Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access


    Efficient MAC Protocols for Brain Computer Interface Applications

    Shams Al Ajrawi1,*, Ramesh Rao2, Mahasweta Sarkar3

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 589-605, 2021, DOI:10.32604/cmc.2021.016930

    Abstract Brain computer interface (BCI) systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices. BCI is a promising interdisciplinary field that gained the attention of many researchers. Yet, the development of BCI systems is facing several challenges, such as network lifetime. The Medium Access Control (MAC) Protocol is the bottle- neck of network reliability. There are many MAC protocols that can be utilized for dependable transmission in BCI applications by altering their control parameters. However, modifying these parameters is another source of concern due to the scarcity in… More >

  • Open Access


    A Novel Hybrid Tag Identification Protocol for Large-Scale RFID Systems

    Ye Mu1,2,3,4, Ruiwen Ni1, Yuheng Sun1, Tong Zhang1, Ji Li1, Tianli Hu1,2,3,4, He Gong1,2,3,4, Shijun Li1,2,3,4,*, Thobela Louis Tyasi5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2515-2527, 2021, DOI:10.32604/cmc.2021.016570


    Radio frequency identification technology is one of the main technologies of Internet of Things (IoT). Through the transmission and reflection of wireless radio frequency signals, non-contact identification is realized, and multiple objects identification can be realized. However, when multiple tags communicate with a singleton reader simultaneously, collision will occur between the signals, which hinders the successful transmissions. To effectively avoid the tag collision problem and improve the reading performance of RFID systems, two advanced tag identification algorithms namely Adaptive M-ary tree slotted Aloha (AMTS) based on the characteristics of Aloha-based and Query tree-based algorithms are proposed.

    More >

  • Open Access


    A Physical Layer Network Coding Based Tag Anti-Collision Algorithm for RFID System

    Cuixiang Wang1, Xing Shao1,2,3,*, Yifan Meng4, Jun Gao1

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 931-945, 2021, DOI:10.32604/cmc.2020.012267

    Abstract In RFID (Radio Frequency IDentification) system, when multiple tags are in the operating range of one reader and send their information to the reader simultaneously, the signals of these tags are superimposed in the air, which results in a collision and leads to the degrading of tags identifying efficiency. To improve the multiple tags’ identifying efficiency due to collision, a physical layer network coding based binary search tree algorithm (PNBA) is proposed in this paper. PNBA pushes the conflicting signal information of multiple tags into a stack, which is discarded by the traditional anti-collision algorithm.… More >

  • Open Access


    An Improved Binary Search Anti-Collision Protocol for RFID Tag Identification

    Guozhong Dong1, Weizhe Zhang1, 2, *, Sichang Xuan3, Feng Qin4, Haowen Tan5

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1855-1868, 2020, DOI:10.32604/cmc.2020.09919

    Abstract Radio frequency identification (RFID) has been widespread used in massive items tagged domains. However, tag collision increases both time and energy consumption of RFID network. Tag collision can seriously affect the success of tag identification. An efficient anti-collision protocol is very crucially in RFID system. In this paper, an improved binary search anti-collision protocol namely BRTP is proposed to cope with the tag collision concern, which introduces a Bi-response mechanism. In Biresponse mechanism, two groups of tags allowed to reply to the reader in the same slot. According to Bi-response mechanism, the BRTP strengthens the More >

  • Open Access


    Middleware for Internet of Things: Survey and Challenges

    Samia Allaoua Chellouga, Mohamed A. El-Zawawyb,c

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 309-318, 2018, DOI:10.1080/10798587.2017.1290328

    Abstract The Internet of things (IoT) applications span many potential fields. Furthermore, smart homes, smart cities, smart vehicular networks, and healthcare are very attractive and intelligent applications. In most of these applications, the system consists of smart objects that are equipped by sensors and Radio Frequency Identification (RFID) and may rely on other technological computing and paradigm solutions such as M2 M (machine to machine) computing, Wifi, Wimax, LTE, cloud computing, etc. Thus, the IoT vision foresees that we can shift from traditional sensor networks to pervasive systems, which deliver intelligent automation by running services on objects.… More >

