“…The reader continues splitting and probing until each individual tag is identified (Law et al, 2000;Micic et al, 2005;Myung and Lee, 2005). The second category is based on the ALOHA protocol and the Slotted ALOHA protocol (Madden et al, 2002a;Cha and Kim, 2005;Bonuccelli et al, 2006;Sheng et al, 2008;Tan et al, 2008;Sheng et al, 2010;Xie et al, 2010). Probabilistic estimation algorithms which efficiently estimate the cardinality of RFID tags have been proposed in numerous works (Cha and Kim, 2006;Kodialam and Nandagopal, 2006;Qian et al, 2008;Han et al, 2010).…”