Sie sind auf Seite 1von 19

ARTICLE IN PRESS

Int. J. Production Economics 123 (2010) 118–136

Contents lists available at ScienceDirect

Int. J. Production Economics


journal homepage: www.elsevier.com/locate/ijpe

Inventory control in serial systems under radio


frequency identification
Jinxiang Pei , Diego Klabjan
Department of Industrial Engineering and Management Sciences, Northwestern University, Evanston, IL, USA

a r t i c l e i n f o abstract

Article history: The widely adopted slap-and-ship radio frequency identification strategy provides
Received 16 January 2009 valuable information to retailers. On the other hand, suppliers struggle to find benefits
Accepted 25 July 2009 even though they are submerged with new data. Radio frequency identification provides
Available online 3 August 2009
complete visibility of their shipments, including the time and location of every pallet,
Keywords: case or even item. We provide a novel model relying on such data that is capable of
Inventory control producing better inventory and shipping control policies. We first propose a
Radio frequency identification comprehensive inventory model for serial systems that captures both the supply and
distribution information. We show that the underlying cost-to-go can be decomposed
into two lower dimensional functions. In a special case, the optimal replenishment and
shipping policies are base stock with respect to the underlying positions. In addition, we
also analytically study the value of radio frequency identification in terms of the
expected total minimum cost over a finite time horizon by introducing partial radio
frequency deployment scenarios. Results indicate that additional cost reductions are
possible with broader deployments.
& 2009 Elsevier B.V. All rights reserved.

1. Introduction information and passes it to information systems. In a


typical RFID deployment within a supply chain, inter-
A basic radio frequency identification (RFID) system rogators are mounted at critical locations. Every time
includes two components: a transponder and an inter- goods affixed with transponders come within the read
rogator. A transponder is a tiny microcomputer consisting range of an interrogator, the location, time, and identifica-
of a microchip, antenna and memory connecting these tion are recorded. Under normal conditions a typical
two. In the simplest form, the so-called passive RFID interrogator may interrogate hundreds of transponders
transponders, transponders are idle until woken up by an per second.
interrogator via radio wave signals. Interrogators are, One of the recent information technology advances is
therefore, constantly emitting signals to provide power to the adoption of RFID technology in inventory control
the transponders within their antenna’s field of work. systems. Early benefits earned from RFID deployments are
When a transponder receives a signal from an interro- inventory asset tracking, advance shipping notice, real-
gator, it absorbs some of the radio energy to power itself time order progress information for retailers, and real-
and sends back a response, which among other data time shipping visibility for suppliers. The additional RFID
stored in its memory, includes the transponder’s unique generated information could possibly result in improved
identification number. The interrogator decodes this inventory control policies and potential new business
applications. One of the biggest setbacks to a wider RFID
adoption is the lack of return of investment. Many entities
 Corresponding author. in supply chains are overwhelmed with data generated
E-mail addresses: peipauj@u.northwestern.edu (J. Pei), from RFID deployment, yet this data is seldom used to
d-klabjan@northwestern.edu (D. Klabjan). enhance business intelligence.

0925-5273/$ - see front matter & 2009 Elsevier B.V. All rights reserved.
doi:10.1016/j.ijpe.2009.07.011
ARTICLE IN PRESS
J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136 119

As an emerging auto data-capture enabler, RFID inventory model is first presented in Section 2. In addition,
technology intrigues supply chain researchers and practi- we provide a special case with an instantaneous replen-
tioners. Companies have rushed to develop RFID solutions ishment process. We apply multi-echelon techniques to
without having a clear idea about the potential value of decompose the proposed model into two sub-problems.
RFID to their business. One of the values of RFID in supply The optimal control policy under certain conditions is
chains is derived from better supply chain visibility. An characterized as the echelon base stock policy. The value
RFID deployment improves supply chain visibility; how- of RFID in a serial distribution process is clearly identified
ever, many benefits in inventory control are still untapped. and rigorously proved in Section 3 through discussions of
The value of RFID obtained from labor cost reductions and partial RFID deployment scenarios. We conclude the
similar basic benefits can be satisfactorily assessed by case introduction with a brief literature review.
studies. Empirical studies and proofs of concepts are of
limited scope since they have to rely on existing processes
and data. It is not clear how RFID can further reduce 1.1. Literature review
supply chain costs via improved visibility. Educated
guesses are currently driving such estimates. Analytically Our models assume stochastic lead times. In standard
modeling inventory control systems with an RFID deploy- single-stage stochastic inventory models, the lead time is
ment is critical to enhance our understanding of the value considered either as a known deterministic constant or a
of RFID. random variable with known distribution. In these models
Beyond replenishment inventory control on the supply (Kaplan, 1970; Nahmias, 1979; Ehrhardt, 1984) the lead
side, the distribution side deals with shipping decisions. time is assumed to be time-independent with known
As is the case with the supply, RFID deployments yield real distribution. The non-crossover property is also assumed
time visibility of shipments. To achieve such capability, it in order to make the study tractable. In our analysis, we
is typical to install portals with readers at important borrow concepts from multi-echelon systems. The semi-
locations (e.g., in and/or outbound docks) and tag the nal work on the serial multi-echelon inventory problem
corresponding goods. Consider an RFID mandate imposed was conducted by Clark and Scarf (1960). In their research,
by a retailer. A supplier places transponders on the the global system is decomposed into separate sub-
products and ships them to the retailer’s distribution systems. At each echelon, it is optimal to follow the base
centers, thus complying with the corresponding RFID stock policy with respect to the echelon inventory.
mandate. Since typically transponders are affixed just RFID is the most promising technology providing
before leaving the final facility of the supplier, this complete and comprehensive supply chain visibility. It is
strategy is known as slap-and-ship. Clearly, to obtain a surprisingly simple computing and communication
further benefits from RFID, it is advised to push the architecture since only two basic building blocks are
tagging process further upstream in the supplier’s own needed—a tag and a reader (AIM Inc., 1999; Clampitt
supply chain. The main drawback of slap-and-ship is the et al., 2006). We have already argued that RFID is an
inability to produce return on investment. As already enabling technology for visibility that is assumed by our
discussed, the retailer could benefit from continuously model. There are estimates about the value of RFID in
monitoring the inventory levels and outstanding order supply chain management, including labor cost savings,
progress in its own chain. However, it is not clear how the reduced inventory holding costs, and stock-outs (Lee and
supplier can benefit from the mandate even if real-time Özer, 2007; Hardgrave, 2005). Most studies regarding
distribution information is provided by the retailer. This is RFID in inventory control concentrate on supply chain
a typical quote about such suppliers: ‘‘They (an apple simulations (Lee et al., 2004; Fleisch and Tellkamp, 2005;
supplier to Wal-Mart) know exactly what day and time Kang and Stanley, 2005).
the container was scanned through its portal, when it Bottani and Rizzi (2008) describe profitability of
entered a distribution center and what day and time it deploying RFID in a three-tier supply chain. They show
went to the store. The company has yet to determine how by a real world case in a fast-moving consumer goods
best to use this data.’’, Inbound Logistics, June 2006. The market the benefits of pallet-level tagging, and much
main objective of this research is to show how suppliers more lenient results of case- and item-level tagging.
can benefit under such circumstances even under slap- Ustundag and Tanyas (2009) investigate impacts of
and-ship. We assume a decentralized system where each different factors, such as product value, lead time, and
entity in the chain acts independently. The main entity is uncertain demand on the supply chain cost performance
an installation somewhere in the middle of the entire at echelon levels in conjunction with RFID tagging.
chain. The firm makes two decisions: (1) the replenish- Among the few studies that analytically deal with RFID
ment decision from its own supplier and (2) the shipment in inventory control, Song and Zipkin (1996) provide a
decision how much to ship downstream. modeling framework for the inventory control problem
We study a single-product, multi-echelon serial supply with supply information. While this study dates back to
chain system, in which the supplier streamlines both its pre-era of modern RFID, it requires data available only
replenishment and distribution processes by using the through today’s RFID deployments. The replenishment
RFID data. We propose a dynamic programming model to lead time is time-dependent and evolves over time. We
capture the real time inventory information generated borrow their modeling technique and enrich their study
from an RFID deployment across the entire supply chain. by focusing on the distribution side, thus dealing with two
The paper is organized as follows. A comprehensive concurrent decisions. We also present results addressing
ARTICLE IN PRESS
120 J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136

the value of RFID in such distribution systems. Gaukler jth downstream installation. There are two special
et al. (2008) quantify the benefits of RFID in the supply installations: dn represents the point-of-sale installation,
system of a retailer who faces uncertain demand and the and un ¼ d0 represents the main decision making installa-
option of emergency orders. They develop an order tion. It will be called the main installation. We can identify
progress information model to study the optimal policies the main installation as a supplier to Wal-Mart and
for both regular and emergency orders, under the d1 ; . . . ; dn1 as installations owned by Wal-Mart. The main
assumption of a single outstanding order. Szmerekovsky installation ships orders to Wal-Mart by directly shipping
and Zhang (2008) discuss impacts of item-level RFID through all these installations. Upstream installations
tagging in a two-tier system under vendor managed u0 ; . . . ; un1 represent the supply side of the main
inventory. First, the demand processes are characterized installation. The on-hand inventory IOt at the main
in both RFID and non-RFID systems. Then they study the installation, net inventory It;dn at the point-of-sale, and
control policies for each entity. Second, they study the net inventory It;k for every k 2 fu1 ; . . . ; un1 g [
channel coordination efforts through sharing of the RFID fd1 ; . . . ; dn1 g describe the system. There are two impor-
costs by comparing centralized and decentralized sys- tant differences between standard multi-echelon inven-
tems. Atali et al. (2006) analytically study inventory tory systems and our model. We focus on both the supply
inaccuracy, which is a joint effect of transaction errors, and distribution sides of a decentralized system. Tradi-
shrinkage, and misplacements. RFID yields more accurate tional multi-echelon models deal only with the supply
inventory records and easier audits. Bottani et al. (2009) side of a centralized system. In a centralized system,
examine the impact of RFID on out-of-stocks of promo- holding cost is accounted for at each installation. Mean-
tional items in the fast-moving consumer goods context. while, in our decentralized system, it is accounted for only
They show that by reducing the main causes of unavail- at a single installation. We consider such a firm with its
ability of sales through RFID can yield substantial savings. physical location corresponding to installation d0, Fig. 1.
In addition, a reengineering process is exploited to Downstream Installations d1 ; . . . ; dn represent another
compare the reduction of stock-outs. Results of an player, namely the retailer and upstream installations
experiment suggest that RFID has the potential to reduce u0 ; . . . ; un1 attribute to different players as well. If RFID is
losses and improve profits in fast-moving consumer deployed end to end in this serial supply chain, then at
goods. any point in time, the location of all outstanding orders
New processes hinging on RFID are of particular placed with the supplier corresponding to installation u0
interest. Expediting on the supply side is one such process are known. Likewise, the location of outstanding ship-
that can benefit from RFID. Kim et al. (2006) address ments is also known at any point in time. RFID is an
expediting strategies based on RFID data. Pricing strate- enabling technology for cost effective tracking of goods
gies based on added value on goods are discussed in and as such it provides real-time visibility, including
Schneider (2007). RFID is used as a technology to allow recording quantities of outstanding orders and shipments.
dynamic pricing. The arcs in Fig. 1 represent possible order/shipment
movements in a time period. There is no order/shipment
2. Comprehensive inventory model moving into an installation if no incoming arcs attached to
the installation appear. Each installation has a single
Most of prior inventory models deal with supply outgoing arc, which could also be a self-loop representing
information, i.e., the focus is on the procurement side of the scenario of the order staying put. The outgoing arc
supply chains. Such models are appropriate for retailers from installation dn represents the exogenous end custo-
and the endpoints of supply chains. We extend these mer demand Dt .
models to capture both supply and distribution sides. In In order to model downstream shipment transitions,
this section, a comprehensive inventory control model is we introduce a random variable W. For each realization w
first proposed. It contains both the supply and distribution of W there is a transition vector MðwÞ that specifies where
sides of the entire chain. Next, we give the state reduction the current outstanding shipments at each stage move
result for the pure distribution setting (upstream installa- next. This vector has n elements and it encodes the
tions are neglected). This result is then extended by transitions in downstream shipments. In Fig. 2 we show
including upstream installations. Finally, optimal control two such possible transitions. Self-loops correspond to the
policies are studied. events that the outstanding shipments stay put at the
Given several installations as shown in Fig. 1, let ui installation. For example, under the top realization we
denote the ith upstream installation and let dj denote the have Itþ1;dn1 ¼ It;d3 þ It;d4 and under the bottom realization

It, u1 It, u I Ot It, d It,d It, d


n−1 n−1 n
Xt Yt 1

••• •••
Dt

u0 u1 un-1 un/d0 d1 dn-1 dn

Fig. 1. The comprehensive inventory model.


ARTICLE IN PRESS
J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136 121

Enter M (w) for realization w of W Arrival

It, d1 It,d2 It, d3 It, d4 It, dn−1 It, dn


Yt
...
Dt
un / d0 d1 d2 d3 d4 ... dn-1 dn

Enter M (w) for a different realization w Arrival

Yt It, d It, d2 It, d It, d It, d It, d


1 3 4 n−1 n

Dt
un / d0 d1 d2 d3 d4 ... dn-1 dn

Fig. 2. Two possible outstanding shipment transitions.

we obtain Itþ1;d4 ¼ It;d3 þ It;d4 . Similarly, we introduce a  We assume that the outstanding orders and shipments
random variable R to encode the upstream stochastic never cross in time. The current order and shipment
order transitions. The corresponding transition function is sequence is preserved, or at least not reversed in both
denoted by Q ðrÞ, where r is a realization of R. supply and distribution networks. Formally,
Q ðuk ; rÞ  Q ðuk1 ; rÞ for every k ¼ 1; 2; . . . ; n and any
2.1. Model
realization r of R,
Throughout the document, we use the following Mðdk ; wÞ  Mðdk1 ; wÞ for every k ¼ 1; 2; . . . ; n and any
notation.
realization w of W.
Ct procurement cost function in time t  Orders and shipments cannot be broken apart. Once an
St shipping cost function in time t order or shipment is placed, all corresponding units
ht per unit holding cost in time t at the main installation un
travel together.
pt per unit shortage cost in time t occurred at the point-of-sale
installation dn
Q ðuk ; RÞ one step upstream transition at installation uk , i.e., the Note that the lead times of 41 are just a technical
coordinate of Q ðRÞ corresponding to installation uk
p
condition to rule out the trivial case. It requires that both
Q ðuk ; RÞ p-step upstream transition at installation uk , i.e., transition in
p time periods corresponding to installation uk inbound and outbound orders must go through at least
Mðdk ; WÞ one step downstream transition at installation dk , i.e., the one intermediate installation before arriving to the final
coordinate of MðWÞ corresponding to installation dk destinations. In addition, it is easy to see that the non-
M p ðdk ; WÞ p-step downstream transition at installation dk , i.e., transition crossover property implies that Q p ðuk ; rÞ  Q p ðuk1 ; rÞ for
in p time periods corresponding to installation dk
every realization r of R, k ¼ 1; 2; . . . ; n, and p ¼ 1; 2; . . . ; Lu ,
Lu upstream stochastic lead time Lu ¼ Minfl41 : Q l ðu0 ; RÞ ¼ un g
and M p ðdk ; wÞ  M p ðdk1 ; wÞ for every realization w of W,
Ld downstream stochastic lead time
k ¼ 1; 2; . . . ; n, and p ¼ 1; 2; . . . ; Ld .
Ld ¼ Minfl41 : M l ðd0 ; WÞ ¼ dn g
It state vector in time t: Within time period t, events occur as follows:
It ¼ ðIt;u1 ; It;u2 ; . . . ; It;un1 ; IOt ; It;d1 ; It;d2 ; . . . ; It;dn Þ
Dt stochastic demand in time period t  the state vector It is observed at the beginning of time
Dl1 cumulative demand over l periods starting from time
t P period t, next;
t : Dl1 ¼ tþl1 k¼t Dk
t
 the shipping decision is made, then;
 the replenishment decision is made;
We make the following assumptions.  replenishment orders due in time period t arrive and
 shipment orders due in time period t arrive;
 We assume that installations u0 and d0 , respectively,  demand Dt in time period t occurs; and finally
denote the entering point for the replenishment and  holding and penalty costs are assessed.
distribution process and installation dn is the point-of-
sale location. In addition, un and d0 are physically the It is important to point that at the end of each time
same installation. period the holding and penalty costs in the proposed
 We assume that the unmet demand is backlogged at model are evaluated differently from standard inventory
the point-of-sale installation dn . models. In our proposed model, the holding cost is
 Both upstream and downstream stochastic lead times assessed at the main installation at the end of each time
are at least equal to or 42. Formally, we require that period. On the other hand, the penalty cost is evaluated at
u0 oQ ðu0 ; RÞoun and d0 oMðd0 ; WÞodn . the point-of-sale installation where the customer demand
ARTICLE IN PRESS
122 J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136

220 1þ 3 3
might not have been satisfied. It is crucial to note that we
only account for the costs incurred at the main installation 66B X C 77
þ pt  ED;W 6 6B
44@Dt  It;dn  It;dk C 77
A 55
(the supplier) even though there are other costs incurred dk :Mðdk ;WÞ¼dn
by the remaining entities, for example the retailer. As for o
1kðn1Þ

the replenishment orders and shipments, we charge the b tþ1 ðItþ1 Þ .


þED;W;R ½V (1)
procurement and shipping costs when they are placed. We
note that all these costs are actually incurred by the main The action space constraint It;d0  IOt guarantees that we
installation (even though the penalty cost is accounted for do not ship more than we have on hand.
at the point-of-sale installation). This reflects our initial This comprehensive model is complex. We instead first
assumption of a decentralized system focusing on the analyze a simplified version and tackle the comprehensive
main installation. This also implies that there is no model after learning from the analysis in such a setting. In
holding cost at other installations but un ¼ d0 . Let X t  0 the following section, we study a special case of the
denote the procurement quantity and Y t  0 the shipping comprehensive model where we neglect the replenish-
quantity in time period t, Fig. 1. For ease of notation, we ment stochastic lead time, i.e., the replenishment order is
use It;u0 ¼ X t and It;d0 ¼ Y t in Section 2. instantaneous. After better understanding such a distribu-
The underlying system dynamics are tion model, we decompose the comprehensive model into
un1
X two problems, which can be handled separately. This
IOtþ1 ¼ IOt þ It;uk  It;d0 decomposition is shown in Section 2.3.
uk :Q ðuk ;RÞ¼un
1kn1

and for u1  ui  un1 we have


X 2.2. Distribution side
Itþ1;ui ¼ It;uk .
uk :Q ðuk ;RÞ¼ui
0kn1 This section demonstrates how the supplier could
On the distribution side, for d1  dj  dn1 we obtain make use of the real-time information to improve the
X distribution operations. Imagine that a supplier to Wal-
Itþ1;dj ¼ It;dk Mart has access to the distribution information of its
dk :Mðdk ;WÞ¼dj
0kn1
goods via Retailink (http://retaillink.wal-mart.com). In a
traditional setting, only point-of-sale information is
and available. Soon after first RFID enabled pallets started
X
Itþ1;dn ¼ It;dn þ It;dk  Dt . arriving to the distribution centers, suppliers had com-
dk :Mðdk ;WÞ¼dn plete visibility of their shipments through the same
1kn1
system.
To recapture, each shipment goes through a stream of
Note that due to the non-crossover property, if
installations labeled as d0 ; d1 ; . . . ; dn . Each installation
Q ðuk ; RÞ ¼ un for every k; 1  k  n  1; then Q ðukþ1 ; RÞ
corresponds to a transportation node or a specific stock-
¼ Q ðukþ2 ; RÞ ¼    ¼ Q ðun1 ; RÞ ¼ un . Similar property
piling point. Installation d0 stands for the supplier itself,
holds for M. The on-hand inventory IOtþ1 in time t+1
i.e., the main decision-making installation and, dn repre-
equals the on-hand inventory in time t plus the out-
sents the point-of-sale. Furthermore, each of the nodes is
standing orders which have just arrived at the main
deployed with RFID. Without RFID, it would not be
installation, minus the shipment Y t made in time t. The
accessible to observe the installation inventories and the
on-hand inventory at installation ui equals the arrived
exogenous stochastic information W. To better understand
outstanding orders and potential X t . Downstream instal-
the distribution process, instantaneous replenishment is
lation inventory Itþ1;dj in time t+1 is equal to the
assumed.
outstanding shipments which move to installation dj plus
Two models are discussed in this section. The full
shipment Y t if transition Mðd0 ; WÞ ¼ dj occurs. Finally, the
model captures all installation inventories, while the
net inventory at the point-of-sale installation in time t+1
reduced model only includes the inventory on-hand and
equals the net inventory in time t plus the outstanding
the downstream echelon inventory with respect to the
shipments, which arrive at the point-of-sale, minus the
point-of-sale. The full model serves as the starting point
customer demand in time t.
b t be the expected total minimum system cost and it models slap-and-ship. The reduced model is
Let V
simpler, nevertheless, it is equivalent in a certain sense
starting from time t up to T under an optimal policy.
as shown here. Quantities V t represent the expected total
The optimality equation over finite time horizon [0, T]
minimum cost over time periods t; t þ 1; . . . ; T in the full
reads
model or the cost-to-go. Similarly, V t represent the

b t ðIt Þ ¼ Min C t ðIt;u Þ þ St ðIt;d Þ
V expected total minimum cost over time periods t; t þ
0 0
It;u0 0
It;d 0
1; . . . ; T in the reduced model. Since we do not consider
0
It;d IOt
0
the costs incurred beyond time point T, the terminal costs
0 1 V Tþ1 and V Tþ1 are assumed to be zero.
B un1
X C An illustration of the full model is shown in Fig. 3. In
þ ht  ER B
@IOt þ It;uk  It;d0 C
A addition to previously defined terms, we depict that the
uk :Q ðuk ;RÞ¼un
1kn1 order replenishment is instantaneous. The rest of the
ARTICLE IN PRESS
J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136 123

model configuration is identical to the comprehensive X


n X
¼ It;dn  Dt þ It;dg (5)
model.
k¼1 dg :Mðdg ;WÞ¼dk
The optimality equation of the full model reads 0gn1

8 9
>
> C t ðIt;u0 Þ þ St ðIt;d0 Þ þ ht ðIOt þ It;u0  It;d0 Þ >
>
< P = X
n1
D;W þ D;W
V t ðIt;d Þ ¼ Min þpt  E ½ðDt  It;dn  It;dk Þ  þ E ½V tþ1 ðItþ1;d Þ ,
>
It;u0 0 > dk :Mðdk ;WÞ¼dn >
> ¼ It;dn  Dt þ It;d0 þ It;dg
It;d 0 : 1kn1
;
0
It;d IOt
g¼1
0

¼ r t;1 þ It;d0  Dt .
(2)
where the state vector is It;d ¼ ðIOt ; It;d1 ; It;d2 ; . . . ; It;dn Þ. The In (4) we use system dynamics equations for
underlying system dynamics equations are Itþ1;di for every i ¼ 1; . . . ; n. The third term in (5) covers
all the possibilities of shipment movements in time t. As a
IOtþ1 ¼ IOt þ It;u0  It;d0 , result, this term corresponds to the summation of all
X
Itþ1;dj ¼ It;dk d1  dj  dn1 , outstanding shipments, plus shipment It;d0 ; which has just
dk :Mðdk ;WÞ¼dj been made in time t.
0kn1
X Next, we state and prove the main result in this
Itþ1;dn ¼ It;dn þ It;dk  Dt . section. The following theorem, proved in Appendix A,
dk :Mðdk ;WÞ¼dn
1kn1 shows the relationship between the full and reduced
models in the distribution process.
The first equation above is different from the corresponding
equation in the comprehensive model since there is no lead Theorem 1. We have
time on the supply side. The inventory on-hand in time t+1
equals the inventory on-hand in time t plus instantaneous V t ðIt;d Þ ¼ V t ðIOt ; r t;1 Þ þ at , (6)
replenishment order It;u0 , minus the shipment It;d0 in time t. where
The remaining two equations are identical. 0 20 1þ 31
The full model contains many state variables. The Ld B
d
BLX 2
D;W 6B
6B j jþ1
X X C 7C
multi-dimensional state vector results in difficulties when at ¼ E @ ptþj  E 4@Dt  It;dn  It;dk C 7C
A 5A
j¼0 p¼1 dk :Mp ðdk ;WÞ¼dn
computing inventory control policies. We next introduce 1kn1

the reduced model with distribution information as


shown in Fig. 4. The reduced model has only two represents the expected total penalty cost over the shipping
variables: the inventory on-hand IOt and downstream lead time.
echelon inventory rt;1 with respect to the point-of-sale.
P By means of Theorem 1, we show that in a distribution
Formally, we define r t;1 ¼ nk¼1 It;dk .
process the original value function is divided into two parts:
The optimality equation for the reduced model reads
the reduced value function and a penalty cost term. This

V t ðIOt ; r t;1 Þ ¼ Min C t ðIt;u0 Þ þ St ðIt;d0 Þ þ ht ðIOt þ It;u0  It;d0 Þ decomposition proves to be crucial in order to study the
It;u0 0
It;d 0 inventory control policies in Section 2.3. Accessing the
0
It;d IOt
0 echelon-level inventory statuses and the current inventory
d d on-hand suffices to characterize the optimal policies since the
þ EL ðptþld 1  ED ½ðDLt 1  It;d0  r t;1 Þþ Þ
  penalty cost term only depends on the exogenous demand,
þ ED V tþ1 ðIOtþ1 ; r tþ1;1 Þ , (3) shipment movements, and the current inventory. Further-
more, the penalty term is an explicit, closed form function.
where the underlying system dynamics equations are
IOtþ1 ¼ IOt þ It;u0  It;d0 , 2.3. Decomposition and analysis of the comprehensive
model
X
n
rtþ1;1 ¼ Itþ1;dk
k¼1 In the previous section, we discussed in detail the
X
n1 distribution process with a complete RFID deployment. By
¼ Itþ1;dn þ Itþ1;dk a system-wise deployment of RFID both supply and
k¼1
distribution sides can be tracked. The comprehensive
X X
n1 X inventory model with both supply and distribution
¼ It;dn þ It;dk  Dt þ It;dg (4)
dk :Mðdk ;WÞ¼dn k¼1 dg :Mðdg ;WÞ¼dk information has already been presented in Section 2.1.
1kn1 0gn1
In this section, the system is decomposed into two

I Ot It, d It, d It, d


1 n−1 n

It, d
0
•••
It, u Dt
0

d0 d1 dn-1 dn

Fig. 3. Full model with distribution information.