  • Open Access


    RFID Based Non-Preemptive Random Sleep Scheduling in WSN

    Tianle Zhang1, Lihua Yin1, Xiang Cui1, *, Abhishek Behl2, Fuqiang Dong3, Ziheng Cheng4, Kuo Ma4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 835-845, 2020, DOI:10.32604/cmc.2020.06050

    Abstract In Wireless Sensor Network (WSN), because battery and energy supply are constraints, sleep scheduling is always needed to save energy while maintaining connectivity for packet delivery. Traditional schemes have to ensure high duty cycling to ensure enough percentage of active nodes and then derogate the energy efficiency. This paper proposes an RFID based non-preemptive random sleep scheduling scheme with stable low duty cycle. It employs delay tolerant network routing protocol to tackle the frequent disconnections. A low-power RFID based non-preemptive wakeup signal is used to confirm the availability of next-hop before sending packet. It eliminates More >

  • Open Access


    A Cross Layer Protocol for Fast Identification of Blocked Tags in Large-Scale RFID Systems

    Chu Chu1, Zhong Huang1, Rui Xu1, Guangjun Wen1, *, Lilan Liu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1705-1724, 2020, DOI:10.32604/cmc.2020.010190

    Abstract Blocker tag attack is one of the denial-of-service (DoS) attacks that threatens the privacy and security of RFID systems. The attacker interferes with the blocked tag by simulating a fake tag with the same ID, thus causing a collision of message replies. In many practical scenarios, the number of blocked tags may vary, or even be small. For example, the attacker may only block the important customers or high-value items. To avoid the disclosure of privacy and economic losses, it is of great importance to fast pinpoint these blocked ones. However, existing works do not… More >

  • Open Access


    Development and Application of RFID tag for Remote Monitoring of SOC Facility Maintenance

    Choong- Han Han, Hei-Sook Nah, Won-Sik Choi, Ki-Beom Ju, Jong-Kwan Song

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.18, No.3, pp. 87-88, 2011, DOI:10.3970/icces.2011.018.087

    Abstract This study is aimed at improving the safety and maximizing construction productivity by effectively grafting SOC facility construction material to RFID/USN technology for the purpose of science in the maintenance of SOC facility. More >

  • Open Access


    RFID-Solution for Optimizing the Logistic of an Assembly Line for Agricultural Machinery

    M. Baldinger1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.6, No.4, pp. 233-238, 2008, DOI:10.3970/icces.2008.006.233

    Abstract The aim of this paper is to demonstrate how the new highest technology can be used to develop and optimize the manufacturing plant. Based on the results of a preliminary study and other observations made during the last year, it was decided to bring a new technology in its factory. On the basis of climbing demand and the ever bigger nascent variety with the production of self loading wagons, the machine-factory is modernized by a mounting-street for self loading wagons. The use of RFID-technology, tied into an ERP-System, led to a clear optimization of the More >

  • Open Access


    A Frame Breaking Based Hybrid Algorithm for UHF RFID Anti-Collision

    Xinyan Wang1,*, Minjun Zhang2, Zengwang Lu3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 873-883, 2019, DOI:10.32604/cmc.2019.05230

    Abstract Multi-tag collision imposes a vital detrimental effect on reading performance of an RFID system. In order to ameliorate such collision problem and to improve the reading performance, this paper proposes an efficient tag identification algorithm termed as the Enhanced Adaptive Tree Slotted Aloha (EATSA). The key novelty of EATSA is to identify the tags using grouping strategy. Specifically, the whole tag set is divided into groups by a frame of size F. In cases multiple tags fall into a group, the tags of the group are recognized by the improved binary splitting (IBS) method whereas the More >

Displaying 11-20 on page 2 of 22. Per Page