A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
An improved SMURF scheme for cleaning RFID data
2018
International Journal of Grid and Utility Computing
RFID technology enables the reading over a long distance, provides high storage capacity and is widely used in the Internet of Things environmental supply chain management for object tracking and tracing ...
The traditional statistical smoothing for unreliable RFID data (SMURF) algorithm dynamically adjusts the size of window according to tags' average reading rate of sliding window during the process of data ...
This paper is supported by the National Natural Science Foundation of P. R. China ...
doi:10.1504/ijguc.2018.10012797
fatcat:jtavfoy2hbdyhjpkxde3r37244
Fusing RFID and computer vision for probabilistic tag localization
2014
2014 IEEE International Conference on RFID (IEEE RFID)
In addition, we introduce a robust data association method which is crucial for the application in practical scenarios. ...
In this paper, we present a hybrid RFID and computer vision system for localization and tracking of RFID tags. ...
The experimental evaluation in a practical EAS scenario showed that the presented approach provides a robust system performance with respect to the detection of stolen articles and the suppression of false ...
doi:10.1109/rfid.2014.6810717
dblp:conf/rfid/GollerFP14
fatcat:5zxycktpbnbyvnytve4bjq47ye
Algorithm for an indoor automatic vehicular system based on active RFIDs
2017
ICT Express
The algorithm aims to minimize shifts and loads of heavy vehicles in order to reduce production times and costs. ...
Results are encouraging and the system is particularly adaptable to different scenarios. ...
Due to the characteristics of the working environment, it is possible to have false readings of RFID tags and cases in which the tags are not read even if they are correctly transmitting a signal. ...
doi:10.1016/j.icte.2017.11.012
fatcat:76dzslvbsbhuvle5iok27gl6aq
A novel integrated approach for handling anomalies in RFID data
2013
International Journal of UbiComp
Radio Frequency Identification (RFID) is a convenient technology employed in various applications. ...
The processing of other anomalies is deferred until the query time and cleaned by business rules. ...
False negatives (missed readings), tags are mistakenly assumed to be absent in the reader's detection range; False positives, tags are mistakenly assumed to be present in the reader's detection range. ...
doi:10.5121/iju.2013.4202
fatcat:t3odkbasjbc55cp5xa5p7j4nfu
Integrating Automatic Data Acquisition with Business Processes Experiences with SAP's Auto-ID Infrastructure
[chapter]
2004
Proceedings 2004 VLDB Conference
Through automatic and real-time data acquisition, these technologies can benefit a great variety of industries by improving the efficiency of their operations. ...
Smart item technologies, like RFID and sensor networks, are considered to be the next big step in business process automation [1] . ...
We also benefited from fruitful discussions with other colleagues in SAP including Bernd Sieren, Bernd Lauterbach, Christoph Lessmoellmann, Ami Heitner, Alexander Renz, and Kai Morisse. ...
doi:10.1016/b978-012088469-8/50103-0
fatcat:rkdazaa2u5eullhwifuo6kgisu
Integrating Automatic Data Acquisition with Business Processes Experiences with SAP's Auto-ID Infrastructure
[chapter]
2004
Proceedings 2004 VLDB Conference
Through automatic and real-time data acquisition, these technologies can benefit a great variety of industries by improving the efficiency of their operations. ...
Smart item technologies, like RFID and sensor networks, are considered to be the next big step in business process automation [1] . ...
We also benefited from fruitful discussions with other colleagues in SAP including Bernd Sieren, Bernd Lauterbach, Christoph Lessmoellmann, Ami Heitner, Alexander Renz, and Kai Morisse. ...
doi:10.1016/b978-012088469-8.50103-0
dblp:conf/vldb/BornhovdLHS04
fatcat:docsiz6vv5bq5kyn7cqlt3slhq
Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach
2012
Sensors
RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis ...
In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. ...
Acknowledgments This research is supported in part by research grants from German Academic Exchange Service DAAD, South Africa NRF, CUT and UDSM under Project-ECSE-(C1A:1.1). ...
doi:10.3390/s120404187
pmid:22666027
pmcid:PMC3355407
fatcat:dd2f66kjyvfbtbez2ynlo7n4se
Reliable Identification Schemes for Asset and Production Tracking in Industry 4.0
2020
Sensors
Revolutionizing logistics and supply chain management in smart manufacturing is one of the main goals of the Industry 4.0 movement. ...
Tracking various assets within shop-floors and the warehouse is a focal point of asset management; its aim is to enhance the efficiency of logistical tasks. ...
in real-time. ...
doi:10.3390/s20133709
pmid:32630771
pmcid:PMC7374395
fatcat:nxayq5yb7rdqzhjevlh5zrztya
A Review on Complex Event Processing in RFID System
2018
International Journal on Advanced Science, Engineering and Information Technology
Based on the critical analysis of prior techniques and solutions, therefore, we further the research and propose a solution for a new type of event processing engine especially in RFID for future reference ...
A variety of traditional to the most current techniques was disclosed with some features, which are rarely considered in typical CEP problems. ...
Besides the improvement of the precision of RFID readers, there are still void readings such as missed readings and false negative readings [18] . ...
doi:10.18517/ijaseit.8.4.5183
fatcat:wwjhx7njxbffxccdic6etwgdpq
A highly accurate and scalable approach for addressing location uncertainty in asset tracking applications
2014
2014 IEEE International Conference on RFID (IEEE RFID)
The results of a detailed simulation study shows that our object compression technique yields high location accuracy (above 98% at 0.95 read rate) with significant reductions in execution time and memory ...
Tracking systems that use RFID are increasingly being used for monitoring the movement of goods in supply chains. ...
Missed reads refer to objects that exist in a readable area, but may not have their tag detected by readers due to environmental factors such as interference, noise, malfunction of RFID components and ...
doi:10.1109/rfid.2014.6810710
dblp:conf/rfid/SankarkumarRS14
fatcat:6sc7s5ecfrhynhym73lazonlgy
RFID Application Development With the Accada Middleware Platform
2007
IEEE Systems Journal
These constraints include the occurrence of false negative reads, tag memory variations, the heterogeneous reader landscape, and the limited communication bandwidth available to RFID readers. ...
This paper shows that the Accada implementation, which is based on a set of specifications developed by the EPCglobal community and a number of extensions, such as the surrogate concept and the virtual ...
In Fig. 9 , the time constant is set to eight time units. To eliminate false positive reads, tags need to be detected a few times before an entry event is triggered. ...
doi:10.1109/jsyst.2007.909778
fatcat:k7dx26arhjhh3ddat7dhqqioda
A survey on dependability improvement techniques for pervasive computing systems
2015
Science China Information Sciences
After a discussion of these pieces of work, we present an outlook for its future research directions. ...
These studies were categorized according to their similarities and differences in hope of shedding some insight into future research. ...
Ideally, each reader should be able to read all tags in its vicinity, but the correct reading rate of a reader may fall below 70% in real-life RFID deployments, which means at least 30% of its contexts ...
doi:10.1007/s11432-015-5300-3
fatcat:jzhn2leyvbbi7fpjiyddapzeti
An Ultra-Low Power and Flexible Acoustic Modem Design to Develop Energy-Efficient Underwater Sensor Networks
2012
Sensors
This paper is focused on the description of the physical layer of a new acoustic modem called ITACA. ...
This feature enables a reduced power dissipation of 10 µW in stand-by mode and registers very low power values during reception and transmission. ...
Secondly, having discarded false wake-ups due to environmental noise in a real scenario, false wake-ups were measured in a controlled scenario when subjected to OOK pattern transmissions. ...
doi:10.3390/s120606837
pmid:22969324
pmcid:PMC3435954
fatcat:ot5tavdyobauxkcmysyvz3syre
Optimization of Mobile RFID Platforms: A Cross-Layer Approach
[chapter]
2011
Current Trends and Challenges in RFID
Outcomes from different readers can be stored to provide a historical record to infer the real trajectory of the tag and thus eliminate both false negative and false positive readings. ...
A virtual path can cope with false negative and false positive reads of a tag moving across different virtual readers. ...
doi:10.5772/19248
fatcat:bgxanxexandzvfdjckjb6b6zaa
Towards Digital Transformation in Fashion Retailing: A Design-Oriented IS Research Study of Automated Checkout Systems
2018
Business & Information Systems Engineering
problems of detecting purchases in a reliable and timely fashion and assigning these purchases to individual shopping baskets. ...
The system is implemented and evaluated in a research laboratory under real-world conditions. ...
on the top and the bottom F169-F171 Number of R420 antennas that detected the RFID tag at least once in total, in the first quarter of the time window, and in the last quarter of the time window F172- ...
doi:10.1007/s12599-018-0566-9
fatcat:q4g4zrs6fbc37fmitsmwo4h3sy
« Previous
Showing results 1 — 15 out of 1,389 results