Next Article in Journal
Detection of Multiple Stationary Humans Using UWB MIMO Radar
Next Article in Special Issue
An Indoor Positioning Method for Smartphones Using Landmarks and PDR
Previous Article in Journal
Development of a Detection Algorithm for Use with Reflectance-Based, Real-Time Chemical Sensing
Previous Article in Special Issue
An Accurate Direction Finding Scheme Using Virtual Antenna Array via Smartphones
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Geometric Distribution-Based Readers Scheduling Optimization Algorithm Using Artificial Immune System

1
College of Information Engineering, Taiyuan University of Technology, Taiyuan 030024, China
2
Department of Mathematics and Computer Science, Virginia Wesleyan College, Norfolk, VA 23502, USA
3
College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan 030024, China
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(11), 1924; https://doi.org/10.3390/s16111924
Submission received: 31 August 2016 / Revised: 8 November 2016 / Accepted: 12 November 2016 / Published: 16 November 2016

Abstract

:
In the multiple-reader environment (MRE) of radio frequency identification (RFID) system, multiple readers are often scheduled to interrogate the randomized tags via operating at different time slots or frequency channels to decrease the signal interferences. Based on this, a Geometric Distribution-based Multiple-reader Scheduling Optimization Algorithm using Artificial Immune System (GD-MRSOA-AIS) is proposed to fairly and optimally schedule the readers operating from the viewpoint of resource allocations. GD-MRSOA-AIS is composed of two parts, where a geometric distribution function combined with the fairness consideration is first introduced to generate the feasible scheduling schemes for reader operation. After that, artificial immune system (including immune clone, immune mutation and immune suppression) quickly optimize these feasible ones as the optimal scheduling scheme to ensure that readers are fairly operating with larger effective interrogation range and lower interferences. Compared with the state-of-the-art algorithm, the simulation results indicate that GD-MRSOA-AIS could efficiently schedules the multiple readers operating with a fairer resource allocation scheme, performing in larger effective interrogation range.

1. Introduction

Radio Frequency Identification (RFID) is one of the Auto Identification and Data Capture (AIDC) techniques, which enable objects to be automatically identified. With the advantages such as automation, no-contract, easy-to-implement and enough-durability, passive RFID is widely applied in various applications such as supply chain management [1], manufacturing management [2] and warehouse management [3] with objects localization [4].
According to most applications, a single reader cannot totally cover a specific area (i.e., in a warehouse, every product has a tag attached to by automatically taking stock). Correspondingly, a classical RFID scenario is usually composed of multiple readers and large quantity of passive tags: the so-called Multiple-reader Environment (MRE). In classical MRE, multiple readers are deployed in different densities with known positions to interrogate the randomized tags with fixed positions under the same RFID system. To dynamically allocate the operating resources (i.e., available time slots and frequency channels) and manage readers, centralized mechanism is usually designed to be executed by a coordinator device (i.e., polling server), which is connected to the readers through a wired or wireless network [5,6]. During this process, signal interference problem degrades the operating performance in efficiency and reliability, which is caused by multiple readers operating at the same time. Correspondingly, the multiple-reader interference avoidance algorithms are proposed to help coordinator device to schedule the readers operating non-simultaneously or simultaneously but at different frequency channels, which could be clustered in two categories: the control-mechanism-based ones and the scheduling-based ones.
Control-mechanism-based algorithms [7,8,9] allow each reader to detect the status of other readers in order to avoid the simultaneous operating. For example, Neighbor Friendly Reader Interference Avoidance Algorithm (NFRIA) utilized readers with two bistatic antennas, where one antenna is for data transmitting and the other one is for continuously receiving to detect if other readers are using the same channel when they are operating. However, NFRIA did not take full advantage of centralized mechanism and, meanwhile, it is based on a hardware assumption that makes it hard to implement in real MRE.
Scheduling-based algorithms transform the multiple-reader interference problem into an optimization problem with respect to the allocation of operating resources (e.g., [10,11]). Based on this, the number of time slots, the number of frequency channels and the position of readers are optimally allocated by using some heuristic algorithms such as genetic algorithm [12], swarm optimization algorithm [13] and artificial immune algorithms [14,15,16,17]. Among these, the artificial immune algorithms output the best performance when compared with other heuristic ones, the advantage of which is mainly embodied in outputting a larger interrogation range. In [14,15,16,17], the author introduced a reader-to-reader avoidance model formulizing from the signal-to-interference-plus-noise (SINR) view, which could perfectly describe the interference process. However, the author did not consider the non-uniformity distribution of multiple readers deployment in MRE, resulting in the unfairness of scheduling schemes since the readers with no interferences are always operating while the ones dramatically affected by interferences are almost never operating. Therefore, part of the interrogation range is actually thriftless and, meanwhile, the interfering readers are not effectively scheduled to operate as well.
In the view of scheduling-based mechanism, a Geometric Distribution-based Multiple-reader Scheduling Optimization Algorithm using Artificial Immune System (GD-MRSOA-AIS) is proposed as a resource allocation algorithm to fairly schedule the readers operating with low interferences and large effective interrogation ranges in centralized MRE. GD-MRSOA-AIS first produces several fair feasible scheduling schemes using geometric probability distribution to allocate the operating time slot and frequency channel, which could minimize the collisions among the readers contending for operating resources and therefore maximize the probability that one reader successfully gains the opportunity to operate. To optimize these feasible scheduling schemes with the objective of maximizing the total effective interrogation range, the artificial immune system optimization with immune clone, immune mutation and immune suppression is further introduced. During the mutation process in artificial immune system optimization, there are two alternative mutation operators for different cloned antibodies, where the single-bit mutation is suitable for the superior ones and the region-bits mutation is appropriate for the regular ones.
Summarizing, the contributions of this paper are as follows:
  • By using signal-to-interference-plus-noise (SINR) to explain the reduction in interrogation range, a resource allocation model is constructed with two constraint conditions which are used to decrease the multiple-reader interference.
  • A geometric probability function is introduced to replace the uniform probability function to produce the feasible scheduling schemes, which ensures that readers could operate in a fair way.
  • Artificial immune system with clone operator, mutation operator and suppression operator is introduced to optimize the feasible scheduling schemes. In mutation process, both of the single-bit mutation operator and the region-bits mutation operator are imported to deal with the different cloned antibodies to accelerate the optimization process and convergence speed.
The remainder of this paper is organized as follows. In Section 2, the formulized resource allocation model is constructed in the view of signal-to-interference-plus-noise (SINR) to efficiently avoid the multiple-reader interference in MRE. The structure of GD-MRSOA-AIS is introduced in details in Section 3, where a geometric distribution probability is first utilized to generate the feasible scheduling schemes and then an artificial immune system is designed to optimize these feasible scheduling schemes as optimal ones. Simulation results for GD-MRSOA-AIS are provided in Section 4 as well as a series of comparative results between the proposed one and the state-of-the-art algorithm (i.e., LIs [14]). Finally, the conclusions and future works are drawn in Section 5.

