X-CleLo: intelligent deterministic RFID data and event transformer

Recently, passive Radio Frequency Identification (RFID) systems have received an increased amount of attention as researchers have worked to implement a stable and reliable system. Unfortunately, despite vast improvements in the quality of RFID technology, a significant amount of erroneous data is still captured in the system. Currently, the problems associated with RFID have been addressed by cleaning algorithms to enhance the data quality. In this paper, we present X-CleLo, a means to intelligently clean and transform the dirty data into high-level events using Clausal Defeasible Logic. The extensive experimental study we have conducted has shown that the X-CleLo method has several advantages over currently utilised cleaning techniques and achieves a higher cleaning and event discovery rate.

[1]  David Billington Propositional Clausal Defeasible Logic , 2008, JELIA.

[2]  Dan Suciu,et al.  Probabilistic Event Extraction from RFID Data , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[3]  Fusheng Wang,et al.  Fast track article: A temporal RFID data model for querying physical objects , 2010 .

[4]  Bei Yu,et al.  On generating near-optimal tableaux for conditional functional dependencies , 2008, Proc. VLDB Endow..

[5]  Minos N. Garofalakis,et al.  Adaptive cleaning for RFID data streams , 2006, VLDB.

[6]  Christopher Ré,et al.  Event queries on correlated probabilistic streams , 2008, SIGMOD Conference.

[7]  M. Balazinska,et al.  PEEX : Extracting Probabilistic Events from RFID Data , 2007 .

[8]  Jun Rao,et al.  A deferred cleansing method for RFID data analytics , 2006, VLDB.

[9]  Henry A. Kautz,et al.  Inferring High-Level Behavior from Low-Level Sensors , 2003, UbiComp.

[10]  Prashant J. Shenoy,et al.  Efficient Data Interpretation and Compression over RFID Streams , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[11]  Context-Aware Computing,et al.  Inferring Activities from Interactions with Objects , 2004 .

[12]  Christian Floerkemeier,et al.  Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.

[13]  Jef Wijsen,et al.  Database repairing using updates , 2005, TODS.

[14]  Aikaterini Mitrokotsa,et al.  Detecting intrusions within RFID systems through non-monotonic reasoning cleaning , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[15]  Fusheng Wang,et al.  Temporal Management of RFID Data , 2005, VLDB.

[16]  Bela Stantic,et al.  A fusion of data analysis and non-monotonic reasoning to restore missed RFID readings , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[17]  M. Balazinska,et al.  Probabilistic RFID Data Management , 2007 .

[18]  Xue Li,et al.  RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.

[19]  Philip S. Yu,et al.  A Sampling-Based Approach to Information Recovery , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[20]  Prashant J. Shenoy,et al.  Probabilistic Inference over RFID Streams in Mobile Environments , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[21]  Abdul Sattar,et al.  Correcting Missing Data Anomalies with Clausal Defeasible Logic , 2010, ADBIS.