You are on page 1of 4

Find more articles, type your search...

Search
Free Online Articles Directory
Why Submit Articles? Top Authors Top Articles FAQ AB Answers Publish Article

Hello Guest
Home Page > C omputers > Information Technology > Control of Public Distribution System Using GPS, GIS, Remote SensingLogin Login
With Data Register
via & RFID
Mining

D
aahtW
R
tng
em
Sein
G
S
s,oItn
ePg
m
S,U
tysionibutirtsDiciPublofolC ront
D
R&
FIngn
M
ii
Posted: Oct 03, 2010 |C omments: 0 | Share 0 Like

Ads by Google

Malware Removal Download w w w .pctools.com


Free Malw are & Spyw are scan. W inner of Best Anti-Malw are. Rated 5 Stars

SPSS Data Mining Paper w w w .cognos.com/SPSS_data_mining


Learn The Top 3 Keys To Data Mining In This Free SPSS W hite Paper Now .

Author Box Syndicate this Article


Kathiresan & I.Introduction <h1>C ontrol of Public Distribution System
Ranjithakumari Public distribution system (PDS), a major instrument of the Indian Using GPS, GIS, Remote Sensing With Data
has 2 articles Mining & RFID</h1>
online government's economic policy, procures and distributes major <p><strong>By: <a
commodities such as w heat, rice, sugar and kerosene to a large number href="http://www.articlesbase.com/authors/kath
C ontact Author of people living in India through Fair Price Shops (FPS). It also ensures the availability of food to the general
iresan-ranjithakumari/242197" public at
title="Kathiresan
Subscribe to RSS affordable price. It helps in eradicating poverty and intends to serve as a safety & Ranjithakumari's
net for the 330Articles">Kathiresan
million Indian poor& people,
w ho are nutritionally at risk. PDS is one of the largest supply chain netw orks Ranjithakumari</a></strong><p>
in the w orld w ith 4.99 lakh Fair Price Shops (FPS)
Print article <div class="KonaBody">
and is operated under the joint responsibility of the central and the state government. PDS supply chain consists of
<p><strong>&nbsp;</strong></p>
Send to friend several central and state government bodies, private industries, farmers, w arehouses and transportation agencies. Central
<p><strong>I.<strong>Introduction&nbsp;</st
and state government is responsible for procurement, storage, transportation and distribution of products. Though the PDS
rong></strong><br>&nbsp;&nbsp;&nbsp;&nbsp
Re-Publish article
supply chain provides food to vast majority of the Indian population, w e should ;&nbsp;
acceptPublic
the distribution
fact that thesystem
w hole (PDS),
chaina is
exploited by mismanagement, corruption and anti-social elements. Thoughmajor enough instrument
produceofarethe procured
Indian government's
and distributed
Articles Categories economic policy, procures and distributes major
by PDS, the beneficiaries often find difficulties in getting w hat they are entitled to. This mismanagement and corruption is the
commodities such as wheat, rice, sugar and
All C ategories indicator of inefficiency in PDS supply chain and distribution systems. In orderkerosene
to overcome thesenumber
to a large deficiency, in this
of people paper
living in w e
have suggested a model using GPS, GIS, Spatial data mining techniques & RFID [1,through
India 7, 14].Fair
ThePrice
use Shops
of these technologies
(FPS). It also
C omputers
could help PDS to curtail. II.Technologies ensures the availability of food to the general
C omputer Forensics public at affordable price. It helps in eradicating
A. Global Positioning Sy stem (GPS) GPS, short for Global Positioning System, poverty and intends
is a means to serve any
for locating as a point
safetyon
netthe
for
C omputer Games
the 330 million Indian poor people, who are
Data Recovery earth[13]. It has many uses; navigation, surveying, vehicle tracking, hiking and outdoor recreation just to name a few . In the
nutritionally at risk. PDS is one of the largest
1970s the Department of Defense (DoD) conceived the idea of GPS. It w as born from
supply a need
chain to accurately
networks determine
in the world with 4.99 the
Databases
position of ballistic missile submarines prior to launching missiles. All the old methods of determining
lakh Fair Price Shops (FPS)position had their flaw s.
and is operated
E-Learning Those methods w ere affected by atmospheric conditions, limited in range, subject under totheenemy
joint responsibility
jamming, orofdegraded
the centralby
and
File Types interference.The GPS system is made of 24 NAVSTAR satellites and five ground thestations.
state The ground stations are responsible
government.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Hardware for keeping the satellites in precise orbit. The DoD placed each of the 24 satellites in a precise orbit at an altitude of 10,900
&nbsp;PDS supply chain consists of several
miles. Each satellite w eighs tw o tons, is 18.5 feet long, and orbits the earth in a littleand
central less than
state 12 hours.bodies,
government FIG: 1private
show s the
Information Technology
w orking of GPS. industries, farmers, warehouses and
Intra-net transportation agencies. C entral and state
Laptops B. A Geographic Inform ation Sy stem (GIS) It is a tool that uses the pow er government is responsible
of the computer to poseforand
procurement,
answ er
geographic questions. The user guides the program to arrange and display data storage, transportation
about places on theandplanet
distribution
in a of
variety of
Networks products. Though the PDS supply chain provides
w ays - including maps, charts and tables. The hardw are and softw are allow s food
the users to see and interact w ith data in new
to vast majority of the Indian population,
Operating Systems
w ays by blending electronic maps and databases to generate color-coded displays. Users
we should canthe
accept zoom
fact in
thatand
theout of maps
whole chain isfreely;
Programming add layers of new data, and study detail and relationships [12, 13]. exploited by mismanagement, corruption and
Security anti-social elements.&nbsp;&nbsp;&nbsp;&nbsp;
Software C. Rem ote sensing It is the science and art of obtaining information about aThoughphenomenonenough produce
w ithoutare procured
being and w ith
in contact
distributed by PDS, the beneficiaries often find
it[12]. Remote sensing deals w ith the detection and measurement of phenomena w ith devices sensitive to electromagnetic
difficulties in getting what they are entitled to.
energy such as: Light (cameras and scanners) Heat (thermal scanners) RadioThis Waves (radar).
mismanagement and corruption is the
Ads by Google GIS and remote sensing both are correlated to each other. W ithout remote sensing,indicatorGIS is nothing inbecause
of inefficiency PDS supply GISchain
usedand Remote
distribution
sensing data. In GIS, there are tw o uses of use of remote sensing data; as classified systems.
data and as In image
order todata.
overcomeRemote
Sensing is defined as the science and technology by w hich the characteristicsthese deficiency,
of objects in this paper
of interest can be weidentified,
have
suggested a model using GPS, GIS, Spatial data
measured or analyzed the characteristics w ithout direct contact. mining techniques &amp; RFID [1, 7, 14]. The
Electro-magnetic radiation, w hich is reflected or emitted from an object, use
is the usualtechnologies
of these source of remotecould helpsensing
PDS todata.
How ever any media such as gravity or magnetic fields can be utilized in remote sensing.
curtail. &nbsp; A device to detect the electro-
magnetic radiation reflected or emitted from an object is called a "remote sensor"<strong>II.Technologies</strong><strong>&nb
or "sensor". Cameras or scanners are
examples of remote sensors. A vehicle to carry the sensor is called a "platform". sp;</strong><strong>&nbsp;</strong>
Aircraft or satellites are used as platforms.
<strong>&nbsp;</strong>&nbsp;</p>
D.Spatial data m ining The remote sensing concept is illustrated in figure 2<p><strong><em>A.
w here three different objects are measured by
Global Positioning System
a sensor in a limited number of bands w ith respect to their, electro-magnetic Spatial data mining, i.e., extracting useful
(GPS)</em><em>&nbsp;</em>GPS</strong>,
information from huge amounts of data, is highly relevant to applications in wshorthich the tremendous
for Global PositioningdataSystem,
volumes is aare involved
means
for locating
[1], thus exceeding human analytical capabilities. Data mining is no longer restricted any relational
to the point on thedatabases
earth[13]. alone.
It has
Spatial data mining is proving to be a promising technique, and holds the keymany uses; navigation,
to solving surveying,issues
several challenging vehicleconcerning
tracking, hiking and outdoor recreation just to
spatial databases [2]. Data Mining offers intelligent functionalities and w orks name
w ell wa ith complicated algorithms, such as, neural
few. In the 1970s the Department of
netw orks, rule induction, decision trees, and genetic algorithms and constantly updates
Defense (DoD) its conceived
models based on of
the idea self-
GPS. It
learning[10]. Some of the w idely accepted and applied methodologies of spatial was data
born mining include
from a need Association
to accurately Rules,
determine
Characteristic Rules, Discriminated Rules, Classification, Clustering and Trend the position[11].The
Detection of ballisticfollow
missileingsubmarines
sentencesprior briefly
illustrate the aforesaid data mining methodologies. 1. Association Rules: The to launching
notion missiles. All
of association the old
rules w asmethods
put forw ofard by
determining position had their flaws. Those
Agraw al etal. [1993] in a study of mining large transaction databases. The structure of an association rule is: A B(c %), w here
methods were affected by atmospheric
A and B are predicate sets and c% is the confidence level. For instance, an example
conditions, association
limited in rule
range, is:subject
If the city is large, the
to enemy
probability of its being near to a river is 80%. 2. Characteristic Rules: These are rules concerning
jamming, or degradedthe characteristics of
by interference.The GPSthe
system is made of 24 NAVSTAR satellites and

