Summary of Contributions

In this study, we address a question on making anti-collision methods for RFID data

streams collision more efficient than current available approaches. The thesis first discusses

the background information on RFID, why it is important, and motivation for investigating

suitable anti-collision techniques toward different scenarios. We assess relevant literature

and provide information on existing state-of-the-art anti-collision methods.

The thesis focuses on three main research problems: firstly, designing and developing

a new deterministic anti-collision technique; secondly, improving frame-size estimation

method and introducing new group based technique for probabilistic anti-collision; and

finally, initiating two new strategies for selective technique management.

The contributions of each chapter are summarised as follows:

In Chapter 2, we presented an overview of RFID technology. Particular attentions

were given to the structure of the RFID system including various types of antennas,

readers, and tags; and the issues surrounding the deployment of RFID. We identified the

characteristic of RFID data, which is fundamental for RFID data management. We also

provided sample of main RFID commercial applications and explained the importance of

RFID technology in supply chain. We highlighted that for RFID data management, the

155

Page 182: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 7. CONCLUSIONS

data should be absorbed closer to the source, which caters to the need of pre-processing

data, so that only relevant and meaningful information is passed to the next stage. Thus,

it is important that the raw data must be filtered before being passed into the applications.

In Chapter 3, we reviewed the literature and classified existing RFID data streams

filtering methods into general data stream filtering and anti-collision. We then identified

and analysed the benefit and detriment of each existing method. We discovered that for

deterministic anti-collision method, major limitations are due to memories and compu-

tational complexity requirements in memory anti-collision algorithms. The memoryless

QT algorithms also perform poorly in the case where there are a large number of tags

within an interrogation zone. Several improved version of QT enhance the performance

and reduce identification delay but comes with huge implementation cost. For probabilis-

tic anti-collision method, the earlier type of ALOHA anti-collision performs poorly, while

the more advanced Framed-Slotted ALOHA has better performance. However, literature

review demonstrated that existing methods from Framed-Slotted ALOHA category are

either inefficient or too complex, with high overhead cost of implementation.

Also in Chapter 3, we defined the research questions in relation to RFID anti-collision.

Given that both deterministic and probabilistic anti-collision algorithms have different ad-

vantages and disadvantages toward development of real world applications, it is important

to construct anti-collision methods that are simple, with low overhead computation, and

perform effectively, compared with existing techniques. We concluded that the basic Query

Tree is the most effective deterministic anti-collision approach, and the Framed-Slotted

ALOHA is arguably the best approach in probabilistic anti-collision. Thus, our research

focused on the development of new methods that perform better than these existing tech-

niques.

In Chapter 4, we investigated the different representation of RFID data encoding, in

order to better understand the importance of each data encoding scheme. By constructing

complex anti-collision algorithms, high memory capacity and power sources are needed,

which is impractical in RFID system. Furthermore, no study has been undertaken to

construct a basic deterministic anti-collision, under the assumption that we have a limited

power source from RFID reader and limited memory in both readers and tags. Thus, we

proposed a Unified Q-ary Tree, which is a basic combination of two Q-ary trees, in order

to identify the best performing Q-ary tree for particular circumstance. From our empirical

study, we discovered that the best performing tree out of the four Q-ary trees is 4-ary tree,

while number of tags within the interrogation zone has no impact on the performance.

Overall, we also found that a combination of 2-ary tree and 4-ary tree performed the best,

by reducing the total memory usage required, and by minimising the identification delay.

In general, by using a lower level 2-ary tree for Identical bits of EPC data, and by using a

higher level 4-ary tree for Unique bits of EPC data, the total number of bits for querying

can be decreased.

156

Page 183: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

7.1. SUMMARY OF CONTRIBUTIONS

To further overcome the limitation of current tree-based anti-collision techniques, in

Chapter 4 we proposed a Joined Q-ary Tree based on findings from the evaluation of the

Unified Q-ary Tree. The Joined Q-ary Tree is the enhanced Q-ary Tree, which adaptively

adjusted its breaches between the two Q-ary Trees, according to the EPC pattern. From

experimental evaluation, the Joined Q-ary Tree outperformed the existing approaches in

terms of memory usage, which resulted in minimal identification time. We also confirmed

that different encoding schemes have impacted on the performance of all tree-based meth-

ods. Nevertheless, the Joined Q-ary Tree always perform the best, compared with naive

approaches, regardless of encoding scheme applied. We have also identified and confirmed

certain properties of importance for the deterministic anti-collision methods.

In Chapter 5, we described our new probabilistic anti-collision approaches. In proba-

bilistic anti-collision, two key features for the most efficient performance of identification

procedure are frame-size estimation technique and the probabilistic anti-collision method

itself. To overcome the inaccuracy of the current frame-size estimation techniques, we

proposed a Precise Tag Estimation Scheme for a more accurate Backlog prediction. The

Precise Tag Estimation Scheme uses various variables and number of slots from previous

identification round to predict the number of remaining tags. Empirical study has shown

that by limiting initial Q to a specific value and by using particular variables for slots pre-

diction, our method provided more accurate Backlog estimation compared with existing

frame-size prediction techniques.

In addition to our proposed frame-size estimation technique, in Chapter 5, we also

proposed a Probabilistic Cluster-Based Technique, in order to improve the performance ef-

ficiency from current probabilistic anti-collision methods. The Probabilistic Cluster-Based

Technique utilised group splitting rules derived by using particular equations, according

to the optimal system efficiency obtained for specific number of tags. We first conducted

an experiment to acquire optimal frame-size for specific number of tags. Subsequently,

from the results acquired for performance efficiency evaluation, we have developed sev-

eral equations to calculate boundaries and exploit rules. We then integrated the Precise

Tag Estimation Scheme as an accurate frame-size prediction for our Probabilistic Cluster-

Based Technique. The experimental evaluation demonstrated that our proposed method

is the most effective method, in terms of system efficiency and number of slots minimisa-

tion. From the analysis of all experiments, we have also recognised certain properties of

importance for probabilistic anti-collision methods.

In Chapter 6, we analysed and compared our proposed Deterministic Joined Q-ary

Tree and Probabilistic Cluster-Based Technique, and determined the best-fit method for

specific circumstances. Empirical analysis shows that the Joined Q-ary Tree method can

achieve higher efficiency if the right EPC pattern is configured. However, for arbitrary

situations where EPC pattern cannot be found, it is more preferable to use probabilistic

approach rather than the deterministic method. We then introduced two new strategies

for selective anti-collision technique management. These two novel techniques focused

157

Page 184: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 7. CONCLUSIONS

on accurately selecting suitable anti-collision methods for particular scenarios, instead of

employing complex all-rounder anti-collision. Empirical evaluation demonstrates that a

more accurate anti-collision method is selected using our proposed selective techniques,

and the correct anti-collision method for specific cases can then reduce the Chain Reaction

impact toward long term RFID data management.

To demonstrate the use of our proposed anti-collision methods in real world

scenarios, in Chapter 6, we also discussed the applicability of both Joined Q-ary Tree

and Probabilistic Cluster-Based Technique. The sample scenarios show the conceptual

applications of RFID technology within the supply chain management. Our

anti-collision methods are applicable at the earliest stage of the RFID architecture,

where RFID readers and tags are communicated at the physical layer.

More specifically, the thesis makes the following contributions:

• We investigated different existing approaches on RFID data stream filtering, specif-

ically the state-of-the-art anti-collision methods.

• We proposed deterministic anti-collision methods (Pupunwiwat and Stantic, 2009a),

(Pupunwiwat and Stantic, 2009b), (Pupunwiwat and Stantic, 2010c), which over-

come limitation of previous studies and proved that our methods have the most

superior result, regardless of encoding schemes applied.

• We proposed probabilistic anti-collision methods, including the frame-size prediction

technique (Pupunwiwat and Stantic, 2010a), (Pupunwiwat and Stantic, 2010b) and

the novel group based anti-collision technique (Pupunwiwat and Stantic, 2010d),

which can efficiently improve the system performance, compared with existing ap-

proaches.

• We performed comparative analysis of our two proposed deterministic and proba-

bilistic anti-collision methods, and identified the benefits and disadvantages of each

approach.

• We introduced two novel strategies for selective anti-collision technique management

(Pupunwiwat et al., 2011), and confirmed that by correctly identifying the most

suitable anti-collision method for specific scenario, the Chain Reaction toward long

term RFID data management can be reduced.

• We demonstrated sample scenarios of how our proposed anti-collision methods can

be applied in the supply chain management.

158

Page 185: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

7.2. FUTURE WORKS

7.2 Future Works

In this thesis, we have addressed issues directly related to anti-collision, which is a part

of major data streams filtering in RFID. However, the implementation and integration of

efficient anti-collision techniques is only the first step to improve data quality, and further

process of data is required in order to successfully complete all stages of RFID data

stream management. Although anti-collision is the most important step to determine

the quality of RFID data, it is also important to consider other potential issues in data

management. There are several open research questions regarding RFID data streams

filtering and management, which should be addressed in the future. These open research

questions are described as follows:

• In the context of RFID anti-collision, it would be interesting to evaluate Reader-to-

Reader or Reader-to-Tag anti-collision techniques. Despite the fact that Tag-to-Tag

collision is the most critical problem for RFID data management, it is necessary to

look into other prospective collisions in order to optimise the quality of captured

data.

• As for RFID Tag-to-Tag anti-collision, it is possible to target other anti-collision

methods constructed in SDMA, FDMA, or CDMA. Even though TDMA is the

largest group of anti-collision procedures, it is essential to take into consideration,

algorithms from other divisions in order to offer wider range of anti-collision ap-

proaches for specialised applications.

• It is also feasible to perform a comparative cost analysis for both Tree-based and

ALOHA-based anti-collision techniques. While performance studies have been done

on identification time, memory usage, and performance efficiency, there is no evi-

dence confirming the cost analysis for RFID anti-collision.

