Responsive image
博碩士論文 etd-0809116-103206 詳細資訊
Title page for etd-0809116-103206
論文名稱
Title
有效降低RFID讀取器覆蓋衝突之佈署策略
Efficient Anti-Collision Reader Deployment Strategy for RFID Networks
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
55
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2016-08-17
繳交日期
Date of Submission
2016-09-09
關鍵字
Keywords
碰撞問題、讀取器碰撞、讀取器佈署、RFID
collision problem, reader deployment, reader collision, RFID
統計
Statistics
本論文已被瀏覽 5667 次,被下載 18
The thesis/dissertation has been browsed 5667 times, has been downloaded 18 times.
中文摘要
近年來,無線射頻辨識技術(RFID)已被廣泛應用於日常生活當中,諸如門禁系統、圖書管理系統以及倉儲管理系統等,而在某些應用上 (例如:倉儲管理),通常需要大量的標籤和讀取器來管理物品,因此很容易造成訊號干擾的問題,然而,良好的讀取器佈署策略可以有效改善訊號干擾問題,並且能夠降低讀取器的建置成本,因此讀取器佈署策略是值得研究的議題。
基於上述動機,本論文提出一個低成本的讀取器佈署策略,我們利用標籤的位置來計算出一組建置最少數量的讀取器集合,並確保環境區域內的所有標籤皆至少被一個讀取器所偵測,而該集合能有效避免訊號彼此間的干擾問題,而我們使用可調變式的讀取器來進行研究,讀取器可以依需求調整詢問範圍的大小以減少消耗電量,最後,透過模擬結果我們驗證所提出的讀取器策略可以顯著的節省系統成本、降低消耗電量,同時有效解決讀取器的碰撞行為。
Abstract
In recent years, radio frequency identification technology (RFID) has been widely used in daily life, such as access control system, library management, and warehouse management systems. We need to use a lot of tags and readers to manage the goods in especially certain applications like warehouse management. In such applications, it is easy to cause signal interference among readers and tags. A good deployment of RFID readers can solve the signal interference problem and reduce the system construction cost. Thus, the reader deployment problem is an important issue and worth investigating.
This paper proposes a low-cost algorithm to cover all tags in the sensing area. We use the tag's location to calculate a minimum number of readers and make all tags be detected by at least one reader. We use adjustable RFID readers in the thesis. The adjustable RFID readers can adjust the interrogation range to reduce power consumption. Though simulations, we verify that our deployment strategy can reduce the power consumption, deployment cost of readers, and alleviate signal interference.
目次 Table of Contents
論文審定書 i
致謝 ii
摘要 iii
Abstract iv
目錄 v
圖次 vii
表次 ix
第一章 導論 1
1.1 前言 1
1.2 研究動機 3
1.3 論文貢獻與章節架構 4
第二章 相關文獻探討 5
第三章 問題定義 8
第四章 研究方法 9
4.1 第一階段:挑選適當的讀取器位置並將其餘標籤分組 10
4.2 第二階段:標籤分成適當大小的群集並計算讀取器位置 13
4.2.1 判斷群集是否合併 15
4.2.2 計算讀取器的放置位置 17
4.3 第三階段:解決碰撞問題的發生: 23
第五章 模擬結果與分析 28
5.1 模擬環境與參數設定 28
5.2 場景一 : 標籤完全隨機分佈 29
5.3 場景二 : 標籤採取特定的分佈模式 35
第六章 結論與未來研究方向 41
參考文獻 42
參考文獻 References
[1] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, Wiley Publishing, 2003.
[2] R. Want, “An introduction to RFID technology,” IEEE Pervasive Computing, pp. 25-33, 2006.
[3] A. P. Renold and R. J. Rani, “An internet based RFID library management system,” IEEE Conference on Information & Communication Technologies, pp. 932-936, 2013.
[4] X. Li, Y. Zhou, C. Ai, and L. Qian, “Smart Entrance Guard Control Based on RFID Card and ZigBee Authorization,” International Conference on Measuring Technology and Mechatronics Automation, pp. 589-592, 2014.
[5] S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, and G. Marrocco, “RFID Technology for IoT-Based Personal Healthcare in Smart Spaces,” IEEE Internet of Things Journal, vol. 1, pp. 144-152, Apr. 2014.
