{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:01:50Z","timestamp":1773702110061,"version":"3.50.1"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11276-020-02466-1","type":"journal-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T13:03:09Z","timestamp":1602162189000},"page":"621-634","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Novel RFID anti-collision algorithm based on the Monte\u2013Carlo query tree search"],"prefix":"10.1007","volume":"27","author":[{"given":"Mohammad Mehdi","family":"Samsami","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7749-9925","authenticated-orcid":false,"given":"Navid","family":"Yasrebi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,8]]},"reference":[{"issue":"1","key":"2466_CR1","first-page":"9","volume":"25","author":"CM Roberts","year":"2005","unstructured":"Roberts, C. M. (2005). Radio frequency identification (RFID). Computers & Security, 25(1), 9.","journal-title":"Computers & Security"},{"issue":"6","key":"2466_CR2","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1023\/B:WINE.0000044028.20424.85","volume":"10","author":"K R\u00f6mer","year":"2004","unstructured":"R\u00f6mer, K., Schoch, T., Mattern, F., & D\u00fcbendorfer, T. (2004). Smart identification frameworks for ubiquitous computing applications. Wireless Networks, 10(6), 689\u2013700. https:\/\/doi.org\/10.1023\/B:WINE.0000044028.20424.85.","journal-title":"Wireless Networks"},{"key":"2466_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10169-9","volume-title":"Chipless RFID: Design Procedure and Detection Techniques","author":"R Rezaiesarlak","year":"2015","unstructured":"Rezaiesarlak, R., & Manteghi, M. (2015). Chipless RFID: Design procedure and detection techniques. Berlin: Springer"},{"issue":"1","key":"2466_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/jrfid.2018.2828094","volume":"2","author":"AA Mbacke","year":"2018","unstructured":"Mbacke, A. A., Mitton, N., & Rivano, H. (2018). A Survey of RFID readers anticollision protocols. IEEE Journal of Radio Frequency Identification, 2(1), 38\u201348. https:\/\/doi.org\/10.1109\/jrfid.2018.2828094.","journal-title":"IEEE Journal of Radio Frequency Identification"},{"key":"2466_CR5","volume-title":"Why a universal RFID infrastructure would be a good thing","author":"P Magrassi","year":"2002","unstructured":"Magrassi, P. (2002). Why a universal RFID infrastructure would be a good thing (Vol. G00106518). Gartner Research Report, Gartner."},{"key":"2466_CR6","doi-asserted-by":"publisher","unstructured":"Bag, J., Roy, S., & Sarkar, S. K. (2017). Anti-collision algorithm for RFID system using adaptive Bayesian Belief Networks and it's VLSI Implementation. In International conference on intelligent systems and control (ISCQ), Coimbatore, India, (pp. 314\u2013317). https:\/\/doi.org\/10.1109\/ISCO.2017.7856007.","DOI":"10.1109\/ISCO.2017.7856007"},{"issue":"1","key":"2466_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.5121\/ijcnc.2017.9107","volume":"9","author":"B Alsinglawi","year":"2017","unstructured":"Alsinglawi, B., Elkhodr, M., Nguyen, Q. V., Gunawardana, U., Maeder, A., & Simoff, S. (2017). RFID localisation for internet of things smart homes: A survey. International Journal of Computer Networks & Communications, 9(1), 81\u201399. https:\/\/doi.org\/10.5121\/ijcnc.2017.9107.","journal-title":"International Journal of Computer Networks & Communications"},{"key":"2466_CR8","unstructured":"Lacmanovic, I., Radulovic, B., & Lacmanovic, D. (2010). Contactless payment systems based on RFID Technology. In International Convention MIPRO, Opatija, Croatia, (pp. 1114\u20131119)."},{"issue":"1","key":"2466_CR9","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/tie.2014.2327560","volume":"62","author":"D Wang","year":"2015","unstructured":"Wang, D., Hu, J., & Tan, H.-Z. (2015). A highly stable and reliable 13.56-MHz RFID tag IC for contactless payment. IEEE Transactions on Industrial Electronics, 62(1), 545\u2013554. https:\/\/doi.org\/10.1109\/tie.2014.2327560.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"3","key":"2466_CR10","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/mce.2016.2556900","volume":"5","author":"K Michael","year":"2016","unstructured":"Michael, K. (2016). RFID\/NFC implants for bitcoin transactions. IEEE Consumer Electronics Magazine, 5(3), 103\u2013106. https:\/\/doi.org\/10.1109\/mce.2016.2556900.","journal-title":"IEEE Consumer Electronics Magazine"},{"issue":"5","key":"2466_CR11","doi-asserted-by":"publisher","first-page":"2885","DOI":"10.1109\/TNET.2015.2501103","volume":"24","author":"J Han","year":"2016","unstructured":"Han, J., Ding, H., Qian, C., Xi, W., Wang, Z., Jiang, Z., et al. (2016). CBID: A customer behavior identification system using passive tags. IEEE\/ACM Transactions on Networking, 24(5), 2885\u20132898. https:\/\/doi.org\/10.1109\/TNET.2015.2501103.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"2466_CR12","doi-asserted-by":"publisher","first-page":"2405","DOI":"10.1109\/tnet.2017.2689063","volume":"25","author":"Z Zhou","year":"2017","unstructured":"Zhou, Z., Shangguan, L., Zheng, X., Yang, L., & Liu, Y. (2017). Design and implementation of an RFID-based customer shopping behavior mining system. IEEE\/ACM Transactions on Networking, 25(4), 2405\u20132418. https:\/\/doi.org\/10.1109\/tnet.2017.2689063.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"2466_CR13","doi-asserted-by":"publisher","unstructured":"Shangguan, L., Zhou, Z., Zheng, X., Yang, L., Liu, Y., & Han, J. (2015). ShopMiner: Mining customer shopping behavior in physical clothing stores with COTS RFID devices. In ACM conference on embedded networked sensor systems, Seoul, South Korea, (pp. 113\u2013125). https:\/\/doi.org\/10.1145\/2809695.2809710.","DOI":"10.1145\/2809695.2809710"},{"issue":"3","key":"2466_CR14","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1108\/01443571211212600","volume":"32","author":"PJ Zelbst","year":"2012","unstructured":"Zelbst, P. J., Green, K. W., Sower, V. E., & Reyes, P. M. (2012). Impact of RFID on manufacturing effectiveness and efficiency. International Journal of Operations & Production Management, 32(3), 329\u2013350. https:\/\/doi.org\/10.1108\/01443571211212600.","journal-title":"International Journal of Operations & Production Management"},{"key":"2466_CR15","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-030-05645-2_10","volume-title":"An online RFID localization in the manufacturing shopfloor in predictive maintenance in dynamic systems","author":"A Ashfahani","year":"2019","unstructured":"Ashfahani, A., Pratama, M., Lughofer, E., Cai, Q., & Sheng, H. (2019). An online RFID localization in the manufacturing shopfloor in predictive maintenance in dynamic systems (pp. 287\u2013309). Cham: Springer."},{"issue":"1","key":"2466_CR16","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1108\/02635570610641013","volume":"106","author":"JL Hou","year":"2006","unstructured":"Hou, J. L., & Huang, C. H. (2006). Quantitative performance evaluation of RFID applications in the supply chain of the printing industry. Industrial Management & Data Systems, 106(1), 96\u2013120. https:\/\/doi.org\/10.1108\/02635570610641013.","journal-title":"Industrial Management & Data Systems"},{"issue":"1","key":"2466_CR17","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1504\/IJASM.2006.008860","volume":"1","author":"BH Lu","year":"2006","unstructured":"Lu, B. H., Bateman, R. J., & Cheng, K. (2006). RFID enabled manufacturing: Fundamentals, methodology and applications. International Journal of Agile Systems and Management, 1(1), 73\u201392. https:\/\/doi.org\/10.1504\/IJASM.2006.008860.","journal-title":"International Journal of Agile Systems and Management"},{"issue":"5","key":"2466_CR18","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/j.techfore.2010.03.006","volume":"77","author":"Y-M Wang","year":"2010","unstructured":"Wang, Y.-M., Wang, Y.-S., & Yang, Y.-F. (2010). Understanding the determinants of RFID adoption in the manufacturing industry. Technological Forecasting and Social Change, 77(5), 803\u2013815. https:\/\/doi.org\/10.1016\/j.techfore.2010.03.006.","journal-title":"Technological Forecasting and Social Change"},{"key":"2466_CR19","doi-asserted-by":"crossref","unstructured":"Thapa, R. R., Bhuiyan, M., Krishna, A., & Prasad, P. W. C. (2018). Application of RFID technology to reduce overcrowding in hospital emergency departments. In Advances in information systems development, Lecture Notes in Information Systems and Organisation (pp. 17\u201332).","DOI":"10.1007\/978-3-319-74817-7_2"},{"issue":"3","key":"2466_CR20","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s11277-016-3525-0","volume":"91","author":"Y-T Liao","year":"2016","unstructured":"Liao, Y.-T., Chen, T.-L., Chen, T.-S., Zhong, Z.-H., & Hwang, J.-H. (2016). The application of RFID to healthcare management of nursing house. Wireless Personal Communications, 91(3), 1237\u20131257. https:\/\/doi.org\/10.1007\/s11277-016-3525-0.","journal-title":"Wireless Personal Communications"},{"key":"2466_CR21","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.procs.2016.02.090","volume":"78","author":"SV Zanjal","year":"2016","unstructured":"Zanjal, S. V., & Talmale, G. R. (2016). Medicine reminder and monitoring system for secure health using IOT. Procedia Computer Science, 78, 471\u2013476. https:\/\/doi.org\/10.1016\/j.procs.2016.02.090.","journal-title":"Procedia Computer Science"},{"key":"2466_CR22","doi-asserted-by":"publisher","unstructured":"Chowdhury, B., & Khosla, R. RFID-based hospital real-time patient management system. In IEEE\/ACIS international conference on computer and information science (ICIS), Melbourne, Australia, 2007 (pp. 363\u2013368). https:\/\/doi.org\/10.1109\/ICIS.2007.159.","DOI":"10.1109\/ICIS.2007.159"},{"issue":"10","key":"2466_CR23","doi-asserted-by":"publisher","first-page":"8645","DOI":"10.1016\/j.eswa.2012.01.201","volume":"39","author":"AY-L Chong","year":"2012","unstructured":"Chong, A. Y.-L., & Chan, F. T. S. (2012). Structural equation modeling for multi-stage analysis on radio frequency identification (RFID) diffusion in the health care industry. Expert Systems with Applications, 39(10), 8645\u20138654. https:\/\/doi.org\/10.1016\/j.eswa.2012.01.201.","journal-title":"Expert Systems with Applications"},{"key":"2466_CR24","doi-asserted-by":"publisher","unstructured":"Woo-Garcia, R. M., Lomeli-Dorantes, U. H., L\u00f3pez-Huerta, F., Herrera-May, A. L., & Mart\u00ednez-Castillo, J. Design and implementation of a system access control by RFID. In IEEE Engineering Summit (IE-Summit), Boca del Rio, Mexico, 2016 (pp. 1\u20134). https:\/\/doi.org\/10.1109\/IESummit.2016.7459759.","DOI":"10.1109\/IESummit.2016.7459759"},{"key":"2466_CR25","doi-asserted-by":"publisher","unstructured":"Chen, B.-C., Yang, C.-T., Yeh, H.-T., & Lin, C.-C. (2016). Mutual authentication protocol for role-based access control using mobile RFID. Applied Sciences, 6(8), https:\/\/doi.org\/10.3390\/app6080215.","DOI":"10.3390\/app6080215"},{"issue":"3","key":"2466_CR26","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1007\/s11276-017-1638-3","volume":"25","author":"A Ibrahim","year":"2019","unstructured":"Ibrahim, A., & Dalk\u0131l\u0131c, G. (2019). Review of different classes of RFID authentication protocols. Wireless Networks, 25(3), 961\u2013974. https:\/\/doi.org\/10.1007\/s11276-017-1638-3.","journal-title":"Wireless Networks"},{"key":"2466_CR27","unstructured":"Li, D., Yang, H., Fred, K., & Chen, Y. A. (2015). Staff access control system based on RFID technology. In international conference on sensors, measurement and intelligent materials (ICSMIM), Shenzhen, China, Atlantis Press."},{"issue":"4","key":"2466_CR28","doi-asserted-by":"publisher","first-page":"8277","DOI":"10.1016\/j.eswa.2008.10.011","volume":"36","author":"TC Poon","year":"2009","unstructured":"Poon, T. C., Choy, K. L., Chow, H. K. H., Lau, H. C. W., Chan, F. T. S., & Ho, K. C. (2009). A RFID case-based logistics resource management system for managing order-picking operations in warehouses. Expert Systems with Applications, 36(4), 8277\u20138301. https:\/\/doi.org\/10.1016\/j.eswa.2008.10.011.","journal-title":"Expert Systems with Applications"},{"key":"2466_CR29","doi-asserted-by":"publisher","unstructured":"Wang, R., Tsai, W., He, J., Liu, C., Li, Q., & Deng, E. (2019). Logistics management system based on permissioned blockchains and RFID technology. In: International conference on computer, network, communication and information systems (CNCI), Qingdao, China (pp. 426\u2013432). https:\/\/doi.org\/10.2991\/cnci-19.2019.58.","DOI":"10.2991\/cnci-19.2019.58"},{"issue":"15\u201316","key":"2466_CR30","doi-asserted-by":"publisher","first-page":"6082","DOI":"10.1016\/j.eswa.2015.04.001","volume":"42","author":"RR Oliveira","year":"2015","unstructured":"Oliveira, R. R., Cardoso, I. M. G., Barbosa, J. L. V., da Costa, C. A., & Prado, M. P. (2015). An intelligent model for logistics management based on geofencing algorithms and RFID technology. Expert Systems with Applications, 42(15\u201316), 6082\u20136097. https:\/\/doi.org\/10.1016\/j.eswa.2015.04.001.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"2466_CR31","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.jnca.2010.04.017","volume":"34","author":"H Yang","year":"2011","unstructured":"Yang, H., Yang, L., & Yang, S.-H. (2011). Hybrid Zigbee RFID sensor network for humanitarian logistics centre management. Journal of Network and Computer Applications, 34(3), 938\u2013948. https:\/\/doi.org\/10.1016\/j.jnca.2010.04.017.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"2466_CR32","doi-asserted-by":"publisher","first-page":"4225","DOI":"10.3390\/s140304225","volume":"14","author":"J Wang","year":"2014","unstructured":"Wang, J., Ni, D., & Li, K. (2014). RFID-based vehicle positioning and its applications in connected vehicles. Sensors (Basel, Switzerland), 14(3), 4225\u20134238. https:\/\/doi.org\/10.3390\/s140304225.","journal-title":"Sensors (Basel, Switzerland)"},{"issue":"5","key":"2466_CR33","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/mpot.2015.2410309","volume":"34","author":"RE Floyd","year":"2015","unstructured":"Floyd, R. E. (2015). RFID in transportation. IEEE Potentials, 34(5), 19\u201321. https:\/\/doi.org\/10.1109\/mpot.2015.2410309.","journal-title":"IEEE Potentials"},{"key":"2466_CR34","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.proeng.2015.12.163","volume":"129","author":"A Provotorov","year":"2015","unstructured":"Provotorov, A., Privezentsev, D., & Astafiev, A. (2015). Development of methods for determining the locations of large industrial goods during transportation on the basis of RFID. Procedia Engineering, 129, 1005\u20131009. https:\/\/doi.org\/10.1016\/j.proeng.2015.12.163.","journal-title":"Procedia Engineering"},{"key":"2466_CR35","doi-asserted-by":"publisher","DOI":"10.1002\/9780470665121","volume-title":"RFID handbook: Fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication","author":"K Finkenzeller","year":"2010","unstructured":"Finkenzeller, K. (2010). RFID handbook: Fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication. Hoboken: Wiley."},{"issue":"1","key":"2466_CR36","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/tii.2009.2033050","volume":"6","author":"Y-H Chen","year":"2010","unstructured":"Chen, Y.-H., Horng, S.-J., Run, R.-S., Lai, J.-L., Chen, R.-J., Chen, W.-C., et al. (2010). A novel anti-collision algorithm in rfid systems for identifying passive tags. IEEE Transactions on Industrial Informatics, 6(1), 105\u2013121. https:\/\/doi.org\/10.1109\/tii.2009.2033050.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"2466_CR37","doi-asserted-by":"publisher","unstructured":"Hai, L., Wang, R., & Xiao, L. (2013). A novel RFID anti-collision algorithm based on binary tree. Journal of Networks, 8(12), https:\/\/doi.org\/10.4304\/jnw.8.12.2885-2892.","DOI":"10.4304\/jnw.8.12.2885-2892"},{"issue":"3","key":"2466_CR38","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/lcomm.2010.03.092208","volume":"14","author":"Y-C Lai","year":"2010","unstructured":"Lai, Y.-C., & Hsiao, L.-Y. (2010). General binary tree protocol for coping with the capture effect in RFID tag identification. IEEE Communications Letters, 14(3), 208\u2013210. https:\/\/doi.org\/10.1109\/lcomm.2010.03.092208.","journal-title":"IEEE Communications Letters"},{"issue":"8","key":"2466_CR39","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1109\/lcomm.2010.08.100539","volume":"14","author":"J Choi","year":"2010","unstructured":"Choi, J., Lee, I., Du, D.-Z., & Lee, W. (2010). FTTP: A fast tree traversal protocol for efficient tag identification in RFID networks. IEEE Communications Letters, 14(8), 713\u2013715. https:\/\/doi.org\/10.1109\/lcomm.2010.08.100539.","journal-title":"IEEE Communications Letters"},{"issue":"12","key":"2466_CR40","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/lcomm.2006.061348","volume":"10","author":"J Choi","year":"2006","unstructured":"Choi, J., Lee, D., & Lee, H. (2006). Bi-slotted tree based anti-collision protocols for fast tag identification in RFID systems. IEEE Communications Letters, 10(12), 861\u2013863. https:\/\/doi.org\/10.1109\/lcomm.2006.061348.","journal-title":"IEEE Communications Letters"},{"issue":"17","key":"2466_CR41","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1016\/j.comcom.2009.07.011","volume":"32","author":"M-K Yeh","year":"2009","unstructured":"Yeh, M.-K., Jiang, J.-R., & Huang, S.-T. (2009). Adaptive splitting and pre-signaling for RFID tag anti-collision. Computer Communications, 32(17), 1862\u20131870. https:\/\/doi.org\/10.1016\/j.comcom.2009.07.011.","journal-title":"Computer Communications"},{"key":"2466_CR42","doi-asserted-by":"crossref","unstructured":"Hui, G., Yan, Z., Zhang, B., & Yu, F. (2017). Improved RFID anti-collision algorithm based on quad-tree. Paper presented at the IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), Guangzhou, China.","DOI":"10.1109\/CSE-EUC.2017.38"},{"issue":"1","key":"2466_CR43","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/tase.2008.2007266","volume":"6","author":"Y Maguire","year":"2009","unstructured":"Maguire, Y., & Pappu, R. (2009). An optimal Q-algorithm for the ISO 18000\u20136C RFID protocol. IEEE Transactions on Automation Science and Engineering, 6(1), 16\u201324. https:\/\/doi.org\/10.1109\/tase.2008.2007266.","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"issue":"11","key":"2466_CR44","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/lcomm.2008.081157","volume":"12","author":"J-B Eom","year":"2008","unstructured":"Eom, J.