SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
International Journal of UbiComp (IJU), Vol.4, No.2, April 2013
DOI:10.5121/iju.2013.4202 15
A novel integrated approach for handling
anomalies in RFID data
A.Anny Leema,
PhD Scholar, Karpagam University, Coimbatore, India
annyleema@bsauniv.ac.in
Dr.Hemalatha.M,
Head of MSc. Software Systems, Karpagam University, Coimbatore, India
hema.bioinf@gmail.com
ABSTRACT:
Radio Frequency Identification (RFID) is a convenient technology employed in various applications. The
success of these RFID applications depends heavily on the quality of the data stream generated by RFID
readers. Due to various anomalies found predominantly in RFID data it limits the widespread adoption of
this technology. Our work is to eliminate the anomalies present in RFID data in an effective manner so that
it can be applied for high end applications. Our approach is a hybrid approach of middleware and
deferred because it is not always possible to remove all anomalies and redundancies in middleware. The
processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental
results show that the proposed approach performs the cleaning in an effective manner compared to the
existing approaches.
Keywords:
Issues in data cleaning, RFID data, simulation, Deferred approach
1 INTRODUCTION
The immense attractiveness of RFID technology is ability to store and read data without the
reader coming in contact with or in line of sight with the tag [3]. The RFID techniques are
appropriate for in-door object monitoring applications [2]. Transponder (tag), Interrogator
(reader) and Antenna are the three basic components of RFID. Data stored on a tag is transferred
via radio frequency link by RFID tagging which is a form of Automatic Identification and Data
Capture (AIDC) technology. By communicating with the tag, the RFID reader infers the identity
of the object to which the tag is attached. RFID has many advantages over the more familiar bar
codes which transfer data optically, like capability of accumulating huge quantities of data and
ability to read several tags concurrently, though their principles are identical [4]. It has its own
attractiveness because of no line of sight is required between the reader and the antenna [1]
RFID has penetrated into all the sectors like asset tracking, supply chain automation,
medical/Health Care applications, retail, people tracking, Warehouses, Manufacturing, Livestock
Timing and the Healthcare sector due to its increased functionality and easy-to-use capabilities.
Of these, Medical/Health care applications are of more importance because minute errors in it can
cost heavy financial and personal losses. The risk factors of human error are reduced by RFID in
International Journal of UbiComp (IJU), Vol.4, No.2, April 2013
16
the healthcare industry [6]. However, huge quantities of data [7] are created by these devices at
high production rates because of the streaming nature of RFID readings [7]. So, an important
problem with great potential benefits in the health care sectors is the warehousing and mining of
RFID data.
2 DATASET OF RFID
The format of the data recorded in the database after a tag has been read consists of three primary
pieces of information: the Electronic Product Code, the Reader Identifier and the Timestamp
which contains the reading time. The Electronic Product Code (EPC) is a unique identification
number introduced by the Auto-ID Center and given to each RFID Tag which is made up of a 96
bit, 25 character-long code containing numbers and letters. It is made up of a Header for 8 bits,
Object Class for 24 bits, EPC Manager for 28 bits and Serial Number for 36 bits. Data quality has
become increasingly important to many firms as they build data warehouses and focus more on
customer relationship management .Data quality was concerned with timelines, precision, and
accuracy.
3 ISSUES IN DATA CLEANING
RFID tags can be used to identify each individual item and enormous amounts of location-
tracking data are generated. [8] Time-dependency, dynamic changes, huge quantities and large
numbers of implicit semantics are some of the characteristics of the RFID data. Data cleaning is
necessary for improving the quality of data so that it becomes “fit for use” by users. It improves
the documentation and presentation of data by reducing the errors present in it. Auditing data for
discovering discrepancies, selecting transformations to correct these, and employing the
transformations on the dataset are the three components present in data cleaning [5].
• Lack of Completeness
– RFID readers capture only 60-70% of all tags that are in the vicinity
– Smoothing of data is done to rectify the loss of intermediate messages
• Temporal Nature of data or tag dynamics
– RFID tags are in motion and that is what makes them more difficult to handle
– But motion of a tag causes dropping of messages
4 RFID ANOMALIES
There are three types of errors in RFID data reading. They are misreads, unexpected readings and
duplicate readings. False negatives (missed readings), tags are mistakenly assumed to be absent in
the reader’s detection range; False positives, tags are mistakenly assumed to be present in the
reader’s detection range. Duplicate readings are classified into reader duplicates and data
duplicates. The former occurs when a tag is present in vicinity of more than one reader which is
simultaneously sending signals to it; the latter occurs when a reader reads a large amount of non-
difference information at a time interval. The reliability of current RFID systems is far from
optimal. Unless they are filtered and cleaned it cannot be applied for high end applications.
Therefore novel data cleaning techniques are proposed adapting to the diversity of conditions
found in a large RFID implementation and able to clean large data sets with high accuracy.
International Journal of UbiComp (IJU), Vol.4, No.2, April 2013
17
5 PROPOSED SCENARIO
We have intended our methodology for a scenario in which readers R1 to R10 are mounted
around a healthcare environment and tags are passing through the area to be scanned. Doctors,
staff nurses, infants, surgical patients, equipments and records are monitored. It is crucial that a
known environment is used in the scenario as the geographical locations of each of the readers
and their proximity to one another must be recorded in the system.
6 SIMULATIONS IN HEALTHCARE
Simulation is especially suited to the analysis of healthcare organizations due to its ability to
handle high complexity and variability which is usually inherent in this sector.[6]
Experimentation of different workflows, staffing decisions and what-if analysis are all promising
applications of simulation in healthcare.[9,10] So our work consists of three steps given below
and sample parameters are framed for all the services. For each services assumptions and set of
rules are framed.
1. The first step is to simulate the entire operation in hospital and to provide the following
services.
(i )Patient Identification & Tracking
(ii) Patient Record Maintenance
(iii)Work flow Management
(iv)Resource management
(v) Avoiding Equipment Theft
(vi) Prevent Infant Theft
(vii)Inventory management
2. The second step deals with the secure fetching and management of online tag associated
information.
3. The Third area is related to removal of errors that are present in RFID because of error
inaccuracies.
7 ARCHITECTURAL DESIGN
Raw RFID data stream is a spontaneous and very complex data to use for any analysis. The
Readers are the detection nodes and are deployed in different locations across various places in
the Hospital. Each detection node is identified by a unique ID that serves as the location ID.
Edges between the detection nodes record the history of item transitions between locations. RFID
tags in different locations are detected by these readers. The user must register the information
about the tag and reader in the database. Each tag contains an unique identifier. The information
that has to be stored in the database about the tag are Tag ID and to whom it is assigned. The
information in the tag can be accessed only by the reader. So the database also includes the details
about the reader such as Reader name and loc id(reader id). The architectural design of our
proposed work is depicted in fig:1
International Journal of UbiComp (IJU), Vol.4, No.2, April 2013
18
Fig:1 Depicts the architectural design of our proposed work
8. SOFTWARE IMPLEMENTATION
The entire project is divided into four modules. The four modules include Admin User Interface
Design, Code Logic Development, Database Management and Report Generation.
8.1 Admin User Interface Design:
Admin User Interface is the first point of interaction for anybody coming to the Hospital. It has
all the information of the patients, doctors, departments and activities of the Hospital. In the
enhanced mode this facility will be available on web. All information available here are in real
time like client registration and any enquiry about the patient status, Room Status or Doctors
availability since the data is constantly updated.
8.2. Code logic Development:
Code Logic focuses on providing the most important aspects of code analysis to allow a
developer to realize productivity gains immediately. Here we propose a new effective and
accurate data cleaning technique. We assume that there is a hidden process that determines the
true location of a tag, but we only see noisy observations of the hidden process.
8.3. Database Management:
A database is an integrated collection of data records, files, and other objects [1]. A DBMS
allows different user application programs to concurrently access the same database. DBMSs may
use a variety of database models, such as the relational model or object model, to conveniently
describe and support applications. It typically supports query languages, which are in fact.
International Journal of UbiComp (IJU), Vol.4, No.2, April 2013
19
8.4. Report Generation:
The construction of a healthcare document consists of the formatting and/or structuring of
captured information through RFID technology. It is the process of analyzing, organizing, and
presenting recorded patient information from the RFID data for authentication and inclusion in
the patient’s healthcare
9 DATA CLEANING APPROACHES
9.1 Physical approaches
The success of an RFID implementation depends largely on the extensive preparedness made on
all environmental factors at the time of planning. This includes determining area surveys,
Feasible Reader positions, RF signal coverage, Obstructions etc,. This enhances the entire RFID
environment. Focus needs to be on flawless hardware installation and seamless connectivity. It is
found that the Reader may scan the tags on an object most effectively when the Tag is positioned
at the front.
The common solution suggested to deal with RFID anomalies is to either install multiple readers
in a specific location or to attach multiple tags with same EPC code.
9.2. RFID Middleware place an important role in any RFID implementation.
RFID middleware, simply put, is a software layer residing between the RFID hardware and the
existing back-end system or application software. It extracts data from the RFID interrogators
(readers), filters it, aggregates it and routes it to enterprise applications. Middleware components
of RFID is depicted in fig:2
Fig 2. Middleware components of RFID
9.3. Deferred Approach
In deferred approach cleaning is limited after storing the data into the database and anomalies are
not cleaned properly.
10 PROPOSED APPROACH
The conventional data cleaning approach is to remove all anomalies upfront and to store only the
cleaned data in database. Such cleansing methods can potentially reduce the amount of data that
have to be managed by the application and helps to avoid repeated cleansing of the data at query
International Journal of UbiComp (IJU), Vol.4, No.2, April 2013
20
time. However, it is not always possible to remove all anomalies and redundancies beforehand.
One reason is that the rules and the business context required for cleansing may not be made
available at the data loading time. On the other hand the HRMS application defines its own set
rules and process specifications (say..on how long the tag is allowed to stay in a particular
location). Maintaining multiple cleaned versions of RFID data are prohibitive and worthless when
the rule sets defined by the application is dynamic in nature. These reasons make the physical and
middleware approach infeasible.
We propose the integrated approach of middleware and deferred depicted in fig:3. Known
anomalies whose detection and correction are handled by the RFID middleware and the
processing of other anomalies is deferred until the query time. Each application specifies its own
anomalies by defining cleansing rules.
The rules do not change the database contents directly, but are evaluated only when the
application issues queries. In this approach, although an application pays cleaning overheads, it
gains flexibility of being able to evolve as a dynamic and effective cleaning approach.
Fig: 3 Proposed Integrated Approach
11. EXPERIMENTAL RESULT
In this section, we have presented the experimental results of the proposed deferred approach.
The proposed approach is implemented in C# with SQL server 2008 as backend. The RFID
reader is modeled based on the design features of SkyeTek’s M1 Mini RFID reader. This reader
operates from a Lithium rechargeable battery which has 0.48 KJ of energy. The tag to reader data
rate is taken as 26 Kbps as per ISO 15693.
Simulation has long been used as a decision support tool in various sectors. There are several
examples of simulation studies of healthcare facilities in the literature. Simulation is especially
suited to the analysis of healthcare organizations due to its ability to handle high complexity and
variability which is usually inherent in this sector. [5] It also acts as continuous quality
improvement framework by integrating with the software agent developed via a database
structure. Experimentation of different workflows, staffing decisions and what-if analysis are all
promising applications of simulation in healthcare and it is practically infeasible in a healthcare
environment.
The entire process in hospital is simulated using RFID, then the raw RFID tag readings are
collected and low complex anomalies are cleaned in the middleware. As a final step using our
International Journal of UbiComp (IJU), Vol.4, No.2, April 2013
21
proposed algorithms the high complex anomalies like false positive and false negative are
predicted. Using human intervention final decision can be taken whether to retain the data for
future reference or cleaning can be done to avoid unnecessary values.
11.1 R-PFP- Algorithm for Prediction of False positive in RFID data
Alg PFP(Number: m, Dimensionality: k)
begin
S = Initial Seed Population of p strings;
BestSet = null;
while not(termination criterion) do begin
S = Selection(S);
S = CrossOver(S);
S = Alteration(S; loc_id,tag_id);
Update BestSet with most negative parity coefficients;
end;
O = Set of data points covered by BestSet;
return(BestSet, O); end;
11.2 Algorithm-Prediction of false positive and false negative based on
Preconditions
Status Flag 0 – not available
Status Flag1 - Available
Input: Reader R1 , Reader R2
Input: Tag 1, Tag2, Tag3……Tag n
Begin
For (every tag in reader X (X=A, B) at Time t) do
If
{
( t-1=0; t+1=0; t=1 & Precondition = 0 OR Timestamp=0);
}
Return “Wrong Data – To be eliminated”;
Else if
{
(t-1=1; t+1=1; t=0 & Precondition = 1 OR Timestamp=1);
}
Return “ False negative - To be eliminated”;
Endif
Endfor
End
11.3. Sample Coding
d1 = "select * from RFID_READING where Tag_ID='" + TagIDDropDown.SelectedValue + "' and
Loc_ID='" + TextBox1.Text + "' and Time between '" + t1 + "' and '" + t2 + "'"; cmr = new
SqlCommand(d1, con);
dgr = cmr.ExecuteReader();
if (dgr.HasRows)
{
//dg.Read();
dgr.Close();
International Journal of UbiComp (IJU), Vol.4, No.2, April 2013
22
d2 = "update RFID_READING set Status='Normal' where Tag_ID='" +
TagIDDropDown.SelectedValue + "' and Loc_ID='" + TextBox1.Text + "' and Time between '" + t1 + "'
and '" + t2 + "'";
cm8 = new SqlCommand(d2, con);
cm8.ExecuteNonQuery();
}
if (dgr.HasRows)
{
//dg.Read();
dgr.Close();
d2 = "update RFID_READING set Status='Crossover' where Tag_ID='" +
TagIDDropDown.SelectedValue + "' and Loc_ID='" + TextBox1.Text + "' and Time not between '" + t1 +
"' and '" + t2 + "'";
cm9 = new SqlCommand(d2, con);
cm9.ExecuteNonQuery();
}
dgr.Close();
11.4 Sample Output
The chart (fig:4) depicts the percentage of occurrence of false positive and fig:5 shows the percentage of
false negative in the generated RFID readings.
Fig: 4 chart depicts the percentage of false positive.
1 3 .3 3 %
4 6 .6 7 %
3 6 .3 6 %
3 0 .0 0 %
3 3 .3 3 %
2 8 .5 7 %
4 1 .6 7 %
1 7 .6 5 %
2 0 .0 0 %
3 0 .7 7 %
2 5 .0 0 %
D
1
0001
D
1
0002
D
1
0003
D
1
0004
D
1
0005
I1000
1
I1000
2
I1000
3
I1000
4
P
1000
1
P
1000
4
F a ls e P o s itiv e
International Journal of UbiComp (IJU), Vol.4, No.2, April 2013
23
Fig:5 chart depicts the percentage of false negative
12 CONCLUSION:
The effectiveness in cleaning the RFID data in healthcare sectors remains a concern, even though
a number of literary works are available. The effective data warehousing involves collecting data
without any losses. If any data is missed out, there is a possibility for the decisions taken by that
warehouse to go wrong. The cleaned data is applied for any high end applications.
In this paper first we have simulated the entire process in hospital using RFID, second we focused
on the dirty data read by the readers and performed the cleaning to deal with the anomalies false
positive and false negative.
Major barriers to RFID adoption are identified as prohibitive costs, technological limitations, and
privacy concerns. By improving perceptions, safety, reliability, user-friendliness, accessibility,
and privacy in healthcare or any organizations it is expected that the demand for RFID will grow.
Integration of middleware and deferred approach gains the flexibility of being able to evolve as a
dynamic and effective cleaning approach. Finally, solutions are validated with a common RFID
application and demonstrated the advantages of the proposed approach through extensive
simulations. Our proposed algorithm implemented using C# and tested in the healthcare
environment to increase the operational efficiency and to improve the patient safety.
In future the existing system is easily enhanced to launch in online so that the public is benefited
based on the requirements.
13 REFERENCES
[1] Barjesh Kochar, Rajender Chhillar. 2012. An Effective Data Warehousing System for RFID Using
Novel Data Cleaning, Data Transformation and Loading Techniques. The International Arab Journal
of Information Technology.9(3):208-216.
[2] Tseng, Vincent S., Lu, Hsueh-Chan, Tsai, Chia-Ming, Wang and Chun-Hung, ”A Hybrid Data
Mining Approach for Analysis of Patient Behaviors in RFID Environments”, 2008.
[3]. H. Gonzalez, J. Han, X. Li and D. Klabjan, “Warehousing and Analysis of Massive RFID Data Sets”,
In Proceedings of 2006 Int. Conf. Data Engineering (ICDE’06), Atlanta, Georgia, April 2006.
[4]. Angela M. Wicks, John K. Visich and Suhong Li, "Radio Frequency Identification Applications in
Hospital Environments", heldref publication, Vol. 84, No.3, pp.3-9, 2006.
International Journal of UbiComp (IJU), Vol.4, No.2, April 2013
24
[5]. Vijayshankar Raman and Joseph M. Hellerstein, "Potter’sWheel: An Interactive Data Cleaning
System", In Proceedings of the 27th International Conference on Very Large Data Bases, pp.381 -
390, 2001.
[6]. S. Shepard, “RFID Radio Frequency Identification”, The McGraw-Hall Companies, Inc. USA, 2005.
[7] Bettina Fazzinga, Sergio Flesca, Elio Masciari and Filippo Furfaro, "Efficient and effective RFID
data warehousing", In proceedings of the 2009 International Database Engineering & Applications
Symposium,pp. 251-258 , 2009.
[8]. Hector Gonzalez, Jiawei Han, Hong Cheng, Xiaolei Li, Diego Klabjan, Tianyi Wu, "Modeling
Massive RFID Data Sets: A Gateway-Based Movement Graph Approach," IEEE Transactions on
Knowledge and Data Engineering, vol. 22, no. 1, pp. 90-104, Jan. 2010.
[9] Anny Leema, A. and M. Hemalatha, 2011.Optimizing operational efficiency and enhancing data
reliability using effective and adaptive cleaning approach for RFID in healthcare. International
Journal of Computer Applications.3(7):26-29.
[10] Anny Leema and M.Hemalatha, 2011. An effective and adaptive data cleaning technique for colossal
RFID data sets in healthcare. WSEAS transactions on Information Science and Applications .8(6) :
243-252. SCOPUS indexed

Weitere ähnliche Inhalte

Was ist angesagt?

A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 
IRJET- Intelligent Student Tracking and Monitoring for College Infrastruc...
IRJET-  	  Intelligent Student Tracking and Monitoring for College Infrastruc...IRJET-  	  Intelligent Student Tracking and Monitoring for College Infrastruc...
IRJET- Intelligent Student Tracking and Monitoring for College Infrastruc...IRJET Journal
 
IRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFIDIRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFIDIRJET Journal
 
Empirical study of an automated inventory management system with bayesian inf...
Empirical study of an automated inventory management system with bayesian inf...Empirical study of an automated inventory management system with bayesian inf...
Empirical study of an automated inventory management system with bayesian inf...eSAT Journals
 
Intelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIntelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIAEME Publication
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance systemeskkarthik
 
Ensuring Integrity for Medical Tissues and Devices
Ensuring Integrity for Medical Tissues and DevicesEnsuring Integrity for Medical Tissues and Devices
Ensuring Integrity for Medical Tissues and DevicesTerso Solutions
 
Data enrichment
Data enrichmentData enrichment
Data enrichmentFabMinds
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...IRJET Journal
 
Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Abhijit Mukherji
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance SystemAtiq Shaikh
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutionsashtopustech
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using BlockchainIRJET Journal
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET Journal
 

Was ist angesagt? (19)

A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
IRJET- Intelligent Student Tracking and Monitoring for College Infrastruc...
IRJET-  	  Intelligent Student Tracking and Monitoring for College Infrastruc...IRJET-  	  Intelligent Student Tracking and Monitoring for College Infrastruc...
IRJET- Intelligent Student Tracking and Monitoring for College Infrastruc...
 
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAINPATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
 
IRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFIDIRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFID
 
Empirical study of an automated inventory management system with bayesian inf...
Empirical study of an automated inventory management system with bayesian inf...Empirical study of an automated inventory management system with bayesian inf...
Empirical study of an automated inventory management system with bayesian inf...
 
Intelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIntelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbee
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance system
 
Ensuring Integrity for Medical Tissues and Devices
Ensuring Integrity for Medical Tissues and DevicesEnsuring Integrity for Medical Tissues and Devices
Ensuring Integrity for Medical Tissues and Devices
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
 
Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance System
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
 

Ähnlich wie A novel integrated approach for handling anomalies in RFID data

IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET Journal
 
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxBuilding a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxhartrobert670
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 
3 supply chain management
3 supply chain management3 supply chain management
3 supply chain managementcindyrevi
 
RFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauRFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauHIMSS
 
IRJET-Intelligent Medicine box for disabled peoples
IRJET-Intelligent Medicine box for disabled peoplesIRJET-Intelligent Medicine box for disabled peoples
IRJET-Intelligent Medicine box for disabled peoplesIRJET Journal
 
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...IRJET Journal
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overviewijtsrd
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
A Comparison Survey Study On RFID Based Anti-Counterfeiting Systems
A Comparison Survey Study On RFID Based Anti-Counterfeiting SystemsA Comparison Survey Study On RFID Based Anti-Counterfeiting Systems
A Comparison Survey Study On RFID Based Anti-Counterfeiting SystemsKim Daniels
 
Applications of rfid
Applications of rfidApplications of rfid
Applications of rfidMandar Jagtap
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...IRJET Journal
 
RFID in retail sector
RFID in retail sectorRFID in retail sector
RFID in retail sectorsedadoc
 

Ähnlich wie A novel integrated approach for handling anomalies in RFID data (20)

IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
 
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxBuilding a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
3 supply chain management
3 supply chain management3 supply chain management
3 supply chain management
 
RFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauRFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim Bloedau
 
IRJET-Intelligent Medicine box for disabled peoples
IRJET-Intelligent Medicine box for disabled peoplesIRJET-Intelligent Medicine box for disabled peoples
IRJET-Intelligent Medicine box for disabled peoples
 
Bpr at the hospital
Bpr at the hospitalBpr at the hospital
Bpr at the hospital
 
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overview
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
A Comparison Survey Study On RFID Based Anti-Counterfeiting Systems
A Comparison Survey Study On RFID Based Anti-Counterfeiting SystemsA Comparison Survey Study On RFID Based Anti-Counterfeiting Systems
A Comparison Survey Study On RFID Based Anti-Counterfeiting Systems
 
Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
 
Rfid privacy1.1
Rfid privacy1.1Rfid privacy1.1
Rfid privacy1.1
 
A04620109
A04620109A04620109
A04620109
 
RFID in retail sector
RFID in retail sectorRFID in retail sector
RFID in retail sector
 

Mehr von ijujournal

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfijujournal
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSijujournal
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataijujournal
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESijujournal
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEijujournal
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)ijujournal
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...ijujournal
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Miningijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)ijujournal
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...ijujournal
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSijujournal
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 

Mehr von ijujournal (20)

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdf
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 

Kürzlich hochgeladen

Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 

Kürzlich hochgeladen (20)

Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 

A novel integrated approach for handling anomalies in RFID data

  • 1. International Journal of UbiComp (IJU), Vol.4, No.2, April 2013 DOI:10.5121/iju.2013.4202 15 A novel integrated approach for handling anomalies in RFID data A.Anny Leema, PhD Scholar, Karpagam University, Coimbatore, India annyleema@bsauniv.ac.in Dr.Hemalatha.M, Head of MSc. Software Systems, Karpagam University, Coimbatore, India hema.bioinf@gmail.com ABSTRACT: Radio Frequency Identification (RFID) is a convenient technology employed in various applications. The success of these RFID applications depends heavily on the quality of the data stream generated by RFID readers. Due to various anomalies found predominantly in RFID data it limits the widespread adoption of this technology. Our work is to eliminate the anomalies present in RFID data in an effective manner so that it can be applied for high end applications. Our approach is a hybrid approach of middleware and deferred because it is not always possible to remove all anomalies and redundancies in middleware. The processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental results show that the proposed approach performs the cleaning in an effective manner compared to the existing approaches. Keywords: Issues in data cleaning, RFID data, simulation, Deferred approach 1 INTRODUCTION The immense attractiveness of RFID technology is ability to store and read data without the reader coming in contact with or in line of sight with the tag [3]. The RFID techniques are appropriate for in-door object monitoring applications [2]. Transponder (tag), Interrogator (reader) and Antenna are the three basic components of RFID. Data stored on a tag is transferred via radio frequency link by RFID tagging which is a form of Automatic Identification and Data Capture (AIDC) technology. By communicating with the tag, the RFID reader infers the identity of the object to which the tag is attached. RFID has many advantages over the more familiar bar codes which transfer data optically, like capability of accumulating huge quantities of data and ability to read several tags concurrently, though their principles are identical [4]. It has its own attractiveness because of no line of sight is required between the reader and the antenna [1] RFID has penetrated into all the sectors like asset tracking, supply chain automation, medical/Health Care applications, retail, people tracking, Warehouses, Manufacturing, Livestock Timing and the Healthcare sector due to its increased functionality and easy-to-use capabilities. Of these, Medical/Health care applications are of more importance because minute errors in it can cost heavy financial and personal losses. The risk factors of human error are reduced by RFID in
  • 2. International Journal of UbiComp (IJU), Vol.4, No.2, April 2013 16 the healthcare industry [6]. However, huge quantities of data [7] are created by these devices at high production rates because of the streaming nature of RFID readings [7]. So, an important problem with great potential benefits in the health care sectors is the warehousing and mining of RFID data. 2 DATASET OF RFID The format of the data recorded in the database after a tag has been read consists of three primary pieces of information: the Electronic Product Code, the Reader Identifier and the Timestamp which contains the reading time. The Electronic Product Code (EPC) is a unique identification number introduced by the Auto-ID Center and given to each RFID Tag which is made up of a 96 bit, 25 character-long code containing numbers and letters. It is made up of a Header for 8 bits, Object Class for 24 bits, EPC Manager for 28 bits and Serial Number for 36 bits. Data quality has become increasingly important to many firms as they build data warehouses and focus more on customer relationship management .Data quality was concerned with timelines, precision, and accuracy. 3 ISSUES IN DATA CLEANING RFID tags can be used to identify each individual item and enormous amounts of location- tracking data are generated. [8] Time-dependency, dynamic changes, huge quantities and large numbers of implicit semantics are some of the characteristics of the RFID data. Data cleaning is necessary for improving the quality of data so that it becomes “fit for use” by users. It improves the documentation and presentation of data by reducing the errors present in it. Auditing data for discovering discrepancies, selecting transformations to correct these, and employing the transformations on the dataset are the three components present in data cleaning [5]. • Lack of Completeness – RFID readers capture only 60-70% of all tags that are in the vicinity – Smoothing of data is done to rectify the loss of intermediate messages • Temporal Nature of data or tag dynamics – RFID tags are in motion and that is what makes them more difficult to handle – But motion of a tag causes dropping of messages 4 RFID ANOMALIES There are three types of errors in RFID data reading. They are misreads, unexpected readings and duplicate readings. False negatives (missed readings), tags are mistakenly assumed to be absent in the reader’s detection range; False positives, tags are mistakenly assumed to be present in the reader’s detection range. Duplicate readings are classified into reader duplicates and data duplicates. The former occurs when a tag is present in vicinity of more than one reader which is simultaneously sending signals to it; the latter occurs when a reader reads a large amount of non- difference information at a time interval. The reliability of current RFID systems is far from optimal. Unless they are filtered and cleaned it cannot be applied for high end applications. Therefore novel data cleaning techniques are proposed adapting to the diversity of conditions found in a large RFID implementation and able to clean large data sets with high accuracy.
  • 3. International Journal of UbiComp (IJU), Vol.4, No.2, April 2013 17 5 PROPOSED SCENARIO We have intended our methodology for a scenario in which readers R1 to R10 are mounted around a healthcare environment and tags are passing through the area to be scanned. Doctors, staff nurses, infants, surgical patients, equipments and records are monitored. It is crucial that a known environment is used in the scenario as the geographical locations of each of the readers and their proximity to one another must be recorded in the system. 6 SIMULATIONS IN HEALTHCARE Simulation is especially suited to the analysis of healthcare organizations due to its ability to handle high complexity and variability which is usually inherent in this sector.[6] Experimentation of different workflows, staffing decisions and what-if analysis are all promising applications of simulation in healthcare.[9,10] So our work consists of three steps given below and sample parameters are framed for all the services. For each services assumptions and set of rules are framed. 1. The first step is to simulate the entire operation in hospital and to provide the following services. (i )Patient Identification & Tracking (ii) Patient Record Maintenance (iii)Work flow Management (iv)Resource management (v) Avoiding Equipment Theft (vi) Prevent Infant Theft (vii)Inventory management 2. The second step deals with the secure fetching and management of online tag associated information. 3. The Third area is related to removal of errors that are present in RFID because of error inaccuracies. 7 ARCHITECTURAL DESIGN Raw RFID data stream is a spontaneous and very complex data to use for any analysis. The Readers are the detection nodes and are deployed in different locations across various places in the Hospital. Each detection node is identified by a unique ID that serves as the location ID. Edges between the detection nodes record the history of item transitions between locations. RFID tags in different locations are detected by these readers. The user must register the information about the tag and reader in the database. Each tag contains an unique identifier. The information that has to be stored in the database about the tag are Tag ID and to whom it is assigned. The information in the tag can be accessed only by the reader. So the database also includes the details about the reader such as Reader name and loc id(reader id). The architectural design of our proposed work is depicted in fig:1
  • 4. International Journal of UbiComp (IJU), Vol.4, No.2, April 2013 18 Fig:1 Depicts the architectural design of our proposed work 8. SOFTWARE IMPLEMENTATION The entire project is divided into four modules. The four modules include Admin User Interface Design, Code Logic Development, Database Management and Report Generation. 8.1 Admin User Interface Design: Admin User Interface is the first point of interaction for anybody coming to the Hospital. It has all the information of the patients, doctors, departments and activities of the Hospital. In the enhanced mode this facility will be available on web. All information available here are in real time like client registration and any enquiry about the patient status, Room Status or Doctors availability since the data is constantly updated. 8.2. Code logic Development: Code Logic focuses on providing the most important aspects of code analysis to allow a developer to realize productivity gains immediately. Here we propose a new effective and accurate data cleaning technique. We assume that there is a hidden process that determines the true location of a tag, but we only see noisy observations of the hidden process. 8.3. Database Management: A database is an integrated collection of data records, files, and other objects [1]. A DBMS allows different user application programs to concurrently access the same database. DBMSs may use a variety of database models, such as the relational model or object model, to conveniently describe and support applications. It typically supports query languages, which are in fact.
  • 5. International Journal of UbiComp (IJU), Vol.4, No.2, April 2013 19 8.4. Report Generation: The construction of a healthcare document consists of the formatting and/or structuring of captured information through RFID technology. It is the process of analyzing, organizing, and presenting recorded patient information from the RFID data for authentication and inclusion in the patient’s healthcare 9 DATA CLEANING APPROACHES 9.1 Physical approaches The success of an RFID implementation depends largely on the extensive preparedness made on all environmental factors at the time of planning. This includes determining area surveys, Feasible Reader positions, RF signal coverage, Obstructions etc,. This enhances the entire RFID environment. Focus needs to be on flawless hardware installation and seamless connectivity. It is found that the Reader may scan the tags on an object most effectively when the Tag is positioned at the front. The common solution suggested to deal with RFID anomalies is to either install multiple readers in a specific location or to attach multiple tags with same EPC code. 9.2. RFID Middleware place an important role in any RFID implementation. RFID middleware, simply put, is a software layer residing between the RFID hardware and the existing back-end system or application software. It extracts data from the RFID interrogators (readers), filters it, aggregates it and routes it to enterprise applications. Middleware components of RFID is depicted in fig:2 Fig 2. Middleware components of RFID 9.3. Deferred Approach In deferred approach cleaning is limited after storing the data into the database and anomalies are not cleaned properly. 10 PROPOSED APPROACH The conventional data cleaning approach is to remove all anomalies upfront and to store only the cleaned data in database. Such cleansing methods can potentially reduce the amount of data that have to be managed by the application and helps to avoid repeated cleansing of the data at query
  • 6. International Journal of UbiComp (IJU), Vol.4, No.2, April 2013 20 time. However, it is not always possible to remove all anomalies and redundancies beforehand. One reason is that the rules and the business context required for cleansing may not be made available at the data loading time. On the other hand the HRMS application defines its own set rules and process specifications (say..on how long the tag is allowed to stay in a particular location). Maintaining multiple cleaned versions of RFID data are prohibitive and worthless when the rule sets defined by the application is dynamic in nature. These reasons make the physical and middleware approach infeasible. We propose the integrated approach of middleware and deferred depicted in fig:3. Known anomalies whose detection and correction are handled by the RFID middleware and the processing of other anomalies is deferred until the query time. Each application specifies its own anomalies by defining cleansing rules. The rules do not change the database contents directly, but are evaluated only when the application issues queries. In this approach, although an application pays cleaning overheads, it gains flexibility of being able to evolve as a dynamic and effective cleaning approach. Fig: 3 Proposed Integrated Approach 11. EXPERIMENTAL RESULT In this section, we have presented the experimental results of the proposed deferred approach. The proposed approach is implemented in C# with SQL server 2008 as backend. The RFID reader is modeled based on the design features of SkyeTek’s M1 Mini RFID reader. This reader operates from a Lithium rechargeable battery which has 0.48 KJ of energy. The tag to reader data rate is taken as 26 Kbps as per ISO 15693. Simulation has long been used as a decision support tool in various sectors. There are several examples of simulation studies of healthcare facilities in the literature. Simulation is especially suited to the analysis of healthcare organizations due to its ability to handle high complexity and variability which is usually inherent in this sector. [5] It also acts as continuous quality improvement framework by integrating with the software agent developed via a database structure. Experimentation of different workflows, staffing decisions and what-if analysis are all promising applications of simulation in healthcare and it is practically infeasible in a healthcare environment. The entire process in hospital is simulated using RFID, then the raw RFID tag readings are collected and low complex anomalies are cleaned in the middleware. As a final step using our
  • 7. International Journal of UbiComp (IJU), Vol.4, No.2, April 2013 21 proposed algorithms the high complex anomalies like false positive and false negative are predicted. Using human intervention final decision can be taken whether to retain the data for future reference or cleaning can be done to avoid unnecessary values. 11.1 R-PFP- Algorithm for Prediction of False positive in RFID data Alg PFP(Number: m, Dimensionality: k) begin S = Initial Seed Population of p strings; BestSet = null; while not(termination criterion) do begin S = Selection(S); S = CrossOver(S); S = Alteration(S; loc_id,tag_id); Update BestSet with most negative parity coefficients; end; O = Set of data points covered by BestSet; return(BestSet, O); end; 11.2 Algorithm-Prediction of false positive and false negative based on Preconditions Status Flag 0 – not available Status Flag1 - Available Input: Reader R1 , Reader R2 Input: Tag 1, Tag2, Tag3……Tag n Begin For (every tag in reader X (X=A, B) at Time t) do If { ( t-1=0; t+1=0; t=1 & Precondition = 0 OR Timestamp=0); } Return “Wrong Data – To be eliminated”; Else if { (t-1=1; t+1=1; t=0 & Precondition = 1 OR Timestamp=1); } Return “ False negative - To be eliminated”; Endif Endfor End 11.3. Sample Coding d1 = "select * from RFID_READING where Tag_ID='" + TagIDDropDown.SelectedValue + "' and Loc_ID='" + TextBox1.Text + "' and Time between '" + t1 + "' and '" + t2 + "'"; cmr = new SqlCommand(d1, con); dgr = cmr.ExecuteReader(); if (dgr.HasRows) { //dg.Read(); dgr.Close();
  • 8. International Journal of UbiComp (IJU), Vol.4, No.2, April 2013 22 d2 = "update RFID_READING set Status='Normal' where Tag_ID='" + TagIDDropDown.SelectedValue + "' and Loc_ID='" + TextBox1.Text + "' and Time between '" + t1 + "' and '" + t2 + "'"; cm8 = new SqlCommand(d2, con); cm8.ExecuteNonQuery(); } if (dgr.HasRows) { //dg.Read(); dgr.Close(); d2 = "update RFID_READING set Status='Crossover' where Tag_ID='" + TagIDDropDown.SelectedValue + "' and Loc_ID='" + TextBox1.Text + "' and Time not between '" + t1 + "' and '" + t2 + "'"; cm9 = new SqlCommand(d2, con); cm9.ExecuteNonQuery(); } dgr.Close(); 11.4 Sample Output The chart (fig:4) depicts the percentage of occurrence of false positive and fig:5 shows the percentage of false negative in the generated RFID readings. Fig: 4 chart depicts the percentage of false positive. 1 3 .3 3 % 4 6 .6 7 % 3 6 .3 6 % 3 0 .0 0 % 3 3 .3 3 % 2 8 .5 7 % 4 1 .6 7 % 1 7 .6 5 % 2 0 .0 0 % 3 0 .7 7 % 2 5 .0 0 % D 1 0001 D 1 0002 D 1 0003 D 1 0004 D 1 0005 I1000 1 I1000 2 I1000 3 I1000 4 P 1000 1 P 1000 4 F a ls e P o s itiv e
  • 9. International Journal of UbiComp (IJU), Vol.4, No.2, April 2013 23 Fig:5 chart depicts the percentage of false negative 12 CONCLUSION: The effectiveness in cleaning the RFID data in healthcare sectors remains a concern, even though a number of literary works are available. The effective data warehousing involves collecting data without any losses. If any data is missed out, there is a possibility for the decisions taken by that warehouse to go wrong. The cleaned data is applied for any high end applications. In this paper first we have simulated the entire process in hospital using RFID, second we focused on the dirty data read by the readers and performed the cleaning to deal with the anomalies false positive and false negative. Major barriers to RFID adoption are identified as prohibitive costs, technological limitations, and privacy concerns. By improving perceptions, safety, reliability, user-friendliness, accessibility, and privacy in healthcare or any organizations it is expected that the demand for RFID will grow. Integration of middleware and deferred approach gains the flexibility of being able to evolve as a dynamic and effective cleaning approach. Finally, solutions are validated with a common RFID application and demonstrated the advantages of the proposed approach through extensive simulations. Our proposed algorithm implemented using C# and tested in the healthcare environment to increase the operational efficiency and to improve the patient safety. In future the existing system is easily enhanced to launch in online so that the public is benefited based on the requirements. 13 REFERENCES [1] Barjesh Kochar, Rajender Chhillar. 2012. An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques. The International Arab Journal of Information Technology.9(3):208-216. [2] Tseng, Vincent S., Lu, Hsueh-Chan, Tsai, Chia-Ming, Wang and Chun-Hung, ”A Hybrid Data Mining Approach for Analysis of Patient Behaviors in RFID Environments”, 2008. [3]. H. Gonzalez, J. Han, X. Li and D. Klabjan, “Warehousing and Analysis of Massive RFID Data Sets”, In Proceedings of 2006 Int. Conf. Data Engineering (ICDE’06), Atlanta, Georgia, April 2006. [4]. Angela M. Wicks, John K. Visich and Suhong Li, "Radio Frequency Identification Applications in Hospital Environments", heldref publication, Vol. 84, No.3, pp.3-9, 2006.
  • 10. International Journal of UbiComp (IJU), Vol.4, No.2, April 2013 24 [5]. Vijayshankar Raman and Joseph M. Hellerstein, "Potter’sWheel: An Interactive Data Cleaning System", In Proceedings of the 27th International Conference on Very Large Data Bases, pp.381 - 390, 2001. [6]. S. Shepard, “RFID Radio Frequency Identification”, The McGraw-Hall Companies, Inc. USA, 2005. [7] Bettina Fazzinga, Sergio Flesca, Elio Masciari and Filippo Furfaro, "Efficient and effective RFID data warehousing", In proceedings of the 2009 International Database Engineering & Applications Symposium,pp. 251-258 , 2009. [8]. Hector Gonzalez, Jiawei Han, Hong Cheng, Xiaolei Li, Diego Klabjan, Tianyi Wu, "Modeling Massive RFID Data Sets: A Gateway-Based Movement Graph Approach," IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 1, pp. 90-104, Jan. 2010. [9] Anny Leema, A. and M. Hemalatha, 2011.Optimizing operational efficiency and enhancing data reliability using effective and adaptive cleaning approach for RFID in healthcare. International Journal of Computer Applications.3(7):26-29. [10] Anny Leema and M.Hemalatha, 2011. An effective and adaptive data cleaning technique for colossal RFID data sets in healthcare. WSEAS transactions on Information Science and Applications .8(6) : 243-252. SCOPUS indexed