An Overview of Pros and Cons of RFID in Supply Chain Management

Authors

  • Mohit Kumar Jain Associate Professor, Department of Electrical Engineering, Vivekananda Global University, Jaipur, India Author

Keywords:

Inventory, RFID, Supply Chain Management, Security, Tracking

Abstract

This article examines the advantages and  disadvantages of using in the Supply Chain, Radio Frequency Identification (RFID) the board of the Supply  Chain (SCM). While RFID has a bigger piece of the pie,  a more noteworthy number of benefits than its ancestor,  the standardized identification, It is presently accessible  at an expense that many organizations can bear.  Contemplate restrictive. From one viewpoint, RFID is a  valuable apparatus. It is valuable since it doesn't need  view correspondence. Checking lessens work costs and  further develops efficiency. It gives you greater  deceivability and assists you with dealing with your stock  better. Then again RFID, then again, is currently a costly  choice. It has a set number of clients because of an  absence of normalization. Start to finish arrangement  supplier’s face various difficulties some ominous sending  issues and it's eclipsed by Concerns about security. No  matter what these factors, a definitive objective of RFID  in SCM is to see what's happening the making of thing  level following that should act to present a better  approach for thinking about SCM Never before has there  been a serious level of productivity. Wary position,  anticipating worldwide business improvements Leaders  are the ones who decide. Accordingly, this study is vital  in nature. Instructing the business local area about the  advantages and disadvantages RFID innovation for SCM  reception 

Downloads

Download data is not yet available.

References

S. D. Verifier and A. H. Drive, “Simulink ® Verification and Validation TM Reference,” ReVision, 2015.

S. Committee, IEEE Standard for Software Verification and Validation IEEE Standard for Software Verification and Validation. 1998.

M. Bobaru, M. Borges, M. d’Amorim, and C. S. Păsăreanu, NASA formal methods : third international symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011 : proceedings. 2011.

Y. Zhang, “A foundation for the design and analysis of robotic systems and behaviors,” 1994.

A. John Presin Kumar and G. Rajmohan, “A study on the supply chain manegement policies for a Chennai based company,” Int. J. Appl. Eng. Res., 2014.

Q. Wang and Z. Ren, “Objective programming approach to supply chain,” in 2nd International Conference on Information Science and Engineering, ICISE2010 - Proceedings, 2010.

Z. Ren and Y. Zhang, “Multi-objective programming approach to double-level supply chain,” in 2010 International Conference on Logistics Engineering and Intelligent Transportation Systems, LEITS2010 - Proceedings, 2010.

L. Ma and M. Lin, “Determination of safety stock for power enterprises under uncertainty,” in Proceedings - International Symposium on Computer Science and Computational Technology, ISCSCT 2008, 2008.

C. Z. Huang and L. Wang, “Research on demand transmission process risk management of supply chain based on fractal theory,” in Proceedings of International Conference on Information Systems for Crisis Response and Management, ISCRAM 2011, 2011.

R. Valverde and M. Talla, “RFID Implementation of Supply Chain: Comparison of Three Case Studies,” SSRN Electron. J., 2017.

K. K. Gola, M. Dhingra, and R. Rathore, “Modified version of playfair technique to enhance the security of plaintext and key using rectangular and substitution matrix,” Int. J. Eng. Adv. Technol., 2019.

S. Mishra, S. Jain, C. Rai, and N. Gandhi, “Security challenges in semantic web of things,” in Advances in Intelligent Systems and Computing, 2019.

N. Abosata, S. Al-Rubaye, G. Inalhan, and C. Emmanouilidis, “Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications,” Sensors. 2021.

M. Mehdi, D. Ather, M. Rababah, and M. K. Sharma, “Problems issues in the information security due to the manual mistakes,” in Proceedings of the 10th INDIACom; 2016 3rd International Conference on Computing for Sustainable Global Development, INDIACom 2016, 2016.

A. Poushneh, “Humanizing voice assistant: The impact of voice assistant personality on consumers’ attitudes and behaviors,” J. Retail. Consum. Serv., 2021.

R. Jha and A. K. Saini, “A comparative analysis & enhancement of NTRU algorithm for network security and performance improvement,” in Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011, 2011.

A. Gupta, B. Gupta, and K. K. Gola, “Blockchain technology for security and privacy issues in internet of things,” Int. J. Sci. Technol. Res., 2020.

R. K. Jain, S. Kumar, A. Kumar, A. Kumar, M. K. Singh, and V. Singh, “Effects of UV irradiation on Fission-fragment track parameters in Makrofol-E detector,” Int. J. Mod. Phys. E, 2019.

Downloads

Published

2020-01-01

How to Cite

An Overview of Pros and Cons of RFID in Supply Chain Management . (2020). International Journal of Innovative Research in Computer Science & Technology, 8(1), 25–28. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13353