5 research outputs found

    Missing tags detection algorithm for radio frequency identification (RFID) data stream

    Get PDF
    RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. Nowadays, RFID system is rapidly become more common in our live because it cheaper and smaller to be track, trace and identify the items. However, missing tag detection in RFID can occur due to RFID operating environment such as signal collisions and interferences. Missing tags also called as false negative reads is a tag that is present but it cannot be read by the nearby reader. The consequences of this problem can be enormous to business, as it will cause the system to report incorrect data due to an incorrect number of tags being detected. In fact, the performance of RFID missing tag detection is largely affected by uncertainty, which should be considered in the detecting process phase to minimize its negative impact. Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). AC complement algorithm was used to compare the different in each set of data. Meanwhile, DFR algorithm was used to identify the false negative read that present in the set of data. There are many approaches has been proposed to include Window Sub-range Transition Detection (WSTD), Efficient Missing-Tag Detection Protocol (EMD) and Multi-hashing based Missing Tag Identification (MMTI) protocol. This algorithm development has been guided by methodology in four stages. There stages including data preparation, simulation design, detecting false negative read strategy and performance measurement. MTDA can perform well in detecting false negative read with 100% detected in 3.25 second. This performance shows that the algorithm performs well in execution time in detecting false negative reads. In conclusion, it will give insight on the current challenges and open up to new solution to solve the problem of missing tag detection

    Query-Adaptive Reciprocal Hash Tables for Nearest Neighbor Search

    Full text link
    © 1992-2012 IEEE. Recent years have witnessed the success of binary hashing techniques in approximate nearest neighbor search. In practice, multiple hash tables are usually built using hashing to cover more desired results in the hit buckets of each table. However, rare work studies the unified approach to constructing multiple informative hash tables using any type of hashing algorithms. Meanwhile, for multiple table search, it also lacks of a generic query-adaptive and fine-grained ranking scheme that can alleviate the binary quantization loss suffered in the standard hashing techniques. To solve the above problems, in this paper, we first regard the table construction as a selection problem over a set of candidate hash functions. With the graph representation of the function set, we propose an efficient solution that sequentially applies normalized dominant set to finding the most informative and independent hash functions for each table. To further reduce the redundancy between tables, we explore the reciprocal hash tables in a boosting manner, where the hash function graph is updated with high weights emphasized on the misclassified neighbor pairs of previous hash tables. To refine the ranking of the retrieved buckets within a certain Hamming radius from the query, we propose a query-adaptive bitwise weighting scheme to enable fine-grained bucket ranking in each hash table, exploiting the discriminative power of its hash functions and their complement for nearest neighbor search. Moreover, we integrate such scheme into the multiple table search using a fast, yet reciprocal table lookup algorithm within the adaptive weighted Hamming radius. In this paper, both the construction method and the query-adaptive search method are general and compatible with different types of hashing algorithms using different feature spaces and/or parameter settings. Our extensive experiments on several large-scale benchmarks demonstrate that the proposed techniques can significantly outperform both the naive construction methods and the state-of-the-art hashing algorithms
    corecore