• For both deterministic and probabilistic anti-collision methods, there is a need for

a new measurement model that will determine the capability of each anti-collision

approach, based on every constraints including identification time, memory usage,

performance efficiency, and cost consumption. Currently, different types of analysis

have been done separately, thus results may be bias.

• As our main research goal concentrates on the implementation of simple anti-collision

algorithms, we have not looked into the Hybrid anti-collision techniques, which com-

bine both deterministic and probabilistic anti-collision together. Hybrid approaches

may be a good solution for specific real-world applications.

• It would be interesting to construct an actual fully automated data management

engine for specific organisation. The structure should involve the most suitable

anti-collision techniques and appropriate filtering methods for noises, missed reads,

unreliable reads, and duplications.

159

Page 186: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

CHAPTER 7. CONCLUSIONS

• While general data stream filtering methods for noises, missed reads, unreliable reads,

and duplications are adequate, it still remains an open problem to find the strategy

that can select the most suitable technique for each specific scenario. There is a

possibility that our two proposed selective anti-collision technique management can

be used as selective filtering technique management in general.

• Another open area of research is to look into other available strategies that can

be applied as a selective technique management. Beside Decision Tree and Six

Thinking Hats strategies, different approaches from other research domains should

be considered.

• Data management, which is the most crucial project in RFID system, involves many

procedures beside the data filtering process. These include data transformation, data

aggregation, event management, data warehousing, and data mining. Each stage of

data management must be integrated together before they can be deployed to the

actual organisation. Thus, more research must be developed case-by-case to verify

that all necessary stages of data management are compatible with each other and

that they can be integrated and deployed to the chosen organisation.

160

Page 187: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

Bibliography

Abadi, D. J., Lindner, W., Madden, S., and Schuler, J. (2004). An Integration Framework

for Sensor Networks and Data Stream Management Systems. In Proceedings of VLDB,

2004, pages 1361–1364, Toronto, Canada.

Abramson, N. (1970). The ALOHA System - Another Alternative for Computer Commu-

nications. In Proceedings of Fall Joint Computer Conference, AFIPS Conference, pages

281–285, Houston, Texas.

Ahson, S. and Ilyas, M. (2008). RFID Handbook : Applications, Technology, Security, and

Privacy. CRC Press: Taylor and Francis Group, LLC, Boca Raton, Florida.

Alotaibi, M., Postula, A., and Portmann, M. (2009). Tag Anti-Collision Algorithms in

RFID Systems: a New Trend. WSEAS Transactions on Communications (WTOC),

8:1216–1232.

Bai, Y., Wang, F., and Liu, P. (2006). Efficiently Filtering RFID Data Streams. In

CleanDB Workshop, pages 50–57, Seoul, Korea.

Balbin, I. and Karmakar, N. C. (2009). Phase-Encoded Chipless RFID Transponder

for Large-Scale Low-Cost Applications. Microwave and Wireless Components Letters,

IEEE, 19(8):509–511.

Bang, O., Choi, J. H., Lee, D., and Lee, H. (2009). Efficient Novel Anti-Collision Protocols

for Passive RFID Tags. Auto-ID Labs White Paper. http://www.autoidlabs.org/single-

view/dir/article/1/323/page.html.

Bhandari, N., Sahoo, A., and Iyer, S. (2006). Intelligent Query Tree (IQT) Protocol to

Improve RFID Tag Read Efficiency. In The 9th International Conference on Information

Technology (ICIT’06), pages 46–51, Bhubaneswar, India.

Bhatt, H. and Glover, B. (2006). RFID Essentials. O’Reilly, Sebastopol, CA.

Bhuptani, M. and Moradpour, S. (2005). RFID Field Guide: Deploying Radio Frequency

Identification Systems. Prentice Hall PTR, Upper Saddle River, New Jersey.

161

Page 188: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

BIBLIOGRAPHY

Bono, E. D. (2000). Six Thinking Hats. Penguin Books, London, United Kingdom, 2nd

rev. and updated ed. edition.

Bono, E. D. (2005). The Six Value Medals. Ebury Publishing, London, United Kingdom.

Bono, E. D. (2008). Six Frames: For Thinking about Information. Ebury Publishing,

London, United Kingdom.

Bornhovd, C., Lin, T., Haller, S., and Schaper, J. (2005). Integrating Smart Items with

Business Processes An Experience Report. In HICSS ’05: Proceedings of the 38th

Annual Hawaii International Conference on System Sciences (HICSS’05), page 227,

Washington, DC, USA. IEEE Computer Society.

Brown, M., Patadia, S., and Dua, S. (2007). Mike Meyers’Certification Passport: Comp-

TIA RFID+ Certification. McGraw-Hill, United States of America.

Brusey, J., Floerkemeier, C., Harrison, M., and Fletcher, M. (2003). Reasoning About

Uncertainty in Location Identification with RFID. In Workshop on Reasoning with

Uncertainty in Robotics at IJCAI, pages 23–30, Acapulco, Mexico.

Carbunar, B., Ramanathan, M. K., Koyuturk, M., Hoffmann, C., and Grama, A. (2005).

