An Overview of Pros and Cons of RFID in Supply Chain Management
Keywords:
Inventory, RFID, Supply Chain Management, Security, TrackingAbstract
This article examines the advantages and disadvantages of using in the Supply Chain, Radio Frequency Identification (RFID) the board of the Supply Chain (SCM). While RFID has a bigger piece of the pie, a more noteworthy number of benefits than its ancestor, the standardized identification, It is presently accessible at an expense that many organizations can bear. Contemplate restrictive. From one viewpoint, RFID is a valuable apparatus. It is valuable since it doesn't need view correspondence. Checking lessens work costs and further develops efficiency. It gives you greater deceivability and assists you with dealing with your stock better. Then again RFID, then again, is currently a costly choice. It has a set number of clients because of an absence of normalization. Start to finish arrangement supplier’s face various difficulties some ominous sending issues and it's eclipsed by Concerns about security. No matter what these factors, a definitive objective of RFID in SCM is to see what's happening the making of thing level following that should act to present a better approach for thinking about SCM Never before has there been a serious level of productivity. Wary position, anticipating worldwide business improvements Leaders are the ones who decide. Accordingly, this study is vital in nature. Instructing the business local area about the advantages and disadvantages RFID innovation for SCM reception
Downloads
References
S. D. Verifier and A. H. Drive, “Simulink ® Verification and Validation TM Reference,” ReVision, 2015.
S. Committee, IEEE Standard for Software Verification and Validation IEEE Standard for Software Verification and Validation. 1998.
M. Bobaru, M. Borges, M. d’Amorim, and C. S. Păsăreanu, NASA formal methods : third international symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011 : proceedings. 2011.
Y. Zhang, “A foundation for the design and analysis of robotic systems and behaviors,” 1994.
A. John Presin Kumar and G. Rajmohan, “A study on the supply chain manegement policies for a Chennai based company,” Int. J. Appl. Eng. Res., 2014.
Q. Wang and Z. Ren, “Objective programming approach to supply chain,” in 2nd International Conference on Information Science and Engineering, ICISE2010 - Proceedings, 2010.
Z. Ren and Y. Zhang, “Multi-objective programming approach to double-level supply chain,” in 2010 International Conference on Logistics Engineering and Intelligent Transportation Systems, LEITS2010 - Proceedings, 2010.
L. Ma and M. Lin, “Determination of safety stock for power enterprises under uncertainty,” in Proceedings - International Symposium on Computer Science and Computational Technology, ISCSCT 2008, 2008.
C. Z. Huang and L. Wang, “Research on demand transmission process risk management of supply chain based on fractal theory,” in Proceedings of International Conference on Information Systems for Crisis Response and Management, ISCRAM 2011, 2011.
R. Valverde and M. Talla, “RFID Implementation of Supply Chain: Comparison of Three Case Studies,” SSRN Electron. J., 2017.
K. K. Gola, M. Dhingra, and R. Rathore, “Modified version of playfair technique to enhance the security of plaintext and key using rectangular and substitution matrix,” Int. J. Eng. Adv. Technol., 2019.
S. Mishra, S. Jain, C. Rai, and N. Gandhi, “Security challenges in semantic web of things,” in Advances in Intelligent Systems and Computing, 2019.
N. Abosata, S. Al-Rubaye, G. Inalhan, and C. Emmanouilidis, “Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications,” Sensors. 2021.
M. Mehdi, D. Ather, M. Rababah, and M. K. Sharma, “Problems issues in the information security due to the manual mistakes,” in Proceedings of the 10th INDIACom; 2016 3rd International Conference on Computing for Sustainable Global Development, INDIACom 2016, 2016.
A. Poushneh, “Humanizing voice assistant: The impact of voice assistant personality on consumers’ attitudes and behaviors,” J. Retail. Consum. Serv., 2021.
R. Jha and A. K. Saini, “A comparative analysis & enhancement of NTRU algorithm for network security and performance improvement,” in Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011, 2011.
A. Gupta, B. Gupta, and K. K. Gola, “Blockchain technology for security and privacy issues in internet of things,” Int. J. Sci. Technol. Res., 2020.
R. K. Jain, S. Kumar, A. Kumar, A. Kumar, M. K. Singh, and V. Singh, “Effects of UV irradiation on Fission-fragment track parameters in Makrofol-E detector,” Int. J. Mod. Phys. E, 2019.