In order to improve robustness and efficiency of the radio frequency identification(RFID)network,a random mating mayfly algorithm(RMMA)was proposed.Firstly,RMMA introduced the mechanism of random mating into the mayfl...In order to improve robustness and efficiency of the radio frequency identification(RFID)network,a random mating mayfly algorithm(RMMA)was proposed.Firstly,RMMA introduced the mechanism of random mating into the mayfly algorithm(MA),which improved the population diversity and enhanced the exploration ability of the algorithm in the early stage,and find a better solution to the RFID nework planning(RNP)problem.Secondly,in RNP,tags are usually placed near the boundaries of the working space,so the minimum boundary mutation strategy was proposed to make sure the mayflies which beyond the boundary can keep the original search direction,as to enhance the ability of searching near the boundary.Lastly,in order to measure the performance of RMMA,the algorithm is then benchmarked on three well-known classic test functions,and the results are verified by a comparative study with particle swarm optimization(PSO),grey wolf optimization(GWO),and MA.The results show that the RMMA algorithm is able to provide very competitive results compared to these well-known meta-heuristics,RMMA is also applied to solve RNP problems.The performance evaluation shows that RMMA achieves higher coverage than the other three algorithms.When the number of readers is the same,RMMA can obtain lower interference and get a better load balance in each instance compared with other algorithms.RMMA can also solve RNP problem stably and efficiently when the number and position of tags change over time.展开更多
In order to improve the service quality of radio frequency identification(RFID) systems, multiple objectives should be comprehensively considered. An improved brain storm optimization algorithm GABSO, which incorporat...In order to improve the service quality of radio frequency identification(RFID) systems, multiple objectives should be comprehensively considered. An improved brain storm optimization algorithm GABSO, which incorporated adaptive learning operator and golden sine operator into the original brain storm optimization(BSO) algorithm, was proposed to solve the problem of RFID network planning(RNP). GABSO algorithm introduces learning operator and golden sine operator to achieve a balance between exploration and development. Based on GABSO algorithm, an optimization model is established to optimize the position of the reader. The GABSO algorithm was tested on the RFID model and dataset, and was compared with other methods. The GABSO algorithm’s tag coverage was increased by 9.62% over the Cuckoo search(CS) algorithm, and 7.70% over BSO. The results show that the GABSO algorithm could be successfully applied to solve the problem of RNP.展开更多
This paper presents a distributed wireless sensor network for multiple mobile agents localization. Localization of mobile agents, such as mobile robots, humans, and moving objects, in an indoor space is essential for ...This paper presents a distributed wireless sensor network for multiple mobile agents localization. Localization of mobile agents, such as mobile robots, humans, and moving objects, in an indoor space is essential for robot-robot interaction (RRI) and human-robot interaction (HRI). The standard localization system, which is based on sensors installed in the robot body, is not suitable for multiple agents. Therefore, the concept of sensor network, which uses wireless sensors distributed in a specified space, is used in this study. By analyzing related studies, two solutions are proposed for the localization of mobile agents including humans: a new hardware system and a new software algorithm. The first solution focuses on the architectural design of the wireless sensor network for multiple agent localization. A passive RFID system is used, and then the architecture of the sensor network is adapted to suit the target system. The second solution centers on a localization algorithm based on the sensor network. The proposed localization algorithm improves the accuracy in the multiple agent localization system. The algorithm uses the displacement conditions of the mobile agents and the recognition changes between the RFID tags and RFID reader. Through experiments using a real platform, the usefulness of the proposed system is verified.展开更多
To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communic...To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. Using this model, a secure communication protocol that can be used for anti-counterfeiting, automatic identification and privacy preservation is then developed. In order to manage the number of parties, data records of items, and complicated transitions of access permissions in an item-level traceability context, a well-designed access control protocol is proposed to parties that can prove the physical possession of an item;meanwhile, to address the privacy issues during data sharing in an RFID network, a vision of database systems that take responsibility for the privacy of the data they manage is also presented.展开更多
Today, we observe that more and more, radio frequency identification (RFID) technology has been used to identify and track objects in enterprises and institutions. In addition, we also perceive the growing adoption of...Today, we observe that more and more, radio frequency identification (RFID) technology has been used to identify and track objects in enterprises and institutions. In addition, we also perceive the growing adoption of cloud computing, either public or private, to process and store data from the objects. In this context, the literature does not present an initiative that looks into the network on enterprise-cloud interactions, so neglecting network performance and congestion information when transmitting data to the cloud. Thus, we are presenting a model named ACMA—Automatic Control and Management of Assets. ACMA employs context awareness to control and monitor corporate assets in companies with multiple units. ACMA provides a centralized point of access in the cloud in which interested actors can get online data about each corporate asset. In particular, our scientific contribution consists in considering network congestion to control dynamically the data updating interval from sensors to the cloud. The idea is to search for reliability and integrity of operations, without losing or corrupting data when updating the information to cloud. Thus, this article describes the ACMA model, its architecture, algorithms and features. In addition, we describe the evaluation methodology and the results obtained through experiments and simulations based on the developed prototype.展开更多
Using Networked RFID equipped in warehouse or supermarket distribution, Enterprise information system (EIS) can gather and deal with cargos information. Nevertheless, when cargos are in traffic, the Networked RFID can...Using Networked RFID equipped in warehouse or supermarket distribution, Enterprise information system (EIS) can gather and deal with cargos information. Nevertheless, when cargos are in traffic, the Networked RFID can’t monitor the cargos any more as the products tagged aren’t within range of a reader. This paper proposes a solution framework which combines Networked RFID and GPS tracking, and then equip with this system in container to make the cargos monitored even if the cargos are in traffic. This solution can solve the accurate consignments, position tracking and advanced theft happening through drilling holes in container. In addition, customhouse and checkpoint can get an electronic shipment manifest rapidly and safely when a vehicle gets through a checkpoint.展开更多
With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accurac...With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accuracy requirements. To overcome this limitation,a new vehicle positioning method based on radio frequency identification( RFID) is proposed. First RFID base stations are divided into three categories using fuzzy technology,and then Chan algorithm is used to calculate three vehicles' positions,which are weighed to acquire vehicles' accurate position. This method can effectively overcome the problem that vehicle positioning accuracy is not high resulting from the factors such as ambient noise and base distribution when Chan algorithm is used. Experimental results show that the performance of the proposed method is superior to Chan algorithm and 2-step algorithm based on averaging method,which can satisfy the requirements of vehicle positioning in VANETs.展开更多
基金supported by the National Natural Science Foundation of China(61761004)。
文摘In order to improve robustness and efficiency of the radio frequency identification(RFID)network,a random mating mayfly algorithm(RMMA)was proposed.Firstly,RMMA introduced the mechanism of random mating into the mayfly algorithm(MA),which improved the population diversity and enhanced the exploration ability of the algorithm in the early stage,and find a better solution to the RFID nework planning(RNP)problem.Secondly,in RNP,tags are usually placed near the boundaries of the working space,so the minimum boundary mutation strategy was proposed to make sure the mayflies which beyond the boundary can keep the original search direction,as to enhance the ability of searching near the boundary.Lastly,in order to measure the performance of RMMA,the algorithm is then benchmarked on three well-known classic test functions,and the results are verified by a comparative study with particle swarm optimization(PSO),grey wolf optimization(GWO),and MA.The results show that the RMMA algorithm is able to provide very competitive results compared to these well-known meta-heuristics,RMMA is also applied to solve RNP problems.The performance evaluation shows that RMMA achieves higher coverage than the other three algorithms.When the number of readers is the same,RMMA can obtain lower interference and get a better load balance in each instance compared with other algorithms.RMMA can also solve RNP problem stably and efficiently when the number and position of tags change over time.
基金supported by the National Natural Science Foundation of China (61761004)the Natural Science Foundation of Guangxi Province, China (2019GXNSFAA245045)。
文摘In order to improve the service quality of radio frequency identification(RFID) systems, multiple objectives should be comprehensively considered. An improved brain storm optimization algorithm GABSO, which incorporated adaptive learning operator and golden sine operator into the original brain storm optimization(BSO) algorithm, was proposed to solve the problem of RFID network planning(RNP). GABSO algorithm introduces learning operator and golden sine operator to achieve a balance between exploration and development. Based on GABSO algorithm, an optimization model is established to optimize the position of the reader. The GABSO algorithm was tested on the RFID model and dataset, and was compared with other methods. The GABSO algorithm’s tag coverage was increased by 9.62% over the Cuckoo search(CS) algorithm, and 7.70% over BSO. The results show that the GABSO algorithm could be successfully applied to solve the problem of RNP.
文摘This paper presents a distributed wireless sensor network for multiple mobile agents localization. Localization of mobile agents, such as mobile robots, humans, and moving objects, in an indoor space is essential for robot-robot interaction (RRI) and human-robot interaction (HRI). The standard localization system, which is based on sensors installed in the robot body, is not suitable for multiple agents. Therefore, the concept of sensor network, which uses wireless sensors distributed in a specified space, is used in this study. By analyzing related studies, two solutions are proposed for the localization of mobile agents including humans: a new hardware system and a new software algorithm. The first solution focuses on the architectural design of the wireless sensor network for multiple agent localization. A passive RFID system is used, and then the architecture of the sensor network is adapted to suit the target system. The second solution centers on a localization algorithm based on the sensor network. The proposed localization algorithm improves the accuracy in the multiple agent localization system. The algorithm uses the displacement conditions of the mobile agents and the recognition changes between the RFID tags and RFID reader. Through experiments using a real platform, the usefulness of the proposed system is verified.
基金Program for New Century Excellent Talents in University of Fujian Province (No.X04139)
文摘To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. Using this model, a secure communication protocol that can be used for anti-counterfeiting, automatic identification and privacy preservation is then developed. In order to manage the number of parties, data records of items, and complicated transitions of access permissions in an item-level traceability context, a well-designed access control protocol is proposed to parties that can prove the physical possession of an item;meanwhile, to address the privacy issues during data sharing in an RFID network, a vision of database systems that take responsibility for the privacy of the data they manage is also presented.
文摘Today, we observe that more and more, radio frequency identification (RFID) technology has been used to identify and track objects in enterprises and institutions. In addition, we also perceive the growing adoption of cloud computing, either public or private, to process and store data from the objects. In this context, the literature does not present an initiative that looks into the network on enterprise-cloud interactions, so neglecting network performance and congestion information when transmitting data to the cloud. Thus, we are presenting a model named ACMA—Automatic Control and Management of Assets. ACMA employs context awareness to control and monitor corporate assets in companies with multiple units. ACMA provides a centralized point of access in the cloud in which interested actors can get online data about each corporate asset. In particular, our scientific contribution consists in considering network congestion to control dynamically the data updating interval from sensors to the cloud. The idea is to search for reliability and integrity of operations, without losing or corrupting data when updating the information to cloud. Thus, this article describes the ACMA model, its architecture, algorithms and features. In addition, we describe the evaluation methodology and the results obtained through experiments and simulations based on the developed prototype.
基金This research is supported by the MIC( Ministry of Information and Communication) , Korea ,under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment)
文摘Using Networked RFID equipped in warehouse or supermarket distribution, Enterprise information system (EIS) can gather and deal with cargos information. Nevertheless, when cargos are in traffic, the Networked RFID can’t monitor the cargos any more as the products tagged aren’t within range of a reader. This paper proposes a solution framework which combines Networked RFID and GPS tracking, and then equip with this system in container to make the cargos monitored even if the cargos are in traffic. This solution can solve the accurate consignments, position tracking and advanced theft happening through drilling holes in container. In addition, customhouse and checkpoint can get an electronic shipment manifest rapidly and safely when a vehicle gets through a checkpoint.
基金Chinese National High Technology Research and Development Program(No.2014BAG03B03)
文摘With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accuracy requirements. To overcome this limitation,a new vehicle positioning method based on radio frequency identification( RFID) is proposed. First RFID base stations are divided into three categories using fuzzy technology,and then Chan algorithm is used to calculate three vehicles' positions,which are weighed to acquire vehicles' accurate position. This method can effectively overcome the problem that vehicle positioning accuracy is not high resulting from the factors such as ambient noise and base distribution when Chan algorithm is used. Experimental results show that the performance of the proposed method is superior to Chan algorithm and 2-step algorithm based on averaging method,which can satisfy the requirements of vehicle positioning in VANETs.