CN106844561B - R-TBF-based RFID (radio frequency identification) redundant data cleaning method - Google Patents
R-TBF-based RFID (radio frequency identification) redundant data cleaning method Download PDFInfo
- Publication number
- CN106844561B CN106844561B CN201611269752.3A CN201611269752A CN106844561B CN 106844561 B CN106844561 B CN 106844561B CN 201611269752 A CN201611269752 A CN 201611269752A CN 106844561 B CN106844561 B CN 106844561B
- Authority
- CN
- China
- Prior art keywords
- data
- time
- size
- integer array
- rssi
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/215—Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an R-TBF-based RFID redundant data cleaning method, which comprises the steps of initializing a filter, wherein the filter comprises an integer array M for storing data TIME attributes, a hash function, a mapping function, a Map set P, a TIME threshold tau and an intensity threshold α, judging redundancy of current data X, and performing redundant cleaning according to { ID, TIME and RSSI } format transmission and cleaning rules, and finally processing the current data X.
Description
Technical Field
The invention relates to the technical field of data cleaning, in particular to an R-TBF-based RFID redundant data cleaning method.
Background
The radio frequency identification technology has wide application in the fields of logistics, supply chains and the like due to the characteristics of non-contact, non-line-of-sight and the like, and particularly, the application of the RFID technology is more common along with the development of modern computers and intelligent storage construction. RFID data is an important component of RFID applications, and the quality of RFID data has a significant impact on the application of RFID technology. In practical RFID application, due to the characteristics of non-contact and non-line-of-sight, when a reader-writer is not close to a target tag, a large amount of data of the target tag is generated, and the data have certain redundancy; in addition, in practical application, a plurality of readers often work simultaneously, a large amount of redundant data can be generated for the same target tag in similar time, the generation of the redundant data cannot be avoided in the whole RFID application process, and the existence of the redundant data also limits the popularization of RFID application.
In addition, in RFID applications, RFID data mostly has the characteristic of mobility, which provides a greater challenge to the processing of the RFID data, so the main problem facing the cleaning of the RFID redundant data is how to clean a large amount of RFID data streams in real time in a short time and a small space, which puts higher requirements on the execution time and the occupied space of the cleaning algorithm.
At present, a plurality of methods for cleaning RFID redundant data are provided, Alonso proposes an extensible data stream cleaning model ESP based on statement query, but all data to be processed need to be stored, the dynamic requirements of RFID data streams are not met, and a large amount of memory space is occupied; in addition, Bloom Filter (hereinafter abbreviated as BF) was proposed in 1970, BF has been widely used in the field of data cleaning at present due to its characteristics of low memory ratio, efficient query and the like, while metro uses BF to detect redundant data, and since BF has no deletion function, when the amount of data is large enough, it will be filled up and fail. In addition, the Bloom Filter judges whether the data is redundant according to the existence of the data, for a large amount of data in practical application, useful data information of the data needs to be stored aiming at the same label instead of only one piece of data information, and single piece of data information has one-sidedness and uncertainty, so that the traditional Bloom Filter does not meet the requirement of practical application.
Chun-Hee Lee et al first proposed TBF (time Bloom Filter) to eliminate redundant data by using time information, and although the redundancy problem of RFID data on the time attribute was solved, data could be cleaned to a certain extent and valid information could be retained, RFID data has intensity attribute besides the time attribute, and the intensity attribute also has important role in each RFID application, and redundant data on the time attribute is not necessarily redundant on the intensity attribute for determination, so that cleaning data based on TBF is easy to lose many valid intensity attribute information, and for RFID application, the cleaning effect based on TBF is poor, and considering the incomplete factors and reducing the quality of data to a certain extent affects the effective utilization of subsequent application on RFID data. Similarly, the DTBF-based RFID redundant data cleansing method and system proposed in patent application No. CN201610212717.1 can solve the data cleansing problem when the size of the data stream is uncertain, but cannot consider the influence of the intensity factor in the data attributes on the cleansing effect, so that the cleansing effect is not good due to the insufficient consideration factor although the data can be cleansed. In an actual application scene, due to the fact that the coverage range of a reader-writer is large, data information of a corresponding label can be read when a mobile RFID patrol vehicle does not reach the position opposite to the label, the information is typically characterized by being short in time and low in strength, if the data is judged whether to be redundant or not only depending on time, effective strength information of the same label at the similar time is lost, the authenticity of the data cannot be truly reflected, and the real position of the data cannot be restored. Therefore, an R-TBF-based RFID redundant data cleansing method is needed.
Disclosure of Invention
The invention aims to provide an R-TBF-based RFID redundant data cleaning method; according to the cleaning method, on the basis of an original cleaning strategy, through redefining the time and intensity screening rules, the intensity is considered while the time is considered, and therefore the data cleaning effect is improved, and the data quality is improved.
The purpose of the invention is realized by the following technical scheme:
the invention provides an R-TBF-based RFID redundant data cleaning method, which comprises the following steps:
step 1: initializing a filter, the initializing including:
11) an integer array M for storing data time attributes, the size of the integer array M being M;
12) k hash functions h for mapping data tag information to an array of integers1…hk;
13) A mapping function HK for mapping the integer array subscript value to the Map set key value;
14) the Map set P is used for storing the data intensity attribute, and the size of the Map set P changes along with the size of the data volume;
15) a time threshold τ and an intensity threshold α that determine whether the time attribute and the intensity attribute of the data are redundant, respectively;
the value range of the time threshold τ is: 300 ms-600 ms;
the value range of the intensity threshold value α is 2 dB-5 dB;
step 2: carrying out redundancy judgment on current data X, wherein the current data X is transmitted according to a { ID, TIME, RSSI } format and is subjected to redundancy cleaning according to the following cleaning rule:
wherein the ID represents a package tag number; TIME represents the timestamp when this tag number was read; RSSI represents the strength value of the tag when it is read;
21) firstly, mapping X.ID in current data X to k different positions of an integer array M through k hash functions, judging whether k positions are assigned, if at least one of the k positions is not assigned, indicating that the data X is not processed, directly updating X.TIME to the k positions, and updating X.RSSI to the designated position according to a mapping function HK:
the value of j is a subscript of a selected k position in the integer array, X.HK is calculated according to a binary bit weight rule and is used as a key of a Map set, X.RSSI is used as a corresponding value of the Map set, and the RSSI value of X is stored;
22) if all the k positions are assigned, the data with the same X.ID are processed, redundancy judgment needs to be carried out on the current data X, and the redundancy judgment is carried out by comparing X.TIME with M [ h ]i(X.ID)]And the size of X.RSSI and X.HK.RSSI determines the redundancy of the time attribute and the strength attribute;
and step 3: and after the current data X is processed, repeating the step 2, and processing the next data by using the same cleaning rule.
Further, the size M of the integer array M of the data time attribute in step 1 is calculated according to the following formula:
wherein n is input dataThe size of the amount of the active ingredients is small,p represents the probability that a unit in the integer array is still empty after k.n times of mapping, and k is the number of the hash functions.
Further, the hash function h in step 11…hkThe number k of (a) is calculated according to the following formula:
k·n<m;
wherein n is the size of the input data volume, and m is the size of the integer array;
the formula for k is:
wherein n is the size of the input data volume, m is the size of the integer array, and P represents the probability that a unit in the integer array is still empty after k.n times of mapping.
Further, the mapping function HK in step 1 is calculated according to the following formula:
wherein j represents a certain unit of the integer array selected by the hash function, the subscript of the selected integer array unit performs binary decimal conversion operation according to the weight of the position of the subscript, and k is the number of the hash function.
Further, the size of the Map set P in step 1 varies with the size of the data volume.
