In-Network Phased Filtering Mechanism for a Large-Scale RFID Inventory Application

نویسندگان

  • Wonil Choi
  • Myong-Soon Park
چکیده

-RFID technology is one of automatic identification technologies. In current RFID systems, RFID data are managed and processed by a middleware. In the near future, when RFID technology will be applied to large scale warehouses, airports, or seaports, it is necessary that wireless sensors integrated a RFID reader construct wireless sensor network because of difficulties of building wired network infrastructure. However adjacent RFID readers in wireless sensor network can generate many duplicate data at the same time. These duplicate data transmissions may waste the energy of sensor nodes integrated a RFID reader and cause network congestions. So we propose in-network phased filtering mechanism for a large-scale RFID inventory application. In this paper, we describe our idea to reduce a processing time of filtering and confirm the idea by a simulation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A conic quadratic model for supply chain network design under hub, capacity, delay and lost sale

In this paper, mathematical models are proposed for simultaneously modeling location and inventory control decisions in a four echelon supply chain network considering capacity. The echelons considered in this paper include suppliers, warehouses, hubs and retailers. The aim of the model is to minimize the location, transportation and inventory control costs. Hence, a non-linear mixed integer pr...

متن کامل

Robust state estimation in power systems using pre-filtering measurement data

State estimation is the foundation of any control and decision making in power networks. The first requirement for a secure network is a precise and safe state estimator in order to make decisions based on accurate knowledge of the network status. This paper introduces a new estimator which is able to detect bad data with few calculations without need for repetitions and estimation residual cal...

متن کامل

Improvement and parallelization of Snort network intrusion detection mechanism using graphics processing unit

Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...

متن کامل

Survey on Localization Techniques of RFID for IOT

Over the last couple of years Radio Frequency Identification or as often called RFIDs are used to identify unique items using radio waves. RFID is like barcode reader but the reading is done remotely in case of RFID . RFID does not require line of sight for identification. Now a days RFID has a wide application in different fields such as Internet of things(IOT), real-time systems, medical moni...

متن کامل

The Effect of Radio Waves on the Quality and Safety of Wearable Sensors in Healthcare

The industrial Internet of Things (IoT) is aiming to interconnect humans, machines, materials, processes and services in a network. Wireless Sensor Network (WSN) comprises the less power consuming, light weight and effective Sensor Nodes (SNs) for higher network performance. Radio Frequency Identification (RFID) and sensor networks are both wireless technologies that provide limitless future po...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006