[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1807167.1807176acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Leveraging spatio-temporal redundancy for RFID data cleansing

Published: 06 June 2010 Publication History

Abstract

Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many anomalies. An ideal solution for RFID data cleansing should address the following issues. First, in many applications, duplicate readings (by multiple readers simultaneously or by a single reader over a period of time) of the same object are very common. The solution should take advantage of the resulting data redundancy for data cleaning. Second, prior knowledge about the readers and the environment (e.g., prior data distribution, false negative rates of readers) may help improve data quality and remove data anomalies, and a desired solution must be able to quantify the degree of uncertainty based on such knowledge. Third, the solution should take advantage of given constraints in target applications (e.g., the number of objects in a same location cannot exceed a given value) to elevate the accuracy of data cleansing. There are a number of existing RFID data cleansing techniques. However, none of them support all the aforementioned features. In this paper we propose a Bayesian inference based approach for cleaning RFID raw data. Our approach takes full advantage of data redundancy. To capture the likelihood, we design an n-state detection model and formally prove that the 3-state model can maximize the system performance. Moreover, in order to sample from the posterior, we devise a Metropolis-Hastings sampler with Constraints (MH-C), which incorporates constraint management to clean RFID raw data with high efficiency and accuracy. We validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations.

References

[1]
P. Agrawal, O. Benjelloun, A. D. Sarma, C. Hayworth, S. Nabar, T. Sugihara, and J. Widom. Trio: A System for Data, Uncertainty, and Lineage. In VLDB, pages 1151--1154, 2006.
[2]
C. Andrieu, N. de Freitas, A. Doucet, and M. I. Jordan. An Introduction to MCMC for Machine Learning. Machine Learning, 50(1-2):5--43, 2003.
[3]
P. Andritsos, A. Fuxman, and R. J. Miller. Clean Answers over Dirty Databases: A Probabilistic Approach. In ICDE, page 30, 2006.
[4]
L. Antova, C. Koch, and D. Olteanu. Query Language Support for Incomplete Information in the MayBMS System. In VLDB, pages 1422--1425, 2007.
[5]
S. S. Chawathe, V. Krishnamurthy, S. Ramachandran, and S. E. Sarma. Managing RFID Data. In VLDB, pages 1189--1195, 2004.
[6]
R. Cheng, S. Singh, and S. Prabhakar. U-DBMS: A Database System for Managing Constantly-evolving Data. In VLDB, pages 1271--1274, 2005.
[7]
N. Dalvi and D. Suciu. Efficient Query Evaluation on Probabilistic Databases. The VLDB Journal, 16(4):523--544, 2007.
[8]
A. Deshpande, C. Guestrin, and S. Madden. Using probabilistic models for data management in acquisitional environments. In CIDR, pages 317--328, 2005.
[9]
D. W. Engels and S. E. Sarma. The Reader Collision Problem. In IEEE SMC, 2002.
[10]
C. Floerkemeier and M. Lampe. Issues with RFID Usage in Ubiquitous Computing Applications. In Pervasive, pages 188--193, 2004.
[11]
M. J. Franklin, S. R. Jeffery, S. Krishnamurthy, F. Reiss, S. Rizvi, E. Wu, O. Cooper, A. Edakkunni, and W. Hong. Design Considerations for High Fan-In Systems: The HiFi Approach. In CIDR, pages 290--304, 2005.
[12]
H. Gonzalez, J. Han, X. Li, and D. Klabjan. Warehousing and Analyzing Massive RFID Data Sets. In ICDE, page 83, 2006.
[13]
J. Ho, D. W. Engels, and S. E. Sarma. HiQ: A Hierarchical Q-learning Algorithm to Solve the Reader Collision Problem. In SAINT Workshops, pages 88--91, 2006.
[14]
R. Jampani, F. Xu, M. Wu, L. L. Perez, C. Jermaine, and P. J. Haas. MCDB: A Monte Carlo Approach to Managing Uncertain Data. In SIGMOD, pages 687--700, 2008.
[15]
S. R. Jeffery, G. Alonso, M. J. Franklin, W. Hong, and J. Widom. Declarative Support for Sensor Data Cleaning. In Pervasive, pages 83--100, 2006.
[16]
S. R. Jeffery, M. J. Franklin, and M. N. Garofalakis. An Adaptive RFID Middleware for Supporting Metaphysical Data Independence. VLDB J., 17(2):265--289, 2008.
[17]
S. R. Jeffery, M. N. Garofalakis, and M. J. Franklin. Adaptive Cleaning for RFID Data Streams. In VLDB, pages 163--174, 2006.
[18]
N. Khoussainova, M. Balazinska, and D. Suciu. Towards Correcting Input Data Errors Probabilistically Using Integrity Constraints. In MobiDE, pages 43--50, 2006.
[19]
N. Khoussainova, M. Balazinska, and D. Suciu. Probabilistic Event Extraction from RFID Data. In ICDE, pages 1480--1482, 2008.
[20]
J. Myung, W. Lee, J. Srivastava, and T. K. Shih. Tag-Splitting: Adaptive Collision Arbitration Protocols for RFID Tag Identification. IEEE Trans. Parallel Distrib. Syst., 18(6):763--775, 2007.
[21]
J. Rao, S. Doraiswamy, H. Thakkar, and L. S. Colby. A Deferred Cleansing Method for RFID Data Analytics. In VLDB, pages 175--186, 2006.
[22]
S. M. Ross. Introduction to Probability Models, Ninth Edition. Academic Press, 2006.
[23]
L. Sullivan. RFID Implementation Challenges Persist, All This Time Later. InformationWeek, October 2005.
[24]
T. Tran, C. Sutton, R. Cocci, Y. Nie, Y. Diao, and P. Shenoy. Probabilistic Inference over RFID Streams in Mobile Environments. In ICDE, 2009.
[25]
J. Waldrop, D. W. Engels, and S. E. Sarma. Colorwave: An Anticollision Algorithm for the Reader Collision Problem. In ICC, pages 1206--1210, 2003.
[26]
F. Wang and P. Liu. Temporal Management of RFID Data. In VLDB, pages 1128--1139, 2005.
[27]
R. Want. The Magic of RFID. ACM Queue, 2(7):40--48, 2004.
[28]
J. Xie, J. Yang, Y. Chen, H. Wang, and P. S. Yu. A Sampling-Based Approach to Information Recovery. In ICDE, pages 476--485, 2008.

