Skip to Main Content
Advanced Chipless RFID
book

Advanced Chipless RFID

by Nemai Chandra Karmakar, Mohammad Zomorrodi, Chamath Divarathne
August 2016
Intermediate to advanced content levelIntermediate to advanced
304 pages
8h 54m
English
Wiley
Content preview from Advanced Chipless RFID

CHAPTER 11COMPUTATIONALLY FEASIBLE TAG DETECTION TECHNIQUES

11.1 INTRODUCTION

Maximum likelihood (ML)-based detectors generally produce better tag detection performances as they utilize all information available, prior to making a decision. However, one of the main drawbacks of ML detectors is its higher computation complexity. In the proposed tag detection techniques, they compare the received signal with all possible tag combinations and select the one with the highest probability as the detected tag. If a radio frequency identification (RFID) tag has c11-math-0001 bits, they compare the received signal with all c11-math-0002 tag combinations to calculate individual probabilities. In the case of tags being used to identify the object category not the object itself, the number of bits required in a tag can be small. In such cases, direct application of the tag detection techniques presented in Chapter 10 may be feasible. However, when the number of bits in the tag is large, computation complexity is increasing exponentially, hence utilizing the tag detection techniques presented in Chapter 10 may not be feasible. Higher computation complexity brings up two main challenges. First, the RFID reader needs higher computation capability to evaluate the likelihood expressions derived in Chapter 10. The second ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Getting Started with RFID

Getting Started with RFID

Tom Igoe
RFID For Dummies®

RFID For Dummies®

Patrick J. Sweeney II
RFID Sourcebook

RFID Sourcebook

Sandip Lahiri
How to Cheat at Deploying and Securing RFID

How to Cheat at Deploying and Securing RFID

Frank Thornton, Paul Sanghera

Publisher Resources

ISBN: 9781119227311Purchase book