Filters








1,389 Hits in 7.1 sec

An improved SMURF scheme for cleaning RFID data

Daniele Sgandurra, Peng Li, Ruchuan Wang, He Xu, Jie Ding
2018 International Journal of Grid and Utility Computing  
RFID technology enables the reading over a long distance, provides high storage capacity and is widely used in the Internet of Things environmental supply chain management for object tracking and tracing  ...  The traditional statistical smoothing for unreliable RFID data (SMURF) algorithm dynamically adjusts the size of window according to tags' average reading rate of sliding window during the process of data  ...  This paper is supported by the National Natural Science Foundation of P. R. China  ... 
doi:10.1504/ijguc.2018.10012797 fatcat:jtavfoy2hbdyhjpkxde3r37244

Fusing RFID and computer vision for probabilistic tag localization

Michael Goller, Christoph Feichtenhofer, Axel Pinz
2014 2014 IEEE International Conference on RFID (IEEE RFID)  
In addition, we introduce a robust data association method which is crucial for the application in practical scenarios.  ...  In this paper, we present a hybrid RFID and computer vision system for localization and tracking of RFID tags.  ...  The experimental evaluation in a practical EAS scenario showed that the presented approach provides a robust system performance with respect to the detection of stolen articles and the suppression of false  ... 
doi:10.1109/rfid.2014.6810717 dblp:conf/rfid/GollerFP14 fatcat:5zxycktpbnbyvnytve4bjq47ye

Algorithm for an indoor automatic vehicular system based on active RFIDs

G.L. Gragnani, S. Bergamaschi, C. Montecucco
2017 ICT Express  
The algorithm aims to minimize shifts and loads of heavy vehicles in order to reduce production times and costs.  ...  Results are encouraging and the system is particularly adaptable to different scenarios.  ...  Due to the characteristics of the working environment, it is possible to have false readings of RFID tags and cases in which the tags are not read even if they are correctly transmitting a signal.  ... 
doi:10.1016/j.icte.2017.11.012 fatcat:76dzslvbsbhuvle5iok27gl6aq

A novel integrated approach for handling anomalies in RFID data

A.Anny Leema, Hemalatha M
2013 International Journal of UbiComp  
Radio Frequency Identification (RFID) is a convenient technology employed in various applications.  ...  The processing of other anomalies is deferred until the query time and cleaned by business rules.  ...  False negatives (missed readings), tags are mistakenly assumed to be absent in the reader's detection range; False positives, tags are mistakenly assumed to be present in the reader's detection range.  ... 
doi:10.5121/iju.2013.4202 fatcat:t3odkbasjbc55cp5xa5p7j4nfu

Integrating Automatic Data Acquisition with Business Processes Experiences with SAP's Auto-ID Infrastructure [chapter]

C BORNHOVD, T LIN, S HALLER, J SCHAPER
2004 Proceedings 2004 VLDB Conference  
Through automatic and real-time data acquisition, these technologies can benefit a great variety of industries by improving the efficiency of their operations.  ...  Smart item technologies, like RFID and sensor networks, are considered to be the next big step in business process automation [1] .  ...  We also benefited from fruitful discussions with other colleagues in SAP including Bernd Sieren, Bernd Lauterbach, Christoph Lessmoellmann, Ami Heitner, Alexander Renz, and Kai Morisse.  ... 
doi:10.1016/b978-012088469-8/50103-0 fatcat:rkdazaa2u5eullhwifuo6kgisu

Integrating Automatic Data Acquisition with Business Processes Experiences with SAP's Auto-ID Infrastructure [chapter]

Christof Bornhövd, Tao Lin, Stephan Haller, Joachim Schaper
2004 Proceedings 2004 VLDB Conference  
Through automatic and real-time data acquisition, these technologies can benefit a great variety of industries by improving the efficiency of their operations.  ...  Smart item technologies, like RFID and sensor networks, are considered to be the next big step in business process automation [1] .  ...  We also benefited from fruitful discussions with other colleagues in SAP including Bernd Sieren, Bernd Lauterbach, Christoph Lessmoellmann, Ami Heitner, Alexander Renz, and Kai Morisse.  ... 
doi:10.1016/b978-012088469-8.50103-0 dblp:conf/vldb/BornhovdLHS04 fatcat:docsiz6vv5bq5kyn7cqlt3slhq

Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

Libe Valentine Massawe, Johnson D. M. Kinyua, Herman Vermaak
2012 Sensors  
RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis  ...  In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics.  ...  Acknowledgments This research is supported in part by research grants from German Academic Exchange Service DAAD, South Africa NRF, CUT and UDSM under Project-ECSE-(C1A:1.1).  ... 
doi:10.3390/s120404187 pmid:22666027 pmcid:PMC3355407 fatcat:dd2f66kjyvfbtbez2ynlo7n4se

Reliable Identification Schemes for Asset and Production Tracking in Industry 4.0

Attila Frankó, Gergely Vida, Pal Varga
2020 Sensors  
Revolutionizing logistics and supply chain management in smart manufacturing is one of the main goals of the Industry 4.0 movement.  ...  Tracking various assets within shop-floors and the warehouse is a focal point of asset management; its aim is to enhance the efficiency of logistical tasks.  ...  in real-time.  ... 
doi:10.3390/s20133709 pmid:32630771 pmcid:PMC7374395 fatcat:nxayq5yb7rdqzhjevlh5zrztya

A Review on Complex Event Processing in RFID System

Siti Salwani Yaacob, Hairulnizam Mahdin, RD Rohmat Saedudin, Mohd Hanafi Ahmad Hijazi, Mohd Sanusi Azmi, Nor Azlina Rais
2018 International Journal on Advanced Science, Engineering and Information Technology  
Based on the critical analysis of prior techniques and solutions, therefore, we further the research and propose a solution for a new type of event processing engine especially in RFID for future reference  ...  A variety of traditional to the most current techniques was disclosed with some features, which are rarely considered in typical CEP problems.  ...  Besides the improvement of the precision of RFID readers, there are still void readings such as missed readings and false negative readings [18] .  ... 
doi:10.18517/ijaseit.8.4.5183 fatcat:wwjhx7njxbffxccdic6etwgdpq

A highly accurate and scalable approach for addressing location uncertainty in asset tracking applications

Rengamathi Sankarkumar, Damith C. Ranasinghe, Thuraiappah Sathyan
2014 2014 IEEE International Conference on RFID (IEEE RFID)  
The results of a detailed simulation study shows that our object compression technique yields high location accuracy (above 98% at 0.95 read rate) with significant reductions in execution time and memory  ...  Tracking systems that use RFID are increasingly being used for monitoring the movement of goods in supply chains.  ...  Missed reads refer to objects that exist in a readable area, but may not have their tag detected by readers due to environmental factors such as interference, noise, malfunction of RFID components and  ... 
doi:10.1109/rfid.2014.6810710 dblp:conf/rfid/SankarkumarRS14 fatcat:6sc7s5ecfrhynhym73lazonlgy

RFID Application Development With the Accada Middleware Platform

Christian Floerkemeier, Christof Roduner, Matthias Lampe
2007 IEEE Systems Journal  
These constraints include the occurrence of false negative reads, tag memory variations, the heterogeneous reader landscape, and the limited communication bandwidth available to RFID readers.  ...  This paper shows that the Accada implementation, which is based on a set of specifications developed by the EPCglobal community and a number of extensions, such as the surrogate concept and the virtual  ...  In Fig. 9 , the time constant is set to eight time units. To eliminate false positive reads, tags need to be detected a few times before an entry event is triggered.  ... 
doi:10.1109/jsyst.2007.909778 fatcat:k7dx26arhjhh3ddat7dhqqioda

A survey on dependability improvement techniques for pervasive computing systems

WenHua Yang, YePang Liu, Chang Xu, S. C. Cheung
2015 Science China Information Sciences  
After a discussion of these pieces of work, we present an outlook for its future research directions.  ...  These studies were categorized according to their similarities and differences in hope of shedding some insight into future research.  ...  Ideally, each reader should be able to read all tags in its vicinity, but the correct reading rate of a reader may fall below 70% in real-life RFID deployments, which means at least 30% of its contexts  ... 
doi:10.1007/s11432-015-5300-3 fatcat:jzhn2leyvbbi7fpjiyddapzeti

An Ultra-Low Power and Flexible Acoustic Modem Design to Develop Energy-Efficient Underwater Sensor Networks

Antonio Sánchez, Sara Blanc, Pedro Yuste, Angel Perles, Juan José Serrano
2012 Sensors  
This paper is focused on the description of the physical layer of a new acoustic modem called ITACA.  ...  This feature enables a reduced power dissipation of 10 µW in stand-by mode and registers very low power values during reception and transmission.  ...  Secondly, having discarded false wake-ups due to environmental noise in a real scenario, false wake-ups were measured in a controlled scenario when subjected to OOK pattern transmissions.  ... 
doi:10.3390/s120606837 pmid:22969324 pmcid:PMC3435954 fatcat:ot5tavdyobauxkcmysyvz3syre

Optimization of Mobile RFID Platforms: A Cross-Layer Approach [chapter]

Ramiro Robles, Atilio
2011 Current Trends and Challenges in RFID  
Outcomes from different readers can be stored to provide a historical record to infer the real trajectory of the tag and thus eliminate both false negative and false positive readings.  ...  A virtual path can cope with false negative and false positive reads of a tag moving across different virtual readers.  ... 
doi:10.5772/19248 fatcat:bgxanxexandzvfdjckjb6b6zaa

Towards Digital Transformation in Fashion Retailing: A Design-Oriented IS Research Study of Automated Checkout Systems

Matthias Hauser, Sebastian A. Günther, Christoph M. Flath, Frédéric Thiesse
2018 Business & Information Systems Engineering  
problems of detecting purchases in a reliable and timely fashion and assigning these purchases to individual shopping baskets.  ...  The system is implemented and evaluated in a research laboratory under real-world conditions.  ...  on the top and the bottom F169-F171 Number of R420 antennas that detected the RFID tag at least once in total, in the first quarter of the time window, and in the last quarter of the time window F172-  ... 
doi:10.1007/s12599-018-0566-9 fatcat:q4g4zrs6fbc37fmitsmwo4h3sy
« Previous Showing results 1 — 15 out of 1,389 results