The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2009 vol.13)
pp: 31-38
Alexander Ilic , ETH Zurich
Florian Michahelles , ETH Zurich
ABSTRACT
RFID technology tracks the flow of physical items and goods in supply chains to help users detect inefficiencies, such as shipment delays, theft, or inventory problems. An inevitable consequence, however, is that it generates huge numbers of events. To exploit these large amounts of data, the Supply Chain Visualizer increases supply-chain visibility by analyzing RFID data, using a mix of automated analysis techniques and human effort. The tool's core concepts include rule-based analysis techniques and a map-based representation interface. With these features, it lets users visualize the supply-chain structure, together with performance metrics, and detect problematic hot spots.
INDEX TERMS
RFID data, supply chain, visualization, rule-based analysis, RFID Meets the Internet, radio frequency identification
CITATION
Alexander Ilic, Thomas Andersen, Florian Michahelles, "Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis", IEEE Internet Computing, vol.13, no. 1, pp. 31-38, January/February 2009, doi:10.1109/MIC.2009.10
REFERENCES
1. S. Gal, "Footholds for Design," Bringing Design to Software, ACM Press, 1996, pp. 215–231.
2. EPCIS 1.0.1 Specification, EPCglobal, 2007; www.epcglobalinc.org/standards/epcisepcis_1_0_1-standard-20070921.pdf .
3. H.L. Lee and O. Ozer, "Unlocking the Value of RFID," working paper, Graduate School of Business, Stanford Univ., 2005.
4. J.J. Thomas and K.A. Cook, "A Visual Analytics Agenda," IEEE Computer Graphics and Applications, vol. 26, no. 1, 2006, pp. 10–13.
5. D. McFarlane and Y. Sheffi, "The Impact of Automatic Identification on Supply Chain Operations," Int'l J. Log-istics Management, vol. 14, no. 1, 2003, pp. 1–17.
6. A. Ilic et al., "Analyzing Product Flows with the Supply Chain Visualizer," demo at Int'l Conf. for Industry and Academia (Internet of Things 2008), 2008; www.im.ethz.ch/publicationsDemo_SCVIZ_IOT2008.pdf .
7. R. Koh et al., "Prediction, Detection, and Proof: An Integrated Auto-ID Solution to Retail Theft," white paper series, MIT-AUTOID-WH022, Auto-ID Labs, 2003.
8. M. Lehtonen, F. Michahelles, and E. Fleisch, "Probabilistic Approach for Location-Based Authentication," Proc. 1st Int'l Workshop Security for Spontaneous Interaction (IWSSI), Springer, 2007, pp. 486–491.
9. A. Osvald and L.Z. Stirn, "A Vehicle Routing Algorithm for the Distribution of Fresh Vegetables and Similar Perishable Food," J. Food Eng., vol. 85, no. 2, 2008, pp. 285–295.
10. C. Floerkemeier, C. Roduner, and M. Lampe, "RFID Application Development with the Accada Middleware Platform," IEEE Systems J., vol. 1, no. 2, 2007, pp. 82–94.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool