Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2012 (2012), Article ID 609035, 20 pages
Research Article

Merged Search Algorithms for Radio Frequency Identification Anticollision

1Department and Graduate School of Computer Science, National Pingtung University of Education, No. 4-18, Ming Shen Road, Pingtung 90003, Taiwan
2Institute of Maritime Information and Technology, National Kaohsiung Marine University, Kaohsiung City 80543, Taiwan
3Global Earth Observation and Data Analysis Center (GEODAC), National Cheng Kung University, No 1, Ta-Hsueh Road, Tainan 701, Taiwan

Received 16 July 2011; Accepted 11 December 2011

Academic Editor: Andrzej Swierniak

Copyright © 2012 Bih-Yaw Shih et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Nowadays, the Radio Frequency Identification (RFID) system enables the control of many devices over an open communication infrastructure ranging from a small home area network to the global Internet. Moreover, a variety of consumer products are tagged with remotely low-cost readable identification electromagnetic tags to replace Bar Codes. Applications such as automatic object tracking, inventory and supply chain management, and Web appliances were adopted for years in many companies. The arbitration algorithm for RFID system is used to arbitrate all the tags to avoid the collision problem with the existence of multiple tags in the interrogation field of a transponder. A splitting algorithm which is called Binary Search Tree (BST) is well known for multitags arbitration. In the current study, a splitting-based schema called Merged Search Tree is proposed to capture identification codes correctly for anticollision. Performance of the proposed algorithm is compared with the original BST according to time and power consumed during the arbitration process. The results show that the proposed model can reduce searching time and power consumed to achieve a better performance arbitration.

1. Introduction

Nowadays, Radio Frequency Identification (RFID) systems are widely used in different applications allowing users to identify an item so that it can quickly and accurately be reidentified, electronically when it moves through the utilization process. A RFID system basically is made of a reader and tags where each tag has a unique ID where the reader can identify and communicate with the tag via radio frequency.

There are two major types of tags: passive and active. A passive tag must listen to the signal emited from the reader then response to it, but it has lower manufacturing cost. An active tag has a power supply; it can emit RF signal to communicate with the reader actively, usually with longer access distance and better access time. Both of them are in widespread use in commercial applications.

When there has more than one tag in the interrogation field of a reader, the application of RFID identification device requires communicating with multiple tags simultaneously. The reader would send signals to each tag like calling “who is there?” and all the tags may answer simultaneously with their identification codes. Eventually, collision will happen and cause data loss, because the reader could not receive all the reflex signals simultaneously. The process to distinguish between all these answers and to capture their identification codes correctly is called anticollision. The environment with multitags is very common in commercial applications. There exist different anticollision methods to identify a device within a group including TDMA, SDMA, FDMA, CDMA, and Binary Search Tree algorithm.

The purpose of this study is the development of a splitting-based schema, called Merged Search Tree to improve the schema of Binary Search Tree defined in the anticollision protocol of Electronic Product Code (EPC) global Ultrahigh Frequency (UHF) RFID system. The proposed Merged Search Tree is expected to reduce the searching time and power consumed to accomplish the arbitration process.

2. Literature Review

An overview of RFID technique is introduced first. Then, the collision problem in RFID system and current solutions for anticollision are discussed.

2.1. Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) systems utilizing the radio frequency technology for identifying objects are widely used in commercial applications such as warehouse management, automatic object tracking, or medical management. RFID systems have higher capacity of variable data and can transmit data via RF signals without requiring a line of sight for longer communication distance. RFID systems are more reliable with higher data security and multi-tag readable; these characteristics promote the large-scale applications and immeasurable development.

There are five basic components to make up a RFID system: one or more RF tags, two or more antennas, one or more interrogators (readers), host computers, and appropriate software. Tags can be read remotely when they detect a radio frequency signal from a reader over a range of distances. A RFID tag contains its unique ID to communicate with the reader [1]. According to power supply, there are primarily two categories of RFID tags: passive and active Tags. The passive tags obtain operating power from the reader and have shorter read ranges. The active tags powered by an internal battery with longer read range. In brief, passive tags have lower cost and active tags are more powerful on function. A RFID system adopts the modulated backscatter to make reader communicate one or more tags as shown in Figure 1.

Figure 1: Power/communication mechanism for RFID tags [1].

RFID systems were classified according to operating frequency. There are dissimilar characteristics and capability of each RF bandwidth. In substance, four classifications were indicated: Low Frequency (LF), High Frequency (HF), Ultrahigh Frequency (UHF) and Microwave. The Low Frequency system always works by passive tags with short range and low data transmission rate. This system is widely used today such as animal ID or autokey. The High Frequency system is accepted worldwide and works in most environments but does not pierce through metal materials. Its application includes item level track and management of entrance guard. The Ultrahigh Frequency system has longer read range and better transmission rate; this makes it expand in commercial use. The most excellence is that UHF tag can be labeled on metal without interference. Even so, the interference between tags in close physical proximity is an issue. The Microwave system has long communicating distance and more functional but complex systems development [2, 3].

2.2. RFID Anticollision

When more than one tag appears in the interrogation field of a reader, the reader would send signals to each tag and all the tags would reflex signals with their Tag IDs back to the reader at the same time. This is a problem called collision that tags collide with each other to cause data loss, because the reader could not receive all the reflex signals simultaneously. Some tags would not be identified and retransmissions are required which results in the increase of total delay. However, the environment of multitags is very general in commercial applications and many researchers are dedicating in resolving this problem. Space Division Multiple Access (SDMA) [4], Frequency Division Multiple Access (FDMA) [5], Code Division Multiple Access (CDMA) [6], and Time Division Multiple Access (TDMA) [7] are the well known arbitration algorithms which are developed to overcome the collision between tags.

Recently, soft computing and artificial intelligence have been successfully applied to the different fields including value calculation [8, 9], and dynamic system [10], and channel selection [11]. TDMA is the most popular algorithm for RFID anticollision where it allows tags to use the same frequency by allocating a random time slot to each tag. Tags will response to the reader according to the unique time slots. The protocol, Interrogator Talks First (ITF) is the standard solution declared for anticollision in Electronic Product Code (EPC) standard where a two-way communication link will be established between reader and tags [7]. The tag ID of each tag will be identified, and reader will send out commands to each tag according to the sequence defined by the algorithm. The role of which device takes initiative in the communication link are categorized into two types of ITF protocol: tag talks first (TTF) and reader talks first (RTF). TTF is relatively slow and inflexible to RTF, the synchronous procedure which is also known as time duplex procedure that reader initiates the communication actively. RTF is subdivided into Polling [4], Splitting Method [12], I-code Protocol [13], and Contact-less Protocol [14]. Meanwhile, several algorithms were proposed to improve the original algorithms [15]. A quadtree search algorithm is developed to avoid collision and it outperforms the traditional DFSA algorithm with respect to reducing the cost and tag reading time [16].

In addition to the EPC Global Inc., the International Standards Organization (ISO) also formulated RFID standards as part of the ISO 18000 family. There are different classifications and attributes between these two standards. For the purpose of anticollision, EPC Global Inc. proposed bit-based Binary Search Tree algorithm (deterministic) for EPC global CLASS 0 (UHF) and Bin slot Binary tree (Probabilistic) for EPC global CLASS 1 (UHF). ISO proposed Dynamic Framed ALOHA (Probabilistic) algorithm for ISO 18000-6 TYPE-A (UHF) and Binary Search Tree algorithm for ISO 18000-6 TYPE-B (UHF) [17].

In both of the specifications, Binary search tree algorithm is defined as the standard ITF anticollision protocol for Radio Frequency Identification Tags. There are many researches devoted to improve this algorithm, including improving the procedure for query conflicting tags or modifying the frame to place tags. Wang [18] proposed an enhanced binary search tree with cut-through operation [18]. The cut-through operation will replace the intermediate node with one leave node, which is the node with no collision occurred, by the leave node itself to shorten the stages of binary search tree algorithm. The analytic results show that this simplifying of tree structure outperforms when the number of existing tags is small relative to all possible nodes.

