skip to main content
10.1145/2393216.2393320acmotherconferencesArticle/Chapter ViewAbstractPublication PagesccseitConference Proceedingsconference-collections
research-article

A new deferred cleansing technique for effective warehousing of RFID

Published:26 October 2012Publication History

ABSTRACT

RFID is a recent technology that has been widely used in education, supply chain management, military, airline, library, security, healthcare, animal farms and other areas. RFID tags store unique identification information of objects and communicate with the reader. The data observed by the reader are very dirty and unreliable. Our major aim was to design an RFID based application that would provide efficient means to perform essential information management for health care domain and to use the error free data for high-end applications. Small mistakes in healthcare could cause huge loss of life and incur massive financial losses. Data quality has become increasingly important to many organizations specifically for healthcare. So we have simulated the RFID in healthcare and next as a challenge took the dirty RFID data to perform cleaning in an effective manner using our newly proposed algorithm. Our approach is a hybrid approach of middleware and deferred because it is not always possible to remove all anomalies and redundancies in middleware. The processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental results show that the proposed approach performs the cleaning in an effective manner compared to the existing approaches.

References

  1. P. F. Drucker, "The essential Drucker: selections from the management works of Peter F. Drucker", New York: HarperBusiness, 2001.Google ScholarGoogle Scholar
  2. Tseng, Vincent S., Lu, Hsueh-Chan, Tsai, Chia-Ming, Wang and Chun-Hung, "A Hybrid Data Mining Approach for Analysis of Patient Behaviors in RFID Environments", 2008.Google ScholarGoogle Scholar
  3. H. Gonzalez, J. Han, X. Li and D. Klabjan, "Warehousing and Analysis of Massive RFID Data Sets", In Proceedings of 2006 Int. Conf. Data Engineering (ICDE'06), Atlanta, Georgia, April 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Angela M. Wicks, John K. Visich and Suhong Li, "Radio Frequency Identification Applications in Hospital Environments", heldref publication, Vol. 84, No.3, pp.3--9, 2006.Google ScholarGoogle Scholar
  5. Vijayshankar Raman and Joseph M. Hellerstein, "Potter'sWheel: An Interactive Data Cleaning System", In Proceedings of the 27th International Conference on Very Large Data Bases, pp.381--390, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Shepard, "RFID Radio Frequency Identification", The McGraw-Hall Companies, Inc. USA, 2005.Google ScholarGoogle Scholar
  7. Bettina Fazzinga, Sergio Flesca, Elio Masciari and Filippo Furfaro, "Efficient and effective RFID data warehousing", In proceedings of the 2009 International Database Engineering & Applications Symposium, pp. 251--258, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Hector Gonzalez, Jiawei Han, Hong Cheng, Xiaolei Li, Diego Klabjan, Tianyi Wu, "Modeling Massive RFID Data Sets: A Gateway-Based Movement Graph Approach," IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 1, pp. 90--104, Jan. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
    October 2012
    800 pages
    ISBN:9781450313100
    DOI:10.1145/2393216

    Copyright © 2012 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 26 October 2012

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader