Anomaly Detection and Elimination Algorithm for RFID Data

نویسنده

  • A. Anny Leema
چکیده

The RFID technology has penetrated into all the sectors like supply chain automation, asset tracking, medical/Health Care applications, people tracking, Manufacturing, Retail, Warehouses, Livestock Timing and the healthcare sector due to its increased functionality, low cost, high reliability and easy-to-use capabilities. RFID system produces data that are unreliable, low-level, and rarely able to be used directly by applications. This paper discusses the existing physical, middleware and deferred approaches to deal with anomalies. Each approach has its own drawbacks. To clean the anomaly false positive in an effective manner we have chosen the integrated approach of middleware and deferred. The premise taken is based on cellular for detecting out of the range readings .The RFID readers have Omni-directional antenna and hence there are possibilities for the adjacent regions to over lap with each other. Algorithm proposed in this paper do not deal with any physical device , but rather integrate middleware and deferred to construct RFID hybrid system that lighten issues associated with using RFID data through adaptive cleaning technique. The resultant data is cleaned data and it can be used for any high end applications. Simulation shows our approach deals with RFID data more efficiently and accurately.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

افزایش سرعت شناسایی در سیستم‌های RFID

Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...

متن کامل

Improving the RX Anomaly Detection Algorithm for Hyperspectral Images using FFT

Anomaly Detection (AD) has recently become an important application of target detection in hyperspectral images. The Reed-Xialoi (RX) is the most widely used AD algorithm that suffers from “small sample size” problem. The best solution for this problem is to use Dimensionality Reduction (DR) techniques as a pre-processing step for RX detector. Using this method not only improves the detection p...

متن کامل

AN-EUL method for automatic interpretation of potential field data in unexploded ordnances (UXO) detection

We have applied an automatic interpretation method of potential data called AN-EUL in unexploded ordnance (UXO) prospective which is indeed a combination of the analytic signal and the Euler deconvolution approaches. The method can be applied for both magnetic and gravity data as well for gradient surveys based upon the concept of the structural index (SI) of a potential anomaly which is relate...

متن کامل

Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting

Traces of RFID-equipped item can be used to detect counterfeits. Nevertheless companies are reluctant to share the necessary traces, since it is unclear what can be inferred from them. In this paper we present a provably secure pattern matching algorithm that can be used for distributed anomaly detection. We improve performance and detection capabilities compared to competing approaches by stor...

متن کامل

An Efficient RFID Data Cleaning Method Based on Wavelet Density Estimation

A large number of noise are usually carried in the original RFID data and need to be cleaned up before further processing. Outlier detection is an effective method for RFID data cleaning. In this paper, a point probability data model was proposed to describe the uncertain RFID data streams. The wavelet density threshold was incorporated in this method to adaptively detect the outliers in the sl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012