151
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Deterministic propagation model for RFID using site-specific and FDTD

, , , , , & show all
Pages 932-945 | Received 15 Dec 2012, Accepted 05 Jan 2014, Published online: 08 Aug 2014

References

  • Aroor, S., & Deavours, D. (2007). Evaluation of the state of passive UHF RFID: An experimental approach. IEEE Systems Journal, 1(2), 168–176. doi:10.1109/JSYST.2007.909179
  • Arthaber, H., & Schuberth, C. (2009, April 27–28). A UHF RFID channel emulator hardware for playback of measured link-scenarios. IEEE international conference on RFID, Orlando, FL (pp. 34–41). IEEE. doi:10.1109/RFID.2009.4911206
  • EPCglobal. (2009). Portal field strength measurement test method for applied tag performance testing. Brussels: Author.
  • Floerkemeier, C., & Sarma, S. (2009). RFIDsim – A physical and logical layer simulation engine for passive RFID. IEEE Journal Transactions on Automation Science and Engineering, 6, 33–43.
  • Friedrich, U. (2005, February 1). UHF RFID protocols – Reading RFID at the dock door. In VDE RFID Workshop, Darmstadt.
  • Gakhar, S., Feldkamp, J., Perkins, M., Rensheng, S., & Reddy, C. (2008, April 16–17). Engineering RFID systems through electromagnetic modeling. IEEE international conference on RFID, Las Vegas, NV (pp. 344–349). IEEE. doi:10.1109/RFID.2008.4519346
  • Gautham, A. (2008). Practical evaluation and analysis of passive UHF RFID tags (Master thesis of Science in Electrical Engineering). University of Texas, Arlington.
  • Han, Y., & Min, H. (2005). System modeling and simulation of RFID. Whitepaper. Shangai: Auto-ID Labs, Fudan University.
  • IMPINJ Inc. (n.d.). UHF gen 2 RFID readers – Five factors for success. Retrieved from http://www.danbygroup.com/uploads/docs/FiveFactorsforSuccessRFIDTagChips.pdf
  • Jo, M., Youn, H. Y., Cha, S.-H., & Choo, H. (2009). Mobile RFID tag detection influence factors and prediction of tag detectability. IEEE Sensors Journal, 9(2), 112–119. doi:10.1109/JSEN.2008.2011076
  • Kim, D.-Y., Yoon, H.-G., Jang, B.-J., & Yook, J.-G. (2008). Interference analysis of UHF RFID systems. Progress in Electromagnetics Research B, 4, 115–126. doi:10.2528/PIERB08010607
  • Mallinson, H., Hodges, S., & Thorne, A. (2007). A system to test the performance of RFID-tagged objects. In International symposium on applications and the internet workshops (SAINT’07), Hiroshima (pp. 23–26). Washington, DC: IEEE Computer Society. doi:10.1109/SAINT-W.2007.18.
  • Nikitin, P., & Rao, K. (2006a). Theory and measurement of backscattering from RFID tags. IEEE Antennas and Propagation Magazine, 48(6), 212–218. doi:10.1109/MAP.2006.323323
  • Nikitin, P. V., & Rao, K. (2006b, July 9–14). Performance limitations of passive UHF RFID systems. IEEE antennas and propagation society international symposium, Albuquerque. NM (pp. 1011–1014). IEEE. doi:10.1109/APS.2006.1710704
  • Nikitin, P., & Rao, K. (2008, April 16–17). Antennas and propagation in UHF RFID systems. IEEE international conference on RFID, Las Vegas, NV (pp. 277–288). IEEE. doi:10.1109/RFID.2008.4519368
  • Sarkar, T., Zhong, J., Kim, K., Medouri, A., & Salazar-Palma, M. (2003). A survey of various propagation models for mobile communication. IEEE Antennas and Propagation Magazine, 45(3), 51–82.
  • Sweeney, P. (2005). RFID: For dummies. Indianapolis, IN: Wiley Publishing.
  • Tam, W. K., & Tran, V. N. (1995). Propagation modelling for indoor wireless communication. Electronics & Communication Engineering Journal, 7(5), 221–228. doi:10.1049/ecej:19950507
  • Wang, H. G., Pei, C. X., & Zhu, C. H. (2008, October 12–14). A link analysis for passive UHF RFID system in LOS indoor environment. IEEE wireless communications, networking and mobile computing (WiCOM ‘08), Dalian (pp. 1–7). IEEE. doi:10.1109/WiCom.2008.687

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.