期刊文献+

RFID数据清洗技术研究进展 被引量:1

Research Progress of RFID Data Cleaning Technology
下载PDF
导出
摘要 无线射频识别(RFID)技术是一种自动识别方法,它依赖于称为RFID标签的无线电转发器快速存储和检索数据。由于RFID标签与读写器通信时无需直接接触,这样为短时间内采集大量的数据提供了可能。但是,采集到的数据也产生了诸如漏读、多读、冗余、乱序等问题,如何在短时间内高效地清洗产生的大规模RFID数据成为数据库领域的重要研究课题。对现有的RFID数据清洗技术进行了综述。首先,给出了RFID系统与RFID数据清洗问题的有关定义与描述,列出了典型的数据集与评价标准,从相关技术的分类、子类、基本思想、优势、局限、适用场景等方面详细比较和总结了现有的RFID数据清洗工作,同时对相关应用系统进行比较分析。然后,针对漏读数据清洗、多读数据清洗、冗余数据清洗、乱序数据处理等关键问题,对已有的研究进行了详细的比较和总结。最后,从RFID原始数据与基准数据集构建、加密与隐私保护数据的清洗策略、数据采集准确率、清洗结果的时效性、场景自学习等方面提出了RFID数据清洗领域未来五个值得关注的研究方向。 Radio frequency identification(RFID)technology is an automatic identification method,which relies on the use of radio repeaters called RFID tags to quickly store and retrieve data.Because RFID tags do not need linear contact when communicating with readers,it is possible to collect a large amount of data in a short time.However,the collected data also produce problems such as false negative readings,false positive readings,duplicated readings,out-of-order readings and so on.In this case,how to efficiently clean the large-scale RFID data in short time has become an important research topic in the field of database.This paper mainly summarizes the existing RFID data cleaning technology.Firstly,the relevant definitions and descriptions of RFID system and RFID data cleaning problem are given,and typical datasets and evaluation criteria are listed.Then the existing RFID data cleaning work is compared and summarized in detail from the classification,subcategory,basic idea,advantages,limitations,application scenarios and other aspects of related technologies.At the same time,the relevant application systems are compared and analyzed.Then,for the key problems of the false negative reading,false positive reading,duplicated reading and out-of-order reading,the existing studies are compared and summarized in detail.Finally,this paper proposes next five research directions worthy of paying attention to in the field of RFID data cleaning,such as the construction of RFID original data and benchmark dataset,the cleaning strategy of encryption and privacy protection data,the accuracy of data collection,the timeliness of cleaning results,and scene self-learning.
作者 王健 乐嘉锦 WANG Jian;LE Jiajin(School of Computer and Information Engineering,Henan University of Economics and Law,Zhengzhou 450046,China;School of Computer Science and Technology,Donghua University,Shanghai 201620,China)
出处 《计算机科学与探索》 CSCD 北大核心 2022年第12期2678-2694,共17页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金(61702161) 河南省科技厅科技攻关项目(222102210289,212102210386)。
关键词 无线射频识别(RFID) 数据清洗 漏读数据 多读数据 冗余数据 乱序数据 系统应用 radio frequency identification(RFID) data cleaning false negative reading false positive reading duplicated reading out-of-order reading system application
  • 相关文献

参考文献10

二级参考文献70

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:673
  • 2谷峪,于戈,张天成.RFID复杂事件处理技术[J].计算机科学与探索,2007,1(3):255-267. 被引量:54
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 4曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 5Jeffrey SR,Alonso G,Franklin MJ,Hong W,Widom J.A pipelined framework for on line cleaning of sensor data streams.In:Liu L,Reuter A,et al.,eds.Proc.of the 22nd Int'l Conf.on Data Engineering.Atlanta:IEEE Computer Society,2006.140-142.
  • 6Jeffery SR,Garofalakis M,Franklin MJ.Adaptive cleaning for RFID data streams.In:Dayal U,Whang KY,et al.,eds.Proc.of the 32nd Int'l Conf.on Very Large Data Bases.Seoul:ACM,2006.163-174.
  • 7Bai Y,Wang FS,Liu PY.Efficiently filtering RFID data streams.In:Proc.of the 1st Int'l VLDB Workshop on Clean Databases.Seoul:Morgan Kaufmann Publishers,2006.50-57.http://pike.psu.edu/cleandb06/papers/CameraReady_102.pdf.
  • 8Gonzalez H,Han J,Shen X.Cost-Conscious cleaning of massive RFID data sets.In:Proc.of the 23rd Int'l Conf.on Data Engineering.Istanbul:IEEE Computer Society,2007.1268-1272.http://www.cs.uiuc.edu/~hanj/pdf/icde07_hagonzal.pdf.
  • 9Khoussainova N,Balazinska M,Suciu D.Towards correcting input data errors probabilistically using integrity constraints.In:Chrysanthis RK,Jensen CS,et al.,eds.Proc.of the 5th ACM Int'l Workshop on Data Engineering for Wireless and Mobile Access.Chicago:ACM,2006.43-50.
  • 10Bornhovd C,Lin T,Haller S,Schaper J.Integrating automatic data acquisition with business processes experiences with SAP's auto-ID infrastructure.In:Nascimento MA,Ozsu MT,et al.,eds.Proc.Of the 30th Int'l Conf.On Very Large Data Bases.Toronto:Morgan Kaufmann Publishers,2004.1182-1188.

共引文献230

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部