Research on Supply Chain Abnormal Event Detection Based on the RFID Technology

Article Preview

Abstract:

In a complex supply network composed of suppliers, manufactures and buyers, RFID tech is used to connect different items. RFID tech makes it possible to collect data in logistics with a low cost and it can optimize the traditional method more efficiently. A platform using EPCGlobal standards supplies the base environment for high-level applications, such as abnormal event detection in a supply chain, frequent path mining and the retail theft prediction. This paper studies abnormal events detection in the supply network. The data captured from the EPC information service is used to calculate a path and the machine learning method is adopted to cluster the path.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3309-3312

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Bi H H, Lin D K J. RFID-enabled discovery of supply networks[J]. Engineering Management, IEEE Transactions on, 2009, 56(1): 129-141.

DOI: 10.1109/tem.2008.922636

Google Scholar

[2] Harrison M. EPC information service (EPCIS)[C]/Auto-ID Labs Research Workshop. (2004).

Google Scholar

[3] Ilic A, Andersen T, Michahelles F. Increasing supply-chain visibility with rule-based RFID data analysis[J]. Internet Computing, IEEE, 2009, 13(1): 31-38.

DOI: 10.1109/mic.2009.10

Google Scholar

[4] Masciari E. A Framework for Outlier Mining in RFID data[C]/Database Engineering and Applications Symposium, 2007. IDEAS 2007. 11th International. IEEE, 2007: 263-267.

DOI: 10.1109/ideas.2007.4318112

Google Scholar

[5] Han J, Gonzalez H, Li X, et al. Warehousing and mining massive RFID data sets[M]/Advanced Data Mining and Applications. Springer Berlin Heidelberg, 2006: 1-18.

DOI: 10.1007/11811305_1

Google Scholar

[6] Koh R, Schuster E W, Lam N S, et al. Prediction, detection, and proof: an integrated auto-ID solution to retail theft[J]. White Paper, Auto-ID Lab, University of Cambridge, Cambridge, (2003).

Google Scholar

[7] Lee C H, Chung C W. RFID data processing in supply chain management using a path encoding scheme[J]. Knowledge and Data Engineering, IEEE Transactions on, 2011, 23(5): 742-758.

DOI: 10.1109/tkde.2010.136

Google Scholar

[8] Chen Z, Hong G, Hu K, et al. Divide: mining closed frequent path for commodities in supply chain[C]/Computational Intelligence and Industrial Application, 2008. PACIIA'08. Pacific-Asia Workshop on. IEEE, 2008, 1: 944-948.

DOI: 10.1109/paciia.2008.146

Google Scholar