2. Resource Allocation Model in Centralized MRE under EPCGlobal C1G2

2.1. General Description with Assumptions

In MRE, each reader transmits electromagnetic wave to create the interrogation range, where the size and shape of interrogation range depends on many factors [5,18] such as the antennas design (radiation pattern, gain, polarization and impedance), tag parameters (e.g., gain, matching features and IC sensitivity), external factors (ambient conditions, and noise) and readers output power suited. In most literatures [5,14,15,16,17,19], the interrogation range is defined as a perfect circumstance where the radius only depends on the reader’s output power. In this paper, we also follow this assumption as UHF RFID readers with known positions and passive RFID tags with fixed positions in centralized MRE:
  • Readers are randomly distributed over an area in two dimensions.
  • Any reader has only two states, active and inactive, where only the readers in active operate and interfere with other active ones.
  • The interference power from multiple interfering readers seen by the desired reader is additive.

2.2. Multiple-Reader Interference Problem in Centralized MRE

A simple centralized MRE is illustrated as Figure 1 according to the above assumptions, which is composed of one polling server, four readers in the same rated power and two target tags. Suppose that R1 is the desired reader, R1 could reach to the red circle as its maximum interrogation radius of rmax,1 without any interference. When R1 attempts to detect the target tag A, if the signal is masked by the interfering reader R2 and R3 (the interfering range is represented by the black circle), the effective interrogation range r1 (blue circle) of R1 will decrease from rmax,1. If r1 is smaller than the distance x between R1 and tag A, R1 could not detect this target tag A. Moreover, target tag B located in the overlapped range of r1 and r3 is hardly detected due to the multiple electromagnetic waves from R1 and R3 simultaneously operating.
The maximum interrogation radius rmax,i of Ri is related to the hardware design [20], which is obtained by Equation (1), where λi is the wavelength of Ri, Pmin is the minimum power required for the tag to operate, Pi is the signal transmission power of Ri, Md is the modulation depth, and GT and GR are the gains of the transmit antenna and the receive antenna, respectively.
r m a x , i = ( λ i 4 π ) G T G R P i P m i n × 1 M d 4 ( 1 + M d ) 2
However, the effective interrogation radius ri of Ri is variable as a function of signal interfering. For reader Ri interrogating the target tag at a given time slot (i.e., at the kth time slot), Ri receives the backscatter signal from the tag and, meanwhile, it is also interfered by other simultaneous operating readers signal among NReader readers, where a 0–1 function ωj(k) (as Equation (3)) is to indicate if the reader Rj is operating at the kth slot or not. To ensure that Ri could successfully detect the target tag in distance of x, Signal-to-Interference-Plus-Noise ratio (SINR) [21] has to exceed the minimum one of SINRmin as Equation (2):
S I N R i ( x , d j , i ) = B P i ( x ) j = 1 & j i N R e a d e r ω j ( k ) I j ( d j , i ) + N o i S I N R m i n
ω j ( k ) = { 1 , R j operates at k th slot 0 , Otherwise
where Noi represents the noise power of Ri, BPi(x) represents backscatter signal power from the target tag as a function of the distance x between the desired reader and the target tag, Ij(dj,i) represents the interference from any other Rj as a function of the relative distance di,j (as Equation (6)) between the desired reader Ri and the other interfering reader Rj. The function [19] of BPi(x) and Ij(dj,i) are defined as Equations (4) and (5), respectively.
B P i ( x ) = α b w E t a g P i G T G R ( P 0 x γ ) 2
I j ( d j , i ) = h P j G T G R β m a s k ( Δ C H j , i ( k ) ) P 0 d j , i γ , Δ C H j , i ( k ) = | C H i ( k ) C H j ( k ) |
d j , i = ( x i x j ) 2 + ( y i y j ) 2
where αbw is the normalized spectrum power, Etag is the effective power reflection coefficient of the tag, Pi denotes the signal transmission power of Ri, GT and GR are the gains of the transmit antenna and the receive antenna, respectively, P0 is the referenced path loss at the distance of 1 m, γ is the path loss exponent, x is the distance between Ri and the target tag, h is a fading coefficient in the channel between Ri and Rj, βmask(·) is the function of a spectrum mask defined in EPCGlobal Class1 Generation2 standard [22], ΔCHj,i(k) is the frequency channel interval between Ri (CHi(k) denotes the frequency channel numbers selected by Ri at the kth time slot) and Rj (CHj(k) denotes the frequency channel numbers selected by Rj at the kth time slot) selected, and dj,i is the relative distance between Ri and Rj.
By Equations (1)–(6), the effective interrogation range ri (i.e., blue circle in Figure 1) of Ri could be finally obtained by solving Equation (7) to ensure that the backscatter signal from target tag could be correctly recovered.
r i = m i n ( arg max x S I N R ( x , d j , i ) S I N R m i n , r m a x , i )
According to dj,i and ri (i, j∈[1, NReader]), Ri may face two kinds of interference scenarios [23] at one time slot when it tries to detect the target tags:
  • Multiple readers are simultaneously operating at the same frequency channel, which leads to the signals generated by multiple readers interfere with the reception system of the desired reader. In Figure 1, R1 suffers from this kind of interference if R2 and R3 are simultaneously operating with R1 at the same frequency channel. As a result, r1 is smaller than the distance x between R1 and the target tag A, R1 could not successfully detect A. To ensure that R1 could operate with a larger interrogation range to cover tag A, R1 with R2 and R3 should be scheduled to operate at different frequency channels and/or at different times by polling server.
  • Multiple readers operating at independently frequency channels try to simultaneously detect the same tag located in the overlapped area of their effective interrogation ranges. In Figure 1, tag B locates in the overlapped interrogation area of R1 and R3, where B receives electromagnetic waves from both R1 and R3 simultaneously, it is not able to select a particular reader to communicate even if R1 and R3 are operating at the different frequency channels. To avoid this scenario, R1 and R3 should operate asynchronously which are scheduled by polling server as well.

2.3. The Proposed Resource Allocation Model in Centralized MRE

In order to construct the resource allocation model for a centralized MRE, it is necessary to efficiently decrease the above two interference scenarios. Accordingly, Table 1 summarizes the restrictions set for any Ri and Rj operating in MRE, where df-min represents the threshold of reader-to-reader range for selecting different operating frequency channel, ds-minCHj,i(k)) is the threshold of reader-to-reader range for selecting different operating time slot which depends on the selected frequency channel.
Based on Table 1, two constraint conditions are proposed to restrict the resource allocation for readers operating as:
  • CHi(k) ≠ CHj(k) if dj,i < d f-min
Based on the relative distance dj,i between Rj and Ri, every Ri exists a neighbor set (denoted as ISRi = {j|j∈[1, NReader], dj,i < df-min} with cardinality |ISRi| = NNeighbor(i), i∈[1, NReader]) to mark the readers located in the range of df-min, where Ri is suffered from the first kind interference if the readers from ISRi are simultaneously operating at the same frequency channel with Ri (i.e., R1 and R2 in Figure 1). According to LIs [14], df-min is set as 16.79 m (the transmitting signal power of reader is 1 W, and the frequency is 902–928 MHz) for any two Ri and Rj. Therefore, Ri with any Rj in its ISRi (j ≠ i) should be operating at different frequency channels as: CHi(k) ≠ CHj(k) if jISRi and j ≠ i, where CHi(k) denotes the frequency channel numbers selected by Ri at the kth time slot.
  • ωj(k) = 0 if dj,ids-minCHj,i(k))
Further, in df-min, another smaller distance denoted as ds-min exists, where Ri is suffered from the second kind interference if readers located in ds-min are operating simultaneously even if they are at different frequency channels because they are overlapped in the effective interrogation range (i.e., R1 and R3 in Figure 1). Usually, ds-min for Ri and Rj is variable along with the correspondingly selected frequency channels interval ΔCHj,i(k), which is listed in Table 2. The calculation process is attached in Appendix A.
Therefore, Ri with Rj in ds-min should be operating non-simultaneously as: ωj(k) = 0 if dj,ids-minCHj,i(k)), where ωj(k) denotes the 0–1 function of Equation (3).
Constricted by the constraint conditions, the resource allocation model is finally constructed as Equation (8) with the objective of maximizing the total effective interrogation range (denoted as S) to schedule NReader readers operating with NSlot time slots and NFreq frequency channels. Note that NR = {1, 2, 3, …, NReader}, NS = {1, 2, 3, …, NSlot}, CH = {1, 2, 3, …, NFreq}, WS = {(xi, yi)|xi∈[0, Lx], yi∈[0, Ly]} and ISRi = {j|jNR, dj,i < df-min}.
{    M a x i m i z e S = i = 1 N R e a d e r k = 1 N S l o t ω i ( k ) π ( r i ( k ) ) 2 , s . t . i , j N R , k N S , C H i ( k ) , C H j ( k ) C H , ( x i , y j ) W S , Δ C H j , i ( k ) 0 if j I S R i ,    ω j ( k ) = 0 if d j , i d s - m i n ( Δ C H j , i ( k ) )

3. Geometric Distribution-Based Multiple-Reader Scheduling Optimization Algorithm Using Artificial Immune System (GD-MRSOA-AIS)

According to the proposed resource allocation model, GD-MRSOA-AIS is proposed to fairly allocate the operating resources with lower reader interference and larger effective interrogation range. In GD-MRSOA-AIS, it is composed of two parts:
  • GD: Geometric distribution function (GD) combined with the fairness consideration is introduced to randomize the feasible scheduling schemes with lower interferences which satisfy the constraint conditions in Equation (8). Details are described in Section 3.1;
  • AIS: Artificial immune system optimization (AIS) is to optimize these feasible scheduling schemes as the optimal scheduling scheme for readers fairly operating with larger effective interrogation range. Details are presented in Section 3.2.

3.1. Feasible Scheduling by Geometric Distribution Function

According to the constraint conditions in Equation (8), GD-MRSOA-AIS will first produce several feasible solutions as the feasible scheduling schemes to ensure that readers could fairly operate with low signal interference.
In centralized MRE, both the interference-reader (i.e., R1, R2 and R3 in Figure 1) and the isolation-reader (i.e., R4 in Figure 1) exist, where the isolated readers could operate at any time while the interfering readers have to be scheduled by polling server to decrease the interferences as much as possible. On the other hand, it is obvious that the isolated readers keeping on operating is thriftless since the number of deployed tags in the interrogation range is constant. Therefore, it is unfair to allocate the interfering readers and isolated readers with same opportunities to operate. To enhance the fairness, the interfering readers should gain more opportunities to operate.
To efficiently and fairly allocate the available operating time slots, a geometric probability distribution function called Sift [24,25] is imported to replace the typical uniform distribution. Based on the character of Sift distribution, it could increase the probability that one contender selects one resource in a low position, winning the contention quickly. Therefore, if Ri contends for the operating time slot with large quantity of neighbor readers simultaneously, most neighbors will tend to select the last few time slots, and only the minority will contend for the first few time slots, decreasing the probability of collision in slots selection and increasing the probability that Ri successfully selects one of the first few time slots. On the contrary, if Rj contends for the operating time slots with small quantity of neighbor readers, the probability of selecting one slot almost obeys uniform distribution.
For Sift_Function, the probability that the ith reader gains the opportunity to operate at the kth time slot from NSlot time slots is denoted as Equation (9). Here, NNeighbor(i) is the cardinality of ISRi for Ri, where NNeighbor(i) = 1 denotes that there is no neighbors located around Ri and therefore Ri is an isolated reader without any possible interference.
p ( k ) i = ( 1 α i ) α i N S l o t 1 α i N S l o t α i k , 1 k N S l o t , 0 < α i < 1 , α i = N N e i g h b o r ( i ) 1 / ( N S l o t 1 )
Note that when NNeighbor(i) = 1, then αi = 1, and lim α 1 p ( k ) i =   1 / N S l o t , becoming the uniform probability distribution. Consequently, Ri with bigger NNeighbor(i) could easily wins the kth time slot as a higher p(k)i while Rj with smaller NNeighbor(j) has to select the operating time slot like uniform distribution as a lower p(k)j.
By using Sift_Function, it generates several feasible scheduling schemes for readers operating with the allocated time slots and frequency channels, where the feasible scheduling schemes are restricted by the constraint conditions in Equation (8). Therefore, each feasible scheduling scheme produced by Sift_Function is actually a feasible solution for Equation (8), where the pseudocode is summarized as Algorithm 1.
Algorithm 1: Pseudocode for Feasible Solutions Generation by Sift_Function
Sift_Function
1 set i = 1;
2 while iNReader do
3  set α i = N N e i g h b o r ( i ) 1 / ( N S l o t 1 ) ;
4  set l i = r a n d o m ( 0 , 1 ) ;
5  set ki = NSlot;
6   for z = 1 to NSlot do
7    if p z = ( 1 α i ) α i N S l o t 1 α i N S l o t α i z >li then // Contend for operating time slot
8      set ki = z; // Ri is operating at zth time slot
9      break;
10     end if
11    end for
12    randomize CHi(ki) from CH; // Allocate a frequency channel for Ri
13    for j = 1 to NReader and j ≠ i do
14      if jISRi then // Constraint Condition: CHi(k) ≠ CHj(k) if j ∈ISRi
15     randomize CHj(ki) from CH-{CHi(ki)};
16     if dj,ids-min(|CHj(ki)-CHi(ki)|) then // ωj(k) = 0 if dj,i ≤ ds-minCHj,i(k))
17        set CHj(ki) = 0;
18     end if
19     end if
20     end for
21     i++;
22  end while
For each feasible solution of Equation (8), the total effective interrogation range might be not large enough. Therefore, this feasible scheduling scheme might be not the optimal one to maximize the global effective interrogation range. To optimize these feasible scheduling schemes, the artificial immune system optimization is introduced in the following section.

3.2. Optimal Scheduling by Artificial Immune System Optimization

For the produced feasible scheduling schemes, they could be optimized by using artificial immune system optimization, where each candidate antibody corresponds to one feasible solution of Equation (8) produced by Sift_Function and the antigen corresponds to the objective function of Equation (8) with the constraint conditions. According to this, the affinity function could be formulated as Equation (10), where the process for optimizing the feasible solutions of Equation (8) is transformed to find the maximum affinity value of Equation (10) and its corresponding optimum antibody.
{ A f f i n i t y ( A b ) = i = 1 N R e a d e r k = 1 N S l o t ω i ( k ) × ( r i ( k ) ) 2 , s . t . i , j N R , k N S , C H i ( k ) , C H j ( k ) C H , ( x i , y j ) W S , Δ C H j , i ( k ) 0 if j I S R i ,    ω j ( k ) = 0 if d j , i d s - m i n ( Δ C H j , i ( k ) )
The proposed artificial immune system optimization is predefined to iterate NGen generations, where it exists three phases in every iterative generation as: immune clone, immune mutation and immune suppression/recruitment. In the clone phase, each antibody is acted as a parent to be correspondingly cloned for a fixed number of NClone children antibodies, and all children antibodies go through the mutation process but only one child antibody with the highest affinity-value among the children antibodies is selected to compare with its parent antibody. If this selected child antibody is superior to its parent antibody in affinity value, it will replace its parent antibody as a new generation. Once the affinity value of this new generation is not significantly different from that of the previous generation, the suppression will be triggered, where the PS antibodies with lowest affinity-values are suppressed. Then, the corresponding numbers of antibodies produced by Sift_Function are recruited. This process is repeated until NGen iteration is met. The related symbols and their descriptions are listed in Table 3.

