|
|
Adaptive N Tree Anti-Collision Algorithm Based on Bitmap Construction |
WANG Xin1,JIA Qingxuan1,GAO Xin1,CHEN Gang1,ZHAO Bing2 |
(1. School of Automation, Beijing University of Posts and Telecommunications, Beijing 100876, China;2. State Grid Metering Center, Beijing 100192, China) |
|
|
Abstract Abstract: Aimed at the RFID (radio frequency identification) collision problem caused by multiple access of shared channel, this paper proposed two RFID adaptive N tree anticollision algorithms based on bitmap construction, single frame bitmap track N tree algorithm (SFBTNA) and multiframe bitmap track N tree algorithm(MFBTNA). First of all, the two methods take advantage of the maximum likelihood tag numbers estimation method (MLBE) that can effectively estimate the number of tags. Secondly, based on the MLBE, it put forward the probe method construct bitmap. The SFBTNA adaptively adjusts the optimization value of N and builds N trees on one frame based on bitmap. The MFBTNA adaptively adjusts optimization value of N and builds N trees frame by frame. At the same time, the SFBTNA and MFBTNA identify the subtrees using collision track tree algorithm (CT). The combination of bitmap and CT greatly reduces the impact of collision time slot. Theoretical analysis and simulation experiments show that the performance of the two algorithms is higher than that of the other existing anticollision algorithms.
|
Received: 07 May 2014
Published: 28 February 2015
|
|
|
|
|
[1] |
YANG Bin,LU Yuliang,YANG Guozheng,ZHU Kailong. An Artificial Immune Network Classification Algorithm Based on VirtualForce Direction and Cell Differentiation[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2017, 51(1): 98-. |
[2] |
WEN Zhicheng1,2,CHEN Zhigang1,DENG Xiaoheng1,LIU Anfeng1. Network Security Situation Awareness Method Based on Multi-Source and Multi-Level Information Fusion[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2015, 49(08): 1144-1152. |
[3] |
XU Bo,MIN Huaqing,XIAO Fangxiong. Ant Colony Algorithm for Solving Discrete Minimum Constraint Removal (MCR) Problem[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2015, 49(03): 383-386. |
[4] |
ZHANG Keli1,LI Zhongxian1,2,YANG Yixian1. A Trust Model for Identifying and Tracing Malicious Anonymous Feedback Providers[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2014, 48(07): 899-906. |
[5] |
ZHANG Ying,JI Changgang,LI Junfu. A Routing Algorithm Based on Energy and Distance for Heterogeneous Sensor Networks with Multilevel Energies[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2014, 48(07): 953-958. |
[6] |
CHEN Jianhong1,2,SHAN Jingsong1,YANG Ronggen1,GONG Lejun1,CHEN Kefei 2,YU Kun1,CHEN Liqing1,SUN Chengfu1. Identity-based Threshold Key-insulated Signature Without Random Oracles
[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(08): 1239-1245. |
[7] |
XIE Jing, LIU Gong-Shen, SU Bo, MENG Kui. Prediction of User’s Retweet Behavior in Social Network[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(04): 583-588. |
[8] |
LIU Chen-Yan-1, 2 , PAN Li-1, 2 , ZI Xiao-Chao-2. A Binary-String-Set-Based Algebraic Framework for Policy Composition[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(04): 579-583. |
[9] |
QIAO Yu-Ran, WU Nan, YANG Qian-Ming, WEN Mei, ZHANG Chun-Yuan. Deadlock Detection and Recovery Based on Topological Order for NoC[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(01): 92-97. |
[10] |
CHEN Gui-Rong-1, 2 , CAI Wan-Dong-1, XU Hui-Jie-1, YAN Pei-Xiang-3, WANG Jian-Ping-1. High-Effect Priority Bounded Confidence Model for Network Opinion Evolution[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(01): 155-160. |
[11] |
FANG Ming-1, CHEN Song-Qiao-1, WANG Ke-Fei-2. High Radix Router Design Based on Asymmetric Crossbar[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(01): 138-143. |
[12] |
ZHOU Gui-Yin, HE Chen, JIANG Ling-Ge. Single Transceiver and Network Characteristics Based
MAC Protocol for Cognitive Radio Wireless Sensor Networks[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(11): 1729-1735. |
[13] |
XIAO Rong, JIANG Ling-Ge, HE Chen. A Channel Reliability Based Multi-channel MAC Protocol in Wireless Sensor Networks[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(09): 1382-1386. |
[14] |
LIU Su-Na-1, 2 , PAN Li-1, 2 , 3 , YAO Li-Hong-2. BLP Based Access Control Mechanism in Multi-level Network Systems[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(09): 1387-1391. |
[15] |
ZHENG Bo-1, 2 , ZHANG Heng-Yang-1, SUN Peng-1, HUANG Guo-Ce-1. Connectivity on One-and Two-Way Flight Routes in Aeronautical Ad hoc Networks[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(04): 624-629. |
|
|
|
|