RFID reader and method for adjusting a frame length of an RFID system comprising an RFID reader
09881187 ยท 2018-01-30
Assignee
Inventors
- Hazem ELSAID IBRAHIM (Erlangen, DE)
- Hamed KENAWY (Erlangen, DE)
- Joerg Robert (Uttenreuth, DE)
- Albert Heuberger (Erlangen, DE)
- Wolfram Strauss (Nuremberg, DE)
Cpc classification
G06K7/10029
PHYSICS
G06K7/10089
PHYSICS
G06K7/10019
PHYSICS
G06K7/10069
PHYSICS
International classification
Abstract
Embodiments provide an RFID reader. The RFID reader includes a collision detector, a decoder and a frame length adjuster. The collision detector is configured to detect for each slot of a plurality of slots of a current frame, in which a collision of signals transmitted by at least two RFID tags occurred, a signal property of a signal of the signals transmitted by at least two RFID tags. The decoder is configured to decode for the slot in which the collision is detected the signal of the signals transmitted by the at least two RFID tags using the detected signal property, wherein a collision recover probability describing a probability that the decoder can accurately decode the one signal depends on a signal-to-noise ratio (SNR) of the current frame. The frame length adjuster is configured to adjust a frame length of a subsequent frame in dependence on the collision recover probability.
Claims
1. An RFID reader, comprising: a collision detector configured to detect for each slot of a plurality of slots of a current frame, in which a collision of signals transmitted by at least two RFID tags occurred, a signal property of a signal of the signals transmitted by the at least two RFID tags; a decoder configured to decode for the slot in which the collision is detected the signal of the signals transmitted by the at least two RFID tags using the detected signal property, wherein a collision recover probability describing a probability that the decoder can accurately decode the one signal depends on a signal-to-noise ratio of the current frame; and a frame length adjuster configured to adjust a frame length of a subsequent frame in dependence on the collision recover probability.
2. The RFID reader according to claim 1, wherein the collision detector is configured to detect the signal property of the signal of the signals transmitted by the at least two RFID tags having the greatest signal strength; wherein the decoder is configured to decode for the slot in which the collision occurred the signal of the signals transmitted by the at least two RFID tags having the greatest signal strength; wherein the frame length adjuster is configured to determine the collision recover probability describing a probability that the decoder can accurately decode the signal having the strongest signal strength in dependence on the signal-to-noise ratio of the current frame.
3. The RFID reader according to claim 2, wherein the determined collision recover probability is greater than zero.
4. The RFID reader according to claim 2, wherein the frame length adjuster is configured to determine the collision recover probability per frame.
5. The RFID reader according to claim 2, wherein the frame length adjuster is configured to adjust the frame length of the subsequent frame further in dependence on a collision probability describing the probability of the collision of the signals transmitted by the at least two RFID tags.
6. The RFID reader according to claim 5 wherein the frame length adjuster is configured to determine the collision probability using the formula:
7. The RFID reader according to claim 5, wherein the frame length adjuster is configured to determine a reading efficiency of the RFID reader in dependence on the collision probability and the determined collision recovery probability, and wherein the frame length adjuster is configured to adjust the frame length of the subsequent frame using the reading efficiency of the RFID reader.
8. The RFID reader according to claim 7, wherein the frame length adjuster is configured to adjust the frame length of the subsequent frame such that the reading efficiency of the RFID reader is increased.
9. The RFID reader according to claim 8, wherein the frame length adjuster is configured to adjust the frame length of the subsequent frame such that the reading efficiency of the RFID reader is maximized.
10. The RFID reader according to claim 7, wherein the frame length adjuster is configured to determine the reading efficiency based on the formula:
.sub.DCR=P(1)+.sub.i=2.sup.n.sub.iP.sub.col.(i) wherein describes the probability that only one RFID tag transmits a signal per slot, describes the probability that at least two RFID tags transmit signals per slot, describes the probability that the decoder can accurately decode the signal having the strongest signal strength when at least two RFID tags transmit signals per slot.
11. The RFID reader according to claim 1, wherein the frame length adjuster is configured to determine the collision recover probability in dependence on an average signal-to-noise ratio of the current frame.
12. The RFID reader according to claim 1, wherein the signal property is a backscatter link frequency.
13. Method for adjusting a frame length of an RFID system comprising an RFID reader and at least two RFID tags, the method comprising: detecting for each slot of a plurality of slots of a current frame, in which a collision of signals transmitted by at least two RFID tags occurred, a signal property of a signal of the signals transmitted by the at least two RFID tags; decoding for the slot in which the collision is detected the signal of the signals transmitted by the at least two RFID tags using the detected signal property, wherein a collision recover probability describing a probability that the one signal can be accurately decoded depends on a signal-to-noise ratio of the current frame; and adjusting a frame length of a subsequent frame in dependence on the collision recover probability.
14. A non-transitory digital storage medium having a computer program stored thereon to perform the method for adjusting a frame length of an RFID system comprising an RFID reader and at least two RFID tags, the method comprising: detecting for each slot of a plurality of slots of a current frame, in which a collision of signals transmitted by at least two RFID tags occurred, a signal property of a signal of the signals transmitted by the at least two RFID tags; decoding for the slot in which the collision is detected the signal of the signals transmitted by the at least two RFID tags using the detected signal property, wherein a collision recover probability describing a probability that the one signal can be accurately decoded depends on a signal-to-noise ratio of the current frame; and adjusting a frame length of a subsequent frame in dependence on the collision recover probability, when said computer program is run by a computer.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Embodiments of the present invention will be detailed subsequently referring to the appended drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
DETAILED DESCRIPTION OF THE INVENTION
(26) Equal or equivalent elements or elements with equal or equivalent functionality are denoted in the following description by equal or equivalent reference numerals.
(27) In the following description, a plurality of details are set forth to provide a more thorough explanation of embodiments of the present invention. However, it will be apparent to one skilled in the art that embodiments of the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form rather than in detail in order to avoid obscuring embodiments of the present invention. In addition, features of the different embodiments described hereinafter may be combined with each other unless specifically noted otherwise.
(28)
(29) In the example shown in
(30) It is noted, that the collision recover probability .sub.i may vary from frame to frame, e.g., in dependence on the signal-to-noise ratio. Therefore, the frame length adjuster 106 can be configured to determine the frame length L per frame, i.e. for each subsequent frame. For example, the frame length adjuster 106 can be configured to adjust a frame length of a second frame (e.g. subsequent frame) in dependence on the collision recover probability determined in dependence on a signal-to-noise ratio of a first frame (e.g. current frame), and to adjust a frame length of a third frame in dependence on the collision recover probability determined in dependence on a signal-to-noise ratio of the second frame, and (optionally) to adjust a frame length of a fourth frame in dependence on the collision recover probability determined in dependence on a signal-to-noise ratio of the third frame. In other words, the frame length adjuster 106 can be configured to determine a frame length of a m-th frame in dependence on the collision recover probability determined in dependence on a signal-to-noise ratio of the m1-th frame, wherein m is a natural number equal to or greater than two.
(31) In embodiments, the decoder 104 can be configured to decode for the slot in which the collision happened the signal of the signals 114_1 and 114_2 transmitted by the at least two RFID tags 116_1 and 116_2 having the greatest signal strength. In that case, the frame length adjuster can be configured to determine the collision recover probability .sub.i describing a probability that the decoder can accurately decode the signal having the strongest signal strength in dependence on the signal-to-noise ratio of the current frame 110.
(32) Thereby, the frame length adjuster 106 can be configured to determine the collision recover probability .sub.i per frame (and in thus also in dependence on the per frame determined collision recover probability .sub.i the frame length L per frame).
(33) Further, the frame length adjuster can be configured to adjust the frame length L of the subsequent frame 112 further in dependence on a collision probability P.sub.col.(i) describing the probability of the collision of the signals 114_1 and 114_2 transmitted by the at least two RFID tags 116_1 and 116_2, i.e. describing the possibility that at least two RFID tags 116_1 and 116_2 transmit signals 114_1 and 114_2 in the same slot.
(34) Moreover, the frame length adjuster 106 can be configured to determine a reading efficiency .sub.DCR of the RFID reader 100 in dependence on the collision probability P.sub.col.(i) and the determined collision recovery probability .sub.i. Thereby, the frame length adjuster 106 can be configured to adjust the frame length L of the subsequent frame 112 using the reading efficiency .sub.DCR. In detail, the frame length adjuster 106 can be configured to adjust the frame length L of the subsequent frame 112 such that the reading efficiency .sub.DCR of the RFID reader 100 is maximized or at least increased (e.g., 98%, 95%, 90% or 85% of a maximum value of the reading efficiency).
(35) As already mentioned, the RFID reader 100, or more precisely the decoder 104, can be configured to decode for the slot in which the collision is detected one of the signals 114_1 and 114_2 transmitted by the at least two RFID tags 116_1 and 116_2. Thus, the RFID reader 100 comprises variable collision resolving capabilities. These capabilities depend on the signal-to-noise ratio (SNR) of the received signals, and hence affect the value of the optimum frame length. The reader measures the signal to noise ratio (SNR) of each slot and then get the average SNR of the frame to determine the corresponding collision recovery probability.
(36) In the following, an exemplarily collision recovery algorithm (which can be implemented in the RFID receiver 100 shown in
(37) In other words, subsequently a collision recovery receiver is proposed to recover the strongest tag in the collided slot. The collision recovery receiver does not need any channel state information (CSI) to recover the strongest tag.
(38) Based on the RFID standard [EPC radio-frequency protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz 960 MHz version 1.1.0 2006] the tag uses FMO or Miller to encode its reply.
(39) This decoding algorithm decodes only a single tag reply. In contrast to that, the proposed algorithm (which can be implemented in the RFID reader 100) comprises several modifications, as will become clear from the following discussion. Assuming a collision of two signals, the collision recovery algorithm will be: shift the received signal by half symbol; assume that the received signal power of signal 1 is higher than signal 2. So, the result of the collision will be as shown in
(40) This method could be applied without any knowledge of the channel state information (CSI), and could be applied for more than two collided tags. Moreover, this proposed collision recovery algorithm can be applied for the non synchronous tag reply. However, we have to know the rate of the strongest tag reply. The rate estimation could be done using FFT on the preamble part of the tag reply, as will be described in the following.
(41) The rate estimation in RFID reader receivers plays a significant role for the stability and the efficiency of RFID systems. RFID readers have to estimate the rate of the tag reply, i.e. the so-called backscatter link frequency (BLF). According to the focused EPCglobal Class-1 Gen-2 standard, the BLF can have a variation of up to +/22%. Most literature uses time domain algorithms to estimate this BLF. However, the proposed techniques are not suitable to estimate the rate when multiple tags reply simultaneously to the reader. In case of such tag collision embodiments utilize the frequency domain representation of the replies to estimate the BLF. The performance is tested with different rates and the both supported modulation techniques, i.e. FMO and Miller. Simulation results show the high performance of utilizing the FFT for estimating the BLF. This especially holds in case of collisions that cannot be easily estimated by means of time domain algorithms.
(42) In the recent years, as RFID technology became more popular, more challenges have been met by designers of RFID readers. In typical applications RFID readers have to communicate with multiple tags to be identified in a short time. RFID tags transmit their IDs in different time slots, while diversities of transmitted signals from different tags, mainly on power and data rates, may affect the stability and efficiency of RFID reader receivers severely [P. Wei, B. Li, Y. Yang, H. Min, and J. Wang, Synchronization with timing recovery loop in UHF RFID reader receivers, in 17th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2010, pp. 1148-1151, December 2010]. In UHF RFID systems, the data rate variations are much more crucial than in other communication systems. These data rate variations arise from two reasons that can not be avoided in practical systems. Firstly, low cost RFID tags use a slow system clock for the digital baseband operation, resulting in a measurement error for the parameters that are transmitted by the reader to determine the tag data rate. In the EPCglobal Class-1 Gen-2 RFID protocol, this tag reply rate is called Backscatter Link Frequency (BLF) [EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz version 1.2.0, EPCglobal Inc., 2007.]. Secondly, the tag clock frequency is usually affected by manufacturing process variations, which also contribute to the BLF variations. Based on the standard, a maximum BLF tolerance of 22% is allowed with a BLF range from 40 kHz to 640 kHz. Time limitation adds an extra
(43) challenge for the design of the synchronization module. After receiving the reply from the tag, the RFID reader is necessitated to give a response within 20 Tpri where T.sub.pri=1/BLF [EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz version 1.2.0, EPCglobal Inc., 2007]. At the highest BLF, the operation time left for the whole reader is about 31.25 s, and only a part of it is left for the synchronization. This puts a limit on the use of some complicated rate estimation algorithms.
(44) Several rate estimation algorithms have been proposed to compensate the BLF variations in RFID systems. All these algorithms are used to estimate the BLF during a single tag reply. However, nobody tried to address the rate estimation if more than one tag replies in the same slot, i.e. in case of a collision. Many algorithms have been presented to recover at least one tag from a collision. However, all these algorithms assume that the BLF of all tags are perfectly synchronized.
(45) Liu and Huang et al. [Y. Liu, C. Huang, H. Min, G. Li, and Y. Han, Digital correlation demodulator design for RFID reader receiver, in IEEE Wireless Communications and Networking Conference, 2007.WCNC 2007., pp. 1664-1668, March 2007] presented a rate estimation algorithm based on 12 preamble correlation banks, followed by an early late technique. The BLF range is specified by the correlator that returns the maximum value. Their implementation performs well in applications that are using high rates. For slow rates, the bad performance is compensated using the early late algorithm. For this reason, this technique is not suitable for estimating the rate of a tag in a collided slot. Angerer et al. [C. Angerer and M. Rupp, Advanced synchronisation and decoding in RFID
(46) reader receivers, in IEEE Radio and Wireless Symposium, 2009. RWS '09., pp. 59-62, January 2009] and Wang et al. [Y.-Y. Wang and J.-T. Chen, A baseband signal processing scheme for joint data frame synchronization and symbol decoding for rfid systems, EURASIP J. Adv. Signal Process, vol. 2010, pp. 53:1-53:11, February 2010] proposed new algorithms with lower complexity than [Y. Liu, C. Huang, H. Min, G. Li, and Y. Han, Digital correlation demodulator design for RFID reader receiver, in IEEE Wireless Communications and Networking Conference, 2007.WCNC 2007., pp. 1664-1668, March 2007]. However, also they are not suitable for the rate estimation of collided slot as they depend on the rate estimation in the time domain.
(47) Embodiments provide a rate estimation technique based on the Fast Fourier Transform (FFT) to estimate the rate of a single tag reply, or of the strongest tag from multiple simultaneous tag replies. The technique is tested for a single tag reply and for up to four collided tags. A comparison between the performance of the algorithm at low BLF (i.e. 40 kHz), and high BLF (i.e. 640 kHz) is presented. Furthermore, the effect of the modulation technique of the tag on the rate estimation accuracy is studied. Moreover, the Percentage of Failure (PoF) is used as a performance metric to compare the results.
(48) Subsequently, the EPCGlobal Class-1 Gen-2 is described. The EPCglobal Class-1 Gen-2 standard is a framework for RFID communications, defined by the EPC global (Electronic Product Code) organization [EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz version 1.2.0, EPCglobal Inc., 2007.]. According to the standard, the nominal symbol duration value depends on the tag reply encoding technique. It is a multiple of the inverse of the BLF. In case of FMO encoding, the symbol period is related to the BLF by: T=1/BLF as shown in
(49)
(50) Above equation shows the nominal value of the BLF from the reader parameters. To avoid problems with BLF uncertainties, the EPCglobal standard specifies the frequency uncertainty for different BLF settings as shown in the table 1 below. The tag has to measure the value of TRcal to determine the BLF. Thus, the tolerance is coming from this measurements, so for shorter TRcal, a higher relative error would occur in the BLF.
(51) TABLE-US-00001 TABLE 1 DR: Divide Ratio Trcal (s) BLF (kHz) Frequency Tolerance 64/3 33.3 640 15% 66.7 320 10% 38.3 256 10% 8 50 160 7% 84.2 95 4% 200 40 4%
(52) According to the EPCglobal standard, the pulse shapes s.sub.n(t) follow an FMO (bi-phase space), or Miller encoding. As the FMO encoding offers the higher data rate, most of the readers use this encoding scheme. In FMO encoding, the pulse shapes s.sub.n(t) for the symbols are selected among four pulse shapes as shown in
(53) The extended version from the preamble of FMO has a 12 leading zeros as shown in
(54)
(55) As will become clear from the following discussion, embodiments use the FFT to estimate the rate of the RFID tag reply based on the knowledge of the nominal value of the tag BLF. The FFT can be applied on the part of the preamble that contains the pilot tone. This method can be used either when a single tag replies (successful slot), or when multiple tags reply simultaneously (collided slot). In case of a collided slot, we are only interested in the rate of the strongest tag.
(56) First, the rate estimation in case of a single tag reply is described. The tag reply rate estimation in RFID is a challenging research point. When a single tag replies to the reader, the rate can be estimated in the time domain [C. Angerer and M. Rupp, Advanced synchronisation and decoding in RFID reader receivers, in IEEE Radio and Wireless Symposium, 2009. RWS '09., pp. 59-62, January 2009], [Y.-Y. Wang and J.-T. Chen, A baseband signal processing scheme for joint data frame synchronization and symbol decoding for RFID systems, EURASIP J. Adv. Signal Process, vol. 2010, pp. 53:1-53:11, February 2010], [Y. Liu, C. Huang, H. Min, G. Li, and Y. Han, Digital Correlation Demodulator Design for RFID Reader Receiver, in IEEE Wireless Communications and Networking Conference, 2007. WCNC 2007, pp. 1664-1668, 2007], or in the frequency domain. The advantage of using the time domain is the speed and its simplicity. However, it can not be easily extended when collisions occur. The frequency domain representation can be utilized to estimate the rate either if a collision occurs or not. The reader knows the nominal value of tag reply BLF, and also knows the maximum tolerance as shown in table 1. From the knowledge of the start and the type of the preamble and the rough sampling rate, the reader can successfully apply the FFT on the pilots of the preamble. Then, we can get the peak of the spectrum in the expected range of frequencies. This peak directly corresponds to is the estimated rate as shown in
(57) When Miller encoding is used by the tag, it can take three options, i.e. M=2, 4, 8. For higher values of M the main peak gets sharper, as the length of the preamble increases.
(58) Second, the rate estimation in case of multiple tags replies is described. Significant efforts were exerted in the area of collision recovery in RFID systems. The problem in the collision recovery is the channel and the rate estimation of the collided tags. Angerer et. al. [C. Angerer, R. Langwieser, and M. Rupp, RFID reader receivers for physical layer collision recovery, IEEE Transactions on Communications, vol. 58, pp. 3526-3537, December 2010] proposed a channel estimation technique suitable for two collided tags only. However, they did not consider the rate variations between the tags in their model. Anyway, it is not necessitated to recover all collided tags in a collided slot. Based on the EPCglobal standard, the reader can only acknowledge one tag per slot. Thus, the recovery of multiple tag replies in one slot does not offer any gain. Hence, in our proposal, we focus on the rate estimation of the strongest tag only. If two or more tags are collided, the rate of the strongest tag is estimated by the same algorithm that we used before for the estimation of the single tag. This leads to the frequency domain representation as shown in
(59) When more than two tags collide, and all of them have completely different rates, the algorithm still works well as shown in
(60) In order to evaluate the performance of the proposed rate estimation technique, the Percentage of Failure (PoF) was simulated using Monte Carlo simulations. The normalized dyadic backscatter Rayleigh channel is used as a channel model [J. Griffin and G. Durgin, Gains for rf tags using multiple antennas, IEEE Transactions on Antennas and Propagation, vol. 56, pp. 563-570, February 2008]. The used sampling rate equals to 8 MSps. In all simulations, it was assumed that the error follows normal distribution with zero mean and variance equals to (maximum tolerance/3).sup.2, i.e. according to table 1, if the BLF equals to 640 kHz, the variance equals to 0.025.
(61)
(62)
(63) The main advantage of using the FFT is the ability to estimate the rates of the collided tags. In simulations, the focus is only on estimating the rate of the strongest tag from collided tags, as based on the standard, the reader can only acknowledge one tag per slot. Therefore, there is no need to try to recover all tags while the reader could only acknowledge one tag. Also the focus only the collided slots that have 2, 3, or 4 tags as based on the statistics, the collided slots that have 2, 3, or 4 tags are 96% from the overall collided slots as shown in
(64)
(65)
(66) Embodiments use the FFT (FFT=fast Fourier transform) to estimate the rate of the tag reply of an RFID system based on EPCglobal standard. The algorithm mainly depends on getting the maximum peak of the received signal in the frequency domain, and the corresponding frequency is the estimated rate. The FFT is applied only on the part that has the pilot tones in the preamble of the tag reply. Using the frequency domain of the signal is very helpful, especially when multiple tags reply at the same time. The performance of the technique is tested with multiple rates and multiple modulation techniques based on the EPCglobal standard. Simulations show that lower rates have lower PoF than the higher rates at identical SNR. The Miller encoding scheme offers better performance in the rate estimation than FMO due to its longer preamble. However, the Miller encoding has a significantly lower rate than FMO. Finally, we used the FFT to estimate the rate of the strongest tag when multiple tags reply simultaneously. When two tags collide and the rate of the strongest is estimated, the PoF decreases with increasing the SNR, and it reaches to 1.5% at SNR=20 dB. However, when three or four tags collide, the PoF saturates at 9% and 14.5% for three and four tags respectively. Here, the performance is limited by the interference between the tags. When Miller is used by the tag, the performance of estimating two tags improved significantly and the PoF reaches to 0.2% at SNR=20 dB. Though, the performance of three and four tags nearly remains the same as there is no improvement in the SNR.
(67) Subsequently, referring to embodiments of the RFID reader 100 shown in
(68) In other words, subsequently a new FSA (frame slotted ALOHA) reading efficiency refered herein as to dynamic collision recovery reading efficiency (DCR) is described. This efficiency contains cross layer probability coefficients .sub.i. These coefficients .sub.i indicate the ability of the reader to recover i collided tags, where this ability is dynamic based on the powerful of the reader collision recovery and the average SNR for the collided tags. The proposed dynamic collision recovery reading efficiency (DCR) can be expressed as:
(69)
where, P.sub.col(i) is the probability that i tags collided in a slot, n represents the total number of tags in the reading area, and .sub.i are the cross layer probability coefficients, which were assumed in the literature to be 100%.
(70) In practice the most of the collided slots are either two tags, three tags, or four tags collided slot.
(71)
uniformly. In other words,
(72)
According to
(73) Therefore, the proposed dynamic collision recovery reading efficiency .sub.DCR in the RFID environment can be expressed as follows:
.sub.DCR=P(1)+.sub.2P.sub.col(2)+.sub.3P.sub.col(3)+.sub.4P.sub.col(4)
(74) The values of .sub.2, .sub.3, and .sub.4 are strongly dependent on the type of the RFID receiver 100 and the value of the average signal-to-noise ratio per frame. The SNR is calculated for each slot either the slot is collided slot or successful slot then we get the average value for the SNR for the overall frame.
(75)
(76) In the following, the gain provided by embodiments of the present invention compared to the conventional solutions are clarified. In other words, the performance provided by embodiments of the present invention is evaluated.
(77) As becomes clear from
(78) Embodiments provide the following advantages: using the proposed RFID reader 100 and the method for operating the same, the mean reading (identification) time will decrease up to 40% compared to conventional systems; and the proposed RFID receiver does not need any channel state information (CSI) to recover the strongest tag from the collided slot.
(79) Embodiments are useful for RFID applications: which follow EPCglobal Class-1 Gen-2 standards; which comprise a dense number of tags; and in which time is a very critical issue in the identification process.
