RFID复杂事件处理技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
射频识别(RFID)作为一种高效的数据采集和自动识别技术,在制造、物流、医疗、运输、零售等领域具有广泛的应用前景。但随着RFID技术的快速发展和其应用规模的逐渐扩大,RFID系统会产生大量的数据,其数据量超出了现有信息系统的处理能力。因此,RFID复杂事件处理技术已经成为射频技术领域的关键技术之一,并且复杂事件处理机制被业界公认为是RFID数据处理的有效方法。
     本文主要对RFID复杂事件处理方法以及RFID复杂事件处理中的时间戳乱序问题进行研究,其中提出一种复杂事件处理方法ERD,该方法实现了事件检测机制与中间结果共享机制的有机统一。并在此基础上提出一种解决RFID复杂事件处理中时间戳乱序问题的方法GOM。本文主要工作包括:
     (1)介绍RFID系统的组成结构、工作原理以及RFID数据流特征,研究复杂事件处理基本理论与技术,在此基础上分析比较当前流行的、有代表性的RFID复杂事件处理方法及其优缺点,为后续研究提供理论依据和实验基础。
     (2)针对RFID数据流的特点以及目前RFID复杂事件处理方法的不足,通过扩展和改进高效模式匹配算法Rete,提出一种基于模式匹配原理的RFID复杂事件处理方法ERD,该方法着重考虑事件检测过程中的中间结果共享问题,利用复合事件鉴别网对复合事件进行检测,通过主动查询命令机制实现对非自发事件的检测。实验结果表明,该方法的中间结果共享机制有效的提高了RFID复杂事件处理效率。
     (3)在ERD方法基础上,综合考虑RFID事件处理的有效性和实时性要求,提出一种解决RFID事件流时间戳乱序问题的方法GOM。该方法引入了一种特殊标记事件OME,在此基础上提出可以对无效的事件实例进行安全删除的空间回收算法,解决了事件实例误删问题。另外,针对在乱序事件流情况下处理非自发事件时出现的伪真事件问题,通过改进ERD对非自发事件的检测方法,提出一种非自发事件防伪检测算法AFD。实验结果表明,该方法在实时性和存储空间回收方面有明显优势。
Radio Frequency Identification (RFID) as an efficient data collection and automatic identification technology has broad application prospects in manufacturing, logistics, medical, transportation and retail etc. But with the rapid development of RFID technology and its expanding application scale, RFID systems will produce large amounts of data, the data volume exceeds the capacity of present information systems. Therefore, RFID complex event processing technology has become one of key technologies in RFID, and complex event processing mechanism is to be recognized as an effective method of RFID data processing.
     This paper mainly studies the RFID complex event processing method and the problem of timestamp out-of-order in the process of RFID event processing. After summarizing previous RFID event processing methods, this paper presents a RFID complex event processing method ERD, which combines the detected event and intermediate results sharing mechanism organically, and on this basis propose a method GOM to solve the problem of timestamp out-of-order in the process of RFID event processing. Main work of this paper include:
     Firstly, this paper summarizes the composite structure of RFID system , working principle, and characteristics of RFID data. Research the essential theory of complex event processing technology. On this basis, compares the current popular and representative RFID complex event processing methods and analyzes their advantages and disadvantages, providing a theoretical and experimental basis for the follow-up study.
     Secondly , in accordance with the feature for the RFID data ,comparing to the existing RFID complex event processing methods, this paper proposes a RFID complex event processing method ERD based on pattern matching theory, which focuses on intermediate results sharing problem in the process of event detection, using complex events identifying network to detect composite events, and employing active query command mechanic to achieve detection of non-spontaneous event. Simulation results show that the intermediate result sharing mechanism effectively improve the efficiency of RFID complex event processing.
     Thirdly , Based on the method of ERD, this paper proposes a method GOM to solve the problem of timestamp out-of-order in the process of RFID event processing. The method introduces a special punctuation event OME, on this basis proposes the space collection algorithm which can delete invalid event instances safely, achieve to solve the problem of mistaken deletion of event instances. In addition, by improving the detection algorithm of non-spontaneous event in ERD method, proposes a anti-forgery detection algorithm AFD to solve the problem of forgery event caused by timestamp out-of-order. Simulation results show that the method has obvious advantages in terms of real-timing and efficiency of space collection.
引文
[1]Nath B,Reynolds F,Want R.RFID technology and application[J].IEEE Pervasive Computing,2006,5(1):22-24.
    [2]T Phillips,T Karygiannis,R Kuhn.Security standards for the RFID market[J].IEEE Security &Privacy Magazine,2005,3(6):85-89.
    [3]ZENG L,LEIH,KOYANAGIT,et al.Model Analysis for Business Event Processing[J].IBM Systems Journal,2007,46(40):817-831.
    [4]Zang Chuanzhen,Fan Yushun,Liu Renjing.Architecture,implementation and application of complex event processing in enterprise information systems based on RFID[J].Springer Science + Business Media LLC.2008,10:543-553.
    [5]Kaushik D,Krithi R,et al.Real-Time Event Handling in an RFID Middleware System[C].Proc of 5th International Workshop on Databases in Networked Information Systems,California,2008:232-251.
    [6]钟蕙安.RFID技术运作的神经中枢-RFID Middleware[J].Electronic Commerce Pilot.2004,6(14):2-6.
    [7]Y.I.Kim,J.S.Park,Tea-Su Cheong.Study of RFID Middleware Framework for Ubiquitous Computing Environment[C].The International Conference on Advanced Communication Technology,2005:825-830.
    [8]赵黎.RFID中间件事件管理系统的设计与实现.华中科技大学硕士学位论文.2006,1-3.
    [9]Wu E,Diao Y,Rizvi S.High-performance complex event processing over streams[C].ACM SIGMOD,New York,2006:407-418.
    [10]Brenna L,Demers A,Gehrke J,et al.Cayuga:a high-performance event processing engine[C].Proc of SIGMOD,Chicago,2007:1100-1102.
    [11]Wang Fusheng,Liu Shaorong,Liu Peiya,et al.Bridging physical and virtual worlds:complex event processing for RFID data stream[C].The 10th International Conference on EDBT'2006,Santiago,2006:588-607.
    [12] BERNHARDT T. Esper [EB/OL]. http://esper.codehaus.org.
    
    [13] Jin X, Lee X, Kong N, et al. Efficient Complex Event Processing over RFID Data Stream[C].Seventh IEEE/ACIS International Conference on Computer and Information Science.Washington, 2008: 75-80.
    [14] GU Yu,YU Ge, ZHANG Tiancheng. RFID complex event processing techniques[J].Journal of Computer Science and Frontiers, 2007,1(3) :255-267.
    [15] Hu Wenhui, Ye Wei, Huang Yu,et al. Complex Event Processing in RFID Middleware: A Three Layer Perspective[C]. Third 2008 International Conference on Convergence and Hybrid Information Technology, Washington, 2008: 1121-1125.
    [16] Shivnath Babu, Utkarsh Srivastava. Jennifer Widom . Exploiting k-constraints to reduce memory overhead in continuous queries over data streams[J]. ACM Transaction on Database System, 2004 ,3(29): 545-580.
    [17] R.Weinstein. RFID: a technical overview and its application to the enterprise[J]. IT Professional, 2005, 7(3): 27-33.
    
    [18] J. Landt. The history of RFID[J]. IEEE Potentials, 2005, 24(4): 8-11.
    [19] Doerr K H, Gates W R, Mutty J E . A hybrid approach to the avaluation of RFID/MEMS technology applied to ordinance inventory[J]. International Journal of Production Econamics 2006,103(2):726-741.
    [20] LEE Y M, CHENG Feng, LEUNG Y T. Exploring the inpact of RFID on supply chain dynamics[C] Proc of Winter Simulation Conference, 2004:1145-1152
    [21] HAK M H, RENOUF R, ENDERLE J. Passive RFID assetmonitoring system in hospital environments [C]. Proc of the 32th Annual Northeast Conference Bioengineering,2006:217-218.
    
    [22] Roy Want. Enabling Ubiquitous Sensing with RFID[J].Computer ,2004 ,37(4):84~68
    [23]郎为民.射频识别(RFID)技术原理与应用[M].北京:机械工业出版社,2006.
    [24] Wang F S, Liu P Y . Temporal management of RFID data[C]. 31st conference in the series of the Very Large Data Bases conferences, Trondheim ,2005: 1128-1139.
    [25] G .Barber, Tsibert zopoulos, E . An Analysis of using Epcglobal Class-1 Generation-2 RFID Technology for Wireless Asset Management[C]. Military Communications Conference, NewYork,2005:1-7.
    [26]D.Engels,.W.Sarma,et al.The reader collision problem[C].Abdelkader EI Kamel,Khaled Mellouli,Pierre Bome,Systems,Man and Cybernetics on 2002 IEEE International Conference,Tunisi,2002:6-9.
    [27]Hoag,J.E.,ThomPson,C.W.Aichitecting RFID Middleware[J].IEEE Internet Computing.10(5),2006:88-92
    [28]Bai Y,Wang F S,Liu P Y.Efficiently filtering RFID data streams[C].Proc of the 1st Int VLDB Workshop on Clean Databases,2006:50-57.
    [29]CHANDRASEKARAN S,COOPER O,EDSHPANDE A,et al.TelegraphCQ:continuous dataflow processing[C].Proc of SGMOD,2003:668-692.
    [30]CHANDRA SEKARAN S,COOPER O,DESHPANDE A,et al.TelegraphCQ:continuous dataflow processing for an uncertain world[C]Proc of Conference on Innovative Data Systems Research,2003.
    [31]FUSHENG W,PEIYAL.Temporal management of RFID data[C]Proc of VLDB,2005:1128-1139.
    [32]CONZALEZ H,HAN Jia-wei,LI Xiao-lei et al.Warehousing and analyzing massive RFID data sets[C].Proc of ICDE,2006:83-92.
    [33]CONZALEZ H,HAN Jia-wei,LI Xiao-lei.Flow cube constructing RFID flow cubes for multi-dimensional analysis of commodity flows[C]Proc of VLDB,2006:834-845.
    [34]刘海龙,李战怀,陈群等.RFID复合事件检测方法的研究和改进[J].计算机工程与应用,2008,44(11):4-8.
    [35]张菊芳,魏峻.复合事件检测技术的综述与评价[J].计算机应用研究,2005,22(10):1-4.
    [36]S Gatziu,K R Dittrich.SAMOS:An Active Object-Oriented Database System[J].IEEE Quarterly Bulletin on Data Engineering,Special Issue on Active Databases,1992,15(1-4):23-26.
    [37]E S A I-Shaer,HM Abdel-Wahab,KMaly.HiFi:A new Monitoring Architecture for Distributed SystemsManagement[C].International Conference on Distributed Computing Systems,1999.
    [38]Mansouri-Saman,M Sloman,M.GEM:A Generalised Event Monitoring Language for Distributed Systems[C]. IEE/IOP/BCS Distribute SystemsEngineering, 1997, 96-108.
    [39] Chakravarthy S,Krishnaprasad V,Kim S.Composite events for active databases: semantic,contexts and detection[C] . Proceedings of the 20th International Conference on Very Large Data Bases, Santiago de Chile, 1994 : 606-617.
    [40] Peter R Pietzuch, Brian Shand, Jean Bacon. A Framework for Event Composition in Distributed Systems[C]. The 4th ACM/IFIP/LJSENIX International Conference on Middleware (Middleware'03), Rio de Janeiro, 2003: 62-82.
    [41] Chawathe S , Krishnamurthy V, Ramachandrany S, et al. Managing RFID data[C]. 30th International Conference on Very Large Data Bases, Toronto, 2004: 1189-1195.
    [42] EPCglobal Application Level Events [EB/OL]. http://www.epcglobalinc.org.
    [43] C.Forgy. Rete: A fast algorithm for the many patterns/many objects match problem[J].Artif Intell. 1982,19(1): 17-37.
    [44] Karen W, Matthias G, et al. Time to the Rescue - Supporting Temporal Reasoning in the Rete Algorithm for ComplexEvent Processing[C]. 19th Int Conf on Database and Expert Systems Applications, Dallas ,2008:635-642.
    [45] Berstel,B. Extending the RETE Algorithm for Event Management[C]. Pro of the Ninth International Symp on Temporal Representation and Reasoning (TIME 2002), Washington,2002:452-461.
    [46] E. Yoneki, J. Bacon. Unified semantics for event correlation over time and space in hybrid network environments[C]. OTM Confederated Int Conf, NewYork ,2005: 366-384.
    [47] Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, et al . Framework for Extending RFID Events with Business Rule[J]. Lecture Notes in Computer Science, 2007, 4443: 955-961.
    
    [48]刘海龙,李战怀,陈群.乱序事件流上的复合事件检测方法[J],西北工业大学学报,2009,27(4): 449-454.
    [49] A. Ayad , J.Naughton. Static optimization of conjunctive queries with sliding windows over infinite streams[C]. Proceedings of the 2004 ACM SIGMOD international conference on Management of Data, Paris, 2004: 419-430.
    [50] L.Ding, N.Mehta, E.A.Rundensteiner, GT.Heineman. Joining punctuated streams[C]. 9th International Conference on Extending Database Technology, Greece, 2004 : 587-604.
    [51] P. A. Tucker, et al. Exploiting punctuation semantics in continuousdata streams[J]. IEEE Transactions on Knowledge and Data Engineering , 2003, 3 (15): 555-568.
    
    [52] Heung-Kuk Jo , Hoon-Jae Lee . A Relay-Transmission of the RFID Tag ID over the Wireless and TCP/IP with a Security Agent [C]. Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems : Technologies and Applications, Wroclaw,2007:918-927.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700