[6] S. Fosso Wamba, A. Anand, and L. Carter, “A literature review of RFID-enabled healthcare applications and issues,” International Journal of Information Management, vol. 33, pp. 875-891, Oct. 2013.
[7] W. Hongjian, T. Yuelin, and L. Zhi, “RFID Technology Applied in Highway Traffic Management,” International Conference on Optoelectronics and Image Processing pp. 348-351, 2010.
[8] R. Angeles, “RFID Technologies: Supply-Chain Applications and Implementations Issues,” IEEE Engineering Management Review, p. 64, 2007.
[9] L. M. Ni, Y. Liu, Y. C. Lau, and A. P. Patil, “LANDMARC: indoor location sensing using active RFID,” Wireless Networks vol. 10, pp. 701-710, Nov. 2004.
[10] D. W. Engels and S. E. Sarma, “The reader collision problem,” IEEE International Conference on Systems, Man and Cybernetics, vol. 3, p. 6, 2002.
[11] S. M. Birari and S. Iyer, “Mitigating the reader collision problem in RFID networks with mobile readers,” IEEE International Conference on Networks, vol. 1, pp. 463-468, 2005.
[12] Z. Y. Yang and J. L. Chen, “The Simulation and Analysis of Algorithms for Redundant Reader Elimination in RFID System,” European Symposium on Computer Modeling and Simulation, pp. 494-498, 2009.
[13] A. E. Al-Fagih, F. M. Al-Turjman, H. S. Hassanein, and W. M. Alsalih, “Coverage-based placement in RFID networks: An overview,” International Conference on Mobile, Ubiquitous, and Intelligent Computing, pp. 220-224, 2012.
[14] A. Oztekin, F. Mahdavi, K. Erande, Z. Kong, L. K. Swim, and S. T. S. Bukkapatnam, “Criticality index analysis based optimal RFID reader placement models for asset tracking,” International Journal of Production Research, vol. 48, Nov. 2010.
[15] W. Yoon and N. H. Vaidya, “RFID reader collision problem: performance analysis and medium access,” Wireless Communications and Mobile Computing, vol. 12, pp. 420-430, Apr. 2010.
[16] B. Carbunar, M. K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. Grama, “Redundant reader elimination in RFID systems,” IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pp. 176-184, 2005.
[17] C. H. Hsu, Y. M. Chen, and C. T. Yang, “A Layered Optimization Approach for Redundant Reader Elimination in Wireless RFID Networks,” IEEE Asia-Pacific Service Computing Conference, pp. 138-145, 2007.
[18] K. Ali, H. S. Hassanein, and W. Alsalih, “Using neighbor and tag estimations for redundant reader eliminations in RFID networks,” IEEE Wireless Communications and Networking Conference, pp. 832-837, 2011.
[19] B. H. Liu, N. T. Nguyen, V. T. Pham, and Y. H. Yeh, “A Maximum-Weight-Independent-Set-Based Algorithm for Reader-Coverage Collision Avoidance Arrangement in RFID Networks,” IEEE Sensors Journal, vol. 16, pp. 1342-1350, Nov. 2016.
[20] S. Basagni, “Finding a Maximal Weighted Independent Set in Wireless Networks,” Telecommunication Systems, vol. 18, pp. 155-168, Sep. 2001.
[21] Y. C. Wang, Y. F. Chen, and Y. C. Tseng, “Using Rotatable and Directional (R&D) Sensors to Achieve Temporal Coverage of Objects and Its Surveillance Application,” IEEE Transactions on Mobile Computing, vol. 11, pp. 1358-1371, 2012.
[22] A. Fernández and S. Gómez, “Solving Non-Uniqueness in Agglomerative Hierarchical Clustering Using Multidendrograms,” Journal of Classification, vol. 25, pp. 43-65, Jun. 2008.
[23] T. Kanungo, D. M. Mount, N. S. Netanyahu, C. D. Piatko, R. Silverman, and A. Y. Wu, “An efficient k-means clustering algorithm: analysis and implementation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, pp. 881-892, 2002.
[24] L. Liu and S. Lai, “ALOHA-Based Anti-Collision Algorithms Used in RFID System,” International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, 2006.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code