17,535 research outputs found

    The strategic importance of supply chains and the RFID radio data identification system

    Get PDF
    Purpose: The paper presents the issues related to the process of supply chain management. It presents the essence and classification of supply chains and the interpretation of global supply network management. Design/Methodology/Approach: Using systems theory as a basis, a RFID utilization and outcome(s) performance model was developed from the literature. The study uses surveys conducted among twenty companies in the 2016-2017 research year. Enterprises that use RFID technologies in the supply chain were analyzed. Findings: The Findings indicate that application of RFID technology leads to improved manufacturing efficiency and manufacturing effectiveness, while improvement in efficiency lead directly to improved organizational performance, and improvements in effectiveness lead directly to improved supply chain performance. Practical Implications: Certain policy implications and obligations accrue are companies that use RFID technology in their supply order to manage the company more efficiently. Originality/Value: The publication presents the results of research carried out in enterprises using the new RFID system as a modern technique of supporting supply chain management to increase the efficiency of cooperation throughout the entire supply chain.peer-reviewe

    PhyNetLab: An IoT-Based Warehouse Testbed

    Full text link
    Future warehouses will be made of modular embedded entities with communication ability and energy aware operation attached to the traditional materials handling and warehousing objects. This advancement is mainly to fulfill the flexibility and scalability needs of the emerging warehouses. However, it leads to a new layer of complexity during development and evaluation of such systems due to the multidisciplinarity in logistics, embedded systems, and wireless communications. Although each discipline provides theoretical approaches and simulations for these tasks, many issues are often discovered in a real deployment of the full system. In this paper we introduce PhyNetLab as a real scale warehouse testbed made of cyber physical objects (PhyNodes) developed for this type of application. The presented platform provides a possibility to check the industrial requirement of an IoT-based warehouse in addition to the typical wireless sensor networks tests. We describe the hardware and software components of the nodes in addition to the overall structure of the testbed. Finally, we will demonstrate the advantages of the testbed by evaluating the performance of the ETSI compliant radio channel access procedure for an IoT warehouse

    Feasibility of Warehouse Drone Adoption and Implementation

    Get PDF
    While aerial delivery drones capture headlines, the pace of adoption of drones in warehouses has shown the greatest acceleration. Warehousing constitutes 30% of the cost of logistics in the US. The rise of e-commerce, greater customer service demands of retail stores, and a shortage of skilled labor have intensified competition for efficient warehouse operations. This takes place during an era of shortening technology life cycles. This paper integrates several theoretical perspectives on technology diffusion and adoption to propose a framework to inform supply chain decision-makers on when to invest in new robotics technology

    Design Principles for Closed Loop Supply Chains

    Get PDF
    In this paper we study design principles for closed loop supply chains. Closed loop supply chains aim at closing material flows thereby limiting emission and residual waste, but also providing customer service at low cost. We study 'traditional' and 'new' design principles known in the literature. It appears that setting up closed loop supply chains requires some additional design principles because of sustainability requirements. At the same time however, we see that traditional principles also apply. Subsequently we look at a business situation at Honeywell. Here, only a subset of the relevant design principles is applied. The apparent low status of reverse logistics may provide an explanation for this. To some extent, the same mistakes are made again as were 20 years ago in, for instance, inbound logistics. Thus, obvious improvements can be made by applying traditional principles. Also new principles, which require a life cycle driven approach, need to be applied. This can be supported by advanced management tools such as LCA and LCC.reverse logistics;case-study;closed loop supply chains

    GUARDIANS final report

    Get PDF
    Emergencies in industrial warehouses are a major concern for firefghters. The large dimensions together with the development of dense smoke that drastically reduces visibility, represent major challenges. The Guardians robot swarm is designed to assist fire fighters in searching a large warehouse. In this report we discuss the technology developed for a swarm of robots searching and assisting fire fighters. We explain the swarming algorithms which provide the functionality by which the robots react to and follow humans while no communication is required. Next we discuss the wireless communication system, which is a so-called mobile ad-hoc network. The communication network provides also one of the means to locate the robots and humans. Thus the robot swarm is able to locate itself and provide guidance information to the humans. Together with the re ghters we explored how the robot swarm should feed information back to the human fire fighter. We have designed and experimented with interfaces for presenting swarm based information to human beings

    GUARDIANS final report part 1 (draft): a robot swarm assisting a human fire fighter

    Get PDF
    Emergencies in industrial warehouses are a major concern for fire fighters. The large dimensions together with the development of dense smoke that drastically reduces visibility, represent major challenges. The Guardians robot swarm is designed to assist re ghters in searching a large warehouse. In this paper we discuss the technology developed for a swarm of robots assisting re ghters. We explain the swarming algorithms which provide the functionality by which the robots react to and follow humans while no communication is required. Next we discuss the wireless communication system, which is a so-called mobile ad-hoc network. The communication network provides also the means to locate the robots and humans. Thus the robot swarm is able to provide guidance information to the humans. Together with the fire fighters we explored how the robot swarm should feed information back to the human fire fighter. We have designed and experimented with interfaces for presenting swarm based information to human beings

    Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation

    Full text link
    The growing expanse of e-commerce and the widespread availability of online databases raise many fears regarding loss of privacy and many statistical challenges. Even with encryption and other nominal forms of protection for individual databases, we still need to protect against the violation of privacy through linkages across multiple databases. These issues parallel those that have arisen and received some attention in the context of homeland security. Following the events of September 11, 2001, there has been heightened attention in the United States and elsewhere to the use of multiple government and private databases for the identification of possible perpetrators of future attacks, as well as an unprecedented expansion of federal government data mining activities, many involving databases containing personal information. We present an overview of some proposals that have surfaced for the search of multiple databases which supposedly do not compromise possible pledges of confidentiality to the individuals whose data are included. We also explore their link to the related literature on privacy-preserving data mining. In particular, we focus on the matching problem across databases and the concept of ``selective revelation'' and their confidentiality implications.Comment: Published at http://dx.doi.org/10.1214/088342306000000240 in the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org
    corecore