159 Hits in 7.1 sec

An Inside Look at RFID Technology

Linda Castro, Samuel Fosso Wamba
2007 Journal of Technology Management & Innovation  
RFID (Radio Frequency Identification) is considered one of the "hottest" technologies due to its particular capabilities to track and trace in real-time objects across the extended supply chain.  ...  This article gives an inside look at the RFID world in order to improve the level of understanding of this technology and the EPC Network.  ...  EDI) RFID Solutions for Delivering Efficient, High Quality or EPC network, etc.)? Based on the answers to these Healthcare.  ... 
doaj:7740c742e5904ef395bfacfa5852f72b fatcat:rdxfzz6xrva2rjjfsgmhm4uw4u

Extended system design for RFID enabled supply chains with non-RFID technologies

John P.T. Mo, William Lorchirachoonkul
2012 International Journal of Business Information Systems  
An extended RFID system is proposed to enable these non-RFID technologies to be used in conjunction with EPC-based systems so that links to non-RFID sites can be established and the cost of system implementation  ...  The projects show that two major issues must be addressed for RFID technology to be used effectively in global supply chains.  ...  The authors would also like to thank the reviewers for their constructive and helpful comments.  ... 
doi:10.1504/ijbis.2012.047535 fatcat:okdfnf4pxfbodkr3efjynjohv4

Global Standards for Supply Chain Management in Consumer Packaged Goods Industry [chapter]

Virgil Popa
2012 Globalization - Education and Management Agendas  
Electronic Product Code: RFID drives the next revolution in adaptive retail supply chain execution RFID-Based EPC Will Fail in Supply Chains Built on Inaccurate Data The benefits promised by RFID-based  ...  based on EPC scanning  ... 
doi:10.5772/50100 fatcat:5z2fftdn3zd67ovl2hyhlfbdfq

RFID Infrastructure for Large Scale Supply Chains Involving Small and Medium Enterprises [chapter]

John P.T., William Lorchirachoonkul
2010 Sustainable Radio Frequency Identification Solutions  
We then discuss a virtualisation model which incorporates existing RFID framework based on the EPC Network for application in large scale supply chains.  ...  ) technology for fast moving consumer goods (FMCG) supply chains (Mo et al, 2009b) .  ... 
doi:10.5772/8004 fatcat:po2rim6kxzcy3nx66d52bzdnhe

Using fuzzy cognitive map for evaluation of RFID-based reverse logistics services

Amy J.C. Trappey, Chang-Ru Wu, Charles V. Trappey, Fu-Chiang Hsu
2009 2009 IEEE International Conference on Systems, Man and Cybernetics  
Reverse logistics research is used to analyze the processes associated with the flows of products, components and materials from end users to re-users in different industries.  ...  The products and components collected for reverse logistics are often widely dispersed, which complicates efforts to efficiently collect, reuse and reassemble used components for reprocessing and remanufacturing  ...  RFID Data Collection In this research, the data from supply chain intermediaries are collected using RFID technology. RFID provides real time monitoring and tracking of products in the supply chain.  ... 
doi:10.1109/icsmc.2009.5346268 dblp:conf/smc/TrappeyTWH09 fatcat:rpsh4tcuovfsxeuevga2grfrcu

Standards, Security & Privacy Issues about Radio Frequency Identification (RFID)

Evsen Korkmaz, Alp Ustundag
2007 2007 1st Annual RFID Eurasia  
These features provide RFID the advantage of expanding all echelons of the supply chain.  ...  From this point of view, we can say that auto-ID technologies are core components of automated inventory control systems on all echelons of supply chain.  ...  In spite of all progress on paving the way for RFID usage throughout the global supply chain, there still exist gaps on standardization.  ... 
doi:10.1109/rfideurasia.2007.4368148 fatcat:zsskgvt77ncjfnmr5c4lt4qscu

Security Control and Privacy Preservation in RFID enabled Wine Supply Chain [chapter]

Manmeet Mahinderjit-Singh, Xue LI, Zhanhuai LI
2011 Designing and Deploying RFID Applications  
Section 2 gives a literature review on RFID security and privacy issues in the supply chain. It also demonstrates the proposed trust framework. Section 3 explains the RFID-based wine supply chain.  ...  2) As many companies invest in networked RFID technology for varying supply chain applications, the item-level data can be gathered in any case (Lehtonen et al., 2006).  ...  Taxonomy of RFID security attacks in the supply chain The taxonomy of RFID security attacks in the supply chain is based on three security mechanisms -authentication, authorisation and trust services.  ... 
doi:10.5772/17496 fatcat:crmhdxelxzg5hggzbtf2pxyiae

Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience

Stephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen
2004 Conference on Privacy, Security and Trust  
We suggest that the in-store problem is more related to lack of privacy solutions for the consumer himself than for the RFID.  ...  Radio frequency identification (RFID) technology is expected to enhance the operational efficiency of supply chain processes and customer service as well as adding digital functionality to products that  ...  Studies have shown that companies spend between 12%-15% of their revenue on supply chain related activities [9] , so supply chain efficiency has become a necessary condition for survival.  ... 
dblp:conf/pst/EngbergHJ04 fatcat:vqouoruarjgu3dtz7jenmqp77e

Genetic algorithm dynamic performance evaluation for RFID reverse logistic management

Amy J.C. Trappey, Charles V. Trappey, Chang-Ru Wu
2010 Expert systems with applications  
(The framework revisited here was published as "Using fuzzy cognitive map for evaluation of RFID-based reverse logistics services", ).  ...  and transmission in reverse logistic management.  ...  In this research, a case is used to demonstrate and evaluate the implementation of fuzzy cognitive maps and genetic algorithms for managing the RFID-enabled reverse logistics of a cold storage chain.  ... 
doi:10.1016/j.eswa.2010.04.026 fatcat:zz34byb2zneibavmvypqwtkwne

Computing with RFID: Drivers, Technology and Implications [chapter]

George Roussos
2008 Advances in Computers  
We explore consumer applications and services using item-level rfid in particular.  ...  We begin with a primer on supply chains with particular reference to the relationship between efficiency and information flow.  ...  Further experience and research in this area is required although some estimates based on simulations employing simplified models of the FMCG supply-chain appear to be encouraging [24] .  ... 
doi:10.1016/s0065-2458(08)00404-x fatcat:y5tzzwkypvczdgzgqqfiihwtiy

Future impacts of RFID on e‐supply chains in grocery retailing

Edmund Prater, Gregory V. Frazier, Pedro M. Reyes, Khalid S. Soliman
2005 Supply chain management  
Purpose -To place the research on radio frequency identification (RFID) usage in supply chains within a specific business and market context; in this case, the grocery industry.  ...  Research limitations/implications -This paper focuses on the market drivers for RFID implementation.  ...  RFID provides the opportunity to reverse this trend and truly integrate the grocery supply chain. This paper provides a theoretical framework for applying RF technology in grocery supply chains.  ... 
doi:10.1108/13598540510589205 fatcat:f6xjgcfn2bemzffzfaqls2sbdq

Radio frequency identification technology: applications, technical challenges and strategies

Suhong Li, John K. Visich, Basheer M. Khumawala, Chen Zhang, Andreas Koschan
2006 Sensor Review  
RFID is revolutionizing business processes including supply chain and reverse logistics and decision making within and across organizations due to its ability to provide highly accurate, automated information  ...  The purpose of this paper is to discuss the technology behind RFID systems, identify the applications of RFID in various industries, and discuss the technical challenges of RFID implementation and the  ...  Angeles (1) provided managerial guidelines for RFID deployment in the supply chain and discussed implementation concerns.  ... 
doi:10.1108/02602280610675474 fatcat:xl6ojq4dvba7bhgtoz6h3mqgnq

RFID security and privacy: a research survey

A. Juels
2006 IEEE Journal on Selected Areas in Communications  
RFID tags track objects in supply chains, and are working their way into the pockets, belongings, and even the bodies of consumers.  ...  This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID).  ...  Weis for their comments on and suggestions for this work.  ... 
doi:10.1109/jsac.2005.861395 fatcat:rv6e4c26lbhsjfs5kthw7tpvvy

Gen2 RFID-Based System Framework for Resource Circulation in Closed-Loop Supply Chains

Young-woo Kim, Tai-Woo Chang, Jinwoo Park
2017 Sustainability  
In this context, a system framework for closed-loop supply chain management is proposed that gathers real-time information within a supply chain and product lifecycle by using the Internet-of-Things, including  ...  Finally, the lifecycle benefits are examined, such as counterfeit prevention, real-time monitoring and maintenance in the middle-of-life phase, and reverse process streamlining.  ...  Among various technology standards, Ultra high frequency (UHF) RFID has been used for supply chain management.  ... 
doi:10.3390/su9111995 fatcat:pnw3rbzwubgwfprioycrmqwjey

RFID Product Authentication in EPCglobal Network [chapter]

Tieyan Li, Wei He
2009 Development and Implementation of RFID Technology  
In fact, product authentication has stronger requirements on security and needs a more complex system to implement.  ...  RFID-based product authentication solutions leverage on the benefits provided by the RFID tags and the back-end information system within the RFID-  ...  EPC-DS Security EPC-DS provides visibility in the supply chain for all parties who have a right to know.  ... 
doi:10.5772/6533 fatcat:iigq3vsyvjgc5flxrsdwugie4q
« Previous Showing results 1 — 15 out of 159 results