Cited By

View all
  • (2023)Data Imputation for Sparse Radio Maps in Indoor Positioning2023 IEEE 39th International Conference on Data Engineering (ICDE)10.1109/ICDE55515.2023.00173(2235-2248)Online publication date: Apr-2023
  • (2022)Spatial Data Quality in the Internet of Things: Management, Exploitation, and ProspectsACM Computing Surveys10.1145/349833855:3(1-41)Online publication date: 3-Feb-2022
  • (2020)MRLIHT: Mobile RFID-Based Localization for Indoor Human TrackingSensors10.3390/s2006171120:6(1711)Online publication date: 19-Mar-2020
  • Show More Cited By

Index Terms

  1. Leveraging spatio-temporal redundancy for RFID data cleansing

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGMOD '10: Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
    June 2010
    1286 pages
    ISBN:9781450300322
    DOI:10.1145/1807167
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 June 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. data cleaning
    2. probabilistic algorithms
    3. spatio-temporal databases
    4. uncertainty

    Qualifiers

    • Research-article

    Conference

    SIGMOD/PODS '10
    Sponsor:
    SIGMOD/PODS '10: International Conference on Management of Data
    June 6 - 10, 2010
    Indiana, Indianapolis, USA

    Acceptance Rates

    Overall Acceptance Rate 785 of 4,003 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Data Imputation for Sparse Radio Maps in Indoor Positioning2023 IEEE 39th International Conference on Data Engineering (ICDE)10.1109/ICDE55515.2023.00173(2235-2248)Online publication date: Apr-2023
    • (2022)Spatial Data Quality in the Internet of Things: Management, Exploitation, and ProspectsACM Computing Surveys10.1145/349833855:3(1-41)Online publication date: 3-Feb-2022
    • (2020)MRLIHT: Mobile RFID-Based Localization for Indoor Human TrackingSensors10.3390/s2006171120:6(1711)Online publication date: 19-Mar-2020
    • (2020)Toward Translating Raw Indoor Positioning Data into Mobility SemanticsACM/IMS Transactions on Data Science10.1145/33851901:4(1-37)Online publication date: 25-Nov-2020
    • (2020)IoT Data QualityProceedings of the 29th ACM International Conference on Information & Knowledge Management10.1145/3340531.3412173(3517-3518)Online publication date: 19-Oct-2020
    • (2020)Data analytics-enable production visibility for Cyber-Physical Production SystemsJournal of Manufacturing Systems10.1016/j.jmsy.2020.09.00257(242-253)Online publication date: Oct-2020
    • (2019)Factors Affecting the Synthesis of Autonomous Sensors with RFID InterfaceSensors10.3390/s1920439219:20(4392)Online publication date: 11-Oct-2019
    • (2019)CurrentCleanProceedings of the 28th ACM International Conference on Information and Knowledge Management10.1145/3357384.3357839(2917-2920)Online publication date: 3-Nov-2019
    • (2019)A Novel Approach for Reducing RFID Uncertainty Using Variational Bayesian Inference2019 29th International Conference on Computer Theory and Applications (ICCTA)10.1109/ICCTA48790.2019.9478805(96-101)Online publication date: 29-Oct-2019
    • (2019)Intelligent Data Engineering for Migration to NoSQL Based Secure EnvironmentsIEEE Access10.1109/ACCESS.2019.29169127(69042-69057)Online publication date: 2019
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media