ABSTRACT
In the management of transport and logistics, which includes the delivery, movement and collection of goods through roads, ports and airports, participate, in general, many different actors. The most critical aspects of supply chain systems include time, space and interdependencies. Besides, there are several security challenges that can be caused both by unintentional and intentional errors. With all this in mind, this work proposes the combination of technologies such as RFID, GPS, WiFi Direct and LTE/3G to automate product authentication and merchandise tracking, reducing the negative effects caused either by mismanagement or attacks against the process of the supply chain. In this way, this work proposes a ubiquitous management scheme for the monitoring through the cloud of freight and logistics systems, including demand management, customization and automatic replenishment of out-of-stock goods. The proposal implies an improvement in the efficiency of the systems, which can be quantified in a reduction of time and cost in the inventory and distribution processes, and in a greater facility for the detection of counterfeit versions of branded articles. In addition, it can be used to create safer and more efficient schemes that help companies and organizations to improve the quality of the service and the traceability of the transported goods.
- European Rapex Reports. Available at http://ec.europa.eu/consumers/safety/rapex/ {retrieved: August, 2018}Google Scholar
- C investment hot. U.S. companies have begun to attack the more than $117 billion in excess inventory and $83 billion in lost sales. Material Handling Management, 2004.Google Scholar
- R Angeles, RFID Technologies: Supply-Chain Applications and Implementation Issues. Information Systems Management 22(1), pp. 51--65, 2005.Google ScholarCross Ref
- D. Simchi-Levi, Designing and managing the supply chain, Mcgraw-Hill College, 2005. Google ScholarDigital Library
- M. Christopher, Logistics And Supply Chain Management: Creating Value-Adding Networks, Pearson Education, 2005.Google Scholar
- B. M. Beamon, Supply Chain Design and Analysis: Models and Methods, International Journal of Production Economics 55(3), pp. 281--294, 1998.Google ScholarCross Ref
- H.L. Lee, S. Whang, Higher supply chain security with lower cost: Lessons from total quality management, International Journal of production economics 96(3), pp.289--300, 2005.Google Scholar
- D. Turker, C. Altuntas, Sustainable supply chain management in the fast fashion industry, An analysis of corporate reports, European Management Journal 32(5), pp. 837--849, 2014.Google ScholarCross Ref
- .K. Srivastava, Green supply chain management: a state-of-the-art literature review, International Journal of Management Reviews 9(1), pp. 53--80, 2007.Google ScholarCross Ref
- D.C. Ranasinghe, S. Devadas, P.H. Cole, A Low Cost Solution to Cloning and Authentication Based on a Lightweight Primitive, Networked RFID Systems and Lightweight Cryptography, Part IV, Springer, pp. 289--309, 2008.Google Scholar
- P. Caballero-Gil, C. Caballero-Gil, J. Molina-Gil, C. Hernandez-Goya, Self-Organized Authentication Architecture for Mobile Ad-hoc Networks, 6th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc, and Wireless Networks, pp. 217--224, 2008.Google Scholar
- Package Buddy, Available at play.google.com, {retrieved: August, 2018}.Google Scholar
- Package Tracker Pro, Available at play.google.com, {retrieved: August, 2018}.Google Scholar
- M. Bouet, A.L. Dos Santos, RFID Tags: Positioning Principles and Localization Techniques, Wireless Days, pp. 1--5, 2008.Google Scholar
- B. King, X. Zhang, Securing the pharmaceutical supply chain using RFID, International Conference on Multimedia and Ubiquitous Engineering, pp 26--28, 2007. Google ScholarDigital Library
- QR Code Generator, https://www.the-qrcode-generator.com/, {retrieved: August, 2018}Google Scholar
- C. Caballero-Gil, P. Caballero-Gil, A. Peinado-Dominguez, J. Molina-Gil, Lightweight Authentication for RFID Used in VANETs,Lecture Notes in Computer Science 6928, pp. 493--500, 2012. Google ScholarDigital Library
Recommendations
Price and Delivery Logistics Competition in a Supply Chain
We consider a supply chain in which two suppliers compete for supply to a customer. Pricing and delivery-frequency decisions in the system are analyzed by two three-stage noncooperative games with different decision rights designated to the parties ...
Minimizing the Total Cost in an Integrated Vendor--Managed Inventory System
In this paper we consider a complex production-distribution system, where a facility produces (or orders from an external supplier) several items which are distributed to a set of retailers by a fleet of vehicles. We consider Vendor-Managed Inventory (...
Competitiveness Analysis of the Georgian Transport and Logistics System in the Black Sea Region: Challenges and Perspectives
Computational Science and Its Applications – ICCSA 2021AbstractWe have discussed transit potential as the actor of the regional development and Georgia as the transit hub in this piece of work. Performing the function of transit hub represents an important economic and political aspiration for Georgia’s ...
Comments