Filtering Redundant Data from RFID Data Streams
Radio Frequency Identification (RFID) enabled systems are evolving in many applications that need to know the physical location of objects such as supply chain management. Naturally, RFID systems create large volumes of duplicate data. As the duplicate data wastes communication, processing, and stor...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2016-01-01
|
Series: | Journal of Sensors |
Online Access: | http://dx.doi.org/10.1155/2016/7107914 |
id |
doaj-4fc410ad10f34cbbbbcedc053c253be9 |
---|---|
record_format |
Article |
spelling |
doaj-4fc410ad10f34cbbbbcedc053c253be92020-11-25T00:32:54ZengHindawi LimitedJournal of Sensors1687-725X1687-72682016-01-01201610.1155/2016/71079147107914Filtering Redundant Data from RFID Data StreamsHazalila Kamaludin0Hairulnizam Mahdin1Jemal H. Abawajy2Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Parit Raja, 86400 Batu Pahat, Johor, MalaysiaFaculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Parit Raja, 86400 Batu Pahat, Johor, MalaysiaIEEE, School of Information Technology, Deakin University, Waurn Ponds, VIC 3216, AustraliaRadio Frequency Identification (RFID) enabled systems are evolving in many applications that need to know the physical location of objects such as supply chain management. Naturally, RFID systems create large volumes of duplicate data. As the duplicate data wastes communication, processing, and storage resources as well as delaying decision-making, filtering duplicate data from RFID data stream is an important and challenging problem. Existing Bloom Filter-based approaches for filtering duplicate RFID data streams are complex and slow as they use multiple hash functions. In this paper, we propose an approach for filtering duplicate data from RFID data streams. The proposed approach is based on modified Bloom Filter and uses only a single hash function. We performed extensive empirical study of the proposed approach and compared it against the Bloom Filter, d-Left Time Bloom Filter, and the Count Bloom Filter approaches. The results show that the proposed approach outperforms the baseline approaches in terms of false positive rate, execution time, and true positive rate.http://dx.doi.org/10.1155/2016/7107914 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Hazalila Kamaludin Hairulnizam Mahdin Jemal H. Abawajy |
spellingShingle |
Hazalila Kamaludin Hairulnizam Mahdin Jemal H. Abawajy Filtering Redundant Data from RFID Data Streams Journal of Sensors |
author_facet |
Hazalila Kamaludin Hairulnizam Mahdin Jemal H. Abawajy |
author_sort |
Hazalila Kamaludin |
title |
Filtering Redundant Data from RFID Data Streams |
title_short |
Filtering Redundant Data from RFID Data Streams |
title_full |
Filtering Redundant Data from RFID Data Streams |
title_fullStr |
Filtering Redundant Data from RFID Data Streams |
title_full_unstemmed |
Filtering Redundant Data from RFID Data Streams |
title_sort |
filtering redundant data from rfid data streams |
publisher |
Hindawi Limited |
series |
Journal of Sensors |
issn |
1687-725X 1687-7268 |
publishDate |
2016-01-01 |
description |
Radio Frequency Identification (RFID) enabled systems are evolving in many applications that need to know the physical location of objects such as supply chain management. Naturally, RFID systems create large volumes of duplicate data. As the duplicate data wastes communication, processing, and storage resources as well as delaying decision-making, filtering duplicate data from RFID data stream is an important and challenging problem. Existing Bloom Filter-based approaches for filtering duplicate RFID data streams are complex and slow as they use multiple hash functions. In this paper, we propose an approach for filtering duplicate data from RFID data streams. The proposed approach is based on modified Bloom Filter and uses only a single hash function. We performed extensive empirical study of the proposed approach and compared it against the Bloom Filter, d-Left Time Bloom Filter, and the Count Bloom Filter approaches. The results show that the proposed approach outperforms the baseline approaches in terms of false positive rate, execution time, and true positive rate. |
url |
http://dx.doi.org/10.1155/2016/7107914 |
work_keys_str_mv |
AT hazalilakamaludin filteringredundantdatafromrfiddatastreams AT hairulnizammahdin filteringredundantdatafromrfiddatastreams AT jemalhabawajy filteringredundantdatafromrfiddatastreams |
_version_ |
1725318478011826176 |