{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:52:01Z","timestamp":1726037521269},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_23","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"253-265","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Under-Determined Blind Source Separation Anti-collision Algorithm for RFID Based on Adaptive Tree Grouping"],"prefix":"10.1007","author":[{"given":"Xiaohong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qiuli","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yungang","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"1","key":"23_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ijpe.2014.09.004","volume":"159","author":"ZX Guo","year":"2015","unstructured":"Guo, Z.X., Ngai, E.W.T., Yang, C., Liang, X.D.: An RFID-based intelligent decision support system architecture for production monitoring and scheduling in a distributed manufacturing environment. Int. J. Prod. Econ. 159(1), 16\u201328 (2015)","journal-title":"Int. J. Prod. Econ."},{"issue":"6","key":"23_CR2","first-page":"1139","volume":"42","author":"XH Zhang","year":"2014","unstructured":"Zhang, X.H., Zhang, L.Y.: Research on RFID anti-collision algorithm of a lot responding in real-time and co-processing. Acta Electronica Sinica 42(6), 1139\u20131146 (2014)","journal-title":"Acta Electronica Sinica"},{"issue":"1","key":"23_CR3","first-page":"47","volume":"56","author":"ZG Qu","year":"2018","unstructured":"Qu, Z.G., Zhu, T.C., Wang, J.W., Wang, X.J.: A novel quantum stegnagraphy based on brown states. Comput. Mater. Continua 56(1), 47\u201359 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"23_CR4","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/TII.2013.2250510","volume":"10","author":"L Wang","year":"2014","unstructured":"Wang, L., Xu, L.D., Bi, Z.M., Xu, Y.C.: Data cleaning for RFID and WSN integration. IEEE Trans. Ind. Inf. 10(1), 408\u2013418 (2014)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"4","key":"23_CR5","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/TSC.2014.2370642","volume":"7","author":"D Zhang","year":"2014","unstructured":"Zhang, D., Wang, X., Song, X., Zhao, D.: A novel approach to mapped correlation of ID for RFID anti-collision. IEEE Trans. Serv. Comput. 7(4), 741\u2013748 (2014)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"7","key":"23_CR6","first-page":"496","volume":"62","author":"Y Pang","year":"2013","unstructured":"Pang, Y., Peng, Q., Lin, J.Z., Zhou, Q.N., Li, G.Q., et al.: Reducing tag collision in radio frequency identification systems by using a grouped dynamic frame slotted ALOHA algorithm. Acta Physica Sinica 62(7), 496\u2013503 (2013)","journal-title":"Acta Physica Sinica"},{"issue":"10","key":"23_CR7","doi-asserted-by":"publisher","first-page":"4798","DOI":"10.1016\/j.eswa.2014.01.033","volume":"41","author":"Z Li","year":"2014","unstructured":"Li, Z., Li, J., He, C.: Artificial immune network-based anti-collision algorithm for dense RFID readers. Expert Syst. Appl. 41(10), 4798\u20134810 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"23_CR8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/TPDS.2012.120","volume":"24","author":"H Wu","year":"2013","unstructured":"Wu, H., Zeng, Y., Feng, J., Gu, Y.: Binary tree slotted ALOHA for passive RFID tag anticollision. IEEE Trans. Parallel Distrib. Syst. 24(1), 19\u201331 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"6","key":"23_CR9","first-page":"1320","volume":"26","author":"XH Zhang","year":"2014","unstructured":"Zhang, X.H., Xiao, J.F.: Passive RFID system tag anti-collision optimization algorithms. J. Syst. Simul. 26(6), 1320\u20131326 (2014)","journal-title":"J. Syst. Simul."},{"issue":"7","key":"23_CR10","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1080\/17517575.2014.986221","volume":"10","author":"DG Zhang","year":"2016","unstructured":"Zhang, D.G., Li, W.B.: Novel ID-based anti-collision approach for RFID. Enterp. Inf. Syst. 10(7), 771\u2013789 (2016)","journal-title":"Enterp. Inf. Syst."},{"issue":"1","key":"23_CR11","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s11235-017-0274-7","volume":"66","author":"JM Zhao","year":"2017","unstructured":"Zhao, J.M., Li, N., Li, D.A., et al.: Collision alignment: an RFID anti-collision algorithm assisted by orthogonal signal detection and analogy principle. Telecommun. Syst. 66(1), 131\u2013144 (2017)","journal-title":"Telecommun. Syst."},{"issue":"14","key":"23_CR12","doi-asserted-by":"publisher","first-page":"2221","DOI":"10.1049\/iet-com.2016.1305","volume":"11","author":"PJ Chuang","year":"2017","unstructured":"Chuang, P.J., Tsai, W.T.: Switch table: an efficient anti-collision algorithm for RFID networks. IET Commun. 11(14), 2221\u20132227 (2017)","journal-title":"IET Commun."},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/s13639-016-0029-7","volume":"1","author":"F Zheng","year":"2016","unstructured":"Zheng, F., Kaiser, T.: Adaptive aloha anti-collision algorithms for RFID systems. EURASIP J. Embed. Syst. 1, 7\u201320 (2016)","journal-title":"EURASIP J. Embed. Syst."},{"issue":"8","key":"23_CR14","first-page":"97","volume":"40","author":"CH Wang","year":"2013","unstructured":"Wang, C.H., Liu, C.S., Xu, H., Tu, Y.X.: An enhanced tree-based anti-collision algorithm. J. Hunan Univ. (Nat. Sci.) 40(8), 97\u2013101 (2013)","journal-title":"J. Hunan Univ. (Nat. Sci.)"},{"issue":"2","key":"23_CR15","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.commatsci.2018.05.053","volume":"56","author":"WJ Liu","year":"2018","unstructured":"Liu, W.J., Chen, Z.Y., Liu, J.S., Su, Z.F., Chi, L.H.: Full-blind delegating private quantum computation. Comput. Mater. Contin. 56(2), 211\u2013223 (2018)","journal-title":"Comput. Mater. Contin."},{"issue":"3","key":"23_CR16","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.aeue.2012.08.009","volume":"67","author":"M Djeddou","year":"2013","unstructured":"Djeddou, M., Khelladi, R., Benssalah, M.: Improved RFID anti-collision algorithm. AEU-Int. J. Electron. Commun. 67(3), 256\u2013262 (2013)","journal-title":"AEU-Int. J. Electron. Commun."},{"issue":"12","key":"23_CR17","first-page":"1","volume":"41","author":"WH Fu","year":"2014","unstructured":"Fu, W.H., Wang, L., Ma, L.F.: Improved laplace mixed model potential function algorithm for UBSS. J. Xidian Univ. 41(12), 1\u20135 (2014)","journal-title":"J. Xidian Univ."},{"issue":"8","key":"23_CR18","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1049\/el.2015.3258","volume":"52","author":"L Arjona","year":"2016","unstructured":"Arjona, L., Landaluce, H., Perallos, A., Onieva, E.: Fast fuzzy anti-collision protocol for the RFID standard EPC Gen-2. Electron. Lett. 52(8), 663\u2013665 (2016)","journal-title":"Electron. Lett."},{"issue":"4","key":"23_CR19","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1109\/TIM.2013.2285789","volume":"63","author":"B Gao","year":"2014","unstructured":"Gao, B., Bai, L., Woo, W.L., Tian, G.Y., Chen, Y.H.: Automatic defect identification of eddy current pulsed thermography using single channel blind source separation. IEEE Trans. Instrum. Meas. 63(4), 913\u2013922 (2014)","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"3","key":"23_CR20","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1002\/dac.2975","volume":"30","author":"N Bagheri","year":"2017","unstructured":"Bagheri, N., Alenaby, P., Safkhani, M.: A new anti-collision protocol based on information of collided tags in RFID systems. Int. J. Commun Syst 30(3), 231\u2013240 (2017)","journal-title":"Int. J. Commun Syst"},{"issue":"5","key":"23_CR21","first-page":"865","volume":"48","author":"KQ Yue","year":"2014","unstructured":"Yue, K.Q., Sun, L.L., You, B., Lou, L.H.: Parallelizable identification anti-collision algorithm based on under-determined blind separation. J. Zhejiang Univ. (Eng. Sci.) 48(5), 865\u2013870 (2014)","journal-title":"J. Zhejiang Univ. (Eng. Sci.)"},{"issue":"1","key":"23_CR22","first-page":"1249","volume":"15","author":"N Gillis","year":"2014","unstructured":"Gillis, N., Luce, R.: Robust near-separable nonnegative matrix factorization using linear optimization. J. Mach. Learn. Res. 15(1), 1249\u20131280 (2014)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:30:02Z","timestamp":1563406202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}