Redundant Reader Elimination in RFID Systems. In 2nd Annual IEEE Communications

Society Conference on Sensor and Ad Hoc Communications and Networks (SECON’05),

pages 176–184, Santa Clara, California, USA.

Chawathe, S., Krishnamurthy, V., Ramachandrany, S., and Sarma, S. (2004). Managing

RFID Data. In VLDB ’04: Proceedings of the 30th International Conference on Very

Large Data Bases, pages 1189–1195, Toronto, Canada.

Chen, W. T. (2006). An Efficient Anti-Collision Method for Tag Identification in a RFID

System. IEICE Transactions, 89-B(12):3386–3392.

Chen, Z. and Liao, M. (2010). An Enhanced Dynamic Binary Anti-Collision Algorithm. In

The 5th International Conference on Computer Science and Education (ICCSE2010),

pages 961–964, Hefei, Anhuisheng China.

Cheng, T. and Jin, L. (2007). Analysis and Simulation of RFID Anti-collision Algorithms.

In The 9th Int. Conf. on Advanced Communication Technology (ICACT), volume 1,

pages 697–701, Phoenix Park, Korea. IEEE Computer Society.

Chiesa, M., Genz, R., Heubler, F., Mingo, K., Noessel, C., Sopieva, N., Slocombe, D., and

Tester, J. (2002). RFID: A Week Long Survey on the Technology and Its Potential.

Technical report, Harnessing Technology Project, Interaction Design Institute, Ivrea.

Cho, H., Lee, W., and Baek, Y. (2007). LDFSA: A Learning-Based Dynamic Framed

Slotted ALOHA for Collision Arbitration in Active RFID Systems. In Advances in

162

Page 189: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

BIBLIOGRAPHY

Grid and Pervasive Computing Second International Conference, volume 4459, pages

655–665, Paris, France. Springer Berlin/Heidelberg.

Choi, H. S., Cha, J. R., and Kim, J.-H. (2004). Fast Wireless Anti-Collision Algorithm in

Ubiquitous ID System. In Vehicular Technology Conference (VTC2004), pages 4589–

4592, Los Angeles, CA. IEEE.

Choi, J. and Lee, W. (2007). Comparative Evaluation of Probabilistic and Deterministic

Tag Anti-collision Protocols for RFID Networks. Emerging Directions in Embedded and

Ubiquitous Computing EUC Workshops’07, 4809:538–549.

Choi, J. H., Lee, D., and Lee, H. (2007). Query Tree-Based Reservation for Efficient RFID

Tag Anti-Collision. IEEE Communications Letters, 11(1):85–87.

Choi, J. H., Lee, H. J., Lee, D., Lee, H. S., Youn, Y., and Kim, J. (2008). Query Tree

Based Tag Identification Method in RFID Systems. www.freshpatents.com/Query-tree-

based-tag-identification-method-in-rfid-systems-dt20080508ptan20080106383.php.

Collins, J. (2006). Boeing Outlines Tagging Timetable. RFID Journal.

http://www.rfidjournal.com/article/view/985.

CompTIA-RFID+ (2008). CompTIA RFID+tm Certification.

http://certification.comptia.org/rfid/.

Dabas, A. C., Balhara, B. M., and Gupta, C. J. P. (2009). CDMA based Anti-Collision

Deterministic Algorithm for RFID Tags. International Journal of Recent Trends in

Engineering, ACEEE Journal, 1(1):603–606.

Darcy, P., Pupunwiwat, P., and Stantic, B. (2011). The Challenges and Issues Facing the

Deployment of RFID Technology. In Deploying RFID Challenges, Solutions, and Open

Issues, pages 1–26, Rijeka, Croatia. InTech.

Darcy, P., Stantic, B., and Sattar, A. (2009). A Fusion of Data Analysis and Non-

Monotonic Reasoning to Restore Missed RFID Readings. In The Fifth International

Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISS-

NIP), pages 313–318, Melbourne, Australia. IEEE.

Darcy, P., Stantic, B., and Sattar, A. (2010a). Correcting Missing Data Anomalies with

Clausal Defeasible Logic. In Advances in Databases and Information Systems (ADBIS),

volume 6295, pages 149–163, Riga, Lativia.

Darcy, P., Stantic, B., and Sattar, A. (2010b). X-CleLo: Intelligent Deterministic RFID

Data Transformer. In The Fourth International Workshop on RFID Technology - Con-

cepts, Applications, Challenges (IWRT), pages 59–68, Funchal, Madeira, Portugal.

163

Page 190: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

BIBLIOGRAPHY

Derakhshan, R., Orlowska, M. E., and Li, X. (2007). RFID Data Management: Challenges

and Opportunities. In IEEE International Conference on RFID 2007, pages 175–182,

Texas, USA.

Devarapalli, M. R., Sarangan, V., and Radhakrishnan, S. (2007). AFSA: an Efficient

Framework for Fast RFID Tag Reading in Dense Environments. In QSHINE ’07: The

Fourth International Conference on Heterogeneous Networking for Quality, Reliability,

Security and Robustness Workshops, pages 1–7, New York, NY, USA. ACM.

Ding, J. and Liu, F. (2009). Novel Tag Anti-Collision Algorithm with Adaptive Grouping.

Wireless Sensor Network (WSN), 1(5):475–481.

D’Mello, S., Mathews, E., McCauley, L., and Markham, J. (2008). Impact of Position and

Orientation of RFID Tags on Real Time Asset Tracking in a Supply Chain. Journal of

Theoretical and Applied Electronic Commerce Research, 3(1):1–12.

EPCGlobal (2005). EPC Radio-Frequency Identity Protocols Class-1 Generation-

2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.0.9.

http://www.epcglobalinc.org/standards/.

EPCGlobal (2006). EPCGlobal Tag Data Standards Version 1.3: Ratified Specification.

http://www.epcglobalinc.org/standards/tds/.

EPCGlobal (2008). EPCGlobal Tag Data Standards Version 1.4: Ratified Specification.

http://www.epcglobalinc.org/standards/tds/.

Fan, X., Song, I., and Chang, K. (2008a). Gen2-Based Hybrid Tag Anti-Collision Q

Algorithm using Chebyshev’s Inequality for Passive RFID Systems. In Personal, In-

door and Mobile Radio Communications, 2008. PIMRC 2008. IEEE 19th International

Symposium on, pages 1–5, Cannes, France.

Fan, X., Song, I., Chang, K., Shin, D. B., Lee, H. S., Pyo, C. S., and Chae, J. S. (2008b).

Gen2-Based Tag Anti-collision Algorithms Using Chebyshev’s Inequality and Adjustable

Frame Size. ETRI Journal, 30(5):653–662.

Feng, B., Li, J. T., Guo, J. B., and Ding, Z. H. (2006). ID-Binary Tree Stack Anticollision

Algorithm for RFID. In Proceedings of the 11th IEEE Symposium on Computers and

Communications, pages 207–212, Washington, DC, USA. IEEE Computer Society.

Ferguson, R. B. (2006). Logan Airport to Demonstrate Baggage, Passenger RFID Track-

ing. eweek. http://www.eweek.com/c/a/Mobile-and-Wireless/.

Finkenzeller, K. (2003). RFID Handbook - Fundamentals and Applications in Contactless

Smart Cards and Identification (2nd Edition). John Wiley and Sons, Munich, Germany.

164

Page 191: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

BIBLIOGRAPHY

Fishkin, K. P., Jiang, B., Philipose, M., and Roy, S. (2004). I Sense a Disturbance in the

Force: Unobtrusive Detection of Interactions with RFID-tagged Objects. In UbiComp

2004: Ubiquitous Computing, pages 268–282, Seattle, Washington, USA.

Floerkemeier, C. (2007). Bayesian Transmission Strategy for Framed ALOHA Based RFID

Protocols. In RFID, 2007. IEEE International Conference on RFID Gaylord Texan

Resort, pages 228–235, Grapevine, TX, USA.

Floerkemeier, C. and Lampe, M. (2004). Issues with RFID Usage in Ubiquitous Computing

Applications. Pervasive Computing, 3001:188–193.

Floerkemeier, C. and Lampe, M. (2005). RFID Middleware Design: Addressing Applica-

tion Requirements and RFID Constraints. In sOc-EUSAI ’05: Proceedings of the 2005

Joint Conference on Smart Objects and Ambient Intelligence, pages 219–224, New York,

NY, USA. ACM Press.

Gonzalez, H., Han, J., and Li, X. (2006a). FlowCube: Constructuing RFID FlowCubes

for Multi-Dimensional Analysis of Commodity Flows. In VLDB ’06: Proceedings of the

32nd International Conference on Very Large Data Bases, pages 834–845, Seoul, Korea.

Gonzalez, H., Han, J., and Li, X. (2006b). Mining Compressed Commodity Workflows

from Massive RFID Data Sets. In CIKM ’06: Proceedings of the 15th ACM international

conference on Information and knowledge management, pages 162–171, New York, NY,

USA. ACM Press.

Gonzalez, H., Han, J., Li, X., and Klabjan, D. (2006c). Warehousing and Analyzing Mas-

sive RFID Data Sets. In ICDE ’06: Proceedings of the 22nd International Conference

on Data Engineering, page 83, Washington, DC, USA. IEEE Computer Society.

Gonzalez, H., Han, J., and Shen, X. (2007). Cost-Conscious Cleaning of Massive

RFID Data Sets. In Proceedings of 2007 International Conference Data Engineering

(ICDE’07), pages 1268–1272, Istanbul, Turkey.

Gyllstrom, D., Wu, E., Chae, H. J., Diao, Y., Stahlberg, P., and Anderson, G. (2007).

SASE: Complex Event Processing over Streams. In Proceedings of the Third Biennial

Conference on Innovative Data Systems Research (CIDR), pages 407–411, Asilomar,

CA, USA.

Harrop, P. (2005). RFID in the Postal Service. MoreRFID. http://morerfid.com/.

Hunt, V. D., Puglia, A., and Puglia, M. (2007). RFID: A Guide To Radio Frequency

Identification. John Wiley and Sons, Hoboken, New Jersey.

Investopedia (2011). Decision Tree. http://www.investopedia.com/terms/d/decision-

tree.asp.

165

Page 192: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

BIBLIOGRAPHY

Jacomet, M., Ehrsam, A., and Gehrig, U. (1999). Contactless Identification Device With

Anticollision Algorithm. In IEEE Computer Society, Conference on Circuits, Systems,

Computers and Communications, pages 4–8, Athens, Greece.

Jain, S. and Das, S. R. (2006). Collision Avoidance in a Dense RFID Network. In

WiNTECH ’06: Proceedings of the 1st International Workshop on Wireless Network

Testbeds, Experimental Evaluation & Characterization, pages 49–56, New York, NY,

USA. ACM.

Jeffery, S. R., Alonso, G., Franklin, M. J., Hong, W., and Widom, J. (2005). A Pipelined

Framework for Online Cleaning of Sensor Data Streams. Technical Report UCB/CSD-

05-1413, EECS Department, University of California, Berkeley.

Jeffery, S. R., Alonso, G., Franklin, M. J., Hong, W., and Widom, J. (2006a). Declarative

Support for Sensor Data Cleaning. In Pervasive Computing, volume 3968, pages 83–100,

Dublin, Ireland. Springer Berlin/Heidelberg.

Jeffery, S. R., Garofalakis, M., and Franklin, M. J. (2006b). Adaptive Cleaning for RFID

Data Streams. In VLDB’2006: Proceedings of the 32nd International Conference on

Very Large Data Bases, pages 163–174, Seoul, Korea. VLDB Endowment.

Jones, E. C. and Chung, C. A. (2008). RFID in Logistics: a Practical Introduction. CRC

Press: Taylor and Francis Group, LLC, Boca Raton, Florida.

Karmakar, N. C. (2010). Handbook of Smart Antennas for RFID Systems. John Wiley

and Sons, Hoboken, New Jersey, 1st edition.

Karmakar, N. C., Roy, S. M., and Ikram, M. S. (2008). Development of Smart Antenna

for RFID Reader. In IEEE International Conference on RFID 2008, pages 65–73, Las

Vegas, NV.

Kim, J. G. (2008). A Divide-and-Conquer Technique for Throughput Enhancement of

RFID Anti-collision Protocol. Communications Letters, IEEE, 12(6):474–476.

Klair, D. K., Chin, K. W., and Raad, R. (2007). On the Suitability of Framed Slotted Aloha

based RFID Anti-collision Protocols for Use in RFID-Enhanced WSNs. In Proceedings

of 16th International Conference on Computer Communications and Networks 2007

(ICCCN 2007), pages 583–590, Honolulu, Hawaii, USA.

Klair, D. K., Chin, K. W., and Raad, R. (2010). A Survey and Tutorial of RFID Anti-

Collision Protocols. Communications Surveys Tutorials, IEEE, 12(3):400–421.

Lahiri, S. (2005). RFID Sourcebook. Prentice Hall PTR, Upper Saddle River, New Jersey.

Landt, J. (2001). Shrouds of Time The history of RFID. Pittsburg, PA. An Aim Publi-

cation.

166

Page 193: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

BIBLIOGRAPHY

Law, C., Lee, K., and Siu, K. Y. (2000). Efficient Memoryless Protocol for Tag Iden-

tification. In Proceedings of the 4th International Workshop on Discrete Algorithms

and Methods for Mobile Computing and Communications, pages 75–84, New York, NY,

USA. ACM.

Lee, C. W., Cho, H., and Kim, S. W. (2008a). An Adaptive RFID Anti-Collision Algorithm

Based on Dynamic Framed ALOHA. IEICE Transactions, 91-B(2):641–645.

Lee, J. G., Hwang, S. J., and Kim, S. W. (2008b). Performance Study of Anti-collision

Algorithms for EPC-C1 Gen2 RFID Protocol. In Information Networking. Towards

Ubiquitous Networking and Services, volume 5200, pages 523–532, Estoril, Portugal.

Springer Berlin/Heidelberg.

Lee, M., Cheng, F., and Leung, Y. (2005a). A Quantitative View on How RFID will Im-

prove a Supply Chain. Technical Report RC23789(W0511-065), IBM Research Center.

Lee, S. R., Joo, S. D., and Lee, C. W. (2005b). An enhanced dynamic framed slotted aloha

algorithm for rfid tag identification. In MOBIQUITOUS ’05: Proceedings of The Second

Annual International Conference on Mobile and Ubiquitous Systems: Networking and

Services, pages 166–174, Washington, DC, USA. IEEE Computer Society.

Lee, S. R. and Lee, C. W. (2006). An Enhanced Dynamic Framed Slotted ALOHA Anti-

collision Algorithm. In Emerging Directions in Embedded and Ubiquitous Computing,

volume 4097, pages 403–412, Seoul, Korea. Springer Berlin/Heidelberg.

Leong, K. S., Ng, M. L., and Cole, P. H. (2005). The Reader Collision Problem in RFID

Systems. In IEEE 2005 International Symposium on Microwave, Antenna, Propagation

and EMC Technologies For Wireless Communication, pages 658–661. IEEE Computer

Society.

Li, B., Yang, Y., and Wang, J. (2009). Anti-collision Issue Analysis in Gen2 Protocol

- Anti-collision issue analysis considering capture effect. Auto-ID Labs White Paper.

http://www.autoidlabs.org/single-view/dir/article/6/320/page.html.

Liu, H. C. (2010). The Approaches in Solving Passive RFID Tag Collision Problems.

In Radio Frequency Identification Fundamentals and Applications Bringing Research to

Practice, pages 49–56, Croatia. InTech.

Liu, L., Xie, Z., Xi, J., and Lai, S. (2005). An Improved Anti-Collision Algorithm in RFID

System. In The Second International Conference on Mobile Technology, Applications

and Systems, pages 1–5, Guangzhou, China. IEEE.

Liu, S., Wang, F., and Liu, P. (2006). Integrated RFID Data Modeling: an Approach

for Querying Physical Objects in Pervasive Computing. In CIKM ’06: Proceedings of

the 15th ACM International Conference on Information and Knowledge Management,

pages 822–823, New York, NY, USA. ACM Press.

167

Page 194: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

BIBLIOGRAPHY

Melski, A., Thoroe, L., and Schumann, M. (2007). Managing RFID Data in Supply Chains.

Int. J. Internet Protoc. Technol., 2:176–189.

Myerson, J. M. (2007). RFID in the Supply Chain: A Guide to Selection and Implemen-

tation. Auerbach Publications-Taylor and Francis Group, LLC, Philadelphia, Pennsyl-

vania, USA.

Myung, J. and Lee, W. (2006a). Adaptive binary splitting: a RFID tag collision arbitration

protocol for tag identification. Mob. Netw. Appl., 11(5):711–722.

Myung, J. and Lee, W. (2006b). Adaptive splitting protocols for RFID tag collision

arbitration. In MobiHoc ’06: Proceedings of the 7th ACM international symposium on

Mobile ad hoc networking and computing, pages 202–213, New York, NY, USA. ACM.

Palmer, M. (2004). Seven Principles of Effective RFID Data Management. Enterprise

System (ES). http://esj.com/enterprise/article.aspx?EditorialsID=1067.

Polniak, S. (2007). The RFID Case Study Book: RFID Application Stories from Around

the Globe. Abhisam Software.

Preradovic, S., Balbin, I., Karmakar, N. C., and Swiegers, G. F. (2009). Multiresonator-

Based Chipless RFID System for Low-Cost Item Tracking. IEEE Transactions on Mi-

crowave Theory and Techniques, 57(5):1411–1419.

Pupunwiwat, P., Darcy, P., and Stantic, B. (2011). Conceptual Selective RFID Anti-

Collision Technique Management. Procedia Computer Science, 5:827–834.

Pupunwiwat, P. and Stantic, B. (2007). Location Filtering and Duplication Elimination

for RFID Data Streams. The International Journal of Principles and Applications in

Information Science and Technology (PAIST), 1(1):29–43.

Pupunwiwat, P. and Stantic, B. (2009a). Performance Analysis of Enhanced Q-ary Tree

Anti-Collision Protocols. In The First Malaysian Joint Conference on Artificial Intelli-

gence (MJCAI), volume 1, pages 229–238, Kuala Lumpur, Malaysia.

Pupunwiwat, P. and Stantic, B. (2009b). Unified Q-ary Tree for RFID Tag Anti-Collision

Resolution. In The Twentieth Australasian Database Conference (ADC), volume 92,

pages 47–56, Wellington, New Zealand. ACS.

Pupunwiwat, P. and Stantic, B. (2010a). A RFID Explicit Tag Estimation Scheme for

Dynamic Framed-Slot ALOHA Anti-Collision. In The Sixth Wireless Communications,

Networking and Mobile Computing (WiCOM), pages 1–4, Chengdu, China. IEEE.

Pupunwiwat, P. and Stantic, B. (2010b). Dynamic Framed-Slot ALOHA Anti-Collision

using Precise Tag Estimation Scheme. In The Twenty-First Australasian Database Con-

ference (ADC), volume 104, pages 19–28, Brisbane, Australia. ACS.

168

Page 195: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

BIBLIOGRAPHY

Pupunwiwat, P. and Stantic, B. (2010c). Joined Q-ary Tree Anti-Collision for Massive

Tag Movement Distribution. In The Thirty-Third Australasian Computer Science Con-

ference (ACSC), volume 102, pages 99–108, Brisbane, Australia. ACS.

Pupunwiwat, P. and Stantic, B. (2010d). Resolving RFID Data Stream Collisions using

Set-Based Approach. In The Sixth International Conference on Intelligent Sensors, Sen-

sor Networks and Information Processing (ISSNIP), pages 61–66, Brisbane, Australia.

IEEE.

