Computer Science ›› 2021, Vol. 48 ›› Issue (8): 41-46.doi: 10.11896/jsjkx.200700093
• Database & Big Data & Data Science • Previous Articles Next Articles
DUAN Wen, ZHOU Liang
CLC Number:
[1]CAO W,JIANG P Y,LU P,et al.Real-time data-driven monitoring in job-shop floor based on radio frequency identification[J].International Journal of Advanced Manufacturing Technology,2017,92(5/6/7/8):2099-2120. [2]CAO W,JIANG P Y,JIANG K Y,et al.Radio frequency identification-based real-time data collecting and visual monitoring for discrete manufacturing workshop[J].Computer Integrated Manufacturing Systems,2017,23(2):273-284. [3]KAMALUDIN H,MAHDIN H,ABAWWAJY J H,et al.Filtering Redundant Data from RFID Data Streams[J].Journal of Sensors,2015,2016:1-7. [4]MA M,WANG P,CHU C H.Redundant Reader Elimination in Large-Scale Distributed RFID Networks[J].IEEE Internet of Things Journal,2018,5(2):884-894. [5]LIAO G Q,ZHOU J,HUI N,et al.Approximately Filtering Redundant Data for Uncertain RFID Data Streams[C]//IEEE International Conference on Mobile Data Management.IEEE,2017. [6]LIU L L,YUAN Z L,LIU X W,et al.RFID unreliable data filtering by integrating adaptive sliding window and Euclidean distance[J].Advances in Manufacturing,2014,2(2):121-129. [7]YOUSIF A,KAFAFY A,ABDLKADER H M.Reducing RFID Data Uncertainty using Mean Field Variational Inference[C]//2018 14th International Computer Engineering Conference (ICENCO).2018:131-136. [8]LIN Q M,XIAO Y,YE N,et al.A method of cleaning RFID data streams based on Naive Bayes classifier[J].International Journal of Ad Hoc & Ubiquitous Computing,2016,21(4):237. [9]MAHDIN H.A Review on Bloom Filter Based Approaches for RFID Data Cleaning[C]//First International Conference on Advanced Data and Information Engineering.2014:79-86. [10]BLOOM B H.Space/time trade-offs in hash coding with allowable errors[J].IPSJ Magazine,1970,12(7):422-426. [11]MOUSAVI N,TRIPUNITARA M.Constructing CascadeBloom Filters for Efficient Access Enforcement[J].Computers &Security,2019,81:1-14. [12]REVIRIEGO P,MARTINEZ J,PONTARELLI S.CFBF:Re-ducing the Insertion Time of Cuckoo Filters with an Integrated Bloom Filter[J].IEEE Communications Letters,2019,23(10):1857-1861. [13]LU J,YANG T,WANG Y,et al.Low Computational CostBloom Filters[J].IEEE/ACM Transactions on Networking,2018,26(5):2254-2267. [14]KLEYKO D,RAHIMI A,GAYLER R W,et al.AutoscalingBloom Filter:Controlling Trade-off Between True and False Positives[J].Neural Computing & Applications,2020,32:3675-3684. [15]LEE C H,CHUNG C W.An approximate duplicate elimination in RFID data streams[J].Data & Knowledge Engineering,2011,70(12):1070-1087. [16]WANG Y L,WANG C,JIANG X H,et al.RFID duplicate removing algorithm based on temporal-spatial Bloom filter[J].Journal of Nanjing University of Science and Technology,2015(3):253-259. [17]ZHU W L.Warehouse Package Longitudinal Positioning Based on RFID Data Redundancy Cleaning and Clustering[D].Chongqing:Chongqing University,2017. [18]HUANG W Q,ZHANG Y F,CAO Z W,et al.Redundant RFID Data Filtering Algorithm Research Based on Bloom Filter[J].Journal of Cyber Security,2019,4(3):93-105. [19]GUO D,WU J,CHEN H,et al.Theory and Network Applica-tions of Dynamic Bloom Filters[C]//Proceedings IEEE INFOCOM 2006,25th IEEE International Conference on Computer Communications.IEEE,2006:2849-2860. [20]XIE K,MIN Y H,ZHANG D F,et al.A Scalable Bloom Filter for Membership Queries[C]//IEEE Global Telecommunications Conference.IEEE,2007:543-547. |
[1] | LUO Wen-cong, ZHENG Jia-li, QUAN Yi-xuan, XIE Xiao-de, LIN Zi-han. Optimized Deployment of RFID Reader Antenna Based on Improved Multi-objective Salp Swarm Algorithm [J]. Computer Science, 2021, 48(9): 292-297. |
[2] | LI Li, ZHENG Jia-li, LUO Wen-cong, QUAN Yi-xuan. RFID Indoor Positioning Algorithm Based on Proximal Policy Optimization [J]. Computer Science, 2021, 48(4): 274-281. |
[3] | QUAN Yi-xuan, ZHENG Jia-li, LUO Wen-cong, LIN Zi-han, XIE Xiao-de. Improved Grey Wolf Optimizer for RFID Network Planning [J]. Computer Science, 2021, 48(1): 253-257. |
[4] | XU He, WU Man-xing, LI Peng. RFID Indoor Relative Position Positioning Algorithm Based on ARIMA Model [J]. Computer Science, 2020, 47(9): 252-257. |
[5] | LI Li,ZHENG Jia-li,WANG Zhe,YUAN Yuan,SHI Jing. RFID Indoor Positioning Algorithm Based on Asynchronous Advantage Actor-Critic [J]. Computer Science, 2020, 47(2): 233-238. |
[6] | FENG An-qi, QIAN Li-ping, HUANG Yu-pin, WU Yuan. RFID Data-driven Vehicle Speed Prediction Using Adaptive Kalman Filter [J]. Computer Science, 2019, 46(4): 100-105. |
[7] | HOU Pei-guo, WANG Zhi-xuan, YAN Chen. Improvement of Anti-collision Algorithm Based on RFID Tag [J]. Computer Science, 2019, 46(11A): 359-362. |
[8] | LI Lu-lu, DONG Qing-kuan, CHEN Meng-meng. Cloud-based Lightweight RFID Group Tag Authentication Protocol [J]. Computer Science, 2019, 46(1): 182-189. |
[9] | YANG Zi-wei, ZHENG Jia-li, YUE Shi-bin, YUAN Yuan, SHI Jing. New Q Value Anti-collision Algorithm Based on Label Grouping [J]. Computer Science, 2018, 45(9): 152-155. |
[10] | YAO Han-bing, XING Na-na, ZHOU Jun-wei and LI Yong-hua. Study on Secure Retrieval Scheme over Encrypted Data Supporting Result Ranking [J]. Computer Science, 2018, 45(5): 123-130. |
[11] | LIU Yao-zong, LIU Yun-heng. Security Provenance Model for RFID Big Data Based on Blockchain [J]. Computer Science, 2018, 45(11A): 367-368. |
[12] | GAN Yong, WANG Kai, HE Lei. New Ownership Transfer Protocol of RFID Tag [J]. Computer Science, 2018, 45(11A): 369-372. |
[13] | ZHANG Wen-bin, LI Er-tao, LI Fei, LI Yan-yan and ZHU Yi-hua. Negative Acknowledgement Based Data Delivery Scheme for WISP [J]. Computer Science, 2017, 44(Z6): 294-299. |
[14] | JIA Ning. Research and Implementation of Campus Education Interconnection System for Intelligent Terminal [J]. Computer Science, 2017, 44(Z11): 573-576. |
[15] | WANG Shan, SUN Li, WU Jie, FENG Feng and WANG Hong-wei. Research of Molecular Similarity Algorithm Based on Counting Bloom Filter [J]. Computer Science, 2017, 44(Z11): 552-556. |
|