2012 IEEE International Conference on RFID (RFID) 2012
DOI: 10.1109/rfid.2012.6193044
|View full text |Cite
|
Sign up to set email alerts
|

An adaptive data cleaning scheme for reducing false negative reads in RFID data streams

Abstract: Due to the high sensitivity of RFID tag-reader performance to the operating environment, RFID data streams generated are unreliable and contain a significant amount of missed readings. RFID data cleaning is therefore an essential task for successful deployment of RFID systems. One of the common techniques used by RFID middleware systems to compensate for the missed readings is the use of sliding-window filters. However, setting an optimum window size is non-trivial task especially in mobile tag environments. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…The protocol improved the SMURF with transition detection mechanism. Another approach is from Liu [20] where their research is focusing on efficient multicast transmission and aggregate queries in the large RFID data stream. They attempt to lower the total of empty slots and estimated collision slots and trigger the deficiency of the existing Iterative ID free Protocol (IIP) scheme.…”
Section: Fig 1 Rfid Missing Tags Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…The protocol improved the SMURF with transition detection mechanism. Another approach is from Liu [20] where their research is focusing on efficient multicast transmission and aggregate queries in the large RFID data stream. They attempt to lower the total of empty slots and estimated collision slots and trigger the deficiency of the existing Iterative ID free Protocol (IIP) scheme.…”
Section: Fig 1 Rfid Missing Tags Scenariomentioning
confidence: 99%
“…In another work, Liu [20] proposed the MMTI protocol. This protocol is to lessen the total of the estimated empty slot and an estimated collision slot.…”
Section: B Multi-hashing Based Missing Tags Identification (Mmti)mentioning
confidence: 99%
“…There are many approaches has been proposed to solve this problem such as Window Sub-range Transition Detection (WSTD) [12], Efficient Missing-Tag Detection Protocol (EMD) [13]and Multi-hashing based Missing Tag Identification (MMTI) protocol [14]. However, simply detecting the missing-tag event is not enough.…”
Section: Related Workmentioning
confidence: 99%
“…In WSTD [12], the goal is to give each tag opportunity to be read within the window by reducing or eliminate dropped readings. WSTD is used as a data cleaning mechanism for low-level RFID data processing tasks within middleware system.…”
Section: Window Sub-range Transition Detection (Wstd)mentioning
confidence: 99%
“…Various RFID data generators have been designed for experimental study. For example, Shawn R. Jeffery of UC Berkeley and researchers at University of Massachusetts both developed a dedicated RFID data generator [2,3]. Note that most of these generators only meet the specific requirements of their designers, but cannot be applied directly in other experiments.…”
Section: Introductionmentioning
confidence: 99%