Skip to main content

I Know When to Do the Replenishment

  • Conference paper
  • First Online:
Big Data Computing and Communications (BigCom 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9196))

Included in the following conference series:

  • 2113 Accesses

Abstract

RFID technology is an emerging one poised to extensive applications such as warehouse, retail, and object tracking. Replenishment is a thorny and efficiency-need problem, which requires to report the remaining information to the server seasonably to guarantee goods supply uninterruptedly. Traditional protocols are aimed at identification, detection and estimation. In this paper, we in turn propose two progressive protocols to prove the second one MMP is the best. We divide the MMP into two phase, firstly, we use the category ID to classify all the tags to serve preferably for laying the root of replenishment whole planning; secondly, we borrow the idea from micro view to estimate the macro, which only use the successful singleton slots, consequently avoiding the collision, and is a much easier design and novel enough. The simulation results show that our protocol significantly solves the replenishment problem and reduces the total scanning time, which is much more efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, S., Zhang, M., Xiao, B.: Efficient information collection protocols for sensor-augmented RFID networks. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2011), pp. 3101–3109, April 2011

    Google Scholar 

  2. Tan, C.C., Sheng, B., Li, Q.: How to monitor for missing RFID tags. In: Proc. of IEEE ICDCS (2008)

    Google Scholar 

  3. Yang, L., Han, J., Qi, Y., Wang, C., Gu, T., Liu, Y.: Season: shelving interference and joint identification in large-scale RFID systems. In: Proceedings of the IEEE INFOCOM, pp. 3092–3100, Shanghai, China, April 2011

    Google Scholar 

  4. Roberts, L.G.: Aloha packet system with and without slots and capture. ACM SIGCOMM Computer Communication Review 5, 28–42 (1975)

    Article  Google Scholar 

  5. Myung, J., Lee, W.: Adaptive splitting protocols for rfid tag collision arbitration. In: Proc. of MobiHoc (2006)

    Google Scholar 

  6. Mutti, C., Floerkemeier, C.: Cdma-based rfid systems in dense scenarios: concepts and challenges. In: Proc. of RFID (2008)

    Google Scholar 

  7. Zheng, Y., Li, M., Qian, C.: PET: probabilistic estimating tree for large-scale RFID estimation. In: Proceedings of the 31st IEEE International Conference on Distributed Computing Systems (ICDCS 2011), pp. 37–46, July 2011

    Google Scholar 

  8. Han, H., Sheng, B., Tan, C.C., Li, Q., Mao, W., Lu, S.: Counting RFID tags efficiently and anonymously. In: Proceedings of the IEEE INFOCOM, San Diego, Calif, USA, March 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jumin Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhao, J., Li, N., Li, Da. (2015). I Know When to Do the Replenishment. In: Wang, Y., Xiong, H., Argamon, S., Li, X., Li, J. (eds) Big Data Computing and Communications. BigCom 2015. Lecture Notes in Computer Science(), vol 9196. Springer, Cham. https://doi.org/10.1007/978-3-319-22047-5_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22047-5_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22046-8

  • Online ISBN: 978-3-319-22047-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics