Removing Object Bouncing from Indoor Tracking Data

Radio Frequency Identification (RFID) has evolved as a primary object tracking technology over the years. A Number of real world applications such as airport passenger baggage tracking have adapted RFID as a main technological tool for tracking and monitoring. However, the data generated by the RFID tracking contains errors. Therefore, it is important to remove such errors before data is used for any business processing. The primary focus of this paper is object bouncing problem, which happens when the object with attached RFID tag is detected by two or more RFID readers simultaneously or within a short period of time. Due to the bouncing, object appears to go back and forth between several locations in very short time, which is not realistically possible. To cater bouncing problem we exploit the reachability time constraints implied by the deployed readers in an indoor space. We evaluate the proposed work using the synthetically generated RFID data. The results shows that the approach is effective and efficient.

[1]  Filippo Furfaro,et al.  Cleaning trajectory data of RFID-monitored objects through conditioning under integrity constraints , 2014, EDBT.

[2]  Herman Vermaak,et al.  Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach , 2012, Sensors.

[3]  Hua Lu,et al.  Handling False Negatives in Indoor RFID Data , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.

[4]  Beng Chin Ooi,et al.  Efficient RFID Data Imputation by Analyzing the Correlations of Monitored Objects , 2009, DASFAA.

[5]  Hua Lu,et al.  Spatiotemporal Data Cleansing for Indoor RFID Tracking Data , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.

[6]  Filippo Furfaro,et al.  Offline cleaning of RFID trajectory data , 2014, SSDBM '14.

[7]  Minos N. Garofalakis,et al.  Adaptive cleaning for RFID data streams , 2006, VLDB.

[8]  Padhraic Smyth,et al.  Modeling of multivariate time series using hidden markov models , 2005 .

[9]  Diego Klabjan,et al.  Warehousing and Analyzing Massive RFID Data Sets , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[10]  Prashant J. Shenoy,et al.  Probabilistic Inference over RFID Streams in Mobile Environments , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[11]  Bernard Menezes KReSIT RFID Data Management , 2006 .

[12]  Fusheng Wang,et al.  Temporal Management of RFID Data , 2005, VLDB.

[13]  Vladimir I. Levenshtein,et al.  Binary codes capable of correcting deletions, insertions, and reversals , 1965 .

[14]  Oleksandr Mylyy RFID Data Management , Aggregation and Filtering , 2007 .

[15]  Ying Hu,et al.  Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype , 2005, VLDB.

[16]  Sudarshan S. Chawathe,et al.  Managing RFID Data , 2004, VLDB.

[17]  Li Xiao-guang Cleaning Method of RFID Data Stream Based on Kalman Filter , 2011 .

[18]  L. Baum,et al.  Statistical Inference for Probabilistic Functions of Finite State Markov Chains , 1966 .

[19]  Haixun Wang,et al.  Leveraging spatio-temporal redundancy for RFID data cleansing , 2010, SIGMOD Conference.

[20]  Zhanhuai Li,et al.  Probabilistic Modeling of Streaming RFID Data by Using Correlated Variable-duration HMMs , 2009, 2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications.

[21]  Peter S. Fader,et al.  An Exploratory Look at Supermarket Shopping Paths , 2005 .

[22]  Andrew J. Viterbi,et al.  Error bounds for convolutional codes and an asymptotically optimum decoding algorithm , 1967, IEEE Trans. Inf. Theory.

[23]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[24]  Alex Bateman,et al.  An introduction to hidden Markov models. , 2007, Current protocols in bioinformatics.

[25]  Younès Bennani,et al.  Mining RFID Behavior Data using Unsupervised Learning , 2010, Int. J. Appl. Logist..