{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:03:36Z","timestamp":1760241816873,"version":"build-2065373602"},"reference-count":16,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Radio frequency identification (RFID) technology has widely been used in the last few years. Its applications focus on auto identification, tracking, and data capturing issues. However, RFID suffers from the main problem of tags collision when multiple tags simultaneously respond to the reader request. Many protocols were proposed to solve the collision problems with good identification efficiency and an acceptable time delay, such as the blocking anti-collision protocol (BA). Nevertheless, most of these protocols assumed that the RFID reader could decode the tag\u2019s signal only when there was one tag responding to the reader request once each time. Hence, they ignored the phenomenon of the capture effect, which results in identifying the tag with the stronger signal as the multiple tags simultaneously respond. As a result, many tags will not be identified under the capture effect. Therefore, the purpose of this paper is to take the capture effect phenomenon into consideration in order to modify the blocking BA protocol to ensure a full read rate, i.e., identifying all the tags in the frame without losing any tag. Moreover, the modifications include distinguishing between collision and interference responses (for the period of staying tags) in the noisy environments, for the purpose of enhancing the efficiency of the identification. Finally, the simulation and analytical results show that our modifications and MBA protocol outperform the previous protocols in the same field, such as generalized query tree protocols (GQT1 and GQT2), general binary tree (GBT), and tweaked binary tree (TBT).<\/jats:p>","DOI":"10.3390\/fi10100096","type":"journal-article","created":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T08:23:50Z","timestamp":1538468630000},"page":"96","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Modified BA Anti-Collision Protocol for Coping with Capture Effect and Interference in RFID Systems"],"prefix":"10.3390","volume":"10","author":[{"given":"Isam A.","family":"Hussein","sequence":"first","affiliation":[{"name":"Electrical Engineering Department, College of Engineering, University of Basrah, Basra, Iraq"}]},{"given":"Basil H.","family":"Jasim","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, College of Engineering, University of Basrah, Basra, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9836-6796","authenticated-orcid":false,"given":"Ramzy S.","family":"Ali","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, College of Engineering, University of Basrah, Basra, Iraq"}]}],"member":"1968","published-online":{"date-parts":[[2018,10,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MP.2005.1549751","article-title":"The History of RFID","volume":"24","author":"Landt","year":"2005","journal-title":"IEEE Potentials"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"151","DOI":"10.7763\/IJCEE.2011.V3.306","article-title":"RFID Technology Principles, Advantages, Limitations & Its Applications","volume":"3","author":"Kaur","year":"2011","journal-title":"Int. J. Comput. Electr. Eng."},{"key":"ref_3","unstructured":"Victor, K.Y.W., and Roy, H.C. (2009, January 10\u201313). Using Generalized Query Tree to cope with the Capture Effect in RFID Singulation. Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/LCOMM.2010.03.092208","article-title":"General Binary Tree Protocol for Coping with the Capture Effect in RFID Tag Identification","volume":"14","author":"Lai","year":"2010","journal-title":"IEEE Commun. Lett."},{"key":"ref_5","unstructured":"Chuyen, T.N., Bui, A.H., Vuong, V.M., and Pham, A.T. (2015, January 14\u201316). Tweaked Binary Tree Algorithm to Cope with Capture Effect and Detection Error in RFID Systems. Proceedings of the 21st Asia-Pacific Conference on Communications (APCC), Kyoto, Japan."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"5493","DOI":"10.1109\/TWC.2013.092013.121322","article-title":"Assigned Tree Slotted Aloha RFID Tag Anti-Collision Protocols","volume":"12","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_7","first-page":"1217","article-title":"Tag Anti-collision Algorithms in RFID Systems\u2014A New Trend","volume":"8","author":"Alotaibi","year":"2009","journal-title":"WSEAS Trans. Commun."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Xin, Z., Ye, L., and Jie, D. (2011, January 18\u201320). A Multi-Level Framed Slotted ALOHA Algorithm for RFID. Proceedings of the IEEE Third International Conference on Communications and Mobile Computing, Qingdao, China.","DOI":"10.1109\/CMC.2011.64"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Bagnato, G., Maselli, G., Petrioli, C., and Vicari, C. (2009, January 26\u201329). Performance analysis of anti-collision protocols for RFID systems. Proceedings of the IEEE 69th Vehicular Technology Conference, Barcelona, Spain.","DOI":"10.1109\/VETECS.2009.5073775"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/SURV.2010.031810.00037","article-title":"A Survey and Tutorial of RFID Anti-Collision Protocols","volume":"12","author":"Klair","year":"2010","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","unstructured":"Lai, Y.C., and Lin, C.C. (2009, January 28\u201330). A Blocking RFID Anti-collision Protocol for Quick Tag Identification. Proceedings of the IEEE International Conference on Wireless and Optical Communications Networks (IFIP), Cairo, Egypt."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1109\/LCOMM.2016.2521839","article-title":"An Effective Frame Breaking Policy for Dynamic Framed Slotted Aloha in RFID","volume":"20","author":"Sheng","year":"2016","journal-title":"IEEE Commun. Lett."},{"key":"ref_13","unstructured":"Aboghsesa, S.M., Abdala, T.M., and Daud, N. (2015, January 8\u20139). Analysis and Simulation of Slotted Aloha-Based RFID Anti-Collision Protocol. Proceedings of the International Conference on Network Security & Computer Science (ICNSCS), Kuala Lumpur, Malaysia."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Yang, L., Han, J., Qi, Y., Wang, C., Liu, Y., Cheng, Y., and Zhong, X. (2010, January 13\u201316). Revisting Tag Collision Problem in RFID Systems. Proceedings of the 39th IEEE International Conference on Parallel Processing, San Diego, CA, USA.","DOI":"10.1109\/ICPP.2010.27"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1109\/TPDS.2007.1020","article-title":"Tag-Splitting: Adaptive Collision Arbitration Protocols for RFID Tag Identification","volume":"18","author":"Myung","year":"2007","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_16","unstructured":"Myung, J., and Lee, W. (2005, January 7). Adaptive Binary Splitting: A RFID Tag Collision Arbitration Protocol for Tag Identification. Proceedings of the 2nd International Conference on Broadband Networks, Boston, MA, USA."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/10\/96\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:23:29Z","timestamp":1760196209000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/10\/96"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":16,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2018,10]]}},"alternative-id":["fi10100096"],"URL":"https:\/\/doi.org\/10.3390\/fi10100096","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2018,10,1]]}}}