{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:09:11Z","timestamp":1743066551298,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030786113"},{"type":"electronic","value":"9783030786120"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78612-0_56","type":"book-chapter","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T23:38:40Z","timestamp":1625787520000},"page":"688-699","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System"],"prefix":"10.1007","author":[{"given":"Zengshan","family":"Tian","sequence":"first","affiliation":[]},{"given":"Xixi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kaikai","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Liangbo","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"issue":"1","key":"56_CR1","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/128756.128759","volume":"10","author":"R Want","year":"1992","unstructured":"Want, R., Hopper, A., Falcao, V., et al.: The active badge location system. ACM Trans. Inf. Syst. 10(1), 91\u2013102 (1992)","journal-title":"ACM Trans. Inf. Syst."},{"issue":"2","key":"56_CR2","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1023\/A:1013767926256","volume":"8","author":"A Harter","year":"2002","unstructured":"Harter, A., Hopper, A., Steggles, P., et al.: The anatomy of a context-aware application. Wireless Netw. 8(2), 187\u2013197 (2002)","journal-title":"Wireless Netw."},{"key":"56_CR3","doi-asserted-by":"crossref","unstructured":"Kotaru, M., Joshi, K., Bharadia, D., et al.: Spotfi: decimeter level localization using wifi. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 269\u2013282 (2015)","DOI":"10.1145\/2785956.2787487"},{"issue":"2","key":"56_CR4","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1109\/LAWP.2012.2186110","volume":"11","author":"C Zhou","year":"2012","unstructured":"Zhou, C., Griffin, J.D.: Accurate phase-based ranging measurements for backscatter RFID tags. IEEE Antennas Wirel. Propag. Lett. 11(2), 152\u2013155 (2012)","journal-title":"IEEE Antennas Wirel. Propag. Lett."},{"issue":"5","key":"56_CR5","doi-asserted-by":"publisher","first-page":"2491","DOI":"10.1109\/TAP.2012.2189705","volume":"60","author":"D Arnitz","year":"2012","unstructured":"Arnitz, D., Muehlmann, U., Witrisal, K.: Characterization and modeling of UHF RFID channels for ranging and localization. IEEE Trans. Antennas Propag. 60(5), 2491\u20132501 (2012)","journal-title":"IEEE Trans. Antennas Propag."},{"issue":"3","key":"56_CR6","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1109\/TVT.2010.2040096","volume":"59","author":"RW Ouyang","year":"2010","unstructured":"Ouyang, R.W., Wong, A.K.S., Lea, C.T.: Received signal strength-based wireless localization via semidefinite programming: noncooperative and cooperative schemes. IEEE Trans. Veh. Technol. 59(3), 1307\u20131318 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"56_CR7","doi-asserted-by":"publisher","first-page":"2614","DOI":"10.1109\/TSP.2007.914342","volume":"56","author":"HC So","year":"2008","unstructured":"So, H.C., Chan, Y.T., Chan, F.K.W.: Closed-form formulae for time-difference-of-arrival estimation. IEEE Trans. Sig. Process. 56(6), 2614\u20133262 (2008)","journal-title":"IEEE Trans. Sig. Process."},{"issue":"2","key":"56_CR8","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1109\/78.740135","volume":"47","author":"JD Bard","year":"1999","unstructured":"Bard, J.D., Ham, F.M.: Time difference of arrival dilution of precision and applications. IEEE Trans. Sig. Process. 47(2), 521\u2013523 (1999)","journal-title":"IEEE Trans. Sig. Process."},{"issue":"6","key":"56_CR9","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1016\/j.compeleceng.2010.03.007","volume":"36","author":"P Kulakowski","year":"2010","unstructured":"Kulakowski, P., Alonso, J.V.: Angle-of-arrival localization based on antenna arrays for wireless sensor networks. Comput. Electr. Eng. 36(6), 1181\u20131186 (2010)","journal-title":"Comput. Electr. Eng."