Skip to main content

An Approximate Duplicate-Elimination in RFID Data Streams Based on d-Left Time Bloom Filter

  • Conference paper
Book cover Web Technologies and Applications (APWeb 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8709))

Included in the following conference series:

Abstract

There are a larger number of duplicates in RFID data streams, due to the multiple readings of an RFID tag by one RFID reader or by some RFID readers deployed to the same region in an RFID based system. Existing duplicate-elimination methods based on Time Bloom filter (TBF) require multiple counters to store the detected time of an element in RFID data streams, thus waste valuable memory resources. In this paper, we devise d-left Time Bloom filter (DLTBF) as an extension of d-left Counting Bloom filter. With the d-left hashing, a balanced allocation mechanism, DLTBF can store the detected time of an element into one counter. Then we propose an one-pass approximate method to remove duplicates in RFID data streams based on DLTBF. In an RFID data stream, suppose that the detected time of an element is T-bit, i.e., T bits are required to store the detected time of an element in RFID data streams, the number of non-duplicate elements within a time length of τ is W and the probability that a non-duplicate element is taken to be a duplicate by our method is ε (the false positive probability), then the number of bits used by our method is O(Wlog2 (1/ε) + WT). Experimental results on the synthetic data verify the effectiveness of our method.

This work is supported in part by Natural Science Foundation of Anhui Province (1408085QF128) and NII International Internship Program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aggarwal, C.C., Han, J.: A survey of rfid data processing. In: Managing and Mining Sensor Data, pp. 349–382. Springer (2013)

    Google Scholar 

  2. Bai, Y., Wang, F., Liu, P.: Efficiently filtering rfid data streams. In: CleanDB Workshop, pp. 50–57 (2006)

    Google Scholar 

  3. Bleco, D., Kotidis, Y.: RFID data aggregation. In: Trigoni, N., Markham, A., Nawaz, S. (eds.) GSN 2009. LNCS, vol. 5659, pp. 87–101. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. Bonomi, F., Mitzenmacher, M., Panigrahy, R., Singh, S., Varghese, G.: An improved construction for counting bloom filters. In: Azar, Y., Erlebach, T. (eds.) ESA 2006. LNCS, vol. 4168, pp. 684–695. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Broder, A., Mitzenmacher, M.: Using multiple hash functions to improve ip lookups. In: Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2001, vol. 3, pp. 1454–1463. IEEE (2001)

    Google Scholar 

  6. Chen, H., Ku, W.S., Wang, H., Sun, M.T.: Leveraging spatio-temporal redundancy for rfid data cleansing. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, pp. 51–62. ACM (2010)

    Google Scholar 

  7. Dautrich Jr., J.L., Ravishankar, C.V.: Inferential time-decaying bloom filters. In: Proceedings of the 16th International Conference on Extending Database Technology, pp. 239–250. ACM (2013)

    Google Scholar 

  8. Dutta, S., Narang, A., Bera, S.K.: Streaming quotient filter: a near optimal approximate duplicate detection approach for data streams. Proceedings of the VLDB Endowment 6(8), 589–600 (2013)

    Article  Google Scholar 

  9. Fazzinga, B., Flesca, S., Furfaro, F., Parisi, F.: Cleaning trajectory data of rfid-monitored objects through conditioning under integrity constraints. In: EDBT, pp. 379–390 (2014)

    Google Scholar 

  10. Jeffery, S.R., Garofalakis, M., Franklin, M.J.: Adaptive cleaning for rfid data streams. In: Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB Endowment, pp. 163–174 (2006)

    Google Scholar 

  11. Jiang, W., Wang, Y., Zhang, G.: A two-layer duplicate filtering approach for RFID data streams. In: Wang, Y., Zhang, X. (eds.) IOT 2012. CCIS, vol. 312, pp. 226–233. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  12. Ku, W.S., Chen, H., Wang, H., Sun, M.T.: A bayesian inference-based framework for rfid data cleansing. IEEE Transactions on Knowledge and Data Engineering 25(10), 2177–2191 (2013)

    Article  Google Scholar 

  13. Lee, C.H., Chung, C.W.: An approximate duplicate elimination in rfid data streams. Data & Knowledge Engineering 70(12), 1070–1087 (2011)

    Article  MathSciNet  Google Scholar 

  14. Martínez-Sala, A.S., Egea-López, E., García-Sánchez, F., García-Haro, J.: Tracking of returnable packaging and transport units with active rfid in the grocery supply chain. Computers in Industry 60(3), 161–171 (2009)

    Article  Google Scholar 

  15. Vöcking, B.: How asymmetry helps load balancing. Journal of the ACM (JACM) 50(4), 568–589 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, X., Ji, Y., Zhao, B. (2014). An Approximate Duplicate-Elimination in RFID Data Streams Based on d-Left Time Bloom Filter. In: Chen, L., Jia, Y., Sellis, T., Liu, G. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8709. Springer, Cham. https://doi.org/10.1007/978-3-319-11116-2_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11116-2_36

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11115-5

  • Online ISBN: 978-3-319-11116-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics