Translated Titles

Designing the Meat-Heuristic for the Optimal RFID Reader Deployment Problem



Key Words

無線射頻辨識技術 ; 多目標基因演算法 ; 變動式基因演算法 ; RFID網路規劃問題 ; Radio Frequency Identification ; NSGA-II ; Variable length Genetic Algorithm ; RFID network planning



Volume or Term/Year and Month of Publication


Academic Degree Category




Content Language


Chinese Abstract


English Abstract

With the advance of RFID technology, a lot of enterprises import RFID system. To be able to function properly RFID system performance have to do RFID network planning. RFID network planning is the core-value of RFID system. There are a lot of literature discussing the RFID network planning problem. Our research construct a multi-objective mathematical model which are reference the previous scholars literature’s objective function and constraints. In many relevant paper, the user need to give the number of reader to the algorithm to solve. Our research want to use the variable-length genetic algorithm to solve whole model, this algorithm will automatically search for the best reader number and position. Our research using a Taguchi experimental design to get the optimal algorithm’s parameters. Our research designed two scenarios to validate the results of the algorithm, through the results of the scenarios that can prove our proposed method can effectively solve the RFID network planning problem and provide multiple solution for user.

Topic Category 管理學院 > 工業工程與管理系碩士班
工程學 > 工程學總論
社會科學 > 管理學
  1. 1. A. Sinha, “A survey of system security in contactless electronic passports,” International Journal of Critical Infrastructure Protection, vol. 4, no. 3–4, 2011, pp. 154–164.
  2. 3. C. C. Chen and T. C. Huang, “Learning in a u-Museum: Developing a context-aware ubiquitous learning environment,” Computers & Education, vol. 59, no. 3, 2012, pp. 873–883.
  3. 4. C. C. Hsu and P. C. Yuan, “The design and implementation of an intelligent deployment system for RFID readers,” Expert Systems with Applications, vol. 38, 2011, pp. 10506–10517.
  4. 5. C. K. Ting, C. N. Lee, H. C. Chang, and J. S. Wu, “Wireless Heterogeneous Transmitter Placement Using Multiobjective Variable-Length Genetic Algorithm,” IEEE Transaction on Systems, Man, and Cybernetics—Part B: Cybernetics, vol. 39, no. 4, 2009, pp. 945-958.
  5. 6. C. M. Roberts, “Radio frequency identification (RFID),” Computers & Security, vol. 25, no. 1, 2006, pp. 18-26.
  6. 7. C. Y. Tsai and S. H. Chung, “A personalized route recommendation service for theme parks using RFID information and tourist behavior,” Decision Support Systems, vol. 52, no. 2, 2012, pp. 514–527.
  7. 10. H. Chen, Y. Zhu, K. Hu and T. Ku, “RFID network planning using a multi-swarm optimizer,” Journal of Network and Computer Application , vol. 34, 2011, pp. 888-901.
  8. 11. H. P. Huang and Y. T. Chang, “Optimal layout and deployment for RFID systems,” Advanced Engineering Informatics, vol. 25, 2011, pp. 4–10.
  9. 15. J. S. Cho, S. S. Yeo and S. K. Kim, “Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value,” Computer Communications, vol. 34, no. 3, 2011, pp. 391-397.
  10. 17. K. Domdouzis, B. Kumar and C. Anumba, “Radio-Frequency Identification (RFID) application: A brief introduction,” Advanced Engineering Informatics, vol. 21, no. 4, 2007, pp. 350–355.
  11. 18. K. L. Vorst, R. H. Clarke, C. P. Allison and A. M. Booren, “A research note on radio frequency transponder effects on bloom of beef muscle,” Meat Science, vol. 67, no. 1, 2004, pp. 179–182.
  12. 20. M. H. Rehmani, A. Rachedi, S. Lohier, T. Alves and B. Poussot, “Intelligent antenna selection decision in IEEE 802.15.4 wireless sensor networks: An experimental analysis ,” Computers & Electrical Engineering, vol.40, no.2, 2014, pp. 443-455.
  13. 22. M. M. Aung and Y. S. Chang, “Traceability in a food supply chain: Safety and quality perspectives,” Food Control, vol.39, 2014, pp. 172–184.
  14. 23. N. C. Wu, M. A. Nystrom, T. R. Lin and H. C. Yu, “Challenges to global RFID adoption,” Technovation, vol. 26, no. 12, 2006, pp. 1317-1323.
  15. 24. N. Srinivas and K. Deb, "Multiobjective optimization using nondominated sorting in genetic algorithms," Evolutionary Computation, vol. 2, no. 3, 1994, pp. 221-248.
  16. 25. O. Botero and H. Chaouchi, “RFID network topology design based on Genetic Algorithms,” 2011 2nd IEEE RFID Technologies and Applications Conference, Sitges, Spain, 2011, pp. 300-305.
  17. 27. S. Alghamdi, R. V. Schyndel and I. Khalil, “Accurate positioning using long range active RFID technology to assist visually impaired people,” Journal of Network and Computer Applications, vol. 41, 2014, pp. 135-147.
  18. 28. S. Shepard, RFID: Radio frequency identification, New York: McGraw-Hill, 2005.
  19. 29. S. Y. Ho, L. S. Shu and J. H. Chen, “Intelligent Evolutionary Algorithms for Large Parameter Optimization Problems,” IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, vol. 8, no. 6, 2004.
  20. 30. S. Y. Seidel and T. S. Rappaport, “914 MHz Path Loss Prediction Models for Indoor Wireless Communication in Multifloored Buildings,” IEEE Transaxtions on Antennas and Propagation, vol.40, no.2, 1992, pp. 207-217.
  21. 31. S.L. Ting and H. C. Tsang, “A two-factor authentication system using Radio Frequency Identification and watermarking technology,” Computers in Industry, vol. 64, no. 3, 2013, p.p 268–279.
  22. 34. T. S. Rappaport, Wireless Communications: Principles and Practice, Prentice Hall, 2002.
  23. 35. V. Chawla and D. S. Ha, “An overview of Passive RFID,” Communications Magazine, IEEE , vol. 45, no. 9, 2007, pp. 11-17.
  24. 36. W. K. Wong, Z. X. Guo and S. Y. S. Leung, “Intelligent multi-objective decision-making model with RFID technology for production planning,” International Journal of Production Economics, vol. 147, Part C, 2014, pp. 647–658.
  25. 37. X. Li, "A Nondominated Sorting Particle Swarm Optimizer for Multiobjective Optimization," Proceedings of Genetic and Evolutionary Computation GECCO 2003, Berlin, Germany, vol. 2723, no. 1, 2003, pp. 37-48.
  26. 38. X. Qing and Z. N. Chen, “Proximity Effects of Metallic Environments on High Frequency RFID Reader Antenna: Study and Applications,” IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, vol. 55, no. 11, 2007, pp. 3105-3111.
  27. 39. Y. J. Gong and O. Kaynak, “Optimizing RFID Network Planning by Using a Particle Swarm Optimization Algorithm With Redundant Reader Elimination," IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, vol. 8, no. 4, 2012, pp. 900-912.
  28. 40. Z. Li, C. He, J. Li and X. Huang, “RFID reader anti-collision algorithm using adaptive hierarchical artificial immune system,” Expert Systems with Applications, vol. 41, no. 5, 2014, pp. 2126–2133.
  29. 2. B. Carbunar, M.K. Ramanathant, M. Koyuturk, C.M. Hoffmannt and A.Y. Grama, “Redundant reader elimination in RFID systems,” Sensor and Ad Hoc Communications and Networks, 2005, pp. 176-184.
  30. 8. D. E. Goldberg, B. Korb and K. Deb, “Messy Genetic Algorithms: Motivation, Analysis, and First Results,” Complex Systems, vol. 3, 1989, pp. 493-530.
  31. 9. D. V. Veldhuizen and G. Lamount, "Multi-objective evolutionary algorithm test suites," Proceedings of the 1999 ACM symposium on Applied computing, New York, 1999, pp. 351-357.
  32. 12. I. Harvey, Species adaptation Genetic Algorithms: A basis for a Continuing SAGA, Ph. D. thesis, The University of Sussex, Brighton, U.K., 1993
  33. 13. I. Rojas, J. Gonzalez, H. Pomares, J. J. Merelo, P. A. Castillo and G. Romero, "Statistical analysis of the main parameters involved in the design of a genetic algorithm," IEEE Transactions on Systems, Man and Cybernetics, Part C, vol. 32, no. 1, 2002, pp. 31-37.
  34. 14. J. D. Schaffer, "Multiple objective optimization with vector evaluated genetic algorithms," Proceedings of the First International Conference on Genetic Algorithms, Pittsburgh, U.S.A., 1985, pp. 93-100.
  35. 16. K. Deb, A. Pratap, S. Agarwal and T. Meyarivan, "A fast and elitist multi-objective genetic algorithm: NSGA-II," IEEE Transactions on Evolutionary Computation, vol. 6, no. 2, 2002, pp. 182-197.
  36. 19. M. Fonseca and P. J. Fleming, "Genetic algorithms for multi-objective optimization: Formulation, discussion and generalization," Proceedings of the Fifth International Conference in Genetic Algorithms, San Mateo, CA, 1993, pp. 416-423.
  37. 21. M. Laniel, I. Uysal and J. P. Emond, “Air cargo warehouse environment and RF interference,” International Journal of RF Technologies, vol.2, no.3-4, 2011, pp. 225–239.
  38. 26. P. M. Reyes, RFID in the Supply Chain, New York: McGraw-Hill, 2011.
  39. 32. T. J. Fan, X. Y. Chang, C. H. Gu, J. J. Yi and S. Deng, “Benefits of RFID technology for reducing inventory shrinkage,” International Journal of Production Economics, vol. 147, Part C, 2014, pp. 659-665.
  40. 33. T. M. Chan, K. F. Man, K. S. Tang, and S. Kwong, “A Jumping-Genes Paradigm for Optimizing Factory WLAN Network,” IEEE Transaction on Industrial Informatics, vol. 3, no. 1, 2007, pp. 33-43.