RFID Data Encoding Scheme in Supply Chain Management with Aid of Orthogonal Transformation and Genetic Algorithm (GA)


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


An RFID technology is most important process in supply chain management. In order to know the movements of products in supply chain management, an RFID tag is attached to a product. If the product with an RFID tag moves or stays near the detection region, RFID readers will detect RFID tags information. If the data volume gets increased, the processing of such RFID data becomes complex and hence storing and retrieving data to be very challenging. Nowadays, the RFID data related research works, the complexity reduction on processing such RFID data remains a big challenge. Hence to avoid such negative aspects a new RFID data encoding scheme is proposed in the supply chain management. To reduce the complexity of the processing the RFID data’s, or proposed method utilizing orthogonal transformation and optimization model during the raw data processing. Initially, the RFID data to be processed by the orthogonal transformation and that the data’s are optimally clustered by the well renowned optimization technique is named as GA. After that, the clustered data’s are encoded by exploiting the path encoding and order encoding schemes. Based on the path encoding scheme and the order encoding scheme, we devise a storage scheme that can process tracking queries and path oriented queries efficiently on an RDBMS. Finally, we propose a method that translates the queries to SQL queries. The proposed method is implemented and the queries are efficiently retrieved and the results are compared against the conventional RFID path encoding scheme.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


RFID; Supply Chain Management; Genetic Algorithm (GA); Orthogonal Transformation; Clustering

Full Text:

PDF


References


Subhash P.Chavan, “Use of RFID Technology in Libraries”, Online International Interdisciplinary Research Journal, Vol. 2, No. 4, pp. 235-241, 2012.

Ononiwu G. Chiagozie and Okorafor G. Nwaji, “Radio Frequency Identification (RFID) Based Attendance System with Automatic Door Unit”, Academic Research International, Vol. 2, No. 2, pp. 168-183, 2012.

George Roussos and Vassilis Kostakos, “RFID in pervasive computing: State-of-the-art and outlook”, Pervasive and Mobile Computing, Vol. 5, pp. 110–131, 2009.

Mikko Lehtonen, Antti Ruhanen, Florian Michahelles, and Elgar Fleisch, “Serialized TID Numbers A Headache or a Blessing for RFID Crackers?”, IEEE International Conference on RFID, pp.233- 240, 2009.

Amir N. Shamdani and Barbara J. Nicolai,“Applications of RFID in Incident Management”, The Seventh International Multi-Conference on Computing in the Global Information Technology, pp. 34-39, 2012.

Verma, Jyoti and Malviya and Vijetacharya, “RFID in Libraries: An Overview”, Open Access Online LIS Journals, Vol. 1, No-5, pp. 1-9, May, 2011.

Ted Phillips, Tom Karygiannis and Rick Kuhn, “Security standards for the RFID market”, IEEE Security & Privacy, Vol. 3, No. 6, pp. 85- 89, 2005.

“RFID Applications: An Introductory and Exploratory Study”, International Journal of Computer Science Issues, Vol. 7, No. 3, January 2010.

Jingfeng Xia, "Library space management: a GIS proposal", Library Hi Tech, Vol. 22, No. 4, pp.375 – 382, 2004.

SonalSood and Meena Malik, “Benefits and Applications of RFID Based Inventory Systems”, International Journal of Research in Engineering & Applied Sciences, Vol. 2, No. 2,pp. 1586-1594, 2012.

GhouseModin N. Mamdapur and Iqbalahmad U. Rajgoli, “Implementing radio frequency identification technology in libraries: Advantages and disadvantages”, International Journal of Library and Information Science, Vol. 3, No. 3, pp. 46-57, March 2011.

Shien-Chiang Yu, “RFID implementation and benefits in libraries”, The Electronic Library, Vol. 25 No. 1, pp. 54-64, 2007.

Paul Golding and Vanesa Tennant, “Evaluation of a Radio Frequency Identification (RFID) Library System: Preliminary Results”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 1, pp. 1-18, January 2008.

Kamran Ahsan, Hanifa Shah and Paul Kingston, “RFID Applications: An Introductory and Exploratory Study”, International Journal of Computer Science Issues, Vol.7,No.3, pp. 1-17, January2010

George Roussos, “Computing with RFID: Drivers, Technology and Implications”, Advances in Computers, Vol. 73, pp. 161–217, 2008.

Prapassara Pupunwiwat and Bela Stantic, “Location Filtering and Duplication Elimination for RFID Data Streams”, International Journal of Principles and Applications of Information Science and Technology, Vol.1, No.1, pp. 29-43, 2007.

Tao Li, Wen Luo, Zhen Mo and Shigang Chen, “Privacy-preserving RFID Authentication based on Cryptographical Encoding” In proceedings of IEEE Infocom, pp. 2174- 2182, 2012

John Curtin, Robert J. Kauffman and Frederick J. Riggins “Making the ‘MOST’ out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID”, Information Technology and Management, Vol. 8, No. 2, pp 87-110, 2007.

Michael Luck, Peter McBurney and Chris Preist, “A Manifesto for Agent Technology: Towards Next Generation Computing”, Autonomous Agents and Multi-Agent Systems, Vol.9, No. 3, pp 203-252, 2004.

Elisabeth Ilie-Zudor, Zsolt Kemeny, Peter Egri and Laszlo Monostori, “The RFID Technology And Its Current Applications”, In proceedings of the Modern Information Technology in the Innovation Processes of the Industrial Enterprises, pp.29-36, 2006.

Chun-Hee Lee and Chin-Wan Chung, “An approximate duplicate elimination in RFID data streams”, Data & Knowledge Engineering, Vol. 70, No. 12, pp. 1070–1087, 2011.

Chun-Hee Lee and Chin-Wan Chung, “RFID Data Processing in Supply Chain Management Using a Path Encoding Scheme”, IEEE Transactions on Knowledge and Data Engineering, Vol. 23, No. 5, pp. 742-758, 2011.

Mandeep Kaur, Manjeet Sandhu, Neeraj Mohan and Parvinder S. Sandhu, “RFID Technology Principles, Advantages, Limitations & Its Applications”, International Journal of Computer and Electrical Engineering, Vol.3, No.1, pp. 151-157, 2011.

Yung-YiWang and Jiunn-Tsair Chen, “A Base band Signal Processing Scheme for Joint Data Frame Synchronization and Symbol Decoding for RFID Systems”, Journal on Advances in Signal Processing, Vol. 2010, pp. 1-11, 2010.

Gao, Y., Luo, J., Geotechnical engineering reliability analysis using genetic algorithm, (2011) International Review on Computers and Software (IRECOS), 6 (7), pp. 1241-1245.

Yang, L., An improvement anti-collision scheme for RFID reader based on pluse algorithm, (2012) International Review on Computers and Software (IRECOS), 7 (1), pp. 382-386.

Tang, Z.-H., Li, R.-J., Mobile data mining based on trajectories clustering, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 601-605.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize