{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T14:02:56Z","timestamp":1762956176825,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T00:00:00Z","timestamp":1571356800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T00:00:00Z","timestamp":1571356800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61504096"],"award-info":[{"award-number":["61504096"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s10776-019-00465-4","type":"journal-article","created":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T17:22:01Z","timestamp":1571419321000},"page":"133-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Efficient Anti-collision Algorithm for RFID EPC Generation-2 Protocol Based on Continuous Detection"],"prefix":"10.1007","volume":"27","author":[{"given":"Xiuwei","family":"Xuan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7985-7351","authenticated-orcid":false,"given":"Kun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,18]]},"reference":[{"issue":"4","key":"465_CR1","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari and M. Ayyash, Internet of things: a survey on enabling technologies, protocols, and applications, IEEE Communications Surveys & Tutorials, Vol. 17, No. 4, pp. 2347\u20132376, 2015.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"465_CR2","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/SURV.2010.031810.00037","volume":"12","author":"DK Klair","year":"2010","unstructured":"D. K. Klair, K. W. Chin and R. Raad, A survey and tutorial of RFID anti-collision protocols, IEEE Communications Surveys & Tutorials, Vol. 12, No. 3, pp. 400\u2013421, 2010.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"465_CR3","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1109\/LWC.2019.2903407","volume":"8","author":"X Xie","year":"2019","unstructured":"X. Xie, X. L. Liu, H. Qi and K. Q. Li, Fast identification of multi-tagged objects for large-scale RFID systems, IEEE Wireless Communicatons Letters, Vol. 8, No. 4, pp. 992\u2013995, 2019.","journal-title":"IEEE Wireless Communicatons Letters"},{"doi-asserted-by":"crossref","unstructured":"G. Hui, Z. Yan, B. Zhang, and F. Yu, Improved RFID anti-collision algorithm based on quad-tree. In Proceedings of the 2017 IEEE international conference on computational science and engineering (CSE) and embedded and ubiquitous computing (EUC), pp. 171\u2013175, 2017.","key":"465_CR4","DOI":"10.1109\/CSE-EUC.2017.38"},{"key":"465_CR5","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.comcom.2016.04.019","volume":"88","author":"SC Tsai","year":"2016","unstructured":"S. C. Tsai, Y. M. Hu, C. H. Chai and J. S. Li, Efficient tag reading protocol for large-scale RFID systems with pre-reading, Computer Communications, Vol. 88, pp. 73\u201383, 2016.","journal-title":"Computer Communications"},{"issue":"6","key":"465_CR6","doi-asserted-by":"publisher","first-page":"2406","DOI":"10.1109\/TII.2017.2771772","volume":"14","author":"L Zhang","year":"2018","unstructured":"L. Zhang, W. Xiang, X. Tang, Q. Li and Q. Yan, A time-and energy-aware collision tree protocol for efficient large-scale RFID tag identification, IEEE Transactions on Industrial Informatics, Vol. 14, No. 6, pp. 2406\u20132417, 2018.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"465_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/TNET.2013.2295839","volume":"23","author":"YC Lai","year":"2015","unstructured":"Y. C. Lai, L. Y. Hsiao and B. S. Lin, Optimal slot assignment for binary tracking tree protocol in RFID tag identification, IEEE\/ACM Transactions on Networking, Vol. 23, No. 1, pp. 255\u2013268, 2015.","journal-title":"IEEE\/ACM Transactions on Networking"},{"doi-asserted-by":"crossref","unstructured":"J. Teng, X. W. Xuan, and Y. Bai, A fast Q algorithm based on EPC Generation2 RFID protocol. In Proceedings of international conference on wireless communications networking and mobile computing (WiCOM), IEEE, Chengdu, pp. 1\u20134, 2010.","key":"465_CR8","DOI":"10.1109\/WICOM.2010.5601078"},{"issue":"8","key":"465_CR9","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.3390\/app8081282","volume":"8","author":"N Cmiljanic","year":"2018","unstructured":"N. Cmiljanic, H. Landaluce and A. Perallos, A comparison of RFID anti-collision protocols for tag identification, Applied Sciences, Vol. 8, No. 8, p. 1282, 2018.","journal-title":"Applied Sciences"},{"issue":"3","key":"465_CR10","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1109\/TMC.2017.2735411","volume":"17","author":"L Zhang","year":"2018","unstructured":"L. Zhang, W. Xiang and X. Tang, An efficient bit-detecting protocol for continuous tag recognition in mobile RFID systems, IEEE Transactions on Mobile Computing, Vol. 17, No. 3, pp. 503\u2013516, 2018.","journal-title":"IEEE Transactions on Mobile Computing"},{"unstructured":"EPC Global, EPC radio-frequency identify protocols class 1 generation 2 UHF RFID protocol for communications at 860\u00a0MHz\u2013960\u00a0MHz, Tech. Rep., version 1.2.0, 2008.","key":"465_CR11"},{"issue":"5","key":"465_CR12","first-page":"596","volume":"2015","author":"L Sanchez","year":"2015","unstructured":"L. Sanchez and V. Ramos, Optimum power distance clustering for the EPC class-1 Gen2 standard in RFID systems, International Journal of Distributed Sensor Networks, Vol. 2015, No. 5, pp. 596\u2013602, 2015.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"4","key":"465_CR13","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s10776-015-0292-x","volume":"22","author":"S Hassouni","year":"2015","unstructured":"S. Hassouni and H. Qjidaa, A design of modulator and demodulator for a passive UHF RFID tag using DTMOST compatible with C1 G2 EPC standard protocol, International Journal of Wireless Information Networks, Vol. 22, No. 4, pp. 407\u2013414, 2015.","journal-title":"International Journal of Wireless Information Networks"},{"issue":"8","key":"465_CR14","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1049\/el.2015.3258","volume":"52","author":"L Arjona","year":"2016","unstructured":"L. Arjona, H. Landaluce, A. Perallos and E. Onieva, A fast Fuzzy anti-collision protocol for the RFID standard EPC Gen-2, Electronics Letters, Vol. 52, No. 8, pp. 663\u2013665, 2016.","journal-title":"Electronics Letters"},{"issue":"1","key":"465_CR15","doi-asserted-by":"publisher","first-page":"83","DOI":"10.12785\/ijcnt\/010106","volume":"1","author":"F Baloch","year":"2013","unstructured":"F. Baloch and R. Pendse, Comparison of transmission control protocols based on EPC C1G2 standard, International Journal of Computing and Network Technology, Vol. 1, No. 1, pp. 83\u201394, 2013.","journal-title":"International Journal of Computing and Network Technology"},{"doi-asserted-by":"crossref","unstructured":"E. Vahedi, R. K. Ward, and I. F. Blake, Analytical modeling of RFID generation-2 protocol using absorbing Markov chain theorem. In Proceedings of global communications conference (GLOBECOM), IEEE, California, pp. 385\u2013390, 2012.","key":"465_CR16","DOI":"10.1109\/GLOCOM.2012.6503143"},{"issue":"4","key":"465_CR17","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/TASE.2013.2295394","volume":"11","author":"E Vahedi","year":"2014","unstructured":"E. Vahedi, R. K. Ward and I. F. Blake, Performance analysis of RFID protocols: CDMA versus the standard EPC Gen-2, IEEE Transactions on Automation Science and Engineering, Vol. 11, No. 4, pp. 1250\u20131261, 2014.","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"doi-asserted-by":"crossref","unstructured":"D. Lee, K. Kim, and W. Lee, Q+-algorithm: an enhanced RFID tag collision arbitration algorithm. In Proceedings of 4th international conference of ubiquitous intelligence and computing (UIC 2007), Hong Kong, China, pp. 23\u201332, 2007.","key":"465_CR18","DOI":"10.1007\/978-3-540-73549-6_3"},{"issue":"5","key":"465_CR19","doi-asserted-by":"publisher","first-page":"2592","DOI":"10.1109\/TWC.2009.080437","volume":"8","author":"C Wang","year":"2009","unstructured":"C. Wang, M. Daneshmand, K. Sohraby and B. Li, Performance analysis of RFID generation-2 protocol, IEEE Transactions on Wireless Communications, Vol. 8, No. 5, pp. 2592\u20132601, 2009.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"6","key":"465_CR20","doi-asserted-by":"publisher","first-page":"6829","DOI":"10.1016\/j.eswa.2010.12.056","volume":"38","author":"M He","year":"2011","unstructured":"M. He, S. J. Horng, P. Fan, M. K. Khan, R. S. Run, J. L. Lai and R. J. Chen, A fast RFID tag identification algorithm based on counter and stack, Expert Systems with Applications, Vol. 38, No. 6, pp. 6829\u20136838, 2011.","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"465_CR21","doi-asserted-by":"publisher","first-page":"245914","DOI":"10.1155\/2015\/245914","volume":"11","author":"H Huo","year":"2015","unstructured":"H. Huo, J. Q. Liu and Y. J. Wang, Flood diversion algorithm for anticollision in RFID system, International Journal of Distributed Sensor Networks, Vol. 11, No. 4, p. 245914, 2015.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"8","key":"465_CR22","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1109\/LCOMM.2012.060112.120345","volume":"16","author":"Y Jiang","year":"2012","unstructured":"Y. Jiang and R. Zhang, An adaptive combination query tree protocol for tag identification in RFID systems, IEEE Communications Letters, Vol. 16, No. 8, pp. 1192\u20131195, 2012.","journal-title":"IEEE Communications Letters"},{"issue":"6","key":"465_CR23","doi-asserted-by":"publisher","first-page":"4234","DOI":"10.1109\/TWC.2016.2537800","volume":"15","author":"H Landaluce","year":"2016","unstructured":"H. Landaluce, A. Perallos, E. Onieva, L. Arjona and L. Bengtsson, An energy and identification time decreasing procedure for memoryless RFID tag anticollision protocols, IEEE Transactions on Wireless Communications, Vol. 15, No. 6, pp. 4234\u20134247, 2016.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"10","key":"465_CR24","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1109\/JSEN.2013.2272460","volume":"13","author":"Y Wang","year":"2013","unstructured":"Y. Wang, Y. Liu, H. Leung, R. Chen and A. Li, A multi-bit identification protocol for RFID tag reading, IEEE Sensors Journal, Vol. 13, No. 10, pp. 3527\u20133536, 2013.","journal-title":"IEEE Sensors Journal"},{"issue":"8","key":"465_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s17081891","volume":"17","author":"N Cmiljanic","year":"2017","unstructured":"N. Cmiljanic, H. Landaluce, A. Perallos and L. Arjona, Influence of the distribution of tag IDs on RFID memoryless anti-collision protocols, Sensors, Vol. 17, No. 8, pp. 1\u201320, 2017.","journal-title":"Sensors"},{"issue":"3","key":"465_CR26","doi-asserted-by":"publisher","first-page":"2527","DOI":"10.1109\/TCOMM.2018.2884001","volume":"67","author":"J Su","year":"2019","unstructured":"J. Su, Z. Sheng, L. Xie, G. Li and A. X. Liu, Fast splitting-based tag identification algorithm for anti-collision in UHF RFID system, IEEE Transactions on Communications, Vol. 67, No. 3, pp. 2527\u20132538, 2019.","journal-title":"IEEE Transactions on Communications"},{"issue":"5","key":"465_CR27","doi-asserted-by":"publisher","first-page":"2670","DOI":"10.1109\/TNET.2017.2709979","volume":"25","author":"Q Xiao","year":"2017","unstructured":"Q. Xiao, S. Chen, M. Chen, Y. Zhou, Z. Cai and J. Luo, Adaptive joint estimation protocol for arbitrary pair of tag sets in a distributed RFID system, IEEE\/ACM Transactions on Networking, Vol. 25, No. 5, pp. 2670\u20132685, 2017.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"1","key":"465_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13639-016-0029-7","volume":"2016","author":"F Zheng","year":"2016","unstructured":"F. Zheng and T. Kaiser, Adaptive Aloha anti-collision algorithms for RFID systems, Eurasip Journal on Embedded Systems, Vol. 2016, No. 1, pp. 1\u201314, 2016.","journal-title":"Eurasip Journal on Embedded Systems"},{"issue":"2","key":"465_CR29","doi-asserted-by":"publisher","first-page":"2633","DOI":"10.1007\/s11277-017-4316-y","volume":"96","author":"L Duan","year":"2017","unstructured":"L. Duan, X. Zhang, Z. J. Wang and F. Duan, A feasible segment-by-segment Aloha algorithm for RFID systems, Wireless Personal Communications, Vol. 96, No. 2, pp. 2633\u20132649, 2017.","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"465_CR30","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1109\/TNET.2017.2722480","volume":"25","author":"X Liu","year":"2017","unstructured":"X. Liu, K. Li, S. Guo, A. X. Liu, P. Li, K. Wang and J. Wu, Top-k queries for categorized RFID systems, IEEE\/ACM Transactions on Networking, Vol. 25, No. 5, pp. 2587\u20132600, 2017.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"1","key":"465_CR31","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/JAS.2017.7510757","volume":"5","author":"H Wu","year":"2018","unstructured":"H. Wu, Y. Wang and Y. Zeng, Capture-aware Bayesian RFID tag estimate for large-scale identification, IEEE\/CAA Journal of Automatica Sinica, Vol. 5, No. 1, pp. 119\u2013127, 2018.","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"1","key":"465_CR32","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.comcom.2014.10.006","volume":"56","author":"XH Lin","year":"2015","unstructured":"X. H. Lin, H. Wang, Y. K. Kwok, B. Chen, M. Dai and L. Zhang, Exploiting the prefix information to enhance the performance of FSA-based RFID systems, Computer Communications, Vol. 56, No. 1, pp. 108\u2013118, 2015.","journal-title":"Computer Communications"},{"issue":"4","key":"465_CR33","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1109\/LCOMM.2016.2521839","volume":"20","author":"J Su","year":"2016","unstructured":"J. Su, Z. Sheng, D. Hong and G. Wen, An effective frame breaking policy for dynamic framed slotted Aloha in RFID, IEEE Communications Letters, Vol. 20, No. 4, pp. 692\u2013695, 2016.","journal-title":"IEEE Communications Letters"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00465-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-019-00465-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00465-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T23:14:42Z","timestamp":1602890082000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-019-00465-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,18]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["465"],"URL":"https:\/\/doi.org\/10.1007\/s10776-019-00465-4","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"type":"print","value":"1068-9605"},{"type":"electronic","value":"1572-8129"}],"subject":[],"published":{"date-parts":[[2019,10,18]]},"assertion":[{"value":"4 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}