ARTICLE IN PRESS
124 J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136

rt, 1

I Ot
It, d
0
•••
It, u0 Dt

d0 dn-1 dn
d1

Fig. 4. Reduced model with distribution information.

sub-problems in terms of the value function. Under some In (9), the downstream sub-system follows:
n
assumptions the inventory control policy of each sub-
V t ðr t;1 Þ  Min St ðr t;d0  r t;1 Þ  ht  r t;d0
problem is determined separately. The optimal system rt;d0 r t;1
h d
control policy is the echelon base stock policy with two d
þ EL ðptþLd 1  ED ðDLt 1
threshold numbers, as shown later in this section.
 o
By applying the same techniques as those presented in  r t;d0 Þþ Þ þ ED V tþ1 ðr tþ1;1 Þ , (10)
Section 2.2 with respect to (1), we obtain the following
result. where rtþ1;1 ¼ r t;d0  Dt and action r t;d0 is the downstream
echelon inventory level after shipping in time t. Function Gt is
Theorem 2. We have a function of only the upstream echelon inventories. More-
8 9
>
> C t ðIt;u0 Þ þ St ðIt;d0 Þ >
>
over, the optimal decision rule in the downstream sub-system
>
> >
>
>
>
< þht  ER ðIOt þ
uP
n1
It;uk  It;d0 Þ
>
>
= corresponding to shipping quantities follows the base-stock
b t ðIt Þ ¼ at þ Min ,
V
I 0 >
t;u0 >
uk :Q ðuk ;RÞ¼un
1kn1 >
>
policy with the base stock levels r t;d0 derived appropriately
>
> >
>
> e tþ1 ðItþ1 Þ >
It;d 0
0
It;d IOt
0
>
:
d d
þEL ðptþLd 1  ED ½ðDtL 1  It;d0  r t;1 Þþ Þ þ ED;W;R ½V >
; from (10).

(7) Proof. The proof is provided in Appendix B.


where In Theorem 3, we show how to simplify the value
0 20 1þ 31
d
jþ1
function of the comprehensive model. We now discuss the
d BLX 2 6B j X X C 7C
at ¼ EL B@ ptþj  ED;W 6B
4@Dt  It;dn  It;dk C 7C
A 5A
underlying replenishment inventory control policy.
j¼0 p¼1 dk :M p ðdk ;WÞ¼dn
1kn1
Corollary 1. If the procurement cost functions C t for t ¼
1; . . . ; T are all linear in addition to St being linear and St  ht
and r t;1 is defined in Section 2.2. for t ¼ 1; . . . ; T; then the replenishment decision also follows
To derive an optimal policy, we focus on the minimiza- the base stock policy.
tion part in (7). We first define Nðui Þ ¼ minfuk : Q ðuk ; RÞ ¼ Proof. Since the value function can be decomposed as in
ui ; 0  k  n  1g for every i ¼ 1; 2; . . . ; n. We denote (9) and the sub-systems V t and Gt are separable in terms
P
IOet ¼ IOt þ r t;1 , and Iet;ui ¼ n1 k¼i It;uk þ IOt
e
for every i ¼ of the state variables, we borrow concepts from the multi-
0; 1; 2; . . . ; n  1. We represent the system state as echelon inventory control techniques (Scarf, 1960). We
Iet ¼ ðIet;u1 ; . . . ; Iet;un1 ; IOet ; r t;1 Þ. Next, we rewrite (7) in the first obtain the optimal downstream echelon stock levels
echelon version as r t;d0 as discussed in Theorem 3. We next move upstream to

Ṽ t ðIet Þ ¼ Min C t ðIt;u0 Þ þ St ðIt;d0 Þ þ ht  ER ðIet;Nðun Þ  r t;1 focus on the replenishment process. It is easy to see by
It;u0 0 applying convexity that all Gt ’s are convex. Based on (19)
It;d 0
0
It;d IOe r t;1
in Appendix B, we obtain the upstream base stock level
t
r t;u0 in time t as in Song and Zipkin (1996). If Iet;u1 or t;u0 ,
0
 þ

d d
 It;d0 Þ þ EL ptþLd 1  ED DLt 1  It;d0  r t;1 the optimal order quantity is r t;u0  Iet;u1 ; otherwise, the
optimal order quantity is zero. This completes the proof.
þ ED;W;R ½Ṽ tþ1 ðIetþ1 Þ . (8) Under the conditions stated in Corollary 1, the optimal
control policy for the comprehensive inventory model
In (8), the system dynamics are expressed as proposed in Section 2.1 follows the echelon base stock
r tþ1;1 ¼ r t;1 þ It;d0  Dt , policy and has two threshold numbers r t;d0 and r t;u0 in any
given time period t. &
IOetþ1 ¼ Iet;Nðun Þ  Dt ,

and for every i ¼ 1; 2; . . . ; n  1 we have


3. Value of RFID in distribution
Ietþ1;ui ¼ Iet;Nðui Þ  Dt .

Theorem 3. If the shipping cost functions St for t ¼ 1; . . . ; T In order to identify the value of RFID in inventory
are linear and St  ht , then control systems, we study partial RFID deployment
scenarios, in which only some installations of the chain
e t ðIe Þ ¼ V t ðr t;1 Þ þ Gt ðIe ; . . . ; Ie
V e
t t;u1 t;un1 ; IOt Þ. (9) are covered by RFID. As a result, there is a possibility that
ARTICLE IN PRESS
J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136 125

the supplier does not know the location of shipments once If no outstanding shipments appear at installation dk ,
they leave the RFID-enabled installations. We differentiate we set at;k ¼ At;k ¼ 0. We require Rt;0 ¼ 0. The state space
two types of shipments in transit: those with both zst under s RFID-enabled installations in time t is defined
s
location and age information and those with only age as follows. Vector Ist 2 zt if and only if:
information. Note that the age is the number of periods
since the order was shipped out from the supplier at
installation d0 . By comparing the systems with different  IOt  0,
scope of RFID deployments, we are able to analytically  for every i ¼ 1; 2; . . . ; s we have 0  at;i  At;i ,
identify the value of RFID in the system. For simplicity, we  if for any i ¼ 1; 2; . . . ; s it holds that at;i ¼ 0; then
focus on the downstream distribution side, i.e., the At;i ¼ 0,
replenishment lead time is zero.  if for any i ¼ 1; 2; . . . ; s such that at;j 40, then Rt;a 40,
t;i

We study the finite time horizon inventory problem  if for any i ¼ 1; 2; . . . ; s such that At;i 40; then Rt;A 40,
t;i

with T time periods. In this section, two partial RFID  if for every pair (i, j) with 1  ioj  s, it holds: (1)
deployment scenarios are proposed, as shown in Figs. 5 At;i 40; at;j 40 and (2) for every k with iokoj
and 7. Scenario 1 represents the case where the first has at;k ¼ At;k ¼ 0, then we have
s downstream installations are RFID enabled, while in At;i  at;j  1 and Rt;at;k ¼ Rt;At;k ¼ 0.
scenario 2 an additional downstream installation dsþ1 is
deployed with RFID. We assume that the remaining We observe that the inventory at installation di for every
PAt;i
configuration in the two scenarios is identical with the 1  i  s is given by k¼a t;i
Rt;k. Suppose 1  ioj  s. Given
aim to isolate the contribution of RFID. Furthermore, both any two consecutive installations di and dj with positive
time-labeled (age of outstanding shipments) and location- inventory, as shown in Fig. 6, we have 0oat;i  At;i oat;j 
labeled inventory information is included in the two partial At;j and for every l; At;i oloat;j we have Rt;l ¼ 0.
scenarios, while only location inventory information is The main goal in this section is to show that V sþ1 t  V st .
captured in the complete RFID deployment model discussed This clearly shows that by installing RFID at installation
in Section 2. RFID system deployed in the first s installations dsþ1 the system cost is reduced. We call the system with s,
provides information of both types, however, only the time- s+1 RFID enabled installations scenarios 1 and 2, respec-
labeled inventory information within the non-RFID zone is tively. In addition, we call installations ds , dsþ1 the border
used since there the location cannot be captured. in scenarios 1 and 2, respectively. We make the following
assumptions with respect to scenario 1.
3.1. Two partial RFID deployment scenarios
 Transitions moving from non-RFID zone beyond in-
In order to capture ages of outstanding shipments, the stallation ds across the border back into the RFID-
following new notation is required. In the first s installa- enabled network are not allowed.
tions the system dynamics are as in Section 2. Installa-  Random vector W describing transitions in the RFID-
tions dsþ1 ; dsþ2 ; . . . ; dn do not have RFID and thus only age enabled portion is conditioned on random variable J
is captured. Once a shipment leaves installation ds , the describing the non-RFID area. In other words, we first
location and its progress is no longer known, only age is have the observation of random variable J and then the
available. Shipments then arrive randomly based on age as realization of W must be compatible with J in terms of
in Kaplan (1970). the shipment transitions. For example, if a realization
of J requires all shipments of age p to arrive at dn and
qj probability that outstanding shipments, which are j periods old or
more, arrive during the current time period for installation kos we have at;k  p  At;k , then clearly
J random variable with the distribution based on qj W cannot lead shipments at locations di for k  i  s to
Rt;k amount of the outstanding shipments in time t placed k periods a different installation but dn .
ago; we set Rt;k ¼ 0 if such shipments have arrived before time t
At;j age of the ‘‘oldest’’ shipment at installation dj in time t
at;j age of the ‘‘youngest’’ shipment at installation dj in time t
The shipment transitions originating from the RFID-
m(t) maxfAt;1 ; At;2 ; . . . ; At;s g
m0 (t) maxfAt;1 ; At;2 ; . . . ; At;s ; At;sþ1 g; clearly, we have m0 (t)Zm(t) enabled installations depend on the exogenous random
V st the value function with RFID deployed in the first s installations vector W. The random vector W assures location-labeled
Ist state vector in time t with RFID deployed in the first s installations installation inventory information in each time period.
Ist ¼ ðIOt ; It;dn ; at;1 ; . . . ; at;s ; At;1 ; . . . ; At;s ; Rt;1 ; . . . ; Rt;T1 Þ The difference from Section 2 is in the fact that the

RFID-enabled Network non-RFID Zone

It, d1 It, d2 It, ds It, dn


IOt

••• Rt, m+1 • • • Rt, T−1


Xt Yt Dt
d0 d1 d2 ds dn

Fig. 5. Partial RFID implementation in scenario 1.


ARTICLE IN PRESS
126 J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136

8 8
shipments governed by W have to be compatible with J. As > >
> minfat;k þ 1 : Mðdk ; wÞ ¼ di ; d0
>
> >
>
seen in Fig. 8, we first observe a realization j of J. It is >
> >
>  dk  dg1 ðjÞ; Rt;atk 40g; 1  i  s and
>
> >
>
>
> >
<
obvious that all the outstanding shipments with age at >
>
> 1  j  mðtÞ;
>
> astþ1;i ðjÞ ¼
least j must accordingly arrive at installation dn . The >
> >
> minfat;k þ 1 : Mðdk ; wÞ ¼ di ; d0
>
> >
realization of W provides additional information about the >
> >
>
>
> >
>  dk  ds ; Rt;atk 40g; 1  i  s and
>
> >
>
shipment transitions among installations d0 ; d1 ; d2 . The >
< : j4mðtÞ;
top portion of Fig. 8 represents a possible and compatible 8
>
> >
> maxfA t;k þ 1 : Mðd k ; wÞ ¼ di ; d0
shipment transition case, while the bottom portion >
> >
>
>
> >
>  dk  dg1 ðjÞ; Rt;Atk 40g; 1  i  s and
represents a case in which the shipment transitions based >
> >
>
>
> >
<
>
> 1  j  mðtÞ;
on W and J are incompatible. >A
> s
>
> tþ1;i ðjÞ ¼
The system dynamics for scenario 1 are divided into > >
> maxfAt;k þ 1 : Mðdk ; wÞ ¼ di ; d0
>
> >
>
>
> >
>
two groups. Part I shows the transitions of installation >
> >  dk  ds ; Rt;Atk 40g;
>
1  i  s and
>
> >
:
inventories and outstanding shipments, while part II : j4mðtÞ:
demonstrates the age transitions at installations. If j is a (II)
realization of J, they read:

8 s Here, we denote g(j) ¼ arg max{at,i|jZat,i} In (II), if the


> IOtþ1 ¼ IOt þ X t  Y t ; minimum or maximum is over an empty set, we define
>
> 8
>
> > P the corresponding quantity astþ1;i ðjÞ or Astþ1;i ðjÞ to be 0.
> T1
>
> >
> It;dn þ Rt;k  Dt ; 1  at;i  j  At;i  mðtÞ
>
> >
>
>
> >
>
>
> >
>
k¼at;i The interface is defined as the position of the youngest
>
> >
>
>
> >
> and 1  i  s; outstanding shipment which arrives at installation dn at
>
> >
>
>
> >
> P
T1
>
>
>
>
< It;dn þ Rt;k  Dt ; 1  At;i ojoat;i  mðtÞ the end of time t. In Istþ1;dn ðjÞ, astþ1;i ðjÞ, and Astþ1;i ðjÞ we
>
> s
> Itþ1;dn ðjÞ ¼ >
>
>
k¼at;i
distinguish two cases. The first case 1  j  mðtÞ (for
>
> >
> and for every k with 1  iok
>
> >
> Istþ1;dn ðjÞ it actually consists of two sub-cases) corresponds
< >
>
>
> oi0  s we have at;k ¼ At;k ¼ 0;
>
> to the case where the interface is in the RFID-enabled
>
> >
>
>
> >
> P
T1
>
> >
>
> I þ Rt;k  Dt ; j  mðtÞ þ 1; area. Note that mðtÞ is the oldest age in the RFID-enabled
>
>
> : t;dn k¼j
>
> area and j is a realization of J, which implies that all
> s
>
>
> Rtþ1;1 ðjÞ ¼ Y t ;
>
>
>
shipments of age equal to or more than j arrive at dn . It
>
> 8
>
>
> > Rt;k1 ; j4mðtÞ and 2  k  j;
> follows that the shipments arriving at dn at the end of
>
> >
< 0;
> s
> mðtÞojok and k  2; time period t include shipments in the RFID-enabled area
>
> Rtþ1;k ðjÞ ¼ > Rt;k1 ; 2  k  at;g  j  mðtÞ;
>
>
>
>
>
>
>
: and all outstanding shipments in the non-RFID zone
: 0; otherwise when k  2;
because of the non-crossover property. In the other case of
(I) j4mðtÞ, the interface is beyond the RFID-enabled area. The

At, i ≤ at, j −1

Rt, A > 0, At, i > 0 0, 0 0, 0 Rt, At, j > 0, At, j > 0


t, i 0, 0

0, 0 0, 0 0, 0 Rt, a > 0, at, j > 0


t, j

di di+1 dk dj−1 dj

Fig. 6. An illustration of the action space of scenario 1 in time t.

RFID-Enabled Network Non-RFID Zone


It, d1 It, d2 It, ds It, ds+1 It, dn
IOt

••• Rt, m'+1 • • • Rt, T−1


Xt Yt Dt
d0 d1 d2 ds ds+1 dn

Fig. 7. Partial RFID implementation in scenario 2.


ARTICLE IN PRESS
J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136 127

A realization j of J with at, 2 ≤ j ≤ At, 2


Enter Arrival
M (w) for a realization w of W
It, d2

Rt, at, 2Rt, j R


t, At, 2
Yt It, d1 It, d3 It, dn
It, ds
...
Dt

d0 d1 d2 d3 ... ds dn

A realization j of J with at, 2 ≤ j ≤ At, 2


Enter Arrival
M (w) for a realization w of W
It, d2

Rt, at, 2 Rt, j R


t, At, 2
Yt It, d1 It, d3 It, ds It, dn

...
Dt
d0 d1 d2 d3 ... ds dn

Fig. 8. Shipment transition compatibility between W and J.

arriving shipments at installation dn in time period t are In the partial RFID deployment scenario 2, the RFID-
only from the non-RFID zone. We similarly distinguish enabled network is extended to capture the information of
two cases in the remaining equations. In Rstþ1;k ðjÞ for one more downstream installation dsþ1 . It is clear that
j4mðtÞ, all outstanding shipments which are j periods old state vector Isþ1
t in scenario 2 has two more coordinates
sþ1
arrive in time t. However, in the case of j  mðtÞ, asþ1
tþ1;sþ1 and Atþ1;sþ1 . The state transitions in scenario 2 are
outstanding shipments which are at;g ðjÞ old or more arrive also divided into two parts. Part I captures the same
because we have more detailed information from RFID transitions of inventories as in scenario 1, except that we
and shipments are not broken. By definition, gðjÞ describes replace s with s+1 and mðtÞ with m0 ðtÞ in the state
the installation beyond which all outstanding shipments equations for scenario 2. Part II equations of system
arrive during current time period t. dynamics regarding asþ1 tþ1;i
and Asþ1
tþ1;i for i ¼ 1; 2; . . . ; s have
The optimality equation for partial RFID deployment exactly the same transitions as shown in scenario 1 due to
scenario 1 reads the assumption of restricted backward movements from
8 non-RFID area beyond installation dsþ1 to RFID-enabled
< mðtÞ
X area. The additional transitions special to scenario 2
s s
V t ðIt Þ ¼ Min C t ðX t Þ þ St ðY t Þ þ ht ðIOt þ X t  Y t Þ þ pt  qj
X t 0 : regarding installation dsþ1 read
X t 0 j¼1
Y t IOt 8
20 1þ 3 > minfat;k þ 1 : Mðdk ; wÞ ¼ dsþ1 ;
>
>
X
T 1 >
>
 ED;W=J¼j 4@Dt  It;dn  Rt;l A 5 < d0  dk  dg1 ðjÞ; Rt;atk 40g; 1  j  m0 ðtÞ;
asþ1
tþ1;sþ1 ðjÞ ¼
l¼at;k ðjÞ:Mðdk ;wÞ¼dn >
> minfat;k þ 1 : Mðdk ; wÞ ¼ dsþ1 ;
20 1þ 3 >
>
>
: d  d  d ; R 40g;
X
T 1 X
T 1
0 k sþ1 t;atk j4m0 ðtÞ;
þ pt  qj  ED 4@Dt  It;dn  Rt;k A 5 8
j¼mðtÞþ1 > maxfAt;k þ 1 : Mðdk ; wÞ ¼ dsþ1 ;
k¼j >
>
9 >
>
= < d0  dk  dg1 ðjÞ; Rt;Atk 40g; 1  j  m0 ðtÞ;
X
T 1
þ D;W=J¼j
qj  E ½V stþ1 ðIstþ1 Þ . (11) Asþ1
tþ1;sþ1 ðjÞ ¼
; >
> maxfAt;k þ 1 : Mðdk ; wÞ ¼ dsþ1 ;
j¼1
>
>
>
: d  d  d ; R 40g;
0 k sþ1 t;Atk j4m0 ðtÞ:
Notation W/J ¼ j denotes the random variable W condi-
tional on a realization j of J. We accordingly replace s with s+1 and mðtÞ with m0 ðtÞ in
In order for the optimality equation to be well defined, the optimality equation for partial scenario 2.
we need to show the following lemma, which is proved in Shipments moving to installation dsþ1 at the end of
Appendix C. time period t are only from the RFID-enabled area. They
can come from installation dsþ1 itself if the outstanding
s s
Lemma 1. If Ist 2 zt , then Istþ1 2 ztþ1 . shipments at installation dsþ1 in time period t stay put.
ARTICLE IN PRESS
128 J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136

Similarly, as before, we distinguish two cases: j  m0 ðtÞ tions of RFID internally within a company or inventory
and j4m0 ðtÞ. Note that starting with the same outstanding control problems in a multi-firm setting with RFID supply
shipments in time period t in scenarios 1 and 2, the two information. This research is the first one to analytically
systems may possibly end up with different states in time study the inventory control policies with explicit RFID
period t+1. From here on, we denote the state difference information at the distribution side. This is a non-trivial
between scenarios 1 and 2 by using the superscripts s and task since we have to simultaneously deal with two
s+1. For example, astþ1;i denotes the youngest age of actions (replenishment and shipping quantities). Another
outstanding shipments at installation di in time period contribution is, first, modeling a system with only a partial
t+1 corresponding to scenario 1. Likewise, Asþ1
tþ1;i denotes RFID deployment, and, second, comparing the expected
the oldest age of outstanding shipments at installation di cost of the resulting models with respect to the extent of
in time period t+1 corresponding to scenario 2. the RFID deployment. Perhaps the most important con-
tribution concerns the next generation business applica-
3.2. Value of RFID in the serial distribution process tions built on top of RFID data. We show that even by
employing slap-and-ship, it is possible to generate addi-
Intuitively, the broader the RFID deployment is in the tional value. This research is closing the gap between the
distribution network, the greater should the benefits be. If ever increasing supply chain data and challenging analy-
the RFID deployment and maintenance costs are ne- tical tools to process such information. The main con-
glected, we are able to show that additional benefits are tribution of our work is to establish models and policies
obtained by a broader RFID deployment because of for slap-and-ship that benefit suppliers.
availability of additional information. We compare two It is clear that in short-term slap-and-ship provides
partial RFID deployment scenarios, based on identical a quick and relatively low cost solution compared with a
model configurations and assumptions, e.g., the same lead full-scale RFID deployment to achieve compliance with a
time distributions and non-crossover of the outstanding retailer’s mandate. On the other hand, experiences from
shipments in time. slap-and-ship can shape suppliers’ future internal deploy-
The following is our main result. ments and even further upstream, where suppliers can
s
reap all the benefits from RFID. In this work, we show such
Theorem 4. For any Ist 2 zt and ðat;sþ1 ; At;sþ1 Þ, we have possibility by an analytical approach exploiting the vast
V st ðIst Þ  V sþ1 ðIOt ; It;dn ; at;1 ; . . . ; at;s ; at;sþ1 ; At;1 ; . . . ; At;s , richness of RFID data. We first propose a comprehensive
t
inventory model and then evaluate a serial distribution
At;sþ1 ; Rt;1 ; . . . ; Rt;T1 Þ. (12)
process with RFID deployments, which mimics the slap-
and-ship processes of suppliers facing RFID mandates. The
The proof of this result is very technical and is provided inventory control problem in the serial distribution chain
in Appendix D. It clearly states that under optimal policies, is modeled as a dynamic program. Furthermore, the
the total system cost of s+1 RFID deployments is equal to original problem is reduced in size to a simpler model
or lower than the cost of having only s RFID deployments. without losing optimality. Based on this state reduction
In other words, RFID reduces the total inventory cost. A result, the optimal inventory control policy is the echelon
weakness of our result is the fact that the deployment cost base stock policy. It establishes that by knowing the
in not taken into consideration. The significance of the downstream flow of goods through the distribution
cost reduction depends on the RFID deployments. channel the supplier can improve decision making with
respect to inventory control. The proposed comprehensive
4. Concluding remarks inventory model contains both supply and distribution
information in serial systems. It asserts that armed with
After the initial lab experiments and case studies, the entire supply chain status information from using RFID,
real breakthrough of RFID applications came with the suppliers could better manage their internal and external
RFID mandates imposed by Wal-Mart and the US Depart- processes and make integrated decisions that would
ment of Defense. Most of their suppliers are required to improve their bottom line.
apply at least pallet level RFID transponders to the The value of RFID in inventory control systems is also
products being shipped to selected distribution centers. discussed in detail within the studied context. It is usually
The well-known slap-and-ship strategy provides valuable claimed that slap-and-ship is a cost-bearing solution. We
information and benefits to the retailers. However, it is argue that beyond the cost associated with slap-and-ship,
much harder to identify a return on investment for suppliers could indeed find the benefits of RFID deployments
suppliers. We first present a comprehensive inventory downstream. We show analytically how RFID can improve
model and show that the underlying multivariate cost-to- the system performance in terms of the expected overall cost
go decomposes into two lower dimensional functions. over a finite time horizon. The partial RFID deployment
Under certain assumptions, the optimal control policy for scenario with s+1 installations covered by RFID yields lower
both replenishments and shipments is obtained. Further- procurement and shipping costs than the costs based on s
more, we analytically show that larger RFID deployments installations covered by RFID. The cost difference can be
yield reduced overall expected cost. This clearly estab- regarded as the true value of RFID in the system, setting
lishes that there is potential benefit of using RFID if novel aside the RFID system deployment and maintenance costs.
processes are used. There are several important contribu- The most important revelation and message of our
tions of this work. Prior research mainly studies applica- paper is the fact that even by employing slap-and-ship,
ARTICLE IN PRESS
J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136 129

which is a basic deployment, benefits in inventory control We assume that (6) holds for t+1. In other words,
are possible. Such benefits could offset the underlying
costs and thus establish the elusive ROI for an RFID V tþ1 ðItþ1;d Þ ¼ V tþ1 ðIOtþ1 ; r tþ1;1 Þ þ atþ1 ,
deployment. Clearly a positive ROI is not possible by
simply slapping the tag and then shipping. An information where
system with analytical capabilities demonstrated here 0 20 1
must be put together. RFID leaves an enormous trail of d
d
BLX 2 6B j C
data that can be creatively analyzed and used to improve atþ1 ¼ EL B@ ptþjþ1  ED;W 6 B C
4@Dtþ1  Itþ1;dn A:
decision making. The results in Section 3 clearly demon- j¼0

strate that wider RFID deployments bring additional 1þ 3 1


benefits. Firms must carefully leverage deployment costs jþ1
X X C 7C
vs. benefits when deciding the scope of an RFID deploy-  Itþ1;dk C 7C
A 5A
p
p¼1 dk :M ðdk ;WÞ¼dn
ment. We demonstrated that additional benefits are 1kn1
definitely possible with broader deployments.
A drawback of our study is that the actual deployment Based on the system dynamics of the full model, we have
costs are not explicitly captured. We do not claim of showing X X X
a positive ROI, but without the analytical aspects presented Itþ1;dk ¼ It;dg
herein, a positive ROI is definitely not possible under the slap- dk :M p ðdk ;WÞ¼dn dk :M p ðdk ;WÞ¼dn dg :Mðdg ;WÞ¼dk
1kn1 1kn1 0kn1
and-ship strategy. X
¼ It;dg . (13)
Many suppliers to Wal-Mart are struggling with the
dg :Mpþ1 ðdg ;WÞ¼dn
underlying costs of slap-and-ship. Through its power, Wal- 0kn1

Mart is able to dictate the RFID terms, while risking


insolvency of smaller suppliers. Instead of these relentless Next, we manipulate atþ1 . We substitute
pressures, Wal-Mart could more tightly collaborate with X
suppliers by using its tremendous IT resources and knowl- Itþ1;dn ¼ It;dn þ It;dk  Dt
dk :Mðdk ;WÞ¼dn
edge. To this end, it should show the suppliers how to gain 1kn1

benefits from its RFID mandate, and not only incur cost. By
using the presented findings, the big-box retailer could show and use (13) in atþ1 to obtain
the suppliers how to improve inventory management simply 8 20
>
>
by using the feedback data from Wal-Mart; thus not going d
<LX
d
2 6B jþ1 X
atþ1 ¼ EL > ptþjþ1  ED;W 6 B
4@Dt  It;dn  It;dk
deeper into the processes of the suppliers and more complex >
: j¼0 dk :Mðdk ;WÞ¼dn
1kn1
deployments of this pervasive technology. 1þ 39
With the real-time information generated from RFID, >
>
jþ1
X X C 7=
 C 7
It;dg A
many new research directions are possible. This research 5>
>
p¼1 dg :M pþ1
ðdg ;WÞ¼dn ;
addresses a partial RFID deployment issue in order to study 0kn1
8 20
the value of RFID in inventory control. We assume RFID is >
>
<LX
d
d
3 6B jþ1 X
deployed from the supplier downstream. An alternative ¼ EL ptþjþ1  ED;W 6 B
4@Dt  It;dn  It;dk
>
>
setting not addressed here is to start deploying RFID at the : j¼0 dk :Mðdk ;WÞ¼dn
1kn1

point-of-sale and expanding it upward. It would be interest- 1þ 3


jþ1
X X
ing to investigate the system differences between a forward C 7 D;W
 It;dg C 7
A 5 þ ptþLd 1  E
and backward deployment. All partial RFID deployment p¼1 dg :M pþ1 ðdg ;WÞ¼dn
1kn1
scenarios in this work are based on perfect RFID read rates. 20
This immediately raises the question of the impact of 6B Ld 1 X

6 B
4@Dt  It;dn  It;dk
imperfect RFID read rates on system performance. dk :Mðdk ;WÞ¼dn
1kn1
1þ 39
>
>
C 7=
d
LX 1 X
Acknowledgments  It;dg  It;d0 C 7
A 5>
p¼1 dg :M pþ1 ðdg ;WÞ¼dn >
;
1kn1
8 20
We acknowledge two anonymous reviewers for pro- >
>
<LX
d
d
2 6B i X
viding valuable feedbacks. Their comments and sugges- ¼E L
ptþi  E D;W 6B
4@Dt  It;dn  It;dk
>
>
tions refine many subtle points of the research framework. : i¼1 dk :Mðdk ;WÞ¼dn
1kn1

In addition, we are obliged to the Illinois Department of 1þ 3

Transportation for their financial support. Without it, this X


iþ1 X C 7 D;W
 It;dg C 7
A 5 þ ptþLd 1  E
work would not see the light. q¼2 dg :M q ðdg ;WÞ¼dn
1kn1
20

Appendix A 6B Ld 1 X

6 B
4@Dt  It;dn  It;dk
dk :Mðdk ;WÞ¼dn
1kn1
1 þ 39
Proof of Theorem 1. We use induction. We define >
>
C 7=
d
X
L X
aTþ1 ¼ 0. Since all the terminal costs are zero, we clearly  It;dg  It;d0 C
A 5>
7
q¼2 dg :M q ðdg ;WÞ¼dn >
;
have V Tþ1 ¼ V Tþ1 þ aTþ1 ¼ 0. 1kn1
ARTICLE IN PRESS
130 J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136

8 20 1þ 3
d
>
>
<LX
d
2 6B i X
iþ1 X C 7 We have
¼ EL > ptþi  ED;W 6B
4@Dt  It;dn  It;dg C 7
A 5
>
: i¼1 q¼1 dg :M q ðdg ;WÞ¼dn 8 20 1þ 3
1kn1

1þ 39
>
>
20 < 6B X C 7
> D;W 6B
6B Ld 1 X
L d
X C 7=
> V t ðIt;d Þ ¼ Min bt þ p t  E 4@Dt  It;dn  It;dk C 7
A 5
It;u0 0 >
>
þptþLd 1  ED;W 6 B
4@Dt  It;dn  It;dg  It;d0 C 7 .
A 5> It;d 0 :
dk :Mðdk ;WÞ¼dn
q¼1 dg :M q ðdg ;WÞ¼dn >
; 0 1kn1
It;d IOt
1kn1 0
9
>
>
In atþ1 above, the summation over j is decomposed into =
two groups: from 0 to Ld 3 and j ¼ Ld2. Moreover, the þ V tþ1 ðItþ1;d Þ (15)
>
>
;
non-crossover property is applied for j ¼ Ld2 as follows.
Term It;d0 can be taken out and term
8 20 1þ 3
X >
>
<
6B X C 7
It;dg ¼ Min bt þ pt  ED;W 6B It;dk ÞC 7
d It;u0 0 > 4@Dt  It;dn  A 5
dg :M L ðdg ;WÞ¼dn >
I t;d 0 :
dk :Mðdk ;WÞ¼dn
1gn1 0 1kn1
I t;d IOt
0
9
>
>
can be folded into the summation term =
þ V tþ1 ðIOtþ1 ; r tþ1;1 Þ þ atþ1 (16)
>
>
d ;
X
L X
It;dg
q¼1 dg :Mq ðdg ;WÞ¼dn n d d
1gn1
¼ Min bt þ EL ðptþLd 1  ED ½ðDLt 1
 It;d0  r t1 Þþ Þ
It;u0 0
I t;d 0
0
d d
because of M L ðdk ; WÞ  ML ðd0 ; WÞ ¼ dn for every k  1.
I t;d IOt
0
d d
þ V tþ1 ðIOtþ1 ; r tþ1;1 Þ þ atþ1  EL ðptþLd 1  ED ½ðDtL 1  It;d0
20 1þ 39
>
>
6B X C 7=
In order to establish the result, we analyze atþ1  at : We  r t1 Þþ Þ þ pt  ED;W 64@
BDt  It;d  I t;d
C 7
kA 5
n
>
>
have dk :Mðdk ;WÞ¼dn ;
1kn1
n d d

atþ1  at
¼ Min V t ðIOt ; rt1 Þ þ atþ1  EL ðptþLd 1 ED ½ðDLt 1  It;d0
It;u0 0
8 20 1þ 39 I t;d 0
0
>
> >
> I t;d IOt
<LX C 7=
d
d
2 6B i X
iþ1 X 0
¼ EL ptþi  ED;W 6 B
4@Dt  It;dn  It;dg C 7
A 5>
20 1þ 39
>
> > >
>
: i¼1 q¼1 dg :M q ðdg ;WÞ¼dn ;
1kn1 6B X C 7=
8 20 1þ 39  r t1 Þþ Þpt ED;W 6B
4@Dt  It;dn  It;dk C 7
A 5>
>
> >
> dk :Mðdk ;WÞ¼dn >
;
d
L
<
D;W 6B
6B Ld 1 Ld
X X C 7= 1kn1
þE ptþLd 1  E 4@Dt  It;dn  It;dg  It;d0 C 7
A 5>
>
> >
: q¼1 dg :M q ðdg ;WÞ¼dn ; (17)
1kn1
8 20 1þ 39
>
> >
> n
<LX C 7=
d
2 jþ1
X X
6B j d d
¼ Min V t ðIOt ; rt1 Þ þ at þ atþ1  at  EL ðptþLd 1 ED ½ðDLt
d 1
 EL ptþj  ED;W 6 B
4@Dt  It;dn  It;dk C 7
A 5>
>
> > It;u0 0
: j¼0 p
p¼1 dk :M ðdk ;WÞ¼dn ; It;d 0
1kn1 0
8 20 1þ 39 It;d IOt
0
>
> >
> 20 1þ 39
< C 7=
d
6 B XL X
d
¼ EL ptþLd 1  ED;W 6
d
B L 1  It;d  It;dg  It;d0 C 7 >
>
> 4@Dt n A 5> 6B X C 7=
> >
: q¼1 dg :M q ðdg ;WÞ¼dn ;
1kn1
 It;d0  r t1 Þþ Þ þ pt ED;W 6B
4@Dt  It;dn  It;dk C 7
A 5>
20 1þ 3 dk :Mðdk ;WÞ¼dn >
;
1kn1

6B X C 7
 pt  ED;W 6 B
4@Dt  It;dn  It;dk C 7
A 5. (14) ¼ V t ðIOt ; rt1 Þ þ at . (18)
dk :Mðdk ;WÞ¼dn
1kn1

Eq. (15) is the optimality equation of the distribution


process. In (16) we use the induction hypothesis. The
In (14), the penalty cost terms from t+1 to t+Ld2 cancel
optimality Eq. (3) of the reduced model is applied in (17).
out. We end up with two terms for time period t and
In (18) we use the derived result for atþ1  at and the
t þ Ld  1.
observation
d
It is clear that X
l X
It;dn þ It;dg ¼ r t;1
q
q¼1 dg :M ðdg ;wÞ¼dn
d
X
l X X
n1
1gn1
It;dn þ It;dg ¼ It;dn þ It;dj ¼ r t;1
q¼1 dg :M q ðdg ;wÞ¼dn
1gn1
j¼1 for each realization ld of Ld and w of W. After simplifying
the remaining terms and pulling term at out of minimiza-
d
for every realization l of Ld and w of W. We are now ready tion because it is independent of the decision variables
to show the induction step starting from (2). For ease of It;u0 and It;d0 ; we conclude that V t ðIt;d Þ ¼ V t ðIOt ; r t1 Þ þ at :
notation, let bt ¼ C t ðIt;u0 Þ þ St ðIt;d0 Þ þ ht ðIOt þ It;u0  It;d0 Þ. This completes the proof. &
ARTICLE IN PRESS
J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136 131

Appendix B
ðIetþ1;u1 ; . . . ; Ietþ1;un1 ; IOetþ1 Þg þ St  ðIOet  r t;1 Þ  ht  IOet
d d
þ EL ðptþLd 1  ED ½ðDLt 1
 IOet Þþ Þ þ ED ½V tþ1 ðr tþ1;1 Þ
d d

Proof of Theorem 3. We prove the statement by induc-  St  ðr t;d0  r t;1 Þ þ ht  r t;d0  EL ðptþLd 1  ED ½ðDLt 1

tion. It is straightforward to show the theorem for T+1. We  r t;d0 Þþ Þ  ED ½V tþ1 ðr tþ1;1 Þ
assume that (9) holds for t+1, i.e., ¼ Min fC t ðIt;u0 Þ þ ht  ER ðIet;Nðun Þ Þ þ yt ðIOet Þ þ ER
It;u0 0
e tþ1 ðIe Þ ¼ V tþ1 ðr tþ1;1 Þ þ Gtþ1 ðIe e e
V tþ1 tþ1;u1 ; . . . ; I tþ1;un1 ; IOtþ1 Þ.
½Gtþ1 ðIetþ1;u1 ; . . . ; Ietþ1;un1 ; IOetþ1 Þg,
d d
By examining the downstream sub-system, standard where yt ðIOet Þ ¼ ðht  St Þðr t;d0  IOet Þ þ EL ðptþLd 1  ED ½ðDLt 1
d
arguments are applicable showing that V t ’s are all convex. IOet Þþ  ðDLt 1  r t;d0 Þþ Þ is the penalty term correspond-
The base stock levels ing to the shortage of on-hand inventory for an optimal
shipment.
d d
r t;d0 ¼ arg minfðSt  ht Þr t;d0 þ EL ðptþLd 1 ED ½ðDLt 1
 r t;d0 Þþ Þ As a result, we have
r t;d0 0
e t ðIe Þ  V t ðr t;1 Þ ¼ Gt ðIe ; . . . ; Ie
V e
t;un1 ; IOt Þ
þ ED ½V tþ1 ðr t;d0  Dt Þg t t;u1

¼ Min fC t ðIt;u0 Þ þ ht  ER ðIet;Nðun Þ Þ þ yt ðIOet Þ


It;u0 0
are used to determine the optimal shipping decisions to
the distribution process. In other words, if rt;1 or t;d0 , the þ ER ½Gtþ1 ðIetþ1;u1 ; . . . ; Ietþ1;un1 ; IOetþ1 Þg, (19)
optimal shipping quantity in time t is r t;d0  rt;1 ; other-
where the penalty term reads
wise, the optimal shipping quantity is zero. In order to
8
show (9), we need to distinguish two cases. > 0; r t;d0 oIOet ;
>
>
Case I: Let first r t;d0 oIOet : We have < e Ld D
e
yt ðIOt Þ ¼ ðht  St Þðrt;d0  IOt Þ þ E ðptþLd 1  E
>
>
> d d
:
½ðDL 1  IOe Þþ  ðDL 1  r Þþ Þ;
e t ðIe Þ ¼ Min fC t ðIt;u Þ þ St  ðrt;d  rt;1 Þ þ ht  ER ðIe
V t 0 0 t;Nðun Þ  r t;d0 Þ t t t t;d0 r t;d0  IOet ;
It;u0 0
r t;d r t;1
0
r t;d IOe
0 t
This completes the proof of Theorem 3. &
d d
þ EL ðptþLd 1  ED ½ðDLt 1 e tþ1 ðIe Þg
 r t;d0 Þþ Þ þ ED;W;R ½V tþ1

¼ Min fC t ðIt;u0 Þ þ ht  ER ðIet;Nðun Þ Þ þ ER


It;u0 0 Appendix C

½Gtþ1 ðIetþ1;u1 ; . . . ; Ietþ1;un1 ; IOetþ1 Þg þ St  ðr t;d0  r t;1 Þ  ht
d d
 r t;d0 þ EL ðptþLd 1  ED ½ðDLt 1
 r t;d0 Þþ Þ þ V tþ1 ðr tþ1;1 Þ. Proof of Lemma 1. We need to show that if Ist 2 zt , then
s
s
Istþ1 2 ztþ1 . First, we consider non-negativity require-
It implies that ments. It is clear from system dynamics that IOstþ1 ¼
IOst þ X t  Y t  0 because X t  0, Y t  0 and Y t  IOst . Non-
e t ðIe Þ  V t ðr t;1 Þ ¼ Min fC t ðIt;u Þ þ ht  ER ðIe
V R
t 0 t;Nðun Þ Þ þ E negativity of other components follows by definition and
It;u0 0
from system dynamics.

½Gtþ1 ðIetþ1;u1 ; . . . ; Ietþ1;un1 ; IOetþ1 Þg.
If Rt;at;k 40 for a k, then at;k 40 (otherwise at;k ¼ At;k ¼ 0,
Case II : Let now r t;d0  IOet : It is clear that the optimal which implies Rt;at;k ¼ 0). In turn we have At;k 40 and thus
shipping decision satisfies r t;d0 ¼ IOet because of the Rt;At;k 40. System dynamics imply that for every j
convexity of function St  ðr t;d0  r t;1 Þ  ht  r t;d0 þ 0  astþ1;i ðjÞ  Astþ1;i ðjÞ.
d d
EL ðptþLd 1  ED ½ðDLt 1  r t;d0 Þþ Þ and V tþ1 in rt;d0 . Finally, If astþ1;i ðjÞ ¼ 0, then the underlying set defining the
we derive that quantity is |. The underlying set defining Astþ1;i ðjÞ is also
empty, which in turn implies Astþ1;i ðjÞ ¼ 0.
n
e t ðIe Þ ¼ Min
V t C t ðIt;u0 Þ þ St  ðr t;d0  r t;1 Þ þ ht  ER ðIet;Nðun Þ  r t;d0 Þ If astþ1;i ðjÞ40, then we have Rt;at;k 40 for some 1  k  s
It;u0 0
r t;d r t;1
0
and astþ1;i ðjÞ ¼ at;k þ 1: Since astþ1;i ðjÞ40, we obtain that j in
rt;d IOe
0 t
o time period t must be 4at;k . Then either j4mðtÞ or
d d
e tþ1 ðIe Þ
þEL ðptþLd 1  ED ½ðDLt 1  r t;d0 Þþ Þ þ ED;W;R ½V at;k oj  mðtÞ. System dynamics imply in both cases that
tþ1
n Rstþ1;as ðjÞ ¼ Rt;at;k 40. The same argument applies to the
¼ Min C t ðIt;u0 Þ þ ht  ER ðIet;Nðun Þ Þ þ ER ½Gtþ1 tþ1;i
It;u0 0 case Astþ1;i ðjÞ40 implying Rstþ1;As ðjÞ 40.
 io tþ1;i


Ietþ1;u1 ; . . . ; Ietþ1;un1 ; IOetþ1 þ St  ðIOet  r t;1 Þ  ht  IOet It remains to show that if for 1  i0 oj0  s such that
Astþ1;i0 40; astþ1;j0 40 and for every i0 ok oj0 we have
0
d d
þ EL ðptþLd 1  ED ½ðDLt 1
 IOet Þþ Þ þ V tþ1 ðr tþ1;1 Þ. s s
atþ1;k0 ¼ Atþ1;k0 ¼ 0, then we have Atþ1;i0  astþ1;j0  1: A
s

It implies that possible scenario of the order transitions from time period
t to t+1 is shown in Fig. 9. Outstanding orders in the
e t ðIe Þ  V t ðr t;1 Þ
V installation range [u,v] in time period t move to installa-
t

¼ Min fC t ðIt;u0 Þ þ ht  ER ðIet;Nðun Þ Þ þ ER ½Gtþ1 tion i0 in time period t+1. Similarly, outstanding orders
It;u0 0
in [u0 ,v0 ] move to installation j0 in time period t+1.
ARTICLE IN PRESS
132 J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136

The light-shaded installations correspond to installations Rstþ1;k ðjÞ ¼ 0 and Rsþ1 tþ1;k ðjÞ ¼ 0; which also implies
with no inventory in time period t. Installations ei and i are Rstþ1;k ðjÞ ¼ Rsþ1
tþ1;k ðjÞ.
the two farthest installations with positive inventory (2) Let mðtÞoj  m0 ðtÞ and k  2. For
within [u,v], i.e., inventory in installations within ½ei; i is 0, mðtÞoat;g  k  j  m0 ðtÞ, we have Rstþ1;k ðjÞ ¼ Rst;k1 ðjÞ
and Rsþ1 s
tþ1;k ðjÞ ¼ 0; which implies Rtþ1;k ðjÞ  Rtþ1;k ðjÞ.
sþ1
while j and ej are two such installations within [u0 ,v0 ]. As
Otherwise, we clearly have Rstþ1;k ðjÞ ¼ Rsþ1 tþ1;k ðjÞ.
can be easily verified by the non-crossover assumption,
(3) Finally, let 1  j  mðtÞ and k  2: For k  at;g  j 
the dark-shaded area represents installations with no mðtÞ  m0 ðtÞ; we have Rstþ1;k ðjÞ ¼ Rst;k1 ðjÞ and Rsþ1 tþ1;k ðjÞ ¼
outstanding orders in time period t. Formally, we obtain Rst;k1 ðjÞ; which implies Rstþ1;k ðjÞ ¼ Rsþ1 tþ1;k ðjÞ: Otherwise,
Astþ1;i0 ¼ At;i þ 1 and astþ1;j0 ¼ at;j þ 1: From At;i  at;j  1, we we have Rstþ1;k ðjÞ ¼ 0 and Rsþ1 tþ1;k ðjÞ ¼ 0, which again
then obtain Astþ1;i0  astþ1;j0  1. implies Rstþ1;k ðjÞ ¼ Rsþ1 tþ1;k ðjÞ. &
In conclusion, the presented dynamic program is well-
defined. This completes the proof of Lemma 1. & We also observe that Rstþ1;1 ðjÞ ¼ Rsþ1
tþ1;1 ðjÞ ¼ Y t : Thus, we
conclude that for every k ¼ f1; 2; . . . ; T  1g we have
Rstþ1;k  Rsþ1
tþ1;k .
Appendix D
Next, let us show Istþ1;dn  Isþ1
tþ1;dn . We similarly distin-
guish cases as follows.
In order to show Theorem 4, we need the following
lemma.
(1) Let first 1  at;i  j  At;i  mðtÞ and 1  i  s: By using
Lemma 2. For simplicity, we denote the state transitions in scenarios 1 and 2, we have

V sþ1 sþ1 sþ1 sþ1 sþ1 sþ1 sþ1 sþ1 sþ1 X


T 1
tþ1 ðItþ1;dn ; Rtþ1 Þ ¼ E½V tþ1 ðIOtþ1 ; Itþ1;dn ; atþ1;1 ; . . . ; atþ1;sþ1 ; Atþ1;1 , Istþ1;dn ðjÞ ¼ Isþ1
tþ1;dn ðjÞ ¼ It;dn þ Rt;k  Dt .
. . . ; Asþ1 sþ1 sþ1
tþ1;sþ1 ; Rtþ1;1 ; . . . ; Rtþ1;T1 Þ,
k¼at;i

where the state variables are derived from the recursion in


scenario 2, and (2) Let 1  At;i ojoat;i0  mðtÞ. For every g such that 1 
iogoi0  s and at;dg ¼ At;dg ¼ 0; we have
sþ1
V sþ1 s sþ1
tþ1 ðItþ1 ; atþ1;sþ1 ; Atþ1;sþ1 Þ
s s
X
T 1
¼ E½V sþ1 s s s sþ1
tþ1 ðIOtþ1 ; Itþ1;dn ; atþ1;1 ; . . . ; atþ1;s ; atþ1;sþ1 ; Atþ1;1 ; . . . , Istþ1;dn ðjÞ ¼ Isþ1
tþ1;dn ðjÞ ¼ It;dn þ Rt;k  Dt .
k¼at;i0
Astþ1;s ; Asþ1 s s
tþ1;sþ1 ; Rtþ1;1 ; . . . ; Rtþ1;T1 Þ,
s
where state variable Istþ1 2 ztþ1 is derived from the recursion
(3) Let now mðtÞoj  m0 ðtÞ. We have
in scenario 1. If Istþ1;dn  Isþ1 tþ1;dn , then for every k ¼
f1; 2; . . . ; T  1g we have Rstþ1;k  Rsþ1
tþ1;k , X
T 1
Istþ1;dn ðjÞ ¼ It;dn þ Rt;k  Dt ,
X
T1 X
T1 k¼j
Istþ1;dn þ Rstþ1;k ¼ Isþ1
tþ1;dn þ Rsþ1
tþ1;k
k¼1 k¼1

and X
T1
Isþ1
tþ1;dn ðjÞ ¼ It;dn þ Rt;k  Dt .
sþ1
V sþ1 s sþ1 sþ1 sþ1 sþ1
tþ1 ðItþ1 ; atþ1;sþ1 ; Atþ1;sþ1 Þ  V tþ1 ðI tþ1;dn ; Rtþ1 Þ. (20) k¼mðtÞþ1

Proof. Let us first show that for every k ¼ f1; 2; . . . ; T  1g


we have Rstþ1;k  Rsþ1 (4) Finally, let j4m0 ðtÞ. We have
tþ1;k . We distinguish three cases.

X
T 1
(1) Let j4m0 ðtÞ and k  2: Following the state transitions Istþ1;dn ðjÞ ¼ Isþ1
tþ1;dn ðjÞ ¼ It;dn þ Rt;k  Dt .
in partial scenarios 1 and 2, for j4m0 ðtÞ and k  j, we k¼j
have Rstþ1;k ðjÞ ¼ Rt;k1 and Rsþ1tþ1;k ðjÞ ¼ Rt;k1 ; which im-
plies Rstþ1;k ðjÞ ¼ Rsþ1
tþ1;k ðjÞ: If m0 ðtÞojok; we have Therefore, we obtain Istþ1;dn ðjÞ  Isþ1
tþ1;dn ðjÞ because

X
T 1 X
T 1
Rt;k  Rt;k .
~ k¼j k¼mðtÞþ1
~ j j
i i
t: Now, we show
u v u' v' Installations
X
T 1 X
T 1
Istþ1;dn þ Rstþ1;k ¼ Isþ1
tþ1;dn þ Rsþ1
tþ1;k .
k¼1 k¼1

t+1: We first investigate


i’ j’ Installations
X
T 1
Istþ1;dn þ Rstþ1;k
Fig. 9. Graphical representation of order transitions name. k¼1
ARTICLE IN PRESS
J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136 133

and distinguish two cases. It follows that


(1) Let 1  j  mðtÞ and g ¼ arg maxi fat;i jj  at;i ;
X
T1 X
T1
d1  di  ds g. By state transitions in scenario 1 we have Istþ1;dn þ Rstþ1;k ¼ Isþ1
tþ1;dn þ Rsþ1
tþ1;k ¼ It;dn
k¼1 k¼1
X
T 1 at;g
X X
T 1 aX
t;g 1
X
T 1
Rstþ1;k ðjÞ ¼ Rstþ1;k ðjÞ þ Rstþ1;k ðjÞ ¼ Rt;p . þ Rt;k  Dt þ Y t .
k¼2 k¼2 k¼at;g þ1 p¼1 k¼1

Let e ¼ minfd : Mðd; WÞ ¼ dn ; d1  d  ds g and f ¼ Next, we argue that if Istþ1;dn  Isþ1 s sþ1
tþ1;dn , Rtþ1;k  Rtþ1;k and

maxfd : Mðd; WÞ ¼ dn ; d1  d  ds g: Let also B be the subset X


T 1 X
T 1
of fe; e þ 1; . . . ; f g such that for every db 2 B we have Istþ1;dn þ Rstþ1;k ¼ Isþ1
tþ1;dn þ Rsþ1
tþ1;k ,
k¼1 k¼1
Rt;at;b 40 and for every db 2 fe; e þ 1; . . . ; f g\B we have
Rt;at;b ¼ Rt;At;b ¼ 0: We also denote db1 ¼ minfdb : db 2 Bg then
and db2 ¼ maxfdb : db 2 Bg: We have at;b1 ¼ at;g and mðtÞ ¼
Istþ2;dn  Isþ1
tþ2;dn ; Rstþ2;k  Rsþ1
maxb2B fAt;b g ¼ At;b2 : In addition, Rstþ1;1 ðjÞ ¼ Y t . Adding tþ2;k
P
Istþ1;dn ðjÞ and T1 s
k¼1 Rtþ1;k ðjÞ, we obtain and
0 1
X
T1 At;b2
X X
T1 X
T 1 X
T 1
Istþ1;dn ðjÞ þ Rstþ1;k ðjÞ ¼ @It;dn þ Rt;p þ Rt;k  Dt A Istþ2;dn þ Rstþ2;k ¼ Isþ1
tþ2;dn þ Rsþ1
tþ2;k
k¼1 p¼at;b k¼mðtÞþ1 k¼1 k¼1
1
!
X
T1
We note that from time period t+1 to time period t+2 the
þ Yt þ Rstþ1;k ðjÞ
k¼2 system follows the recursions in scenario 2. It is clear
At;b2
X X
T 1 that if Rstþ1;k  Rsþ1 tþ1;k for every k ¼ f1; 2; . . . ; T  1g; then
¼ It;dn þ Rt;p þ Rt;k Rstþ2;k  Rsþ1 s sþ1
tþ2;k . We next show I tþ2;dn  I tþ2;dn by distin-
p¼at;b1 k¼mðtÞþ1
guishing two cases.
aX
t;g 1

 Dt þ Y t þ Rt;p
(1) Let j  m0 ðt þ 1Þ: We note that for every k ¼
p¼1 f1; 2; . . . ; sg; it holds astþ1;k ¼ asþ1
tþ1;k
and Astþ1;k ¼ Asþ1tþ1;k . By
mðtÞ
X X
T1 state transitions in scenario 2, we obtain
¼ It;dn þ Rt;p þ Rt;k  Dt þ Y t
p¼1 k¼mðtÞþ1 X
T 1

X
T1 Istþ2;dn ðjÞ ¼ Istþ1;dn þ Rstþ1;l  Dtþ1 ,
¼ It;dn þ Rt;k  Dt þ Y t . l¼astþ1;k ðjÞ:Mðdk ;wÞ¼dn
k¼1

X
T 1
(2) Let now j4mðtÞ: We have Istþ1;dn ðjÞ ¼ It;dn þ Isþ1 sþ1
Rsþ1
PT1 tþ2;dn ðjÞ ¼ I tþ1;dn þ tþ1;l  Dtþ1 .
k¼j Rt;k  Dt ;Rstþ1;1 ðjÞ ¼ Y t ; and l¼asþ1 ðjÞ:Mðdk ;wÞ¼dn
tþ1;k

X
T 1 j
X j1
X By using Rstþ1;k  Rsþ1
tþ1;k for every k ¼ f1; 2; . . . ; T  1g and
Rstþ1;k ðjÞ ¼ Rstþ1;k ðjÞ ¼ Rt;p .
k¼2 k¼2 p¼1 X
T 1 X
T 1
Istþ1;dn þ Rstþ1;k ¼ Isþ1
tþ1;dn þ Rsþ1
tþ1;k ,
PT1
Adding Istþ1;dn ðjÞ and s
k¼1 Rtþ1;k ðjÞ, we have
k¼1 k¼1

X
T1 X
T1 X
T1 it follows that Istþ2;dn ðjÞ  Isþ1
tþ2;dn ðjÞ.
Istþ1;dn ðjÞ þ Rstþ1;k ðjÞ ¼ It;dn þ Rt;k  Dt þ Y t þ Rtþ1;k ðjÞ (2) Let j4m0 ðt þ 1Þ. It is clear that
k¼1 k¼j k¼2

X
T1 j1
X X
T 1 X
T 1

¼ It;dn þ Rt;k  Dt þ Y t þ Rt;p Istþ1;dn þ Rstþ1;k  Isþ1


tþ1;dn þ Rsþ1
tþ1;k
p¼1
k¼j k¼j
k¼j

X
T1
by using Rstþ1;k  Rsþ1
¼ It;dn þ Rt;k  Dt þ Y t . tþ1;k and

k¼1
X
T 1 X
T 1
Istþ1;dn þ Rstþ1;k ¼ Isþ1
tþ1;dn þ Rsþ1
tþ1;k .
We conclude that in both cases k¼1 k¼1

X
T 1 X
T 1 Thus, we obtain Istþ2;dn ðjÞ  Isþ1
tþ2;dn ðjÞ for every j.
Istþ1;dn þ Rstþ1;k ¼ It;dn þ Rt;k  Dt þ Y t . It is clear that
k¼1 k¼1
X
T 1 X
T 1
By using almost identical steps as those shown above it Istþ2;dn þ Rstþ2;k ¼ Istþ1;dn þ Rstþ1;k  Dtþ1 þ Y tþ1 ,
can be derived that k¼1 k¼1

X
T 1 X
T 1 X
T 1 X
T 1
Isþ1
tþ1;dn þ Rsþ1
tþ1;k ¼ It;dn þ Rt;k  Dt þ Y t . Isþ1
tþ2;dn þ Rsþ1 sþ1
tþ2;k ¼ Itþ1;dn þ Rsþ1
tþ1;k  Dtþ1 þ Y tþ1 .
k¼1 k¼1 k¼1 k¼1
ARTICLE IN PRESS
134 J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136

We obtain Proof of Theorem 4. We take a closer look at the current


one-period cost in time period t in scenarios 1 and 2. For
X
T 1 X
T 1
Istþ2;dn þ Rstþ2;k ¼ Isþ1 Rsþ1 ease of notation, we denote
tþ2;dn þ tþ2;k
k¼1 k¼1
b sþ1 ¼ C t ðX t Þ þ St ðY t Þ þ ht ðIOt þ X t  Y t Þ
C t
since 0
20 1þ 3
m
X ðtÞ X
T 1
D;W=J¼j 4@
X
T 1 X
T 1 þ pt  qj  E Dt  It;dn  Rt;l A 5
Istþ1;dn þ Rstþ1;k ¼ Isþ1
tþ1;dn þ Rsþ1
tþ1;k .
j¼1 l¼at;k ðjÞ:Mðdk ;wÞ¼dn
k¼1 k¼1
20 1þ 3
X
T 1 X
T 1

Now, we are ready to prove the last part of the lemma þ pt  qj  ED 4@Dt  It;dn  Rt;k A 5,
j¼m0 ðtÞþ1 k¼j
by induction. If Istþ2;dn  Isþ1 s sþ1
tþ2;dn , and Rtþ2;k  Rtþ2;k for every
k ¼ f1; 2; . . . ; T  1g, we assume that the lemma holds for
sþ1
b s ¼ C t ðX t Þ þ St ðY t Þ þ ht ðIOt þ X t  Y t Þ
C
t+2, i.e., V sþ1 sþ1 sþ1 sþ1 sþ1 sþ1
tþ2 ðI tþ2 ; atþ2;sþ1 ; Atþ2;sþ1 Þ  V tþ2 ðI tþ2;dn ; Rtþ2 Þ. The
t
20 1þ 3
sþ1
state variables in V sþ1 ðI sþ1 sþ1
; a ; A Þ evolve from mðtÞ
X D;W=J¼j 4@
X
T 1
tþ2 tþ2
sþ1
tþ2;sþ1 tþ2;sþ1 þ pt  qj  E Dt  It;dn  Rt;l A 5
values of ðIstþ1 ; asþ1 tþ1;sþ1 ; A tþ1;sþ1 Þ, while variables in j¼1 l¼at;k ðjÞ:Mðdk ;wÞ¼dn
V sþ1 ðI sþ1
; R sþ1
Þ transition from values of ðI sþ1
; Rsþ1 20 1þ 3
tþ2 tþ2;dn tþ2 tþ1;dn tþ1 Þ. X
T 1 X
T 1
D 4@
For ease of notation, we define þ pt  qj  E Dt  It;dn  Rt;k A 5.
j¼mðtÞþ1 k¼j
LHS ¼ C tþ1 ðX tþ1 Þ þ Stþ1 ðY tþ1 Þ þ htþ1 ðIOtþ1 þ X tþ1  Y tþ1 Þ þ ptþ1 s
20 1þ 3 Quantity C b denotes the one-period cost in scenario 1
0
mX sþ1 t
ðtþ1Þ X
T 1
b
 qj  E D;W=J¼j 4@
Dtþ1  Istþ1;dn  Rstþ1;l A 5 and C t denotes the one-period cost in scenario 2. We
j¼1 l¼astþ1;k ðjÞ:Mðdk ;wÞ¼dn first show that
20 1þ 3
X
T 1 X
T 1
þ ptþ1  qj  ED 4@Dtþ1  Istþ1;dn  Rstþ1;k A 5, bs  C
C b sþ1 . (22)
t t
j¼m0 ðtþ1Þþ1 k¼j
We start by showing
RHS ¼ C tþ1 ðX tþ1 Þ þ Stþ1 ðY tþ1 Þ þ htþ1 ðIOtþ1 þ X tþ1  Y tþ1 Þ þ ptþ1 20 1þ 3
m0 ðtÞ
20 1þ 3 X D 4@
X
T 1
mX0
ðtþ1Þ X
T1 qj  pt  E Dt  It;dn  Rt;k A 5
D;W=J¼j 6B sþ1 sþ1 C 7
 qj  E 4@Dtþ1  Itþ1;dn  Rtþ1;l A 5 j¼mðtÞþ1 k¼j
j¼1 l¼asþ1
tþ1;k
ðjÞ:Mðdk ;wÞ¼dn 20 1þ 3
0
20 1þ 3 m
X ðtÞ X
T 1
D 4@
X
T 1 X
T 1  qj  pt  E Dt  It;dn  Rt;k A 5. (23)
þ ptþ1  qj  ED 4@Dtþ1  Isþ1
tþ1;dn  Rsþ1
tþ1;k
A 5.
j¼mðtÞþ1 k¼mðtÞþ1
j¼m0 ðtþ1Þþ1 k¼j

To show (23), we distinguish three cases.


Recall that for j  m0 ðt þ 1Þ; we have
X
T1 X
T1
(1) Let first m0 ðtÞ ¼ mðtÞ. Then it follows:
Istþ1;dn  Rstþ1;l  Isþ1
tþ1;dn  Rsþ1
tþ1;l
l¼astþ1;k ðjÞ:Mðdk ;wÞ¼dn l¼asþ1 ðjÞ:Mðdk ;wÞ¼dn
20 1þ 3
0
tþ1;k m
X ðtÞ X
T 1
qj  pt  ED 4@Dt  It;dn  Rt;k A 5
and for j4m0 ðt þ 1Þ it holds j¼mðtÞþ1 k¼j
20 1þ 3
0
X
T1 X
T1 m
X ðtÞ X
T 1
D 4@
Istþ1;dn þ Rstþ1;k  Isþ1
tþ1;dn þ Rsþ1
tþ1;k .
¼ qj  pt  E Dt  It;dn  Rt;k A 5 ¼ 0.
k¼j k¼j j¼mðtÞþ1 k¼mðtÞþ1

Thus, we have LHS  RHS. Finally, we obtain


(2) Next let m0 ðtÞ ¼ mðtÞ þ 1. We have
sþ1
V sþ1 s sþ1
tþ1 ðItþ1 ; atþ1;sþ1 ; Atþ1;sþ1 Þ 20 1þ 3
0
s s m
X ðtÞ X
T 1
¼ E½V sþ1 s s s sþ1
tþ1 ðIOtþ1 ; Itþ1;dn ; atþ1;1 ; . . . ; atþ1;s ; atþ1;sþ1 ; Atþ1;1 ; . . . , qj  pt  ED 4@
Dt  It;dn  Rt;k A 5
Astþ1;s ; Asþ1 s s
tþ1;sþ1 ; Rtþ1;1 ; . . . ; Rtþ1;T1 Þ
j¼mðtÞþ1 k¼j
20 1þ 3
sþ1
V sþ1 sþ1 sþ1 m 0 ðtÞ
¼ min fLHS þ tþ2 ðI tþ2 ; atþ2;sþ1 ; Atþ2;sþ1 Þg X D 4@
X
T 1
X tþ1 0
Y tþ1 0
¼ qj  pt  E Dt  It;dn  Rt;k A 5
Y tþ1 IOtþ1 j¼mðtÞþ1 k¼mðtÞþ1
20 1þ 3
 min fLHS þ V sþ1 sþ1 sþ1
tþ2 ðI tþ2;dn ; Rtþ2 Þg D 4@
X
T 1
X tþ1 0 ¼ qm0 ðtÞ  pt  E Dt  It;dn  Rt;k A 5.
Y tþ1 0
Y tþ1 IOtþ1 k¼m0 ðtÞ

 min fRHS þ V sþ1 sþ1 sþ1


tþ2 ðItþ2;dn ; Rtþ2 Þg
X tþ1 0
Y tþ1 0 (3) Finally, let m0 ðtÞ4mðtÞ þ 1. For every mðtÞ þ 1  j 
Y tþ1 IOtþ1
m0 ðtÞ; we have
¼ V sþ1 sþ1 sþ1
tþ1 ðItþ1;dn ; Rtþ1 Þ. (21) 0 0
m
X ðtÞ m
X ðtÞ
where (21) follows by the induction hypothesis. This Rt;k  Rt;k
completes the proof of Lemma 2. & k¼j k¼mðtÞþ1
ARTICLE IN PRESS
J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136 135

and We are now ready to carry out the complete proof by


20 1þ 3 induction. Since we do not consider the cost incurred
0
m
X ðtÞ X
T 1
beyond the time horizon T, we have V sTþ1 ¼ V sþ1 Tþ1 ¼ 0. By
qj  pt  ED 4@Dt  It;dn  Rt;k A 5 s
j¼mðtÞþ1 k¼j the induction hypothesis for t+1, if Istþ1 2 ztþ1 , we assume
20 1þ 3 that (12) holds, i.e.,
0
m
X ðtÞ X
T 1
D 4@
 qj  pt  E Dt  It;dn  Rt;k A 5. E½V stþ1 ðIstþ1 Þ  E½V sþ1 s s s sþ1
tþ1 ðIOtþ1 ; I tþ1;dn ; atþ1;1 ; . . . ; atþ1;s ; atþ1;sþ1 ,
j¼mðtÞþ1 k¼mðtÞþ1
Astþ1;1 ; . . . ; Astþ1;s ; Asþ1 s s
tþ1;sþ1 ; Rtþ1;1 ; . . . ; Rtþ1;T1 Þ.

(26)
Suppose that there exists k 2 fmðtÞ þ 1; . . . ; m0 ðtÞg such
that Rt;k 40. It is clear that mðtÞ ¼ maxfAt;1 ; At;2 ; . . . ; At;s g Starting from (11), we obtain
s
and m0 ðtÞ ¼ maxfmðtÞ; At;sþ1 g ¼ At;sþ1 : By definition of zt b s þ E½V s ðIs Þg
V st ðIst Þ ¼ MinfC t tþ1 tþ1
we conclude that mðtÞ þ 1  at;sþ1  At;sþ1 ¼ m0 ðtÞ. X t 0
X t 0

Now, we perform the final step towards showing Y t IOt

bs  C
C b sþ1 . We have  MinfC
s
b þ E½V sþ1 ðIOs ; Is s s sþ1
t t t tþ1 tþ1 tþ1;dn ; atþ1;1 ; . . . ; atþ1;s ; atþ1;sþ1 ,
X t 0
X t 0
mðtÞ
X Y t IOt
b s ¼ C t ðX t Þ þ St ðY t Þ þ ht ðIOt þ X t  Y t Þ þ
C qj  pt  ED;W=J¼j
t Astþ1;1 ; . . . ; Astþ1;s ; Asþ1 s s
tþ1;sþ1 ; Rtþ1;1 ; . . . ; Rtþ1;T1 Þg (27)
j¼1
20 1þ 3
X
T 1 X
T 1
sþ1

4@Dt  It;dn  Rt;l A 5 þ qj  pt  ED b
 MinfC þ V sþ1 s sþ1 sþ1
t tþ1 ðItþ1 ; atþ1;sþ1 ; Atþ1;sþ1 Þg (28)
l¼at;k ðjÞ:Mðdk ;wÞ¼dn j¼mðtÞþ1 X t 0
X t 0
20 1þ 3 Y t IOt
X
T 1

4@Dt  It;dn  Rt;k A 5
k¼j b sþ1 þ V sþ1 ðIsþ1 ; Rsþ1 Þg
 MinfC (29)
t tþ1 tþ1;dn tþ1
mðtÞ X t 0
X X t 0
¼ C t ðX t Þ þ St ðY t Þ þ ht ðIOt þ X t  Y t Þ þ qj  pt  ED;W=J¼j Y t IOt
j¼1
20 1þ 3
¼ V sþ1 ðIOt ; Isþ1 sþ1 sþ1
0
m
t;dn ; at;1 ; . . . ; at;sþ1 ,
X
T 1 X ðtÞ
t

4@Dt  It;dn  Rt;l A 5 þ qj  pt  ED
l¼at;k ðjÞ:Mðdk ;wÞ¼dn j¼mðtÞþ1 Asþ1 sþ1 sþ1 sþ1
t;1 ; . . . ; At;sþ1 ; Rt;1 ; . . . ; Rt;T Þ.
20 1þ 3
X
T 1 X
T 1
In (27), (28), (29), we have used (26), (22) and (20),

4@Dt  It;dn  Rt;k A 5 þ qj  pt  ED
k¼j j¼m0 ðtÞþ1 respectively.
20 1þ 3 This completes the proof of Theorem 4. &
X
T 1

4@Dt  It;dn  Rt;k A 5 (24)
k¼j
References

mðtÞ
X AIM Inc., 1999. Radio Frequency Identification—A Basic Primer. White
 C t ðX t Þ þ St ðY t Þ þ ht ðIOt þ X t  Y t Þ þ qj pt Paper, Retrieved August 1, 2007. /http://www.aimglobal.org/tech-
j¼1 nologies/rfid/resources/papers/rfid_basics_primer.aspS.
20 1þ 3 Atali A., Lee, H., Özer, Ö., 2006. If the inventory manager knew: value of
D;W=J¼j 4@
X
T 1 RFID under imperfect inventory information. Working Paper,
E Dt  It;dn  Rt;l A 5 Stanford Graduate School of Business, Stanford University.
l¼at;k ðjÞ:Mðdk ;wÞ¼dn Bottani, E., Rizzi, A., 2008. Economical assessment of the impact of RFID
20 1þ 3 technology and EPC system on the fast moving consumer goods
m0 ðtÞ
X D 4@
X
T 1 supply chain. International Journal of Production Economics 112 (2),
þ qj  pt  E Dt  It;dn  Rt;k A 5 548–569.
j¼mðtÞþ1 k¼mðtÞþ1 Bottani, E., Montanari, R., Rizzi, A., 2009. The impact of RFID technology
and EPC system on stock-out of promotional items. International
20 1þ 3 Journal of RF Technologies: Research and Applications 1 (1), 6–22.
X
T 1
D 4@
X
T 1
Clampitt, H., Sokol, B., Galarde, D., 2006. The RFID Certification Textbook.
þ q j  pt  E Dt  It;dn  Rt;k A 5 PWD Group.
j¼m0 ðtÞþ1 k¼j Clark, A., Scarf, H., 1960. Optimal policies for a multi-echelon inventory
0 problem. Management Science 6 (4), 475–490.
m
X ðtÞ
Ehrhardt, R., 1984. (s, S) Policies for a dynamic inventory model with
¼ C t ðX t Þ þ St ðY t Þ þ ht ðIOt þ X t  Y t Þ þ q j  pt stochastic lead times. Operations Research 32 (1), 121–132.
j¼1 Fleisch, E., Tellkamp, C., 2005. Inventory inaccuracy and supply chain
20 1þ 3 performance: a simulation study of a retail supply chain. Interna-
D;W=J¼j 4@
X
T 1
tional Journal of Production Economics 95 (3), 373–385.
E Dt  It;dn  Rt;l A 5 Gaukler, G., Ozer, O., Hausman, W.H., 2008. Order progress information:
l¼at;k ðjÞ:Mðdk ;wÞ¼dn improved dynamic emergency ordering policies. Production and
20 1þ 3 Operations Management 17 (6), 599–613.
X
T 1 X
T 1
Hardgrave, B., 2005. Does RFID reduce out of stocks? A preliminary
þ qj  pt  ED 4@Dt  It;dn  Rt;k A 5 analysis. Available from: /www.gs1.fr/gs1_fr/securedownload/dl/
j¼m0 ðtÞþ1 k¼j 1747/23984/file/GS1_France_OOS_bh.pdfS.
Kang, Y., Stanley, B., 2005. Information inaccuracy in inventory systems:
¼ b sþ1 .
C (25) stock loss and stock out. IIE Transaction 37 (9), 843–859.
t
Kaplan, R., 1970. A dynamic inventory model with stochastic lead times.
In (24) we break the indices and apply (23) in (25). Management Science 16 (7), 491–507.
ARTICLE IN PRESS
136 J. Pei, D. Klabjan / Int. J. Production Economics 123 (2010) 118–136

Kim, C., Klabjan, D., Simchi-Levi, D., 2006. Optimal policy for a periodic Schneider, F., 2007. Inventory control for added-value products using
review inventory system with expediting. Working Paper, Massa- RFID control. M.S. Thesis, Department for Operations Research,
chusetts Institute of Technology. Technical University of Darmstadt, Germany.
Lee, H., Özer, Ö., 2007. Unlocking the value of RFID. Production and Song, J., Zipkin, P., 1996. Inventory control with information about supply
Operations Management 16 (1), 40–64. condition. Management Science 42 (10), 1409–1419.
Lee, Y., Cheng, F., Leung, Y., 2004. Exploring the impact of RFID on supply Szmerekovsky, J., Zhang, J., 2008. Coordination and adoption of item-
chain dynamics. In: Proceedings of the 2004 Winter Simulation level RFID with vendor managed inventory. International Journal of
Conference, Washington, DC, USA. Production Economics 114 (1), 388–398.
Nahmias, S., 1979. Simple approximations for a variety of dynamic Ustundag, A., Tanyas, M., 2009. The impacts of radio frequency
leadtime lost-sales inventory models. Operations Research 27 (5), identification (RFID) technology on supply chain costs. Transporta-
904–924. tion Research Part E: Logistics and Transportation Review 45 (1),
Scarf, H., 1960. The optimality of (S, s) policies in the dynamic inventory 29–38.
problem. In: Mathematical Methods in the Social Sciences. Stanford
University Press.

Das könnte Ihnen auch gefallen