711 resultados para closed-loop supply chain,
Resumo:
Establishing connectivity of products with real-time information about themselves can at one level provide accurate data, and at another, allow products to assess and influence their own destiny. In this way, the specification for an intelligent product is being built - one whose information content is permanently bound to its material content. This paper explores the impact of such development on supply chains, contrasting between simple and complex product supply chains. The Auto-ID project is on track to enable such connectivity between products and information using a single, open-standard, data repository for storage and retrieval of product information. The potential impact on the design and management of supply chains is immense. This paper provides an introduction to of some of these changes, demonstrating that by enabling intelligent products, Auto ID systems will be instrumental in driving future supply chains. The paper also identifies specific application areas for this technology in the product supply chain.
Resumo:
Ten years ago the intelligent product model was introduced as a means of motivating a supply chain in which product or orders were central as opposed to the organizations that stored or delivered them. This notion of a physical product influencing its own movement through the supply chain was enabled by the evolution of low cost RFID systems which promised low cost connection between physical goods and networked information environments. In 2002 the notion of product intelligence was regarded as a useful but rather esoteric construct. However, in the intervening ten years there have been a number of technological advances coupled with an increasingly challenged business environment which make the prospects for intelligent product deployment seem more likely. This paper reviews a number of these developments and assesses their impact on the intelligent product approach. © 2012 IFAC.
Resumo:
Service-Oriented Architecture (SOA) and Web Services (WS) offer advanced flexibility and interoperability capabilities. However they imply significant performance overheads that need to be carefully considered. Supply Chain Management (SCM) and Traceability systems are an interesting domain for the use of WS technologies that are usually deemed to be too complex and unnecessary in practical applications, especially regarding security. This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing 'raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents. © 2012 IEEE.
Resumo:
In the face of increasing demand and limited emission reduction opportunities, the steel industry will have to look beyond its process emissions to bear its share of emission reduction targets. One option is to improve material efficiency - reducing the amount of metal required to meet services. In this context, the purpose of this paper is to explore why opportunities to improve material efficiency through upstream measures such as yield improvement and lightweighting might remain underexploited by industry. Established input-output techniques are applied to the GTAP 7 multi-regional input-output model to quantify the incentives for companies in key steel-using sectors (such as property developers and automotive companies) to seek opportunities to improve material efficiency in their upstream supply chains under different short-run carbon price scenarios. Because of the underlying assumptions, the incentives are interpreted as overestimates. The principal result of the paper is that these generous estimates of the incentives for material efficiency caused by a carbon price are offset by the disincentives to material efficiency caused by labour taxes. Reliance on a carbon price alone to deliver material efficiency would therefore be misguided and additional policy interventions to support material efficiency should be considered. © 2013 Elsevier B.V.
Resumo:
1-D engine simulation models are widely used for the analysis and verification of air-path design concepts and prediction of the resulting engine transient response. The latter often requires closed loop control over the model to ensure operation within physical limits and tracking of reference signals. For this purpose, a particular implementation of Model Predictive Control (MPC) based on a corresponding Mean Value Engine Model (MVEM) is reported here. The MVEM is linearised on-line at each operating point to allow for the formulation of quadratic programming (QP) problems, which are solved as the part of the proposed MPC algorithm. The MPC output is used to control a 1-D engine model. The closed loop performance of such a system is benchmarked against the solution of a related optimal control problem (OCP). As an example this study is focused on the transient response of a light-duty car Diesel engine. For the cases examined the proposed controller implementation gives a more systematic procedure than other ad-hoc approaches that require considerable tuning effort. © 2012 IFAC.
Resumo:
The Pharma(ceuticals) industry is at a cross-roads. There are growing concerns that illegitimate products are penetrating the supply chain. There are proposals in many countries to apply RFID and other traceability technologies to solve this problem. However there are several trade-offs and one of the most crucial is between data visibility and confidentiality. In this paper, we use the TrakChain assessment framework tools to study the US Pharma supply chain and to compare candidate solutions to achieve traceability data security: Point-of-Dispense Authentication, Network-based electronic Pedigree, and Document-based electronic Pedigree. We also propose extensions to a supply chain authorization language that is able to capture expressive data sharing conditions considered necessary by the industry's trading partners. © 2013 IEEE.
Resumo:
This paper discusses various techniques that may be used to combat counterfeiting in the pharmaceutical supply chain. These include the use of electronic pedigrees (to ensure the integrity of the supply chain), together with mass-serialization (to provide for a unique lifecycle history of each individual package) and authentication of the product (to check for any discrepancies in the various attributes of the product and its packaging are as intended for that individual package). Management of the pedigree process and product authentication is discussed in some detail, together with various other learnings from the Drug Security Network, including identification of some remaining vulnerabilities and suggestions for tightening these loopholes. © 2008 Springer-Verlag Berlin Heidelberg.
Resumo:
Counterfeit trade developed into a severe problem for many industries. While established security features such as holograms, micro printings or chemical markers do not seem to efficiently avert trade in illicit imitation products, RFID technology, with its potential to automate product authentications, may become a powerful tool to enhance brand and product protection. The following contribution contains an overview on the implication of product counterfeiting on affected companies, provides a starting point for a structured requirements definition for RFID-based anti-counterfeiting systems, and outlines several principal solution approaches that are discussed in greater detail in the subsequent chapters. © 2008 Springer-Verlag Berlin Heidelberg.
Resumo:
In FEA of ring rolling processes the tools' motions usually are defined prior to simulation. This procedure neglects the closed-loop control, which is used in industrial processes to control up to eight degrees of freedom (rotations, feed rates, guide rolls) in real time, taking into account the machine's performance limits as well as the process evolution. In order to close this gap in the new simulation approach all motions of the tools are controlled according to sensor values which are calculated within the FE simulation. This procedure leads to more realistic simulation results in comparison to the machine behaviour. © 2012 CIRP.
Resumo:
Ten years ago the intelligent product model was introduced as a means of motivating a supply chain in which product or orders were central as opposed to the organizations that stored or delivered them. This notion of a physical product influencing its own movement through the supply chain was enabled by the evolution of low cost RFID systems which promised low cost connection between physical goods and networked information environments. In 2002 the notion of product intelligence was regarded as a useful but rather esoteric construct. However, in the intervening ten years there have been a number of technological advances coupled with an increasingly challenged business environment which make the prospects for intelligent product deployment seem more likely. This paper reviews a number of these developments and assesses their impact on the intelligent product approach. © Springer-Verlag Berlin Heidelberg 2013.
Resumo:
In this paper, two models of coalition and income's distribution in FSCS (fuzzy supply chain systems) are proposed based on the fuzzy set theory and fuzzy cooperative game theory. The fuzzy dynamic coalition choice's recursive equations are constructed in terms of sup-t composition of fuzzy relations, where t is a triangular norm. The existence of the fuzzy relations in FSCS is also proved. On the other hand, the approaches to ascertain the fuzzy coalition through the choice's recursive equations and distribute the fuzzy income in FSCS by the fuzzy Shapley values are also given. These models are discussed in two parts: the fuzzy dynamic coalition choice of different units in FSCS; the fuzzy income's distribution model among different participators in the same coalition. Furthermore, numerical examples are given aiming at illustrating these models., and the results show that these models are feasible and validity in FSCS.