RFID data management and frequent path mining

Pao Yue-kong Library Electronic Theses Database

RFID data management and frequent path mining

 

Author: Wang, Wenjing
Title: RFID data management and frequent path mining
Degree: M.Sc.
Year: 2013
Subject: Radio frequency identification systems.
Hong Kong Polytechnic University -- Dissertations
Department: Dept. of Computing
Pages: iv, 112 leaves : ill. ; 30 cm.
Language: English
InnoPac Record: http://library.polyu.edu.hk/record=b2578648
URI: http://theses.lib.polyu.edu.hk/handle/200/6896
Abstract: RFID technology today has been more and more widely used in many kinds of industries. The multiple functions of it has made it a very practical tool in tracking targets, recording and storing a large amount of data, especially in the logistics and supply chain management applications and all kinds of E-commerce occasions. However, how does a RFID system be formed and how to handle those data is a troubling problem now for us. According to the characteristics and the storage models of the RFID data we get from the analysis we can get the right way to mine the potential information from the data. And due to the capturing and recording function of RFID towards the moving target objects we get many RFID data in the path format. Those sequential path data from the commodities' movements, moving track of transportations and walking paths of customers are very common in the modern E-commerce and possessing a lot of useful hidden knowledge for us. Among the knowledge we should notice that the frequent paths or more professionally, the frequent patterns are quite meaningful to mining. So mining the frequent path can be called the most essential and necessary job in the whole RFID data mining task. From both traditional and improved algorithms we can get the final frequent path in this article.

Files in this item

Files Size Format
b25786489.pdf 1.957Mb PDF
Copyright Undertaking
As a bona fide Library user, I declare that:
  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

     

Quick Search

Browse

More Information