Maximum a posteriori (MAP)-based tag estimation method for dynamic framed-slotted ALOHA (DFSA) in RFID systems

Radio frequency identification (RFID) is a non-contact technology that uses radio frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. One of the common problems that arise in any RFID deployment is the collision between tags which reduces the efficiency of the RFID system. Dynamic framed-slotted ALOHA (DFSA) is one of the most popular approaches to resolve the tag collision problem. In DFSA, each tag randomly selects one of the time slots of a frame and transmits its data at the slot. Unless the tag successfully transmits its data to a reader, it will try again in the next frame. It is widely known that the optimal performance of framed-slotted ALOHA is achieved when the frame size (i.e., number of time slots) is equal to the number of tags to be identified. So, a reader dynamically adjusts the next frame size according to the number of tags. Thus, it is important to accurately estimate the number of tags. In this article, we propose an accurate maximum a posteriori (MAP)-based tag estimation method with low computational complexity. The idea behind our method is to more accurately determine the most potential number of tags which draws the observed results on the basis of both a posteriori probability and a priori probability. Simulation results show that our method improves the accuracy of tag estimation and the speed of tag identification.


Introduction
Radio frequency identification (RFID) systems that identify tagged objects via near/far-field wireless communications to realize ubiquitous computing are drawing much attention. The operation of RFID systems often involves a situation in which numerous tags are simultaneously placed in the interrogation zone of a single reader. The tags may collide with each other, leading to retransmission of tag data that brings about a waste of bandwidth and an increase in the total delay. To resolve the tag collision problem, a number of tag anti-collision algorithms have been proposed [1]. The primary concern in the algorithms is how to read multiple tags as fast and as reliably as possible.
Tag anti-collision algorithms are mainly grouped into tree-based [2] and ALOHA-based [3] algorithms. Treebased algorithms work by repeatedly splitting the group of colliding tags into two disjoint subsets. The subsets *Correspondence: cwlee@ajou.ac.kr Graduate School of Information and Communication, Ajou University, Suwon 443-749, South Korea become smaller and smaller until the number of tags within a subset reduces to one, in which case the tag would be uniquely identified. However, as the number of tags increases, the performance of tree-based algorithms decreases. This is because the colliding tags are successively grouped into two subsets, and each subset may still contain many tags resulting in collisions. The tree-based algorithms have been studied extensively in the literature [4][5][6].
ALOHA-based algorithms are mostly referred to as Framed-Slotted ALOHA (FSA) [7,8]. In FSA, time is divided into frames of multiple slots and the reader begins its interrogation round by announcing the frame size (i.e., the number of time slots) to the tags. Each tag selects one of the time slots at random and transmits its data at the slot. Unless the tag successfully transmits its data to the reader, it will try again in the next frame. According to [9], the expected throughput U of FSA with N tags and L slots in a frame is given by ( 1 ) http://jwcn.eurasipjournals.com/content/2012/1/268 It is obvious from the above equation that the throughput depends on the appropriate choice of frame size L, given the number of tags N in the interrogation range. Figure 1 shows the well-known upper bound of the throughput of e −1 that is characteristic for slotted ALOHA and also applies to FSA. The maximum throughput occurs when the frame size equals to the number of tags, i.e., L = N. Thus, for high performance, it is desirable that the frame size is dynamically adjusted according to the number of unread tags; the mechanism is referred to as Dynamic Framed-Slotted ALOHA (DFSA) [3]. However, DFSA necessitates the reader accurately estimating the number of unread tags to decide an appropriate frame size. To deal with this, various methods to estimate the number of unread tags have been studied in the literature [9][10][11][12][13][14][15][16][17][18][19][20].
In this article, we propose an accurate and simple maximum a posteriori (MAP)-based tag estimation method for DFSA in RFID systems. In the proposed scheme, we derive a probability mass function (PMF) that describes the relative probability of detection results occurring at a given number of tags and then, based on the derived PMF and the prior tag distribution (if it is postulated), determine the most potential number of tags which draws the detection results observed in a read cycle as the optimal estimate. However, this method may result in a heavy computational load due to the wide search range of tag quantity. To deal with this problem, we propose a simple iterative algorithm based on Newton's method. In our simulations, comparison with several conventional tag estimates shows that the proposed iterative algorithm has lower computational complexity and less error.
The rest of the article is organized as follows. We analyze several important tag estimation methods in the following section. In Section "The proposed tag estimation mechanism", we propose an MAP-based tag estimation with low computational complexity. Simulation results are shown in Section "Numerical results". Finally, we give our concluding remarks in Section "Conclusion".

Related study
In DFSA, the reader begins its interrogation by first announcing the frame size to all tags within its radio range. Then, each tag randomly selects one of the available time slots and transmits its information at the selected slot. For a given time slot, only three possible outcomes can happen: idle channel, successful transmission, or collision, as shown in Figure 2. The channel is idle if no tag transmits its information at the time slot. A successful transmission means that only one tag sends its information. If two or more tags transmit at the same time slot, the reader suffers from collision and no tag can be read. Based on the detection results, the reader dynamically adjusts the frame size for next read cycle (frame). As mentioned in Introduction section, since the system throughput, which is defined as the ratio between success slots and the frame size, can be maximized when the frame size equals to the number of unread tags, a number of studies have focused on accurate tag estimation [9][10][11][12][13][14][15][16][17][18][19][20].
The lower bound method [10] is obtained through the observation that a collision involves at least two different tags. Suppose that after carrying out an FSA in which the frame size is set to F, the reader can observe s i idle slots, s s success (or singly occupied) slots, and s c collision slots, where s i + s s + s c = F. Then, the lower bound method  An example of the detect results from an FSA when the frame size is set to 8. Tags are randomly allocated to slots within a frame (above). This result in some slots remaining empty and others contain one or more tags (below).
simply estimates the number of tags as 2s c . On the other hand, the Schoute method evaluates the expected number of tags per collision slot as 2.39 on the basis of the results in [9]. The authors of [11,12] proposed tag estimation methods based on the Schoute method for RFID anti-collision using FSA. According to these studies, if the frame size is assumed to be the number of tags, the expected value of collision tags is 2.39s c . Although the lower bound and the Schoute methods are simple and easy to implement, their assumptions are difficult to confirm in practice. Thus, using the expected value to estimate tag quantity may cause significant error and increase read delay [13].
In [14], the authors proposed tag estimation methods on the basis of approximations to the binomial distribution. Consider n tags are to be read and a frame of F time slots. For a given time slot, the number of tags allocated to the slot is binomially distributed with n Bernoulli trials and 1/F occupied probability. Thus, the probability of finding r tags in the slot is given by If the frame size F is sufficiently large, (2) can be approximated by a Poisson distribution with mean n/F. Accordingly, the probabilities of idle, successful transmission, and collision for the slot is given by From (3a)-(3c), the expectations of s i , s s , and s c are given by Then, assuming the detection results observed in a read cycle is close to their expectations, the three binomial mean estimators, i.e., zero estimator (ZE), singleton estimator (SE), and collision estimator (CE), can respectively derive their tag estimates n ZE , n SE and n CE by solving the following problems: In [15,16], the authors proposed the Lottery Frame (LoF) scheme to reduce the multiple-reading by multiple readers with overlapping interrogation regions. LOF adopts the ZE of [14] and dynamically adjusts the system load factor (the ratio of the tag quantity to the frame size) to eliminate the multiple-reading.
In [17], the authors derive the mean values of idle and success slots using a binomial distribution and combine them into a single equation for the number of tags. Solving both (4a) and (4a) for the number of tags n, then the Chen method's estimate denoted by n Chen is given by Then, assuming that the numbers of idle and success slots observed in a read cycle are identical tot heir expectations, the Chen method estimates the number of tags by substituting the expectations with the observations from http://jwcn.eurasipjournals.com/content/2012/1/268 an FSA. Though the Chen method and the three binomial estimators are simple, some cases (i.e., s i = 0, s s = 0, s c = 0) need special treatment and their accuracies are not satisfactory since the outcomes observed in a read cycle seldom correspond with their expectations [18].
The Vogt method [19,20] uses the distance between the detection result (s i , s s , s c ) and the expected value vector to estimate the number of tags n for which the distance becomes minimal using the exhaustive search. The Vogt method's estimate denoted by n Vogt is given by The Vogt method improves the accuracy of tag estimation compared with the lower bound and the Chen methods. However, the Vogt method requires rather large computational load because it works with no information about the search space.
The Eom method [18] estimates the number of tags by properly determining the number of tags per collision slot. Assuming that the frame size is sufficiently large, it formulates the number of tags per collision slot as two types of equations, one of which consists of the observed detection results (see (8a)) and the other consists of the expected values (see (8b)). Then, it combines them into an iterative algorithm and regards the corresponding convergence as the number of tags per collision slot. The Eom method's two iterative equations are as follows.
where β k and γ k denote the ratio of the frame size to the tag quantity and the number of tags per collision slot after the kth iteration, respectively. According to [18], the sequence in 8 tends to converge for a reasonable threshold. Then, the Eom method's estimate denoted by n Eom is given by where γ * k denote the limit value at the k * th iteration (starting from β 1 = ∞, γ 1 = 2). The Eom method gives a rather accurate estimate when the frame size is large. However, as the frame size decreases, its estimate error increases.
In general, a reader in an RFID system usually reads tags only once in a frame. In this context, Bayesian tag estimate which is available with few observation samples can be an appropriate approach. In [21], Rivest proposes a Bayesian transmission strategy for an FSA broadcast system. Based on Rivest's work, Floerkemeier also applies the Bayesian transmission strategy to a framed aloha RFID system in [22,23]. These works mainly concern about how to minimize the posterior expected value of a risk function (i.e., the posterior expected risk), such as using Bayesian rule to update the probability distribution of tag quantity and adjusting the frame size. However, the tag estimation method has not been discussed in these references.
On the other hand, in [24], using different risk (or loss) functions, the authors propose three Bayesian tag estimation methods: Bayesian mean-square, Bayesian absolute-error, and Bayesian posterior-probability estimation method. According to their simulations, the accuracy of Bayesian posterior-probability estimate (BPE) is the best among their methods. BPE is the same form as the maximum likelihood estimation (MLE) in [13], thus their accuracies are identical. Although BPE and MLE have better estimate performance than other existing methods, there is substantial room for improvement in estimation accuracy because they are only grounded on a posterior probability.
In this article, we propose an accurate MAP-based tag estimation method with low computation complexity. The idea behind our method is to more accurately determine the most potential number of tags which draws the observed results on the basis of both a posteriori probability and a priori probability. Furthermore, we propose a simple iterative algorithm based on Newton's method and reduce computational complexity.

The proposed tag estimation mechanism
The MAP-based tag estimate Consider an RFID system in which the tag anti-collision problem is avoided by the DFSA algorithm. Suppose there is a detection result s = {s i , s s , s c } observed in a read cycle, coming from a distribution with an unknown PMF f 0 depending on the number of tags. It is however surmised that function f 0 belongs to a certain family of distribu- , where denotes the domain of the distributable number of tags, so that f 0 = f (s|θ 0 ). The value θ 0 is unknown and is referred to as the true value of parameter θ. We want to find an estimateθ which would be as close to the true value θ 0 as possible. Now assume that a distribution g over θ exists. This allows us to treat θ as a random variable as in Bayesian statistics. Then, the posterior distribution of θ is given by where g is PMF of θ. This is a straightforward application of Bayes' theorem. http://jwcn.eurasipjournals.com/content/2012/1/268 Our method estimates θ 0 by finding a value of θ that maximizes f (θ|s). Thus, the optimal estimate of θ can be derived as the mode of the posterior distribution of this random variable: The denominator of the posterior distribution does not depend on θ and therefore plays no role in the optimization. Consequently, (11) can be simplified as Now we will derive the PMF of s occurring when the number of tags is given by θ, i.e., f (s|θ ). All the time slots in a read cycle only belong to one of three possible outcomes such as idle, success, or collision slot. Thus we can conclude that the three outcomes are mutually exclusive and collectively exhaustive (MECE). Then, f (s|θ ) is simplified by Bayes' theorem and the property of MECE: Equation (13) holds because Pr(s c |s i , s s , θ) = 1.
Next we need to derive the conditional probability distributions Pr (s i |θ) and Pr (s s |s i , θ). Pr (s i |θ) means the probability that θ tags select their respective slots among F slots leaving exactly s i idle slots. Assuming that θ = n, using (2) and (3) we have On the other hand, Pr (s s |s i , θ) means the probability that θ tags select their respective slots among (F − s i ) slots with exactly s s slots being singly occupied. Since the (F − s i ) slots belong to either success or collision slots, the probability that one of the slots is singly occupied is p s p s +p c . Finally, we have f (s|θ ) as follows.
According to (12), using both a prior distribution g(θ) and a posteriori distribution f (s|θ), we can determine the best estimateθ which is the most potential number of tags. From a statistical point of view, the method of MAP estimation is considered to be more robust (with some exceptions) and yields estimates with good statistical properties [25]. Furthermore, the proposed MAPbased tag estimate is very suitable for estimation under few observation samples [26].
The MAP-based tag estimate requires empirical data about tag detection and a prior distribution over tag quantity θ to obtain an optimal estimate. A prior distribution is often the purely subjective assessment of an experienced expert. Nevertheless, there are several ways to collect the prior. One reasonable approach is to make the prior a normal distribution with expected value equal to the present tag quantity, with variance equal to the variance of the past several tag quantities. This approach has a property in common with many priors, namely, that the posterior from one problem (present tag quantity) becomes the prior for another problem (next tag quantity) [27]. Other approach is to choose a conjugate prior when they can, to make calculation of the posterior distribution easier. The details of how to collect a prior distribution are shown in [28].
If an informative prior (which expresses specific, definite information about tag quantity) is not postulated or cannot be collected, we use a uniform prior distribution (that is, a constant function). This is based on the principle of indifference, which assigns equal probabilities to all possibilities [29]. Then, the MAP estimate of θ coincides with MLE in [13] and BPE [24], and thus the accuracy of our estimation method is equal to those of MLE and BPE.
Except for the accuracy of estimation, one obvious concern of both estimates is a tag quantity range over which the maximum probability needs to be searched. If the range is wide, the estimates' computational complexity will be high. To find extremum, our estimate and MLE basically needs to search N − s s + 2s c times in the search range of tag quantity (i.e., from θ = s s + 2s c to θ = N). In this article, we are based on the results of [24], we reduce the computational complexity by narrowing the http://jwcn.eurasipjournals.com/content/2012/1/268 search range. Consequently, our method needs to search | θ MAP − θ| + 2 times where θ = ln (s i /F) / ln (1 − 1/F).
On the other hand, if we need to use a uniform prior distribution due to non-informative prior, we can reduce the complexity more. In next section, we propose an iterative algorithm to determine the estimate in less computational complexity when informative prior is not given or a uniform prior distribution is used.

Iterative algorithm to reduce computational complexity
Let S be a vector of three random variables with a probability distribution with the function f depending on a parameter x. Assuming that the prior distribution of x is uniform, the function considered as a function of x, is called the likelihood function (of x, given the outcome s of S) [25]. Let l(x) be a probability distribution with the likelihood function L depending on a parameter x. From (16) and (17), we have where s c ≥ 1 and s i +s s ≥ 1. If s c is zero, we can easily conclude that all the tags were read. On the other hand, if both s i and s s are zero, we can conclude that all the tags were collided with each other. As the number of tags increases, the chances of this happening grow higher. The estimate from our method must be the maximum number of tags that the RFID system can read. Thus we only consider a read cycle where s c ≥ 1 and s i + s s ≥ 1, hence x ≥ 2 and F ≥ 2. Suppose {x ∈ R|2 ≤ x ≤ N} where N is the maximum number of tags that the RFID system can tolerate. It is obvious that l is continuous on the interval because F = 0. Thus the maximum value is undoubtedly one among l(2), l(N) or the extreme values of l. Since the values of l(2) and l(N) can be simply obtained from (18), we focus on the extreme values.
If l (x), i.e., ∂ ∂x l(x), exists, l has a local maximum or minimum at some number c in [ 2, N] when l (c) = 0 [30]. To find the first-order derivative of l it is easier to differentiate the logarithm of the function rather than the function itself, hence we first take the natural logarithm on both sides. Then, after implicit differentiation we have For l (x) = 0, ∂ ∂x ln l(x) should be zero because l(x) > 0 for all x. Thus we will focus on the roots of ∂ ∂x ln l(x). It is not easy to obtain the roots using elementary algebra, so we apply a numerical approach in finding the roots of general polynomial equation. Let It is also obvious that h (x) is continuous on the interval. Thus, we can use Newton's method which gives better approximations to the roots of a real-valued function [31]. As proved in the Appendix, h(x) has only a single root. Assume that there exists a root q ∈ [ 2, N] where h(q) = 0. According to Newton's method, if h (q) = 0, the sequence {q k } ∞ k=0 defined by the iteration will converge to q with any initial estimate q 0 ∈[ 2, N]. Nevertheless, it is desirable to choose one as close as possible to the root to reduce the iteration times. To give a better initial estimate, we use the Chen method [17] mentioned in Section "Related study". In addition, the real number of tags is at least s s + 2s c . Thus, we set the initial estimate as After determining an initial value for x 0 using (23), we start the iteration based on to update tag estimate x k until the difference between x k and x k−1 is less than a threshold TH , i.e., Let x * be the converged value of x k . According to the proof in the Appendix, h(x) is strictly decreasing and has only a single root, i.e., x * . Note that l (x) = l(x)h(x) and l(x) > 0 on the interval [ 2, N]. Since h(x) ≥ 0 where x ≤ x * , we can conclude that function l monotonically increases on the interval [2, x * ]. On the contrary, l monotonically decreases on the interval [ x * , N] because h(x) ≤ 0 where x ≥ x * . Consequently, l attains the maximum value at x * . We determine, therefore, the estimatê θ = [x * ] that maximizes the likelihood of detection results observed in a read cycle.

Computational complexity analysis
Among conventional tag estimates, the simpler ones are the lower bound method, the Schoute method, the three binomial mean estimators (i.e., ZE, SE, CE) and the Chen method. Their estimate can be simply obtained. On the other hand, to obtain the value of conditional probability Pr(θ|s) from θ = s s + 2s c to θ = N, MLE needs to enumerate the conditional probability N − s s − 2s c + 1 times. Similarly, the Vogt method needs to search N − s s − 2s c + 1 times over the search tag range to find extremum. The Eom method uses an iterative algorithm and has less complexity than the Vogt method or MLE. However, a more detailed complexity analysis is likely intractable [18]. Unlike the methods above, by narrowing the search range of tag quantity, BPE reduces its computational complexity. According to [24], BPE needs to search | n BPE −n|+2 where n BPE denote the Bayesian tag estimate and n = ln (s i /F) / ln (1 − 1/F).
When we need to use a uniform prior distribution, we can use a simple iterative algorithm based on Newton's method. According to [32], using Newton's method, the computational complexity of calculating a root of a function a(x) with c-digit precision, provided that a good initial approximation is known, is O log c F (c) where F(c) is the cost of calculating a(x)/a (x) with c-digit precision. On the other hand, when an informative prior distribution is postulated, the complexity of our method is similar to that of BPE. The computational complexity of the primary estimates is listed in Table 1.

Numerical results
Computer simulations are performed to check and extend the analytical results of the previous section. We consider a single reader and a number of tags under error-free channel environment. The prior distribution for tag quantity is assumed a normal distribution with mean μ and variance σ 2 . We set the frame size and the tag quantity of each read cycle to generate from the prior normal distribution and obtain detection result S from the read cycle. Then, we perform the proposed tag estimation method. Finally, we obtain the average estimate after completing 1,000 cycles. In our method, TH is set to 0.001. Figures 3 and 4 show the average estimation error which is defined as the average difference between the real number and the estimated number of tags. For the simulation, we set the frame size to 128 or 32 and vary the mean μ from 8 to 256 or from 2 to 64, respectively. The variance σ 2 is set to 0.05μ or 0.1μ, respectively. Note that when a uniform prior distribution is considered, our method is actually MLE [13] and has the same results as MLE and BPE. Thus, we do not give the estimation results of our method which incorporates a uniform prior distribution in our simulations. In addition, the performance of SE [14] is insufficient and we do not give its results.
When the number of tags is considerably less than the frame size, Lower bound method is the most efficient among the methods. However, as the number of tags increases, its estimation errors increase steeply. Among the existing methods, BPE and MLE which have the similar curves to the Eom method show reasonable performance. On the other hand, the accuracies of other estimates such as ZE, CE, Chen, Schoute and Vogt methods are not satisfactory. Figures 3 and 4 present that the proposed method provides more precise estimation than the other methods except the region in which the number of tags is comparatively less than the frame size. Figure 5 shows the simulation results for estimate computational complexity, where the computational complexity can also be seen in Table 1. For the simulation, we set the frame size to 128 or 32. If a uniform prior distribution is postulated, our method can reduce the computational complexity using the iterative algorithm in (24). The computational complexity is defined as the average number of iterations performed to obtain the tag estimate. Note that the complexity of MLE and the Vogt estimates depend on the maximum number of tags N and are quite high (i.e., more than N/2). In addition, the accuracies of simple estimates such as the lower bound method, the Schoute method, the three binomial mean estimators and the Chen method are insufficient. Thus, we do not give the results of them in Figure 5. of our iterative algorithm is less than that of BPE. When a non-uniform prior distribution is postulated, the complexity of our method is a little bit high than that of BPE. Nevertheless, our method gives more accurate estimate than BPE and MLE as shown in Figures 3 and 4.
To evaluate the performance of DFSA in which each tag estimation method is employed, we measure the number of time slots used to detect all the tags when the next frame size is set to the number of unread tags estimated by each method. In our method, the mean value for the next prior distribution is adjusted according to its current estimate. An initial frame size and the minimum size are respectively set to 64 and 8, and the mean μ varies from 100 to 1000. In Figure 6, we compare the RFID system efficiency, which is defined as the ratio of the number of success slots to the number of slots used to detect all the tags. Figure 6 shows that our tag estimation method gives the highest system efficiency compared to the others. It also demonstrates that the performance of DFSA can be nearly improved to the maximum efficiency of Slotted ALOHA (about 36.8%) using our tag estimation method.

Conclusion
In this article, we have proposed an accurate MAP-based tag estimation method for DFSA in RFID systems and improved the proposed method to reduce computational complexity. The proposed method can be used to obtain a point estimate of an unobserved tag quantity on the basis of empirical detection data and an informative prior. From our theoretical derivation and simulation results, we draw the conclusions as follows.
The proposed MAP-based tag estimation improves the accuracy of tag estimation and requires less time slots to read out all tags than the other existing methods. When Mean of the prior distribution (µ) Figure 6 System efficiency of DFSA when the frame size is set to the estimated number of tags where σ 2 = 0.1μ. Also shows the corresponding system efficiency, which is defined as the ratio of the number of success slots to the number of slots used to detect all the tags.
an informative prior is not postulated or a uniform prior is used, our method can reduce computational complexity using the proposed iterative algorithm. Nevertheless, our method produces the same estimates as MLE and BPE. When the precise number of tags is not given, which is usual in practice, our method can achieve accurate estimation performance. Therefore, our method can become a suitable candidate for such a mechanism and can be useful for engineers to implement the DFSA algorithm in a real RFID system.

Proof that h(x) has only a single root
The function h is continuous on the closed interval [ 2, N]. The proof consists of three steps. In the first step, we prove using contradiction that h(2) > 0. Let Suppose that h(2) ≤ 0. Then, we have We subtract s s 2 −s c (F − 1) from each side of the inequality and then divide both sides by s c (F − 1). Then, we have .
The right-hand side of (28) is at most one because s s 2s c (F−1) ≥ 0. If the left-hand side of (28) is larger than one, it can be concluded that inequality (28) is invalid. Now we show that the left-hand side of (28) is larger than one. Given any F, the left-hand side of (28) is minimized when s c = 1 because ln t < 0. Substituting s c with one, the left-hand side of (28) is given by −F ln t. Let m(F) has following properties.
(ii) lim (iii) Assuming m is a continuous function, we have m (F) = − ln 1 − 1 F + 1 F−1 . Since m (F) < 0 where F ≥ 2, m(F) is strictly decreasing. Since frame size F is finite in practice, taken the three properties together, we have m(F) > 1. This contradicts the proposition that h(2) ≤ 0. Therefore, it can be concluded that h(2) > 0 where s c ≥ 1.
In the second step, we show that h(N) < 0. h(N) is given by Assuming that N is sufficiently large, both t N and N F t N−1 can be approximated to zero. Thus, we have lim N→∞ h(N) = (s i + s s ) ln t.
Since ln t < 0 and s i + s s ≥ 1, it can be concluded that h(N) < 0 where N is sufficiently large.
In the final step, we prove that h (x) < 0 on the interval [ 2, N]. From (21) we have where n(x) = {(F − 1 + x) ln t + 2} ln t + 1 F t x−1 . Since both s c F t x−1 and 1 − t x + x F t x−1 2 are larger than zero, if n(x) is larger than or equal to zero, then h (x) is negative at all x. Now we prove that n(x) ≥ 0 by showing that n(x) is strictly increasing and n(2) ≥ 0. It is obvious that n(x) is continuous on the interval. Thus we have n (x) = ln 2 t + 1 F t x−1 ln t = 1 F ln t F ln t + t x−1 .
(32) http://jwcn.eurasipjournals.com/content/2012/1/268 In the first step, we have proved that −F ln t > 1, thus we have F ln t < −1. Since t x−1 < 1, F ln t + t x−1 is less than zero. It can, therefore, be concluded that n (x) > 0, i.e., n(x) is strictly increasing. Next we show that n (2) is positive at all F. Let x be two and F be the function n's variable and allowed to vary freely. Let r(F) be a function that describes the value of n(2) at varying F. Then, we have r(F) has following properties. (iii) Assuming r is a continuous function, we have r (F) = 2 F(F−1) F ln t + 1 + ln t + 1 2F t . The derivation of r (F) is as follows. Since t = 1 − 1 F , From F ln t < −1, we have F ln t + 1 < 0. This inequality can be transformed into ln t < − 1 F . Since t 2 < 1, we have ln t < − 1 F < − 1 2F t. Thus r (F) is negative for all F. Taken three properties together, it can be concluded that r(F) > 0, i.e., n(2) > 0. Consequently, we have that n(x) > 0. Therefore, we can conclude that h (x) < 0 on the interval [ 2, N].
From the preceding three steps, it can be concluded that h(x) has only a single root in the interval [ 2, N] where s c ≥ 1 and s i + s s ≥ 1.