12
International Journal of Advanced Culture Technology Vol.7 No.3 166-177 (2019) DOI 10.17703/IJACT.2019.7.3.166 RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY Ahmed Mateen 1,2 , Qingsheng Zhu 1 , Salman Afsar 2 and Salman Bashir 2 1 Computer Science Department, Chongqing University, Chongqing China. 2 Computer Science Department, University of Agriculture Faisalabad, Pakistan E-mail(Corresponding Author): [email protected] Abstract Radio Frequency Identification (RFID) skill is becoming a technology that might deliver a response to manual glitches. The use of tags, receiver and wireless surfs to join with each other would mean that RFID in combination with the EPC would speech these pain opinions and offer many welfares in different sectors such as production, distribution, trade, logistics, and security. Potential benefits include increased visibility rising supply chain, enlarged proficiency and cost savings through improved data harmonization, better responsiveness to actual prominence change. Trendy the case of the textile or industrial applications, recent systems used by the industry to control the supply chain in addition strength discernibility are being studied, besides improvements in the overall perceptibility of assets are anticipated through labels, readers, drivers, POEs, etc. this model will be developed with new situations and a lively construction industry. It will be focused on Cost, Hardware compatibility, security and maintenance issues. Keywords: RFID, supply chain management system, textile industry 1. Introduction An important part of focus and benefits such as fact sheets, product information. Integrating RFID systems into a chain company has a rich tradition of manufacturing and manufacturing products. An RFID is a "white" character with a microchip with a radio with the highest noise that a person can access. Embedded" label is placed on the pallet level when it is in the store before shipping. Corporations identify the status of indorsing RFID technology in the direction of enhance and improve business efficiency of the supply chain, which boasts of recent training in accounting. By RFID arrangements, firms take enlarged invention perceptibility, reducing characteristic prices, reducing charges, eliminating non-demand questions, avoiding stealing and decrease in addition allowing establishments towards go constantly changing business besides records. There are many global studies conducted to study the application of the RFID arrangement in addition the mixing into current ERP systems. Maximum corporations accept a watchful method besides focus on earning of RFID on prior to each room of the product stored in a container. RFID is the most intense test in the power machine that can make a radical change in any way in its chain of equipment. Vendors, especially Wal-Mart IJACT 19-9-23 Manuscript received: June 28, 2019 / revised: July 16, 2019 / Accepted: July 31, 2019 Corresponding Author: [email protected] Author’s affiliation Computer Science Department, Chongqing University, Chongqing China

RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN … · Highway means that RFID's work has been low and hard; all the pallets of the product will be made in seconds and even counting

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

  • International Journal of Advanced Culture Technology Vol.7 No.3 166-177 (2019) DOI 10.17703/IJACT.2019.7.3.166

    RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY

    Ahmed Mateen1,2, Qingsheng Zhu1, Salman Afsar2 and Salman Bashir2

    1Computer Science Department, Chongqing University, Chongqing China. 2Computer Science Department, University of Agriculture Faisalabad, Pakistan

    E-mail(Corresponding Author): [email protected]

    Abstract Radio Frequency Identification (RFID) skill is becoming a technology that might deliver a response to manual

    glitches. The use of tags, receiver and wireless surfs to join with each other would mean that RFID in combination with the EPC would speech these pain opinions and offer many welfares in different sectors such as production, distribution, trade, logistics, and security. Potential benefits include increased visibility rising supply chain, enlarged proficiency and cost savings through improved data harmonization, better responsiveness to actual prominence change. Trendy the case of the textile or industrial applications, recent systems used by the industry to control the supply chain in addition strength discernibility are being studied, besides improvements in the overall perceptibility of assets are anticipated through labels, readers, drivers, POEs, etc. this model will be developed with new situations and a lively construction industry. It will be focused on Cost, Hardware compatibility, security and maintenance issues. Keywords: RFID, supply chain management system, textile industry 1. Introduction

    An important part of focus and benefits such as fact sheets, product information. Integrating RFID systems into a chain company has a rich tradition of manufacturing and manufacturing products. An RFID is a "white" character with a microchip with a radio with the highest noise that a person can access. Embedded" label is placed on the pallet level when it is in the store before shipping. Corporations identify the status of indorsing RFID technology in the direction of enhance and improve business efficiency of the supply chain, which boasts of recent training in accounting. By RFID arrangements, firms take enlarged invention perceptibility, reducing characteristic prices, reducing charges, eliminating non-demand questions, avoiding stealing and decrease in addition allowing establishments towards go constantly changing business besides records. There are many global studies conducted to study the application of the RFID arrangement in addition the mixing into current ERP systems. Maximum corporations accept a watchful method besides focus on earning of RFID on prior to each room of the product stored in a container. RFID is the most intense test in the power machine that can make a radical change in any way in its chain of equipment. Vendors, especially Wal-Mart

    IJACT 19-9-23

    Manuscript received: June 28, 2019 / revised: July 16, 2019 / Accepted: July 31, 2019 Corresponding Author: [email protected] Author’s affiliation Computer Science Department, Chongqing University, Chongqing China

  • RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY 167 and their dealers, are leading the way to use this technology. RFID allows companies to see more than ever in the product range, providing more information about making realistic and improving the process.

    Visualization can lead to faster, lower, weaker, and more flowing objects in warehousing or food processing (Atiwal, Arora, & Gupta, 2013).

    Highway means that RFID's work has been low and hard; all the pallets of the product will be made in seconds and even counting the minutes. RFID tags are small items that help identify objects and people. RFID technology in the textile industry is crucial. Here it is necessary to use the data collection and equipment for a product relevant. Radio Frequency Identification (RFID) is a row of invisible transmission technology the game to substitute barcodes and quick-response (QR), that includes labels and readers. Readers question labels in their transmission area to get them the data. In general, tags are divided into two category: dynamic and liability. Dynamic tags have built-in batteries so that they can send data to the readers themselves.

    Passive tags require that a reader delivers electromagnetically signals as a source of energy to activate them. So, they do not need it extra batteries. Passive tags are more accepted than dynamic tags because of the low costs and unlimited lifespan (Kamaladevi. et al. 2010). In RFID systems there are two common crash scenarios, namely collision with labels and collision with the drive. Tag Collision occurs when a station is transmitting query labels in the communication area and some of these tags respond for the reader at the same time. This will inevitably cause a data collision at to drive. Two categories of methods have been developed to process the label collision problem. Aloha-based methods let each tag choose randomly a time lock to answer his data.

    2. OBJECTIVES Our research objective(s) RFID Constructed Intra Supply Chain Management System in Business of Textile

    are, that how can improve existed RFID constructed intra supply chain management system in textile business and secondly how a new deployment of RFID constructed SC management system trendy an industry. Will have found answers by review literature as much can. And visit the locations where the full fledge RFID system is implemented. By observed these models able to suggest some points, which conclude our research also.

    3. LITERATURE REVIEW This research presents an investigation into RFID technology. RFID technology has great potential for

    becoming ubiquitous soon. The most common concerns about privacy safety matters. The research offered conceivable scenario on in what way secrecy canister remain affected by RFID identifiers, nonetheless likewise in dissimilar ways toward guard in contradiction of this. As RFID knowhow develops extra shared, spells start to appear on the system itself. This document Arranged as the most common, from a lot of browsing and listening to disavowal facility new-fangled RFID worms. Research too exposed RFID is not just about supply chain management. The document describes mechanism for locating or tracking an object that may be in motion. Finally, the research also investigates the search aimed at new-fangled approaches aimed at producing labels. (Colella, Tarricone, Catarinucci, 2015).

    Its Applications and the research provided impression of the contemporary municipal then inclinations of RFID technology. Although many boundaries besides unsettled matters tranquil suspension general application of RFID. Can likewise twitch with the monetary pressures of major retailers to adopt the produce filling besides

  • 168 International Journal of Advanced Culture Technology Vol.7 No.3 166-177 (2019) supplies to additional successfully assimilate RFID? Lastly, in this faint phase, as great companies test skill, reactions then open confidentiality collections container inspiration the rubrics with use expertise.

