無線射頻識別報告 授課教師 : 黃秋煌 報告人 : 王重凱 1. Outline ECA Rule-based RFID Data Management An Efficient RFID Data Processing Scheme for Data Filtering and Recognition.

Slides:



Advertisements
Similar presentations
TI: An Efficient Indexing Mechanism for Real-Time Search on Tweets Chun Chen 1, Feng Li 2, Beng Chin Ooi 2, and Sai Wu 2 1 Zhejiang University, 2 National.
Advertisements

專題研討 --- 心得報告 Face Recognition System with Genetic Algorithm and ANT Colony Optimization International Journal of Innovation, Management and Technology,
Presenter : Shih-Tung Huang Tsung-Cheng Lin Kuan-Fu Kuo 2015/6/15 EICE team Model-Level Debugging of Embedded Real-Time Systems Wolfgang Haberl, Markus.
Lecture 23: Software Architectures
Performance Evaluation of IPv6 Packet Classification with Caching Author: Kai-Yuan Ho, Yaw-Chung Chen Publisher: ChinaCom 2008 Presenter: Chen-Yu Chaug.
ATSN 2009 Towards an Extensible Agent-based Middleware for Sensor Networks and RFID Systems Dirk Bade University of Hamburg, Germany.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
1 Performing packet content inspection by longest prefix matching technology Authors: Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu and Chia- Wen Ho Publisher:
Smart Learning Services Based on Smart Cloud Computing
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse 2.
1 Efficient packet classification using TCAMs Authors: Derek Pao, Yiu Keung Li and Peng Zhou Publisher: Computer Networks 2006 Present: Chen-Yu Lin Date:
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Ekrem Kocaguneli 11/29/2010. Introduction CLISSPE and its background Application to be Modeled Steps of the Model Assessment of Performance Interpretation.
指導教授:黃秋煌 報告者:黃明維 無線射頻辨識 論文報告 1. RFID Lab, Dept. IECS, FCU Outline Internet of Things architecture for a RFID-based product tracking business model SHARDIS:
AGENT-BASED GATEWAY OPERATING SYSTEM FOR RFID- ENABLED UBIQUITOUS MANUFACTURING ENTERPRISE - JI FANG, TING QU, ZHI LI, GANGYAN XU, GEORGE Q. HUANG HKUZIRI.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
Software Engineering Muhammad Fahad Khan
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
Sensor Based Services Udomporn Wuwong Oracle Fusion Middleware Sales Manager Oracle Corporation (Thailand)
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
D2Taint: Differentiated and Dynamic Information Flow Tracking on Smartphones for Numerous Data Sources Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion,
Information Fusion in Continuous Assurance Johan Perols University of San Diego Uday Murthy University of South Florida UWCISA Symposium October 2, 2009.
Concept demo System dashboard. Overview Dashboard use case General implementation ideas Use of MULE integration platform Collection Aggregation/Factorization.
Database Systems Design, Implementation, and Management Coronel | Morris 11e ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or.
Implementation Yaodong Bi. Introduction to Implementation Purposes of Implementation – Plan the system integrations required in each iteration – Distribute.
Context Tailoring the DBMS –To support particular applications Beyond alphanumerical data Beyond retrieve + process –To support particular hardware New.
Agent-based Device Management in RFID Middleware Author : Zehao Liu, Fagui Liu, Kai Lin Reporter :郭瓊雯.
YZStack: Provisioning Customizable Solution for Big Data Sai Wu, Chun Chen, Gang Chen, Lidan Shou, Ke Chen Zhejiang University Hui Cao, yzBigData Co. Lte.
Service Architecture of Grid Faults Diagnosis Expert System Based on Web Service Wang Mingzan, Zhang ziye Northeastern University, Shenyang, China.
Chapter 7. BEAT: the Behavior Expression Animation Toolkit
A Metadata Based Approach For Supporting Subsetting Queries Over Parallel HDF5 Datasets Vignesh Santhanagopalan Graduate Student Department Of CSE.
Sujayyendhiren RS, Kaiqi Xiong and Minseok Kwon Rochester Institute of Technology Motivation Experimental Setup in ProtoGENI Conclusions and Future Work.
Odyssey A Reuse Environment based on Domain Models Prepared By: Mahmud Gabareen Eliad Cohen.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Nikos Kefalakis, John Soldatos, Efstathios Mertikas, Neeli R. Prasad Generating Business Events in an RFID Network.
Design of a Search Engine for Metadata Search Based on Metalogy Ing-Xiang Chen, Che-Min Chen,and Cheng-Zen Yang Dept. of Computer Engineering and Science.
Accada – Open Source EPC Network Prototyping Platform Christian Floerkemeier Christof Roduner SAP October 2006.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Expert Systems with Applications 34 (2008) 459–468 Multi-level fuzzy mining with multiple minimum supports Yeong-Chyi Lee, Tzung-Pei Hong, Tien-Chin Wang.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
DATABASE MANAGEMENT SYSTEMS CMAM301. Introduction to database management systems  What is Database?  What is Database Systems?  Types of Database.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
INNOV-10 Progress® Event Engine™ Technical Overview Prashant Thumma Principal Software Engineer.
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
1 Fast packet classification for two-dimensional conflict-free filters Department of Computer Science and Information Engineering National Cheng Kung University,
Design of On-Demand Analysis for Cloud Service Configuration using Related-Annotation Hyogun Yoon', Hanku Lee' 2 `, ' Center for Social Media Cloud Computing,
Design Reuse Earlier we have covered the re-usable Architectural Styles as design patterns for High-Level Design. At mid-level and low-level, design patterns.
Cross-Product Packet Classification in GNIFS based on Non-overlapping Areas and Equivalence Class Author: Mohua Zhang, Ge Li Publisher: AISS 2012 Presenter:
1 Technical & Business Writing (ENG-715) Muhammad Bilal Bashir UIIT, Rawalpindi.
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
Dec. 13, 2002 WISE2002 Processing XML View Queries Including User-defined Foreign Functions on Relational Databases Yoshiharu Ishikawa Jun Kawada Hiroyuki.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
1 Efficient In-Network Moving Object Tracking in Wireless Sensor Networks Chih-Yu Lin, Student Member, IEEE, Wen-Chih Peng, Member, IEEE, and Yu-Chee Tseng,
Review of Parnas’ Criteria for Decomposing Systems into Modules Zheng Wang, Yuan Zhang Michigan State University 04/19/2002.
Adrian Jackson, Stephen Booth EPCC Resource Usage Monitoring and Accounting.
Big traffic data processing framework for intelligent monitoring and recording systems 學生 : 賴弘偉 教授 : 許毅然 作者 : Yingjie Xia a, JinlongChen a,b,n, XindaiLu.
IBM Global Services © 2005 IBM Corporation SAP Legacy System Migration Workbench| March-2005 ALE (Application Link Enabling)
Application of the GA-PSO with the Fuzzy controller to the robot soccer Department of Electrical Engineering, Southern Taiwan University, Tainan, R.O.C.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
1 Using Network Coding for Dependent Data Broadcasting in a Mobile Environment Chung-Hua Chu, De-Nian Yang and Ming-Syan Chen IEEE GLOBECOM 2007 Reporter.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Range Hash for Regular Expression Pre-Filtering Publisher : ANCS’ 10 Author : Masanori Bando, N. Sertac Artan, Rihua Wei, Xiangyi Guo and H. Jonathan Chao.
The Development Process of Web Applications
Proposal for Term Project
The Improvement of PaaS Platform ZENG Shu-Qing, Xu Jie-Bin 2010 First International Conference on Networking and Distributed Computing SQUARE.
Chapter 10 – Integrating RFID Readers in Enterprise IT
Presents: Rally To Java Conversion Suite
AIMS Equipment & Automation monitoring solution
Presentation transcript:

無線射頻識別報告 授課教師 : 黃秋煌 報告人 : 王重凱 1

Outline ECA Rule-based RFID Data Management An Efficient RFID Data Processing Scheme for Data Filtering and Recognition 2

ECA Rule-based RFID Data Management Jie Wu, Dong Wang, Huanye Sheng 3

INTRODUCTION We are faced with many challenges in the process: (1) Data Aggregation (2) State Transformation. (3)Business process Due to these challenges, we argue that rule engine can be efficiently employed. 4

INTRODUCTION We propose a way using ECA rules to process RFID data. This paper puts forward a solution using ECA rules to process RFID data efficiently and flexibly. 5

RELATED WORK The concept of the architecture of Savant[12] (ALE's predecessor) the RFID middleware component in the EPC Network was initially proposed by the Auto-ID Center, an industry-sponsored research program to foster RFID adoption. 6

RELATED WORK The ALE specification is the application-level interface standard developed by EPCglobal to allow clients to obtain filtered and consolidated EPC observations from a variety of sources [6]. 7

RELATED WORK The requirements and the architecture of RFID middleware have been studied by [13, 14, 15, 16]. Our work differs from the above, because it exclusively focuses on introducing ECA rules to processing events in the RFID middleware, which makes RFID data management more flexible and efficient. 8

ECA RULES IN DATA PROCESSING A. ECA Rules _ECA model was first used in active database systems to support reactive behavior by integrating rules into DBMSs (database management systems). _In ECA model, a rule is defined by the following event-condition- action pattern: WHEN E IF C DO A; 9

ECA RULES IN DATA PROCESSING B. ECA Rule-based RFID data management _ Input Interface _ Rule Base _ Rule Manager _ Condition Checker _ Action Manager _ Action Set _ Event Manager _ Event Queue _ Event Forming _ RFID Deployment 10

ECA RULES IN DATA PROCESSING B. ECA Rule-based RFID data management 11

DESIGN AND IMPLEMENTATION A. Design Issues RFID Event Processing : There are 3 layers in event processing: (1) raw events process layer (2) intermediate events process layer (3) business events process layer 12

DESIGN AND IMPLEMENTATION 13

DESIGN AND IMPLEMENTATION B. Implementation Issues Our RFID system is programmed in Java language. In our approach, we choose to use Drools to implement rule engine. 14

DESIGN AND IMPLEMENTATION (1) Raw events process layer An example of raw tag event specification is given below : class RawTagEvent{ physicalReaderID; tagID; timestamp; } 15

DESIGN AND IMPLEMENTATION (1) Raw events process layer An example primitive tag event specification is given below : class PrimitiveTagEvent{ logicalReaderID; // ID of the logical reader physicalReaderID; /* ID of the reader who observes the tag /null- if the tag disappears*/ tagID; // ID of the appeared/disappeared tag idType; // Encode Scheme status; // 1-Appear/0-Disappear timestamp; /*The timestamp of the tag's appearance or disappearance*/ 16

DESIGN AND IMPLEMENTATION filter; /*additional data that is used for fast filtering and pre-selection of basic logistics types*/ company; //tag's company prefix index reference; /*tag's reference (Item Reference, Location Reference, Asset Type, Serial Reference Individual Asset Reference)*/ serialNum; //tag's serial number if exists, //otherwise, equals to 0 } 17

DESIGN AND IMPLEMENTATION (2) Intermediate events process layer rule "TagFilter“ when event:PrimitiveTagEvent(logicalReaderlD== "LI", idType== "SGTIN-96", filter== "011", company== " ") then //further process end 18

DESIGN AND IMPLEMENTATION (3) Business events process layer rule "Smart shelf Shortage Report" when SSReportEvent(map:map) //smart shelf report event then //get shaver's set and report the shortage Set set= (Set)map.get("000128"); if(set! =null && set.size(O<10) ShortageReport.report( item, set); 19

DESIGN AND IMPLEMENTATION //get shampoo's set and report the shortage set= (Set)map.get("000130"); if(set!=null && set.size(<20) ShortageReport.report( item, set); …… end 20

CONCLUSIONS ECA rules is able to reduce large sets of RFID data to the precise sets of valuable information efficiently and flexibly. When we use drools, we just write down the rule and put the rule in the system. We don't need to compile the rules. This is done by the rule engine automatically. 21

An Efficient RFID Data Processing Scheme for Data Filtering and Recognition Sih-Ying Li1, Hsu-Yang Kung1, Chi-Hua Chen2,* and Wen-Hsi Lydia Hsu3 22

INTRODUCTION This study expects to develop an effective method of RFID data processing that can help RFID middleware quickly and effectively deal with large numbers of RFID data. This study uses the electronic product code (EPC) to construct the tree structure, and design a hash function to reduce the data length for hash value generation. 23

RELATED WORK The middleware is divided into four methods which are proposed in previous work. _Device Adaption and Management _Data Processing _Process Design _Efficiency 24

SYSTEMATIC STRUCTURE 25

SYSTEMATIC STRUCTURE RFID Device _ This part describes the RFID readers and tags which have been designed by the different equipment specifications. Middleware must connect various readers to achieve the aim of a single user interface. 26

SYSTEMATIC STRUCTURE Middleware _ Middleware has two core components which are the data manager and reader controller. The data manager is responsible for data filtering, collection, and storage. The reader controller is responsible for connecting readers, and grouping and monitoring readers. 27

SYSTEMATIC STRUCTURE Middleware _ Data Manager : 1. Collection Module : The reader effectively collects and transmits data to the corresponding filtration module for processing. 2. Filter Module : This module has multiple filter functions. This module uses the hash function to filter duplicate data, and lets users filter specific data. That function is also called data classification. 3. Output Module : A user can set a data flow as output from the filter module. Additionally, data can be saved to a database specified by a user or as output data in the XML format. 28

SYSTEMATIC STRUCTURE Middleware _ Reader Controller : 1. Monitoring Module : This module can support users to manage readers. The users can monitor the working condition of readers for real-time monitoring and troubleshooting. 2. Grouping Module : This module manages many readers which are used for different application scenarios. Thus, this work designs a grouping function, and the readers which are in a group are used for the same application scenarios. A user can then control multiple readers in a group simultaneously. 3. Adaption Module : This module controls readers from different manufacturers for users. 29

SYSTEMATIC STRUCTURE Application _The data was transformed to information by middleware. Then this module delivers information to other application system or database. Therefore, a user can refer to the designation database or obtain data in the XML format. 30

EVALUATION Clean-data Filtering _ To increase the filtration rate, this work uses a hash function for repeat information filtering. We use the hash function to design filter made of two methods: (1) hash function and (2) tree structure with the hash function. 31

EVALUATION Hash Function 32

EVALUATION 33

EVALUATION 34

EVALUATION User-defined Filtering _The RFID data are used in different application situations repeatedly. Thus, different application situations require different filtering data. User-Defined Filtering is designed by users, which is mean the users can control the data of duplicate filter, and user also can transform data to information according to the application situation. 35

EVALUATION Classified Information _ Information can be classified according to EPC fields (e.g., header, filter value, company, and item reference). _Filtering is designed according to user needs and information not required, or only retains the information needed (e.g., header, filter value, company, and item reference). 36

EVALUATION Inquiries by the Respective Need _ The queries are built according to the EPC field (e.g., header, filter value, company, and item reference). 37

SYSTEM IMPLEMENTATION We provide the users an interface. The users can set Clean Data Filtering and User Define Filtering and depend on their application scenarios and conditions to set multiple filter sources for information reusing. 38

SYSTEM IMPLEMENTATION 39

EXPERIMENTAL ANALYSIS AND EXPLORATION Filtering Performance Verification Method _In this paper, we use simulation to verify that the method is efficiency. In experiments, we design two data sets which include: (1) generating 96-bit random numbers (2) using SGTIN-96 specification. 40

Experimental Analysis and Exploration Filtration Efficiency Simulations _ We consider three cases which include: (1) Duplicate 1/4, (2) Duplicate 1/2, and (3) Duplicate 3/4 shown in table 1. 41

EXPERIMENTAL ANALYSIS AND EXPLORATION Not Consider whether Analytical Code _ SGTIN Data : 42

EXPERIMENTAL ANALYSIS AND EXPLORATION Not Consider whether Analytical Code _ SGTIN Data : 43

EXPERIMENTAL ANALYSIS AND EXPLORATION Not Consider whether Analytical Code _ Random Data : 44

EXPERIMENTAL ANALYSIS AND EXPLORATION Not Consider whether Analytical Code _ Random Data : 45

EXPERIMENTAL ANALYSIS AND EXPLORATION Parse the Code and then Filtered _ SGTIN Data : 46

EXPERIMENTAL ANALYSIS AND EXPLORATION Parse the Code and then Filtered _ SGTIN Data : 47

EXPERIMENTAL ANALYSIS AND EXPLORATION Parse the Code and then Filtered _ Random Data : 48

EXPERIMENTAL ANALYSIS AND EXPLORATION Parse the Code and then Filtered _ Random Data : 49

CONCLUSIONS We consider two situations which include (1) non- considering whether analytical code and (2) parsing the code and then filtered are described as the following subsections. _In situation (1), the performance of using HashCode method is the fast in any cases. In situation (2), the performances of using Cut_Hash and HashCode methods are faster than other methods in any cases. Therefore, if the application doesn’t consider security issues, using HashCode method is better when. Otherwise, using Cut_Hash method is better. 50