18 Point, Bold, Arial, Capital Letters
نویسنده
چکیده
When managing a supply chain or an assembly site there is a demand both for the supplier and the customer to know exactly where along the transportation route the deliverables are. Some companies offer tracking systems for the whole supply chain, from source to destination. These types of solutions require a centralized server where the tracking data is gathered. The server is maintained by a service-provider, which usually is neither the supplier nor the customer of the product. The introduction of a third party in the supply chain could result in delays or failure in data integrity during the delivery process. In our paper we propose a lightweight distributed system that allows for automatic notification of a parcel’s movements directly to the server of the “owner” of the parcel (usually the sender or receiver of the parcel), without the need of a third party service provider. The concept allows for efficient tracking and dynamic management of the product throughout the whole transportation process. The Java programming language provides tools for making small, distributed software applications. The software presented in the paper tackles these logistics problems by opening a direct connection between the tracking-checkpoint and the server of the parcel’s owner. In this manner the owner of the parcel gets rapidly updated about the shipment’s whereabouts. If the owner is alarmed from the checkpoint he can notify appropriate members of the supply chain of the error at an early stage, thus making the whole delivery process more reliable. The key to our system lies in coding the server location in an RFID-tag or a bar code on the deliverable itself.
منابع مشابه
بررسی خیار شرط در عقد ازدواج از دیدگاه فقهی ـ حقوقی با رویکردی بر نظر امام خمینی(س)
:<span style="font-family: 'B Zar'; font-size: 10pt; mso-asci...
متن کاملProof of Convergence for Kernelized M3L
We denote vectors in bold small letters, for example v. If v is a vector of dimension d, then vk, k ∈ {1, . . . , d} is the kth component of v, and vI , I ⊆ {1, . . . , d} denotes the vector with components vk, k ∈ I (with the vk’s arranged in the same order as in v). Similarly, matrices will be written in bold capital letters, for example A. If A is an m × n matrix, then Aij represents the ijt...
متن کاملEffects of Typeface and Font Size on Legibility for Children
Eighty children (kindergarten through 4th grade) performed discrimination and identification tasks for tachistoscopically-presented letter pairs. Letter pairs manipulated font (Times New Roman, Arial), point size (12and 18-point) and letter-pair discrimination difficulty (easy, medium, and hard). Higher percent correct scores occurred for the Arial font and 18-pt size, and performance was bette...
متن کاملObjective analysis of typographies by image processing based on the optotypes’ guidelines Análisis objetivo de tipografías por procesado de imagen basado en las convenciones de los optotipos
Most near vision reading charts include the visual acuity values. On the one hand, most reading charts are constructed using the Times New Roman typography. On the other hand, visual acuity is commonly measured with optotypes not with typographies. In this paper, an objective analysis by image processing of the stroke width of some typographies (Times New Roman, Arial, Arial Bold, Sloan and Opt...
متن کاملCoding Strategies for UWB Interference-Limited Peer-To-Peer Networks
In this work we study the achievable rates of memoryless signaling strategies adapted to UltraWideBand (UWB) multipath fading channels. We focus on strategies which do not have explicit knowledge of the instantaneous channel realization, but may have knowledge of the channel statistics. We evaluate the average mutual information of general binary flash-signaling and achievable rates for m-PPM a...
متن کامل