Font Size: a A A

Research On Processing Approach To False Detection Of RDID Composite Events In Key Applications

Posted on:2014-11-13Degree:MasterType:Thesis
Country:ChinaCandidate:R Q ChengFull Text:PDF
GTID:2268330401462178Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In recent years, RFID technology has been widely used in intelligent building,logistics management, asset tracking, drug monitoring and other fields. However, dueto the raw data collected by RFID reader enter the middleware execute logic semanticcomposite is unreliable, leading to false detection of composite events frequentlyhindered the further development of RFID greatly. especially in the key application invarious fields, that once produced the false detection will cause great losses. For theabove, how process the false detection of the composite event accurately andefficiently become the focus of the RFID complex event processing.In this paper, we studies the causes of false detection of the composite event,considering the key applications to high data accuracy requirement, take fulladvantage of the rich semantics of high-level application logic, find among themultiple composite events exists exclusion constraints--that is, they cannot occursimultaneously in the same period of time. Thus, in this paper, propose a falsedetection approach of composite events based on exclusion constraints-ECCP, thetreatment is divided into four main steps:1. According to the type of key applicationin the field of application by domain experts to determine the important compositeevents and its corresponding exclusion constraints events, set up general exclusionconstraints table, and consider events incidence relative to cut general exclusionconstraints table;2. Constraints of the composite event, take important compositeevents registered as important query, take the corresponding exclusion constrainsevent registered as constraint query;3. Create two instance cache queue according tothe important query instance and constraints query, in preparation for the reliabilityverification of important query;4. Composite event query, using the improvedmatching tree model to query of composite events, when important query instanceproduced, constrained by mutually exclusive relationship, using the correspondingexclusion constraints query instances execute reliability verification, to determinewhether produce false detection.For those key applications that requires low time delay, as the above false detection approach ECCP make some improvements, proposed AECCP falsedetection approach, to make it suitable for low-latency key applications. Specificimprovement work is divided into two aspects:1. Consider the timeliness of keyapplication requirements, determine an optimal exclusion constraints event for eachcomposite event;2. Constraints important query, in the processing of the queryregistration and revocation, Considering between the important query and constraintsquery exist N:1mapping relationship, dynamic registration and cancellation of querymethod is proposed.At last, through experimental simulation to verify the validity and accuracy ofthe ECCP approach in key applications that demands high-accuracy data, in the keyapplications that demand for low latency, AECCP proved to be an efficient processingmethod.
Keywords/Search Tags:RFID technology, Key applications, Error detection for composite event, Exclusion constraints
PDF Full Text Request
Related items