converted by Web2PDFConvert.com
mined objects and these are rules formulated by specialists and may not be completely appropriate. An example of a
characteristic rule is: A bridge is an object that is present at the location w here a road crosses a river. 3. Discriminatory Rules:
These are rules that aim to differentiate betw een groups of objects by finding features that are close to one cluster and far-
off from another. Such a rule is applied to find the differences betw een cities w ith high and low unemployment rates. 4.
Classification rules: These rules classify a pixel into one of the given set of classes, e. g. w ater, field, forest. IF population of
city = high AND economic pow er of city = high THEN unemployment of city is classified as" low ". 5. Clustering: Clustering
involves grouping pixels into similarity classes based on spectral characteristics. An example is to find clusters of cities w ith
similar levels of unemployment [3]. 6. Trend Detection: Trend detection refers to looking for similarity in prototype among the
mined objects. An example of trend detection may be as follow s: w hen moving aw ay from Brno, the unemployment rate
increases. 7. Sequential Pattern: These are used to detect sequences of events or values, such as stock and share values,
business transactions etc. w e can use Rule- and Motif-based Anomaly Detection in moving objects. Using this model object
trajectories are expressed using discrete pattern fragments called motifs [15, 16]. Associated features are extracted to form
a hierarchical feature space, w hich facilitates a multi-resolution view of the data. We can develop a general-purpose, rule
based classifier w hich explores the structured feature space and learns effective rules at multiple levels of
granularity. Compared to related w ork in classification or clustering of moving objects, Rule- and Motif-based Anomaly
Detection in moving objects incorporates a fuller feature space and examines more than just trajectories [17, 18]. At a high
level, Rule- and Motif-based Anomaly Detection in moving objects presents three novel features. 1. Motif-based feature
space: Instead of modeling w hole trajectories, w e partition them into fragments (motifs) and construct a multi-dimensional
feature space oriented on the motifs w ith associated attributes [15]. 2. Automated hierarchy extraction: By examining he
patterns in the trajectories, w e automatically derive hierarchies in the feature space. This yields a multi-resolution view of the
data [15]. 3. Hierarchical rule-based classifier: We develop a rule-based classifier w hich explores the hierarchical feature
space and finds the effective regions for classification [16]. The problem of anomaly detection in moving object data is defined
as follow s. The input data is a set of labeled trajectories: D = {(t1, c1), (t2, c2), . . .}, w here ti is a trajectory and ci is the
associated class label. A trajectory1 is a sequence of spatiotemporal records of a moving object, in GPS records. Each record
has the geographic location as w ell as a timestamp, and records can be made at arbitrary time intervals. The set of possible
class labels is C = {c1, c2, .}. In simple anomaly detection, there could just be tw o classes: cnormal and cabnormal.To learn a
function f w hich maps trajectories to class labels: f(t) ! c 2 C. f should be consistent w ith D as w ell as future trajectories not in
D[18]. In other w ords, w e w ant to learn a model w hich can classify trajectories as being normal or abnormal. E. RFID System
Most RFID systems consist of tags that are attached to the objects to be identified [8]. Each tag has its ow n "read-only" or
"rew rite" internal memory depending on the type and application. Typical configuration of this memory is to store product
information, such as an object's unique ID manufactured date, etc. The RFID reader generates magnetic fields that enable the
RFID system to locate objects [4,5 ] (via the tags) that are w ithin its range. The high-frequency electromagnetic energy and
query signal generated by the reader triggers the tags to reply to the query; the query frequency could be up to 50 times per
second. As a result communication betw een the main components of the system i.e. tags and reader is established. As a
result large quantities of data are generated. The RFID system consists of various components w hich are integrated in a
manner defined in the above section. This allow s the RFID system to deduct the objects (tag) and perform various operations
on it. The integration of RFID components enables the implementation of an RFID solution[ 9] . Fig:2 The RFID system
consists of follow ing five components Tag (attached w ith an object, unique identification).• Antenna (tag detector, creates
magnetic field). • Reader (receiver of tag information, manipulator). • Communication infrastructure (enable reader/RFID to
w ork through IT infrastructure). • Application softw are (user database/application/ interface).

III. PROPOSED MODEL Our proposed model is designed to satisfy the requirement of PDS using GPS, GIS, Remote
Sensing Method w ith RFID & data mining approach.Fig:3 1. The data of the product is stored in the tag w hich w ill be attached
to the product (eg: w hen the grain w as harvested and procured, how long the grain w as kept in w arehouse, packaging and
transportation details and point of sale information).2. GPS is used to track the product. RFID is used to Communication
betw een tagged objects and GPS [6], to ascertain and communicate current position and status of the product.3. Data sent
to servers on a regular basis, or w hen the object moves or upon request Satellite data coming from the netw orks captured at
SDC. It is an interface capable of capturing information flow ing from (such as netw ork card on a machine) satellite.4. Rule-
and Motif-based Anomaly Detection is used to track moving objects [15,16].The raw data storage store collected netw ork
data. Typically, it is a set of hard drives w here an application dumps information passing through the SDC, usually according to
some requirement.The Pre-processor handles the conversion of raw image or connection data image into a format that mining
algorithms utilize and may store the result in the know ledge base. It can perform a range of duties, such as additional
filtering, noise elimination, and include third party detection tool that recognize know n disaster pattern of track.

The know ledge base stores rule produced by mining and any additional information used in the mining process [16]. It may
also hold the information for the per-processor, such as patterns for recognizing attack and conversion templates.

The profiler is responsible for generating snapshot rule sets to be used for deviation analysis [2,3]. It can be triggered
automatically based on time of day or the amount of pre-processed data available.

The deviation analyzer examines rule sets in the know ledge base and creates a description of difference by meta-learning
[3]. The results are stored in the know ledge base for further reference. If necessary, it signals the alarm generator. A strategy
for invoking the deviation analyzer could be periodic queries to the know ledge base for the availability of new profile.
Alternatively, the profiler may signal the analyzer w hen new profile is deposited to the know ledge base.

The alarm generator is responsible for notifying the administrator w hen the deviation analyzer reports unusual pattern in the
movement of product.

IV.CONCLUSION The effective use and implementation of RFID, GPS & data mining techniques in PDS can facilitate PDS
supply chain and promise eradicating mismanagement, corruption, trafficking, theft and anti social elements. RFID provides
highly accurate and detailed information by capturing the data and information at each stage of the supply chain,
automatically. It also improves the safety and efficiency of the food supply chain. Locationing technology GPS can also be
combined w ith RFID technology to automatically track and record the information regarding the field w here the produce w as
picked, w hen and w here it w as transported and the current location of the produce. This also helps in reducing theft and
trafficking. Data mining techniques based on the rule base classification model is used to identify the suspicious moving
behavior of the objects.

V.REFERENCES

[1] Ester M., Kriegel H.-P., Sander J.: Spatial Data Mining: A Database Approach, Proc. 5th Int. Symposium on Large Spatial

converted by Web2PDFConvert.com
[1] Ester M., Kriegel H.-P., Sander J.: Spatial Data Mining: A Database Approach, Proc. 5th Int. Symposium on Large Spatial
Databases (SSD'97), Berlin, Germany, 1997, pp. 47-66. [2] Ester M., Gundlach S., Kriegel H.-P., Sander J.: Database Primitives
for Spatial Data Mining, Proc. 8. GI-Fachtagung Datenbanksysteme in Büro, Technik und W issenschaft (BTW '99) (Int. Conf. on
Databases in Office, Engineering and Science), Freiburg, Germany, 1999, pp. 137-150. [3] Ester M., Kriegel H.-P., Sander J.:
Know ledge Discovery in Spatial Databases, invited paper at 23rd German Conf. on Artificial Intelligence (KI '99), Bonn,
Germany, in: Lecture Notes in Computer Science, Vol. 1701, 1999, pp. 61-74. [4] J. Bohn, "Prototypical implementation of
location-aw are services based on a middlew are architecture for super-distributed RFID tag infrastructures", Pers Ubiquit
omputing, (2008) Journal 12:155-166. [5] J. Schw ieren1, G. Vossen, "A Design and Development Methodology for Mobile RFID
Applications based on the ID-Services Middlew are Architecture", IEEE Computer Society, (2009), Tenth International
Conference on Mobile Data Management: Systems, Service and Middlew are. [6] K. Ahsan, H. Shah, P. Kingston, "Context
Based Know ledge Management in Healthcare: An EA Approach", AMCIS 2009, Available at AIS library. [7] S. Garfinkel, B.
Rosenberg, "RFID Application, Security, and Privacy", USA, (2005), ISBN: 0-321-29096-8. [8] L. Srivastava, RFID: Technology,
Applications and Policy Implications, Presentation, International Telecommunication Union, Kenya, (2005). [9] Application
Notes, "Introduction to RFID Technology" CAENRFID: The Art of Identification (2008). [10] Jiaw ei Han, Micheline Kamber, "Data
Mining Concept and Techniques" Morgan Kaufmann Publisheres 2001 [11] Michael J.A.Berry, and Gordon S. Linoff, "Data
Mining Techniques: for marketing, sales, and customer support". Taiw an: SuperPoll.net, Inc. January [12] He-Hai
W u, Jian-Ya Gong, "Geographic Information Systems Spatial Data Structure and Process Technology". China: Surveying and
Draw ing Publisheres , April 1997. ISBN 7-5030-0937-3 [13] Peng Hu, Xing-Yuan Huang, Yi-Xin Hua, "Geographic Information
SystemsCourse". China: W uhan University Publisheres , February 2002. ISBN [14] H. Cao and O. Wolfson. Nonmaterialized
motion information in transport netw orks. In ICDT'05. [15] B. Chiu, E. Keogh, and S. Lonardi. Probabilistic discovery of time
series motifs. In KDD'03. [16] Fran¸cois Denis. Pac learning from positive statistical queries. In ALT'98. [17] L. Forlizzi, R. H.
G¨uting, E. Nardelli, and M. Schneider. A data model and data structures for moving objects databases. In SIGMOD'00. [18] S.
Gaffney and P. Smyth. Trajectory clustering w ith mixtures of regression models. In KDD'99.

(ArticlesBase SC #3393327)

Kathiresan & Ranjithakumari - About the Author:


Ms.S.Ranjithakumari & Kathiresan.V,
Assistant Professor,School of Computer Studies,
RVS CAS,SULUR-402,
TAMILNADU

Ads by Google

Master Data Distribution Increase ROI with Scalable Reusable SOA Infrastructure. Get The E-Kit!
web.progress.com/soa
Retail Security Help Secure Your Retail Store. Call ADT® at 1-888-742-5026 Today!
www.ADTBusiness.com/Retail

Rate this Article 1 vote(s) Feedback RSS Print Email Re-Publish

Like Sign Up to see what your friends like.

Source: http://www.articlesbase.com/information-technology-articles/control-of-public-distribution-system-using-gps-gis-remote-sensing-
with-data-mining-rfid-3393327.html
Article Tags: gis, gps, rfid, pds, remote sensing, spatial data mining

Latest Information Technology Articles More from Kathiresan & Ranjithakumari

An iPad have been used on the speaker's podium


If you were watching C -SPAN on Tuesday, your eyes weren't deceiving you: That really was an iPad on the speaker's
podium in the House of Representatives.

By: wholesaleeshops l C omputers > Information Technology l Dec 06, 2010

Easily Remove Blackbox - The Best Solution to Remove Blackbox


Does the horrible Blackbox on your computer driving you mad even if you have installed a Blackbox remover and
firewall? Do you want to remove Blackbox & malware completely because you have found out that you personal
information has been collected by someone secretly?
By: Lily C ole l C omputers > Information Technology l Dec 05, 2010

Easily Remove Bemonitor - The Best Solution to Remove Bemonitor


Does the horrible Bemonitor on your computer driving you mad even if you have installed a Bemonitor remover and
firewall? Do you want to remove Bemonitor & malware completely because you have found out that you personal
information has been collected by someone secretly?
By: Lily C ole l C omputers > Information Technology l Dec 05, 2010

Easily Remove Belcaro GoldenRetriever - The Best Solution to Remove Belcaro GoldenRetriever
Does the horrible Belcaro GoldenRetriever on your computer driving you mad even if you have installed a Belcaro
GoldenRetriever remover and firewall? Do you want to remove Belcaro GoldenRetriever & malware completely because
you have found out that you personal information has been collected by someone secretly?
By: Lily C ole l C omputers > Information Technology l Dec 05, 2010

Easily Remove Barracuda Antivirus - The Best Solution to Remove Barracuda Antivirus
Does the horrible Barracuda Antivirus on your computer driving you mad even if you have installed a Barracuda Antivirus
remover and firewall? Do you want to remove Barracuda Antivirus & malware completely because you have found out
that you personal information has been collected by someone secretly?

converted by Web2PDFConvert.com
By: Lily C ole l C omputers > Information Technology l Dec 05, 2010

Easily Remove Badware Protector - The Best Solution to Remove Badware Protector
Does the horrible Badware Protector on your computer driving you mad even if you have installed a Badware Protector
remover and firewall? Do you want to remove Badware Protector & malware completely because you have found out that
you personal information has been collected by someone secretly?
By: Lily C ole l C omputers > Information Technology l Dec 05, 2010

VoIP Software and softphone development


The StarTele Logic's Symbian VoIP is lightweight standard based VoIP phone software. Based on the industry standard
SIP protocol, it is compatible with all VoIP devices and services. It can call any other SIP soft phone / IP phone (for free
charge) or any landline and mobile number via a VoIP service provider of your choice.
By: Umesh PAndey l C omputers > Information Technology l Dec 05, 2010

How to Speed Up Computer and Make Your Computer Faster


How to Speed Up C omputer and Make Your C omputer Faster

By: myismygoodman l C omputers > Information Technology l Dec 05, 2010

Add new Comment

Your Name: * Your Email:

Comment Body: *

Verification code:*

* Required fields Post Comment

Need Help? Site Links Webmasters Business Info Find more articles, type your search... Search
C ontact Us Recent Articles RSS Builder Advertising
FAQ Top Authors RSS
Submit Articles Top Articles Link to Us
Editorial Guidelines Find Articles
Blog Site Map
Use of this web site constitutes acceptance of the Terms Of Use and Privacy Policy | User published content is licensed under a C reative C ommons License.
C opyright © 2005-2010 Free Articles by ArticlesBase.com, All rights reserved.

converted by Web2PDFConvert.com

You might also like