SEAMLESS COMMUNICATION IN SUPPLY CHAINS BASED ON M2M TECHNOLOGY

被引:2
|
作者
Moneimne, Walid [1 ]
Hajdul, Marcin [2 ,4 ]
Mikolajczak, Szymon [3 ,5 ]
机构
[1] Aspenta Int, Bldg 17, Dubai, U Arab Emirates
[2] Poznan Sch Logist, Poznan, Poland
[3] Nova Tracking, Bydgoszcz, Poland
[4] Poznan Sch Logist WSL, Ul Estkowskiego 6, PL-61755 Poznan, Poland
[5] Nova Tracking Sp Zoo, Kujawska 2, PL-85031 Bydgoszcz, Poland
关键词
logistics; digital supply chain; seamless communication; M2M; supply chain visibility; time slots management; accounting of transport costs;
D O I
10.17270/J.LOG.2016.4.3
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Background: Access to information is the key element in the successful and efficient organization of transport & logistic processes. The importance of real-time access to information is confirmed by a panel workshop carried out with support of design thinking methodology. There are two ways of gaining access to the right information manual, where human agency is needed and fully automatic, where new M2M technology is implemented. Implementation of such technology improves seamless communication during transport execution and allows real-time access to needed information. The aim of the paper is to evaluate the influence of the effectiveness of using M2M technology and traditional way of communication as well as data gathering in order to ensure seamless communication in the supply chain. Methods: Survey, design thinking, desk research and real case study results were used in the paper. Results and conclusions: Seamless communication and implementation of M2M technology within the whole supply (including modes of transport and transport units) chain is a backbone of the lean and reliable digital supply chain.
引用
收藏
页码:213 / 226
页数:14
相关论文
共 50 条
  • [31] Efficient Cluster-Based Sleep Scheduling for M2M Communication Network
    Al-Kahtani, Mohammed S.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (08) : 2361 - 2373
  • [32] Distributed ranking-based resource allocation for sporadic M2M communication
    Yunyan Chang
    Peter Jung
    Chan Zhou
    S.ławomir Stańczak
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [33] Performance Analysis on M2M Communication Networks Based on Stochastic Network Calculus
    Zhou Tao
    Wang Quan
    Wang Gao-cai
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 865 - 870
  • [34] Linked Services for M2M communication with Enterprise IT systems
    Thoma, Matthias
    Antonescu, Alexandru-Florian
    Mintsi, Theano
    Braun, Torsten
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1212 - 1216
  • [35] Secure Multimedia Content Distribution for M2M Communication
    Ye, Conghuan
    Xiong, Zenggang
    Ding, Yaoming
    Zhang, Xuemin
    Wang, Guangwei
    Xu, Fang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 279 - 288
  • [36] Probabilistic Model for M2M in IoT networking and communication
    Paul, Anand
    Rho, Seungmin
    TELECOMMUNICATION SYSTEMS, 2016, 62 (01) : 59 - 66
  • [37] Fair Allocation of Benefits for M2M Communication based Collaborative Business Models
    Grossmann, Uwe
    Gansemer, Sebastian
    Pauls, Albert
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOLS 1-2, 2015, : 812 - 816
  • [38] Priority-Based Channel Access for SAN Protocol in M2M Communication
    Shurman, Mohammad
    Alkahla, Wafaa
    Hasan, Haya
    2019 INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2019, : 214 - 217
  • [39] Distributed ranking-based resource allocation for sporadic M2M communication
    Chang, Yunyan
    Jung, Peter
    Zhou, Chan
    Stanczak, S. Iawomir
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [40] A Chaos-based Authentication and Key Management Scheme for M2M Communication
    Boubakri, Wided
    Abdallah, Walid
    Boudriga, Noureddine
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 366 - 371