Advertisement

RFID and Supply Chain Management: Generic and Military Applications

  • Tae Hwan Oh
  • Young B. Choi
  • Rajath Chouta
Part of the Communications in Computer and Information Science book series (CCIS, volume 265)

Introduction to RFID

This paper explains two main aspects of RFID supply chain management – the generic supply chain management and the specific military application for the purpose of asset viability. The generic supply chain management is studied by examining how to improve supply chain management through accurately determining inventory levels in real time without human interaction. For the military application, the current legacy systems used by the military for Supply Chain Management and Asset Visibility are analyzed and suggestions are made for improvements in the form of Total Asset Visibility through Radio Frequency Identification tags, and Geographic Information Systems.

Keywords

Supply Chain Geographic Information System Supply Chain Management Radio Frequency Identification Military Application 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ahlawat, R., Allan, A., et al.: Hype Cycle for Government. Garner, 1–54, July 3 (2006)Google Scholar
  2. 2.
    Bendavid, Y., Lefebvre, L.A., Wamba, S.F.: Proof of concept of an RFID-enabled supply chain in a B2B e-commerce environment. In: ICEC, pp. 564–568 (August 2006)Google Scholar
  3. 3.
    Buckner, M.: MICLOG RFID Tag Program Enables Total Asset Visibility, vol. 2, pp. 1422–1426. IEEE (2002)Google Scholar
  4. 4.
    Campbell, A., Das, A., et al.: RFID Security, Syngress (2006)Google Scholar
  5. 5.
    Copley, R., Wagner, E.: Improved Situation Awareness through GIS and RFID in Military Exercises. ESRI, http://gis2.esri.com/library/userconf/proc06/papers/papers/pap_2350.pdf (retrieved March 27, 2007)
  6. 6.
    Erle, S., Gibson, R., Walsh, J.: Mapping Hacks. O’Reilly (2005)Google Scholar
  7. 7.
    Kreizman, G.: GIS: Public Access for and Against Homeland Security. Gartner, 1–4, July 30 (2002)Google Scholar
  8. 8.
    Lahiri, S.: RFID SourceBook. IBM Press (2005)Google Scholar
  9. 9.
    Lampe, M., Strassner, M.: The Potential of RFID for Moveable Asset Management. RFID Journal (September 2007)Google Scholar
  10. 10.
    Manish, B., Moradpour, S.: RFID Field Guide: Deploying Radio Frequency Identification Systems. Prentice Hall (2005)Google Scholar
  11. 11.
    Navas, D.: DoD Logistics New Rules of Engagement. Industry Insights, 28–32 (August 2001)Google Scholar
  12. 12.
    O’Conner, M.C.: U.S. Army Uses UWB to Track Trainees. RFID Journal (2005), http://www1.rfidjournal.com/article/view/1987/ (retrieved April 01, 2007)
  13. 13.
    Shuping, D., Wright, W.: Geo-Temporal Visualization of RFID Providing Global Visibility of the DoD Supply Chain (Part 1 of 2). Directions Magazine (2005), http://www.directionsmag.com/article.php?article_id=951&trv=1 (retrieved April 02, 2007)
  14. 14.
    Shuping, D., Wright, W, Geo-Temporal Visualization of RFID Providing Global Visibility of the DoD Supply Chain (Part 2 of 2). Directions Magazine (2005), http://www.directionsmag.com/article.php?article_id=1954 (retrieved April 02, 2007)
  15. 15.
    Vining, J.: Case Study: Gwinnet County, Georgia, Uses GIS to Reduce Traffic Collisions. Gartner, 1–8, August 30 (2006)Google Scholar
  16. 16.
    Woods, J.: DoD Will Nurture Transofrmative RFID to Help Warfighters. Gartner, 1–5, January 8 (2004)Google Scholar
  17. 17.
    Angeles, R.: Rfid Technologies: Supply-Chain Applications and Implementation Issues. Information Systems Management 22(1), 51–65 (2005)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Blosch, M., Sampler, J.L.: Executive Summary: Strategy as Synchronization: Leading in Real-Time. Gartner, ID Number: G-10-9114, pp. 1-14 (2002) (retrieved April 4, 2008) from Gartner DatabaseGoogle Scholar
  19. 19.
    Davison, J., et al.: Transforming Hype Cycle for Supply Chain Management and Procurement. Gartner, ID Number: G001449865, pp. 1-6 (2007) (retrieved April 4, 2008) from Gartner DatabaseGoogle Scholar
  20. 20.
    Drobik, A., Woods, J.: Development of Chaos-Tolerant Processes Is Key to Supply Chain Optimization. Gartner, ID Number: G00138252, pp. 1-8 (2006) (retrieved April 4, 2008) from Gartner DatabaseGoogle Scholar
  21. 21.
    Helms, M.M., Inman, R.A.: Supply Chain Management. In: Helms, M.M. (ed.) Encyclopedia of Management, 5th edn., pp. 870–873. Gale, Detroit (2006), from Gale Virtual Reference Library via Gale, http://go.galegroup.com/ps/start.do?p=GVRL&u=viva_jmu(retrieved April 10, 2008)
  22. 22.
    Kiranoudis, C.T., et al.: Dynamic Modeling and Control of Supply Chain Systems: A Review. Computers &Operations Research 35(10), 4–9 (2007) (retrieved April 4, 2008) from Business Source Premier (EBSCOhost) DatabaseGoogle Scholar
  23. 23.
    Radio Frequency Identification. Encyclopedia of Emerging Industries, 5th edn. Gale, Detroit, from Gale Virtual Reference Library via Gale, http://go.galegroup.com/ps/start.do?p=GVRL&u=viva_jmu (retrieved April 10, 2008)
  24. 24.
    RFID Journal (n.d.). Glossary of Terms, http://www.rfidjournal.com/article/glossary/3 (retrieved April 10, 2008)
  25. 25.
    Simpson, R.: Glossary of Mobile and Wireless Terminology. Garner, 30 (2007)Google Scholar
  26. 26.
    Strauss, H.: Transforming Defense Supply Chains: What Every Defense CIO Should Know About Defense Supply Chain Management. Gartner, ID Number: G00145941, pp. 1-7 (2007) (retrieved April 4, 2008) from Gartner DatabaseGoogle Scholar
  27. 27.
    Technology Development Centre (2006), RFID/ePC for Supply Chain Management, http://www.rp.sg/tdc/scm/RFIDePC%20for%20Supply%20Chain.gif (retrieved April 9, 2008)
  28. 28.
    White, A.: Frequently Asked Questions: Product Information Management, Business Applications and Business Intelligence. Gartner, ID Number: G00144152, pp. 4 (2006) (retrieved March 15, 2008) from Gartner DatabaseGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Tae Hwan Oh
    • 1
  • Young B. Choi
    • 2
  • Rajath Chouta
    • 1
  1. 1.Department of Networking, Security and Systems Administration, Golisano College of Computing and Information SciencesRochester Institute of TechnologyRochesterUSA
  2. 2.Information Systems Technology Department of Natural Science, Mathematics & Technology School of Undergraduate StudiesRegent UniversityVirginia Beach

Personalised recommendations