1,944 research outputs found

    RFID-enabled Supply Chain Collaboration Services in a Networked Retail Business Environment

    Get PDF
    Since the early 1990s, there has been a growing understanding that supply chain management should be built around information sharing and collaboration among supply chain partners. The emergence of RFID technology is expected to revolutionize many of the collaborative supply chain processes and to empower new collaboration scenarios, such as anti-counterfeiting, product recall and reverse logistics, collaborative in-store promotion management and total inventory management. This paper proposes eight RFID-enabled supply chain collaboration services (e.g. dynamic pricing, smart recall, in-store promotion management, out-of-shelf response) in a networked retail business environment. The services are characterized, on a high-level, by the information shared between retailers and suppliers, the level of tagging (pallet/case/item level) and the location of the tag readers. Also, a scalable-distributed network architecture, building on the possibilities provided by web service orchestration and data stream management systems, is proposed to support these collaborative supply chain management processes. However, this paper introduces into a research-in-progress with the ultimate purpose to assess and categorize the RFID-enabled supply chain collaboration services according to four dimensions: the extent of collaboration required between retailers and suppliers, the RFID technology requirements, the transformation of existing (or the introduction of new) processes and the business performance impact of the RFID-enabled collaborative service. This research is partly funded by the European Commission (IST-2005, FP6) through the IST SMART research project with participating user companies being European grocery retailers and suppliers from the fast-moving consumer goods sector

    Middleware Technologies for Cloud of Things - a survey

    Get PDF
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    Middleware Technologies for Cloud of Things - a survey

    Full text link
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    Smart access control system with behavioral profiling and dynamic PIN concept

    Get PDF
    Since ancient time, an access control device has been used for securing valuable properties as well as lives from threatening peoples. The most representative security device is Lock/Key. Recently, those security device technologies have been improved tremendously and provided various types of security methods. Nevertheless, these methods are not individually perfect to provide optimal security so that in recent years many such methods have been combined and used together to provide the required level of security. However, such combination can enhance security for limited number of users only but very difficult to provide scalable security with the number of users increases. They, most of the time, are not convenient for wide range of users (i.e., the innocent users who do not pose any threat) due to access time delay and different layers of authentication. We believe that the system should exhibit capabilities that support adaptive security procedures for different range of users so most innocent users require minimum layer of identity authentication and verification while suspicious users may require passing through maximum along with some additional layers of security authentication and verification. These capabilities enable the system providing enhanced security as well as convenience to the users. A natural question in providing enhanced security is how to categorize certain individual users who require additional layers of authentication. We address this question by proposing a novel smart access control (SAC) system which can identify and categorize suspicious users from the analysis of their behavioral activities and bio-information

    Big data analytics for large-scale wireless networks: Challenges and opportunities

    Full text link
    © 2019 Association for Computing Machinery. The wide proliferation of various wireless communication systems and wireless devices has led to the arrival of big data era in large-scale wireless networks. Big data of large-scale wireless networks has the key features of wide variety, high volume, real-time velocity, and huge value leading to the unique research challenges that are different from existing computing systems. In this article, we present a survey of the state-of-art big data analytics (BDA) approaches for large-scale wireless networks. In particular, we categorize the life cycle of BDA into four consecutive stages: Data Acquisition, Data Preprocessing, Data Storage, and Data Analytics. We then present a detailed survey of the technical solutions to the challenges in BDA for large-scale wireless networks according to each stage in the life cycle of BDA. Moreover, we discuss the open research issues and outline the future directions in this promising area

    RFID Product Authentication in EPCglobal Network

    Get PDF

    ICT tools for data management and analysis to support decisional process oriented to sustainable agri-food chains

    Get PDF
    Il settore agroalimentare sta affrontando delle sfide globali. La prima riguarda sfamare la popolazione mondiale che nel 2050, secondo le proiezioni delle Nazioni Unite, raggiungerà quota 9,3 miliardi di persone. La seconda sfida riguarda la richiesta da parte dei consumatori di prodotti ottenuti da filiere agroalimentari sempre più sostenibili, sicure e trasparenti. In particolare, l’Agricoltura sostenibile è una tecnica di gestione in grado di preservare la diversità biologica, la produttività, la capacità di rigenerazione, la vitalità e l’abilità alla funzione di un ecosistema agricolo, assicurandone, oggi e in futuro, le funzioni ecologiche, economiche e sociali a livello locale, nazionale ed globale, senza danneggiare altri ecosistemi. Quindi, per fronteggiare la sfida dell’agricoltura sostenibile, gli agricoltori devono aumentare la qualità e la quantità della produzione, riducendo l’impatto ambientale attraverso nuovi strumenti e nuove strategie di gestione. Questo lavoro analizza l’integrazione nel settore agroalimentare di alcune tecnologie e metodologie ICT per l’acquisizione, gestione e analisi dei dati, come la tecnologia RFID (Radio Frequency IDentification), i FMIS (Farm Management Information Systems), i DW (Data Warehouse) e l’approccio OLAP (On-Line Analytical Processing). Infine, l’adozione delle tecnologie ICT da parte di vere aziende è stata valutata attraverso un questionario. Al riguardo dell’adozione delle tecnologie RFID, questo lavoro analizza l’opportunità di trasferimento tecnologico relativo al monitoraggio e controllo dei prodotti agroalimentari tramite l’utilizzo di sensori innovativi, intelligenti e miniaturizzati. Le informazioni riguardanti lo stato del prodotto sono trasferite in tempo reale in wireless, come previsto dalla tecnologia RFID. In particolare, due soluzioni RFID sono state analizzate, evidenziando vantaggi e punti critici in confronto ai classici sistemi per assicurare la tracciabilità e la qualità dei prodotti agroalimentari. Quindi, questo lavoro analizza la possibilità di sviluppare una struttura che combina le tecnologie della Business Intelligence con i principi della Protezione Integrata (IPM) per aiutare gli agricoltori nel processo decisionale, andando a diminuire l’impatto ambientale ed aumentare la performance produttiva. L’IPM richiede di utilizzare simultaneamente diverse tecniche di protezione delle colture per il controllo dei parassiti e patogeni tramite un approccio ecologico ed economico. Il sistema di BI proposto è chiamato BI4IPM e combina l’approccio OLTP (On-Line Transaction Processing) con quello OLAP per verificare il rispetto dei disciplinari di produzione integrata. BI4IPM è stato testato con dati provenienti da vere aziende olivicole pugliesi. L’olivo è una delle principali colture a livello globale e la Puglia è la prima regione produttrice in Italia, con un gran numero di aziende che generano dati sull’IPM. Le strategie di protezione delle colture sono correlate alle condizioni climatiche, considerando la forte relazione tra clima, colture e parassiti. Quindi, in questo lavoro è presentato un nuovo e avanzato modello OLAP che integra il GSI (Growing Season Index), un modello fenologico, per comparare indirettamente le aziende agricole dal punto di vista climatico. Il sistema proposto permette di analizzare dati IPM di diverse aziende agricole che presentano le stesse condizioni fenologiche in un anno al fine di individuare best practices e di evidenziare e spiegare pratiche differenti adottate da aziende che lavorano in differenti condizioni climatiche. Infine, è stata effettuata un’indagine al fine di capire come le aziende agricole della Basilicata si raggruppano in funzione del livello di innovazione adottato. È stato utilizzato un questionario per domandare alle aziende se adottano strumenti ICT, ed eventualmente in quale processo produttivo o di management vengano usati. È stata quindi effettuata un’analisi cluster sui dati raccolti. I risultati mostrano che, usando il metodo di clustering k-means, appaiono due gruppi: gli innovatori e gli altri. Mentre, applicando la rappresentazione boxlot, si ottengono 3 gruppi: innovatori, utilizzatori precoci e ritardatari.The Agri-Food sector is facing global challenges. The first issue concerns feeding a world population that in 2050, according to United Nations projections, will reach 9.3 billion people. The second challenge is the request by consumers for high quality products obtained by more sustainable, safely and clear agri-food chains. In particular, the Sustainable agriculture is a management strategy able to preserve the biological diversity, productivity, regeneration capacity, vitality and ability to function of an agricultural ecosystem, ensuring, today and in the future, significant ecological, economic and social functions at the local, national and global scales, without harming other ecosystems. Therefore, to face the challenge of the sustainable agriculture, farmers need to increase quality and quantity of the production, reducing the environmental impact through new management strategies and tools. This work explores the integration of several ICT technologies and methodologies in the agri-food sector for the data acquisition, management and analysis, such as RFID technology, Farm Management Information Systems (FMIS), Data Warehouse (DW) and On-Line Analytical Processing (OLAP). Finally, the adoption of the ICT technologies by real farms is evaluated through a survey. Regarding the adoption of the RFID technology, this work explores an opportunity for technology transfer related to the monitoring and control of agri-food products, based on the use of miniaturized, smart and innovative sensors. The information concerning to the state of the product is transferred in real time in a wireless way, according to the RFID technology. In particular, two technical solutions involving RFID are provided, highlighting the advantages and critical points referred to the normal system used to ensure the traceability and the quality of the agri-food products. Therefore, this work explores the possibility of developing a framework that combines business intelligence (BI) technologies with Integrated Pest Management (IPM) principles to support farmers in the decisional process, thereby decreasing environmental cost and improving production performance. The IPM requires the simultaneous use of different crop protection techniques to control pests through an ecological and economic approach. The proposed BI system is called BI4IPM, and it combines on-line transaction processing (OLTP) with OLAP to verify adherence to the IPM technical specifications. BI4IPM is tested with data from real Apulian olive crop farms. Olive tree is one of the most important crop at global scale and Apulia is the first olive-producing region in Italy, with a huge amount of farms that generate IPM data. The crop protection strategies are correlated to the climate conditions considering the very important relation among climate, crops and pests. Therefore, in this work is presented a new advanced OLAP model integrating the Growing Season Index (GSI), a phenology model, to compare indirectly the farms by a climatic point of view. The proposed system allows analysing IPM data of different farms having the same phenological conditions over a year to understand some best practices and to highlight and explain different practices adopted by farms working in different climatic conditions. Finally, a survey aimed at investigating how Lucania' farms cluster according to the level of innovation adopted was performed. It was used a questionnaire for asking if farms adopt ICTs tools and, in case, what type they involved in managing and/or production processes. It has been done a cluster analysis on collected data. Results show that, using k-means clustering method, appear two clusters: innovators, remaining groups. While, using boxplot representation, clustered three groups: innovators, early adopters and laggards
    • …
    corecore