7,629 research outputs found

    The use of information systems for logistics and supply chain management in South East Europe: Current status and future direction

    Get PDF
    This research aims to investigate the current status and future direction of the use of information systems for logistics and supply chain management (LSCM) in South East Europe. The objectives are threefold: (1) to identify major challenges and developments on the use of information systems for LSCM by enterprises, (2) to examine the actual level of satisfaction of current policy on LSCM, and (3) to reveal the actual need of enterprises in South East Europe on effective use of information systems for LSCM. Mixed methodology of literature review and questionnaire survey is adopted in this research. Data collected from 79 enterprises are analysed using descriptive analysis in SPSS. The findings suggest that enterprises in Albania, Bulgaria, Greece, Former Yugoslav Republic of Macedonia (FYROM), Romania, and Serbia and Montenegro, face similar challenges but all are in different stages of developments of LSCM. Their use of information systems explains their heavy focus on supply chain partnership and weakness in demand chain partnership. Major findings suggest that companies and governments alike in that region do not seem to be ready for playing a significant and demanding role in global supply chains. Current deficiencies, including limited abilities in building valuable forward relations, weak strategic planning and organisation, and infrastructural problems, are major obstacles for fast development in LSCM. At the same time though, traces of changing mentalities do exist, setting the ground for improved performance and ultimately for a better position in global business

    Simulation of undular bores evolution with damping

    Get PDF
    Propagation of undular bores with damping is considered in the framework of perturbed extended Korteweg-de Vries (peKdV) equation. Two types of damping terms for the peKdV equation, namely linear and Chezy frictional terms, which describe the turbulent boundary layers in the fluid flow are considered. Solving the peKdV equation numerically using the method of lines shows that under the influence of damping, the lead-ing solitary wave of the undular bores will split from the nonlinear wavetrain, propagates and behaves like an isolated solitary wave. The amplitude of the leading wave will remain the same for some times before it starts to decay again at a larger time. In general the amplitude of the leading wave and the mean level across the undular bore decreases due to the effect of damping

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Radio Frequency Identification Technology: Applications, Technical Challenges and Strategies

    Get PDF
    Purpose - The purpose of this paper is to discuss the technology behind RFID systems, identify the applications of RFID in various industries, and discuss the technical challenges of RFID implementation and the corresponding strategies to overcome those challenges. Design/methodology/approach - Comprehensive literature review and integration of the findings from literature. Findings - Technical challenges of RFID implementation include tag cost, standards, tag and reader selection, data management, systems integration and security. The corresponding solution is suggested for each challenge. Research limitations/implications - A survey type research is needed to validate the results. Practical implications - This research offers useful technical guidance for companies which plan to implement RFID and we expect it to provide the motivation for much future research in this area. Originality/value - As the infancy of RFID applications, few researches have existed to address the technical issues of RFID implementation. Our research filled this gap

    RFID AND INFORMATION SYSTEMS IN COMMERCE

    Get PDF
    The paper analysis the possibilities of using, a relative new technology, RFID, in commerce. The main features of this technology, the components of the system, the way the system functions and the stages of the implementing process are also presented. Another part of the paper is devoted to the identification of the advantages of RFID technology and of the hurdels faced by companies in adopting it. The interest for this technology, used as solution for the management of information systems, is in a continuous increase, despite all the problems related to the high cost of the implementation and the wrong legislation, which stops the spread of this technology on a larger scale. The technology is now presented in a relatively small number of companies, but, certainly, it will be adopted, by more and more information systems in the future and it will extend in other activities too.information, radio waves, labels, antenna, reader

    Bridging global divides with tracking and tracing technology

    Get PDF
    Product-tracking technology is increasingly available to big players in the value chain connecting producers to consumers, giving them new competitive advantages. Such shifts in technology don't benefit small producers, especially those in developing regions, to the same degree. This article examines the practicalities of leveling the playing field by creating a generic form of tracing technology that any producer, large or small, can use. It goes beyond considering engineering solutions to look at what happens in the context of use, reporting on work with partners in Chile and India and reflecting on the potential for impact on business and community well-being

    Smart Technologies for Environmental Safety and Knowledge Enhancement in Intermodal Transport

    Get PDF
    International concerns about security in transport systems are leading to a new international regulation in this field. This introduces new requirements for operators and authorities as well as it opens new challenges, in particular when referred to seaports and maritime transport in the Mediterranean area, where many seaport terminals and infrastructures are affected by a noteworthy technological divide from North European contexts. In such contexts, the adoption of the new regulations can represent the right chance for upgrading the local operative standards, increasing latu sensu the quality of maritime transport performances, while conferring a greater level to security and safety checks. This paper explores the chances for increasing the level of Mediterranean seaport competitiveness allowed by technological innovations in transport systems, both in operations and organization of these infrastructures. The aim of the work is to study the effects of the adoption of technological solutions such as wireless communications and radiofrequency identification on the competitiveness of Mediterranean seaport infrastructures. Technological solutions designed to identify good items help operators in organizing activities in terminals and make maritime transport faster in delivering goods, by cutting the handling time and costs in seaport terminals. Seaports that adopt this kind of technologies, and the surrounding economic areas connected to seaports, have a greater attractiveness on shipping companies and operators, since they allow faster handling activities and easier checks on goods. Besides, the analysis of direct and indirect effects of the use of such technologies specifically focuses on the contribution that the use of these solutions gives in ensuring higher security levels, by increasing the level of information and knowledge associated to goods. The different types of security provided (e.g. for people, environment and goods) and the extreme flexibility of the technologies involved give the overall worth of the challenge. It seems to be a great chance of growth for the Mediterranean area, more than a mere compliance to the international security regulations.
    • …
    corecore