IJIS  Vol.2 No.4 A , October 2012
RFID Complex Event Processing: Applications in Real-Time Locating System
ABSTRACT
Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP, which is based on the timed automata (TA) theory. By devising RFID locating application into complex events, we model the timing diagram of RFID data streams based on the TA. We optimize the constraint of the event streams and propose a novel method to derive the constraint between objects, as well as the constraint between object and location. Experiments prove the proposed method reduces the cost of RFID complex event processing, and improves the efficiency of the RTLS.

Cite this paper
Y. Liu, H. Zhang and Y. Wang, "RFID Complex Event Processing: Applications in Real-Time Locating System," International Journal of Intelligence Science, Vol. 2 No. 4, 2012, pp. 160-165. doi: 10.4236/ijis.2012.224021.
References
[1]   Y. GU, G. YU and T. C. Zhang, “RFID Complex Event Processing Techniques,” Journal of Computer Science and Frontiers, Vol. 1, No. 3, 2007, pp. 255-267.

[2]   C. Guo, K. Li, Y. Y. Wang, S. H. Liu and H. A. Wang, “A Location Index for Range Query in Real-Time Locating System,” Journal of Computer Research and Development, Vol. 48, No. 10, 2011, pp. 1908-1917.

[3]   F. S. Wang, S. R. Liu, P. Y. Liu, “Complex RFID Event Processing,” The VLDB Journal, Vol. 18, No. , 2009, pp. 913-931. doi:10.1007/s00778-009-0139-0

[4]   W. Yao, C.-H. Chu and Z. Li, “Leveraging Complex Event Processing for Smart Hospitals Using,” Journal of Network and Computer Applications, Vol. 34, No. 3, 2011, pp. 799-810. doi:10.1016/j.jnca.2010.04.020

[5]   D. C. Luckham, “The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems,” Addison-Wesley Long-man Publishing Co., Inc., Boston, 2001.

[6]   F. Fabret, H. Jaconsen, P. Lirbeta, K. Ross and D. Shasha, “Filtering Algorithm and Implementation for Very Fast Publish/Subscribe System,” Sigmod, Vol. 30, No. 2, 2001, pp. 115-126. doi:10.1145/375663.375677

[7]   E. Wu, Y. Diao and S. Rizvi, “High-Performance Complex Event Processing over Streams,” SIGMOD, Chicago, 27-29 June 2006, pp. 407-418. doi:10.1145/1142473.1142520

[8]   M. Altinel and M. Franklin, “Efficient Filtering of XML Documents for Selective Dissemination of Information,” Proceedings of the 26th International Conference on VLDB, Cairo, 10-14 September 2000, pp. 53-64.

[9]   SAX Project Organization, “SAX: Simple API for XML,” 2004. http://www.saxproject.org/

[10]   Y. Diao, M. Altinel, M. Franklin, H. Zhang and P. Fischer, “Path Sharing and Predicate Evaluation for High-Performance XML Filtering,” ACM Transactions on Database Systems, Vol. 28, No. 4, 2003, pp. 467-516. doi:10.1145/958942.958947

[11]   R. Alur, L. Fix and T. A. Henzinger, “Event-Clock Automata: A Determinizable Class of Timed Automata [C],” Proceeding of the 6th Annual Conference on Computer aided Veification (CAV). Lecture notes in computer science 818, Springer-Verlag, London, 1994, pp.1-13.

[12]   Y. Ping, L. Ning, W. Yue, “Intrusion Detection Based Timed Automata for Ad Hoc Networks,” Journal of Electronics & Information Technology, Vol. 31, No. 10, 2009, pp. 2310-2315.

[13]   L.-X. Li and Z. Jin, “Modeling and Verifying Services of Internet of Things Based on Timed Automata,” Chinese Journal of Computers, Vol. 34, No. 8, 2011, pp. 1366- 1377.

[14]   A. Repanovici, “Smart Library: RFID Implementation in Libraries [C],” Proceedings of the 8th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases, Cambridge, 21-23 February 2009, pp. 523-526.

[15]   Y. M. Nie, Z. H. Li and Q. Chen, “Enhanced Probabilistic Interpretation over Uncertain Radio Frequency Identification Data Streams,” Journal of Xi’an Jiaotong University, Vol. 45, No. 12, 2011, pp. 45-52.

 
 
Top