Supply chain Duplicate transportation RFID data stream Filtering
|
|
|
- Ambrose Bishop
- 10 years ago
- Views:
Transcription
1 Supply chain Duplicate transportation RFID data stream Filtering Nahla Mezzi and Jalel Akaichi 2 &2 Computer science department, University of Tunis 4, rue de la Liberté, 2000 Le Bardo Tunisia ABSTRACT The supply chain is a system characterized by the mobility between the various processes of the chain as well aswithin the process themselves. Data capturing, gathering and management technologies are always needed by companies to support their decision-making and plans, develop their strategies and improve their mobility in supply chain. One of the technologies that could help companies handle data related to mobile object is RFID (Radio Frequency Identification), this later define a new and a rich information environment that opens up new horizons for efficient management of supply chain processes and decision support. However, due to the multiple readings in many cases in detecting an RFID tag and the deployment of multiple readers, RFID data contains many duplicates. Since RFID data is generated in a streaming fashion, it is difficult to remove these duplicates in real time. We propose in this paper an algorithm to detect and remove duplicated data streams in order to store trajectories data related to mobile object into trajectories data warehouse to enhance decision making for supply chain. Keywords: Supply chain, Mobile objects, Trajectory data warehouse, RFID technology. INTRODUCTION Supply chain management is important for modern businesses to coordinate and synchronize activities of partner businesses, giving higher efficiency and improving productivity. However supply chain is a system characterized by the mobility between the various processes of the chain as well as within the process themselves. This mobility present an important challenge to deal with, because a huge amount of data was generated by the function of transport which is characterized by mobile objects such as trucks, trolley, and cars.mobile objects have an influence on the functioning of the supply chain because they provide correct information about the location and the time in order to reduce the uncertainty, increase the visibility of products and increase the global efficiency of the supply chain. Therefore, using new technologies such RFID is necessary to capture information in real time coming from different data sources, internal and external in order to increase the logistic performance and reduce costs. Thus it is an important technology that serves to change the way business conducts and improves decision making in supply chain [9]. RFID is a wireless communication technology that uses radio-frequency waves to transfer information between tagged objects and readers without line of sight [0]. However, this technology generates a large volume of data streams which include among them an important number of duplicates. These duplicates are most of the time useless and may alter the decision making and decrease computing resources such as processing and storage resources. Removing these duplicates from the RFID data stream is essential as they do not provide an instant information to the system and as they waste system resources. Real-time information capturing and decision support present complex technical challenges, related to managing huge streams of data coming from multiple data sources and converting them into meaningful information so that to support decisions. Our contributions are described as follows: The management of data streams generated by mobile objects, we propose an algorithm that efficiently detects and removes duplicated readings from RFID data streams. The modeling of the Trajectory Data Warehouse (TDW) related to supply chain activities. The analysis of TDW in order to extract useful knowledge to enhance decision making in the supply chain field. The paper is organized as follows: Section 2 reviews existing approaches that pushes us to propose an algorithm to remove duplicated data, whereas section 3 presents the mobility in the supply chain using RFID technology. Section 4 deals with the trajectory data warehouse modeling to support trajectory data generated by RFID, while section 5 presents the algorithm DUP_Filtering. Section 6 shows the analysis and reporting data extracted in order to enhance the decision making in supply chain and finally the conclusion. Volume 2, Issue 5, May 203 Page 484
2 2. RELATED WORKS A RFID system consists of a tag which is attached to the object to be identified, a reader for detecting radio waves, the Middleware and a database system for supporting the big number of information related to the mobile objects, and other associated information [4].The middleware gathers and processes the information captured from readers that will be used later on by company. The processing, filtering and aggregation aims to transform raw data into meaningful information for the application [4].So the middleware is very necessary to pre-process data. This paper discusses problems related to filtering RFID data and reviews the existing duplicate RFID data filtering approaches that are related to this work. However, the volume of RFID data is generally very big and produced in a stream which requires a method to eliminate duplication that should process and analyze data instantly. Therefore, redundancy can happen at two different levels, redundancy at reader level and redundancy at data level. Duplicate reading at the reader level happens when the tagged object is being read by more than one reader. This can happens when there are overlaps in the reading vicinity of several readers. As opposed, duplicate readings at the data level happens when an RFID reader continues reading the same object repeatedly. The problem of duplicate readings in RFID required an efficient approach to solve it. 2.. Duplicate reading at the data level The article focuses on the redundant readings at the data level thus we will we present some algorithms that treat this problem. This problem occurs when multiple RFID readers are deployed to control and track tagged objects. However, the fast capturing of data by RFID readers provide challenges for data management such as errors, data duplication, and miss- reads. There are many approaches in the literature review to filter duplicate readings [] [3]. Algorithms proposed in these two works focus on data level filtering, as they focus on a single RFID reader system. However, these algorithms proposed do not only deal with the deletion operation which removes unnecessary information; but they also consider just the fixed objects. Moreover, the tags movement is not suitable in RFID scenarios because they cannot easily be predicted [3]. The major weakness of the sliding window approach is that the size can be not large enough to perform filtering correctly. Approaches that explore the Bloom filter for filtering duplicate readings in RFID have recently emerged in the late researches [5] [6]. The main idea of the Bloom Filter [4] is to define an element that represents a positive counter in a bit array of a predefined size and with number of hash functions. All bits in BF are initially set to 0 and will be changed to if it is hashed by the element. To check the existence of element in a set, the element will be executed by the same hash functions used to insert the elements in the array. That is the element is the member of the set if all the bits in which the element was mapped to is positive. For each new element, the corresponding bits in the array take the value [4]. But, Bloom Filter has some weaknesses such as: the impossibility of deletion which can result in the generation of false positive errors. Thus the Bloom Filter tests the membership of any element with errors [4].So it can provide wrong information which can result in a wrong decision making. That s why Bloom filter requires some improvement. Moreover, in another work [3] authors present an approach that filters the detected data including the duplicate elimination. They discuss the need to filter RFID stream efficiently and they proposed a filtering method to eliminate noise from RFID readings. The method uses the number of reading occurrence per time as the basis of the filtering process. The same authors in [2] [4] discussed the problem of detecting duplicated data. The second work is an extension of the previous one. Authors enhance their works by reducing the number of filters from two to only one unlike the previous algorithm that make use of two filters. Thus, eliminating one of the filters reduces the time required to filter duplicate readings. Nevertheless, this approach has a low false positive rate which illustrates the improved correctness of the filtering process. It is more efficient in terms of time and memory usage. In addition, in the same context, the objective of this work [8] is to propose one pass approximate methods based on Bloom Filters using a small amount of memory. Thus, researchers propose Time Bloom Filter to detect duplicate in RFID data streams, which extends original Bloom Filter to support sliding windows. They propose also Time Interval Bloom Filters to reduce errors which need more space than Time Bloom Filters. So, this method can reduce space for Time Interval Bloom Filters to effectively remove duplicates in RFID data streams. But the major weakness of Time Bloom Filter is to detect duplicates in the server side. However, since all the data will flow through this module in the server, it will soon become the bottleneck. Another article discusses the same idea but with a slight difference which is the following: First, in order to reduce the network bandwidth requirement, authors proposed using a two layer approach to eliminate the local duplicates in the network edge, then detecting the global duplicates in the server side. Second, since all the RFID data will be sent to the server, the latter will be submerged. The method proposed is distributing the Time Bloom Filters to several computing nodes to enhance the scalability [7]. In the following, the paper is going to discuss the effective and efficient solutions for the previously mentioned problem of the elimination redundancy at data level. Volume 2, Issue 5, May 203 Page 485
3 3. SCENARIO OF COLLECTING RFID DATA STREAM In the context of our work we are interested in external mobility that contains the distribution process and transport. Tags are existed in the mobile object; readers detect these tags and transfer them to middleware in order to filter duplicated data. The proposed model in our work consists of an implementation of RFID technology in the supply chain with passive tags. This is achieved by an installation of readers in many places in order to track the mobile objects. These tags will be placed in different steps to capture information in real time because it is very important for control of deviation in production. We focus just on the external mobility. The tags are integrated in the trucks in order to monitor truck drivers and assist them if there are problems in the trajectory path or in the case of a wrong destination. Therefore, in our case, we propose that readers are installed in the supply chain, during the process of production and also in the proximity of each destination that trucks must deliver the command in a well-defined time. Data collected from these mobile objects without contact that is if a RFID tag is within a proper range from an RFID reader, the RFID tag will be detected. This data serves to know the location of mobile object, the trajectories of trucks, as it monitors them to reduce the risks that may occur in order to improve the decision making and the productivity which is based on the analysis in the real time of this data. To makes things clear, the following figure is a schema that describes the mechanism of work starting from RFID data stream collection till reaching the analysis and decision making. Figure System architecture Hence the gathered data will be sent to the middleware. Our algorithm proposed in the next section presents a middleware between collected data and the trajectory data warehouse. This means that gathered data must be filtered and should not contain duplicated and redundancy data before sending them into the data warehouse. It is necessary to send clean data to the data warehouse because, duplicated data can adversely affect the supply chain performance and thus affect decision making. 4. MODELING TRAJECTORY DATA WAREHOUSE FOR SUPPLY CHAIN In this work, we present the use of RFID technology in order to gather and control in real time data related to these mobile objects. This will help us to know the location of the mobile objects and the time of departure and arriving. 4.. TRAJECTORIES OF MOBILE OBJECTS IN THE CHAIN The mobile objects represent the different means of transport in the supply chain. Mobile objects follow a path which is the path from the starting point to the arriving point; the information on this trajectory represents an important basis for decision-making since they are comprehensive and contain all the data about the object in its environment and travel conditions. A path consists of a set of movements and a set of stops. Even a mobile object in the supply chain can take either the status, movement (court movement) or stop for different reasons such as the breakdown, climate, or arriving to the destination. The diagram below shows the different states that can occur to an object moving in a path. Figure 2The states of the mobile objects in the supply chain Volume 2, Issue 5, May 203 Page 486
4 A mobile object moving in its trajectory can be in movement or in stop; the movement is characterized by a start time and an end time. The start of movement indicates the end of a stop and the end of a movement indicates the beginning of a stop, so the time interval of movement is delimited by two consecutive stops. Stops are important parts of a path or a non-moving. It can be caused by different reasons; we can distinguish the stop in three types: - A strategic stop: for the delivery of the transported products, when arrived in the destination. - A private stop: to have a break - An unforeseen stop: when there is a breakdown or a bad climate Trajectory data modeling in the supply chain The successive movements of mobile objects in the supply chain are represented by trajectories. The analysis of the path traveled by the mobile objects can help to optimize supply chain and improve decisions. In order to perform mobility analysis in a supply chain, it is necessary to record the data paths, as well as the characteristics of mobile objects. Data streams must be stored in a multidimensional model to be analyzed. The model of the classic data warehouse is not adapted to the storage of the information related to the mobile objects. For this reason, these applications need to join spatial and temporal types of data, which requires a spatiotemporal data warehouse, but this data warehouse is not sufficient for the treatment of the trajectories of mobile objects. Besides, the TDW must be able to work in an environment, where the observations of trajectory data are received in a continuous way. The analysis of trajectories will help the decision-makers to observe the movement of trajectories of the mobile objects in the supply chain. The modeling of our TDW requires the precision of contents of supply chain and to organize according to the expected results and the statues of the mobile object. In our work, TDW is an effective way to model mobility data and its characteristics. It allows the monitoring of mobiles objects, movements throughout a path at any moment. It also gives the possibility of analysis and extracts knowledge from historical data, which ensures better decision making. The following figure is the conceptual model for the resulting data trajectories related to mobile objects in the supply chain represented by a UML class diagram. Mobile object #id-om +Name-OM +Disponibility +type-om +situation Trolley #id-trolley Service process #id-service +libelle-service have..* Trajectory #id-trajectory +T-begin-traject +T-end-traject..* Vehicle #id-vehicle -licence-num-vehicle -brand-vehicle Approv process #id-approv +location-approv +activity-approv..* have Natural #id-natural +Location-natural +Type-natural Sub-Trajectory #id-sub-traj +T-begin-sub-traject +T-end-sub-traject Supply chain process #id-process +name-process Production process #id-prod +location-prod +activity-prod 0..* is include 0..* have Distribution process #id-dist +location-dist +activity-dist Move #id-move +T-begin-move +T-end-move have 0..* Stop #id-stop +T-begin-stop +T-end-stop +cause-stop 0..* Destination #id-dest +Name-dest +adress-dest Supplier #id-supplier +name-supp +adress +tel 0..* Breakdown #id-breakdown +id-om-breakdown +date -breakdown +location-breakdown Adress #id-adress +Street +Region +country Consumer #id-cons +name-cons +tel Figure 3Supply chain s mobile objects Trajectory data Conceptual Modeling We will describe in what follows the main classes and relationships of our diagram: Mobile object: the mobile objects insure the movement of the goods between the various services of the chain; these objects also transfer the data to the decision-making. The type of mobile object can be either a vehicle for the external transport, or a wagon for the internal transport. Trajectory: the trajectory is the road crossed by a mobile object. Every trajectory is characterized by a time of begins and of the end. The end of the trajectory presents the arrived to the destination. A trajectory can consist of one or several sub-trajectories.trajectory = - trajectory Volume 2, Issue 5, May 203 Page 487
5 Sub-trajectory: every sub-trajectory consists of a set of movement. The sub-trajectory limited by two successive stops. Sub-trajectory = Movement: every movement of mobile object in a trajectory has an identifier and characterized by time and location of movement. Stop: stops in a trajectory are identified and characterized by time and location of the stop. A stop can be for several reasons either for reason of breakdown, or in case when the mobile object arrived at its destination. Destination: the destination of the trajectory can be the consumers, the suppliers or the processes of the chain, or the services of the supply chain. Natural: the natural present the natural characteristic for each trajectory (urban, mountain, desert ) 4.3. Modeling trajectory data warehouse We used the multidimensional modeling of the TDW, which is the star schema. It is a method of designing a data warehouse where a central fact table is connected to one or more dimension tables. The fact table is a table of reference to get to the center allowing events or activities archived. In our case, we chose the trajectory as fact table and main subject of analysis since it includes all the information and data relating to the moving object, the analysis will be based on several axes or dimensions, such as time, movement, the mobile object, destination etc. The fact table contains the 'measures', which are numerical fields on which we will do our analyses, we can find the number of stops, distance travelled, travel time, the average speed etc..as shown in fig.4. Destination #id-dest +Name-dest +adress-dest Natural #id-natural +Location-natural +Type-natural Move #id-move +T-begin-move +T-end-move Mobile object #id-om +Name-OM +Disponibility +type-om +situation Sub-Trajectory #id-sub-traj +T-begin-sub-traject +T-end-sub-traject <<Fact>> Trajectory #id-trajectory #id-time #id-om #id-move #id-natural #id-location #id-dest #id-stop #id-breakdown #id-sub-traject +T-begin-traject +T-end-traject +lenght-traject +Speed-traject +Num-stop-traject +local-traject +distance-cross-traject +num-traject-cross +duration-traject +avg-traject +num-traject Location Breakdown #id-breakdown +id-om-breakdown +date -breakdown +location-breakdown Stop #id-stop +T-begin-stop +T-end-stop +cause-stop Time #id-time +date/houre #id-location +adress-location +region +country Figure 4Star schema In the next section we present our algorithm to eliminate duplicated data generated by RFID in order to load into trajectory data warehouse only data cleaned that serves subsequentlyto analysis. 5. DUP_FILETERING ALGORITHM In this section, we present our effective and efficient solutions for the problem of the redundancy elimination at data level. Before begging, we provide two definitions quoted from this work [8] and on which our algorithm is based: Definition. An RFID data stream S is a set of {s,.., s n }, where s i consists of a triple (TagID,Loc,Time) such that TagID" is the unique identification number for tag, "Loc" is the location of the reader which detects the tag and "Time" is the time of detecting the tag. Definition 2. (Duplicate). In a RFID data stream, item x is considered as a duplicate if there exists item y, such that x.tagid = y.tagid and x.timestamp y.timestamp< Therefore, we develop an algorithm for the detection of the RFID tags distributed with proper range in a given area. If an RFID tag is detected, the RFID data with the same tag_id is detected repeatedly over a period. Thus, the structure of the Bloom filter optimized is shown by the time of the flow detection and "tempsprec" means the time of the previous stream detection of the same tag_id. To see if there is a probable duplication or not we will make the difference between both time and controlling the variable T.This later is set to with is in milliseconds. To better understand this parameter, we give this definition: Definition 3. For detecting mobile objects which are not in working, we created a parameter T, which is initialized to : Volume 2, Issue 5, May 203 Page 488
6 T = () We define a moving object which is not working if T reaches 0.T is decremented each time we remove a duplicated data in the same Tag_id. We chose T = since the probability to detect a mobile object in work is p= [(- )] = 0,25. We note that must be in millisecond since the detection of frequency generated by readers is very fast. We choose to multiple by because is the period of reading reader. For more explanation, we give a simple example that is =2 and the reader read the stream each 0,5 second thus if we do not multiply by T will equal to 6 that is to say if it detects a duplicate T reaches 0 after 3s (since Frequency: 2 readings per second) rather than after 6s that is why we must multiply by the period. Figure 5 presents The Dup_Filtering algorithm to eliminate duplicated data.. Figure5Dup_Filetring algorithm The algorithm functions as follows: Add_tag(tagid) "INSERT INTO tag (tagid) VALUES "tagid"" Insert_Stream(tagid) "INSERT INTO stream(tag_tagid, loc, time)values ("tagid",'"loc"',"time")" Add_verif "INSERT INTO verif(tag_tagid,,tempsprec) VALUES(" tagid "," 6 ","time")" Volume 2, Issue 5, May 203 Page 489
7 In case we find that the data is duplicated, we have to check the value of T (the variable that will help us in decisionmaking) by verification_t function (tagid) Verification_t(tagid) "SELECT t from verif where tag_tagid=" tagid "" if T Up_Date_verif_t(tagid, T) Up_Date_verif_t(tagid, T) T=T- "UPDATE verif SET t=" T " where tag_tagid=" tagid "" Whereas, we conclude data is not duplicated according to the update_stream function (tagid),we should update the stream table Up_Date_verif_time and "verif" table by changing the time of detection and the value of T which becomes again equal to 6, then we should send the new stream to the data warehouse. Update_flux(tagid) "UPDATE stream SET time =" time " where tag_tagid=" tagid "" with time is the new time detection of data stream. Up_date_verif_temps "UPDATE verif SET T=" 6 ", tempsprec=" time " where tag_tagid="tagid "" with time is the new time detection of data stream. As a result, the data warehouse contains only clean data,so we can analyse thes data to extract usuful knowledge in order to improve decision making in the supply chain. 6. DECISION MAKING: ANALYSIS AND REPORTING In this section we present analysis and reporting data in order to improve decision making in the supply chain and reduce incertitude. 6. Data warehouse analysis In this phase, we have filtered RFID data streams and loaded them into the previously mentioned trajectory data warehouse. Thus the data analysis related to mobile objects in the supply chain stored in the TDW, is an important step to derive knowledge necessary to the decision. In our context, the analysis concerns first then data of mobile objects and second their trajectories: Analysis of mobile object data: analysis is used to display data relating to mobile objects (the location of the mobile object at a definite time, details regarding the use of mobile objects in a time period, mobile objects available for use, the places visited by the object...). These data allow decision makers to better manage all types of mobile objects in the business. Analysis of mobile objects trajectories: the analysis concerns the trajectories of the mobile objects and their characteristics (the downtime of a trajectory, time, path length ) these data are used to improve the mobility management of the mobile objects which characterize the trajectories travelled, and subsequently improving the transport function. Data analysis allows operating with maximum efficiency and developing new ideas to better understand and optimize the act of decision making. In our context, we aim to improve decision making in supply chain.in other words we aim to extract useful knowledge related to trajectories data that can represent a support for taking the best decision and reducing costs and incertitude. In this work, we have supported the analysis of data from the data warehouse using Pentaho Schema Workbench. PSW can create Mondrian OLAP cubes from a model of star data warehouse. Volume 2, Issue 5, May 203 Page 490
8 Figure6 XML cube schema Constructing OLAP cube allows to answer different questions. A cube consists of one or more fact tables with their dimension tables. It aims to organize the data to be analyzed by area / topic and to highlight relevant results for the decision maker. In our work, asking information about the mobile objects and their trajectories allows us to guide the trucks drivers in their trajectories, to improve mobility There are some questions (queries) that a decision maker can ask: What is the number of stops caused by breakdowns depending on the location by truck throughout the trajectory in a month? What are the places where there is frequently breakdown? What is the number of moving objects by location in a well-defined period? What is the nature of the places visited by the trajectory? What is the number of the retarding mobile objects? Etc. 6.2 Data warehouse Reporting We present in this section, the analysis reports issued through queries using the report designer tool and decisions that may be proposed by the decision makers of the company. Our final goal along this work is to discover hidden relationships between variables including space and time in order to find explanations of some problems related to trajectories of mobile objects and consequently make best decision to enhance mobility in the supply chain. We use interrogations based on several axes of analysis which allow us to extract important knowledge that can help in the decision making. First, the interrogation concerns the mobile objects in the stop for a given moment, allows making instant status tracking of a moving object, we can know whether an object is in stop and why, thus allowing effective and instant intervention. Interrogations are used to know the number and duration of stops on a trajectory to assess the effectiveness of this trajectory by calculating the lost time, which allows a strategic intervention to understand the reasons for this loss and try to reduce it. This can also be a good way to compare the trajectories, which allowing better future choices. To better understand the reasons for delay and stops, interrogation about the nature of the trajectory can be useful, thanks to RFID technology we are able to have an idea about the climate conditions of a trajectory, we note that both trajectory and 2 are formed of deserted areas and highways. This will allow decision makers to better anticipate failures and potential problems related to climate and take into account the necessary precautions to mountainous areas and desert regions as shown in Figure 7. Volume 2, Issue 5, May 203 Page 49
9 Figure7 Location breakdowns Moreover, thanks to interrogation about the type of nature of the trajectory, this allows the decision maker to know the performance of trucks according to nature and thereby they can follow the truck which has better performance depending on the nature in order to assign the suitable trajectory to each truck to save time. Therefore information on the nature of the places visited helps decision makers to take precautions depending on the climate, and therefore reduce the risk of breakdowns and accidents on the road. Therefore, the decision maker can decide to buy moving objects the most adapted to the nature frequently crossed. Figure8 Number of breakdowns, pause and number of trajectory travelled in a month by trucks The decision-making system which is interested in mobility in the supply chain based on a multi-dimensional trajectory data warehouse enables online monitoring of the transport function in the supply chain, it facilitates the direct intervention and provides an excellent model for the analysis of data related to the path on different axes. So a focused and specialized analysis, allows to extract knowledge and provide decision makers with relevant elements for better decision making can reduce costs and time to strengthen the supply chain and performance In our case the scheme of the data warehouse and the questions proposed give decision makers an overview of the mobile object in the supply chain by specifying the behavior of the moving object and the characteristics of its trajectories such as the number of stop by trajectory, the location of the paths, distance, time trajectories This information allows decision makers to make decisions taking into account the mobility in the chain, which can reduce the costs related to transportation, improve product traceability transported, find a better adaptation to unforeseen events, control the interactions and reduce the uncertainty of information which leads subsequently to optimize different functionalities of the supply chain in particular and business in general. Volume 2, Issue 5, May 203 Page 492
10 7. CONCLUSION AND FUTURE WORKS In order to improve decision making in the supply chain based on data analysis, we presented in this paper an algorithm designed to eliminate duplicated data generated by RFID readers from the supply chain activities. We presented also the model of trajectory data warehouse that supports trajectories data related to mobile objects. We have not considered in our analysis the case of several readers that detect the same tag which that may be the aim of our future researches REFERENCES [.] Y.Bai,F. Wang, P.Liu. Efficiently filtering RFID data streams, VLDB Workshop on Clean Databases, 2006,pp.-8. [2.] H.Mahdin,,J.Abawajy. An approach to filtering duplicate RFID data streams, Communications in Computer and Information Science 24, 200, pp [3.] H.Mahdin, J.Abawajy. An approach to filtering RFID data streams. In Proceedings of the 0th International Symposium on Pervasive Systems, Algorithms, and Networks, Kaoshiung, Taiwan, 4 6 December 2009; pp [4.] H.Mahdin, J.Abawajy. An Approach for Removing Redundant Data from RFID Data Streams, ISSN ,pp [5.] X.Wang, Q. Zhang, Y. Jia. Efficiently filtering duplicates over distributed data streams. In Proceedings of the International Conference on Computer Science and Software Engineering, Wuhan, Hubei, China, 2 4 December 2008; pp [6.] H.Shen, Y. Zhang. Improved approximate detection of duplicates for data streams over sliding windows. J. Comput. Sci. Technol. 2008, 23,pp [7.] W. Jiang, W.Yongli, G. Zhang. A Two-Layer Duplicate Filtering Approach for RFID Data Streams.Communications in Computer and Information Science Springer,Volume 32, 202, pp [8.] C.H.Lee, C.W. Chung. An Approximate Duplicate Elimination in RFID Data Streams. Data & Knowledge Engineering 70(2), 20, pp [9.] se. Engineering Industrial Engineering and Management "Supply Chain Management - New Perspectives", book edited by SandaRenko, ISBN , Published: August 29, 20 under CC BY-NC-SA 3.0 license. [0.] J. P.T. Mo, Xue Li. Event Management of RFID Data Streams for Fast Moving Consumer Goods Supply Chains, in Unique Radio Innovation for the 2st Century: Building Scalable and Global RFID Networks, Eds.DamithRanasinghe, Michael Sheng, SheraliZeadally, pub. Springer-Verlag. ISBN: ,20, pp AUTHOR NahlaMezzia master student at the Higher Institute of Management of Tunis, will receive the Master degree in Business Intelligence from the Higher institute of Management of Tunis in June 203 and has received the fundamental license of computing science of management in 200 from the Higher Institute of Management. JalelAkaichi received his PhD in Computer Science from the University of Sciences and Technologies of Lille (France) and then his Habilitation degree from the University of Tunis (Tunisia) where he is currently an Associate Professor in the Computer Science Department.JalelAkaichi has published in international journals and conferences, and has served on the program committees of several international conferences and journals. He is currently the Chair of the Master Science in Business Intelligence. JalelAkaichi visited and taught in many institutions such as the State University of New York, Worcester Polytechnic Insitute, INSA-Lyon, University of Blaise Pascal, University of Lille, etc. Volume 2, Issue 5, May 203 Page 493
Patient Trajectory Modeling and Analysis
Patient Trajectory Modeling and Analysis Jalel Akaichi and Marwa Manaa Higher Institute of Management of tunis, 41 Rue de la Liberté, Cité Bouchoucha, 2000 Bardo, Tunisia [email protected], [email protected]
An Intelligent Middleware Platform and Framework for RFID Reverse Logistics
International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics
STRATEGIES ON SOFTWARE INTEGRATION
STRATEGIES ON SOFTWARE INTEGRATION Cornelia Paulina Botezatu and George Căruţaşu Faculty of Computer Science for Business Management Romanian-American University, Bucharest, Romania ABSTRACT The strategy
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast
International Conference on Civil, Transportation and Environment (ICCTE 2016) Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast Xiaodong Zhang1, a, Baotian Dong1, b, Weijia Zhang2,
RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY
RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda
CHAPTER 5: BUSINESS ANALYTICS
Chapter 5: Business Analytics CHAPTER 5: BUSINESS ANALYTICS Objectives The objectives are: Describe Business Analytics. Explain the terminology associated with Business Analytics. Describe the data warehouse
Tracking System for GPS Devices and Mining of Spatial Data
Tracking System for GPS Devices and Mining of Spatial Data AIDA ALISPAHIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo Zmaja
CHAPTER 4: BUSINESS ANALYTICS
Chapter 4: Business Analytics CHAPTER 4: BUSINESS ANALYTICS Objectives Introduction The objectives are: Describe Business Analytics Explain the terminology associated with Business Analytics Describe the
Data Warehouse design
Data Warehouse design Design of Enterprise Systems University of Pavia 21/11/2013-1- Data Warehouse design DATA PRESENTATION - 2- BI Reporting Success Factors BI platform success factors include: Performance
Data Analytics and Reporting in Toll Management and Supervision System Case study Bosnia and Herzegovina
Data Analytics and Reporting in Toll Management and Supervision System Case study Bosnia and Herzegovina Gordana Radivojević 1, Gorana Šormaz 2, Pavle Kostić 3, Bratislav Lazić 4, Aleksandar Šenborn 5,
RESEARCH ON THE FRAMEWORK OF SPATIO-TEMPORAL DATA WAREHOUSE
RESEARCH ON THE FRAMEWORK OF SPATIO-TEMPORAL DATA WAREHOUSE WANG Jizhou, LI Chengming Institute of GIS, Chinese Academy of Surveying and Mapping No.16, Road Beitaiping, District Haidian, Beijing, P.R.China,
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
RFID System Description for Logistics & Inventory
RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.
A Novel Approach for a Collaborative Exploration of a Spatial Data Cube
International Journal of Computer and Communication Engineering, Vol. 3, No. 1, January 2014 A Novel Approach for a Collaborative Exploration of a Spatial Data Cube Olfa Layouni and Jalel Akaichi Geographic
Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers
60 Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative
Week 3 lecture slides
Week 3 lecture slides Topics Data Warehouses Online Analytical Processing Introduction to Data Cubes Textbook reference: Chapter 3 Data Warehouses A data warehouse is a collection of data specifically
Supply Chain Optimization for Logistics Service Providers. White Paper
Supply Chain Optimization for Logistics Service Providers White Paper Table of contents Solving The Big Data Challenge Executive Summary The Data Management Challenge In-Memory Analytics for Big Data Management
Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions
Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,
Flexible mobility management strategy in cellular networks
Flexible mobility management strategy in cellular networks JAN GAJDORUS Department of informatics and telecommunications (161114) Czech technical university in Prague, Faculty of transportation sciences
Paper DM10 SAS & Clinical Data Repository Karthikeyan Chidambaram
Paper DM10 SAS & Clinical Data Repository Karthikeyan Chidambaram Cognizant Technology Solutions, Newbury Park, CA Clinical Data Repository (CDR) Drug development lifecycle consumes a lot of time, money
Meta-data and Data Mart solutions for better understanding for data and information in E-government Monitoring
www.ijcsi.org 78 Meta-data and Data Mart solutions for better understanding for data and information in E-government Monitoring Mohammed Mohammed 1 Mohammed Anad 2 Anwar Mzher 3 Ahmed Hasson 4 2 faculty
Available online at www.sciencedirect.com. ScienceDirect. Procedia Computer Science 52 (2015 ) 902 907
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 52 (2015 ) 902 907 The 4th International Workshop on Agent-based Mobility, Traffic and Transportation Models, Methodologies
Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges
Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges Prerita Gupta Research Scholar, DAV College, Chandigarh Dr. Harmunish Taneja Department of Computer Science and
Framework model on enterprise information system based on Internet of things
International Journal of Intelligent Information Systems 2014; 3(6): 55-59 Published online December 22, 2014 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.20140306.11 ISSN: 2328-7675
Lost in Space? Methodology for a Guided Drill-Through Analysis Out of the Wormhole
Paper BB-01 Lost in Space? Methodology for a Guided Drill-Through Analysis Out of the Wormhole ABSTRACT Stephen Overton, Overton Technologies, LLC, Raleigh, NC Business information can be consumed many
Supply chain intelligence: benefits, techniques and future trends
MEB 2010 8 th International Conference on Management, Enterprise and Benchmarking June 4 5, 2010 Budapest, Hungary Supply chain intelligence: benefits, techniques and future trends Zoltán Bátori Óbuda
Dashboards as a management tool to monitoring the strategy. Carlos González (IAT) 19th November 2014, Valencia (Spain)
Dashboards as a management tool to monitoring the strategy Carlos González (IAT) 19th November 2014, Valencia (Spain) Definitions Strategy Management Tool Monitoring Dashboard Definitions STRATEGY From
Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2
Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue
BW-EML SAP Standard Application Benchmark
BW-EML SAP Standard Application Benchmark Heiko Gerwens and Tobias Kutning (&) SAP SE, Walldorf, Germany [email protected] Abstract. The focus of this presentation is on the latest addition to the
Make the right decisions with Distribution Intelligence
Make the right decisions with Distribution Intelligence Bengt Jensfelt, Business Product Manager, Distribution Intelligence, April 2010 Introduction It is not so very long ago that most companies made
Alejandro Vaisman Esteban Zimanyi. Data. Warehouse. Systems. Design and Implementation. ^ Springer
Alejandro Vaisman Esteban Zimanyi Data Warehouse Systems Design and Implementation ^ Springer Contents Part I Fundamental Concepts 1 Introduction 3 1.1 A Historical Overview of Data Warehousing 4 1.2 Spatial
Business Intelligence Systems
12 Business Intelligence Systems Business Intelligence Systems Bogdan NEDELCU University of Economic Studies, Bucharest, Romania [email protected] The aim of this article is to show the importance
Proposal for a Vehicle Tracking System (VTS)
Proposal for a Vehicle Tracking System (VTS) 2 Executive Summary Intelligent Instructions is an IT product development and consulting company. At Intelligent Instructions, we focus on the needs of the
Original-page small file oriented EXT3 file storage system
Original-page small file oriented EXT3 file storage system Zhang Weizhe, Hui He, Zhang Qizhen School of Computer Science and Technology, Harbin Institute of Technology, Harbin E-mail: [email protected]
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
Data Warehouse Snowflake Design and Performance Considerations in Business Analytics
Journal of Advances in Information Technology Vol. 6, No. 4, November 2015 Data Warehouse Snowflake Design and Performance Considerations in Business Analytics Jiangping Wang and Janet L. Kourik Walker
Detection and Elimination of Duplicate Data from Semantic Web Queries
Detection and Elimination of Duplicate Data from Semantic Web Queries Zakia S. Faisalabad Institute of Cardiology, Faisalabad-Pakistan Abstract Semantic Web adds semantics to World Wide Web by exploiting
Republic Polytechnic School of Information and Communications Technology C355 Business Intelligence. Module Curriculum
Republic Polytechnic School of Information and Communications Technology C355 Business Intelligence Module Curriculum This document addresses the content related abilities, with reference to the module.
Business Intelligence: Effective Decision Making
Business Intelligence: Effective Decision Making Bellevue College Linda Rumans IT Instructor, Business Division Bellevue College [email protected] Current Status What do I do??? How do I increase
Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4
5th International Conference on Advanced Materials and Computer Science (ICAMCS 2016) Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang
Introduction CHAPTER 1
CHAPTER 1 Introduction Ever since the development of the first integrated circuits in the late 1950s the complexity of such devices doubled every 20 months. A development which has been anticipated by
Fluency With Information Technology CSE100/IMT100
Fluency With Information Technology CSE100/IMT100 ),7 Larry Snyder & Mel Oyler, Instructors Ariel Kemp, Isaac Kunen, Gerome Miklau & Sean Squires, Teaching Assistants University of Washington, Autumn 1999
BUSINESS INTELLIGENCE
BUSINESS INTELLIGENCE Microsoft Dynamics NAV BUSINESS INTELLIGENCE Driving better business performance for companies with changing needs White Paper Date: January 2007 www.microsoft.com/dynamics/nav Table
Applying RFID in traffic junction monitoring
Second Conference of Junior Researchers in Civil Engineering 11 Applying RFID in traffic junction monitoring Nikol Krausz BME Department of Photogrammerty and Geoinformatics, e-mail: [email protected]
Deriving Business Intelligence from Unstructured Data
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 971-976 International Research Publications House http://www. irphouse.com /ijict.htm Deriving
Study of Logistics Warehouse Management System Based on RFID
Advanced Materials Research Vol. 748 (2013) pp 1281-1284 Online available since 2013/Aug/30 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.748.1281
Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset.
White Paper Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. Using LSI for Implementing Document Management Systems By Mike Harrison, Director,
Copyright 2007 Ramez Elmasri and Shamkant B. Navathe. Slide 29-1
Slide 29-1 Chapter 29 Overview of Data Warehousing and OLAP Chapter 29 Outline Purpose of Data Warehousing Introduction, Definitions, and Terminology Comparison with Traditional Databases Characteristics
University of Gaziantep, Department of Business Administration
University of Gaziantep, Department of Business Administration The extensive use of information technology enables organizations to collect huge amounts of data about almost every aspect of their businesses.
Research of Smart Space based on Business Intelligence
Research of Smart Space based on Business Intelligence 1 Jia-yi YAO, 2 Tian-tian MA 1 School of Economics and Management, Beijing Jiaotong University, [email protected] 2 School of Economics and Management,
A Scheme for Automation of Telecom Data Processing for Business Application
A Scheme for Automation of Telecom Data Processing for Business Application 1 T.R.Gopalakrishnan Nair, 2 Vithal. J. Sampagar, 3 Suma V, 4 Ezhilarasan Maharajan 1, 3 Research and Industry Incubation Center,
Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing
BUSINESS INTELLIGENCE. Keywords: business intelligence, architecture, concepts, dashboards, ETL, data mining
BUSINESS INTELLIGENCE Bogdan Mohor Dumitrita 1 Abstract A Business Intelligence (BI)-driven approach can be very effective in implementing business transformation programs within an enterprise framework.
Four Methods to Monetize Service Assurance Monitoring Data
whitepaper Four Methods to Monetize Service Assurance Monitoring Data Using Service Assurance Analytics in Voice and Data Network Monitoring to Increase Revenue and Reduce Cost Introduction In general,
TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support
Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence
Multi-dimensional index structures Part I: motivation
Multi-dimensional index structures Part I: motivation 144 Motivation: Data Warehouse A definition A data warehouse is a repository of integrated enterprise data. A data warehouse is used specifically for
Database Marketing, Business Intelligence and Knowledge Discovery
Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
Design for Management Information System Based on Internet of Things
Design for Management Information System Based on Internet of Things * School of Computer Science, Sichuan University of Science & Engineering, Zigong Sichuan 643000, PR China, [email protected] Abstract
A Grid Architecture for Manufacturing Database System
Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies
3 Ways Retailers Can Capitalize On Streaming Analytics
3 Ways Retailers Can Capitalize On Streaming Analytics > 2 Table of Contents 1. The Challenges 2. Introducing Vitria OI for Streaming Analytics 3. The Benefits 4. How Vitria OI Complements Hadoop 5. Summary
A Knowledge Management Framework Using Business Intelligence Solutions
www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For
FITMAN Future Internet Enablers for the Sensing Enterprise: A FIWARE Approach & Industrial Trialing
FITMAN Future Internet Enablers for the Sensing Enterprise: A FIWARE Approach & Industrial Trialing Oscar Lazaro. [email protected] Ainara Gonzalez [email protected] June Sola [email protected]
CHAPTER-24 Mining Spatial Databases
CHAPTER-24 Mining Spatial Databases 24.1 Introduction 24.2 Spatial Data Cube Construction and Spatial OLAP 24.3 Spatial Association Analysis 24.4 Spatial Clustering Methods 24.5 Spatial Classification
Advanced Data Management Technologies
ADMT 2015/16 Unit 2 J. Gamper 1/44 Advanced Data Management Technologies Unit 2 Basic Concepts of BI and Data Warehousing J. Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Acknowledgements:
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
Data Cleansing for Remote Battery System Monitoring
Data Cleansing for Remote Battery System Monitoring Gregory W. Ratcliff Randall Wald Taghi M. Khoshgoftaar Director, Life Cycle Management Senior Research Associate Director, Data Mining and Emerson Network
Microsoft Services Exceed your business with Microsoft SharePoint Server 2010
Microsoft Services Exceed your business with Microsoft SharePoint Server 2010 Business Intelligence Suite Alexandre Mendeiros, SQL Server Premier Field Engineer January 2012 Agenda Microsoft Business Intelligence
10426: Large Scale Project Accounting Data Migration in E-Business Suite
10426: Large Scale Project Accounting Data Migration in E-Business Suite Objective of this Paper Large engineering, procurement and construction firms leveraging Oracle Project Accounting cannot withstand
Find the Information That Matters. Visualize Your Data, Your Way. Scalable, Flexible, Global Enterprise Ready
Real-Time IoT Platform Solutions for Wireless Sensor Networks Find the Information That Matters ViZix is a scalable, secure, high-capacity platform for Internet of Things (IoT) business solutions that
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
Asset Tracking System
Asset Tracking System System Description Asset & Person Tracking 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and
Data Warehousing Concepts
Data Warehousing Concepts JB Software and Consulting Inc 1333 McDermott Drive, Suite 200 Allen, TX 75013. [[[[[ DATA WAREHOUSING What is a Data Warehouse? Decision Support Systems (DSS), provides an analysis
Five Steps to Integrate SalesForce.com with 3 rd -Party Systems and Avoid Most Common Mistakes
Five Steps to Integrate SalesForce.com with 3 rd -Party Systems and Avoid Most Common Mistakes This white paper will help you learn how to integrate your SalesForce.com data with 3 rd -party on-demand,
Tutorials for Project on Building a Business Analytic Model Using Data Mining Tool and Data Warehouse and OLAP Cubes IST 734
Cleveland State University Tutorials for Project on Building a Business Analytic Model Using Data Mining Tool and Data Warehouse and OLAP Cubes IST 734 SS Chung 14 Build a Data Mining Model using Data
Use of a Web-Based GIS for Real-Time Traffic Information Fusion and Presentation over the Internet
Use of a Web-Based GIS for Real-Time Traffic Information Fusion and Presentation over the Internet SUMMARY Dimitris Kotzinos 1, Poulicos Prastacos 2 1 Department of Computer Science, University of Crete
High-Volume Data Warehousing in Centerprise. Product Datasheet
High-Volume Data Warehousing in Centerprise Product Datasheet Table of Contents Overview 3 Data Complexity 3 Data Quality 3 Speed and Scalability 3 Centerprise Data Warehouse Features 4 ETL in a Unified
A Design and implementation of a data warehouse for research administration universities
A Design and implementation of a data warehouse for research administration universities André Flory 1, Pierre Soupirot 2, and Anne Tchounikine 3 1 CRI : Centre de Ressources Informatiques INSA de Lyon
ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search
Project for Michael Pitts Course TCSS 702A University of Washington Tacoma Institute of Technology ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Under supervision of : Dr. Senjuti
Research on Data Processing Technology Based on the Middleware of the IoT
Research on Data Processing Technology Based on the Middleware of the IoT School of Information, Beijing Wuzi University, Beijing, China, [email protected] Abstract To get effective events based on
Week 13: Data Warehousing. Warehousing
1 Week 13: Data Warehousing Warehousing Growing industry: $8 billion in 1998 Range from desktop to huge: Walmart: 900-CPU, 2,700 disk, 23TB Teradata system Lots of buzzwords, hype slice & dice, rollup,
Agile Manufacturing for ALUMINIUM SMELTERS
Agile Manufacturing for ALUMINIUM SMELTERS White Paper This White Paper describes how Advanced Information Management and Planning & Scheduling solutions for Aluminium Smelters can transform production
CONCEPTUALIZING BUSINESS INTELLIGENCE ARCHITECTURE MOHAMMAD SHARIAT, Florida A&M University ROSCOE HIGHTOWER, JR., Florida A&M University
CONCEPTUALIZING BUSINESS INTELLIGENCE ARCHITECTURE MOHAMMAD SHARIAT, Florida A&M University ROSCOE HIGHTOWER, JR., Florida A&M University Given today s business environment, at times a corporate executive
Maximizing Returns through Advanced Analytics in Transportation
Maximizing Returns through Advanced Analytics in Transportation Table of contents Industry Challenges 1 Use Cases for High Performance Analytics 1 Fleet Optimization / Predictive Maintenance 1 Network
MOBILITY DATA MODELING AND REPRESENTATION
PART I MOBILITY DATA MODELING AND REPRESENTATION 1 Trajectories and Their Representations Stefano Spaccapietra, Christine Parent, and Laura Spinsanti 1.1 Introduction For a long time, applications have
The STC for Event Analysis: Scalability Issues
The STC for Event Analysis: Scalability Issues Georg Fuchs Gennady Andrienko http://geoanalytics.net Events Something [significant] happened somewhere, sometime Analysis goal and domain dependent, e.g.