},{"key":"56_CR10","unstructured":"Zheng, X., Hua, J., Zheng, Z., et al.: Wireless localization based on the time sum of arrival and Taylor expansion. In: 2013 19th IEEE International Conference on Networks, pp. 1\u20134. IEEE (2013)"},{"issue":"9","key":"56_CR11","first-page":"108","volume":"28","author":"J Lv","year":"2011","unstructured":"Lv, J., Yao, J.: Aerial target localization based on least squares and Newton iterative algorithm. Microelectron. Comput. 28(9), 108\u2013110 (2011)","journal-title":"Microelectron. Comput."},{"issue":"4","key":"56_CR12","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1109\/JSAC.2005.863824","volume":"24","author":"JA Dabin","year":"2006","unstructured":"Dabin, J.A., Haimovich, A.M., Grebel, H.: A statistical ultra-wideband indoor channel model and the effects of antenna directivity on path loss and multipath propagation. IEEE J. Sel. Areas Commun. 24(4), 752\u2013758 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"10","key":"56_CR13","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1093\/oxfordjournals.molbev.a003995","volume":"19","author":"T Tamura","year":"2002","unstructured":"Tamura, T., Kumar, S.: Evolutionary distance estimation under heterogeneous substitution pattern among lineages. Mol. Biol. Evol. 19(10), 1727\u20131736 (2002)","journal-title":"Mol. Biol. Evol."},{"key":"56_CR14","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-36252-1_23","volume-title":"Advances in Wireless Sensor Networks","author":"W Liang","year":"2013","unstructured":"Liang, W., Liu, S., Yang, Y., Li, S.: Research of adaptive frequency hopping technology in WIA-PA industrial wireless network. In: Wang, R., Xiao, Fu. (eds.) CWSN 2012. CCIS, vol. 334, pp. 248\u2013262. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36252-1_23"},{"issue":"4","key":"56_CR15","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1016\/j.adhoc.2009.10.004","volume":"8","author":"C Cormio","year":"2010","unstructured":"Cormio, C., Chowdhury, K.R.: Common control channel design for cognitive radio wireless ad hoc networks using adaptive frequency hopping. Ad Hoc Netw. 8(4), 430\u2013438 (2010)","journal-title":"Ad Hoc Netw."},{"issue":"12","key":"56_CR16","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1049\/el:19910635","volume":"27","author":"H Zaghloul","year":"1991","unstructured":"Zaghloul, H., Morrison, G., Fattouche, M.: Frequency response and path loss measurements of indoor channel. Electron. Lett. 27(12), 1021\u20131022 (1991)","journal-title":"Electron. Lett."},{"key":"56_CR17","doi-asserted-by":"crossref","unstructured":"Shin, J.G., Kim, J.W., Lee, J.H.: Accurate reconstruction of digital holography using frequency domain zero padding. In: 25th International Conference on Optical Fiber Sensors, pp. 1\u20134. OFS, Korea (2017)","DOI":"10.1117\/12.2267539"},{"key":"56_CR18","doi-asserted-by":"crossref","unstructured":"Ma, Y., Selby, N., Adib, F.: Minding the billions: ultra-wideband localization for deployed RFID tags. In: the 23rd Annual International Conference, pp. 248\u2013260. MobiCom (2017)","DOI":"10.1145\/3117811.3117833"},{"issue":"4","key":"56_CR19","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/TC.2003.1190587","volume":"52","author":"SM Yen","year":"2003","unstructured":"Yen, S.M., Kim, S., Lim, S., et al.: RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis. IEEE Trans. Comput. 52(4), 461\u2013472 (2003)","journal-title":"IEEE Trans. Comput."},{"issue":"11","key":"56_CR20","doi-asserted-by":"publisher","first-page":"4314","DOI":"10.1109\/TSP.2009.2025079","volume":"57","author":"X Li","year":"2009","unstructured":"Li, X., Liang, H., Xia, X.G.: A robust Chinese remainder theorem with its applications in frequency estimation from undersampled waveforms. IEEE Trans. Signal Process. 57(11), 4314\u20134322 (2009)","journal-title":"IEEE Trans. Signal Process."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78612-0_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T22:12:26Z","timestamp":1630361546000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78612-0_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030786113","9783030786120"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78612-0_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}