Data Management Issues in RFID Applications

Data Management Issues in RFID Applications

A. Anny Leema (B. S. Abdur Rahman University, India) and M. Hemalatha (Karpagam University, India)
Copyright: © 2015 |Pages: 20
DOI: 10.4018/978-1-4666-6308-4.ch009
OnDemand PDF Download:
No Current Special Offers


Radio Frequency Identification (RFID) refers to wireless technology that uses radio waves to automatically identify items within a certain proximity. It is being widely used in various applications, but there is reluctance in the deployment of RFID due to the high cost involved and the challenging problems found in the observed colossal RFID data. The obtained data is of low quality and contains anomalies like false positives, false negatives, and duplication. To enhance the quality of data, cleaning is the essential task, so that the resultant data can be applied for high-end applications. This chapter investigates the existing physical, middleware, and deferred approaches to deal with the anomalies found in the RFID data. A novel hybrid approach is developed to solve data quality issues so that the demand for RFID data will certainly grow to meet the user needs.
Chapter Preview

Radio Frequency Identification

Radio frequency identification technology (RFID) has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID tags are broadly classified as active and passive tags. The comparison between Active tag and passive tag is depicted in Table 1. Active tag has internal power source and the written data on the tag can be modified or rewritten. It is of high cost and less life duration when compared to the passive tag. Passive tag has its own demand because of its long life duration and less cost. It doesn’t have an internal power source and it depends upon the reader to get energized. It is smaller and lighter than active tags but has a shorter communication range and requires a high powered reader. Tag with passive type is composed of three parts: comprises an antenna, part of semiconductor chip attached to the antenna, and also has some form of encapsulation. The tag comes in a variety of capabilities which includes read-only and read-write. (Chatterjee & Timande, 2012) says the tag reader is responsible for powering and communicating with a tag. The RFID Reader is used to interrogate the zone to discover tags within proximity of the reader range (Chen, 2006). Once the tag is discovered, captures its identification along with the reader’s ID and the timestamp of the observation are also recorded. All this information is then passed through the Middleware where initial filtration is done to avoid data anomalies being recorded. Then finally, collected information will then be processed and stored within a database ready to be queried for future analysis.

Complete Chapter List

Search this Book: