Journal of
Engineering and Computer Innovations

  • Abbreviation: J. Eng. Comput. Innov.
  • Language: English
  • ISSN: 2141-6508
  • DOI: 10.5897/JECI
  • Start Year: 2010
  • Published Articles: 28

Full Length Research Paper

Creating E-pedigree Kanban to secure customers’ chain using multi-agent image technique

Ahmed M. Abed
  • Ahmed M. Abed
  • Industrial Engineering Department, Zagazig University, Zagazig, 44519, Egypt.
  • Google Scholar

  •  Received: 03 April 2015
  •  Accepted: 08 March 2016
  •  Published: 31 July 2016


Anderson D (2010). Kanban - Successful Evolutionary Change for your Technology Business. Blue Hole Press. ISBN 0-9845214- 0-2.


Blackstone EA, Fuhr JP, Pociask S (2014). The Health and Economic Effects of Counterfeit Drugs. Retrieved from Am. Health Drug 7(4).


Castro L, Wamba SF (2007). An inside look at "RFID technology". J. Technol. Manag. Innov. 2(1):128-141.


Cutler TR (2013). Examining Lean Manufacturing Promise. Retrieved January 29, 2013.


Davidsson P, Wernstedt F (2004). A framework for evaluation of multi-agent system approaches to logistics network management. Multi- Agent Systems. An Application Science, Kluwer, 2004.


Fery D, Stockheim T, Woelk PO, Zimmermann R (2003). Integrated Multi-agent-based Supply Chain Management. In Proceedings of 1st International Workshop on Agent-based Computing for Enterprise Collaboration.


Hopkins D, Lewis K, Mark T (2010). Counterfeiting Exposed: How to Protect Your Brand and Market Share (Wiley and Sons 2003) "Intellectual Property Rights" (PDF). Retrieved 15 May 2010.


Huang D, Verma M, Ramachandran A, Zhou Z (2009). EPCA Distributed e-Pedigree Architecture. Accepted by the 11th International Workshop on Future Trends of Distributed Computing Systems (FTDCS).


ICC (Counterfeiting Intelligence Bureau) (1997). Countering Counterfeiting: A Guide to Protecting and Enforcing Intellectual Property Rights, United Kingdom.


ISO (2014). Crackdown on counterfeiting". International Organization for Standardization (ISO), Jan. 8, 2014. Cited in: 



Jung EH, Cho SY (2006). A Robust Digital Watermarking System Adopting 2D Barcode against Digital Piracy on P2P Network. Int. J. Comp. Sci. Netw. Secur. 6(10):263-268.


Koh HL, Hou P, Zou P, Low MY, Chan E (2006). Structural identification of a new acetildenafil analogue from pre–mixed bulk powder intended as a dietary supplement. Food Addit. Contam. 23(9):870-875.


Ladas C (2009). Scrumban: Essays on Kanban Systems for Lean Software Development. Modus Cooperandi Press. ISBN 978- 0578002149.


Lehtonen M, Al-Kassab J, Michahelles F, Kasten O (2007). Anti-counterfeiting Business Case Report. Available at


Li ZK, Duan ZS, Lewis FL (2014). Distributed robust consensus control of multi-agent systems with heterogeneous matching uncertainties. Automatica 50:883-889.


Lu L, Wang G (2008). A study on multi-agent supply chain framework based on network economy. Comput. Ind. Eng. 54:288-300.


Meng B, Ming YD (2012). Research on the Lean Process Reengineering Based on Value Stream Mapping. Manag. Sci. Eng. 6(2):103-106.


NNE (2014). Pharmaplan. Serialization: "Get on the Right Track" Retrieved from 



OECD (2007). The Economic Effect of Counterfeiting and Piracy, Executive Summary" (PDF). OECD, Paris. 2007. Retrieved 2007.


Savic J (2013). Drug Serialization. Retrieved from Pharma Compliance Monitor. CNET (2013). Shanzhai JI -All you need to know about fake phones - Mobile Phones". CNET. Retrieved 5 August 2013.


WHO H (2005). Inside a counterfeiting Investigation and World Health Organization (WHO 2005). 16-July-2012. 



Tam YK (2010). Measuring the true costs of counterfeiting and piracy, Assistant Commissioner (intelligence and investigation) Hong Kong Customs 2010. Cited in 



Wang J, Chen K, Ma Q (2014) Adaptive Leader-Following Consensus of Multi-Agent Systems with Unknown Nonlinear Dynamics. Entropy 16:5020-5031.