scholarly journals Food Logistics 4.0: Opportunities and Challenges

Logistics ◽  
2020 ◽  
Vol 5 (1) ◽  
pp. 2
Author(s):  
Sandeep Jagtap ◽  
Farah Bader ◽  
Guillermo Garcia-Garcia ◽  
Hana Trollman ◽  
Tobi Fadiji ◽  
...  

Food Logistics 4.0 is a term derived from Industry 4.0 focusing on all the aspects of food logistics management based on cyber-physical systems. It states that real-time information and the interconnectivity of things, supplemented with novel technologies will revolutionise and improve the way food logistics is carried out. It has tremendous potential in terms of bringing transparency, swift delivery of food at reduced cost, flexibility, and capability to deliver the right quality product at the right place and at the right time. This paper discusses the vital technologies within Food Logistics 4.0 and the opportunities and challenges in this regard. It focuses primarily on food logistics, including resource planning, warehouse management, transportation management, predictive maintenance, and data security. Internet of Things, Blockchain, Robotics and Automation and artificial intelligence are some of the technologies discussed.

2021 ◽  
Vol 11 (14) ◽  
pp. 6469
Author(s):  
Fu-Shiung Hsieh

Advancement of IoT and ICT provide infrastructure to manage, monitor and control Cyber-Physical Systems (CPS) through timely provision of real-time information from the shop floor. Although real-time information in CPS such as resource failures can be detected based on IoT and ICT, improper response to resource failures may cripple CPS and degrade performance. Effective operations of CPS relies on an effective scheme to evaluate the impact of resource failures, support decision making needed and take proper actions to respond to resource failures. This motivates us to develop a methodology to assess the impact of resource failures on operations of CPS and provide the decision support as needed. The goal of this study is to propose solution algorithms to analyze robustness of CPS with respect to resource failures in terms of the impact on temporal properties. Given CPS modeled by a class of discrete timed Petri nets (DTPNs), we develop theory to analyze robustness of CPS by transforming the models to residual spatial-temporal network (RSTN) models in which capacity loss due to resources is reflected. We formulate an optimization problem to determine the influence of resource failures on CPS based on RSTNs and analyze the feasibility to meet the order deadline. To study the feasibility to solve a real problem, we analyze the computational complexity of the proposed algorithms. We illustrate the proposed method by application scenarios. We conduct experiments to study efficiency and verify computational feasibility of the proposed method to solve a real problem.


Author(s):  
Samuel J. Ternowchek ◽  
Ronnie K. Miller ◽  
Phillip T. Cole

As operating equipment and structures age, the probability of failure increases. Increasing inspection cycles (over some fixed period of time) with conventional nondestructive evaluation (NDE) is one way to address this problem but it comes at a cost. In addition, an uncertainty exists that the right area(s) have been inspected during one of these inspection cycles. As a result, there is a need for a technique and method that provides the user with real time information about structural integrity or operating conditions. This technique and method must be cost effective and minimize the need for a person to be near the structure operating equipment in order to obtain data on a continuous basis.


2013 ◽  
Vol 443 ◽  
pp. 695-698 ◽  
Author(s):  
Ying Zhang ◽  
Min Gao ◽  
Yan Qiu Liu

In order to study the distribution system of the logistics parks with the support of cloud computing, the paper analyzes the distribution of goods under the conditions of the massive resources and real-time information assisting problem. When the distributed system selecting the paths in massive resource planning for each scheduling, it increases the number of paths selection and reduces transportation costs.. This paper uses the mathematical programming and optimization theory to establish an optimal mathematical model of costs and time for the target path, and introduce the optimal solution of the genetic algorithm. This paper demonstrates through an example application that this model is efficient and embodies the advantages of cloud computing in logistics applications.


2022 ◽  
Vol 12 (2) ◽  
pp. 721
Author(s):  
Ana-Maria Vutan ◽  
Erwin-Christian Lovasz ◽  
Corina-Maria Gruescu ◽  
Carmen Sticlaru ◽  
Elena Sîrbu ◽  
...  

(1) Background: Scoliosis affects about 3% of the population and the number of children diagnosed with this condition is increasing. Numerous studies have been conducted in recent years to observe the effectiveness of rehabilitation specific exercises for this condition. In the present study we aim to observe if symmetrical exercises activate the back muscles in the same way in the case of children with mild scoliosis and those without postural deviations; (2) Methods: We used the thermal imaging camera, which allows a non-invasive, painless investigation that provides real-time information about muscle activity. The study qualitatively assessed muscle activation during exercises. In this study, 30 children were divided into two groups: 15 children diagnosed with mild scoliosis and 15 children without postural deviations; (3) Results: Acquisition of images after each exercise revealed an imbalance in the functioning of the back muscles in children with scoliosis, with areas of higher temperature after exercise on the convexity side of the scoliotic curve. In the second experiment in which children with scoliosis performed the required exercises under the supervision of a physiotherapist, they showed a symmetrical activation of the back muscles on the right and left side of the back; (4) Conclusions: In children without postural deviations, symmetrical exercises activate the muscles equally on the right and left sides of the back. In the case of children with scoliosis, the symmetrical exercises indicated in the rehabilitation programs should be performed only under the supervision of a physiotherapist to properly activate the back muscles.


Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document