Teknologi dan Teknik Sistem Terdistribusi Pervasif dalam Bidang Logistik: Studi Literatur Sistematis

Egia Rosi Subhiyakto, Danang Wahyu Utomo, Prajanto Wahyu Adi


Abstract. Distributed pervasive system is part of distributed system that can be accessed anytime, anywhere, anybody, and anyone. In the part of logistics, supply chain has problems such as real time visibility, materials and products track and trace, and response time for huge data stream processed to automating control smart package. Increasingly advanced technology needed technology to monitor the transport chain with smart thing and some techniques needed to be used to increase performance of the technology. In this paper will study technologies are using in pervasive system domain of logistics, especially technologies to monitor transport chain. Besides, presented several techniques used to improve performance of the technologies. In this paper found some technologies such as RFID, Wireless Sensor Networks (WSN), and hybrid technology used in pervasive system domain of logistics. Also found some techniques to improve performance like smoothing method, multi threshold algorithm, and kalman filter technique. Based on literature can be conclude that some techniques can improve performance of technologies.

Keywords: Distribute Pervasive System, Logistic, Systematic Literature Review

Abstrak. Sistem terdistribusi pervasif merupakan bagian dari sistem terdistribusi yang dapat diakses kapan saja, di mana saja, dan oleh siapa saja. Di bidang logistik, rantai pasokan memiliki masalah dalam hal visibilitas real time, pelacakan bahan dan produk, serta waktu respon untuk dalam proses data untuk mengotomatisasi kontrol paket cerdas. Semakin berkembangnya teknologi, semakin canggih teknologi yang digunakan untuk memantau rantai transportasi dengan cerdas dan beberapa teknik diperlukan untuk meningkatkan kinerja teknologi. Dalam makalah ini akan dibahas mengenai teknologi yang digunakan dalam sistem terdistribusi pervasif untuk bidang logistik, khususnya teknologi untuk memantau rantai pasokan. Selain itu, disajikan beberapa teknik yang digunakan untuk meningkatkan kinerja teknologi. Dalam makalah ini ditemukan beberapa teknologi seperti RFID, Wireless Sensor Networks, dan teknologi gabungan yang digunakan untuk bidang logistik. Juga ditemukan beberapa teknik untuk meningkatkan kinerja seperti metode smoothing, teknik algoritma multi-treshold, dan teknik kalman filter. Berdasarkan literatur dapat disimpulkan bahwa beberapa teknik dapat meningkatkan kinerja teknologi.

Kata Kunci: Sistem Terdistribusi Pervasif, Logistik, Studi Literatur Sistematis

Full Text:



. Cao, Y. & Zhang, J., 2011. Real-time traffic information collecting and monitoring system based on the internet of things. 2011 6th International Conference on Pervasive Computing and Applications, pp.45–49.

. Chandrasekaran, S. & Ravi, H., 2010. A fault tolerant pervasive model for intelligent transport system. 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering, pp.1–5.

. Doss, R., Zhou, Wanlei., Sundaresan, Saravanan., Yu, Shui., & Gao, Longxiang., 2012. A minimum disclosure approach to authentication and privacy in RFID systems. Computer Networks, 56(15), pp.3401–3416.

. Ferscha, A., 2012. 20 Years Past Weiser: What’s Next? IEEE Pervasive Computing, 11(1), pp.52–61.

. Gao, A., Wei, W. & Shi, W., 2010. Efficient Password-Proven Key Exchange Protocol against Relay Attack on Ad Hoc Networks. 2010 IEEE Asia-Pacific Services Computing Conference, pp.469–475.

. Gholami, M., Cai, N. & Brennan, R.W., 2012. Evaluating alternative approaches to mobile object localization in wireless sensor networks with passive architecture. Computers in Industry, 63(9), pp.941–947.

. He, L., Deng, Z., & Huang, J. 2009. Navigation and communication platform for on board unit of logistics traffic. 2009 Joint Conferences on Pervasive Computing (JCPC), pp.305–308.

. Jin, B. & Jin, H., 2011. Security Analysis of RFID based on Multiple Readers. Procedia Engineering, 15, pp.2598–2602.

. Kardaş, Suleyman., Celik, Serkan., Yildiz, Muhammet., & Levi, Albert., 2012. PUF-enhanced offline RFID security and privacy. Journal of Network and Computer Applications, 35(6), pp.2059–2067.

. Khedr, W.I., 2013. SRFID: A hash-based security scheme for low cost RFID systems. Egyptian Informatics Journal, 14(1), pp.89–98.

. Kitchenham, B. & Charters, S., 2007. Procedures for Performing Systematic Literature Reviews in Software Engineering. Keele University & Durham University, UK.

. Marchese, M. 2010. Wireless pervasive networks for safety operations and secure transportations. In Wireless Pervasive Computing (ISWPC), 2010 5th IEEE International Symposium on (pp. 226-231). IEEE.

. Marinagi, C., Belsis, P. & Skourlas, C., 2013. New Directions for Pervasive Computing in Logistics. Procedia - Social and Behavioral Sciences, 73, pp.495–502.

. Martínez-Sala, A. S., Egea-López, E., García-Sánchez, F., & García-Haro, J., 2009. Tracking of Returnable Packaging and Transport Units with active RFID in the grocery supply chain. Computers in Industry, 60(3), pp.161–171.

. Raychoudhury, V., Cao, J., Kumar, M., & Zhang, D., 2013. Middleware for pervasive computing: A survey. Pervasive and Mobile Computing, 9(2), pp.177–200.

. Ricci, A., Grisanti, M., Munari, I. D., & Ciampolini, P., 2009. Improved Pervasive Sensing With RFID: An Ultra-Low Power Baseband Processor for UHF Tags. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 17(12), pp.1719–1729.

. Ruta, M., Di Noia, T., Di Sciascio, E., Piscitelli, G., & Scioscia, F., 2008. A Semantic-Enabled Mobile Directory Service for RFID-Based Logistics Applications. 2008 IEEE International Conference on e-Business Engineering, pp.333–340.

. Saha, D. & Mukherjee, A., 2003. Pervasive computing: a paradigm for the 21st century. Computer, 36(3), pp.25-31.

. Sardroud, J.M., 2012. Influence of RFID technology on automated management of construction materials and components. Scientia Iranica, 19(3), pp.381–392.

. Tiešytė, D., & Jensen, C. S. 2007. Challenges in the tracking and prediction of scheduled-vehicle journeys. In Pervasive Computing and Communications Workshops, 2007. PerCom Workshops' 07. Fifth Annual IEEE International Conference on (pp. 407-412). IEEE.

. Wang, F., Xiao, B., Bu, K., & Su, J., 2013. Detect and identify blocker tags in tree-based RFID systems. 2013 IEEE International Conference on Communications (ICC), pp.2133–2137.

. Wang, W. & Fan, S., 2009. RFID technology application in container transportation. 2009 Joint Conferences on Pervasive Computing (JCPC), pp.639–642.

. Woo, S. H., Choi, J. Y., Kwak, C., & Kim, C. O., 2009. An active product state tracking architecture in logistics sensor networks. Computers in Industry, 60(3), pp.149–160.

. Xu, X., Gu, L., Wang, J., & Xing, G. 2010. Negotiate power and performance in the reality of RFID systems. In Pervasive Computing and Communications (PerCom), 2010 IEEE International Conference on (pp. 88-97). IEEE.

. Ye, J., Dobson, S. & McKeever, S., 2012. Situation identification techniques in pervasive computing: A review. Pervasive and Mobile Computing, 8(1), pp.36–66.

. Zhang, L. & Wang, Z., 2006. Integration of RFID into Wireless Sensor Networks: Architectures, Opportunities and Challenging Problems. 2006 Fifth International Conference on Grid and Cooperative Computing Workshops, pp.463–469.

. Zhang, T., Luo, Z., Wong, E. C., Tan, C. J., & Zhou, F., 2008. Mobile Intelligence for Delay Tolerant Logistics and Supply Chain Management. 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008), pp.280–284.

. Zöller, S., Kaiser, A., Reinhardt, A., Schulte, S., & Steinmetz, R., 2011. A multi-threshold approach for efficient and user-centric event transmission in logistics wireless sensor networks. 2011 6th International Conference on Pervasive Computing and Applications, pp.435–442.

. Zu, Q. & Wu, T., 2010. Application of radio frequency positioning technology in TDOA system based on improved genetic algorithm. 5th International Conference on Pervasive Computing and Applications, pp.167–171.

DOI: https://doi.org/10.24002/jbi.v7i2.487


  • There are currently no refbacks.