4 research outputs found

    Improved RFID Anti-collision Protocol for EPCglobal Class-1 Generation-2

    Get PDF
    One of the important feature in the RFID technology is its functionality without needs to line of sight which makes it more feasible than other similar technologies. The problem occurs when more than one tag reply to the reader at the same time and collide together. To resolve the mentioned issue an anti-collision algorithm has to be used. The anti-collision algorithms are mostly efficient if the number of tags are small and has not been designed for large number of tags. In some applications that the number of tags may be hundreds of tags the existing mechanism may reduce the performance of the system due to delayed algorithms. In this paper an improved anti-collision protocol has been proposed. A modified two-parameter step size method for Q algorithm is also used to increase the efficiency of reading. The step sizes are adjusted depending on collisions in previous round. The number of slots in each round is also adjusted to prevent collisions in next rounds. The performance of proposed protocol has been evaluated using RFID module that implements EPCglobal C1G2 and designed especially for IoT environment and find the proposed protocol effective. Keywords: RFID, Anti-collision, EPCglobal, Q algorithm, DFSA

    RFID-Based model for remote chicken monitoring: case of free-range chicken farming in Machakos County

    Get PDF
    Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in Computer-Based Information Systems (MSIS) at Strathmore UniversityPoultry farming is an important economic activity among Kenyan farmers. In order to earn income, they have to raise chicken and sell them once fully matured. This Indigenous chicken farming not only requires time investment but also money. However, security of chicken is an inevitability every farmer has to face. This is because, this category of chicken needs a free-range environment where it can move around, scratching for food, worms and other edibles. The chicken farmer faces challenges majorly theft of chicken by workers or strangers who randomly visit the farm. In this study, we developed a model that tracks chicken using RFID tags. This model enables a farmer to remotely monitor chicken from anywhere using the internet. The model constantly records and stores chicken data captured by the reader and updates this information in a database. The farmer can thereafter retrieve the tagged chicken information using a user interface designed to simplify the process of monitoring the chicken to minimise theft. The RFID model was designed to identify the chicken, each with its specific tag, containing particular information about it. To demonstrate this, an Arduino Uno microcontroller is set up with an encoded RFID system for chicken tracking. The RFID system uploads data sketches to a remote server via an Ethernet shield

    Design of a Quaternary Query Tree ALOHA Protocol Based on Optimal Tag Estimation Method

    No full text
    Radio Frequency Identification (RFID) technology is one of the most promising technologies in the IoT (The Internet of Things) era. Many RFID systems have been used in supermarkets or warehouses. There are two challenges for RFID anti-collision algorithms. The first challenge is accurately estimating the number of tags; the other is improving the efficiency of RFID systems. This paper proposes an optimal tag estimation method in which tags respond to the reader in assigned time slots instead of responding randomly. In order to improve the performance of the RFID system, a 4-ary query tree Additive Link On-line HAwaii (ALOHA) protocol is presented that combines the merits of query tree algorithm and frame slotted ALOHA, and avoids their weaknesses. Simulation results show that the proposed algorithm has a higher tag identification efficiency compared to other dynamic frame slotted ALOHA algorithms, and it can overcome the tag starvation phenomenon, because it traces each tag until all of them are identified successfully

    Design of a Quaternary Query Tree ALOHA Protocol Based on Optimal Tag Estimation Method

    No full text
    Radio Frequency Identification (RFID) technology is one of the most promising technologies in the IoT (The Internet of Things) era. Many RFID systems have been used in supermarkets or warehouses. There are two challenges for RFID anti-collision algorithms. The first challenge is accurately estimating the number of tags; the other is improving the efficiency of RFID systems. This paper proposes an optimal tag estimation method in which tags respond to the reader in assigned time slots instead of responding randomly. In order to improve the performance of the RFID system, a 4-ary query tree Additive Link On-line HAwaii (ALOHA) protocol is presented that combines the merits of query tree algorithm and frame slotted ALOHA, and avoids their weaknesses. Simulation results show that the proposed algorithm has a higher tag identification efficiency compared to other dynamic frame slotted ALOHA algorithms, and it can overcome the tag starvation phenomenon, because it traces each tag until all of them are identified successfully
    corecore