Nanjundaiah and Chaudhary [19] proposed a modification of Binary Search Tree algorithm by resetting to the appropriate node for read cycle [19]. Instead of going to the root node in every read cycle in the original protocol, the modified protocol begins traversal cycle with the bit position form where the last difference happened in the bit stream of tag IDs. Although the complexity of tag is increasing, the overall read time is reducing.

The principal excellence of Binary Search Tree algorithm is simple to be implemented in the digital integrated circuits within the tag and low power consumption during the arbitration process [18, 20]. These features make this algorithm applicable to industrial manufacture of tags with a longer working distance. Because of that, Binary Search Tree algorithm is the official anticollision protocol; presently, the objective of this study is to modify Binary Search Tree to reduce arbitration time and power consumed.

2.3. General Binary Search Tree Algorithm

According to EPC global specification, Ultrahigh frequency (UHF) adopt binary tree scheme as anticollision algorithm. The advantages of binary tree schema are easy tag implementation and efficiency [2, 21]. Binary Search Tree for RFID system is developed from the tree algorithm for packet broadcast channels by Capetanakis [12].

In the arbitration process of this algorithm, reader will send out requests to ask “Which tags existing?” according to the bits sequence of IDs from MSB. If more than one tag response, collisions occur. Then the collided tag split into two subsets, and reader keep on requesting the next bit of the first subset. If there is still a collision, the further splitting proceeds recursively; otherwise tags in this subset are identified and no subsets will be queried until no collision in the former subset.

Figure 2 shows an example of binary tree whose depth is 4. Each tag corresponds to a leaf node in the binary search tree. There are 5 tags with Tag ID of 4-bit length in this example. For example, the ID of tag is 1000.

Figure 2: The structure of Binary Search Tree ().

Some parameters of the searching procedure of Binary Search Tree are defined as follows: : the number of all the possible tags in this RFID system: the length of bit stream to present a tag, it is equal to the depth of the binary tree. : the number of tags exist in the interrogation field of reader: the node at depth of the tree: the subtree whose root node is .

The searching procedure of Binary Search Tree is stated as follows.(1)Begin with the root node , and ask if there is zero, one or more than one tag in the subtree .(2)If there are more than one tag in , it means there is a collision that happened at . Then ask the 2 succeeding nodes, and , to check whether there is zero, one, or more than one tag in their subtrees. If the first node has collisions, let the second node wait and ask the same question to succeeding nodes of . The process follows the principle of “first in, first out.”(3)Recursively, if there is any collisions at nay node, repeat the same question to its succeeding nodes until there is no collision at the succeeding node.

If any node is waiting, resolve it by repeating step (3). If there is more than one waiting node, resolve them following the priority of “first in, first out.” The pseudo codes of this algorithm are shown in Algorithm 1.

Algorithm 1: Pseudo codes of the Binary Search Tree.

At the end of the process, each leaf will contain at most one tag. In the example of Figure 2, the order in which we find the tags is 1111, 1101, 1000, 0011, 0000. This algorithm needs to search 4 stages for finding a tag successfully.

Several researches were conducted to improve tree algorithm and showed that some operation can improve the efficiency [18, 19].

3. System Model

3.1. Merged Search Tree Algorithm

In the original binary search tree, the researchers assume there are out of possible tags in the RFID system that exist in the field of reader with a bit stream of length to present a tag. Meanwhile, a full binary tree with depth is constructed to present all the tags. Since the drawback of Binary Search Tree is serious collisions when the majority of possible tags exist at the same time. Collisions always happen at each query and a skewed tree may form in certain situations to cause data clustering which may result in an increase in searching time. The purpose of this study is modifying the schema of Binary Search Tree to adapt to better performance.

