
performance, when number of RFID tag increased, 
the tag collision rate will be increased as well; this 
may result a low tag recognition rate. 
The tree-based schemes use a data structure 
similar to a binary search algorithm, such as binary 
tree splitting protocol (Myung et al., 2006), query 
tree (QT) algorithm, and tree working algorithm 
(Capetanakis, 1979; Feng et al., 2006). An RFID 
reader consecutively communicates with tags by 
sending prefix codes based on the query tree data 
structure. Only tags in the reader’s interrogation 
zone and of which ID match the prefix respond. The 
reader can identify a tag if only one tag respond the 
inquiry. Otherwise the tags responses will be 
collided if multiple tags respond simultaneously. 
Although tree based protocols deliver 100% 
guaranteed read rates, but they have relatively long 
identification delay. Recently, a hybrid query tree 
protocol (HQT) (Ryu et al., 2007) was proposed and 
aiming to reduce transmission overhead by using 4-
ary search tree mechanism and slotted backoff 
mechanism, in order to speed up tag identification 
and to increase the overall read rate and throughput 
in large-scale RFID systems. The main idea of the 
HQT technique is to reduce the number of collisions 
during the identification phase. In the 4-ary search 
tree mechanism, the prefix string of a collided query 
will be extended by 2-bits next time, unlike of 1-bit 
in the QT protocol. This way, collisions can be 
reduced substantially. Furthermore, the HQT 
protocol was aiming to reduce the idle cycles by 
using a slotted backoff mechanism. When a tag 
responds to a reader, it sets its backoff timer using a 
part of its ID. If there is a collision (multiple tags 
respond), the reader can partially deduce how the 
IDs of tags are distributed and potentially reduce 
unnecessary queries. 
Based on the HQT protocol, a H
2
QT protocol 
(Kim and Lee, 2009) was proposed and aiming to 
reduce the idle cycles and improve the performance 
of tag identification. Although the H
2
QT technique 
performs better than the HQT technique in reducing 
the number of idle cycles, it still has some idle 
cycles, which cannot be reduced during the tag 
identification process. In this paper, we proposed a 
pre-detection based protocol, called Adaptive Pre-
Detection Based Query Tree (APDBQT) protocol, to 
eliminate those unnecessary idle cycles. To evaluate 
the performance of our proposed technique, we have 
implemented our proposed APDBQT scheme along 
with previous proposed methods, HQT and H
2
QT 
protocols. The experimental results show that the 
proposed technique presents significant 
improvement in most circumstance. 
The remainder of this paper is organized as 
follows: Related work is discussed in Section II. In 
Section III, the tree based tag identification 
algorithm is introduced as preliminary of this study. 
In Section IV, our proposed algorithm, the APDBQT 
algorithm is presented. Performance comparisons 
and analysis of the proposed technique will be given 
in Section V. Finally, in Section VI, some 
concluding remarks are made. 
2 RELATED WORK 
Many research results for collision avoidance have 
been presented in literature. The existing tag 
identification approaches can be classified into two 
main categories, the Aloha-based anti-collision 
scheme (Vogt, 2002; Law et al., 2000; Lee et al., 
2005; Park et al., 2007; Klair et al., 2007) and the 
tree-based scheme (myung et al., 2006; Capetanakis, 
1979; Zhou et al., 2003; Feng et al., 2006). RFID 
readers in the former scheme create a frame with a 
certain number of time slots, and then add the frame 
length into the inquiry message sent to the tags in its 
vicinity. Tags response the interrogation based on a 
random time slot. Because collisions may happen at 
the time slot when two or more tag response 
simultaneously, making those tags could not be 
recognized. Therefore, the readers have to send 
inquiries contiguously until all tags are identified. 
As a result, Aloha-based scheme might have long 
processing latency in identifying large-scale RFID 
systems (Law et al., 2000). In (Vogt, 2002), Vogt et 
al. investigated how to recognize multiple RFID tags 
within the reader’s interrogation ranges without 
knowing the number of tags in advance by using 
framed Aloha. A similar research is also presented in 
(Zhen et al., 2005) by Zhen et al. In (Klair et al., 
2007), Klair et al. also presented a detailed 
analytical methodology and an in-depth qualitative 
energy consumption analysis of pure and slotted 
Aloha anti-collision protocols. Another anti-collision 
algorithm called enhanced dynamic framed slotted 
aloha (EDFSA) is proposed in (Lee et al., 2005). 
EDFSA estimates the number of unread tags first 
and adjusts the number of responding tags or the 
frame size to give the optimal system efficiency. 
In tree-based scheme, such as ABS (Myung et al., 
2006), Improved Bit-by-bit Binary-Tree (IBBT) 
(Choi et al., 2004) and IQT (Sahoo et al., 2006), 
RFID readers split the set of tags into two subsets 
and labeled them by binary numbers. The reader 
repeats such process until each subset has only one 
tag. Thus, the reader is able to identify all tags. The 
SENSORNETS2015-4thInternationalConferenceonSensorNetworks
70