New and Efficient Data Ware Housing Algorithm for Multile REID Readers

RFID technology is increasingly adopted and deployed in real applications owing to the fact that the RFID technology offers momentous advantages when compared to the traditional object-tracking technologies. The RFID readers with antennas, host computers, and transponders or RF tags (which are recognized by the readers) constitute an RFID system. When multiple readers are employed, it results in duplication (generated through the multiple readers). In order to avoid the duplication, we restrict the mobility of readers and manage readers similar to disabling when there are no items in their coverage. The duplication of RFID tag readings is caused due to the reason that multiple RFID readers may track a single item. In this paper, we have planned to develop a novel efficient algorithm which manages the RFID readers effectively, in order to avoid duplication of data and hence optimizing the storage space.

[1]  Fusheng Wang,et al.  RFID Data Processing with a Data Stream Query Language , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[2]  Klaus Finkenzeller,et al.  Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.

[3]  Sudarshan S. Chawathe,et al.  Managing RFID Data , 2004, VLDB.

[4]  Bela Stantic,et al.  Correcting Stored RFID Data with Non-Monotonic Reasoning , 2007 .

[5]  Diego Klabjan,et al.  Warehousing and Analyzing Massive RFID Data Sets , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[6]  Fusheng Wang,et al.  Bridging Physical and Virtual Worlds: Complex Event Processing for RFID Data Streams , 2006, EDBT.

[7]  Prashant J. Shenoy,et al.  Efficient Data Interpretation and Compression over RFID Streams , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[8]  Ananth Grama,et al.  Redundant reader elimination in RFID systems , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[9]  Kwangjo Kim,et al.  A Secure RFID Reader Protocol based on SLRRP , 2007 .

[10]  Lin Wang,et al.  Placement of multiple RFID reader antennas to maximise portal read accuracy , 2007, Int. J. Radio Freq. Identif. Technol. Appl..

[11]  Oleksandr Mylyy RFID Data Management , Aggregation and Filtering , 2007 .