The analysis of RFID anticollision performance that brings up the number of stages for searching a tag successfully is interrelated to searching cost [18, 20]. In order to reduce the number of stages for searching a tag successfully, the length of the bit stream is shortened to represent a tag. Therefore, Stages of Binary Search Tree are merged into one or more stage and representation of Tag ID is transformed from binary number to a new form combined with decimal and binary numbers. The Merge Operations is defined as follows.

The process of Merge Operation(1)Merging Stages Determining.(i)Computing the Synthesis Evaluating Function,, for to stands for the number of stages which is intended to merge. The with minimum will be chosen.(2)Rebuilding(i)Increase the branches of root node and number of nodes in depth 1 form 2 to. Take the nodes at depth 1 as root nodes to build binary subtrees, each has a depth of .(ii)Update the label of each branch of the root node to decimal number 0 to.

After rebuilding the tree, nodes are searched according to the ordinary search steps of Binary Search Algorithm. Figure 3 shows the result of merging the tree with and it successfully reduces the depth of the tree from 4 to 3. Eventually, nodes have new representation and new Tag IDs. For example, the leaf nodebecomes and its new ID is 200.

Figure 3: The structure of Merged Search Tree .

Especially, the stages of tree are reduced from to, and the number of nodes in the Merge Search Tree is, which is less than, the number of nodes in Binary Search Tree. At the same time, the distribution of tags is relatively dispersed due to the increasing of branches in level 1 and this would help decrease the collisions between tags. Therefore, the structure of the tree has been successfully simplified to adapt more efficient search process.

3.2. The Synthesis Evaluating Function

The Synthesis Evaluating Function,, is a function of . According to and , can be used to determine the most appropriate for merging operation to optimize the performance. Since the time and power consumed during the arbitration process are the most important issues to determine the performance of an RFID anticollision algorithm [20, 22], both time and power consumed are taken into account when there are different amounts of existing tags.

3.2.1. Time Evaluating Function

Hush and Wood [22] proposed the model to evaluate the time consuming of binary tree [22]. The total time required to recognize each tag is proportional to the total time slots to visit all the nodes. is the probability that the algorithm will visit the node in depth . The algorithm begins at root node, so is equal to 1. In the depth, a node will be visited if and only if there is a collision that happened in their parent nodes. In the research of tree algorithm, the uniform distribution of out of the tags which fall in a node of depth is assumed and given by the binomial distribution: Assume is the probability of a collision that happened at the node in depth. It is equal to subtract the probability of zero reply and only one tag reply form 1, as shown in Therefore the probability is

The total time slots needed to arbitrate thetags during the process of original Binary Search Tree is. Numerical calculating ofis shown in is the total time slots needed during the arbitration process of Merged Binary Tree. A Binary Search Tree with depth ,, is shown in Figure 4. The result after merging with ,, is shown in Figure 5. Comparewith, and the result shows the nodes at depth 1′ incorresponding to the nodes at depthin, as well as the nodes at depth 2′ incorresponding to the nodes at depthin. To reason by analogy, the total time slots of probing nodes at depthinare equal to time slots probing nodes at depth in.

Figure 4: , the original Binary Search Tree.
Figure 5: , the tree merged from.

Hush and Wood [22] proposed that if the tags are uniformly distributed, visiting a node can be viewed as probing an interval of size , hence that the probability of collisions happened in a node at depthin is equal to the probability at depthin [22]. Assume the probability that the Merged Tree algorithm will visit thenode at depthinis; therefore the probabilityis

The number of total time slots is computed as shown in Compare (3.4) with (3.6) and obtain

Here the number of total time slots of Merged Search Tree arbitration is obtained. Equations (3.7) and (3.8) stand for the comparison betweenandand (3.9) shows the numerical calculation of.

3.2.2. Power Evaluating Function

The power consumed during arbitration process is another important issue of evaluating a RFID anticollision algorithm. The tags’ power consumption will determine the working distance between the tags and reader. The lower power consumption will allow longer working distance [20]. The power consumption evaluating model of Hush and Wood [22] is applied and modified for Merged Search Tree in this research. The total number of tag replies is computed, which is proportion to the total power consumed during RFID arbitration process [22]

The probability of single reply happened at nodeis represented asas shown in (3.10) and the average number of tags identified by algorithm, up to and including level,, is equal to the sum ofoverall the nodes at level, as shown in

Let be the total sum of tag replies of each node at each levels. There are replies at level 0 and the number of replies is equal toat the other level. Therefore,is shown in According to (3.12), Here the number of total tag replies for Binary Search Tree algorithm arbitrating tags is obtained.

, the total number of tag replies in Merged Search Tree, is accounted in similar way to Binary Search Tree. Comparing the results in Figures 11 and 12, there are tag replies at the level 0′ in , the same as level 0 of Binary Search Tree. At level 1′ of , tag replies are needed. For levels to of , the number of tag replies at levelis equal to the number of tag replies at level of . is counted as the sum of tag replies at each level as shown in

3.2.3. The SEF Function

Since both of the time and power performances are computing the summation of expected value which the parameters are considering each tags as a unit, the function is defined as

Equation (3.15) is used to choose . The lower value of is, the better is chosen to achieve best performance. The pseudo codes of this algorithm is shown in Algorithm 1.

4. Performance Evaluations

The performance of Binary Search Tree, and Merged Search Tree are evaluated.

4.1. Time Consumption

Equation (3.8) shows the difference between tag replies of Binary Search Tree and Merged Search Tree. In the environment of RFID systems for commercial application, there are usually a lot of tags existing in the field of reader, such as the warehouse or automation control. In these RFID systems, the number of is large. Since is a fractional number, the terms and will approach 0 when is greater than a threshold which results in the situation as shown in (4.1). The equation is established for most of the generality of situations

Different number of is applied to observe the threshold of to achieve a situation that is adapted to the merging stages number in the RFID system with . The result is shown in Figure 6. For example, if, while there are more than 3 tags existing in the operation range in a system with, (4.1) is established. Roughly speaking, when there are more than 14 tags, the better performance is achieved no matter which is, Figure 7 shows the threshold of with different , when is greater than the threshold, (4.2) is established as follows: Equation (4.2) shows that a better time performance is expected in the Merged Search Tree.

Figure 6: Different number of with the threshold of to achieve a situation.
Figure 7: The threshold of with different .
4.2. Power Consumption

The power consumption of each model is evaluated by total number of tag replies. Subtract (3.14) from (3.13) and obtain

Since the item is a fractional number, the number would be greater than , such that

It reveals that Merged Search Tree consumed lower power to arbitrate all the tags than Binary Search Tree algorithm.

is the total tag replies of Quadtree algorithm and substitute the item in (3.13) by . However, the depth of is decreased to, so is computed as

Equations (3.13), (3.14), (3.15), and (4.5) are used to evaluate the performances of power consumed in different algorithms.

4.3. Simulation Results and Discussion
4.3.1. Simulation Results

In the improved schemas, as the number of branches in level 1 increased, the more dispersion of existing tags is expected to reduce the number of tags at which collisions happened. In the view of power, fewer collisions cause lower number of tag replies and tag communication overhead [23]. Regarding the time consumption, the total number of time slots is equal to the sum of the time slots of collisions, single reply, and zero reply. Reducing of collisions will increase zero replies, which may increase the total number of time slots. The Synthesis Evaluating Function is applied to consider time and power consumption simultaneously by determiningand. The simulation results of different number of are discussed in the following.

(A) Total Number of Possible Tags = 128
Figures 8 and 9 show the simulation of performance on the original Binary Search Tree and Merged Search Tree in the environment that at most 128 tags () could exist simultaneously. Consider the situations of 1 to 128 ( to 128) tags existing at the same time.In Figure 8, all of the algorithms need almost the same time slots when less than 30 tags exist. Accurately, the time slots of Merged Search Tree are less than Binary Search Tree but not obvious in the figure due to the small volume. However, when more than 30 tags exist, it is apparent that Merged Search Tree is similar to each other on time performance and both are better than the other. Especially, Binary Search Tree almost has the same performance on time. In Figure 9, the difference among them is increasing. The power consumption of Merged Search Tree is reduced to almost 35%. Both algorithms have the trend that when more tags exist, the more time slots and tag replies increase linearly.

Figure 8: Time consumed with to 128.
Figure 9: Power consumed with to 128.

(B) Total Number of Possible Tags = 512
Figures 10 and 11 show the simulation results of performance of each algorithm when the total number of possible tags is 512. In Figure 10, Merged Search Tree 1 outperforms on time performance than Binary Search Tree. However, Binary Search Tree and Merged Search Tree need similar time slots to arbitrate. In Figure 11, as the number of tags increase, the power consumption improved. For example, in the case , average tag replies involved by Binary Search Tree and Merged Search Tree are 3897.839 and 1116.0838. A great improvement on power consumption is achieved.

Figure 10: Time consumed with to 512.
Figure 11: Power consumed with to 512.
Figure 12: Time consumed with to 1024.

(C) Total Number of Possible Tags = 1024
Figure 12 shows that the simulation result of the merged algorithm still outperform the unmerged. However, the performance of Merged Search Tree is not entirely linear as Binary Search Tree. This is the effect of considering time and power consumption simultaneously and therefore there is no obvious improvement in few cases such as . However, two merged methods perform better than the two unmerged. In Figure 13, tag replies Merged Search Tree is reduced almost 75% of Binary Search Tree.

Figure 13: Power consumed with to 1024.
4.3.2. Discussion

The results of simulation on proposed methods reveal the following.(1)When is relatively close to , both the two algorithms will determine the same combination of and to rebuild the tree. In other words, considering the branch number on each node in the merged tree is improved limitedly that it cannot improve a Merged Search Tree as the degree that quadtree improved Binary Search Tree. Nevertheless, the proposed merged tree is better than binary tree.(2)The function SEF considered time and power consumption at the same time. It is possible that this mechanism determined a structure not the fastest or cost lowest, but both of the two performances can be optimized to achieve a balance between speed and cost.

5. Conclusion

In the applications of RFID, when there exist multitags in the reading field of reader, collisions happen due to the failure of tags synchronous transmission. This limits the development of RFID applications. Although many mechanisms were introduced to avoid this problem, they still have some limits and are out of flexibility. The current study has successfully developed a splitting-based schema to improve the schema of Binary Search Tree defined in the anticollision protocol of EPC global UHF RFID system. In this study, Merged Search Tree is successfully developed. According to the relation between number of existing tags and possible tags, the function SEF will determine the appropriate tree structure. The performance of each algorithm is evaluated based on time and power consumption during arbitration process and compared with each other. Merged Search Tree can improve greatly both on time and power performance simultaneously.


The authors are appreciative of the financial support in the form of research grants from the National Science Council, Republic of China under Grant nos. NSC 99–2628-E-153-001, NSC 100-2221-E-022 -013 -MY2, NSC 100-2628-E-022 -002 -MY2 and NSC 100–2628-E-153-001. The authors are also most grateful for the kind assistance of Professor Andrzej Swierniak, Editor of Mathematical Problems In Engineering, and for the constructive suggestions from the anonymous reviewers, all of which has led to the making of several corrections and have greatly aided us to improve the presentation of this paper.


  1. R. Want, “An introduction to RFID technology,” IEEE Pervasive Computing, vol. 5, no. 1, pp. 25–33, 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. EPC global, “900 MHz Class 0 Radio Frequency (RF) Identification Tag Specification,”
  3. EPC global, “13.56 MHz ISM Band Class 1 Radio Frequency (RF) Identification Tag Interface Specification,”
  4. D. H. Shih, P. L. Sun, D. C. Yen, and S. M. Huang, “Taxonomy and survey of RFID anti-collision protocols,” Computer Communications, vol. 29, no. 11, pp. 2150–2166, 2006. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Sarma, D. Brock, and D. Engels, “Radio frequency identification and the electronic product code,” IEEE Micro, vol. 21, no. 6, pp. 50–54, 2001. View at Publisher · View at Google Scholar · View at Scopus
  6. A. Rohatgi and G. D. Durgin, “Implementation of an anti-collision differential-offset spread spectrum RFID system,” in Proceedings of the IEEE Antennas and Propagation Society International Symposium, pp. 3501–3504, 2006.
  7. EPCglobal Inc., “Specification for RFID Air Interface,” Version1.0.9, 2005.
  8. W. I. Lee, “The development of a qualitative dynamic attribute value model for healthcare institutes,” Iranian Journal of Public Health, vol. 39, no. 4, pp. 15–25, 2010. View at Google Scholar
  9. W. Lee and C. H. Lin, “Consumer hierarchical value map modeling in the healthcare service industry,” African Journal of Business Management, vol. 5, no. 3, pp. 722–736, 2011. View at Google Scholar
  10. W. I. Lee, C. W. Chen, and C. H. Wu, “Relationship between quality of medical treatment and customer satisfaction—a case study in dental,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 4, pp. 1805–1822, 2010. View at Google Scholar · View at Scopus
  11. B. Y. Shih, C. J. Chang, A. W. Chen, and C. Y. Chen, “Enhanced mac channel selection to improve performance of ieee 802.15.4,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 12, pp. 5511–5526, 2010. View at Google Scholar · View at Scopus
  12. J. I. Capetanakis, “Tree algorithms for packet broadcast channels,” IEEE Transactions on Information Theory, vol. 25, no. 5, pp. 505–515, 1979. View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  13. H. Vogt, “Multiple object identification with passive RFID tags,” in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 3, pp. 6–9, October 2002. View at Scopus
  14. M. Jacomet, A. Ehrsam, and U. Gehrig, “Contactless identification device with anticollision algorithm,” in Proceedings of the IEEE (CSCC '99), Athen Greece, 1999.
  15. F. Zhou, D. Jin, C. Huang, and M. Hao, “Optimize the power consumption of passive electronic tags for anti-collision schemes,” in Proceedings of 5th International Conference on ASIC, vol. 2, pp. 1213–1217, 2003.
  16. B. Y. Shih, T. W. Lo, and C. Y. Chen, “The research of quadtree search algorithms for anti-collision in radio frequency identification systems,” Scientific Research and Essays, vol. 6, no. 25, pp. 5342–5350, 2011. View at Google Scholar
  17. ISO/IEC 18000-6:2003(E), Part 6, “Parameters for air interface communications at 860–960 MHz,” November 2003.
  18. T. P. Wang, “Enhanced binary search with cut-through operation for anti-collision in RFID systems,” IEEE Communications Letters, vol. 10, no. 4, pp. 236–238, 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. M. Nanjundaiah and V. Chaudhary, “Improvement to the anticollision protocol specification for 900 MHz class 0 radio frequency identification tag,” in Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA '05), vol. 2, pp. 616–620, March 2005. View at Publisher · View at Google Scholar · View at Scopus
  20. F. Zhou, C. Chen, D. Jin, C. Huang, and H. Min, “Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems,” in Proceedings of the International Symposium on Lower Power Electronics and Design (ISLPED '04), pp. 357–362, August 2004. View at Scopus
  21. MIT Auto-ID Center, “Draft protocol specification for a 900 MHz Class 0 Radio Frequency Identification Tag,” February 2003,
  22. D. R. Hush and C. Wood, “Analysis of Tree algorithms for RFID arbitration,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '98), p. 107, 1998.
  23. J. Myung, W. Lee, and J. Srivastava, “Adaptive binary splitting for efficient RFID tag anti-collision,” IEEE Communications Letters, vol. 10, no. 3, pp. 144–146, 2006. View at Publisher · View at Google Scholar · View at Scopus