Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    A Novel Anti-Collision Algorithm for Large Scale of UHF RFID Tags Access Systems

    Xu Zhang1, Yi He1, Haiwen Yi1, Yulu Zhang2, Yuan Li2, Shuai Ma2, Gui Li3, Zhiyuan Zhao4, Yue Liu1, Junyang Liu1, Guangjun Wen1, Jian Li1,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 897-912, 2024, DOI:10.32604/cmc.2024.050000 - 18 July 2024

    Abstract When the radio frequency identification (RFID) system inventories multiple tags, the recognition rate will be seriously affected due to collisions. Based on the existing dynamic frame slotted Aloha (DFSA) algorithm, a sub-frame observation and cyclic redundancy check (CRC) grouping combined dynamic framed slotted Aloha (SUBF-CGDFSA) algorithm is proposed. The algorithm combines the precise estimation method of the quantity of large-scale tags, the large-scale tags grouping mechanism based on CRC pseudo-random characteristics, and the Aloha anti-collision optimization mechanism based on sub-frame observation. By grouping tags and sequentially identifying them within subframes, it accurately estimates the number More >

  • Open Access

    ARTICLE

    Hacking Anti-Shoplifting System to Hide Data within Clothes

    Al Hussien Seddik Saad1,*, E. H. Hafez2, Zubair Ahmad3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 659-674, 2021, DOI:10.32604/cmc.2021.014758 - 12 January 2021

    Abstract Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to… More >

  • Open Access

    ARTICLE

    A Cross Layer Protocol for Fast Identification of Blocked Tags in Large-Scale RFID Systems

    Chu Chu1, Zhong Huang1, Rui Xu1, Guangjun Wen1, *, Lilan Liu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1705-1724, 2020, DOI:10.32604/cmc.2020.010190 - 30 June 2020

    Abstract Blocker tag attack is one of the denial-of-service (DoS) attacks that threatens the privacy and security of RFID systems. The attacker interferes with the blocked tag by simulating a fake tag with the same ID, thus causing a collision of message replies. In many practical scenarios, the number of blocked tags may vary, or even be small. For example, the attacker may only block the important customers or high-value items. To avoid the disclosure of privacy and economic losses, it is of great importance to fast pinpoint these blocked ones. However, existing works do not… More >

  • Open Access

    ARTICLE

    Hashtag Recommendation Using LSTM Networks with Self-Attention

    Yatian Shen1, Yan Li1, Jun Sun1,*, Wenke Ding1, Xianjin Shi1, Lei Zhang1, Xiajiong Shen1, Jing He2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1261-1269, 2019, DOI:10.32604/cmc.2019.06104

    Abstract On Twitter, people often use hashtags to mark the subject of a tweet. Tweets have specific themes or content that are easy for people to manage. With the increase in the number of tweets, how to automatically recommend hashtags for tweets has received wide attention. The previous hashtag recommendation methods were to convert the task into a multi-class classification problem. However, these methods can only recommend hashtags that appeared in historical information, and cannot recommend the new ones. In this work, we extend the self-attention mechanism to turn the hashtag recommendation task into a sequence More >

  • Open Access

    ARTICLE

    A Physical Layer Algorithm for Estimation of Number of Tags in UHF RFID Anti-Collision Design

    Zhong Huang1, Jian Su2, Guangjun Wen1, Wenxian Zheng3, Chu Chu1, Yijun Zhang4,*, Yibo Zhang5

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 399-408, 2019, DOI:10.32604/cmc.2019.05876

    Abstract A priori knowledge of the number of tags is crucial for anti-collision protocols in slotted UHF RFID systems. The number of tags is used to decide optimal frame length in dynamic frame slotted ALOHA (DFSA) and to adjust access probability in random access protocols. Conventional researches estimate the number of tags in MAC layer based on statistics of empty slots, collided slots and successful slots. Usually, a collision detection algorithm is employed to determine types of time slots. Only three types are distinguished because of lack of ability to detect the number of tags in More >

  • Open Access

    ARTICLE

    High Security Identity Tags Using Spiral Resonators

    Anju Pradeep1, S. Mridula1, P. Mohanan2

    CMC-Computers, Materials & Continua, Vol.52, No.3, pp. 187-196, 2016, DOI:10.3970/cmc.2016.052.185

    Abstract A highly compact chipless tag based on Frequency coding technique using Spiral Resonators is proposed in this paper. Spirals are well known metamaterial structures and thus capable of sharp resonance, and hence Spiral Resonators can serve as a good candidate for RF Identity Tags. The bit capacity of the proposed tag is 10 bits per sqcm. The prototype of the tag is fabricated on a low-cost substrate of dielectric constant 4.4 and loss tangent 0.02. The overall dimension of tag is 15.4 x 3 x 1.6 mm3. Two methods for reading the tags are also discussed More >

Displaying 1-10 on page 1 of 6. Per Page