    Potential benefits of RFID remain important then will undoubtedly grasp numerous new tender’s trendy forthcoming. (Kaur, Manjeet, Neeraj, & Sandhu, 2011).

    Strategic values and Challenges, research usefulness and competence of supply chain administration trendy the use of RFID. Also, methodically inspected the occupational developments involved in RFID technology. How towards complete the RFID implementation of the implementation of RFID? RFID expertise permits society near modify the professional process, to upsurge its competence and usefulness, thereby cultivating the recital of missions and the more resilient execution organization better able to assign responsibilities. The applicant meets the requirements of customers towards routine RFID technology towards provision SC and additional tenders. By way of have seen above, RFID proposals a planned worth latent aimed at businesses trendy emergent combined SC besides mandate model towards generate revenue besides brainchild besides towards obtain an inexpensive benefit. (Dorantes, Li, Peters, & Richardson, 2013).

    RFID offer tremendous opportunities to increase the value of a business by improving product visibility, reducing non-stocked items, reducing storage costs, eliminating inventory errors and reducing stock theft and contraction. Update their logistics and inventory databases regularly. Moreover, companies with such opportunities can complete computerizations giants remain leaders in RFID obedience then take usual limit aimed at major suppliers as of 1 January 2005. Unfortunately, the understanding of this brand will pose several problems. Has a negative effect on its effective functioning? For example, organizations should address issues related to RFID controller etymological, the occurrence dampness, meteorological conditions, radioactivity, invisible RF meddling (WLAN), weakening, replication then diversion of wireless sprays, substantial towards label remains attached then, towards a certain degree, the construction of the content of the material. (Kamaladevi, 2010).

    After examining the problems related to the management of the supply chain an identifying some solutions that RFID technology can offer, the mixing of RFID knowledge hooked on SCM resolve consume optimistic effect. Although it remains motionless moderately original besides early venture related to changeover toward RFID organizations stays considerable, doles of RFID expertise distant compensate expenses. By way of extra firms take over use the skill, the costs determination endures towards fall besides main to calibration inside business just similar barcode system. Firms that habit the skill determination get numerous confident enhancements, by way of: reducing catalogue contraction, maintaining augmented competence. (Oh, Choi, & Chouta, 2012).

    RFID improves the management of communication flow within supply chains, ensuring quality and safety in the agri-food sector. The increase in applications, as well as the improvement and optimization of RFID tags, suggest a drop in the cost of labels, which leads to an increase in market prospects logistics growths stand accredited towards ability to couple different types of smart radio identifiers in the direction of dissimilar ecological feelers toward safeguard tracing besides, consequently, quality and nourishment security. According to this study, it is remarkable that RFID coupled with sensors has great potential and can not only meet our needs and demand for safe food products, but also reduces food waste. After this review, UHF RFID passive sensor-coated tags can be developed as an application that has a good trade- off between cost, communication rate and VOC (Volatile Organic Compounds) detection. The detection principle may be based on the combined effects of probe coating with the effects of food degradation markers on sensor dielectric properties, which alter the electrical properties of the antenna depending on the type of markers. Adding the sensor gives added value to passive active RFID tags. (Fabien, Carole, Nathalie, & Brice, 2017).

  • RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY 169

    The selection of the best suppliers is very important for companies. Normally, the selection of the supplier is the basis of the cooperation of the supply chain and is a problem of MCDM (decision making of multiple attributes). This is because cooperation in the supply chain involves many tasks (evaluation criteria).

    The hybrid model of the MCDM method is developed in this investigation. The case study focuses on an international company. The proposed model presented can also serve as a guide for other foreign companies to select their suppliers with efficiency in the supervisory process of senior managers. Based on the result of the calculation of the COPRAS method (complex proportional evaluation method), the best supplier of the company is thus verified. (Tamosaitien, Edmundas, Liou, & Tzeng, 2014).

