Literature DB >> 27854342

Geometric Distribution-Based Readers Scheduling Optimization Algorithm Using Artificial Immune System.

Litian Duan1, Zizhong John Wang2,3, Fu Duan4.   

Abstract

In the multiple-reader environment (MRE) of radio frequency identification (RFID) system, multiple readers are often scheduled to interrogate the randomized tags via operating at different time slots or frequency channels to decrease the signal interferences. Based on this, a Geometric Distribution-based Multiple-reader Scheduling Optimization Algorithm using Artificial Immune System (GD-MRSOA-AIS) is proposed to fairly and optimally schedule the readers operating from the viewpoint of resource allocations. GD-MRSOA-AIS is composed of two parts, where a geometric distribution function combined with the fairness consideration is first introduced to generate the feasible scheduling schemes for reader operation. After that, artificial immune system (including immune clone, immune mutation and immune suppression) quickly optimize these feasible ones as the optimal scheduling scheme to ensure that readers are fairly operating with larger effective interrogation range and lower interferences. Compared with the state-of-the-art algorithm, the simulation results indicate that GD-MRSOA-AIS could efficiently schedules the multiple readers operating with a fairer resource allocation scheme, performing in larger effective interrogation range.

Entities:  

Keywords:  geometric distribution probability function; multiple-reader environment; multiple-reader interference; optimization by artificial immune system

Mesh:

Year:  2016        PMID: 27854342      PMCID: PMC5134583          DOI: 10.3390/s16111924

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

Radio Frequency Identification (RFID) is one of the Auto Identification and Data Capture (AIDC) techniques, which enable objects to be automatically identified. With the advantages such as automation, no-contract, easy-to-implement and enough-durability, passive RFID is widely applied in various applications such as supply chain management [1], manufacturing management [2] and warehouse management [3] with objects localization [4]. According to most applications, a single reader cannot totally cover a specific area (i.e., in a warehouse, every product has a tag attached to by automatically taking stock). Correspondingly, a classical RFID scenario is usually composed of multiple readers and large quantity of passive tags: the so-called Multiple-reader Environment (MRE). In classical MRE, multiple readers are deployed in different densities with known positions to interrogate the randomized tags with fixed positions under the same RFID system. To dynamically allocate the operating resources (i.e., available time slots and frequency channels) and manage readers, centralized mechanism is usually designed to be executed by a coordinator device (i.e., polling server), which is connected to the readers through a wired or wireless network [5,6]. During this process, signal interference problem degrades the operating performance in efficiency and reliability, which is caused by multiple readers operating at the same time. Correspondingly, the multiple-reader interference avoidance algorithms are proposed to help coordinator device to schedule the readers operating non-simultaneously or simultaneously but at different frequency channels, which could be clustered in two categories: the control-mechanism-based ones and the scheduling-based ones. Control-mechanism-based algorithms [7,8,9] allow each reader to detect the status of other readers in order to avoid the simultaneous operating. For example, Neighbor Friendly Reader Interference Avoidance Algorithm (NFRIA) utilized readers with two bistatic antennas, where one antenna is for data transmitting and the other one is for continuously receiving to detect if other readers are using the same channel when they are operating. However, NFRIA did not take full advantage of centralized mechanism and, meanwhile, it is based on a hardware assumption that makes it hard to implement in real MRE. Scheduling-based algorithms transform the multiple-reader interference problem into an optimization problem with respect to the allocation of operating resources (e.g., [10,11]). Based on this, the number of time slots, the number of frequency channels and the position of readers are optimally allocated by using some heuristic algorithms such as genetic algorithm [12], swarm optimization algorithm [13] and artificial immune algorithms [14,15,16,17]. Among these, the artificial immune algorithms output the best performance when compared with other heuristic ones, the advantage of which is mainly embodied in outputting a larger interrogation range. In [14,15,16,17], the author introduced a reader-to-reader avoidance model formulizing from the signal-to-interference-plus-noise (SINR) view, which could perfectly describe the interference process. However, the author did not consider the non-uniformity distribution of multiple readers deployment in MRE, resulting in the unfairness of scheduling schemes since the readers with no interferences are always operating while the ones dramatically affected by interferences are almost never operating. Therefore, part of the interrogation range is actually thriftless and, meanwhile, the interfering readers are not effectively scheduled to operate as well. In the view of scheduling-based mechanism, a Geometric Distribution-based Multiple-reader Scheduling Optimization Algorithm using Artificial Immune System (GD-MRSOA-AIS) is proposed as a resource allocation algorithm to fairly schedule the readers operating with low interferences and large effective interrogation ranges in centralized MRE. GD-MRSOA-AIS first produces several fair feasible scheduling schemes using geometric probability distribution to allocate the operating time slot and frequency channel, which could minimize the collisions among the readers contending for operating resources and therefore maximize the probability that one reader successfully gains the opportunity to operate. To optimize these feasible scheduling schemes with the objective of maximizing the total effective interrogation range, the artificial immune system optimization with immune clone, immune mutation and immune suppression is further introduced. During the mutation process in artificial immune system optimization, there are two alternative mutation operators for different cloned antibodies, where the single-bit mutation is suitable for the superior ones and the region-bits mutation is appropriate for the regular ones. Summarizing, the contributions of this paper are as follows: By using signal-to-interference-plus-noise (SINR) to explain the reduction in interrogation range, a resource allocation model is constructed with two constraint conditions which are used to decrease the multiple-reader interference. A geometric probability function is introduced to replace the uniform probability function to produce the feasible scheduling schemes, which ensures that readers could operate in a fair way. Artificial immune system with clone operator, mutation operator and suppression operator is introduced to optimize the feasible scheduling schemes. In mutation process, both of the single-bit mutation operator and the region-bits mutation operator are imported to deal with the different cloned antibodies to accelerate the optimization process and convergence speed. The remainder of this paper is organized as follows. In Section 2, the formulized resource allocation model is constructed in the view of signal-to-interference-plus-noise (SINR) to efficiently avoid the multiple-reader interference in MRE. The structure of GD-MRSOA-AIS is introduced in details in Section 3, where a geometric distribution probability is first utilized to generate the feasible scheduling schemes and then an artificial immune system is designed to optimize these feasible scheduling schemes as optimal ones. Simulation results for GD-MRSOA-AIS are provided in Section 4 as well as a series of comparative results between the proposed one and the state-of-the-art algorithm (i.e., LIs [14]). Finally, the conclusions and future works are drawn in Section 5.