Due to the adoption of the technical scheme, the invention has the following advantages:
the R-TBF-based RFID redundant data cleaning method provided by the invention considers two limiting conditions of time factor and intensity factor to correspondingly clean data, improves the cleaning effect, improves the data quality, reduces the data authenticity to the maximum extent and provides powerful guarantee for the effective utilization of subsequent data through primary timestamp cleaning and secondary intensity value cleaning.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention may be realized and attained by the means of the instrumentalities and combinations particularly pointed out hereinafter.
Drawings
The drawings of the present invention are described below.
FIG. 1 is a schematic view of a cleaning process.
Fig. 2 is an algorithm flow chart.
Detailed Description
The invention is further illustrated by the following figures and examples.
Example 1
As shown in the figure, the R-TBF-based RFID redundant data cleaning method provided by the embodiment solves the problems of poor cleaning effect and mistaken deletion of useful data caused by insufficient constraint conditions in the conventional TBF-based RFID data cleaning strategy, further improves the data quality, restores the authenticity of data, and provides a strong guarantee for effective utilization of subsequent data; on the basis of an RFID data cleaning strategy based on TBF, the consideration factor is adjusted from single time to two factors of time and intensity, because in an actual application scene, because the coverage range of a reader-writer is large, the data information of a corresponding label can be read when a mobile RFID patrol car does not reach the position right opposite to the label, the information has the typical characteristics of small time and small intensity, if the data is judged whether to be redundant only by depending on the time, the effective intensity information of the same label at the similar time is lost, the authenticity of the data can not be truly reflected, and the real position of the label can not be restored.
Therefore, in the embodiment, on the basis of the original cleaning strategy, the time and intensity screening rule is redefined, and the intensity is considered while the time is considered, so that the data cleaning effect is improved, and the data quality is improved. The specific contents are as follows:
step 1: initializing a filter, the initializing including:
11) an integer array M for storing data time attributes, the size of the integer array M being M;
the magnitude of m is calculated according to the following formula:
wherein n is the size of the input data volume,p represents the probability that a certain unit in the integer array is still empty after k.n times of mapping, and k is the number of the hash function;
12) k hash functions h for mapping data tag information to an array of integers1…hk;
The magnitude of k is such that the following inequality is satisfied:
k·n<m;
wherein n is the size of the input data volume, and m is the size of the integer array;
the formula for k is:
wherein n is the size of the input data volume, m is the size of the integer array, and P represents the probability that a certain unit in the integer array is still empty after k.n times of mapping;
13) a mapping function HK for mapping the integer array subscript value to the Map set key value;
the HK function is formulated as follows:
j represents a certain unit of the integer array selected by the hash function, the formula represents that the subscript of the selected integer array unit performs binary decimal conversion operation according to the weight of the position of the selected integer array unit, and k is the number of the hash function.
14) The Map set P is used for storing the data intensity attribute, and the size of the Map set P changes along with the size of the data volume;
15) a time threshold τ and an intensity threshold α that determine whether the time attribute and the intensity attribute of the data, respectively, are redundant.
The value range of the time threshold τ is: 300 ms-600 ms;
the value range of the intensity threshold value α is 2 dB-5 dB;
step 2: and (3) carrying out redundancy judgment on the current data X, transmitting the data X according to a { ID, TIME, RSSI } format and carrying out redundancy cleaning according to the following cleaning rules:
21) firstly, mapping X.ID to k different positions of an integer array M through k hash functions, judging whether k positions are assigned, if at least one of the k positions is not assigned, indicating that data X is not processed, directly updating X.TIME to the k positions, and updating X.RSSI to a specified position according to a mapping function HK:
the value of j is a subscript of a selected k position in the integer array, X.HK is calculated according to a binary bit weight rule and is used as a key of a Map set, X.RSSI is used as a corresponding value of the Map set, and the RSSI value of X is stored;
22) if all the k positions are assigned, the data X with the same X.ID are processed, redundancy judgment needs to be carried out on the data X, and the redundancy judgment is carried out by comparing X.TIME with M [ h ]i(X.ID)]And the size of the X.RSSI and the X.HK.RSSI determines the redundancy of the time attribute and the strength attribute;
and step 3: after the data X is processed, the step 2 is repeated, and the next data is processed by using the same cleaning rule.
