Professional Documents
Culture Documents
Search
Free Online Articles Directory
Why Submit Articles? Top Authors Top Articles FAQ AB Answers Publish Article
Hello Guest
Home Page > C omputers > Information Technology > Control of Public Distribution System Using GPS, GIS, Remote SensingLogin Login
With Data Register
via & RFID
Mining
D
aahtW
R
tng
em
Sein
G
S
s,oItn
ePg
m
S,U
tysionibutirtsDiciPublofolC ront
D
R&
FIngn
M
ii
Posted: Oct 03, 2010 |C omments: 0 | Share 0 Like
Ads by Google
converted by Web2PDFConvert.com
mined objects and these are rules formulated by specialists and may not be completely appropriate. An example of a
characteristic rule is: A bridge is an object that is present at the location w here a road crosses a river. 3. Discriminatory Rules:
These are rules that aim to differentiate betw een groups of objects by finding features that are close to one cluster and far-
off from another. Such a rule is applied to find the differences betw een cities w ith high and low unemployment rates. 4.
Classification rules: These rules classify a pixel into one of the given set of classes, e. g. w ater, field, forest. IF population of
city = high AND economic pow er of city = high THEN unemployment of city is classified as" low ". 5. Clustering: Clustering
involves grouping pixels into similarity classes based on spectral characteristics. An example is to find clusters of cities w ith
similar levels of unemployment [3]. 6. Trend Detection: Trend detection refers to looking for similarity in prototype among the
mined objects. An example of trend detection may be as follow s: w hen moving aw ay from Brno, the unemployment rate
increases. 7. Sequential Pattern: These are used to detect sequences of events or values, such as stock and share values,
business transactions etc. w e can use Rule- and Motif-based Anomaly Detection in moving objects. Using this model object
trajectories are expressed using discrete pattern fragments called motifs [15, 16]. Associated features are extracted to form
a hierarchical feature space, w hich facilitates a multi-resolution view of the data. We can develop a general-purpose, rule
based classifier w hich explores the structured feature space and learns effective rules at multiple levels of
granularity. Compared to related w ork in classification or clustering of moving objects, Rule- and Motif-based Anomaly
Detection in moving objects incorporates a fuller feature space and examines more than just trajectories [17, 18]. At a high
level, Rule- and Motif-based Anomaly Detection in moving objects presents three novel features. 1. Motif-based feature
space: Instead of modeling w hole trajectories, w e partition them into fragments (motifs) and construct a multi-dimensional
feature space oriented on the motifs w ith associated attributes [15]. 2. Automated hierarchy extraction: By examining he
patterns in the trajectories, w e automatically derive hierarchies in the feature space. This yields a multi-resolution view of the
data [15]. 3. Hierarchical rule-based classifier: We develop a rule-based classifier w hich explores the hierarchical feature
space and finds the effective regions for classification [16]. The problem of anomaly detection in moving object data is defined
as follow s. The input data is a set of labeled trajectories: D = {(t1, c1), (t2, c2), . . .}, w here ti is a trajectory and ci is the
associated class label. A trajectory1 is a sequence of spatiotemporal records of a moving object, in GPS records. Each record
has the geographic location as w ell as a timestamp, and records can be made at arbitrary time intervals. The set of possible
class labels is C = {c1, c2, .}. In simple anomaly detection, there could just be tw o classes: cnormal and cabnormal.To learn a
function f w hich maps trajectories to class labels: f(t) ! c 2 C. f should be consistent w ith D as w ell as future trajectories not in
D[18]. In other w ords, w e w ant to learn a model w hich can classify trajectories as being normal or abnormal. E. RFID System
Most RFID systems consist of tags that are attached to the objects to be identified [8]. Each tag has its ow n "read-only" or
"rew rite" internal memory depending on the type and application. Typical configuration of this memory is to store product
information, such as an object's unique ID manufactured date, etc. The RFID reader generates magnetic fields that enable the
RFID system to locate objects [4,5 ] (via the tags) that are w ithin its range. The high-frequency electromagnetic energy and
query signal generated by the reader triggers the tags to reply to the query; the query frequency could be up to 50 times per
second. As a result communication betw een the main components of the system i.e. tags and reader is established. As a
result large quantities of data are generated. The RFID system consists of various components w hich are integrated in a
manner defined in the above section. This allow s the RFID system to deduct the objects (tag) and perform various operations
on it. The integration of RFID components enables the implementation of an RFID solution[ 9] . Fig:2 The RFID system
consists of follow ing five components Tag (attached w ith an object, unique identification).• Antenna (tag detector, creates
magnetic field). • Reader (receiver of tag information, manipulator). • Communication infrastructure (enable reader/RFID to
w ork through IT infrastructure). • Application softw are (user database/application/ interface).
III. PROPOSED MODEL Our proposed model is designed to satisfy the requirement of PDS using GPS, GIS, Remote
Sensing Method w ith RFID & data mining approach.Fig:3 1. The data of the product is stored in the tag w hich w ill be attached
to the product (eg: w hen the grain w as harvested and procured, how long the grain w as kept in w arehouse, packaging and
transportation details and point of sale information).2. GPS is used to track the product. RFID is used to Communication
betw een tagged objects and GPS [6], to ascertain and communicate current position and status of the product.3. Data sent
to servers on a regular basis, or w hen the object moves or upon request Satellite data coming from the netw orks captured at
SDC. It is an interface capable of capturing information flow ing from (such as netw ork card on a machine) satellite.4. Rule-
and Motif-based Anomaly Detection is used to track moving objects [15,16].The raw data storage store collected netw ork
data. Typically, it is a set of hard drives w here an application dumps information passing through the SDC, usually according to
some requirement.The Pre-processor handles the conversion of raw image or connection data image into a format that mining
algorithms utilize and may store the result in the know ledge base. It can perform a range of duties, such as additional
filtering, noise elimination, and include third party detection tool that recognize know n disaster pattern of track.
The know ledge base stores rule produced by mining and any additional information used in the mining process [16]. It may
also hold the information for the per-processor, such as patterns for recognizing attack and conversion templates.
The profiler is responsible for generating snapshot rule sets to be used for deviation analysis [2,3]. It can be triggered
automatically based on time of day or the amount of pre-processed data available.
The deviation analyzer examines rule sets in the know ledge base and creates a description of difference by meta-learning
[3]. The results are stored in the know ledge base for further reference. If necessary, it signals the alarm generator. A strategy
for invoking the deviation analyzer could be periodic queries to the know ledge base for the availability of new profile.
Alternatively, the profiler may signal the analyzer w hen new profile is deposited to the know ledge base.
The alarm generator is responsible for notifying the administrator w hen the deviation analyzer reports unusual pattern in the
movement of product.
IV.CONCLUSION The effective use and implementation of RFID, GPS & data mining techniques in PDS can facilitate PDS
supply chain and promise eradicating mismanagement, corruption, trafficking, theft and anti social elements. RFID provides
highly accurate and detailed information by capturing the data and information at each stage of the supply chain,
automatically. It also improves the safety and efficiency of the food supply chain. Locationing technology GPS can also be
combined w ith RFID technology to automatically track and record the information regarding the field w here the produce w as
picked, w hen and w here it w as transported and the current location of the produce. This also helps in reducing theft and
trafficking. Data mining techniques based on the rule base classification model is used to identify the suspicious moving
behavior of the objects.
V.REFERENCES
[1] Ester M., Kriegel H.-P., Sander J.: Spatial Data Mining: A Database Approach, Proc. 5th Int. Symposium on Large Spatial
converted by Web2PDFConvert.com
[1] Ester M., Kriegel H.-P., Sander J.: Spatial Data Mining: A Database Approach, Proc. 5th Int. Symposium on Large Spatial
Databases (SSD'97), Berlin, Germany, 1997, pp. 47-66. [2] Ester M., Gundlach S., Kriegel H.-P., Sander J.: Database Primitives
for Spatial Data Mining, Proc. 8. GI-Fachtagung Datenbanksysteme in Büro, Technik und W issenschaft (BTW '99) (Int. Conf. on
Databases in Office, Engineering and Science), Freiburg, Germany, 1999, pp. 137-150. [3] Ester M., Kriegel H.-P., Sander J.:
Know ledge Discovery in Spatial Databases, invited paper at 23rd German Conf. on Artificial Intelligence (KI '99), Bonn,
Germany, in: Lecture Notes in Computer Science, Vol. 1701, 1999, pp. 61-74. [4] J. Bohn, "Prototypical implementation of
location-aw are services based on a middlew are architecture for super-distributed RFID tag infrastructures", Pers Ubiquit
omputing, (2008) Journal 12:155-166. [5] J. Schw ieren1, G. Vossen, "A Design and Development Methodology for Mobile RFID
Applications based on the ID-Services Middlew are Architecture", IEEE Computer Society, (2009), Tenth International
Conference on Mobile Data Management: Systems, Service and Middlew are. [6] K. Ahsan, H. Shah, P. Kingston, "Context
Based Know ledge Management in Healthcare: An EA Approach", AMCIS 2009, Available at AIS library. [7] S. Garfinkel, B.
Rosenberg, "RFID Application, Security, and Privacy", USA, (2005), ISBN: 0-321-29096-8. [8] L. Srivastava, RFID: Technology,
Applications and Policy Implications, Presentation, International Telecommunication Union, Kenya, (2005). [9] Application
Notes, "Introduction to RFID Technology" CAENRFID: The Art of Identification (2008). [10] Jiaw ei Han, Micheline Kamber, "Data
Mining Concept and Techniques" Morgan Kaufmann Publisheres 2001 [11] Michael J.A.Berry, and Gordon S. Linoff, "Data
Mining Techniques: for marketing, sales, and customer support". Taiw an: SuperPoll.net, Inc. January [12] He-Hai
W u, Jian-Ya Gong, "Geographic Information Systems Spatial Data Structure and Process Technology". China: Surveying and
Draw ing Publisheres , April 1997. ISBN 7-5030-0937-3 [13] Peng Hu, Xing-Yuan Huang, Yi-Xin Hua, "Geographic Information
SystemsCourse". China: W uhan University Publisheres , February 2002. ISBN [14] H. Cao and O. Wolfson. Nonmaterialized
motion information in transport netw orks. In ICDT'05. [15] B. Chiu, E. Keogh, and S. Lonardi. Probabilistic discovery of time
series motifs. In KDD'03. [16] Fran¸cois Denis. Pac learning from positive statistical queries. In ALT'98. [17] L. Forlizzi, R. H.
G¨uting, E. Nardelli, and M. Schneider. A data model and data structures for moving objects databases. In SIGMOD'00. [18] S.
Gaffney and P. Smyth. Trajectory clustering w ith mixtures of regression models. In KDD'99.
(ArticlesBase SC #3393327)
Ads by Google
Master Data Distribution Increase ROI with Scalable Reusable SOA Infrastructure. Get The E-Kit!
web.progress.com/soa
Retail Security Help Secure Your Retail Store. Call ADT® at 1-888-742-5026 Today!
www.ADTBusiness.com/Retail
Source: http://www.articlesbase.com/information-technology-articles/control-of-public-distribution-system-using-gps-gis-remote-sensing-
with-data-mining-rfid-3393327.html
Article Tags: gis, gps, rfid, pds, remote sensing, spatial data mining
Easily Remove Belcaro GoldenRetriever - The Best Solution to Remove Belcaro GoldenRetriever
Does the horrible Belcaro GoldenRetriever on your computer driving you mad even if you have installed a Belcaro
GoldenRetriever remover and firewall? Do you want to remove Belcaro GoldenRetriever & malware completely because
you have found out that you personal information has been collected by someone secretly?
By: Lily C ole l C omputers > Information Technology l Dec 05, 2010
Easily Remove Barracuda Antivirus - The Best Solution to Remove Barracuda Antivirus
Does the horrible Barracuda Antivirus on your computer driving you mad even if you have installed a Barracuda Antivirus
remover and firewall? Do you want to remove Barracuda Antivirus & malware completely because you have found out
that you personal information has been collected by someone secretly?
converted by Web2PDFConvert.com
By: Lily C ole l C omputers > Information Technology l Dec 05, 2010
Easily Remove Badware Protector - The Best Solution to Remove Badware Protector
Does the horrible Badware Protector on your computer driving you mad even if you have installed a Badware Protector
remover and firewall? Do you want to remove Badware Protector & malware completely because you have found out that
you personal information has been collected by someone secretly?
By: Lily C ole l C omputers > Information Technology l Dec 05, 2010
Comment Body: *
Verification code:*
Need Help? Site Links Webmasters Business Info Find more articles, type your search... Search
C ontact Us Recent Articles RSS Builder Advertising
FAQ Top Authors RSS
Submit Articles Top Articles Link to Us
Editorial Guidelines Find Articles
Blog Site Map
Use of this web site constitutes acceptance of the Terms Of Use and Privacy Policy | User published content is licensed under a C reative C ommons License.
C opyright © 2005-2010 Free Articles by ArticlesBase.com, All rights reserved.
converted by Web2PDFConvert.com