{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:13Z","timestamp":1761401893117,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,5,8]],"date-time":"2017-05-08T00:00:00Z","timestamp":1494201600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61272509"],"award-info":[{"award-number":["61272509"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11235-017-0321-4","type":"journal-article","created":{"date-parts":[[2017,5,8]],"date-time":"2017-05-08T20:07:14Z","timestamp":1494274034000},"page":"63-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["CDMA-based anti-collision algorithm for EPC global C1 Gen2 systems"],"prefix":"10.1007","volume":"67","author":[{"given":"Wei","family":"Wei","sequence":"first","affiliation":[]},{"given":"Jian","family":"Su","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]},{"given":"Huihui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiumei","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,8]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Finkenzeller, K. (2003). RFID handbook: Fundamentals and applications in contactless smart cards and identification (2nd ed., pp. 1\u20139). John Wiley & Sons Inc.","key":"321_CR1","DOI":"10.1002\/0470868023"},{"issue":"3","key":"321_CR2","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/SURV.2010.031810.00037","volume":"12","author":"DK Klair","year":"2010","unstructured":"Klair, D. K., Chin, K. W., & Raad, R. (2010). A survey and tutorial of RFID anti-collision protocols. IEEE Communications Surveys and Tutorials, 12(3), 400\u2013421.","journal-title":"IEEE Communications Surveys and Tutorials"},{"doi-asserted-by":"crossref","unstructured":"Vogt, H. (2002). Efficient object identification with passive RFID tags. In International conference on pervasive computing (pp. 98\u2013113) London.","key":"321_CR3","DOI":"10.1007\/3-540-45866-2_9"},{"issue":"10","key":"321_CR4","doi-asserted-by":"crossref","first-page":"3637","DOI":"10.1109\/JSEN.2014.2330418","volume":"14","author":"P Solic","year":"2014","unstructured":"Solic, P., Radic, J., & Rozic, N. (2014). Energy efficient tag estimation method for Aloha-based RFID systems. IEEE Sensors Journal, 14(10), 3637\u20133647.","journal-title":"IEEE Sensors Journal"},{"issue":"4","key":"321_CR5","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1109\/LCOMM.2016.2521839","volume":"20","author":"J Su","year":"2016","unstructured":"Su, J., Sheng, Z., Hong, D., & Wen, G. (2016). An effective frame breaking policy for dynamic framed slotted Aloha in RFID. IEEE Communications Letters, 20(4), 692\u2013695.","journal-title":"IEEE Communications Letters"},{"issue":"4","key":"321_CR6","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1049\/cje.2015.10.003","volume":"24","author":"J Su","year":"2015","unstructured":"Su, J., Wen, G., & Hong, D. (2015). A new RFID anti-collision algorithm based on the Q-ary search scheme. Chinese Journal of Electronics, 24(4), 679\u2013683.","journal-title":"Chinese Journal of Electronics"},{"issue":"2","key":"321_CR7","first-page":"465","volume":"99","author":"SU Jian","year":"2016","unstructured":"Jian, S. U., et al. (2016). An efficient anti-collision algorithm based on improved collision detection scheme. IEICE Transactions on Communications, 99(2), 465\u2013470.","journal-title":"IEICE Transactions on Communications"},{"issue":"7","key":"321_CR8","doi-asserted-by":"crossref","first-page":"1277","DOI":"10.1109\/TPDS.2012.64","volume":"24","author":"C Qian","year":"2013","unstructured":"Qian, C., et al. (2013). ASAP: Scalable collision arbitration for large RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24(7), 1277\u20131288.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"doi-asserted-by":"crossref","unstructured":"Yu, P., et al. (2013). Reducing tag collision in radio frequency identification systems by using a grouped dynamic frame slotted ALOHA algorithm. Acta Physica Sinica, 62(14), 148401.","key":"321_CR9","DOI":"10.7498\/aps.62.148401"},{"issue":"2","key":"321_CR10","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/TASE.2013.2257756","volume":"11","author":"W-T Chen","year":"2014","unstructured":"Chen, W.-T. (2014). A feasible and easy-to-implement anticollision algorithm for the EPCglobal UHF class-1 generation-2 RFID protocol. IEEE Transactions on Automation Science and Engineering, 11(2), 485\u2013491.","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"issue":"1","key":"321_CR11","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/TASE.2008.917091","volume":"6","author":"G Mazurek","year":"2009","unstructured":"Mazurek, G. (2009). Active RFID system with spread-spectrum transmission. IEEE Transactions on Automation Science and Engineering, 6(1), 25\u201332.","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"doi-asserted-by":"crossref","unstructured":"Loeffler, A., Schuh, F., & Gerhaeuser, H. (2010). Realization of a CDMA-based RFID system using a semi-active UHF transponder. In 2010 6th international conference on wireless and mobile communications (ICWMC). IEEE.","key":"321_CR12","DOI":"10.1109\/ICWMC.2010.78"},{"issue":"10","key":"321_CR13","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1109\/LCOMM.2011.082011.110848","volume":"15","author":"T Demeechai","year":"2011","unstructured":"Demeechai, T., & Siwamogsatham, S. (2011). Using CDMA to enhance the MAC performance of ISO\/IEC 18000-6 type C. IEEE Communications Letters, 15(10), 1129\u20131131.","journal-title":"IEEE Communications Letters"},{"key":"321_CR14","volume-title":"Introduction to combinatorial analysis","author":"J Riordan","year":"2012","unstructured":"Riordan, J. (2012). Introduction to combinatorial analysis. North Chelmsford: Courier Corporation."},{"issue":"8","key":"321_CR15","doi-asserted-by":"crossref","first-page":"2220","DOI":"10.1109\/TPDS.2014.2346171","volume":"26","author":"Y Jiang","year":"2015","unstructured":"Jiang, Y., Zhang, H., Zhang, H., Liu, H., Song, X., Gu, M., et al. (2015). Design of mixed synchronous\/asynchronous systems with multiple clocks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2220\u20132232.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"8","key":"321_CR16","doi-asserted-by":"crossref","first-page":"2220","DOI":"10.1109\/TPDS.2014.2346171","volume":"26","author":"Y Jiang","year":"2015","unstructured":"Jiang, Y., Zhang, H., Zhang, H., Liu, H., Song, X., Gu, M., et al. (2015). Design of mixed synchronous\/asynchronous systems with multiple clocks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2220\u20132232.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"321_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2527796","author":"G Bin","year":"2016","unstructured":"Bin, G., & Sheng, V. S. (2016). A robust regularization path algorithm for v-support vector classification. IEEE Transactions on Neural Networks and Learning Systems,. doi: 10.1109\/TNNLS.2016.2527796 .","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"5","key":"321_CR18","doi-asserted-by":"crossref","first-page":"4794","DOI":"10.3390\/s110504794","volume":"11","author":"W Wei","year":"2011","unstructured":"Wei, W., & Qi, Y. (2011). Information potential fields navigation in wireless Ad-Hoc sensor networks. Sensors, 11(5), 4794\u20134807.","journal-title":"Sensors"},{"issue":"2","key":"321_CR19","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/TIE.2014.2316234","volume":"62","author":"Y Jiang","year":"2015","unstructured":"Jiang, Y., Zhang, H., Li, Z., Deng, Y., Song, X., Gu, M., et al. (2015). Design and optimization of multiclocked embedded systems using formal techniques. IEEE Transactions on Industrial Electronics, 62(2), 1270\u20131278.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"11","key":"321_CR20","doi-asserted-by":"crossref","first-page":"5325","DOI":"10.1109\/TIE.2012.2225393","volume":"60","author":"Y Jiang","year":"2013","unstructured":"Jiang, Y., Zhang, H., Song, X., Jiao, X., William, N. N., Hung, W. N., et al. (2013). Bayesian-network-based reliability analysis of PLC systems. IEEE Transactions on Industrial Electronics, 60(11), 5325\u20135336.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"11","key":"321_CR21","doi-asserted-by":"crossref","first-page":"3013","DOI":"10.1002\/dac.2522","volume":"27","author":"W Wei","year":"2014","unstructured":"Wei, W., et al. (2014). GI\/Geom\/1 queue based on communication model for mesh networks. International Journal of Communication Systems, 27(11), 3013\u20133029.","journal-title":"International Journal of Communication Systems"},{"doi-asserted-by":"publisher","unstructured":"Wei, W., Fan, X., Song, H., Fan, X., & Yang, J. (2016). Imperfect information dynamic Stackelberg game based resource allocation using hidden Markov for cloud computing. IEEE Transactions on Service Computing. doi: 10.1109\/TSC.2016.2528246 .","key":"321_CR22","DOI":"10.1109\/TSC.2016.2528246"},{"issue":"10","key":"321_CR23","doi-asserted-by":"crossref","first-page":"2563","DOI":"10.1109\/TC.2013.124","volume":"63","author":"H Zhang","year":"2014","unstructured":"Zhang, H., Jiang, Y., Hung, W. N. N., Song, X., Gu, M., & Sun, J.-G. (2014). Symbolic analysis of programmable logic controllers. The IEEE Transactions on Computers, 63(10), 2563\u20132575.","journal-title":"The IEEE Transactions on Computers"},{"doi-asserted-by":"publisher","unstructured":"Wei, W., Qiang, Y., & Zhang, J. (2013). A bijection between lattice-valued filters and lattice-valued congruences in residuated lattices. Mathematical Problems in Engineering. doi: 10.1155\/2013\/908623 .","key":"321_CR24","DOI":"10.1155\/2013\/908623"},{"doi-asserted-by":"crossref","unstructured":"Wei, W., Srivastava, H. M., Zhang, Y., Wang, L., Shen, P., & Zhang, J. (2014). A local fractional integral inequality on fractal space analogous to Andersons inequality. In Abstract and Applied Analysis (Vol. 2014). Hindawi Publishing Corporation.","key":"321_CR25","DOI":"10.1155\/2014\/797561"},{"issue":"12","key":"321_CR26","doi-asserted-by":"crossref","first-page":"3526","DOI":"10.1109\/TCOMM.2010.101910.100004","volume":"58","author":"C Angerer","year":"2010","unstructured":"Angerer, C., Langwieser, R., & Rupp, M. (2010). RFID reader receivers for physical layer collision recovery. IEEE Transcations on Communications, 58(12), 3526\u20133537.","journal-title":"IEEE Transcations on Communications"},{"issue":"2","key":"321_CR27","first-page":"174","volume":"3","author":"W Su","year":"2010","unstructured":"Su, W., Alchazidis, N. V., & Ha, T. T. (2010). Multiple RFID tags access algorithm. IEEE Transactions on Mobile Computing, 3(2), 174\u2013187.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"3","key":"321_CR28","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., & Sun, X. (2015). Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507\u2013518.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"doi-asserted-by":"crossref","unstructured":"Jiang, Y., Yang, Y., Liu, H., Kong, H., Gu, M., & Sun, J.-G., et al. (2016). From Stateflow simulation to verified implementation: A verification approach and a real-time train controller design. In RTAS (pp. 231\u2013241).","key":"321_CR29","DOI":"10.1109\/RTAS.2016.7461337"},{"issue":"17","key":"321_CR30","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1049\/el.2014.1552","volume":"50","author":"H Landaluce","year":"2014","unstructured":"Landaluce, H., Perallos, A., Bengtsson, L., & Carcia, I. J. (2014). Simplified computation in memoryless anti-collision RFID identification protocols. Electronics Letters, 50(17), 1250\u20131252.","journal-title":"Electronics Letters"},{"unstructured":"EPCglobal. (2013). EPC radio-frequency identify protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz\u2013960 MHz ver. 2. 2. 0.","key":"321_CR31"},{"issue":"2","key":"321_CR32","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TBC.2015.2419824","volume":"61","author":"Zhaoqing Pan","year":"2015","unstructured":"Pan, Zhaoqing, Zhang, Yun, & Kwong, Sam. (2015). Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Transactions on Broadcasting, 61(2), 166\u2013176.","journal-title":"IEEE Transactions on Broadcasting"},{"issue":"2","key":"321_CR33","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia, Z., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340\u2013352.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"doi-asserted-by":"publisher","unstructured":"Zhangjie, F., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems,. doi: 10.1109\/TPDS.2015.2506573 .","key":"321_CR34","DOI":"10.1109\/TPDS.2015.2506573"},{"doi-asserted-by":"crossref","unstructured":"Bin, G., Sheng, V. S., Tay, K. Y., Romano, W., & Li, S. (2015). Incremental support vector learning for ordinal regression. IEEE Transactions on Neural Networks and Learning Systems, 26(7), 1403\u20131416.","key":"321_CR35","DOI":"10.1109\/TNNLS.2014.2342533"},{"key":"321_CR36","first-page":"1","volume":"2012","author":"W Wei","year":"2012","unstructured":"Wei, W., Yang, X.-L., Shen, P.-Y., & Zhou, B. (2012). Holes detection in anisotropic sensornets: Topological methods. International Journal of Distributed Sensor Networks, 2012, 1\u20139.","journal-title":"International Journal of Distributed Sensor Networks"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-017-0321-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-017-0321-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-017-0321-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:26:16Z","timestamp":1719188776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-017-0321-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,8]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["321"],"URL":"https:\/\/doi.org\/10.1007\/s11235-017-0321-4","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2017,5,8]]}}}