{"title":"A UHF RFID channel emulator hardware for playback of measured link-scenarios","authors":"H. Arthaber, C. Schuberth","doi":"10.1109/RFID.2009.4911206","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911206","url":null,"abstract":"This paper introduces a simple and inexpensive approach for emulating recorded radio frequency identification (RFID) link scenarios in the lab. This allows for developing and testing of RFID systems, improving their performance…under perfectly reproducible conditions. Hence, it becomes possible to precisely compare the performance of different reader settings (data rate, modulation, arbitration mode…) or to compare different readers and/or tags. Comparison in this case includes statistical analysis of the performance as well. The proposed setup further enables statistical analysis of the results as the emulation of a certain link scenario can be played back arbitrary often. This work discusses the channel emulation for an 815/915 MHz RFID system: The recording of scenarios, the ‘connectorization’ of RFID-tags, and the channel emulator itself. Finally, exemplary test results of a commercial RFID reader connected to the emulator are presented.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121392007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Strauss, Sebastian Kraus, M. Hartmann, C. Grabowski, J. Bernhard
{"title":"Read range measurements of UHF RFID transponders in mobile anechoic chamber","authors":"W. Strauss, Sebastian Kraus, M. Hartmann, C. Grabowski, J. Bernhard","doi":"10.1109/RFID.2009.4911193","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911193","url":null,"abstract":"This paper presents a novel and simple method to determine the read ranges of radio frequency identification (RFID) transponders. Range tests in a well defined and accurate stationary anechoic chamber (SC) are awkward and expensive. An extendible mobile anechoic chamber (MC) to produce a large number of repeatable range measurements with minimal effort is proposed. A mobile chamber suitable to reside in our laboratories was designed and built. MC measurements were crosschecked with SC measurements of label transponders. Reading ranges for a number of commercially available metal mount tags, so far not publicly available, were derived. Metal transponders are 3D objects leading to more constraints in applications than labels. Therefore range densities, i.e. reading range per area or volume of the tag, as novel key figures were introduced to make tags more comparable and to determine the optimal transponder for a given use case. The current results are suitable to serve as a relative measure to compare transponders.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127711280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UHF RFID transponders antenna design for metal and wood surfaces","authors":"R. Kanan, Ataollah Azizi","doi":"10.1109/RFID.2009.4911174","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911174","url":null,"abstract":"In this paper, metal and wood support effect on UHF RFID transponders are investigated. New antennas designed for passive UHF RFID transponders mounted on metal and wood surfaces are described. Simulation results are presented which are in good agreement with measurement data. The transponder reading distance measurement shows good performance. In particular the reading distance obtained with the tags designed for metal surfaces is higher compared to the available commercial Metal Mount UHF tags.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129351163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power-optimized waveforms for improving the range and reliability of RFID systems","authors":"M. Trotter, J. Griffin, G. Durgin","doi":"10.1109/RFID.2009.4911196","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911196","url":null,"abstract":"A major limitation in passive radio frequency identification (RFID) is the read range from the reader to tag, which is limited by the power available to the radio frequency integrated circuit (RFIC). The power-optimized waveform (POW) is a new type of multiple-tone carrier and modulation scheme that is designed to improve the read range and power efficiency of charge pump-based passive RFICs. This paper presents the POW concept, an estimation of effects on existing class 1 generation 2 RFID systems, several example POWs, simulation results, and measurement results of read range gains using a POW.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128680789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dan Liu, Zhongxiang Wang, Jie Tan, Hao Min, Junyu Wang
{"title":"ALOHA algorithm considering the slot duration difference in RFID system","authors":"Dan Liu, Zhongxiang Wang, Jie Tan, Hao Min, Junyu Wang","doi":"10.1109/RFID.2009.4911180","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911180","url":null,"abstract":"when multiple RFID tag identification is becoming a commonplace, the anti-collision technology for multiple RFID tag environment has drawn mounting research interest in the RFID domain. Many published Aloha-based algorithms, assuming that all the slots have the same duration, tend to increase the number of successful slots by tag estimation and dynamic frame scheduling, and thus improve the system efficiency (the ratio of successful slots to all slots in each frame), which is limited by 1/e according to the theory of Probability. Whereas, in this paper, the effect of the empty slots and collided slots is analyzed and two novel methods based on the parameters of EPC Gen2 protocol, BIS and Collision Detection, are proposed, to improve the RFID system efficiency by reducing the cost of the none successful slots other than the successful slots. Moreover, a new approach to evaluate the system efficiency for multiple tag identification, taking consideration of the duration difference of the slots, is presented. According to the simulation and test results, the proposed methods, BIS and Collision Detection, can improve the system throughput by 120% and 30∼40% respectively.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127539295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadband suppression properties of active leaking carrier cancellers","authors":"G. Lasser, R. Langwieser, A. Scholtz","doi":"10.1109/RFID.2009.4911192","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911192","url":null,"abstract":"In passive UHF RFID systems backscattering is used for tag to reader communication. This technique relies on a continuous wave signal being transmitted by the reader during the tag's data transfer. In order to separate transmission and reception paths circulators, directional couplers or disjoint transmit and receive antennas can be used. Perfect isolation is not achievable with any of those approaches. So a leaking carrier is present at the receiver in any case. It is possible to reduce the interference from this signal by some kind of leaking carrier cancellation. Such a cancellation prevents receiver blocking and reduces the baseband hardware's requirements, depending on the receiver concept. Usually, the narrowband properties of carrier cancellers are studied. This is only sufficient for conventional RFID systems, if the transmitter noise can be neglected. Broadband RFID systems, as recently discussed in literature, also require broadband leaking carrier cancellers. In this paper the broadband suppression properties of carrier cancellers are first investigated theoretically. Further a hardware implementation is presented and characterized. Finally, measurement results are compared to the theoretical findings.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. M. Jacobsen, K. F. Nielsen, P. Popovski, T. Larsen
{"title":"Reliable identification of RFID tags using multiple independent reader sessions","authors":"R. M. Jacobsen, K. F. Nielsen, P. Popovski, T. Larsen","doi":"10.1109/RFID.2009.4911187","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911187","url":null,"abstract":"Radio Frequency Identification (RFID) systems are gaining momentum in various applications of logistics, inventory, etc. A generic problem in such systems is to ensure that the RFID readers can reliably read a set of RFID tags, such that the probability of missing tags stays below an acceptable value. A tag may be missing (left unread) due to errors in the communication link towards the reader e.g. due to obstacles in the radio path. The present paper proposes techniques that use multiple reader sessions, during which the system of readers obtains a running estimate of the probability to have at least one tag missing. Based on such an estimate, it is decided whether an additional reader session is required. Two methods are proposed, they rely on the statistical independence of the tag reading errors across different reader sessions, which is a plausible assumption when e.g. each reader session is executed on different readers. The first method uses statistical relationships that are valid when the reader sessions are independent. The second method is obtained by modifying an existing capture-recapture estimator. The results show that, when the reader sessions are independent, the proposed mechanisms provide a good approximation to the probability of missing tags, such that the number of reader sessions made, meets the target specification. If the assumption of independence is violated, the estimators are still useful, but they should be corrected by a margin of additional reader sessions to ensure that the target probability of missing tags is met.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"33 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116745348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}