64 research outputs found

    Passive on-metal UHF RFID tag antenna design with folded T-match network

    Get PDF
    The radio frequency identification (RFID) industry is expected to witness steady growth as the demands for reliable asset management and healthcare equipment tracking quickly scale up. The ultra-high frequency (UHF) RFID system applies radio reader-tag transmissions to identify a tagged object, with an assigned identification number stored in an RFID integrated circuit (IC). A problem facing the RFID tag antenna performance on metal is that any metal nearby can detune and temper the tag antenna. This problem has hampered the endeavor to popularize RFID technology. In this thesis, a half-wavelength microstrip resonator with folded dipoles and modified T-match networks is proposed to enhance the robustness of an antenna on a metallic object. The T-match network is a common technique for guiding current and improving directivity in passive RFID tag antenna design. Here, an equivalent circuit model is followed by given design rules and reasonable analysis. The results show promise for the capability of a tuned antenna to overcome the influence of a metal plane beneath, with minimum return loss and reasonable gain. The proposed RFID antenna design is simulated in Ansoft HFSS 18.2.Ope

    Capture-aware identification of mobile RFID tags with unreliable channels

    Get PDF
    Radio frequency identification (RFID) has been widely applied in large-scale applications such as logistics, merchandise and transportation. However, it is still a technical challenge to effectively estimate the number of tags in complex mobile environments. Most of existing tag identification protocols assume that readers and tags remain stationary throughout the whole identification process and ideal channel assumptions are typically considered between them. Hence, conventional algorithms may fail in mobile scenarios with unreliable channels. In this paper, we propose a novel RFID anti-collision algorithm for tag identification considering path loss. Based on a probabilistic identification model, we derive the collision, empty and success probabilities in a mobile RFID environment, which will be used to define the cardinality estimation method and the optimal frame length. Both simulation and experimental results of the proposed solution show noticeable performance improvement over the commercial solutions

    From M-ary Query to Bit Query: a new strategy for efficient large-scale RFID identification

    Get PDF
    The tag collision avoidance has been viewed as one of the most important research problems in RFID communications and bit tracking technology has been widely embedded in query tree (QT) based algorithms to tackle such challenge. Existing solutions show further opportunity to greatly improve the reading performance because collision queries and empty queries are not fully explored. In this paper, a bit query (BQ) strategy based Mary query tree protocol (BQMT) is presented, which can not only eliminate idle queries but also separate collided tags into many small subsets and make full use of the collided bits. To further optimize the reading performance, a modified dual prefixes matching (MDPM) mechanism is presented to allow multiple tags to respond in the same slot and thus significantly reduce the number of queries. Theoretical analysis and simulations are supplemented to validate the effectiveness of the proposed BQMT and MDPM, which outperform the existing QT-based algorithms. Also, the BQMT and MDPM can be combined to BQMDPM to improve the reading performance in system efficiency, total identification time, communication complexity and average energy cost

    Case Study: Installing RFID Systems in Supermarkets

    Get PDF
    Radio frequency identification technology (RFID) is considered as the reference technology for wireless identification and item traceability. Supermarkets are one of those scenarios where the RFID potential can be harnessed. In theory, RFID in supermarkets shows several advantages compared with traditional barcode systems, offering real‐time inventory, stock control, cash queues, among others. In practice, its massive and global implementation is still being delayed due to the high quantity of factors that degrade the RFID system performance in these scenarios, causing uncontrolled items and identification losses and, at the end, economical losses. Some works in the scientific literature studied a single or a set of problems related to RFID performance, mostly focused on a specific communication layer: antennas and hardware design, interferences at physical layer, medium access control (MAC) protocols, security issues, or middleware challenges. However, there are no works describing in depth the set of factors affecting RFID performance in a specific scenario and contemplating the entire communication layer stack. The first challenge of this chapter is to provide a complete analysis of those physical and environmental factors, hardware and software limitations, and standard and regulation restrictions that have a direct impact on the RFID system performance in supermarkets. This analysis is addressed by communication layers, paying attention to the point of view of providers, supermarket companies, and final customers. Some of the most feasible and influential research works that address individual problems are also enumerated. Finally, taking the results extracted from this study, this chapter provides a Guide of Good Practices (GGPs), giving a global vision for addressing a successful RFID implementation project, useful for researchers, developers, and installers

    FRAMEWORK FOR IMPROVING PERFORMANCE OF PROTOCOLS FOR READING RADIO FREQUENCY IDENTIFICATION TAGS

    Get PDF
    Radio-frequency Identification (RFID) is a highly sought-after wireless technology used to track and manage inventory in the supply chain industry. It has varied applications ranging from automated toll collection and security access management to supply chain logistics. Miniaturization and low tag costs of RFID tags have lead to item-level tagging, where not just the pallet holding products is tagged but each product inside has a tag attached to it. Item-level tagging of goods improves the accuracy of the supply chain but it significantly increases the number of tags that an RFID reader must identify and track. Faster identification is crucial to cutting cost and improving efficiency. Existing RFID protocols were designed to primarily handle static scenarios with both RFID tags and readers not being in motion. This research addresses the problem of inventory tracking within a warehouse in multitude of scenarios that involves mobile tags, multiple readers and high density environments. Mobility models are presented and frameworks are developed for the following scenarios: a) mobile tags on a conveyor belt with multiple fixed readers; b) mobile reader in a warehouse with stationary tags in shelves; and c) high density tag population with Near-Field (NF) communication. The proposed frameworks use information sharing among readers to facilitate protocol state handoff and segregation of tags into virtual zones to improve tag reading rates in mobile tag and mobile reader scenarios respectively. Further, a tag’s ability to listen to its Near-Field neighboring tags transmissions is exploited to assist the reader in resolving collisions and hence enhancing throughput. The frameworks discussed in this research are mathematically modeled with a probabilistic analysis of protocols employed in conjunction with framework. With an increased number of tags to be identified, mathematically understanding the performance of the protocol in these large-scale RFID systems becomes essential. Typically, this analysis is performed using Markov-chain models. However, these analyses suffer from the common state-space explosion problem. Hence, it is essential to come up with a scalable analysis, whose computation model is insensitive to the number of tags. The following research analyzes the performance of tag identification protocols in highly dense tag scenarios, and proposes an empirical formula to estimate the approximate time required to read all the tags in a readers range without requiring protocol execution

    The Approaches in Solving Passive RFID Tag Collision Problems

    Get PDF

    A Scientific Approach to UHF RFID Systems Characterization

    Get PDF

    Stability of synchronous queued RFID networks

    Get PDF
    Queued Radio Frequency Identification (RFID) networks arise naturally in many applications, where tags are grouped into batches, and each batch must be processed before the next reading job starts. In these cases, the system must be able to handle all incoming jobs, keeping the queue backlogs bounded. This property is called stability. Besides, in RFID networks, it is common that some readers cannot operate at the same time, due to mutual interferences. This fact reduces the maximum traffic that readers can process since they have to share the channel. Synchronous networks share the channel using a TDMA approach. The goal of this work is to analytically determine whether a synchronous queued RFID network attains stable operation under a given incoming traffic. Stability depends on the service rate, which is characterized in this paper using an exact numerical method based on a recursive analytical approach, overcoming the limitations of previous works, which were based on simplifications. We also address different flow optimization problems, such as computing the maximum joint traffic that a network can process stably, selecting the minimal number of readers to process a given total load, or determining the optimal timeslot duration, which are novel in the RFID literature.This work was supported by the Project AIM, (AEI/FEDER, EU) under Grant TEC2016-76465-C2-1-R
    corecore