2. Resource Allocation Model in Centralized MRE under EPCGlobal C1G2

2.1. General Description with Assumptions

In MRE, each reader transmits electromagnetic wave to create the interrogation range, where the size and shape of interrogation range depends on many factors [5,18] such as the antennas design (radiation pattern, gain, polarization and impedance), tag parameters (e.g., gain, matching features and IC sensitivity), external factors (ambient conditions, and noise) and readers output power suited. In most literatures [5,14,15,16,17,19], the interrogation range is defined as a perfect circumstance where the radius only depends on the reader’s output power. In this paper, we also follow this assumption as UHF RFID readers with known positions and passive RFID tags with fixed positions in centralized MRE: Readers are randomly distributed over an area in two dimensions. Any reader has only two states, active and inactive, where only the readers in active operate and interfere with other active ones. The interference power from multiple interfering readers seen by the desired reader is additive.

2.2. Multiple-Reader Interference Problem in Centralized MRE

A simple centralized MRE is illustrated as Figure 1 according to the above assumptions, which is composed of one polling server, four readers in the same rated power and two target tags. Suppose that R1 is the desired reader, R1 could reach to the red circle as its maximum interrogation radius of r1 without any interference. When R1 attempts to detect the target tag A, if the signal is masked by the interfering reader R2 and R3 (the interfering range is represented by the black circle), the effective interrogation range r (blue circle) of R1 will decrease from r1. If r1 is smaller than the distance x between R1 and tag A, R1 could not detect this target tag A. Moreover, target tag B located in the overlapped range of r1 and r3 is hardly detected due to the multiple electromagnetic waves from R1 and R3 simultaneously operating.
Figure 1

MRE Illustration with Centralized Mechanism.

The maximum interrogation radius r of R is related to the hardware design [20], which is obtained by Equation (1), where λ is the wavelength of R, P is the minimum power required for the tag to operate, P is the signal transmission power of R, M is the modulation depth, and G and G are the gains of the transmit antenna and the receive antenna, respectively. However, the effective interrogation radius r of R is variable as a function of signal interfering. For reader R interrogating the target tag at a given time slot (i.e., at the kth time slot), R receives the backscatter signal from the tag and, meanwhile, it is also interfered by other simultaneous operating readers signal among N readers, where a 0–1 function ω(k) (as Equation (3)) is to indicate if the reader R is operating at the kth slot or not. To ensure that R could successfully detect the target tag in distance of x, Signal-to-Interference-Plus-Noise ratio (SINR) [21] has to exceed the minimum one of SINR as Equation (2): where No represents the noise power of R, BP(x) represents backscatter signal power from the target tag as a function of the distance x between the desired reader and the target tag, I(d) represents the interference from any other R as a function of the relative distance d (as Equation (6)) between the desired reader R and the other interfering reader R. The function [19] of BP(x) and I(d) are defined as Equations (4) and (5), respectively. where α is the normalized spectrum power, E is the effective power reflection coefficient of the tag, P denotes the signal transmission power of R, G and G are the gains of the transmit antenna and the receive antenna, respectively, P0 is the referenced path loss at the distance of 1 m, γ is the path loss exponent, x is the distance between R and the target tag, h is a fading coefficient in the channel between R and R, β(·) is the function of a spectrum mask defined in EPCGlobal Class1 Generation2 standard [22], ΔCH(k) is the frequency channel interval between R (CH(k) denotes the frequency channel numbers selected by R at the kth time slot) and R (CH(k) denotes the frequency channel numbers selected by R at the kth time slot) selected, and d is the relative distance between R and R. By Equations (1)–(6), the effective interrogation range r (i.e., blue circle in Figure 1) of R could be finally obtained by solving Equation (7) to ensure that the backscatter signal from target tag could be correctly recovered. According to d and r (i, j∈[1, N]), R may face two kinds of interference scenarios [23] at one time slot when it tries to detect the target tags: Multiple readers are simultaneously operating at the same frequency channel, which leads to the signals generated by multiple readers interfere with the reception system of the desired reader. In Figure 1, R1 suffers from this kind of interference if R2 and R3 are simultaneously operating with R1 at the same frequency channel. As a result, r1 is smaller than the distance x between R1 and the target tag A, R1 could not successfully detect A. To ensure that R1 could operate with a larger interrogation range to cover tag A, R1 with R2 and R3 should be scheduled to operate at different frequency channels and/or at different times by polling server. Multiple readers operating at independently frequency channels try to simultaneously detect the same tag located in the overlapped area of their effective interrogation ranges. In Figure 1, tag B locates in the overlapped interrogation area of R1 and R3, where B receives electromagnetic waves from both R1 and R3 simultaneously, it is not able to select a particular reader to communicate even if R1 and R3 are operating at the different frequency channels. To avoid this scenario, R1 and R3 should operate asynchronously which are scheduled by polling server as well.

2.3. The Proposed Resource Allocation Model in Centralized MRE

In order to construct the resource allocation model for a centralized MRE, it is necessary to efficiently decrease the above two interference scenarios. Accordingly, Table 1 summarizes the restrictions set for any R and R operating in MRE, where d represents the threshold of reader-to-reader range for selecting different operating frequency channel, d(ΔCH(k)) is the threshold of reader-to-reader range for selecting different operating time slot which depends on the selected frequency channel.
Table 1

Readers operating restrictions versus d.

=Frequency Channel≠Frequency Channel
=time slotdj,i > df-mindf-min ≥ dj,i > ds-minCHj,i(k))
≠time slotds-minCHj,i(k)) ≥ dj,i > 0ds-minCHj,i(k))≥ dj,i > 0
Based on Table 1, two constraint conditions are proposed to restrict the resource allocation for readers operating as: CH(k) ≠ CH(k) if d < d Based on the relative distance d between R and R, every R exists a neighbor set (denoted as IS = {j|j∈[1, N], d < d} with cardinality |IS| = N(i), i∈[1, N]) to mark the readers located in the range of d, where R is suffered from the first kind interference if the readers from IS are simultaneously operating at the same frequency channel with R (i.e., R1 and R2 in Figure 1). According to LIs [14], d is set as 16.79 m (the transmitting signal power of reader is 1 W, and the frequency is 902–928 MHz) for any two R and R. Therefore, R with any R in its IS (j ≠ i) should be operating at different frequency channels as: CH(k) ≠ CH(k) if j∈IS and j ≠ i, where CH(k) denotes the frequency channel numbers selected by R at the kth time slot. ω(k) = 0 if d ≤ d(ΔCH(k)) Further, in d, another smaller distance denoted as d exists, where R is suffered from the second kind interference if readers located in d are operating simultaneously even if they are at different frequency channels because they are overlapped in the effective interrogation range (i.e., R1 and R3 in Figure 1). Usually, d for R and R is variable along with the correspondingly selected frequency channels interval ΔCH(k), which is listed in Table 2. The calculation process is attached in Appendix A.
Table 2

Influence of frequency channel interval to d.

ΔCHj,i(k)0123≥4
ds-minCHj,i(k))0.0269 m0.8452 m2.6970 m6.7458 m10.339 m
Therefore, R with R in d should be operating non-simultaneously as: ω(k) = 0 if d ≤ d(ΔCH(k)), where ω(k) denotes the 0–1 function of Equation (3). Constricted by the constraint conditions, the resource allocation model is finally constructed as Equation (8) with the objective of maximizing the total effective interrogation range (denoted as S) to schedule N readers operating with N time slots and N frequency channels. Note that NR = {1, 2, 3, …, N}, NS = {1, 2, 3, …, N}, CH = {1, 2, 3, …, N}, WS = {(x, y)|x∈[0, L], y∈[0, L]} and IS = {j|j∈NR, d < d}.

3. Geometric Distribution-Based Multiple-Reader Scheduling Optimization Algorithm Using Artificial Immune System (GD-MRSOA-AIS)

According to the proposed resource allocation model, GD-MRSOA-AIS is proposed to fairly allocate the operating resources with lower reader interference and larger effective interrogation range. In GD-MRSOA-AIS, it is composed of two parts: GD: Geometric distribution function (GD) combined with the fairness consideration is introduced to randomize the feasible scheduling schemes with lower interferences which satisfy the constraint conditions in Equation (8). Details are described in Section 3.1; AIS: Artificial immune system optimization (AIS) is to optimize these feasible scheduling schemes as the optimal scheduling scheme for readers fairly operating with larger effective interrogation range. Details are presented in Section 3.2.

3.1. Feasible Scheduling by Geometric Distribution Function

According to the constraint conditions in Equation (8), GD-MRSOA-AIS will first produce several feasible solutions as the feasible scheduling schemes to ensure that readers could fairly operate with low signal interference. In centralized MRE, both the interference-reader (i.e., R1, R2 and R3 in Figure 1) and the isolation-reader (i.e., R4 in Figure 1) exist, where the isolated readers could operate at any time while the interfering readers have to be scheduled by polling server to decrease the interferences as much as possible. On the other hand, it is obvious that the isolated readers keeping on operating is thriftless since the number of deployed tags in the interrogation range is constant. Therefore, it is unfair to allocate the interfering readers and isolated readers with same opportunities to operate. To enhance the fairness, the interfering readers should gain more opportunities to operate. To efficiently and fairly allocate the available operating time slots, a geometric probability distribution function called Sift [24,25] is imported to replace the typical uniform distribution. Based on the character of Sift distribution, it could increase the probability that one contender selects one resource in a low position, winning the contention quickly. Therefore, if R contends for the operating time slot with large quantity of neighbor readers simultaneously, most neighbors will tend to select the last few time slots, and only the minority will contend for the first few time slots, decreasing the probability of collision in slots selection and increasing the probability that Ri successfully selects one of the first few time slots. On the contrary, if R contends for the operating time slots with small quantity of neighbor readers, the probability of selecting one slot almost obeys uniform distribution. For Sift_Function, the probability that the ith reader gains the opportunity to operate at the kth time slot from N time slots is denoted as Equation (9). Here, N(i) is the cardinality of IS for R, where N(i) = 1 denotes that there is no neighbors located around R and therefore R is an isolated reader without any possible interference. Note that when N(i) = 1, then α = 1, and , becoming the uniform probability distribution. Consequently, R with bigger N(i) could easily wins the kth time slot as a higher p(k) while R with smaller N has to select the operating time slot like uniform distribution as a lower p(k). By using Sift_Function, it generates several feasible scheduling schemes for readers operating with the allocated time slots and frequency channels, where the feasible scheduling schemes are restricted by the constraint conditions in Equation (8). Therefore, each feasible scheduling scheme produced by Sift_Function is actually a feasible solution for Equation (8), where the pseudocode is summarized as Algorithm 1. For each feasible solution of Equation (8), the total effective interrogation range might be not large enough. Therefore, this feasible scheduling scheme might be not the optimal one to maximize the global effective interrogation range. To optimize these feasible scheduling schemes, the artificial immune system optimization is introduced in the following section.

3.2. Optimal Scheduling by Artificial Immune System Optimization

For the produced feasible scheduling schemes, they could be optimized by using artificial immune system optimization, where each candidate antibody corresponds to one feasible solution of Equation (8) produced by Sift_Function and the antigen corresponds to the objective function of Equation (8) with the constraint conditions. According to this, the affinity function could be formulated as Equation (10), where the process for optimizing the feasible solutions of Equation (8) is transformed to find the maximum affinity value of Equation (10) and its corresponding optimum antibody. The proposed artificial immune system optimization is predefined to iterate N generations, where it exists three phases in every iterative generation as: immune clone, immune mutation and immune suppression/recruitment. In the clone phase, each antibody is acted as a parent to be correspondingly cloned for a fixed number of N children antibodies, and all children antibodies go through the mutation process but only one child antibody with the highest affinity-value among the children antibodies is selected to compare with its parent antibody. If this selected child antibody is superior to its parent antibody in affinity value, it will replace its parent antibody as a new generation. Once the affinity value of this new generation is not significantly different from that of the previous generation, the suppression will be triggered, where the P antibodies with lowest affinity-values are suppressed. Then, the corresponding numbers of antibodies produced by Sift_Function are recruited. This process is repeated until N iteration is met. The related symbols and their descriptions are listed in Table 3.
Table 3

Symbol and description in artificial immune system optimization.

SymbolDescription
ABThe candidate antibody population
Ab(u)The uth antibody
ab(u)iThe ith antibody segment in Ab(u)
ABRemainThe set for remained antibodies
Ab(u)CloneThe clone pool for Ab(u)
Affinity(·)Affinity function
Aff_oldThe mean affinity value of the previous generation
Aff_newThe mean affinity value of the current generation
CHi(k)The kth bit in ab(u)i
NIniThe population size of AB
NCloneThe cloned multiplier
NGenThe generation multiplier
LRegion-bits mutation length
PSThe suppression percentage

3.2.1. Initialization

To initialize the optimizing process by using artificial immune system, N antibodies (feasible solutions) are randomized by repeatedly run Sift_Function in N times to construct the candidate antibody population set as AB = {Ab(u)|u∈[1, N]}. For each antibody Ab(u) in AB, it is encoded as integer type since both frequency channels and time slots are discrete distribution as integer type. Seen from Figure 2a, Ab(u) consists of N segments as ab(u)1, ab(u)2, ab(u)3,…, ab(u), where each ab(u) is actually corresponding to a reader R and it includes a sequence of bits as CH(1), CH(2), CH(3),…, CH(N) where each CH(k) is denoted as the selected frequency channel of reader R at the kth time slot. CH(k) = 0 means that reader R does not operate at this kth slot.
Figure 2

(a) Encoding format for the uth antibody individual; (b) Encoding format for the cth child antibody.

