RFID Reader and Method for Recognizing RFID tags

20170235979 · 2017-08-17

    Inventors

    Cpc classification

    International classification

    Abstract

    An RFID reader includes a transmitter, a receiver, and an evaluator. The receiver receives signals from RFID tags within a given number of slots of a time frame with a given frame size and provides a number of successful slots and a number of collided slots. The evaluator sets a modified frame size based on an estimated number of RFID tags which is determined based on the frame size, the number of successful slots, and the number of collided slots. The invention also refers to a corresponding method.

    Claims

    1. A Radio Frequency Identification (RFID) reader, comprising a transmitter configured for transmitting a request signal, a receiver configured for receiving signals from Radio Frequency Identification (RFID) tags and an evaluator, wherein the receiver is configured to receive the signals from the RFID tags within a given number of slots of a time frame with a given frame size, wherein the receiver is configured to provide a number of successful slots in which one signal has been received and a number of collided slots in which a detection of one single signal was not possible, wherein the evaluator is configured to set a modified frame size based on an estimated number of RFID tags, wherein the evaluator is configured to determine the estimated number of RFID tags based on the frame size, the number of successful slots, and the number of collided slots.

    2. The RFID reader of claim 1, wherein said evaluator is configured to determine the estimated number of RFID tags using a closed form solution.

    3. The RFID reader of claim 1, wherein n.sub.est is the estimated number of RFID tags, wherein L′ is the modified frame size, and wherein the evaluator is configured to set the modified frame size L′ via L′=n.sub.est+/−5%.

    4. The RFID reader of claim 1, wherein n.sub.est is the estimated number of RFID tags, wherein L is the frame size, wherein cs is the number of collided slots, wherein ss is the number of successful slots, wherein said evaluator is configured to determine the estimated number of RFID tags using the following formula: n est = ( - b 4 .Math. a - S + 0.5 .Math. - 4 .Math. S 2 - 2 .Math. P + q S ) .Math. L , .Math. with .Math. : .Math. .Math. a = 1 / 120 * .Math. ( L - cs ) , .Math. b = 1 / 24 * .Math. ( L - cs - ss / 5 ) , .Math. c = 1 / 6 * .Math. ( L - cs - ss / 4 ) , .Math. d = 1 / 2 * .Math. ( L - cs - ss / 3 ) , .Math. e = ( L - cs - ss / 2 ) , .Math. P = 8 .Math. a .Math. .Math. c - 3 .Math. b 2 8 .Math. a 2 , .Math. q = b 3 - 4 .Math. abc + 8 .Math. a 2 .Math. d 8 .Math. a 3 , .Math. s = 0.5 .Math. - 2 3 .Math. P + 1 3 .Math. a .Math. ( Q + Δ 0 Q ) , .Math. Q = Δ 1 + Δ 1 2 - 4 .Math. Δ 0 3 2 3 , .Math. Δ 0 = c 2 - 3 .Math. bd + 12 .Math. ae , and .Math. .Math. Δ 1 = 2 .Math. c 3 - 9 .Math. bcd + 27 .Math. ad 2 - 72 .Math. ace .

    5. The RFID reader of claim 1, wherein the receiver is configured to perform with a collision recovery probability a collision recovery by identifying a signal within a slot comprising more than one signal, wherein the receiver is configured to provide the number of successful slots and the number of collided slots after performing the collision recovery, and wherein the evaluator is configured to determine the estimated number of RFID tags based on the frame size, the number of successful slots, the number of collided slots, and the collision recovery probability.

    6. The RFID reader of claim 5, wherein n.sub.est is the estimated number of RFID tags, wherein L is the frame size, wherein cs is the number of collided slots, wherein ss is the number of successful slots, wherein α is the collision recovery probability, wherein the evaluator is configured to determine the estimated number of RFID tags using the following formula: n est = ( - b 4 .Math. a - S + 0.5 .Math. - 4 .Math. S 2 - 2 .Math. P + q S ) .Math. L , .Math. with .Math. : a = 1 / 120 * .Math. ( L - C b ) , .Math. b = 1 / 24 * .Math. ( L - C b - S b / 5 ) , .Math. c = 1 / 6 * .Math. ( L - C b - S b / 4 ) , .Math. d = 1 / 2 * .Math. ( L - C b - S b / 3 ) , .Math. e = ( L - C b - S b / 2 ) , .Math. P = 8 .Math. a .Math. .Math. c - 3 .Math. b 2 8 .Math. a 2 , .Math. q = b 3 - 4 .Math. abc + 8 .Math. a 2 .Math. d 8 .Math. a 3 , .Math. s = 0.5 .Math. - 2 3 .Math. P + 1 3 .Math. a .Math. ( Q + Δ 0 Q ) , .Math. Q = Δ 1 + Δ 1 2 - 4 .Math. Δ 0 3 2 3 , .Math. Δ 0 = c 2 - 3 .Math. bd + 12 .Math. ae , and Δ 1 = 2 .Math. c 3 - 9 .Math. bcd + 27 .Math. ad 2 - 72 .Math. ace , wherein C.sub.b is the number of collided slots before the collision recovery performed by the receiver, wherein C.sub.b is associated with the number of collided slots cs by the collision recovery probability α via: C.sub.b=cs/(1−α), wherein S.sub.b is the number of successful slots before the collision recovery performed by the receiver, wherein S.sub.b is associated with the number of successful slots ss by the collision recovery probability α via: S.sub.b=ss−α/(1−a)*C.

    7. A method for recognizing at least one Radio Frequency Identification (RFID) tag, comprising: transmitting a request signal, receiving signals within a given number of slots of a time frame with a given frame size, providing a number of successful slots in which one signal has been received and a number of collided slots in which a detection of one single signal was not possible, determining an estimated number of RFID tags based on the frame size, the number of successful slots, the number of collided slots, and a collision recovery probability, and setting a modified frame size based on an estimated number of RFID tags.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0051] Embodiments of the present invention will be detailed subsequently referring to the appended drawings, in which:

    [0052] FIG. 1 shows schematically an inventive RFID reader,

    [0053] FIG. 2 shows the capture probability versus the signal to noise ratio for an exemplary RFID reader,

    [0054] FIG. 3a-b shows the relative estimation error versus the normalized number of tags n/L for systems without (FIG. 3a) and with collision recovery capability (FIG. 3b),

    [0055] FIG. 4 shows the relative estimation error versus the collision recovery probability, where the number of slots L equals the number of tags n, and

    [0056] FIG. 5a-b shows the average identification delay for systems without (FIG. 5a) and with collision recovery capability (FIG. 5b).

    DETAILED DESCRIPTION OF THE INVENTION

    [0057] FIG. 1 shows schematically an inventive RFID reader 1 in the vicinity of different RFID tags 10. The RFID reader 1 sends via its transmitter 2 a request signal to the RFID tags 10 asking for a response including an identification from the RFID tags 10. This request signal is followed by a certain amount of time or a time frame of size L in which the receiver 3 is listening for response signals from the RFID tags 10.

    [0058] This time frame is divided in a given number of slots with the intention that each RFID tags 10 answers during a different slot. For this random distribution of the answers, usually, a 16-Bit random number (RN16) is used.

    [0059] In case more than one RFID tag answers in the same slot, the slot is discarded as usually just one RFID tag can be identified within a slot.

    [0060] The shown RFID reader 1 is able to perform a collision recovery, i.e. to extract one signal from a slot having more than one response signal. Such an identification is, e.g., possible when the concerned RFID tags have different distances from the RFID reader leading to discernibly different signal amplitudes. This collision recovery happens on the physical layer of the receiver 3.

    [0061] After listening for answers during the time frame, the receiver 3 provides the number of the successful slots (ss or S in a part of the following explanation), the number of collided and, thus, discarded slots (cs or C in the following), and the number of the empty slots (es or E in the following). The sum of the numbers of the slots equals the number of slots of the frame L. Hence, in one embodiment, just the numbers of two kind of slots (e.g. collided and successful slots) are provided by the receiver.

    [0062] Based on the number of collided and successful slots, the current frame size L, and the collision recovery probability α, the evaluator 4 determines an estimated value of the number of RFID tags 10 present in the vicinity of the RFID reader 1: n.sub.est. With this value n.sub.est the modified frame size L′ for the next turn of listening to the responses of the RFID tags is determined, i.e., accordingly adjusted.

    [0063] In the invention for adapting the frame size L to the given situation and the number of present RFID tags, the number of RFID tags is estimated using a closed form solution and taking the collision recovery probability α of the system into consideration.

    [0064] As one aspect of the invention, the collision recovery probability α is calculated from the physical layer parameters.

    [0065] The invention gives a direct relation between the estimated number of tags n and the frame length L, successful and collided number of slots S (or ss), C (or cs), and the collision recovery probability α. This closed form eases the calculation of the estimated number of slots n.sub.est, thus, reducing the energy consumption for the calculations and the requirements on the calculation facilities of the RFID reader. Further, in contrast to an iterative calculation of the frame size, it is possible to obtain an optimal value even after one initial measurement.

    [0066] The invention is based on the classical Maximum Likelihood (ML) estimation as given by [5].

    [0067] According to the classical ML estimation method, the optimum value of the estimated number of RFID tags: n.sub.est is searched which maximizes the conditional probability of the observing vector v=(C, S, E) with the number of collided, successful and empty slots, respectively. This is done under the assumption that n tags transmit at a frame length L.

    [0068] This conditional probability is given by:

    [00004] P ( n / L , S , C , E ) = L ! E ! .Math. S ! .Math. C ! .Math. P e E .Math. P s S .Math. P c C ( 1 )

    [0069] C, S, and E are successively the number of collided, successful, and empty slots for a given frame length L. P.sub.e, P.sub.s, and P.sub.c are respectively the probabilities of empty, successful and collided transmission per slot.

    [0070] As modern RFID readers have a collision recovery capability, the physical layer allows to convert a part of collided slots into successful slots. This is described by the following relations:


    E=E.sub.b,


    S=S.sub.b+α*C.sub.b, and


    C=C.sub.b−α*C.sub.b=C.sub.b(1−α)  (2)

    [0071] E.sub.b, S.sub.b, and C.sub.b are successively the number of empty, successful, and collided slots before a collision recovery of the RFID system. C, S, E are respectively the number of collided, successful, and empty slots after the collision recovery of the system. Finally, α is the collision recovery probability.

    [0072] In the MAC layer, only the values of C, S, E after collision recovery are known, and there is no information about these values (E.sub.b, S.sub.b, and C.sub.b) before collision recovery.

    [0073] Thus, the conventional estimation systems including the classical ML number of tags estimation in formula (1) use the values of C, S, E after collision recovery in their calculations.

    [0074] However, these values are not accurate indicators about the actual number of tags in the reading area.

    [0075] In the inventive system, the value of the current average collision recovery probability α as shown in [10] is estimated.

    [0076] Afterwards, the corresponding values of E.sub.b, S.sub.b, and C.sub.b are calculated, using the formulas (2):


    E.sub.b=E,


    S.sub.b=S−α/(1−α)*C, and


    C.sub.b=C/(1−α).  (3)

    [0077] This is done under the condition that the respective numbers of slots before collision recovery are connected to the frame length L via:


    L=E.sub.b+S.sub.b+C.sub.b.  (4)

    [0078] This implies that the maximum number of collided slots before collision recovery C.sub.b(max) is given by:


    C.sub.b(max)=L−E.sub.b

    and that the minimum number of successful slots before collision recovery S.sub.b(min) is given by:


    S.sub.b(min)=0

    [0079] Therefore, the proposed collision recovery aware ML conditional probability can be formalized as:

    [00005] P ( n / L , S , C , E , α ) = L ! E b ! .Math. S b ! .Math. C b ! .Math. P e E b .Math. P s S b .Math. P c C b ( 5 )

    [0080] Considering a dense RFID network, the approximation suggested in [4] for probability of transmission of the RFID tags per slot is used, which are considered as independent Poisson random variables with unknown mean γ=n.sub.est/L with the estimated number of tags n.sub.est and the frame length L.

    [0081] The respective probabilities are given by:


    P.sub.e=e.sup.−γ,P.sub.s=γ.Math.e.sup.−γ,P.sub.c=1−e.sup.−γ−γ.Math.e.sup.−γ.  (6)

    [0082] Substituting the probabilities in formula (5) by the probabilities of (6) and normalizing the result equation from the constant

    [00006] L ! E b ! .Math. S b ! .Math. C b ! ,

    the resulting proposed conditional probability will be:


    P(n/L,S,C,E,α)=γ.sup.S.sup.b.Math.e.sup.−γ.Math.L.Math.(e.sup.−γ−1−γ).sup.C.sup.b  (7)

    [0083] The computation of formula (7) could be done numerically to obtain the optimum value of n.sub.est which maximizes formula (7). Nevertheless, the calculation of formula (7) may lead to numerical instability problems using low-complexity devices.

    [0084] Therefore, in the method according to the invention, a closed form solution for the collision recovery aware estimation is used.

    [0085] This is achieved by differentiating formula (7) with respect to γ=n.sub.est/L and by equating the results to zero, i.e., by calculation an extremum of the formula (7).

    [0086] After differentiating, the equation can be simplified as:

    [00007] e - γ ( 1 + γ ( γ .Math. L - S b ) ( γ .Math. L - S b - γ .Math. C b ) ) - 1 = 0. ( 8 )

    [0087] The analysis of formula (8) indicates that the relevant values for γ are in the region close to one (compare [10]).

    [0088] Hence, a Taylor series for e.sup.−γ can be developed, which leads to:

    [00008] e - γ 1 - γ + 1 2 .Math. γ 2 - 1 6 .Math. γ 3 . ( 9 )

    [0089] After substituting formula (8) and some additional simplifications, the final equation is a fourth order polynomial:

    [00009] 1 120 .Math. ( L - C b ) ( a ) .Math. γ 4 + 1 24 .Math. ( L - C b - S b 5 ) ( b ) .Math. γ 3 + 1 6 .Math. ( L - C b - S b 4 ) ( c ) .Math. γ 2 + 1 2 .Math. ( L - C b - S b 3 ) ( d ) .Math. γ - ( C b + S b 2 ) ( e ) = 0 ( 10 )

    [0090] The abbreviations are given under the respective terms and are:


    a=1/120*(L−C.sub.b),


    b=1/24*(L−C.sub.b−S.sub.b/5),


    c=1/6*(L−C.sub.b−S.sub.b/4),


    d=1/2*(L−C.sub.b−S.sub.b/3),


    e=(L−C.sub.b−S.sub.b/2).


    So that:


    a*γ.sup.4+b*γ.sup.3+c*γ.sup.2+d*γ−e=0

    [0091] Equation (10) has four roots given by:

    [00010] γ 1 , 2 = - b 4 .Math. a - S ± 0.5 .Math. - 4 .Math. S 2 - 2 .Math. P + q S X .Math. .Math. γ 3 , 4 = - b 4 .Math. a + S ± 0.5 .Math. - 4 .Math. S 2 - 2 .Math. P - q S Y , ( 11 )

    using the following substitutions:

    [00011] P = 8 .Math. a .Math. .Math. c - 3 .Math. b 2 8 .Math. a 2 , .Math. q = b 3 - 4 .Math. ab .Math. .Math. c + 8 .Math. a 2 .Math. d 8 .Math. a 3 , .Math. S = 0.5 .Math. - 2 3 .Math. P + 1 3 .Math. a .Math. ( Q + Δ 0 Q )

    (this substitution S is not to be confused with the number S of successful slots),

    [00012] Q = Δ 1 + Δ 1 2 - 4 .Math. Δ 0 3 2 3 , .Math. Δ 0 = c 2 - 3 .Math. bd + 12 .Math. ae , and Δ 1 = 2 .Math. c 3 - 9 .Math. bcd + 27 .Math. ad 2 - 72 .Math. ace .

    [0092] Using Descartes' rules of sign − which states that if the terms of a single-variable polynomial with real coefficients are ordered by descending variable exponent, then the number of positive roots of the polynomial is either equal to the number of sign differences between consecutive nonzero coefficients or is less than it by an even number—the proposed closed form solution for the collision recovery aware tag estimation is:

    [00013] n est = ( - b 4 .Math. a - S + 0.5 .Math. - 4 .Math. S 2 - 2 .Math. P + q S ) .Math. L ( 12 )

    [0093] This equations allows to estimate the number of RFID tags present in the surrounding of an RFID reader and allows to set the frame size L for a following turn of submitting a request signal and waiting for replies of the present RFID tags.

    [0094] For the determination of the estimated number of RFID tags n.sub.est, the frame size of a first reading of the replies of the RFID tags to a request signal L, the number of the collided slots before collision recovery C.sub.b, and the number of the successful slots before collision recovery S.sub.b may be used. The number of the collided slots before collision recovery C.sub.b and the number of the successful slots before collision recovery S.sub.b are determined using equations (10) based on the collision recovery probability α.

    [0095] Hence, one measurement is done leading to the number of collided slots C (or cs) and the number of the successful slots S (or ss). With these results, the used frame size L, and the collision recovery probability α, formula (12) allows to determine the estimated number of RFID tags n.sub.est in the surrounding of the RFID reader. This estimated number n.sub.est allows to adjust the frame size L for the next measurement.

    [0096] Hence, it may be used to obtain the collision recovery probability α.

    [0097] In the following, an embodiment will be given for determining the collision recovery probability α which varies in the range of 0≦α≦1 and which depends on the method used by the RFID reader for recovering tag signals from a collided slot.

    [0098] The value of the collision recovery probability α depends on the Signal to Noise Ratio (SNR) of the received signals.

    [0099] In the following embodiment, the SNR for each slot will be measured allowing the calculation of the average SNR per frame.

    [0100] In [11], for a collision recovery it was proposed to capture the strongest tag reply based the physical layer properties leading to a Bit Error Rate (BER) curve versus the SNR.

    [0101] In the following embodiment, the capture probability for a complete collided RN16 packet is calculated, which includes 16 random successive bits. The BER is mapped to Packet Error Rate (PER) by simulation as the channel is not Binary Symmetric Channel (BSC). The packet error ratio in the field of digital transmission is the number of incorrectly received data packets divided by the total number of received packets. A packet is declared incorrect if at least one bit is erroneous.

    [0102] The capture probability can be expressed as: α=(1−PER).

    [0103] FIG. 2 presents the values of the capture probabilities versus the average signal to noise ratio per frame. This is done for one example of an RFID reader (a different expression is RFID receiver). It has to be kept in mind that the collision recovery probability α first of all depends on the abilities of the used RFID reader and its collision recovery capability. In the following example, the average capture probability is calculated from the corresponding average SNR at the current frame.

    [0104] It follows an evaluation of the performance of the invention.

    [0105] At first, a performance metric called relative estimation error c will be defined as follows:

    [00014] ε = .Math. n est - n n .Math. × 100 .Math. % ( 13 )

    [0106] FIG. 3 shows the percentage of the relative estimation error for the proposed system compared to the literature versus the normalized number of tags n/L.

    [0107] FIG. 3a shows a system lacking collision recovery capability (α=0). Obviously, the proposed invention gives identical relative estimation error compared to [5].

    [0108] However, the proposed system gives a closed form solution but the solution of [5] is based on numerical searching. The method according to [6] which included the mutual independence of slot types has almost the same results compared to the proposed results. However, it includes a very complex searching algorithms compared to the proposed closed form solution.

    [0109] FIG. 3b shows an example for modern systems having collision recovery capability.

    [0110] For the figure, a collision recovery probability α=0.7 was used.

    [0111] FIG. 3b shows that the curve of the inventive method has a more accurate estimation performance compared to all the literature.

    [0112] FIG. 4 shows the relative estimation error versus the collision recovery probability α assuming that the number of tags in the reading area is equal to the frame length, i.e., where n=L holds.

    [0113] It shows that when the value of the collision recovery probability increases, the performance of all other proposals decreases, except the proposed method has almost constant performance independent on the value of the collision recovery probability.

    [0114] FIG. 5 shows the average identification delay for a bunch of tags.

    [0115] FIG. 5a shows the identification time for systems with no collision recovery capability (α=0). In these simulations is was assumed that the optimum frame length is the nearest quantized 2.sup.Q for L=n. The proposed method gives identical results compared to [5] and [6] better than the other literature.

    [0116] FIG. 5b, shows the average identification delay for systems has a collision recovery probability α=0.7.

    [0117] The average identification delay has decreased for all the systems due to the collision recovery capability. However, the proposed system saves the total identification time with almost 10% compared to the others due to the performance of estimation only.

    [0118] The invention comprises the following features: [0119] The proposed estimation method considers the collision recovery probability of the system. Here, the collision recovery probability depends on the type of receiver and the current value of the SNR. [0120] The estimation accuracy of the proposed estimation method is not affected by the value of the collision recovery probability of the RFID reader (value of a). [0121] The proposed method proposes a closed form solution.

    [0122] The usage of the closed form solution provides at least the following advantages: [0123] There is no need for any look up table. [0124] No numerical instability problems arise using low-complexity devices even in dense RFID networks.

    [0125] The invention is useful for all RFID applications which: [0126] follow EPCglobal class 1 gen 2 standards. [0127] are affected by a dense number of tags. [0128] suffer from the fact that time is a very critical issue in the identification process.

    [0129] Although some aspects have been described in the context of an apparatus, it is clear that these aspects also represent a description of the corresponding method. Analogously, aspects described in the context of a method step also represent a description of a corresponding block or item or feature of a corresponding apparatus.

    [0130] Some embodiments according to the invention comprise a data carrier having electronically readable control signals, which are capable of cooperating with a programmable computer system, such that one of the methods described herein is performed.

    [0131] Generally, embodiments of the present invention can be implemented as a computer program product with a program code, the program code being operative for performing one of the methods when the computer program product runs on a computer. The program code may for example be stored on a machine readable carrier.

    [0132] Other embodiments comprise the computer program for performing one of the methods described herein, stored on a machine readable carrier.

    [0133] In other words, an embodiment of the inventive method is, therefore, a computer program having a program code for performing one of the methods described herein, when the computer program runs on a computer.

    [0134] A further embodiment of the inventive methods is, therefore, a data carrier (or a digital storage medium, or a computer-readable medium) comprising, recorded thereon, the computer program for performing one of the methods described herein. The data carrier, the digital storage medium or the recorded medium are typically tangible and/or non-transitory.

    [0135] A further embodiment of the inventive method is, therefore, a data stream or a sequence of signals representing the computer program for performing one of the methods described herein. The data stream or the sequence of signals may for example be configured to be transferred via a data communication connection, for example via the Internet.

    [0136] A further embodiment comprises a processing means, for example a computer, or a programmable logic device, configured to or adapted to perform one of the methods described herein.

    [0137] A further embodiment comprises a computer having installed thereon the computer program for performing one of the methods described herein.

    [0138] A further embodiment according to the invention comprises an apparatus or a system configured to transfer (for example, electronically or optically) a computer program for performing one of the methods described herein to a receiver. The receiver may, for example, be a computer, a mobile device, a memory device or the like. The apparatus or system may, for example, comprise a file server for transferring the computer program to the receiver.

    [0139] In some embodiments, a programmable logic device (for example a field programmable gate array) may be used to perform some or all of the functionalities of the methods described herein. In some embodiments, a field programmable gate array may cooperate with a microprocessor in order to perform one of the methods described herein. Generally, the methods may be performed by any hardware apparatus.

    [0140] The apparatus described herein may be implemented using a hardware apparatus, or using a computer, or using a combination of a hardware apparatus and a computer.

    [0141] The methods described herein may be performed using a hardware apparatus, or using a computer, or using a combination of a hardware apparatus and a computer.

    [0142] While this invention has been described in terms of several embodiments, there are alterations, permutations, and equivalents which fall within the scope of this invention. It should also be noted that there are many alternative ways of implementing the methods and compositions of the present invention. It is therefore intended that the following appended claims be interpreted as including all such alterations, permutations and equivalents as fall within the true spirit and scope of the present invention.

    REFERENCES

    [0143] [1] H. Vogt, “Efficient object identification with passive RFID rags”, International Conference on Pervasive Computing, Zurich, 2002. [0144] [2] H. Vogt, “Multiple object identification with passive rfid tags”, Systems, Man and Cybernetics, 2002 IEEE International Conference on, vol. 3, pp. 6 pp. vol. 3, October 2002. [0145] [3] F. Schoute, “Dynamic Frame Length ALOHA”, IEEE Transactions on Communications, vol. 31, no. 4, pp. 565-568, 1983. [0146] [4] A. Zanella, “Estimating collision set size in framed slotted aloha wireless networks and rfid systems”, Communications Letters, IEEE, vol. 16, pp. 300-303, 2012. [0147] [5] W.-T. Chen, “An accurate tag estimate method for improving the performance of an rfid anticollision algorithm based on dynamic frame length aloha”, Automation Science and Engineering, IEEE Transactions on, vol. 6, pp. 9-15, 2009. [0148] [6] E. Vahedi, V. Wong, I. Blake, and R. Ward, “Probabilistic analysis and correction of chen's tag estimate method”, Automation Science and Engineering, IEEE Transactions on, vol. 8, pp. 659-663, 2011. [0149] [7] P. Solic, J. Radic, and N. Rozic, “Linearized combinatorial model for optimal frame selection in gen2 rfid system”, in RFID (RFID), 2012 IEEE International Conference on, pp. 89-94, 2012. [0150] [8] P. Solic, J. Radic, and N. Rozic, “Energy efficient tag estimation method for alohabased rfid systems”, Sensors Journal, IEEE, vol. 14, pp. 3637-3647, 2014. [0151] [9] B. Li and J. Wang, “Efficient anti-collision algorithm utilizing the capture effect for iso 18000-6c rfid protocol”, Communications Letters, IEEE, vol. 15, pp. 352-354, 2011. [0152] [10] H. Salah, H. Ahmed, J. Robert, and A. Heuberger, “A time and capture probability aware closed form frame slotted aloha frame length optimization”, Communications Letters, IEEE, vol. 19, pp. 2009-2012, 2015. [0153] [11] C. Angerer, R. Langwieser, and M. Rupp, “Rfid reader receivers for physical layer collision recovery”, Communications, IEEE Transactions on, vol. 58, pp. 3526-3537, 2010.