(80)
(81) One of the main challenges in RFID systems 200 is the collision recovery, i.e. the conversion of collided slots to successful slots. Collision recovery method presented in the literature need perfect channel knowledge, which is difficult with the RFID systems. In contrast to that, embodiments use a collision recovery based on the signal strength without channel estimation. The proposed concept (apparatus and method) recovers a single tag from up to four (or more) collided tags per slot. Further, the collision recovery probabilities from the physical layer are used to adjust the dynamic frame slotted ALOHA frame length L. This can be achieved by optimizing a reading efficiency metric. The mean reading time can be decreased up to 40% compared to conventional solutions.
(82) Although some aspects have been described in the context of an apparatus, it is clear that these aspects also represent a description of the corresponding method, where a block or device corresponds to a method step or a feature of a method step. Analogously, aspects described in the context of a method step also represent a description of a corresponding block or item or feature of a corresponding apparatus. Some or all of the method steps may be executed by (or using) a hardware apparatus, like for example, a microprocessor, a programmable computer or an electronic circuit. In some embodiments, one or more of the most important method steps may be executed by such an apparatus.
(83) Depending on certain implementation requirements, embodiments of the invention can be implemented in hardware or in software. The implementation can be performed using a digital storage medium, for example a floppy disk, a DVD, a Blu-Ray, a CD, a ROM, a PROM, an EPROM, an EEPROM or a FLASH memory, having electronically readable control signals stored thereon, which cooperate (or are capable of cooperating) with a programmable computer system such that the respective method is performed. Therefore, the digital storage medium may be computer readable.
(84) Some embodiments according to the invention comprise a data carrier having electronically readable control signals, which are capable of cooperating with a programmable computer system, such that one of the methods described herein is performed.
(85) Generally, embodiments of the present invention can be implemented as a computer program product with a program code, the program code being operative for performing one of the methods when the computer program product runs on a computer. The program code may for example be stored on a machine readable carrier.
(86) Other embodiments comprise the computer program for performing one of the methods described herein, stored on a machine readable carrier.
(87) In other words, an embodiment of the inventive method is, therefore, a computer program having a program code for performing one of the methods described herein, when the computer program runs on a computer.
(88) A further embodiment of the inventive methods is, therefore, a data carrier (or a digital storage medium, or a computer-readable medium) comprising, recorded thereon, the computer program for performing one of the methods described herein. The data carrier, the digital storage medium or the recorded medium are typically tangible and/or non-transitionary.
(89) A further embodiment of the inventive method is, therefore, a data stream or a sequence of signals representing the computer program for performing one of the methods described herein. The data stream or the sequence of signals may for example be configured to be transferred via a data communication connection, for example via the Internet.
(90) A further embodiment comprises a processing means, for example a computer, or a programmable logic device, configured to or adapted to perform one of the methods described herein.
(91) A further embodiment comprises a computer having installed thereon the computer program for performing one of the methods described herein.
(92) A further embodiment according to the invention comprises an apparatus or a system configured to transfer (for example, electronically or optically) a computer program for performing one of the methods described herein to a receiver. The receiver may, for example, be a computer, a mobile device, a memory device or the like. The apparatus or system may, for example, comprise a file server for transferring the computer program to the receiver.
(93) In some embodiments, a programmable logic device (for example a field programmable gate array) may be used to perform some or all of the functionalities of the methods described herein. In some embodiments, a field programmable gate array may cooperate with a microprocessor in order to perform one of the methods described herein. Generally, the methods are performed by any hardware apparatus.
(94) The apparatus described herein may be implemented using a hardware apparatus, or using a computer, or using a combination of a hardware apparatus and a computer.
(95) The methods described herein may be performed using a hardware apparatus, or using a computer, or using a combination of a hardware apparatus and a computer.
(96) While this invention has been described in terms of several advantageous embodiments, there are alterations, permutations, and equivalents which fall within the scope of this invention. It should also be noted that there are many alternative ways of implementing the methods and compositions of the present invention. It is therefore intended that the following appended claims be interpreted as including all such alterations, permutations, and equivalents as fall within the true spirit and scope of the present invention.