3.2.2. Clone Operation

After producing the candidate antibody population set as AB = {Ab(u)|u∈[1, N]}, each Ab(u) is regarded as an parent antibody. For each parent antibody Ab(u), N cloned antibodies with the same encodings are produced as its children antibodies, in which these children antibodies will go through the mutation operation to increase the diversity and therefore they have more potential to evolve as excellent individuals. Here, N is required to be predefined as the cloned multiplier, and each Ab(u) has a clone pool as AB(u) = {Abc(c)|c∈[1, N]} to store its children antibodies, where each Abc(c) in AB(u) is encoded as Figure 2b. Note that each child antibody Abc(c) from the clone pool AB(u) is totally the same as its parent antibody Ab(u) in every bit before the mutation operation.

3.2.3. Mutation Operation

For each child antibody Abc(c) (i.e., Figure 2b) from the clone pool AB(u) = {Abc(c)|c∈[1, N]} of its parent Ab(u), there are two optional mutation operators as: single-bit mutation operator is applied for the ones with higher affinity values and region-bits mutation operator is applied for the ones with lower affinity values. For single-bit mutation operator, only one bit CH(k) is randomly selected as a hotspot to be mutated following the constraint conditions, which belongs to a reader R (i.e., Figure 2b). As a result, this mutated Abc(c) is also a feasible scheduling scheme as well. For region-bits mutation operator, a contiguous region bits are selected to be mutated starting from a hotspot of CH(k) increasing L-bit length, note that L is less than N minus k to guarantee the mutation is happened in one reader R (i.e., Figure 2b). In addition, this mutation is restricted by the constraint conditions. As a result, this mutated Abc(c) is also a feasible scheduling scheme. By single-bit mutation, the children antibody could extremely inherit the superior bits of the parent antibody while the children antibody would have more potential to mutate as the superior ones by region-bits mutation. Both of them could fast the convergence and quickly reach to the global optimization. The single-bit and region-bit mutation operator run as in Algorithms 2 and 3 respectively. After the mutation operations, for each parent antibody Ab(u) (u∈[1, N]), its children antibodies Abc(c) from the clone pool AB(u) = {Abc(c)|c∈[1, N]} are totally different: some Abc(c) surpasses Ab(u) in affinity value while some of Abc(c) are identical or inferior to Ab(u). To distinguish them, all Abc(c) (c∈[1, N]) should be sorted by affinity value. Select the Abc(c) with highest affinity value and compare it with its parent antibody Ab(u): if this Abc(c) is superior to its parent antibody Ab(u), it will replace its parent antibody as a new candidate antibody in AB.

3.2.4. Suppression Operation

After the mutation operation, the candidate antibodies are changed. If the affinity value of new candidate antibody population set AB is significantly increased, this AB will be directly regarded as a new generation and go through the same immune process via clone operation, mutation operation and suppression operation. On the contrary, the candidate antibodies with highest affinity values should be promoted while the antibodies with lowest affinity values should be suppressed. Sorted by the affinity value, it will suppress P percentage of antibodies with lowest affinity values. After that, P of N antibodies (feasible solutions) are produced by Sift_Function, where these fresh candidate antibodies are recruited in AB to compose a new generation population. In addition, this new generation population will go through the same immune process via clone operation, mutation operation and suppression operation. When the iteration reaches the predefined maximum generations N, GD-MRSOA-AIS terminates. Finally, the pseudocode for proposed artificial immune system (proposed-AIS) optimization in GD-MRSOA-AIS is listed as Algorithm 4, where the corresponding flowchart is shown in Figure 3.
Figure 3

Flowchart of proposed AIS optimization in GD-MRSOA-AIS.

4. Simulations and Results

In this section, the total effective interrogation range using the proposed-AIS optimization with Sift_Function (denoted as GD-MRSOA-AIS) and without Sift_Function (denoted as MRSOA-AIS) will be simulated and compared with the state-of-the-art algorithm (LIs [14]) in two scenarios: The number of readers N = 15 with fixed positions among GD-MRSOA-AIS, MRSOA-AIS and LIs. Meanwhile, the advantage of Sift_Function and proposed-AIS optimization is illustrated by comparisons of GD-MRSOA-AIS, MRSOA-AIS and LIs. Variable N with randomized positions among GD-MRSOA-AIS, MRSOA-AIS and LIs. During the simulations, readers are randomly distributed over an area in two dimensions with 100 × 100 m2 (i.e., L = 100 m, L = 100 m). As readers communicate with tags by means of EPCGlobal C1G2, the parameter settings are same with the ones listed in Table A1 in Appendix A.
Table A1

Parameter value under EPCGlobal C1G2 standard.