3.2.1. Initialization

To initialize the optimizing process by using artificial immune system, NIni antibodies (feasible solutions) are randomized by repeatedly run Sift_Function in NIni times to construct the candidate antibody population set as AB = {Ab(u)|u∈[1, NIni]}.
For each antibody Ab(u) in AB, it is encoded as integer type since both frequency channels and time slots are discrete distribution as integer type. Seen from Figure 2a, Ab(u) consists of NReader segments as ab(u)1, ab(u)2, ab(u)3,…, ab(u)NReader, where each ab(u)i is actually corresponding to a reader Ri and it includes a sequence of bits as CHi(1), CHi(2), CHi(3),…, CHi(NSlot) where each CHi(k) is denoted as the selected frequency channel of reader Ri at the kth time slot. CHi(k) = 0 means that reader Ri does not operate at this kth slot.

3.2.2. Clone Operation

After producing the candidate antibody population set as AB = {Ab(u)|u∈[1, NIni]}, each Ab(u) is regarded as an parent antibody. For each parent antibody Ab(u), NClone cloned antibodies with the same encodings are produced as its children antibodies, in which these children antibodies will go through the mutation operation to increase the diversity and therefore they have more potential to evolve as excellent individuals. Here, NClone is required to be predefined as the cloned multiplier, and each Ab(u) has a clone pool as AB(u)Clone = {Abc(c)|c∈[1, NClone]} to store its children antibodies, where each Abc(c) in AB(u)Clone is encoded as Figure 2b.
Note that each child antibody Abc(c) from the clone pool AB(u)Clone is totally the same as its parent antibody Ab(u) in every bit before the mutation operation.

3.2.3. Mutation Operation

For each child antibody Abc(c) (i.e., Figure 2b) from the clone pool AB(u)Clone = {Abc(c)|c∈[1, NClone]} of its parent Ab(u), there are two optional mutation operators as: single-bit mutation operator is applied for the ones with higher affinity values and region-bits mutation operator is applied for the ones with lower affinity values.
For single-bit mutation operator, only one bit CHi(k) is randomly selected as a hotspot to be mutated following the constraint conditions, which belongs to a reader Ri (i.e., Figure 2b). As a result, this mutated Abc(c) is also a feasible scheduling scheme as well.
For region-bits mutation operator, a contiguous region bits are selected to be mutated starting from a hotspot of CHi(k) increasing L-bit length, note that L is less than NSlot minus k to guarantee the mutation is happened in one reader Ri (i.e., Figure 2b). In addition, this mutation is restricted by the constraint conditions. As a result, this mutated Abc(c) is also a feasible scheduling scheme.
By single-bit mutation, the children antibody could extremely inherit the superior bits of the parent antibody while the children antibody would have more potential to mutate as the superior ones by region-bits mutation. Both of them could fast the convergence and quickly reach to the global optimization.
The single-bit and region-bit mutation operator run as in Algorithms 2 and 3 respectively.
After the mutation operations, for each parent antibody Ab(u) (u∈[1, NIni]), its children antibodies Abc(c) from the clone pool AB(u)Clone = {Abc(c)|c∈[1, NClone]} are totally different: some Abc(c) surpasses Ab(u) in affinity value while some of Abc(c) are identical or inferior to Ab(u). To distinguish them, all Abc(c) (c∈[1, NClone]) should be sorted by affinity value. Select the Abc(c) with highest affinity value and compare it with its parent antibody Ab(u): if this Abc(c) is superior to its parent antibody Ab(u), it will replace its parent antibody as a new candidate antibody in AB.
Algorithm 2: Pseudocode for Single-bit Mutation
 Single-bit _Operator ()
 1 Randomly determine a bit CHi(k) of Ri from Abc(c) to be mutated;
 2 for j = 1 to NReader and j ≠ i
 3   if ISRjISRi ≠ ∅
 4   CH = CH-{CHj(k)};
 5   end if
 6 end for
 7 if CH ≠ ∅
 8   Randomize CHi(k) from CH;
 9 else
 10   CHi(k) = 0;
 11 end if
Algorithm 3: Pseudocode for Region-bits Mutation
 Region-bits _Operator ()
 1 Randomly determine a bit CHi(k) of Ri from Abc(c) to be mutated;
 2 for(q = k; qk + L; q++)
 3 for j = 1 to NReader and j ≠ i
 4 if ISRjISRi ≠ ∅
 5 CH = CH-{CHj(q)};
 6 end if
 7 end for
 8 if CH ≠ ∅
 9 Randomize CHi(q) from CH;
 10 else
 11 CHi(q) = 0;
 12 end if
 13 end for

3.2.4. Suppression Operation

After the mutation operation, the candidate antibodies are changed. If the affinity value of new candidate antibody population set AB is significantly increased, this AB will be directly regarded as a new generation and go through the same immune process via clone operation, mutation operation and suppression operation.
On the contrary, the candidate antibodies with highest affinity values should be promoted while the antibodies with lowest affinity values should be suppressed. Sorted by the affinity value, it will suppress PS percentage of antibodies with lowest affinity values. After that, PS of NIni antibodies (feasible solutions) are produced by Sift_Function, where these fresh candidate antibodies are recruited in AB to compose a new generation population. In addition, this new generation population will go through the same immune process via clone operation, mutation operation and suppression operation.
When the iteration reaches the predefined maximum generations Ngen, GD-MRSOA-AIS terminates. Finally, the pseudocode for proposed artificial immune system (proposed-AIS) optimization in GD-MRSOA-AIS is listed as Algorithm 4, where the corresponding flowchart is shown in Figure 3.
Algorithm 4: Pseudocode for Optimal Scheme Generation by using proposed-AIS Optimization
AIS_Optimization
1  Set NIni, NClone, NGen, PS;
2  int t, u, c;
3  float aff_old, aff_new;
4  Initialization: Run Sift_Function in NIni times to construct set AB;
5       Evaluate the affinity value of all elements in AB and average them as aff_old;
6  while t< NGen do
7   for(u = 1; uNIni; u++)
8    Produce NClone clones for uth antibody as its children antibodies; // Clone Operation
9    for(c = 1; cNClone; c++)
10      Mutate cth child antibody following the Mutation Operation;
11    end for
12    Evaluate the affinity value of all children antibodies and their parent antibody;
13    Remain the antibody with the highest affinity value;
14   Evaluate the affinity value of all candidate antibodies and average them as aff_new;
15   end for
16   if(aff_new is not significantly bigger than aff_old) // Suppression Operation
17     Sort the candidate antibodies by their affinity values;
18     Suppress PS antibodies with lowest affinity values;
19     Produce PS new recruited antibodies by Sift_Function satisfying the constraint conditions;
20   end if
21 end while

4. Simulations and Results

In this section, the total effective interrogation range using the proposed-AIS optimization with Sift_Function (denoted as GD-MRSOA-AIS) and without Sift_Function (denoted as MRSOA-AIS) will be simulated and compared with the state-of-the-art algorithm (LIs [14]) in two scenarios:
  • The number of readers NReader = 15 with fixed positions among GD-MRSOA-AIS, MRSOA-AIS and LIs. Meanwhile, the advantage of Sift_Function and proposed-AIS optimization is illustrated by comparisons of GD-MRSOA-AIS, MRSOA-AIS and LIs.
  • Variable NReader with randomized positions among GD-MRSOA-AIS, MRSOA-AIS and LIs.
During the simulations, readers are randomly distributed over an area in two dimensions with 100 × 100 m2 (i.e., Lx = 100 m, Ly = 100 m). As readers communicate with tags by means of EPCGlobal C1G2, the parameter settings are same with the ones listed in Table A1 in Appendix A.
Given a certain number of readers, as the number of available time slots increases, the readers have more options to avoid simultaneously operation. In other words, for a specific number of time slots, as the number of readers increases, the total effective interrogation range will be smaller, which is caused by the heavy interferences. Without the loss of generality, NSlot is finally assigned as 5 in the following simulations. In addition, as the number of available frequency channels increases, the total effective interrogation range always increases since each reader has more options for selecting an available frequency channel to simultaneously operate with other readers at different frequency channels. Usually, the number of available frequency channels is set to no more than 10. Consequently, NFreq is assigned as 10 in the simulation. The parameters setting of proposed-AIS optimization in simulation are listed in Table 4.

4.1. Case Study: NReader = 15, NSlot = 5, NFreq = 10

When NReader = 15, the fixed positions of readers are randomized in Figure 4, where the corresponding neighbor set for each reader is ISR1 = {1, 3}, ISR2 = {2, 5, 6}, ISR3 = {1, 3}, ISR4 = {4, 7}, ISR5 = {5, 6, 8, 9}, ISR6 = {2, 5, 6, 8}, ISR7 = {4, 7}, ISR8 = {5, 6, 8, 9, 10, 11}, ISR9 = {5, 8, 9, 10, 11}, ISR10 = {8, 9, 10, 11}, ISR11 = {8, 9, 10, 11}, ISR12 = {12, 13}, ISR13 = {12, 13}, ISR14 = {14}, and ISR15 = {15}. Here, R14 and R15 are isolated readers since ISR14ISRj = ∅ (any jNR and j ≠ 14) and ISR15ISRl = ∅ (any lNR and l ≠ 15). On the contrary, i.e., ISR5ISR8ISR9ISR10ISR11 = {5, 8, 9, 10, 11}, these readers should be scheduled to operate at different time slots or simultaneously operate but at different frequency channels.
Figure 5 shows the graphical representation of effective interrogation range for each reader with its corresponding operation time slots (where the five time slots are represented by Green, Red, Blue, Cyan and Magenta) under the operating scheduling scheme. Correspondingly, the operating scheduling scheme for each algorithm is listed in Table 5, where CHi(k) = 0 means that the ith reader does not operate at this kth time slot. At the first time slot (TS1) as green circles in Figure 5a–c, {R7, R9, R14, R15} are operating at the frequency channel of {CH7(1) = 5, CH9(1) = 7, CH14(1) = 1, CH15(1) = 10} using GD-MRSOA-AIS as in Table 5; {R11, R13, R14, R15} are operating at the frequency channel of {CH11(1) = 9, CH13(1) = 7, CH14(1) = 1, CH15(1) = 5} using MRSOA-AIS; and {R1, R4, R13, R15} are operating at the frequency channel of {CH1(1) = 7, CH4(1) = 1, CH13(1) = 10, CH15(1) = 3} using LIs algorithm. Take {R4, R7} as an example, ISR4ISR7 = {4, 7}. According to Table 5, R4 is scheduled to operate at TS3 with the frequency channel of CH4(3) = 10 and R7 is scheduled to operate at TS1 with the frequency channel of CH7(1) = 5 by GD-MRSOA-AIS while R4 is scheduled to operate at every time slot as {CH4(1) = 1, CH4(2) = 3, CH4(3) = 1, CH4(4) = 1, CH4(5) = 3} and R7 is scheduled to be inactive at every time slot by LIs. Therefore in LIs, R4 is actually operating in uselessness especially for the last few time slots and it is unfair for R7. On the contrary, GD-MRSOA-AIS schedules R4 and R7 corporately operating in a fair way. The same scenario is also happened in {R12, R13}.
On average, the effective interrogation radius using GD-MRSOA-AIS is 2.142 m, 2.0881 m using MRSOA-AIS and 1.909 m using LIs algorithm. It seems like that the effective interrogation ranges of these three algorithms are similar. However, by introducing Sift_Function, GD-MRSOA-AIS is obviously fairer since almost all readers (except for R1) are scheduled to operate at different time slots and frequency channels while both of MRSOA-AIS and LIs could not. For example, {R4, R5, R6, R7, R8, R10, R12} are always inactive in MRSOA-AIS and {R6, R7, R11, R12} are inactive in LIs (shown in Table 5 and Figure 5b,c), especially that R6, R10, R11 are posited in crowed with more neighbors (shown in Figure 4).
To evaluate the fairness of readers during the operating scheduling, a general purpose quantitative measure of fairness called Jain Index [26] is imported as Equation (11), where NReader denotes the number of readers, ωi is the 0–1 function to indicate whether the reader Ri operates at least once at these NSlot time slots or not, and NNeighbor(i) is the cardinality of ISRi. The IJain ranges from 0 to 1: the higher IJain means that the corresponding optimal scheduling scheme is fairer. Obviously, Ri with larger NNeighbor(i) will make more contribution to obtain a bigger IJain. Therefore, the Jain Index could express the fairness of an optimal scheduling scheme.
I J a i n = i = 1 N R e a d e r ω i × N N e i g h b o r ( i ) N R e a d e r × N R e a d e r
As a result, GD-MRSOA-AIS becomes the fairest one with highest Jain Index of IJain = 18.22%, while the IJain of MRSOA-AIS is 8.89% and the IJain of LIs is 14.67% in the same scenario.
In Figure 6, the initial average affinity value of GD-MRSOA-AIS starts from 450, which is much higher than that of the other two from 200. This obvious difference is owing to the contending mechanism of Sift_Function for time slots selection. Additionally, the average affinity value of both GD-MRSOA-AIS and MRSOA-AIS are much higher than LIs, where MRSOA-AIS rockets up to a high affinity value and then it stabilizes in the similar average affinity value like GD-MRSOA-AIS, which dues to the multiple mutation operations in the proposed-AIS. To achieve the average affinity value of 600, with GD-MRSOA-AIS and MRSOA-AIS, it costs around 50 generations while with LIs it is more than 150 generations. Therefore, the proposed-AIS also reduces the time consumption of optimization process.

4.2. Variable NReader with Fixed NSlot = 5 and NFreq = 10 in Randomized Positions

For a given NReader readers with NSlot = 5 and NFreq = 10 in the area of 100 × 100 m2, the position of each reader is randomly located. To ensure the convergence of the results, all the simulations are repeated for 50 times with 50 randomly positions. For an easier understanding, the results are listed in five indices (the best, the worst, and the mean of total effective interrogation area, the average radius and Jain Index) among GD-MRSOA-AIS, MRSOA-AIS and LIs algorithm, which are represented in Table 6.
When NReader = 4 with NSlot = 5 available time slots and NFreq = 10 frequency channels, readers are easily scheduled to operate at different time slots and frequency channels. Additionally, they could be deployed so sparsely that they are hardly interfered each other in such a large zone (100 × 100 m2). Therefore, the Jain Index is failed to measure the fairness. However, limited by the self-rated-power, the interrogation range is also finite. As a result, the total effective interrogation range is not large enough. As the number of readers increases, such as NReader = 24 and NReader = 28, positions of readers become much denser, the readers could not make full use of the frequency channels and the time slots, and then the individual effective interrogation range is declining and the total effective interrogation range relies on the cooperation among readers operating.
From Table 6, we can see that the Jain Index is fluctuated up and down. For the former situations (i.e., NReader = 8, NReader = 12, NReader = 16), each reader has fewer neighbors since they are sparsely distributed, which declines the Jain Index value even if all of the readers are scheduled to operate at least once. For the latter situations (i.e., NReader = 24, NReader = 28), readers are located in denser positions and so each reader has more neighbors, but some readers might be not scheduled to operate even once (ωi = 0) which also decreases the Jain Index value. Even so, the Jain Index value of GD-MRSOA-AIS is also higher than MRSOA-AIS and LIs with the same number of readers.
In addition, Table 6 shows that the best, the worst and the mean of total effective interrogation range between GD-MRSOA-AIS and MRSOA-AIS are similar but larger than the ones of LIs; meanwhile, the average radius of effective interrogation range for each operating readers with GD-MRSOA-AIS and MRSOA-AIS is also larger than that with LIs. The total effective interrogation range is declined fast by using LIs when the number of readers increases while it is much slower by using both GD-MRSOA-AIS and MRSOA-AIS. For example, when NReader = 20, the mean effective interrogation range with GD-MRSOA-AIS is 3133.686 m2, the best one as 3331.845 m2 and the worst one as 2935.414 m2; the mean value with LIs is only 2528.864 m2, the best one as 2869.225 m2 and the worst one as 2297.590 m2. When NReader = 28, with GD-MRSOA-AIS, the mean value is glided down to 2737.177 m2, the best one as 3068.395 m2 and the worst one as 2436.688 m2; with LIs, the mean value is slumped down as 1670.742 m2, the best one as 1859.409 m2 and the worst one as 1532.377 m2.
In conclusion, GD-MRSOA-AIS could schedule multiple readers operating in fairness with lower multiple-reader interfering and large effective interrogation range, where the fairness with lower multiple-reader interfering dues to the geometric distribution of Sift_Function and the large effective interrogation range dues to the proposed-AIS optimization process. As a result, the deployment of eight readers with five available time slots and 10 available frequency channels is the most economical way to maximize the total effective interrogation range in 100 × 100 m2, especially using GD-MRSOA-AIS.

5. Conclusions

This paper refers to the multiple-reader interference problem in the multiple-reader environment (MRE) and formulates a resource allocation model with the consideration of interference avoidance in SINR under EPCGlobal C1G2 standard, where the allocable resources include available time slots and frequency channels. Based on this resource allocation model, GD-MRSOA-AIS is further proposed. In GD-MRSOA-AIS, geometric distribution replaces the uniform distribution to produce the feasible scheduling schemes, where the reader, which is interfered by large quantity of readers, has more opportunities to be allocated in an operating time slot. To optimize these feasible scheduling schemes, the artificial immune system optimization including immune clone, immune mutation and immune suppression is further introduced. During the mutation operation for antibodies, there are two optional mutation operators depending on the affinity values. According to the simulation results, GD-MRSOA-AIS could obtain an optimal and fairer readers collaboratively operating scheduling scheme, and it could output a larger total effective interrogation range with higher convergence than the state-of-the-art one.
Although GD-MRSOA-AIS indeed enhances the effective interrogation range with lower interferences by fairer operating scheme, it still has shortcomings:
  • It only focuses on the scenario of multiple readers in known position with randomized tags in fixed positions, and ignores the new entrancing tags with variable population.
  • It only solves the resource allocation problem for multiple readers scheduling to interrogate the tags in centralized MRE, but ignores the identification problem (i.e., tag-to-tag collision) in data transmission process.
Therefore, the next work will reconstruct a resource allocation model by considering the variable population of tags and identification problem with an enhanced scheduling-based algorithm.

Acknowledgments

This article is supported by National Natural Science Foundations of China (Nos. 61303207, 61503273 and 61472271).

Author Contributions

Litian Duan and Fu Duan conceived and designed the experiments; Fu Duan performed the simulations; Litian Duan, Fu Duan and Zizhong John Wang analyzed the data; and Litian Duan and Zizhong John Wang wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Assume that readers with the rated power of 30 dB m (1 W) are operating at the frequency of 902–928 MHz with the bandwidth of 500 KHz and noise power of −90 dB m according to EPCGlobal C1G2 [22]. The corresponding parameters are listed in Table A1.
Table A1. Parameter value under EPCGlobal C1G2 standard.
Table A1. Parameter value under EPCGlobal C1G2 standard.
ParameterDescriptionValue
EtagThe effective power reflection coefficient of the tag0.1
αbwThe normalized spectrum power0.86
γThe path loss exponent2.5
MdThe modulation depth0.1
HThe fading coefficient in the channel between Ri and Rj1
PminThe minimum required power for tag operation−15 dB m
PiThe signal power of Ri30 dB m
P0The referenced path loss at the distance of 1 m−31.6 dB m
NoiThe noise power of Ri−90 dB m
SINRminThe minimum SINR11.6 dB
GTThe reader antenna transmitting gain6 dB
GRThe reader antenna receiving gain6 dB
βmask(·) for MREThe function of the spectrum mask in multiple-reader environmentΔCHj,i(k) = 00 dB
ΔCHj,i(k) = 1−20 dB
ΔCHj,i(k) = 2−50 dB
ΔCHj,i(k) = 3−60 dB
ΔCHj,i(k) ≥ 4−65 dB
For any Ri and Rj, the effective interrogation range might be overlapped if the distance between these two readers is close enough. For this scenario, readers are not preferred to operate simultaneously even though they are at different frequency channels. To determine this boundary distance, it is derived as follows.
A c c o r d i n g t o E q u a t i o n ( 7 ) , r i = ( B P I j × β m a s k ( Δ C H j , i ( k ) ) × d j , i γ + S N i ) 1 2 γ , w h e r e B P = α b w E t a g P i G T G R P 0 2 , I j = S I N R min h P j G T G R P 0 , S N i = S I N R min × N o i , S u p p o s e t h a t r i d j , i 2 , ( B P I j × β m a s k ( Δ C H j , i ( k ) ) × d j , i γ + S N i ) 1 2 γ d j , i 2 , S u p p o s e t h a t A = I j × β m a s k ( Δ C H j , i ( k ) ) , B = S N i , t h e n ( B P A × d j , i γ + B ) 1 2 γ d j , i 2 , S u p p o s e t h a t f ( d j , i ) = A × d j , i γ + B × d j , i 2 γ 4 γ × B P , a n d l e t x = d j , i γ , t h e n f ( x ) = A x + B x 2 4 γ B P , Δ = A 2 + 4 × B × 4 γ B P > 0 , x = A ± Δ 2 B , l e t x 0 d j , i = x γ A c c o r d i n g t o β m a s k ( · ) i n M R E , w h e n Δ C H j , i ( k ) = 0 , d j , i = 0.0269 m , w h e n Δ C H j , i ( k ) = 1 , d j , i = 0.8452 m , w h e n Δ C H j , i ( k ) = 2 , d j , i = 2.6970 m , w h e n Δ C H j , i ( k ) = 3 , d j , i = 6.7458 m , w h e n Δ C H j , i ( k ) 4 , d j , i = 10.3390 m .

References

  1. Vlachos, I.P. A Hierarchical Model of the Impact of RFID Practices on Retail Supply Chain Performance. Expert Syst. Appl. 2014, 41, 5–15. [Google Scholar] [CrossRef]
  2. Arkan, I.; Landeghem, H.V. Evaluating the Performance of a Discrete Manufacturing Process using RFID: A Case Study. Robot. Comput. Integr. Manuf. 2013, 29, 502–1512. [Google Scholar] [CrossRef]
  3. Enrique, V.; Antonio, A.; Carlos, C. Evolution of RFID Applications in Construction: A Literature Review. Sensors 2015, 15, 15988–16008. [Google Scholar]
  4. Decarli, N.; Guidi, F.; Dardari, D. Passive UWB RFID for Tag Localization: Architectures and Design. IEEE Sens. J. 2016, 16, 1385–1397. [Google Scholar] [CrossRef]
  5. Bueno-Delgado, M.V.; Pavon-Marino, P. A Centralized and Aligned Scheduler for Passive RFID Dense Reader Environments working under EPCglobal Standard. Simul. Model. Pract. Theory 2013, 34, 172–185. [Google Scholar] [CrossRef]
  6. Wang, D.; Wang, J.; Zhao, J.Y. A Novel Solution to the Reader Collision Problem in RFID System. In Proceedings of the IEEE International Conference Wireless Communication, Networking Mobile Computing, Wuhan, China, 22–24 September 2006; pp. 1–4.
  7. Birari, S.M.; Lyer, S. Pulse: A MAC Protocol for RFID Networks. In Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2005), Nagasaki, Japan, 6–9 December 2005; pp. 1036–1046.
  8. Eom, J.B.; Yim, S.B.; Lee, T.J. An Efficient Reader Anti-collision Algorithm in Dense RFID Networks with Mobile RFID Readers. IEEE Trans. Ind. Electron. 2009, 56, 2326–2336. [Google Scholar]
  9. Song, I.C.; Hong, S.H.; Chang, K.H. An Improved Reader Anti-collision Algorithm based on Pulse Protocol with Slot Occupied Probability in Dense Reader Mode. In Proceedings of the IEEE Vehicular Technology Conference, Barcelona, Spain, 26–29 April 2009; pp. 1–5.
  10. Waldrop, J.; Engels, D.W.; Sarma, S.E. Colorwave: A MAC for RFID Reader Networks. In Proceedings of IEEE International Conference on Wireless Communications and Networking (WCNC), New Orleans, LA, USA, 20–20 March 2003; pp. 1701–1704.
  11. Ho, J.; Engels, D.W.; Sarma, S.E. HiQ: A Hierarchical Q-learning Algorithm to Solve the Reader Collision Problem. In Proceedings of the International Symposium on Applications and the Internet Workshops (SAINT), Phoenix, AZ, USA, 23–27 January 2006; pp. 1–4.
  12. Seo, H.; Lee, C. A New GA-based Resource Allocation Scheme for a Reader-to-reader Interference Problem in RFID System. In Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, 23–27 May 2010; pp. 1–5.
  13. Chen, H.N. RFID Network Planning using a Multi-swarm Optimizer. J. Netw. Comput. Appl. 2011, 34, 888–901. [Google Scholar] [CrossRef]
  14. Li, Z.H.; He, C.H. Optimal Scheduling-based RFID Reader-to-reader Collision Avoidance Method using Artificial Immune System. Appl. Soft Comput. 2013, 13, 2557–2568. [Google Scholar] [CrossRef]
  15. Li, Z.H.; Li, J.M.; He, C.H. Artificial Immune Network-based Anti-collision Algorithm for Dense RFID Readers. Expert Syst. Appl. 2014, 41, 4798–4810. [Google Scholar] [CrossRef]
  16. Li, Z.H.; Li, J.M.; He, C.H.; Tang, C.P.; Zhou, J.Y. RFID Reader-to-reader Collision Avoidance Model with Multiple-density Tag Distribution solved by Artificial Immune Network Optimization. Appl. Soft Comput. 2013, 30, 249–264. [Google Scholar] [CrossRef]
  17. Li, Z.H.; He, C.H.; Huang, X. RFID Reader Anti-collision Algorithm using Adaptive Hierarchical Artificial Immune System. Expert Syst. Appl. 2014, 41, 2126–2133. [Google Scholar] [CrossRef]
  18. Tang, S.J.; Yuan, J.; Li, X.Y.; Chen, G.H.; Liu, Y.H.; Zhao, J.Z. Raspberry: A Stable Reader Activation Scheduling Protocol in Multi-reader RFID Systems. In Proceedings of the 17th IEEE International Conference on Network Protocols (ICNP), Princeton, NJ, USA, 13–16 October 2009; pp. 304–313.
  19. Kim, D.Y.; Yoon, H.G.; Jang, B.J.; Yook, J.G. Effects of Reader-to-reader Interference on the UHF RFID Interrogation Range. IEEE Trans. Ind. Electron. 2009, 56, 2337–2346. [Google Scholar]
  20. Vita, D.; Iannaccone, G. Design Criteria for the RF Section of UHF and Microwave Passive RFID Transponders. IEEE Trans. Microw. Theory Tech. 2005, 53, 2978–2990. [Google Scholar] [CrossRef]
  21. Cha, K.; Ramachandran, A.; Jagannathan, S. Adaptive and Probabilistic Power Control Algorithms for Dense RFID Reader Network. In Proceedings of the IEEE on Networking, Sensing and Control (ICNSC), Ft. Lauderdale, FL, USA, 23–25 April 2006; pp. 474–479.
  22. EPC Global. UHF Air Interface Protocol Standard Generation2/Version2. Available online: http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2 (accessed on 14 November 2016).
  23. Safa, H.; I-Hajj, W.E.; Meguerditchian, C. A Distributed Multi-channel Reader Anti-collision Algorithm for RFID Environments. Comput. Commun. 2015, 64, 44–56. [Google Scholar] [CrossRef]
  24. Tay, Y.C.; Jamieson, K.; Balakrishnan, H. Collision-Minimizing CSMA and its Applications to Wireless Sensor Networks. IEEE J. Sel. Areas Commun. 2004, 22, 1048–1057. [Google Scholar] [CrossRef]
  25. Bueno-Delgado, M.V.; Ferrero, R.; Gandino, F.; Pavon-Marino, P.; Rebaudengo, M. A Geometric Distribution Reader Anti-Collision Protocol for RFID Dense Reader Environments. IEEE Trans. Autom. Sci. Eng. 2013, 10, 296–306. [Google Scholar] [CrossRef]
  26. Ferrero, R.; Gandino, F.; Montrucchio, B.; Rebaudengo, M. A Fair and High Throughput Reader-to-reader Anti-collision Protocol in Dense RFID Networks. IEEE Trans. Ind. Inf. 2012, 8, 697–706. [Google Scholar] [CrossRef]
Figure 1. MRE Illustration with Centralized Mechanism.
Figure 1. MRE Illustration with Centralized Mechanism.
Sensors 16 01924 g001
Figure 2. (a) Encoding format for the uth antibody individual; (b) Encoding format for the cth child antibody.
Figure 2. (a) Encoding format for the uth antibody individual; (b) Encoding format for the cth child antibody.
Sensors 16 01924 g002
Figure 3. Flowchart of proposed AIS optimization in GD-MRSOA-AIS.
Figure 3. Flowchart of proposed AIS optimization in GD-MRSOA-AIS.
Sensors 16 01924 g003
Figure 4. Fixed Location of Readers (NReader = 15).
Figure 4. Fixed Location of Readers (NReader = 15).
Sensors 16 01924 g004
Figure 5. Graphical Representation of Optimal Operating Schedule for 15 readers with NSlot = 5 and NFreq = 10: (a) GD-MRSOA-AIS; (b) MRSOA-AIS; and (c) LIs.
Figure 5. Graphical Representation of Optimal Operating Schedule for 15 readers with NSlot = 5 and NFreq = 10: (a) GD-MRSOA-AIS; (b) MRSOA-AIS; and (c) LIs.
Sensors 16 01924 g005
Figure 6. Affinity value versus number of generations.
Figure 6. Affinity value versus number of generations.
Sensors 16 01924 g006
Table 1. Readers operating restrictions versus dj,i.
Table 1. Readers operating restrictions versus dj,i.
=Frequency Channel≠Frequency Channel
=time slotdj,i > df-mindf-min ≥ dj,i > ds-minCHj,i(k))
≠time slotds-minCHj,i(k)) ≥ dj,i > 0ds-minCHj,i(k))≥ dj,i > 0
Table 2. Influence of frequency channel interval to ds-min.
Table 2. Influence of frequency channel interval to ds-min.
ΔCHj,i(k)0123≥4
ds-minCHj,i(k))0.0269 m0.8452 m2.6970 m6.7458 m10.339 m
Table 3. Symbol and description in artificial immune system optimization.
Table 3. Symbol and description in artificial immune system optimization.
SymbolDescription
ABThe candidate antibody population
Ab(u)The uth antibody
ab(u)iThe ith antibody segment in Ab(u)
ABRemainThe set for remained antibodies
Ab(u)CloneThe clone pool for Ab(u)
Affinity(·)Affinity function
Aff_oldThe mean affinity value of the previous generation
Aff_newThe mean affinity value of the current generation
CHi(k)The kth bit in ab(u)i
NIniThe population size of AB
NCloneThe cloned multiplier
NGenThe generation multiplier
LRegion-bits mutation length
PSThe suppression percentage
Table 4. Parameter settings of proposed AIS optimization process.
Table 4. Parameter settings of proposed AIS optimization process.
ParameterValue
The number of available time slots (NSlot)5
The number of available frequency channels (NFreq)10
Initialized candidate population size (NIni)40
Cloned Multiplier (NClone)5
Maximum generation (NGen)150
Suppression percentage (PS)25%
Table 5. The operating schedule for 15 readers with NSlot = 5 and NFreq = 10 among three algorithms.
Table 5. The operating schedule for 15 readers with NSlot = 5 and NFreq = 10 among three algorithms.
GD-MRSOA-AISMRSOA-AISLIs
TSkTS1TS2TS3TS4TS5TS1TS2TS3TS4TS5TS1TS2TS3TS4TS5
CHi(k)
Ri
R1000000671170035
R201071000010701871
R30100510300000500
R40010000000013113
R5001000000000001
R6050000000000000
R7500000000000000
R80050000000010000
R97000002105000008
R10080000000000300
R11000089000500000
R12008000000000000
R1303000700301077107
R141009619200000010
R15100333505710351059
* In the table, TSk stands for the kth time slot from the optional values of {TS1, TS2, TS3, TS4, TS5} in NSlot = 5. Ri stands for the ith reader from the optional values of {R1, R2, …, R15} in NReader = 15. The operating frequency channel for ith reader at kth time slot (CHi(k)) is listed from the optional values of CH = {0, 1, 2, 3, …, 10} when NFreq = 10, where CHi(k) = 0 means that the ith reader does not work at kth time slot.
Table 6. The comparison results of the total effective interrogation range with NSlot = 5 and NFreq = 10.
Table 6. The comparison results of the total effective interrogation range with NSlot = 5 and NFreq = 10.
NReaderAlgorithmBest (Unit: m2)Worst (Unit: m2)Mean (Unit: m2)Average Radius (Unit: m)Jain Index (IJain)
4GD-MRSOA-AIS3886.1662459.977 *3190.954 *6.906 *-
MRSOA-AIS3976.631 *1918.7563078.5806.784-
LIs3570.6611512.3973041.5276.573-
8GD-MRSOA-AIS4392.362 *3287.613 *3907.504 *4.308 *42.19% *
MRSOA-AIS4293.6503180.3013790.5654.17425.00%
LIs4316.2393263.5203859.6304.25229.69%
12GD-MRSOA-AIS3910.000 *3328.207 *3539.014 *2.670 *27.08% *
MRSOA-AIS3765.5713014.0433481.6252.62013.89%
LIs3671.9772977.3523428.5922.63918.06%
16GD-MRSOA-AIS3780.408 *3356.667 *3533.103 *2.027 *27.34% *
MRSOA-AIS3612.8262901.9543471.4311.97419.92%
LIs3437.0093128.8283270.9781.96321.88%
20GD-MRSOA-AIS3331.8452935.414 *3133.6861.44370.50% *
MRSOA-AIS3369.615 *2901.9543160.941 *1.463 *40.25%
LIs2869.2252297.5902528.8641.34645.50%
24GD-MRSOA-AIS3232.966 *2550.474 *2909.812 *1.229 *68.06% *
MRSOA-AIS3206.0982279.1842830.7331.19543.75%
LIs2151.0931874.9132035.6511.02042.36%
28GD-MRSOA-AIS3068.395 *2436.6882737.177 *0.999 *64.29% *
MRSOA-AIS2675.7892586.912 *2616.5380.92335.71%
LIs1859.4091532.3771670.7420.81432.14%
* The best one for each comparison.

Share and Cite

MDPI and ACS Style

Duan, L.; Wang, Z.J.; Duan, F. Geometric Distribution-Based Readers Scheduling Optimization Algorithm Using Artificial Immune System. Sensors 2016, 16, 1924. https://doi.org/10.3390/s16111924

AMA Style

Duan L, Wang ZJ, Duan F. Geometric Distribution-Based Readers Scheduling Optimization Algorithm Using Artificial Immune System. Sensors. 2016; 16(11):1924. https://doi.org/10.3390/s16111924

Chicago/Turabian Style

Duan, Litian, Zizhong John Wang, and Fu Duan. 2016. "Geometric Distribution-Based Readers Scheduling Optimization Algorithm Using Artificial Immune System" Sensors 16, no. 11: 1924. https://doi.org/10.3390/s16111924

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop