Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00053
Huan Ye, Pengfei Chen, Shaobin Zhu, Yue Wang, Z. Yu, C. Jiang
Based on the Bao chaotic system, a new type system is constructed, which is called complex Bao chaotic system. This proposed system is chaotic by investigating dynamic characteristics. The chaotic sequence generated by audio is numerically simulated by scrambling and diffusion, and encryption and decryption are realized. The analysis results show that the encryption algorithm has good performance.
{"title":"A Voice Encryption Method Based on Complex Bao Chaos System","authors":"Huan Ye, Pengfei Chen, Shaobin Zhu, Yue Wang, Z. Yu, C. Jiang","doi":"10.1109/CCPQT56151.2022.00053","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00053","url":null,"abstract":"Based on the Bao chaotic system, a new type system is constructed, which is called complex Bao chaotic system. This proposed system is chaotic by investigating dynamic characteristics. The chaotic sequence generated by audio is numerically simulated by scrambling and diffusion, and encryption and decryption are realized. The analysis results show that the encryption algorithm has good performance.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00049
B. Mareri, Ruijie Ou, Yu Pang
One of the critical benefits of emerging wireless networks is the provision of accurate demand predictions. Resource availability is one of the essential factors ensuring such connectivity in heterogeneous networks. Despite extensive research interest in this domain, the fundamental issues are to ensure efficient allocation and exploitation of network resources. This paper proposes a multi-model-based model to forecast demand requirements utilizing deep learning techniques in network slicing. We present a framework that employs multiple forecasting models to perform forecasting by using historical information and cognitively selecting the most accurate forecasting model. Furthermore, we conduct a detailed analysis of several forecasting models from various papers. According to the findings, the proposed forecasting framework favors deep learning models and enhances fairness and guarantees experience quality. Moreover, we have demonstrated that the suggested approach can account for forecasting variations.
{"title":"Multimodal Deep Learning-based Demand Forecasting in Network Slicing","authors":"B. Mareri, Ruijie Ou, Yu Pang","doi":"10.1109/CCPQT56151.2022.00049","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00049","url":null,"abstract":"One of the critical benefits of emerging wireless networks is the provision of accurate demand predictions. Resource availability is one of the essential factors ensuring such connectivity in heterogeneous networks. Despite extensive research interest in this domain, the fundamental issues are to ensure efficient allocation and exploitation of network resources. This paper proposes a multi-model-based model to forecast demand requirements utilizing deep learning techniques in network slicing. We present a framework that employs multiple forecasting models to perform forecasting by using historical information and cognitively selecting the most accurate forecasting model. Furthermore, we conduct a detailed analysis of several forecasting models from various papers. According to the findings, the proposed forecasting framework favors deep learning models and enhances fairness and guarantees experience quality. Moreover, we have demonstrated that the suggested approach can account for forecasting variations.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117020188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00054
Jinbo Wu, Zhe Huang, Fangfang Zhang, Lei Kou, Chang Chun Pan, Huan Ye, Dong Wang, Peikun Zhang
Due to the intuitiveness of image transmission information, the application of images can be ubiquitous, correspondingly, the security of image information has become more significant. As chaos is compatible with cryptography due to some of its characteristics such as sensitivity of initial values, randomness, etc., it is extensively used in image encryption. In this paper, based on artificial images and 2D lagging complex Logistics mapping (2D-LCLM), a novel image encryption algorithm was proposed. Firstly, the pseudorandom sequences generated by 2D-LCLM is used to construct an artificial image. Artificial images can replace the traditional iterative encryption mechanism. Secondly, adopt chaotic sequences to position the original and artificial images. Finally, DNA XOR manipulation is used to merge the two images. Experimental simulation of the standard test graph, through the analysis we can know the encryption algorithm based on artificial image has good encryption effect and security performance.
{"title":"The Image Encryption Algorithm Based on Artificial Images and Complex Logistics Mapping","authors":"Jinbo Wu, Zhe Huang, Fangfang Zhang, Lei Kou, Chang Chun Pan, Huan Ye, Dong Wang, Peikun Zhang","doi":"10.1109/CCPQT56151.2022.00054","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00054","url":null,"abstract":"Due to the intuitiveness of image transmission information, the application of images can be ubiquitous, correspondingly, the security of image information has become more significant. As chaos is compatible with cryptography due to some of its characteristics such as sensitivity of initial values, randomness, etc., it is extensively used in image encryption. In this paper, based on artificial images and 2D lagging complex Logistics mapping (2D-LCLM), a novel image encryption algorithm was proposed. Firstly, the pseudorandom sequences generated by 2D-LCLM is used to construct an artificial image. Artificial images can replace the traditional iterative encryption mechanism. Secondly, adopt chaotic sequences to position the original and artificial images. Finally, DNA XOR manipulation is used to merge the two images. Experimental simulation of the standard test graph, through the analysis we can know the encryption algorithm based on artificial image has good encryption effect and security performance.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122709190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00064
Jiu Xiong, Zhiyong Luo
Unmanned aerial vehicle(UAV) combined with cognitive radio(CR) is a practical application scenario due to its portability and high maneuverability. Aiming at the low energy efficiency of cognitive UAV networks, this paper introduces the normalized spectrum (NS) sensing algorithm into multi-UAV cognitive radio networks to explore the energy efficiency based on cooperative spectrum sensing. Then with a fixed false alarm probability of a single decision, we compare the energy efficiency of the multi-UAV cognitive radio network using the NS algorithm with the energy detection (ED) algorithm. It shows that the NS detection algorithm can achieve a higher energy efficiency than the ED detection algorithm due to the introduction of an additional tunable parameter “the number of segments”. The further simulation indicates that the NS algorithm performs better than the ED algorithm in dynamic noise scenarios with time-varying noise power. Finally, we obtain the optimal sensing time of the NS algorithm to maximize energy efficiency. It shows that a matched pair of sensing time and the number of segments will achieve better performance.
{"title":"Energy-efficient for Multi-UAV Cognitive Radio Network with Normalized Spectrum Algorithm","authors":"Jiu Xiong, Zhiyong Luo","doi":"10.1109/CCPQT56151.2022.00064","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00064","url":null,"abstract":"Unmanned aerial vehicle(UAV) combined with cognitive radio(CR) is a practical application scenario due to its portability and high maneuverability. Aiming at the low energy efficiency of cognitive UAV networks, this paper introduces the normalized spectrum (NS) sensing algorithm into multi-UAV cognitive radio networks to explore the energy efficiency based on cooperative spectrum sensing. Then with a fixed false alarm probability of a single decision, we compare the energy efficiency of the multi-UAV cognitive radio network using the NS algorithm with the energy detection (ED) algorithm. It shows that the NS detection algorithm can achieve a higher energy efficiency than the ED detection algorithm due to the introduction of an additional tunable parameter “the number of segments”. The further simulation indicates that the NS algorithm performs better than the ED algorithm in dynamic noise scenarios with time-varying noise power. Finally, we obtain the optimal sensing time of the NS algorithm to maximize energy efficiency. It shows that a matched pair of sensing time and the number of segments will achieve better performance.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128380553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although many researchers have achieved wireless optical ranging and communication based on Avalanche Photon Diode (APD) detectors and PIN detectors. However, due to the low sensitivity of APD and PIN detectors, their working distances are limited. In order to achieve long-distance underwater wireless optical communication, a Single-Photon Avalanche Diode (SPAD) with photon-limited sensitivity is used to detect optical signals. In addition, most literatures do not specially design the data frames of ranging and communication, which makes it difficult to perform ranging and communication at the same time. In view of the fact that there is currently no systematic solution for simultaneous communication and high-precision ranging under underwater photon counting, this paper sorts out the relevant technical details, proposes an integrated ranging and communication scheme applied to photon counting, designs a special data frame that integrates ranging and communication, and proposes an extraction and recovery scheme for ranging and communication signals. Simulation shows that this scheme can achieve underwater photon counting wireless optical communication with a communication distance of 160m and an SER of 9.75×10-6, and the ranging accuracy is better than 1.59cm.
{"title":"Simulation of Integrated System of Photon-Counting Underwater Wireless Optical Ranging and Communication","authors":"Hao Yang, Qiurong Yan, Shanglin Wang, Xiancheng Xiong, Peng Li, Wei Wang","doi":"10.1109/CCPQT56151.2022.00024","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00024","url":null,"abstract":"Although many researchers have achieved wireless optical ranging and communication based on Avalanche Photon Diode (APD) detectors and PIN detectors. However, due to the low sensitivity of APD and PIN detectors, their working distances are limited. In order to achieve long-distance underwater wireless optical communication, a Single-Photon Avalanche Diode (SPAD) with photon-limited sensitivity is used to detect optical signals. In addition, most literatures do not specially design the data frames of ranging and communication, which makes it difficult to perform ranging and communication at the same time. In view of the fact that there is currently no systematic solution for simultaneous communication and high-precision ranging under underwater photon counting, this paper sorts out the relevant technical details, proposes an integrated ranging and communication scheme applied to photon counting, designs a special data frame that integrates ranging and communication, and proposes an extraction and recovery scheme for ranging and communication signals. Simulation shows that this scheme can achieve underwater photon counting wireless optical communication with a communication distance of 160m and an SER of 9.75×10-6, and the ranging accuracy is better than 1.59cm.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129857291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00026
Shanglin Wang, Qiurong Yan, Hao Yang, Min Tu, Wenjiang Zhu, Hua Du
In order to study the application of high order modulation in single photon counting communication, a 16 QAM modulation communication system based on MATLAB platform was established by modeling the characteristics of single photon detector. We represent the transmitted signal as a single photon and perform equal interval counting at the receiving end to recover the signal and demodulate it. The influence of different illumination intensity, different sampling rate, different dark counting rate and different equal time interval partition on system bit error rate is studied. The experimental results show that BER decreases with increasing light intensity. When 1250 photons are used for per symbol, the BER reaches 5 × 10 ^-4, which can meet the requirements of communication system. In addition, counting at different equal time intervals is actually a process of resampling the signal. Therefore, the higher the sampling rate of the transmitter is, if the receiver needs to recover the signal with the same sampling rate, it will be easier to reach the photon saturation state when counting at equal time intervals, and more likely to cause a large bit error rate. The dark counting rate has great influence at low light intensity, but decreases with the increase of light intensity.
{"title":"Simulation of Photon-Counting Wireless Communication System Based on QAM Modulation","authors":"Shanglin Wang, Qiurong Yan, Hao Yang, Min Tu, Wenjiang Zhu, Hua Du","doi":"10.1109/CCPQT56151.2022.00026","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00026","url":null,"abstract":"In order to study the application of high order modulation in single photon counting communication, a 16 QAM modulation communication system based on MATLAB platform was established by modeling the characteristics of single photon detector. We represent the transmitted signal as a single photon and perform equal interval counting at the receiving end to recover the signal and demodulate it. The influence of different illumination intensity, different sampling rate, different dark counting rate and different equal time interval partition on system bit error rate is studied. The experimental results show that BER decreases with increasing light intensity. When 1250 photons are used for per symbol, the BER reaches 5 × 10 ^-4, which can meet the requirements of communication system. In addition, counting at different equal time intervals is actually a process of resampling the signal. Therefore, the higher the sampling rate of the transmitter is, if the receiver needs to recover the signal with the same sampling rate, it will be easier to reach the photon saturation state when counting at equal time intervals, and more likely to cause a large bit error rate. The dark counting rate has great influence at low light intensity, but decreases with the increase of light intensity.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00070
Ruifei Wang, Zeguang Li, Jie Tang, H. Wen
In recent years, commercial UAVs (unmanned aerial vehicles) have been widely used in various scenarios, and at the same time, they are also facing serious security threats. The traditional cryptography-based authentication mechanism can hardly meet the needs of new scenarios and applications, so RF fingerprint recognition technology with low complexity and high security has gradually become a research hotspot. There is a large literature on this aspect of research and experimentation. However, most of the data used in experiments are from laboratories or open outdoor environments with LoS (Line of Sight) signals. In practical application scenarios, commercial UAVs may work in some outdoor environments with complex interference factors. Therefore, this work proposes the verification of the RF fingerprint recognition capability of commercial UAVs in complex outdoor scenarios.
{"title":"RF Fingerprint Identification of Commercial UAV in Outdoor Environment","authors":"Ruifei Wang, Zeguang Li, Jie Tang, H. Wen","doi":"10.1109/CCPQT56151.2022.00070","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00070","url":null,"abstract":"In recent years, commercial UAVs (unmanned aerial vehicles) have been widely used in various scenarios, and at the same time, they are also facing serious security threats. The traditional cryptography-based authentication mechanism can hardly meet the needs of new scenarios and applications, so RF fingerprint recognition technology with low complexity and high security has gradually become a research hotspot. There is a large literature on this aspect of research and experimentation. However, most of the data used in experiments are from laboratories or open outdoor environments with LoS (Line of Sight) signals. In practical application scenarios, commercial UAVs may work in some outdoor environments with complex interference factors. Therefore, this work proposes the verification of the RF fingerprint recognition capability of commercial UAVs in complex outdoor scenarios.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126541928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00071
Qing Li, Zhuang He, Bo Deng, L. Zhang, Yonghong Li, Bo Yang, Huashan Ye
In this paper, we try to design of portable EEG acquisition system and sleep staging method based on multi-scale entropy feature. Portable EEG signal acquisition equipment adopts $mathbf{ARM}+mathbf{ADS}mathbf{1299}$ scheme, ARM processor adopts the STM32F103 series single-chip microcomputer, and TI ADS1299 as the signal acquisition front-end analog chip. We collected EEG signals by a neighborhood comparison digital filtering algorithm and a band-pass filter, which removes the pulse interference of the EEG signals, the artifacts of EMG and OMG. The pure EEG signal eas extracted by time domain, time-frequency domain, and nonlinear feature, and 10 features of the EEG signal segment every 30s are obtained, including 5-time domain features and 4 energy features based on wavelet packet transform. Multi-scale entropy MSE, sleep EEG dataset was expanded through Sleep-EDF, and feature extraction was performed. Random forest and SVM were used to classify and extracted features. Staging results show that the classification accuracy of random forest is higher than that of SVM, which accuracy rate can reach 92.5%, and the Kappa value above 0.85. To verify the reliability of our system, we take some clinical experiments in Jinniu Hospital of Sichuan Provincial People's Hospital.
{"title":"Design of Portable EEG Acquisition System and Sleep Staging Method Based on Multi-scale Entropy Feature","authors":"Qing Li, Zhuang He, Bo Deng, L. Zhang, Yonghong Li, Bo Yang, Huashan Ye","doi":"10.1109/CCPQT56151.2022.00071","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00071","url":null,"abstract":"In this paper, we try to design of portable EEG acquisition system and sleep staging method based on multi-scale entropy feature. Portable EEG signal acquisition equipment adopts $mathbf{ARM}+mathbf{ADS}mathbf{1299}$ scheme, ARM processor adopts the STM32F103 series single-chip microcomputer, and TI ADS1299 as the signal acquisition front-end analog chip. We collected EEG signals by a neighborhood comparison digital filtering algorithm and a band-pass filter, which removes the pulse interference of the EEG signals, the artifacts of EMG and OMG. The pure EEG signal eas extracted by time domain, time-frequency domain, and nonlinear feature, and 10 features of the EEG signal segment every 30s are obtained, including 5-time domain features and 4 energy features based on wavelet packet transform. Multi-scale entropy MSE, sleep EEG dataset was expanded through Sleep-EDF, and feature extraction was performed. Random forest and SVM were used to classify and extracted features. Staging results show that the classification accuracy of random forest is higher than that of SVM, which accuracy rate can reach 92.5%, and the Kappa value above 0.85. To verify the reliability of our system, we take some clinical experiments in Jinniu Hospital of Sichuan Provincial People's Hospital.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131185846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00038
Chaojun Zhao, Can Yang, Ran Zhao
With the development of cloud computing and the application of multi-tenant technology, multi-tenant application platforms need to ensure the isolation and security of data when providing cloud services through resource sharing and on-demand customization, and also need to prohibit users from illegally accessing unauthorized resources. In addition, when users access relevant tenant information content across tenants, it is necessary to ensure the security in the cross-tenant collaboration scenario. Based on this, this paper proposes a cross-tenant user access control model, including its components, deployment mechanism and specific implementation process, and then we comprehensively analyzed the characteristics and performance of the model. This model not only ensures the security of data within each tenant, but also facilitates distributed cross-domain access among multiple tenants.
{"title":"The Model of Cross-Tenant Information Access Control in SAAS Cloud","authors":"Chaojun Zhao, Can Yang, Ran Zhao","doi":"10.1109/CCPQT56151.2022.00038","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00038","url":null,"abstract":"With the development of cloud computing and the application of multi-tenant technology, multi-tenant application platforms need to ensure the isolation and security of data when providing cloud services through resource sharing and on-demand customization, and also need to prohibit users from illegally accessing unauthorized resources. In addition, when users access relevant tenant information content across tenants, it is necessary to ensure the security in the cross-tenant collaboration scenario. Based on this, this paper proposes a cross-tenant user access control model, including its components, deployment mechanism and specific implementation process, and then we comprehensively analyzed the characteristics and performance of the model. This model not only ensures the security of data within each tenant, but also facilitates distributed cross-domain access among multiple tenants.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131938835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00067
Chen Zhao, Xiaolin Jia
In a large-scale multiple RFID readers system, the signal between the readers will interfere with each other during the tags identification, which is called reader collision. Such that, this paper proposes a Multiple RFID Readers Anti-collision Algorithm for RFID Tags Identification based on Graph Theory (MRGT) to deal with the interference. The algorithm establishes an interference graph for the RFID readers network used to select the independent set of the RFID readers and avoid the collision among multiple readers by arranging different communication slots and frequencies for different reader sets. Simulation results show that the proposed algorithm increases the number of active readers per second by 6.4% and 11.56% respectively on average, and the tag recognition rate is also increased by 6 and 11 times respectively compared with the classic algorithm Neighbor Friendly Reader Anti-Collision Protocol (NFRA) and distributed color selection (DCS) algorithm, and so the system efficiency and tag recognition rate of MRGT are better than that of NFRA and DCS.
{"title":"A Multiple RFID Readers Anti-collision Algorithm for RFID Tags Identification based on Graph Theory","authors":"Chen Zhao, Xiaolin Jia","doi":"10.1109/CCPQT56151.2022.00067","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00067","url":null,"abstract":"In a large-scale multiple RFID readers system, the signal between the readers will interfere with each other during the tags identification, which is called reader collision. Such that, this paper proposes a Multiple RFID Readers Anti-collision Algorithm for RFID Tags Identification based on Graph Theory (MRGT) to deal with the interference. The algorithm establishes an interference graph for the RFID readers network used to select the independent set of the RFID readers and avoid the collision among multiple readers by arranging different communication slots and frequencies for different reader sets. Simulation results show that the proposed algorithm increases the number of active readers per second by 6.4% and 11.56% respectively on average, and the tag recognition rate is also increased by 6 and 11 times respectively compared with the classic algorithm Neighbor Friendly Reader Anti-Collision Protocol (NFRA) and distributed color selection (DCS) algorithm, and so the system efficiency and tag recognition rate of MRGT are better than that of NFRA and DCS.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126291312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}