    Smart logistics zones are an improvement of the Smart Logistics term. For additional research on Smart Logistics Domains: A structured analysis of logistics processes, frameworks and resources along global supply chains is there is a need to consolidate ICT requirements and the potential benefits of their use. But RFID technology already offers more features in the future: a large memory capacity to the integration of passive sensor features. In addition to RFID of course, another established technology (e.g., GNSS and RTLS location, image-based AutoID) and emerging technologies (e.g. BLE tags) are important elements for generating data for intelligent logistics areas. Once the data is generated, it must be processed. Therefore, logistics and production Smart Logistics Zones applications are also an important area for Big Data solutions, based on data for use in planning and control as well as support solutions. (Zuffanelli, Zamora, Aguilà, Paredes. Martín, & Bonache, 2016).

    Applicable toward altogether officialdoms involved in improving SC finished introduction RFID. Freshly, some creation's major sellers besides administration interventions, since practice of RFID in SCM is comparatively innovative then by a lacking amount of RFID implementations, countless companies do not know what they can gain. This problem is complicated by detail supreme boundless establishments consume before now capitalized severely popular old technology besides stand disbelieving near RFID expertise. Research offered a thorough examination hooked on advantages in addition disadvantages RFID expertise in MTS situation charitable companies occasion towards ponder expenses in addition assistances. (Katina. et al. 2005).

    4. MATHODLOGY After examining the problems related to the management of the supply chain an identifying some solutions

    that RFID technology can offer, the mixing of RFID knowledge hooked on SCM resolve consume optimistic effect. (Dai et al. 2015). Although it remains motionless moderately original besides early venture related to changeover toward RFID organizations stays considerable, doles of RFID expertise distant compensate expenses. By way of extra firms take over use the skill, the costs determination endures towards fall besides main to calibration inside business just similar barcode system. Firms that habit the skill determination get numerous confident enhancements, by way of: reducing catalogue contraction, maintaining augmented competence. (Oh, Choi, & Chouta, 2012).

    Research included the flow of data from reader to the server end. It also included the methods to secure data, error free transmission of data. RFID complete setup is very expensive one, find suggestions to reduce the cost. Without maintenance anything can’t work for long time, so to get better result from RFID arrangements and make sure it worked for long time, must arrange maintenance thing.

  • 170 International Journal of Advanced Culture Technology Vol.7 No.3 166-177 (2019)

    4.1 Proposed ALGORITH As Model

    4.2 Algorithm Procedure Binary grouping is a key segment in our calculation. The objective of its plan is to assemble a smaller

    information structure which contains key checking data recognizing target labels from every one of the labels in the RFID frameworks. As appeared in Fig. it accepts that E is the arrangement of labels to be tried, and S is every one of the labels in the stockroom.

    Agreeing, C is the arrangement of impedance labels which are in S yet not in E, i.e., S - E. The quantity of obstruction labels is indicated as |C| = |S-E|. And the number of target tags is denoted as |E|.

    The fundamental thought of our approach is to first modify the power P of Reader. At that point, the reader creates BSs when the reader moves along the limit of E. Third, after all BSs are gathered, reader sends them to the estimation server. The server contrasts them and each other, gets the number. successively show up in each space and finds the most extreme. Prior to the framework work, it chooses the underlying force rather than the default one to control the cross-examination area. The bigger the readers energy the bigger the cross-examination district however they tried labels may not be in the cross-examination area. It can utilize the ellipsoid as our model to portray the cross-examination area of radio wire. What's more, It put the receiving wire's track on roof. As appeared in Fig, in the three-dimensional space, It partition the cross- examination area into real cross examination locale and minor cross examination district. The reader generally has great perusing execution when the tag is put in the significant cross examination locale. In our RFID framework it put the reception apparatus inside E, which makes it less demanding to peruse the labels in the tried zone. As said, the label estimate, the reader's energy P, the radiation edge Θ, and the separation d between the tag and reader all influence the compelling cross examination locale. are propelled by these and measure the base power in this algorithm. As per the PID, measure the base power (di, ϴ j) with the distance di=0.5m * i, jϵ [1,7] and the angles ϴj = 90° - 15° * j, jϵ [0,6]. For example, P (90°, 1.0) = 15.7dbm, P (60°, 2.0) = 23.4 dbm.

    P(di, θj) if d = di {P (di,0j)+P(di+1,0j) 2 if d ϵ [di, di+1] (1)

    Table 1. Main Notations for Algorithm

    E Target tags S All the tags in the system C Interference tags

    M (L) The vertical(horizontal) distance between each zone |E| The number of target tags NC The count of non-empty slot

    f Frame size BS Binary sequence ϴ Antenna radiation Angle d The distance between the tag and reader x The width of the products R The radius of the interrogation region

  • RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY 171

    At the point when the reception apparatus faces towards the tag (Θ = 90°), the reader accomplishes the best perusing execution. In this way, when the labels and reader are resolved, the base power P is just identified with the separation d. Since d can be estimated, and the width of the products x and in addition the separation between each zone are known, so we can control the cross-examination district and we utilize R to speak to the span of the cross-examination locale. Yet, this is just the underlying force. Often, we can modify d to change the underlying force before the task of the genuine framework. At that point, the reader can more than once increment the power by Δp. In our framework, we set Δp = 1dBm. As we specified previously, d can be estimated, and the width of the merchandise x and additionally the separation between each zone are known, so we can control the cross-examination district R. As it were, the point at which the labels and in addition the reader is resolved, and the reader's energy has been balanced, R is a consistent. Considering Fig., the scope of real cross examination locale for Alien-9611 radio wire is about Θmajor = 60°, which is relatively predictable to the 3dB shaft width (65°) of Alien-9611 reception apparatus. Since we know the d and Θmajor, we can figure the R.

    R = d ×tan (0 major) (2) 2

    Because the antenna's track is on the ceiling and the tags is on the floor, we assume that the radiation range of antenna is approximately circular and move along the boundary of E. To make the most of tested tags located in the major interrogation region, we place the antenna inside E and the designed antenna's track is shown in Fig. Furthermore, we want the radius of the interrogation region to meet the following conditions.

    ∈ [ (3s/ + ) ± s 2 2 (3)

    Right off the bat, as indicated by the separation d, the reader chooses P* = P (d, 90°) as the underlying force. At that point the reader gathers the reactions from labels in the cross- examination area, and decides the sweep r. The server contrasts r and the planned sweep R. On the off chance that the power isn't sufficiently substantial, the reader expands the power by Δp. It rehashes the above procedure until r∈R.The and gets the ideal power P*. A few people may inquire as to whether the power has accomplished to the most extreme esteem and not fulfill the state of r∈R.The, ideal power P* is the greatest estimation of energy. Be that as it may, this won't occur in our framework. Since the separation between the different territories ought to be as little as could be expected under the circumstances, it is less demanding to reader the obstruction labels and to fulfill the state of r∈R.The pseudocode of the ideal power P* age calculation for reader is given in Algorithm.

    Fig. 1 The Model of Antenna’s interrogation region

  • 172 International Journal of Advanced Culture Technology Vol.7 No.3 166-177 (2019)

    Fig. 2 The Trajectory of the antenna

    4.3 Algorithm: Generating the optimal power

    1. While r < R do

    2. Collects the responses from tags and determines the radius r.

    At the point when the ideal power P* and the receiving wire's track are composed, the reader starts to gather the label IDs in E. The Reader first communicate f to the tag. At that point the labels produce hash esteem h (ID) mod f as its space number and answer amid that opening. In this manner, the reader gets a great deal of

  • RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY 173 BSs in each round of correspondence. After all BSs are gathered, reader sends them to the estimation server for promote figuring. The separate contrasts them and each other, gets the quantity of '1' successively show up in a few nonstop BSs and finds the greatest. At the point when the reader moves along the track, it nonstop gets to the labels in the cross-examination district and gather numerous BSs. To encourage the further estimation, we consolidate a few constant BSs into one. What number of BSs could be change over into one TK? It is identified with the exactness and effectiveness. Nonetheless, we not focus on it. We are going for the techniques for labels cardinality estimation in the predefined region. As the Fig. appears, in our framework, we expect that when the reader lands at another crossing point of items in the track of reader, the reader produces one TK. The reader produces TK at interims of x. On the off chance that an opening is non-purge space in a few constant TK, the space of virtual BS VK would be non-exhaust. Furthermore, NC is the include of non-exhaust opening a few constant TK s. Nonetheless, if any one comparing space of TK is vacant, the opening of VK would be unfilled, and the NC will stop check non-exhaust opening. The motivation behind our framework is to discover the limit of the ceaseless TK. The inquiry procedure of the objective labels is in Fig. As said previously, we accept the radiation scope of reception apparatus is around round, and the range of the cross-examination district is R. Often, if the tag is in the roundabout cross examination area, the tag can be perused t= [2R/x] times. On the off chance that the server gathers all the TK, it will produce a similar number of VK a short time later. At that point we join non-discharge spaces. The space of V would be non-exhaust, if any one relating opening of all the TK is non-purge. By figuring the quantity of 1 in V, we can without much of a stretch get cardinality |E| of the labels in the predetermined territory.

    4.4 Working

    Fig. 4 The Search Process of the target tags Moreover, we can get every one of the labels ID in the predefined territory. Right off the bat, the reader

    moves along the track again and communicate f to every one of the labels in cross examination locale. The labels produce hash esteem h (ID) mod f as its space number and answer amid that opening. A tag sends its ID to reader, if this current label's space is non-purge in V. Else, it keeps noiseless. In any case, when the predetermined zone is substantial and we can't plan any track to make the cross-examination locale covering the tried zone, the cardinality just contains the labels in the limit of the predefined territory. For this situation, the reader can choose some key point in the focal point of determined region to gather BSs. Since those BSs are just comprised by the objective tag, those can be indicated as Vk. The subsequent stage is the same as the procedure above.

  • 174 International Journal of Advanced Culture Technology Vol.7 No.3 166-177 (2019)

    4.5 RESEARCH RESULTS An inclusive accomplishment framework for the administration level is presented in this Research. It

    provides assessment-makers with an apparent roadmap for the employment of RFID technology in an industries. This simple, step-by-step approach to method implementation is usually relevant to all organizations.

    4.6 Coverage Ratio The underlying force can't accomplish the prerequisite of scope proportion (ά= 60%). Hence, the reader

    more than once expands the power by Δp. As specified previously, AA is somewhat tedious when the quantity of labels increments. Also, the scope proportion of AA is constantly 100% claiming the reader just sweeps one label without fail. The AA's scope proportion fulfills the prerequisite of p > 60%. Along these lines, we overlook it. As appeared in Fig. 5, we research the scope proportion of our strategy and MaxPw. MaxPw utilizes the most extreme capacity to distinguish labels, as needs be the scope proportion is bigger than 60% (p > ά), which fulfills the necessity. Be that as it may, it prompts a ton of impedance labels situated in the real cross examination district, which will influence the execution of this arrangement. In our framework, we control the span of the cross-examination area and it is anything but difficult to make the generally target labels situated in the real cross examination district while the expansive number of obstruction labels will be in the minor cross examination locale of reception apparatus. In this way, the scope proportion must be fulfilled.

    Fig. 5 Coverage Ratio

    4.7 Execution Time The key parameter that decides the preparing rate of cardinality estimation. Since the estimation server

    interface with the reader by means of rapid systems, the execution time between the server and reader is little, and we can disregard it. Fig. 6 demonstrates the execution time of every arrangement. We utilize AA to speak to the technique for recognizes labels one by one in the predefined zone. Our answer has preferred execution over AA and MaxPw which recognizes every one of the labels in the cross-examination locale, including a

  • RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY 175 considerable measure of obstruction labels. The distinction in execution time amongst AA and MaxPw is little. At the point when the label measure is little, these three arrangements have comparative execution time. As appeared in below Figure when the label measure turns out to be extensive, our answer turns out to be more effective. Since the execution time is in extent to the label measure for AA, we overlook it in Fig.(c). As should be obvious, when s = 150, our answer lessens the execution time by 38% contrasted with MaxPw. What's more, the execution time is diminished by 60% contrasted with MaxPw when s=300.

    Fig. 6 Execution Time 4.8 Misreading Ratio If a Method's misreading proportion is low, the strategy's exactness is high. As the precision of AA is 100%,

    we disregard it. As appeared in Fig. (d), our answer has brought down misreading proportion than MaxPw. As indicated by the examination over, the scope proportion of MaxPw is bigger than 60%, which prompts a considerable measure of impedance labelssituated in the significant cross examination area and influence the execution. Us arrangement utilizes the ideal forces and the objective labels for the most part situated in the significant cross examination area while maintaining a strategic distance from distinguish the obstruction labels.

    Fig. 7 Misreading Ratio

  • 176 International Journal of Advanced Culture Technology Vol.7 No.3 166-177 (2019)

    5. Conclusion This Research investigates the estimation method to obtain the cardinality of the tags in specified area. This

    cardinality estimation method can easily get cardinality |E| of the target tags with the help of the estimation synopsis which can capture key counting information by moving the reader as well as a simple operation. We conduct extensive experiments on the commodity RFID system in real environments. Compared with previous estimation methods, our solution not only achieve high efficiency, but also provides a fast cardinality estimation scheme for the tags in specified area. In future work, we will focus on designing more efficient cardinality estimation method, and implementing our solution on more complex environment. The authors

    hope that the findings of the study reported in this paper will arouse organizations’ interest in considering

    the introduction of RFID technology. By synthesizing the implementation issues across various industries, the proposed framework gives managers a holistic perspective of the implementation RFID solutions in an organization. This can allow organizations to develop better implementation strategies by considering different methods of deployment. With the proper adaptations to different types of industry, the framework can achieve a better appreciation and execution of any project activities. Apart from presenting the general implementation framework, the discussion on the considerations of implementation also identified potential pitfalls that the project team should be aware of before the implementation of the system. It is important for the organization to consider both the pros and cons of implementation; most implementation approaches only focus on the benefits of deploying the technology while the potential problems are seldom highlighted. The part of this study that discusses project considerations provides decision-makers with a balanced view of the change initiative.

    ACKNOWLEDGEMENT

    THIS WORK WAS PARTIALLY SUPPORTED BY RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY.

    REFERENCE [1] ATIWAL, M., ARORA, C., & GUPTA, A. (2013). A SURVEY ON RADIO FREQUENCY

    IDENTIFICATION (RFID). INTERNATIONAL SCIENTIFIC CONFERENCE BUSINESS AND MANAGEMENT. 3(8): 23-42.

    [2] Colella, R., Tarricone, L., Catarinucci, L., (2015). "SPARTACUS: Self-powered augmented RFID Tag for autonomous computing and ubiquitous sensing", IEEE Trans. Antennas Propag.,vol. 63, no. 5, pp. 2272-2281.

    [3] Kaur, M., Manjeet, S., Neeraj, M., & Sandhu, S. (2011). RFID Technology Principles, Advantages, Limitations and Its Applications. International Journal of Computer and Electrical Engineering. 3(1): 163-193.

    [4] Dorantes, C.A., Li, C., Peters, G.F., & Richardson, V.J. (2013). “The effect of enterprise systems implementation on the firm information environment”, Contemporary Accounting Research, Vol. 30 No. 4, pp. 1427-1461.

    [5] Kamaladevi, B. (2010). RFID the Best Technology in Supply Chain Management. International Journal of Innovation, Management and Technology. 2(1): 198.

    [6] Oh, T.H., Choi, Y.B, & Chouta, R. (2012), Supply Chain Management for Generic and Military Applications Using RFID. International Journal of Future Generation Communication and Networking. 5(1): 61.

    [7] Fabien B., Carole, G., Nathalie, G., & Brice, S. (2017). RFID Technology Having Sensing Aptitudes for Food

  • RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY 177

    Industry and Their Contribution to Tracking and Monitoring of Food Products. [8] Tamosaitien, J., Edmundas, Z., Liou, J. H., & Tzeng, G.H. (2014). Selecting Suppliers in

    Green Supply Chain Management. International Scientific Conference Business and Management. 4(1): 203-209.

    [9] Zuffanelli, S., Zamora, G., Aguilà, P., Paredes, F., Martín, F., & Bonache, J. (2016). Analysis of The Split Ring Resonator (SRR) Antenna Applied to Passive UHF-RFID Tag Design. IEEE Transactions on Antennas and Propagation, 64(3), 856-864.

    [10] Gunasekaran, A., Dubey, A., & Singh, P.S. (2016). Flexible Sustainable Supply Chain Network Design, Current Trends, Opportunities and Future. Global Journal of Flexible Systems Management. 17(2): 109-112.

    [11] Arts, J., Topan, E., & Schindler-Chaloub, J. (2016). Additive architecting in the spare parts supply chain. Eindhoven Univ. Tech, 11, 85.

    [12] Chaumukh, M., (2017). A New Architecture for Supply-Chain Management. In Consumer Communications & Networking Conference (CCNC), 14th IEEE Annual. 77-82.

    [13] Hua, J., Sun, H., Liang, T., & Lei, Z. (2008). The Design of Manufacturing Execution System Based On RFID. In Power Electronics and Intelligent Transportation System, Workshop.1(4) 8-11.

    [14] Lei, C., & Zhiyong, T. (2014). Research of RFID Data Mining Based on Supply Chain Management. In Electronics, Computer and Applications, 2014 IEEE Workshop. 668- 671.

    [15] Sabbaghi, A., & Vaidyanathan, G. (2008). Effectiveness and Efficiency of RFID Technology in Supply Chain Management and strategic values and challenges: Journal of theoretical and applied electronic commerce research. 3: 71-81.

    [16] Ting, S.L., and Tsang, H.C. (2013). A Framework for the Implementation of RFID Systems. International Journal of Engineering Business Management. 5(9).

    [17] Tian, F. (2016). An Agri-Food Supply Chain Traceability System for China Based on RFID & Blockchain Technology. In Service Systems and Service Management (ICSSSM), 13th International Conference. 1-6.

    [18] Ting, S.L. and Tsang, H. (2012). Design of an RFID-based inventory control and management system: a case study. The West Indian journal of engineering.

    [19] Vilamovska, K., Hatziandreu, E., Schindler, C., Oranje, N., & Vries, H. (2009). Study on the Requirements and Options for RFID Application in Healthcare Identifying Areas for Radio Frequency Identification Deployment in Healthcare Delivery. Directorate General Information Society and Media. 13(1): 223-238.

    [20] Wong, H., Chan, H., Hui, P., & Patel, A. (2006). A framework for data flow in apparel supply chain using RFID technology. In Industrial Informatics, IEEE International Conference.61-66.

    [21] Zouaghi, I., and Spalanzani, A. (2011). RFID as a Supply Chain Regulator (No. halshs- 00642334).

    [22] Zuffanelli, S., Zamora, G., Aguilà, P., Paredes, F., Martín, F., & Bonache, J. (2016). Analysis of The Split Ring Resonator (SRR) Antenna Applied to Passive UHF-RFID Tag Design. IEEE Transactions on Antennas and Propagation, 64(3), 856-864

    [23] Dai, H., Yang, N., & Yan, N. (2015). A Pricing Strategy to Align Supply Chain Interests for Product Recall. In Industrial Engineering and Engineering Management (IEEM), IEEE International Conference. 285-289.