A cleaning method of rfid redundant data based on r-tbf
A redundant data and redundant technology, applied in the field of data cleaning, can solve problems such as incomplete considerations, lower data quality, and non-compliance with the dynamic requirements of RFID data flow, so as to improve the effect of cleaning and data quality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045]As shown in the figure, the R-TBF-based RFID redundant data cleaning method provided in this embodiment solves the problem that the traditional TBF-based RFID data cleaning strategy has poor cleaning effect due to insufficient constraints and deletes useful data by mistake. Further improve the data quality, restore the authenticity of the data, and provide a strong guarantee for the effective use of subsequent data; on the basis of the TBF-based RFID data cleaning strategy, the consideration factor is adjusted from a single time to two factors of time and intensity, because in In the actual application scenario, due to the large coverage of the reader, the mobile RFID inspection vehicle can already read the data information of the corresponding tag before it reaches the position facing the tag. The typical characteristics of this type of information are that the time is short and the intensity is high. Small, if only relying on time to judge whether the data is redundant,...
Embodiment 2
[0074] Combine below figure 2 The shown cleaning process is described in detail, and the cleaning process provided in this embodiment mainly includes the following steps:
[0075] Step 1: Initialize the filter, the initialization content includes:
[0076] 11) an integer array M used to save the data time attribute, with a size of m;
[0077] The size of m is calculated according to the following formula:
[0078]
[0079] Among them, n is the size of the input data, P represents the probability that a unit in the integer array is still empty after k n times of mapping, and k is the number of hash functions;
[0080] 12) k hash functions h for mapping data label information to integer arrays 1 … h k ;
[0081] The size of k should satisfy the following inequality:
[0082] k·n
[0083] Among them, n is the size of the input data volume, and m is the size of the integer array;
[0084] The formula for calculating k is:
[0085]
[0086] Among them, n is the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com