An Effective Data Warehousing System for RFID using Novel Data Cleaning, Data Transformation and Loading Techniques
Journal: The International Arab Journal of Information Technology (Vol.9, No. 3)Publication Date: 2012-05-01
Authors : Barjesh Kochar; Rajender Singh Chhillar;
Page : 208-216
Keywords : Data warehousing system; data cleaning; data transformation; data loading; dirty data; radio frequency Identification (RFID); and suspicious tags;
Abstract
Nowadays, the vital parts of the business programs are the Data warehouses and the Data mining techniques. Especially these are vital in the RFID application which brings a revolution in business programs. Manufacturing, the logistics distribution and various stages of supply chains, retail store and quality management applications are involved in the RFID technology in business. A large volume of temporal and spatial data is generated by the ubiquitous computing and sensor networks of RFID and these are often generated with noises and duplicates. The noises and duplicates in the RFID data declare the need of an effective data warehousing system. The warehousing system has the responsibility to provide proper data cleaning technique to clean the dirty data which occurs in the applications. Also, the cleaned data has to be transformed and to be loaded properly so that they can be stored in the database with minimum space requirements. In this paper, we propose a novel data cleaning, transformation and loading technique which makes the data warehousing system employed for any RFID applications more effective. The chosen RFID application is tracking of goods in warehouses using RFID tags and readers, one of the significant RFID applications. The data cleaning is performed based on the probability of each RFID tag's response and the window size which is made adaptive. The window size changes on the basis of the occurrence of the dirty data and hence the cleaning is more effective. The purified data is transformed in a special structure in such a way that the ware house can have only the tag IDs which are under transaction and the time of interrogation in the size of bits. The transformed data are loaded into the warehouse using the proposed loading technique in a dedicated tabular format
Other Latest Articles
- A Cross-Layer Based Intrusion Detection Technique for Wireless Networks
- Privacy Preserving K-means Clustering: A Survey Research
- System Design and Implementation of TDMA-Based WiFi Network
- Designing an Intelligent Recommender System using Partial Credit Model and Bayesian Rough Set
- An Efficient Distributed Weather Data Sharing System Based on Agent
Last modified: 2019-05-06 20:53:08