129 research outputs found

    A new framework for the management of returnable "containers" within open supply networks

    No full text
    International audienceNew logistics models – physical internet, pooling, control towers, re-usable containers management – require an item-level traceability of physical shipping units that is independent of the partners involved in the supply chains. Current information systems architectures match this need by interfacing heter-ogeneous systems with each other. Such architecture can't meet the challenges brought by new and shared logistics models. We demonstrate here how the re-cent EPCglobal® standards and related technologies are settled in a multi-firm open network, applied to the management of reusable pallets, taken here as de-monstrators of Open Tracing Containers (OTC). Material and methods for cap-turing data and structuring information are proposed and implemented in the Fast Moving Consumer Goods flows. Results illustrate the reach of that "Intra-net of things" prototype, leading to interoperable logistic services, throughout various levels: from identifier tag level up to the piloting of each partner's lo-gistics networks. We highlight limits and perspectives in terms of technical track and trace solutions and assets management in this environment

    Internet of Things future in Edge Computing

    Get PDF
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and its research opportunitie

    IOT future in Edge Computing

    Full text link
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and its research opportunities

    Business process and technology lessons learned, recommendations and best practices for new adopters

    Get PDF
    Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2006."June 2006."Includes bibliographical references (leaves 117-118).This thesis focuses on documenting learnings from a RFID data exchange pilot in the fast moving consumer goods industry. The pilot we studied is a collaborative effort between two of the largest retailers in the world and five of their major suppliers, facilitated by EPCglobal and the MIT Auto-ID labs. Currently, manufacturers and suppliers are building the infrastructure to exchange EPC data to validate standards and proof of concepts for RFID adoption. The outcome of these pilots will essentially set the stage for large scale RFID adoption worldwide. Our thesis attempts to document issues relating to data exchange from business process, organizational and technical perspectives. We have synthesized the findings and consolidated the lessons learned during the pilot in an attempt to form a set of actionable recommendations for new companies looking to start on RFID pilot projects.by Rida Chan [and] Sangeeth Ram.M.Eng.in Logistic

    IP-based RFID Location System

    Get PDF

    Context-aware Dynamic Discovery and Configuration of 'Things' in Smart Environments

    Full text link
    The Internet of Things (IoT) is a dynamic global information network consisting of Internet-connected objects, such as RFIDs, sensors, actuators, as well as other instruments and smart appliances that are becoming an integral component of the future Internet. Currently, such Internet-connected objects or `things' outnumber both people and computers connected to the Internet and their population is expected to grow to 50 billion in the next 5 to 10 years. To be able to develop IoT applications, such `things' must become dynamically integrated into emerging information networks supported by architecturally scalable and economically feasible Internet service delivery models, such as cloud computing. Achieving such integration through discovery and configuration of `things' is a challenging task. Towards this end, we propose a Context-Aware Dynamic Discovery of {Things} (CADDOT) model. We have developed a tool SmartLink, that is capable of discovering sensors deployed in a particular location despite their heterogeneity. SmartLink helps to establish the direct communication between sensor hardware and cloud-based IoT middleware platforms. We address the challenge of heterogeneity using a plug in architecture. Our prototype tool is developed on an Android platform. Further, we employ the Global Sensor Network (GSN) as the IoT middleware for the proof of concept validation. The significance of the proposed solution is validated using a test-bed that comprises 52 Arduino-based Libelium sensors.Comment: Big Data and Internet of Things: A Roadmap for Smart Environments, Studies in Computational Intelligence book series, Springer Berlin Heidelberg, 201

    Tracking RFID

    Get PDF
    RFID-Radio Frequency Identification-is a powerful enabling technology with a wide range of potential applications. Its proponents initially overhyped its capabilities and business case: RFID deployment is proceeding along a much slower and less predictable trajectory than was initially thought. Nonetheless, in the end it is plausible that we will find ourselves moving in the direction of a world with pervasive RFID: a world in which objects\u27 wireless self-identification will become much more nearly routine, and networked devices will routinely collect and process the resulting information. RFID-equipped goods and documents present privacy threats: they may reveal information about themselves, and hence about the people carrying them, wirelessly to people whom the subjects might not have chosen to inform. That information leakage follows individuals, and reveals how they move through space. Not only does the profile that RFID technology helps construct contain information about where the subject is and has been, but RFID signifiers travel with the subject in the physical world, conveying information to devices that otherwise would not recognize it and that can take actions based on that information. RFID implementations, thus, can present three related privacy threats, which this article categorizes as surveillance, profiling, and action. RFID privacy consequences will differ in different implementations. It would be a mistake to conclude that an RFID implementation will pose no meaningful privacy threat because a tag does not directly store personally identifiable information, instead containing only a pointer to information contained in a separate database. Aside from any privacy threats presented by the database proprietor, privacy threats from third parties will depend on the extent to which those third parties can buy, barter, or otherwise gain database access. Where a tag neither points to nor carries personal identifying information, the extent of the privacy threat will depend in part on the degree to which data collectors will be able to link tag numbers with personally identifying information. Yet as profiling accelerates in the modem world, aided by the automatic, networked collection of information, information compiled by one data collector will increasingly be available to others as well; linking persistent identifiers to personally identifying information may turn out to be easy. Nor are sophisticated access controls and other cryptographic protections a complete answer to RFID privacy threats. The cost of those protections will make them impractical for many applications, though, and even with more sophisticated technology, security problems will remain. This article suggests appropriate government and regulatory responses to two important categories of RFID implementation. It concludes with a way of looking at, and an agenda for further research on, wireless identification technology more generally

    RFID: Prospects for Europe: Item-level Tagging and Public Transportation

    Get PDF
    This report, which is part of the COMPLETE series of studies, investigates the current and future competitiveness of the European industry in RFID applications in general and in two specific cases: item-level tagging and public transportation. It analyses its constituent technologies, drivers and barriers to growth, actual and potential markets and economic impacts, the industrial position and innovative capabilities, and it concludes with policy implicationsJRC.DDG.J.4-Information Societ

    Enabling Things to Talk

    Get PDF
    Information Systems Applications (incl. Internet); Business IT Infrastructure; Computer Appl. in Administrative Data Processing; Operations Management; Software Engineering; Special Purpose and Application-Based Systems; Business Information Systems; Ubiquitous Computing; Reference Architecture; Spatio-Temporal Systems; Smart Objects; Supply Chain Management; IoT; SCM; Web Applications; Internet of Things; Smart Homes; RFI
    • …
    corecore