ParameterDescriptionValue
EtagThe effective power reflection coefficient of the tag0.1
αbwThe normalized spectrum power0.86
γThe path loss exponent2.5
MdThe modulation depth0.1
HThe fading coefficient in the channel between Ri and Rj1
PminThe minimum required power for tag operation−15 dB m
PiThe signal power of Ri30 dB m
P0The referenced path loss at the distance of 1 m−31.6 dB m
NoiThe noise power of Ri−90 dB m
SINRminThe minimum SINR11.6 dB
GTThe reader antenna transmitting gain6 dB
GRThe reader antenna receiving gain6 dB
βmask(·) for MREThe function of the spectrum mask in multiple-reader environmentΔCHj,i(k) = 00 dB
ΔCHj,i(k) = 1−20 dB
ΔCHj,i(k) = 2−50 dB
ΔCHj,i(k) = 3−60 dB
ΔCHj,i(k) ≥ 4−65 dB
Given a certain number of readers, as the number of available time slots increases, the readers have more options to avoid simultaneously operation. In other words, for a specific number of time slots, as the number of readers increases, the total effective interrogation range will be smaller, which is caused by the heavy interferences. Without the loss of generality, N is finally assigned as 5 in the following simulations. In addition, as the number of available frequency channels increases, the total effective interrogation range always increases since each reader has more options for selecting an available frequency channel to simultaneously operate with other readers at different frequency channels. Usually, the number of available frequency channels is set to no more than 10. Consequently, N is assigned as 10 in the simulation. The parameters setting of proposed-AIS optimization in simulation are listed in Table 4.
Table 4

Parameter settings of proposed AIS optimization process.

ParameterValue
The number of available time slots (NSlot)5
The number of available frequency channels (NFreq)10
Initialized candidate population size (NIni)40
Cloned Multiplier (NClone)5
Maximum generation (NGen)150
Suppression percentage (PS)25%

4.1. Case Study: NReader = 15, NSlot = 5, NFreq = 10

When N = 15, the fixed positions of readers are randomized in Figure 4, where the corresponding neighbor set for each reader is ISR1 = {1, 3}, ISR2 = {2, 5, 6}, ISR3 = {1, 3}, ISR4 = {4, 7}, ISR5 = {5, 6, 8, 9}, ISR6 = {2, 5, 6, 8}, ISR7 = {4, 7}, ISR8 = {5, 6, 8, 9, 10, 11}, ISR9 = {5, 8, 9, 10, 11}, ISR10 = {8, 9, 10, 11}, ISR11 = {8, 9, 10, 11}, ISR12 = {12, 13}, ISR13 = {12, 13}, ISR14 = {14}, and ISR15 = {15}. Here, R14 and R15 are isolated readers since ISR14∩ISR = ∅ (any j∈NR and j ≠ 14) and ISR15∩ISR = ∅ (any l∈NR and l ≠ 15). On the contrary, i.e., ISR5∩ISR8∩ISR9∩ISR10∩ISR11 = {5, 8, 9, 10, 11}, these readers should be scheduled to operate at different time slots or simultaneously operate but at different frequency channels.
Figure 4

Fixed Location of Readers (N = 15).

Figure 5 shows the graphical representation of effective interrogation range for each reader with its corresponding operation time slots (where the five time slots are represented by Green, Red, Blue, Cyan and Magenta) under the operating scheduling scheme. Correspondingly, the operating scheduling scheme for each algorithm is listed in Table 5, where CH(k) = 0 means that the ith reader does not operate at this kth time slot. At the first time slot (TS1) as green circles in Figure 5a–c, {R7, R9, R14, R15} are operating at the frequency channel of {CH7(1) = 5, CH9(1) = 7, CH14(1) = 1, CH15(1) = 10} using GD-MRSOA-AIS as in Table 5; {R11, R13, R14, R15} are operating at the frequency channel of {CH11(1) = 9, CH13(1) = 7, CH14(1) = 1, CH15(1) = 5} using MRSOA-AIS; and {R1, R4, R13, R15} are operating at the frequency channel of {CH1(1) = 7, CH4(1) = 1, CH13(1) = 10, CH15(1) = 3} using LIs algorithm. Take {R4, R7} as an example, ISR4∩ISR7 = {4, 7}. According to Table 5, R4 is scheduled to operate at TS3 with the frequency channel of CH4(3) = 10 and R7 is scheduled to operate at TS1 with the frequency channel of CH7(1) = 5 by GD-MRSOA-AIS while R4 is scheduled to operate at every time slot as {CH4(1) = 1, CH4(2) = 3, CH4(3) = 1, CH4(4) = 1, CH4(5) = 3} and R7 is scheduled to be inactive at every time slot by LIs. Therefore in LIs, R4 is actually operating in uselessness especially for the last few time slots and it is unfair for R7. On the contrary, GD-MRSOA-AIS schedules R4 and R7 corporately operating in a fair way. The same scenario is also happened in {R12, R13}.
Figure 5

Graphical Representation of Optimal Operating Schedule for 15 readers with N = 5 and N = 10: (a) GD-MRSOA-AIS; (b) MRSOA-AIS; and (c) LIs.

Table 5

The operating schedule for 15 readers with N = 5 and N = 10 among three algorithms.

