Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2017, Article ID 3186482, 11 pages
https://doi.org/10.1155/2017/3186482
Research Article

VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

1School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
2Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China
3Information Security Group, Royal Holloway, University of London, Surrey TW200EX, UK

Correspondence should be addressed to He Xu; nc.ude.tpujn@ehux

Received 9 February 2017; Revised 24 May 2017; Accepted 22 June 2017; Published 27 July 2017

Academic Editor: Nashwa El-Bendary

Copyright © 2017 He Xu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. T. Mulani and V. P. Pingle, “Internet of Things,” International Research Journal of Multidisciplinary Studies, vol. 2, no. 1, pp. 1–4, 2016. View at Google Scholar
  2. Y. Kong, M. Zhang, and D. Ye, “A belief propagation-based method for task allocation in open and dynamic cloud environments,” Knowledge-Based Systems, vol. 115, pp. 123–132, 2017. View at Publisher · View at Google Scholar
  3. J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud data,” IEEE Transactions on Information Forensics and Security. View at Publisher · View at Google Scholar
  4. M. Díaz, C. Martín, and B. Rubio, “State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing,” Journal of Network and Computer Applications, vol. 67, pp. 99–117, 2016. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, “A secure cloud-assisted urban data sharing framework for ubiquitous-cities,” Pervasive and Mobile Computing. View at Publisher · View at Google Scholar
  6. S. F. Wamba, A. Anand, and L. Carter, “RFID applications, issues, methods and theory: a review of the AIS basket of TOP journals,” Procedia Technology, vol. 9, pp. 421–430, 2013. View at Publisher · View at Google Scholar
  7. J. Zhang, G. Tian, A. Marindra, A. Sunny, and A. Zhao, “A review of passive RFID tag antenna-based sensors and systems for structural health monitoring applications,” Sensors, vol. 17, no. 2, article 265, 2017. View at Publisher · View at Google Scholar
  8. Q. Liu, W. Cai, J. Shen, Z. Fu, X. Liu, and N. Linge, “A speculative approach to spatial‐temporal efficiency with multi‐objective optimization in a heterogeneous cloud environment,” Security and Communication Networks, vol. 9, no. 17, pp. 4002–4012, 2016. View at Publisher · View at Google Scholar
  9. C. Zhao, C. Wu, J. Chai et al., “Decomposition-based multi-objective firefly algorithm for RFID network planning with uncertainty,” Applied Soft Computing, vol. 55, pp. 549–564, 2017. View at Publisher · View at Google Scholar
  10. R. Derakhshan, M. F. Orlowska, and X. Li, “RFID data management: challenges and opportunities,” in Proceedings of the IEEE International Conference on RFID, pp. 175–182, Grapevine, Tex, USA, March 2007. View at Publisher · View at Google Scholar
  11. J. Zhu, J. Huang, D. He, Y. Leng, and S. Xiao, “The design of RFID middleware data filtering based on coal mine safety,” in Proceedings of the Second International Conference on Communications, Signal Processing, and Systems (CSPS), vol. 246 of Lecture Notes in Electrical Engineering, pp. 859–867, Springer, Tianjin, China, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. B. Gao, The Research of Algorithm for Uncertain RFID Data Cleansing [Master's, thesis], Nanjing University of Information Science and Technology, Nanjing, China, 2015.
  13. F. Abdul Rahman, M. Desa I, A. Wibowo, and N. Abu Haris, “Antoni wibowo and norhaidah abu haris, data cleaning in knowledge discovery database (KDD)-data mining,” in Proceedings of the International Conference on Advance in Computer Science and Electronics Engineering (CSEE '14), pp. 4–10, New Delhi, India, February 2014.
  14. M. A. Ramadan, A. I. El Seddawy, and A. S. El Rawas, “The impact of total quality management using data mining on the integrated innovation management in smart education,” International Journal of Scientific and Research Publications, vol. 5, no. 5, pp. 1–6, 2015. View at Google Scholar
  15. C. C. Aggarwal and J. Han, “A survey of RFID data processing,” in Managing and Mining Sensor Data, pp. 349–382, Springer-Verlag, New York, NY, USA, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Liu, H. Zhang, L. Zhang, and X. Xu, “Measuring the uncertainty of RFID data streams,” Journal of Computational Information Systems, vol. 11, no. 6, pp. 2181–2187, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. Z. Zhao and W. Ng, “A model-based approach for RFID data stream cleansing,” in Proceedings of the 21st ACM International Conference on Information and Knowledge Management (CIKM '12), pp. 862–871, New York, NY, USA, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Gu, G. Yu, X.-L. Hu, and Y. Wang, “Efficient RFID data cleaning model based on dynamic clusters of monitored objects,” Journal of Software, vol. 21, no. 4, pp. 632–643, 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. H. Mahdin and J. Abawajy, “An approach to filtering RFID data streams,” in Proceedings of the 10th International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN '09), pp. 742–746, Kaohsiung, Taiwan, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. Z. Hongsheng, T. Jie, and Z. Zhiyuan, “Limitation of RFID data cleaning method—SMURF,” in Proceedings of the IEEE International Conference on RFID-Technologies and Applications (RFID-TA '13), 4, p. 1, Johor Bahru, Malaysia, September 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Bai, F. Wang, and P. Liu, “Efficiently filtering RFID data streams,” in Proceedings of the 1st International VLDB Workshop on Clean Databases (CleanDB '11), pp. 1–8, Seoul, Korea, September 2006.
  22. S. R. Jeffery, G. Alonso, M. J. Franklin, W. Hong, and J. Widom, “A pipelined framework for online cleaning of sensor data streams,” in Proceedings of the 22nd International Conference on Data Engineering (ICDE '06), pp. 1–12, Altanta Georgis, Ga, USA, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  23. H. Gonzalez, J. Han, and X. Shen, “Cost-conscious cleaning of massive RFID data sets,” in Proceedings of the 23rd International Conference on Data Engineering (ICDE '07), pp. 1268–1272, Istanbul, Turkey, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  24. Y. Wang, B.-Y. Song, H. Fu, and X.-G. Li, “Cleaning method of RFID data stream based on kalman filter,” Journal of Chinese Computer Systems, vol. 32, no. 9, pp. 1794–1799, 2011. View at Google Scholar
  25. S. R. Jeffery, M. Garofalakis, and M. J. Franklin, “Adaptive cleaning for RFID data streams,” in Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB '06), pp. 163–174, Seoul, Korea, September 2006. View at Scopus
  26. Y. Chen, C. Hao, W. Wu, and E. Wu, “Robust dense reconstruction by range merging based on confidence estimation,” Science China Information Sciences, vol. 59, no. 9, Article ID 092103, 2016. View at Publisher · View at Google Scholar
  27. A. F. C. Errington, B. L. F. Daku, and A. F. Prugger, “Initial position estimation using RFID tags: a least-squares approach,” IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 11, pp. 2863–2869, 2010. View at Publisher · View at Google Scholar · View at Scopus
  28. J. Dou, F. Zou, and F. Chen, “Application of the central limit theorem,” Aisa-Pacific Education, vol. 3, no. 1, pp. 138-139, 2016. View at Google Scholar
  29. N. Dhama and M. Sharma, “An improved algorithm for reducing false and duplicate readings in RFID data stream based on an adaptive data cleaning scheme,” International Journal of Computer Trends and Technology, vol. 4, no. 4, pp. 944–950, 2013. View at Google Scholar