-B., Lee, T.-J., Rietman, R., & Yener, A. (2008). An efficient framed-slotted ALOHA algorithm with pilot frame and binary selection for anti-collision of RFID tags. IEEE Communications Letters, 12(11), 861\u2013863. https:\/\/doi.org\/10.1109\/lcomm.2008.081157.","journal-title":"IEEE Communications Letters"},{"issue":"3","key":"2466_CR45","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/lcomm.2011.011311.101332","volume":"15","author":"B Li","year":"2011","unstructured":"Li, B., & Wang, J. (2011). Efficient anti-collision algorithm utilizing the capture effect for ISO 18000\u20136C RFID protocol. IEEE Communications Letters, 15(3), 352\u2013354. https:\/\/doi.org\/10.1109\/lcomm.2011.011311.101332.","journal-title":"IEEE Communications Letters"},{"issue":"2","key":"2466_CR46","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/tmc.2010.58","volume":"10","author":"TF La Porta","year":"2011","unstructured":"La Porta, T. F., Maselli, G., & Petrioli, C. (2011). Anticollision protocols for single-reader RFID systems: Temporal analysis and optimization. IEEE Transactions on Mobile Computing, 10(2), 267\u2013279. https:\/\/doi.org\/10.1109\/tmc.2010.58.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"8","key":"2466_CR47","doi-asserted-by":"publisher","first-page":"2285","DOI":"10.1109\/tcomm.2012.051512.110448","volume":"60","author":"X Jia","year":"2012","unstructured":"Jia, X., Feng, Q., & Yu, L. (2012). Stability analysis of an efficient anti-collision protocol for RFID tag identification. IEEE Transactions on Communications, 60(8), 2285\u20132294. https:\/\/doi.org\/10.1109\/tcomm.2012.051512.110448.","journal-title":"IEEE Transactions on Communications"},{"issue":"11","key":"2466_CR48","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1109\/lcomm.2010.091710.100793","volume":"14","author":"X Jia","year":"2010","unstructured":"Jia, X., Feng, Q., & Ma, C. (2010). An efficient anti-collision protocol for RFID tag identification. IEEE Communications Letters, 14(11), 1014\u20131016. https:\/\/doi.org\/10.1109\/lcomm.2010.091710.100793.","journal-title":"IEEE Communications Letters"},{"key":"2466_CR49","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3390\/info9030063","volume":"9","author":"B Liu","year":"2018","unstructured":"Liu, B., & Su, X. (2018). An anti-collision algorithm for RFID based on an array and encoding scheme. Information, 9, 63. https:\/\/doi.org\/10.3390\/info9030063.","journal-title":"Information"},{"key":"2466_CR50","doi-asserted-by":"publisher","unstructured":"Law, C., Lee, K., & Siu, K.-Y. (2000). Efficient memoryless protocol for tag identification. In International workshop on discrete algorithms and methods for mobile computing and communications, Boston, Massachusetts, USA (pp. 75\u201384). 345865 ACM. https:\/\/doi.org\/10.1145\/345848.345865.","DOI":"10.1145\/345848.345865"},{"issue":"3","key":"2466_CR51","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/lcomm.2013.012313.122094","volume":"17","author":"J Shin","year":"2013","unstructured":"Shin, J., Jeon, B., & Yang, D. (2013). Multiple RFID tags Identification with M-ary query tree scheme. IEEE Communications Letters, 17(3), 604\u2013607. https:\/\/doi.org\/10.1109\/lcomm.2013.012313.122094.","journal-title":"IEEE Communications Letters"},{"issue":"4","key":"2466_CR52","first-page":"85","volume":"9","author":"T Agrawal","year":"2012","unstructured":"Agrawal, T., Biswas, P. K., & Raoot, A. D. (2012). An optimized query tree algorithm in RFID inventory tracking\u2014a case study evidence. International Journal of Computer Science Issues, 9(4), 85\u201393.","journal-title":"International Journal of Computer Science Issues"},{"key":"2466_CR53","doi-asserted-by":"publisher","unstructured":"Choi, J., & Lee, H. (2018). Novel query tree algorithm based on reservation and time-divided responses to support efficient anti-collision protocol. In International conference on ubiquitous and future networks (ICUFN), Prague, Czech Republic (pp. 421\u2013425). https:\/\/doi.org\/10.1109\/ICUFN.2018.8436700.","DOI":"10.1109\/ICUFN.2018.8436700"},{"key":"2466_CR54","doi-asserted-by":"publisher","unstructured":"Yang, F., Yang, Y., Chen, H., Ren, S., & Zhao, L. (2018). A low complexity anti-collision algorithm for RFID using query tree. In Cross strait quad-regional radio science and wireless technology conference (CSQRWC), Xuzhou, China (pp. 1\u20132). https:\/\/doi.org\/10.1109\/CSQRWC.2018.8455646.","DOI":"10.1109\/CSQRWC.2018.8455646"},{"issue":"17\u201318","key":"2466_CR55","doi-asserted-by":"publisher","first-page":"1754","DOI":"10.1016\/j.comcom.2013.09.001","volume":"36","author":"Y-C Lai","year":"2013","unstructured":"Lai, Y.-C., Hsiao, L.-Y., & Lin, B.-S. (2013). An RFID anti-collision algorithm with dynamic condensation and ordering binary tree. Computer Communications, 36(17\u201318), 1754\u20131767. https:\/\/doi.org\/10.1016\/j.comcom.2013.09.001.","journal-title":"Computer Communications"},{"issue":"8","key":"2466_CR56","doi-asserted-by":"publisher","first-page":"1220","DOI":"10.1016\/j.adhoc.2007.02.016","volume":"5","author":"MA Bonuccelli","year":"2007","unstructured":"Bonuccelli, M. A., Lonetti, F., & Martelli, F. (2007). Instant collision resolution for tag identification in RFID networks. Ad Hoc Networks, 5(8), 1220\u20131232. https:\/\/doi.org\/10.1016\/j.adhoc.2007.02.016.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"2466_CR57","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.aeue.2012.08.009","volume":"67","author":"M Djeddou","year":"2013","unstructured":"Djeddou, M., Khelladi, R., & Benssalah, M. (2013). Improved RFID anti-collision algorithm. AEU-International Journal of Electronics and Communications, 67(3), 256\u2013262. https:\/\/doi.org\/10.1016\/j.aeue.2012.08.009.","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"2466_CR58","doi-asserted-by":"publisher","unstructured":"Bai, Y., Yang, L., Zhang, G., & Xu, Y. (2017). An improved binary search RFID anti-collision algorithm. In International conference on computer science & education (ICCSE), Houston, TX, USA (pp. 435\u2013439). https:\/\/doi.org\/10.1109\/ICCSE.2017.8085531.","DOI":"10.1109\/ICCSE.2017.8085531"},{"issue":"6","key":"2466_CR59","first-page":"49","volume":"31","author":"W Xue","year":"2010","unstructured":"Xue, W., Zhi-Hong, Q., Zheng-Chao, H., & Yi-nan, L. (2010). Research on RFID anti-collision algorithms based on binary tree. Journal of Communications, 31(6), 49\u201357.","journal-title":"Journal of Communications"},{"issue":"1","key":"2466_CR60","first-page":"61","volume":"20","author":"US Mohammed","year":"2011","unstructured":"Mohammed, U. S., & Salah, M. (2011). Tag anti-collision algorithm for rfid systems with minimum overhead information in the identification process. Radioengineering, 20(1), 61\u201368.","journal-title":"Radioengineering"},{"issue":"1","key":"2466_CR61","doi-asserted-by":"publisher","first-page":"95","DOI":"10.3745\/jips.03.0010","volume":"11","author":"H Jung","year":"2015","unstructured":"Jung, H. (2015). A memory efficient anti-collision protocol to identify memoryless RFID TAGS. Journal of Information Processing Systems, 11(1), 95\u2013103. https:\/\/doi.org\/10.3745\/jips.03.0010.","journal-title":"Journal of Information Processing Systems"},{"key":"2466_CR62","volume-title":"Artificial intelligence: A modern approach","author":"S Russell","year":"2009","unstructured":"Russell, S., & Norvig, P. (2009). Artificial intelligence: A modern approach, (3rd ed.). Upper Saddle River: Prentice Hall Press.","edition":"3"},{"issue":"1","key":"2466_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/tciaig.2012.2186810","volume":"4","author":"CB Browne","year":"2012","unstructured":"Browne, C. B., Powley, E., Whitehouse, D., Lucas, S. M., Cowling, P. I., Rohlfshagen, P., et al. (2012). A survey of monte carlo tree search methods. IEEE Transactions on Computational Intelligence and AI in Games, 4(1), 1\u201343. https:\/\/doi.org\/10.1109\/tciaig.2012.2186810.","journal-title":"IEEE Transactions on Computational Intelligence and AI in Games"},{"key":"2466_CR64","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/978-1-4419-9863-7_875","volume-title":"Encyclopedia of Systems Biology","author":"JJ Lu","year":"2013","unstructured":"Lu, J. J., & Zhang, M. (2013). Heuristic search. In W. Dubitzky, O. Wolkenhauer, K.-H. Cho, & H. Yokota (Eds.) Encyclopedia of Systems Biology (pp. 885\u2013886). New York, NY: Springer.."},{"key":"2466_CR65","doi-asserted-by":"publisher","unstructured":"Coulom, R. Efficient selectivity and backup operators in Monte\u2013Carlo tree search. In: International conference on computers and games, Turin, Italy, 2006 (pp. 72\u201383). https:\/\/doi.org\/10.1007\/978-3-540-75538-8_7.","DOI":"10.1007\/978-3-540-75538-8_7"},{"key":"2466_CR66","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1038\/nature24270","volume":"550","author":"D Silver","year":"2017","unstructured":"Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A., et al. (2017). Mastering the game of Go without human knowledge. Nature, 550, 354\u2013371. https:\/\/doi.org\/10.1038\/nature24270.","journal-title":"Nature"},{"issue":"3","key":"2466_CR67","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1142\/S1793005708001094","volume":"4","author":"GMJB Chaslot","year":"2008","unstructured":"Chaslot, G. M. J. B., Winands, M. H. M., Uiterwijk, J. W. H. M., Herik, H. J., & Bouzy, B. (2008). Progressive strategies for Monte\u2013Carlo tree search. New Mathematics and Natural Computation, 4(3), 343\u2013359. https:\/\/doi.org\/10.1142\/S1793005708001094.","journal-title":"New Mathematics and Natural Computation"},{"key":"2466_CR68","doi-asserted-by":"crossref","unstructured":"Kocsis, L., & Szepesv\u00e1ri, C. (2006). Bandit based Monte\u2013Carlo planning. In: European conference on machine learning (ECML), Berlin, Germany, (pp. 282\u2013293). 10.1007\/11871842_29.","DOI":"10.1007\/11871842_29"},{"key":"2466_CR69","doi-asserted-by":"crossref","unstructured":"Xiaohao, S., & Baolong, L. (2017). An investigation on tree-based tags anti-collision algorithms in RFID. Paper presented at the international conference on computer network, electronic and automation (ICCNEA), Xi'an, China.","DOI":"10.1109\/ICCNEA.2017.19"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02466-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02466-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02466-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T14:45:20Z","timestamp":1633704320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02466-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,8]]},"references-count":69,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["2466"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02466-1","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,8]]},"assertion":[{"value":"18 September 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2020","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}