Example 2
The following is specifically described with reference to the cleaning process shown in fig. 2, and the cleaning process provided in this embodiment mainly includes the following steps:
step 1: initializing a filter, the initializing including:
11) an integer array M for storing data time attributes, the size of the integer array M being M;
the magnitude of m is calculated according to the following formula:
wherein n is the size of the input data volume,p represents the probability that a certain unit in the integer array is still empty after k.n times of mapping, and k is the number of the hash function;
12) k hash functions h for mapping data tag information to an array of integers1…hk;
The magnitude of k is such that the following inequality is satisfied:
k·n<m;
wherein n is the size of the input data volume, and m is the size of the integer array;
the formula for k is:
wherein n is the size of the input data volume, and m is the size of the integer array;
13) a mapping function HK for mapping the integer array subscript value to the Map set key value;
the HK function is formulated as follows:
j represents a certain unit of the integer array selected by the hash function, the formula represents that the subscript of the selected integer array unit performs binary decimal conversion operation according to the weight of the position of the selected integer array unit, and k is the number of the hash function;
14) the Map set P is used for storing the data intensity attribute, and the size of the Map set P changes along with the size of the data volume;
25) a time threshold τ and an intensity threshold α that determine whether the time attribute and the intensity attribute of the data, respectively, are redundant.
The time threshold value tau is 300 ms-600 ms, the intensity threshold value α is 2 dB-5 dB, the specific values of the embodiment are 350ms, 400ms, 450ms, 500ms, 2.5dB, 3dB, 3.5dB and 4 dB.
Step 2: and (3) carrying out redundancy judgment on the current data X, transmitting the data X according to a { ID, TIME, RSSI } format and carrying out redundancy cleaning according to the following cleaning rules:
21) firstly, mapping X.ID to k different positions of an integer array M through k hash functions, judging whether k positions are assigned, if at least one of the k positions is not assigned, indicating that data X is not processed, directly updating X.TIME to the k positions, and updating X.RSSI to a specified position according to a mapping function HK:
the value of j is a subscript of a selected k position in the integer array, X.HK is calculated according to a binary bit weight rule and is used as a key of a Map set, X.RSSI is used as a corresponding value of the Map set, and the RSSI value of X is stored;
22) if all the k positions are assigned, the data X with the same X.ID are processed, redundancy judgment needs to be carried out on the data X, and X.TIME and M [ h ] are compared firstlyi(X.ID)]If, if
X.TIME-M[hi(X.ID)]>τ;
The data X is not redundant data in time attribute and then x.rssi and x.hk.rssi are compared if
X.RSSI-X.HK.RSSI>α;
Data X is also not redundant in intensity attribute, so both the time attribute and intensity attribute of data X are updated to the latest value if
X.RSSI-X.HK.RSSI<α;
The data X is redundant data on the intensity attribute, so that only the time attribute of the data X is updated to the latest value, and the original intensity attribute value is reserved;
3) and step 22), performing redundancy judgment on the data X, and comparing X.TIME with M [ h ]i(X.ID)]If, if
X.TIME-M[hi(X.ID)]<τ;
The data X is redundant data in time attribute and then x.rssi and x.hk.rssi are compared if x.rssi is redundant in time attribute
X.RSSI-X.HK.RSSI>α;
The data X is not redundant data on the intensity attribute, so the intensity attribute of the data X is only updated to the latest value, the original time attribute value is reserved, and if the intensity attribute is not redundant data, the intensity attribute of the data X is updated to the latest value
X.RSSI-X.HK.RSSI<α;
And if the data X is also redundant data in the intensity attribute, directly eliminating the data X as the redundant data.
And step 3: after the data X is processed, the step 2 is repeated, and the next data is processed by using the same cleaning rule.
Finally, the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions, and all of them should be covered in the protection scope of the present invention.
Claims (3)
1. An R-TBF-based RFID redundant data cleaning method is characterized in that: the method comprises the following steps:
step 1: initializing a filter, the initializing including:
11) an integer array M for storing data time attributes, the size of the integer array M being M;
12) k hash functions h for mapping data tag information to an array of integers1…hk;
13) A mapping function HK for mapping the integer array subscript value to the Map set key value;
14) the Map set P is used for storing the data intensity attribute, and the size of the Map set P changes along with the size of the data volume;
15) a time threshold τ and an intensity threshold α that determine whether the time attribute and the intensity attribute of the data are redundant, respectively;
the value range of the time threshold τ is: 300 ms-600 ms;
the value range of the intensity threshold value α is 2 dB-5 dB;
step 2: carrying out redundancy judgment on current data X, wherein the current data X is transmitted according to a { ID, TIME, RSSI } format and is subjected to redundancy cleaning according to the following cleaning rule:
wherein the ID represents a package tag number; TIME represents the timestamp when this tag number was read; RSSI represents the strength value of the tag when it is read;
21) firstly, mapping X.ID in current data X to k different positions of an integer array M through k hash functions, judging whether k positions are assigned, if at least one of the k positions is not assigned, indicating that the data X is not processed, directly updating X.TIME to the k positions, and updating X.RSSI to the designated position according to a mapping function HK:
the value of j is a subscript of a selected k position in the integer array, X.HK is calculated according to a binary bit weight rule and is used as a key of a Map set, X.RSSI is used as a corresponding value of the Map set, and the RSSI value of X is stored;
22) if all the k positions are assigned, the data with the same X.ID are processed, redundancy judgment needs to be carried out on the current data X, and the redundancy judgment is carried out by comparing X.TIME with M [ h ]i(X.ID)]And the size of X.RSSI and X.HK.RSSI determines the redundancy of the time attribute and the strength attribute;
and step 3: and after the current data X is processed, repeating the step 2, and processing the next data by using the same cleaning rule.
2. An R-TBF-based RFID redundant data cleansing method according to claim 1, characterized in that: the size M of the integer array M of the data time attribute in step 1 is calculated according to the following formula:
3. An R-TBF-based RFID redundant data cleansing method according to claim 1, characterized in that: the hash function h in the step 11…hkThe number k of (a) is calculated according to the following formula:
k·n<m;
wherein n is the size of the input data volume, and m is the size of the integer array;
the formula for k is:
wherein n is the size of the input data volume, m is the size of the integer array, and P represents the probability that a unit in the integer array is still empty after k.n times of mapping.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611269752.3A CN106844561B (en) | 2016-12-30 | 2016-12-30 | R-TBF-based RFID (radio frequency identification) redundant data cleaning method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611269752.3A CN106844561B (en) | 2016-12-30 | 2016-12-30 | R-TBF-based RFID (radio frequency identification) redundant data cleaning method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106844561A CN106844561A (en) | 2017-06-13 |
CN106844561B true CN106844561B (en) | 2020-03-24 |
Family
ID=59117697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611269752.3A Active CN106844561B (en) | 2016-12-30 | 2016-12-30 | R-TBF-based RFID (radio frequency identification) redundant data cleaning method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106844561B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110147364B (en) * | 2019-04-15 | 2024-05-28 | 深圳市大梦龙途文化传播有限公司 | Data cleaning method, device, equipment and storage medium |
CN110379159A (en) * | 2019-06-24 | 2019-10-25 | 重庆大学 | Trip chain extracting method based on motor vehicle electronic mark data |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102819559A (en) * | 2012-07-03 | 2012-12-12 | 上海大学 | RFID (Radio Frequency Identification) redundant data filtering method |
CN103116599A (en) * | 2012-11-30 | 2013-05-22 | 浙江工商大学 | Urban mass data flow fast redundancy elimination method based on improved Bloom filter structure |
CN105938480A (en) * | 2016-04-07 | 2016-09-14 | 重庆大学 | RFID redundant data cleansing method and system based on DTBF |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4153918B2 (en) * | 2005-03-22 | 2008-09-24 | 株式会社東芝 | Wireless tag reader, wireless tag system, program, and wireless communication method |
-
2016
- 2016-12-30 CN CN201611269752.3A patent/CN106844561B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102819559A (en) * | 2012-07-03 | 2012-12-12 | 上海大学 | RFID (Radio Frequency Identification) redundant data filtering method |
CN103116599A (en) * | 2012-11-30 | 2013-05-22 | 浙江工商大学 | Urban mass data flow fast redundancy elimination method based on improved Bloom filter structure |
CN105938480A (en) * | 2016-04-07 | 2016-09-14 | 重庆大学 | RFID redundant data cleansing method and system based on DTBF |
Non-Patent Citations (2)
Title |
---|
An approach for removing redundant data from RFID data streams;Hairulnizam Mahdin;《sensors》;20111009;全文 * |
基于时空布隆过滤器的RFID冗余数据清洗算法;王永利等;《南京理工大学学报》;20150630;第39卷(第3期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN106844561A (en) | 2017-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Choi et al. | Query tree-based reservation for efficient RFID tag anti-collision | |
Myung et al. | An adaptive memoryless protocol for RFID tag collision arbitration | |
JP4542509B2 (en) | Identifier recognition method, identifier transmission method, and identifier recognition system | |
CN101543087B (en) | Method and apparatus for avoiding overpolling | |
CN1706205A (en) | System and method for minimizing unwanted re-negotiation of a passive RFID tag | |
CN102754394B (en) | Method for hash table storage, method for hash table lookup, and devices thereof | |
WO2007055015A1 (en) | Electronic tag, and electronic tag system | |
CN101866413A (en) | Multi-label anti-collision method based on grouping mechanism and jumping dynamic binary recognition | |
CN106844561B (en) | R-TBF-based RFID (radio frequency identification) redundant data cleaning method | |
CN103473524A (en) | RFID multi-tag identification method, reader and tags | |
CN110807339A (en) | Lost label detection method of RFID system | |
Tsai et al. | Efficient tag reading protocol for large-scale RFID systems with pre-reading | |
CN107895130A (en) | A kind of adaptive multiway tree collision-proof method based on collision tree | |
CN101324916B (en) | Label recognition anti-collision method for RFID system | |
CN101697194B (en) | Data processing system and method for improving reliability of RFID application | |
Choi et al. | Enhanced binary search with time-divided responses for efficient rfid tag anti-collision | |
CN101551845B (en) | Identification and response method for electronic label, device and system | |
CN111027335B (en) | K-bit continuous collision bit detection split tree RFID label anti-collision algorithm | |
CN108090386A (en) | A kind of multicycle RFID anti-collision algorithm decomposed based on binary tree | |
CN109743362B (en) | Data storage method applied to full-format data structure | |
CN111310488A (en) | Self-adaptive M-system tree RFID anti-collision method | |
CN101609497B (en) | Method for reading electronic tag | |
Dong et al. | An Improved Binary Search Anti-Collision Protocol for RFID Tag Identification. | |
CN101430755A (en) | Label recognition anti-collision processing method in radio frequency recognition technology | |
CN100470576C (en) | Multi-label anti-collision algorithm in ultrahigh frequency remote auto-recognition system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230306 Address after: 213399 room 5025, building B, 218 Hongkou Road, Kunlun Street, Liyang City, Changzhou City, Jiangsu Province Patentee after: Liyang Smart City Research Institute of Chongqing University Address before: 400044 No. 174 Shapingba street, Shapingba District, Chongqing Patentee before: Chongqing University |