GD-MRSOA-AISMRSOA-AISLIs
TSkTS1TS2TS3TS4TS5TS1TS2TS3TS4TS5TS1TS2TS3TS4TS5
CHi(k)
Ri
R1000000671170035
R201071000010701871
R30100510300000500
R40010000000013113
R5001000000000001
R6050000000000000
R7500000000000000
R80050000000010000
R97000002105000008
R10080000000000300
R11000089000500000
R12008000000000000
R1303000700301077107
R141009619200000010
R15100333505710351059

* In the table, TS stands for the kth time slot from the optional values of {TS1, TS2, TS3, TS4, TS5} in N = 5. R stands for the ith reader from the optional values of {R1, R2, …, R15} in N = 15. The operating frequency channel for ith reader at kth time slot (CH(k)) is listed from the optional values of CH = {0, 1, 2, 3, …, 10} when N = 10, where CH(k) = 0 means that the ith reader does not work at kth time slot.

On average, the effective interrogation radius using GD-MRSOA-AIS is 2.142 m, 2.0881 m using MRSOA-AIS and 1.909 m using LIs algorithm. It seems like that the effective interrogation ranges of these three algorithms are similar. However, by introducing Sift_Function, GD-MRSOA-AIS is obviously fairer since almost all readers (except for R1) are scheduled to operate at different time slots and frequency channels while both of MRSOA-AIS and LIs could not. For example, {R4, R5, R6, R7, R8, R10, R12} are always inactive in MRSOA-AIS and {R6, R7, R11, R12} are inactive in LIs (shown in Table 5 and Figure 5b,c), especially that R6, R10, R11 are posited in crowed with more neighbors (shown in Figure 4). To evaluate the fairness of readers during the operating scheduling, a general purpose quantitative measure of fairness called Jain Index [26] is imported as Equation (11), where N denotes the number of readers, ω is the 0–1 function to indicate whether the reader R operates at least once at these N time slots or not, and N(i) is the cardinality of IS. The I ranges from 0 to 1: the higher I means that the corresponding optimal scheduling scheme is fairer. Obviously, R with larger N(i) will make more contribution to obtain a bigger I. Therefore, the Jain Index could express the fairness of an optimal scheduling scheme. As a result, GD-MRSOA-AIS becomes the fairest one with highest Jain Index of I = 18.22%, while the I of MRSOA-AIS is 8.89% and the I of LIs is 14.67% in the same scenario. In Figure 6, the initial average affinity value of GD-MRSOA-AIS starts from 450, which is much higher than that of the other two from 200. This obvious difference is owing to the contending mechanism of Sift_Function for time slots selection. Additionally, the average affinity value of both GD-MRSOA-AIS and MRSOA-AIS are much higher than LIs, where MRSOA-AIS rockets up to a high affinity value and then it stabilizes in the similar average affinity value like GD-MRSOA-AIS, which dues to the multiple mutation operations in the proposed-AIS. To achieve the average affinity value of 600, with GD-MRSOA-AIS and MRSOA-AIS, it costs around 50 generations while with LIs it is more than 150 generations. Therefore, the proposed-AIS also reduces the time consumption of optimization process.
Figure 6

Affinity value versus number of generations.

4.2. Variable NReader with Fixed NSlot = 5 and NFreq = 10 in Randomized Positions

For a given N readers with N = 5 and N = 10 in the area of 100 × 100 m2, the position of each reader is randomly located. To ensure the convergence of the results, all the simulations are repeated for 50 times with 50 randomly positions. For an easier understanding, the results are listed in five indices (the best, the worst, and the mean of total effective interrogation area, the average radius and Jain Index) among GD-MRSOA-AIS, MRSOA-AIS and LIs algorithm, which are represented in Table 6.
Table 6

The comparison results of the total effective interrogation range with N = 5 and N = 10.

NReaderAlgorithmBest (Unit: m2)Worst (Unit: m2)Mean (Unit: m2)Average Radius (Unit: m)Jain Index (IJain)
4GD-MRSOA-AIS3886.1662459.977 *3190.954 *6.906 *-
MRSOA-AIS3976.631 *1918.7563078.5806.784-
LIs3570.6611512.3973041.5276.573-
8GD-MRSOA-AIS4392.362 *3287.613 *3907.504 *4.308 *42.19% *
MRSOA-AIS4293.6503180.3013790.5654.17425.00%
LIs4316.2393263.5203859.6304.25229.69%
12GD-MRSOA-AIS3910.000 *3328.207 *3539.014 *2.670 *27.08% *
MRSOA-AIS3765.5713014.0433481.6252.62013.89%
LIs3671.9772977.3523428.5922.63918.06%
16GD-MRSOA-AIS3780.408 *3356.667 *3533.103 *2.027 *27.34% *
MRSOA-AIS3612.8262901.9543471.4311.97419.92%
LIs3437.0093128.8283270.9781.96321.88%
20GD-MRSOA-AIS3331.8452935.414 *3133.6861.44370.50% *
MRSOA-AIS3369.615 *2901.9543160.941 *1.463 *40.25%
LIs2869.2252297.5902528.8641.34645.50%
24GD-MRSOA-AIS3232.966 *2550.474 *2909.812 *1.229 *68.06% *
MRSOA-AIS3206.0982279.1842830.7331.19543.75%
LIs2151.0931874.9132035.6511.02042.36%
28GD-MRSOA-AIS3068.395 *2436.6882737.177 *0.999 *64.29% *
MRSOA-AIS2675.7892586.912 *2616.5380.92335.71%
LIs1859.4091532.3771670.7420.81432.14%

* The best one for each comparison.

When N = 4 with N = 5 available time slots and N = 10 frequency channels, readers are easily scheduled to operate at different time slots and frequency channels. Additionally, they could be deployed so sparsely that they are hardly interfered each other in such a large zone (100 × 100 m2). Therefore, the Jain Index is failed to measure the fairness. However, limited by the self-rated-power, the interrogation range is also finite. As a result, the total effective interrogation range is not large enough. As the number of readers increases, such as N = 24 and N = 28, positions of readers become much denser, the readers could not make full use of the frequency channels and the time slots, and then the individual effective interrogation range is declining and the total effective interrogation range relies on the cooperation among readers operating. From Table 6, we can see that the Jain Index is fluctuated up and down. For the former situations (i.e., N = 8, N = 12, N = 16), each reader has fewer neighbors since they are sparsely distributed, which declines the Jain Index value even if all of the readers are scheduled to operate at least once. For the latter situations (i.e., N = 24, N = 28), readers are located in denser positions and so each reader has more neighbors, but some readers might be not scheduled to operate even once (ω = 0) which also decreases the Jain Index value. Even so, the Jain Index value of GD-MRSOA-AIS is also higher than MRSOA-AIS and LIs with the same number of readers. In addition, Table 6 shows that the best, the worst and the mean of total effective interrogation range between GD-MRSOA-AIS and MRSOA-AIS are similar but larger than the ones of LIs; meanwhile, the average radius of effective interrogation range for each operating readers with GD-MRSOA-AIS and MRSOA-AIS is also larger than that with LIs. The total effective interrogation range is declined fast by using LIs when the number of readers increases while it is much slower by using both GD-MRSOA-AIS and MRSOA-AIS. For example, when N = 20, the mean effective interrogation range with GD-MRSOA-AIS is 3133.686 m2, the best one as 3331.845 m2 and the worst one as 2935.414 m2; the mean value with LIs is only 2528.864 m2, the best one as 2869.225 m2 and the worst one as 2297.590 m2. When N = 28, with GD-MRSOA-AIS, the mean value is glided down to 2737.177 m2, the best one as 3068.395 m2 and the worst one as 2436.688 m2; with LIs, the mean value is slumped down as 1670.742 m2, the best one as 1859.409 m2 and the worst one as 1532.377 m2. In conclusion, GD-MRSOA-AIS could schedule multiple readers operating in fairness with lower multiple-reader interfering and large effective interrogation range, where the fairness with lower multiple-reader interfering dues to the geometric distribution of Sift_Function and the large effective interrogation range dues to the proposed-AIS optimization process. As a result, the deployment of eight readers with five available time slots and 10 available frequency channels is the most economical way to maximize the total effective interrogation range in 100 × 100 m2, especially using GD-MRSOA-AIS.

5. Conclusions

This paper refers to the multiple-reader interference problem in the multiple-reader environment (MRE) and formulates a resource allocation model with the consideration of interference avoidance in SINR under EPCGlobal C1G2 standard, where the allocable resources include available time slots and frequency channels. Based on this resource allocation model, GD-MRSOA-AIS is further proposed. In GD-MRSOA-AIS, geometric distribution replaces the uniform distribution to produce the feasible scheduling schemes, where the reader, which is interfered by large quantity of readers, has more opportunities to be allocated in an operating time slot. To optimize these feasible scheduling schemes, the artificial immune system optimization including immune clone, immune mutation and immune suppression is further introduced. During the mutation operation for antibodies, there are two optional mutation operators depending on the affinity values. According to the simulation results, GD-MRSOA-AIS could obtain an optimal and fairer readers collaboratively operating scheduling scheme, and it could output a larger total effective interrogation range with higher convergence than the state-of-the-art one. Although GD-MRSOA-AIS indeed enhances the effective interrogation range with lower interferences by fairer operating scheme, it still has shortcomings: It only focuses on the scenario of multiple readers in known position with randomized tags in fixed positions, and ignores the new entrancing tags with variable population. It only solves the resource allocation problem for multiple readers scheduling to interrogate the tags in centralized MRE, but ignores the identification problem (i.e., tag-to-tag collision) in data transmission process. Therefore, the next work will reconstruct a resource allocation model by considering the variable population of tags and identification problem with an enhanced scheduling-based algorithm.
  1 in total

Review 1.  Evolution of RFID Applications in Construction: A Literature Review.

Authors:  Enrique Valero; Antonio Adán; Carlos Cerrada
Journal:  Sensors (Basel)       Date:  2015-07-03       Impact factor: 3.576

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.