{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:38:29Z","timestamp":1741667909459,"version":"3.38.0"},"reference-count":19,"publisher":"SAGE Publications","issue":"2-3","license":[{"start":{"date-parts":[[2016,5,25]],"date-time":"2016-05-25T00:00:00Z","timestamp":1464134400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of RF Technologies: Research and Applications"],"published-print":{"date-parts":[[2016,5,25]]},"abstract":"<jats:p> This paper presents a new algorithm for RFID deployment in 3D space. We first introduce a cube-based model to describe both the reading space and the coverage space, which can be represented by a 3D matrix. Then, an improved particle swarm optimization algorithm is proposed to implement our cube-based model in the intensive RFID reader deployment. The proposed deployment algorithm is simple and neat, by addition of two matrices. Our solid simulation results show that our cube-based model with improved particle swarm optimization algorithm is a practical scheme for the RFID coverage problem in 3D space. <\/jats:p>","DOI":"10.3233\/rft-150076","type":"journal-article","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T11:48:16Z","timestamp":1464349696000},"page":"131-152","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Modeling RFID readers deployment in three-dimensional space"],"prefix":"10.1177","volume":"7","author":[{"given":"Shijie","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"}]},{"given":"Yun","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"}]},{"given":"Jin","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"}]}],"member":"179","published-online":{"date-parts":[[2016,5,25]]},"reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2008.06.013"},{"key":"ref002","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2005.1557073"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.680"},{"key":"ref004","doi-asserted-by":"crossref","unstructured":"DanevB., CapkunS., MastiR.J., et al. (2012). Towards Practical Identification of HF RFID Devices. 15(2), 1\u201324.","DOI":"10.1145\/2240276.2240278"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1126\/science.1093010"},{"key":"ref006","first-page":"1","volume-title":"In Proceedings of the Fourth European Conference on Antennas and Propagation","author":"Giampaolo E.D.","year":"2010"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2011.7.4.561"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2006.253899"},{"key":"ref009","doi-asserted-by":"crossref","unstructured":"GuptaN. (2005). RFIDPlanner - A Coverage Planning Tool for RFID Networks. Lecture Notes in Computer Science, Springer, 3823 LNCS., pp. 1047\u20131057.","DOI":"10.1007\/11596042_107"},{"issue":"5","key":"ref010","first-page":"413","volume":"9","author":"Hanning C.","year":"2008","journal-title":"Journal of PLA Univrsity of Science and Technology"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1002\/9780470772911"},{"issue":"9","key":"ref012","first-page":"1890","volume":"7","author":"Leian L.","year":"2007","journal-title":"Science Technology and Engineering"},{"key":"ref013","first-page":"3","author":"Melissen J.","year":"1996","journal-title":"Electronic Journal of Combinatories"},{"key":"ref014","unstructured":"O\u2019rourkeJ. (1987). Art gallery theorems and algorithms [M]. Oxford University Press."},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570744"},{"issue":"4","key":"ref016","first-page":"563","volume":"30","author":"Xue W.","year":"2007","journal-title":"Chinese Journal of Computers"},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.238"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2014.064425"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208965"}],"container-title":["International Journal of RF Technologies: Research and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/RFT-150076","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/RFT-150076","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/RFT-150076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T23:26:42Z","timestamp":1741649202000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/RFT-150076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,25]]},"references-count":19,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2016,5,25]]}},"alternative-id":["10.3233\/RFT-150076"],"URL":"https:\/\/doi.org\/10.3233\/rft-150076","relation":{},"ISSN":["1754-5730","1754-5749"],"issn-type":[{"type":"print","value":"1754-5730"},{"type":"electronic","value":"1754-5749"}],"subject":[],"published":{"date-parts":[[2016,5,25]]}}}