Optimization of RFID Network Planning Using MDB-FA Method
Keywords:DBSCAN, Firefly Algorithm, MCS, MDBFA, RFID Networks Planning,
AbstractTopology network design in RFID Network Planning (RNP) is the most important factor in hard optimization problems of network planning. Reader distribution is highly impacted by topological tags distribution. The integration of RFID multi-objective network planning with the network topology design results in better capability of reader distribution. Thus, this paper evaluates the impact of topological network design to support the RFID reader’s distribution system. Monte Carlo simulation (MCS) is used to generate tag distribution based on network topology design modules as a method to evaluate the deterministic indicators in NP-hard problems. The generated data are utilized as an input representation to apply into firefly algorithm based on Density- Based Algorithm (DBSCAN) to find the optimal network solution. Experimental results show the effectiveness of the method in L-Shape RNP, and show that the proposed algorithm is capable of achieving high coverage and use of fewer readers in actual conditions of warehouse design.
K. Hasnan, A. Ahmed, and Q. Bakhsh, “Optimization of RFID network planning using Zigbee and WSN.”
A. M. Elewe, K. Hasnan, and A. Nawawi, “Review of RFID Optimal tag coverage algorithms,” ARPN, VOL. 11, NO. 12, JUNE 2016
E. Di Giampaolo, F. Fornì, and G. Marrocco, “RFID-Network Planning by Particle Swarm Optimization.”
T. Kim, J. Shin, and S. Tak, “Cell Planning for Indoor Object Tracking based on RFID,” 2009.
I. Bhattacharya and U. K. Roy, “Optimal Placement of Readers in an RFID Network Using Particle Swarm Optimization,” Int. J. Comput. Networks Commun., vol. 2, no. 6, pp. 225–234, 2010.
O. Botero and H. Chaouchi, “RFID network topology design based on Genetic Algorithms,” pp. 300–305, 2011.
O. Botero, “Heterogeneous RFID framework design , analysis and evaluation Oscar Botero To cite this version :,” 2012.
S. L. Ting, S. K. Kwok, A. H. C. Tsang, and G. T. S. Ho, “The Study on Using Passive RFID Tags for Indoor Positioning,” vol. 3, no. 1, pp. 9–15, 2011.
F. M. Al-Naima and R. T. Hussein, “PSO based indoor RFID network planning,” Proc. - 2013 6th Int. Conf. Dev. eSystems Eng. DeSE 2013, pp. 9–14, 2013.
Y. Gong, J. Zhang, and C. Author, “Small-World Particle Swarm Optimization,” pp. 25–31, 2013.
C.-H. Chou, C.-L. Huang, and P.-C. Chang, “A RFID network design methodology for decision problem in health care,” 2014 IEEE Congr. Evol. Comput., pp. 1586–1592, 2014.
A. Suriya, “Modeling and optimization of radio frequency identification networks for inventory management,” 2013.
A. Quarteroni, “Mathematical models in science and engineering,” Not. AMS, vol. 56, no. 1, pp. 10–19, 2009.
I. Masood, “Issues in Development of Artificial Neural Network-Based Control Chart Pattern Recognition Schemes,” vol. 39, no. 3, pp. 336–355, 2010.
K. Hasnan, A. Ahmed, Q. Bakhsh, K. Hussain, K. Latif, U. Tun, H. Onn, P. Raja, and B. Pahat, “A Novel Optimal RFID Network Planning by MC-GPSO,” vol. 8, no. August, 2015.
D. Mining, “DBSCAN A Density-Based Spatial Clustering of Application with,” Linköpings Univ. - ITN 2011-11-30, pp. 1–8, 2011.
N. Ali, M. A. Othman, M. N. Husain, and M. H. Misran, “A review of firefly algorithm,” vol. 9, no. 10, pp. 1732–1736, 2014.
P. Chuang and W. Tsai, “IGAA : An Efficient Optimization Technique for RFID Network Topology Design in Internet of Things,” vol. 8, no. 1, pp. 191–206, 2015.
G. Dukic and T. Opetuk, “Warehouse Layouts,” pp. 55–69.
Chuang P, Tsai W. IGAA : An Efficient Optimization Technique for RFID Network Topology Design in Internet of Things. 2015;8(1):191-206.
A. M. Elewe, K. Hasnan, and A. Nawawi, “A Novel Rfid-Network Planning Based On Mdb-Fa Method,”gjesrm, DOI: 10.5281/zenodo.556396
A. M. Elewe, K. Hasnan, and A. Nawawi, “A Novel Rfid-Network Planning Based On Mdb-Fa Method,” ARPN, vol. 12, no. 3, Feb 2017.
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.