Quan, C. H., Hong, W. K., and Kim, H. C. (2006). Performance Analysis of Tag Anti-

collision Algorithms for RFID Systems. In Emerging Directions in Embedded and Ubiqui-

tous Computing, volume 4097, pages 382–391, Seoul, Korea. Springer Berlin/Heidelberg.

Ryu, J., Lee, H., Seok, Y., Kwon, T., and Choi, Y. (2007). A Hybrid Query Tree Protocol

for Tag Collision Arbitration in RFID systems. In MobiHoc ’06: Proceedings of the

7th ACM international symposium on Mobile ad hoc networking and computing, pages

5981–5986, Glasgow, UK. IEEE Computer Society.

Sanghera, P., Thornton, F., Haines, B., Fung, F. K. M., Kleinschmidt, J., Das, A. M.,

Bhargava, H., and Campbell, A. (2007). How to Cheat at Deploying and Securing RFID.

Syngress Publishing, Burlington, Massachusetts.

Schoute, F. C. (1983). Dynamic Frame Length ALOHA. IEEE Transactions on Commu-

nications, 31(4):565–568.

Shih, D. H., Sun, P. L., Yen, D. C., and Huang, S. M. (2006). Taxonomy and Survey of

RFID Anti-Collision Protocols. Science Direct, 29(11):2150–2166.

Shin, W. J. and Kim, J. G. (2007). Partitioning of Tags for Near-Optimum RFID

Anti-collision Performance. In Wireless Communications and Networking Conference,

2007.WCNC 2007. IEEE, pages 1673–1678, Hong Kong.

Swedberg, C. (2005). Hospital Uses RFID for Surgical Patients. RFID Journal.

http://www.rfidjournal.com/article/view/1714/1/1.

Sweeney, P. J. (2005). RFID for Dummies. Wiley Publishing, Inc., Indianapolis, Indiana.

Tang, Z. and He, Y. (2007). Research of Multi-access and Anti-collision Protocols in

RFID Systems. In Anti-counterfeiting, Security, Identification, 2007 IEEE International

Workshop, pages 377–380, Xiamen, Fujian, China.

Vogt, H. (2002). Efficient Object Identification with Passive RFID Tags. In Pervasive

’02: Proceedings of the First International Conference on Pervasive Computing, pages

98–113, London, UK. Springer-Verlag.

169

Page 196: Tag Anti-Collision Resolution for Improved Quality of · PDF fileTag Anti-Collision Resolution for Improved Quality of RFID ... Anti-Collision using Precise ... 3.2 Collision Problems

BIBLIOGRAPHY

Wang, F. and Liu, P. (2005). Temporal Management of RFID Data. In VLDB ’05:

Proceedings of the 31st International Conference on Very Large Data Bases, pages 1128–

1139, Trondheim, Norway. VLDB Endowment.

Wang, F., Liu, S., and Liu, P. (2010). A Temporal RFID Data Model for Querying Physical

Objects. Pervasive and Mobile Computing, 6(3):382–397.

Wang, F., Liu, S., Liu, P., and Bai, Y. (2006). Bridging Physical and Virtual Worlds:

Complex Event Processing for RFID Data Streams. In 10th International Conference

on Extending Database Technology (EDBT), pages 588–607, Munich, Germany.

Wang, Z., Liu, D., Zhou, X., Tan, X., Wang, J., and Min, H. (2007).

Anti-collision Scheme Analysis of RFID System. Auto-ID Labs White Paper.

http://www.autoidlabs.org/single-view/dir/article/6/281/page.html.

Wu, E., Diao, Y., and Rizvi, S. (2006). High-Performance Complex Event Processing

over Streams. In SIGMOD ’06: Proceedings of the 2006 ACM SIGMOD International

Conference on Management of Data, pages 407–418, New York, NY, USA. ACM Press.

Wu, H. and Zeng, Y. (2010). Bayesian Tag Estimate and Optimal Frame Length for

Anti-Collision Aloha RFID System. IEEE Transactions on Automation Science and

Engineering, 7(4):963–969.

Yu, S., Zhan, Y., Wang, Z., and Tang, Z. (2005). Anti-Collision Algorithm Based on

Jumping and Dynamic Searching and Its Analysis. Computer Engineering, 31:19–20.

Zhou, F., Chen, C., Jin, D., Huang, C., and Min, H. (2004). Evaluating and Optimizing

Power Consumption of Anti-Collision Protocols for Applications in RFID Systems. In

Proceedings of the 2004 international symposium on Low power electronics and design

(ISLPED04), pages 357–362, New York, NY, USA. ACM.

Zhu, L. and Yum, P. T. (2009). The Optimization of Framed Aloha Based RFID Al-

gorithms. In MSWiM ’09: Proceedings of the 12th ACM International Conference on

Modeling, Analysis and Simulation of Wireless and Mobile Systems, pages 221–228, New

York, NY, USA. ACM.

Zhu, L. and Yum, P. T. (2011). A Critical Survey and Analysis of RFID Anti-Collision

Mechanisms. Communications Magazine, IEEE, 49:214–221.

170