819 resultados para SUPPLY CHAINS
Resumo:
Chapter 15 Design Advisor: How to Supply Designers with Knowledge about Inclusion? E. Zitkus, PM Langdon and PJ Clarkson 15.1 Introduction In an ideal scenario accessibility issues such as legibility, usability and associated cognitive ...
Resumo:
Ten years ago the intelligent product model was introduced as a means of motivating a supply chain in which product or orders were central as opposed to the organizations that stored or delivered them. This notion of a physical product influencing its own movement through the supply chain was enabled by the evolution of low cost RFID systems which promised low cost connection between physical goods and networked information environments. In 2002 the notion of product intelligence was regarded as a useful but rather esoteric construct. However, in the intervening ten years there have been a number of technological advances coupled with an increasingly challenged business environment which make the prospects for intelligent product deployment seem more likely. This paper reviews a number of these developments and assesses their impact on the intelligent product approach. © 2012 IFAC.
Resumo:
Service-Oriented Architecture (SOA) and Web Services (WS) offer advanced flexibility and interoperability capabilities. However they imply significant performance overheads that need to be carefully considered. Supply Chain Management (SCM) and Traceability systems are an interesting domain for the use of WS technologies that are usually deemed to be too complex and unnecessary in practical applications, especially regarding security. This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing 'raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents. © 2012 IEEE.
Resumo:
The Pharma(ceuticals) industry is at a cross-roads. There are growing concerns that illegitimate products are penetrating the supply chain. There are proposals in many countries to apply RFID and other traceability technologies to solve this problem. However there are several trade-offs and one of the most crucial is between data visibility and confidentiality. In this paper, we use the TrakChain assessment framework tools to study the US Pharma supply chain and to compare candidate solutions to achieve traceability data security: Point-of-Dispense Authentication, Network-based electronic Pedigree, and Document-based electronic Pedigree. We also propose extensions to a supply chain authorization language that is able to capture expressive data sharing conditions considered necessary by the industry's trading partners. © 2013 IEEE.
Resumo:
The supply of water to a centrifuge experiment has always been important. This paper details a new system which has been successfully commissioned for use on the geotechnical centrifuge at University of Cambridge. High water pressures and large flow rates were delivered to an experimental package, for the modelling of water injection-aided pile jacking. The practicalities of such a system are discussed in relation to existing alternatives, in addition to the precautions taken to ensure safe centrifuge operation. A method for calculating water pressures in the system away from instrumented locations is also proposed, using a linear relationship between energy per unit volume and the flow rate squared. Experimental data are presented to support these relationships.
Resumo:
The supply of water is often required during a centrifuge experiment. For the case of pile jetting, significant flow volumes and pressures are required from the water supply. This paper aims to detail the successful provision of water at high pressures and large flow rates to a centrifuge, using a novel water supply system. An impeller pump was used to pressurise the water in advance of the slip rings, with further pressure provided by the fluid accelerating along the centrifuge beam arm. A maximum pressure of 2 MPa and continuous flow rate of 6 litres per minute were achieved. The calculation of water pressure away from the measurement location is presented, offering a repeatable solution for the pressure at any point in the pipe work. © 2010 Taylor & Francis Group, London.
Resumo:
This paper discusses various techniques that may be used to combat counterfeiting in the pharmaceutical supply chain. These include the use of electronic pedigrees (to ensure the integrity of the supply chain), together with mass-serialization (to provide for a unique lifecycle history of each individual package) and authentication of the product (to check for any discrepancies in the various attributes of the product and its packaging are as intended for that individual package). Management of the pedigree process and product authentication is discussed in some detail, together with various other learnings from the Drug Security Network, including identification of some remaining vulnerabilities and suggestions for tightening these loopholes. © 2008 Springer-Verlag Berlin Heidelberg.
Resumo:
Counterfeit trade developed into a severe problem for many industries. While established security features such as holograms, micro printings or chemical markers do not seem to efficiently avert trade in illicit imitation products, RFID technology, with its potential to automate product authentications, may become a powerful tool to enhance brand and product protection. The following contribution contains an overview on the implication of product counterfeiting on affected companies, provides a starting point for a structured requirements definition for RFID-based anti-counterfeiting systems, and outlines several principal solution approaches that are discussed in greater detail in the subsequent chapters. © 2008 Springer-Verlag Berlin Heidelberg.
Resumo:
Interferons (IFNs), consisting of three major subfamilies, type I, type II (gamma) and type III (lambda) IFN, activate vertebrate antiviral defences once bound to their receptors. The three IFN subfamilies bind to different receptors, IFNAR1 and IFNAR2 for type I IFNs, IFN gamma R1 and IFN gamma R2 for type II IFN, and IL-28R1 and IL-10R2 for type III IFNs. In fish, although many types I and II IFN genes have been cloned, little is known about their receptors. In this report, two putative IFN-gamma receptor chains were identified and sequenced in rainbow trout (Oncorhynchus mykiss), and found to have many common characteristics with mammalian type II IFN receptor family members. The presented gene synteny analysis, phylogenetic tree analysis and ligand binding analysis all suggest that these molecules are the authentic IFN gamma Rs in fish. They are widely expressed in tissues, with IFN gamma R1 typically more highly expressed than IFN gamma R2. Using the trout RTG-2 cell line it was possible to show that the individual chains could be differentially modulated, with rIFN-gamma and rIL-1 beta down regulating IFN gamma R1 expression but up regulating IFN gamma R2 expression. Overexpression of the two receptor chains in RTG-2 cells revealed that the level of IFN gamma R2 transcript was crucial for responsiveness to rIFN-gamma, in terms of inducing gamma IP expression. Transfection experiments showed that the two putative receptors specifically bound to rIFN-gamma. These findings are discussed in the context of how the IFN gamma R may bind IFN-gamma in fish and the importance of the individual receptor chains to signal transduction. (c) 2009 Elsevier Ltd. All rights reserved.