**6. Conclusion**

16 Will-be-set-by-IN-TECH

Different sensors are associated to form a cluster of sensors able to monitor a set of constraints. Sensors send data to a centralized software that translates them into accident risks in case of unusual values. By this way, the software is able to send alert messages to supply actors that

The accident risks treated by the software are associated to sensors, they are the following:

In the first scenario, the events occur at dock where the truck is stowed and a forklift driver is unloading pallet and put them on the dock before storing them further on rack. The dangerous

Sensors present on pallets send periodically their data to the software. A terrorist triggers a bomb explosion (remote activation by mobile phone for example) from a pallet that is still on the truck cargo. Different events occur from this explosion: thermal and smoke emanation, release of toxic gases and missile effects. Pallets in the container and on the dock will be damaged by the blast wave, the main consequence on goods is the loss of aerosols containment. Consequences are expected on environment, on warehouse workers and on

As soon as the explosion occurred, sensors present on pallets that suffer from the bomb consequences will immediately be damaged and will not emit anymore whereas sensors present on dock will emit only few seconds before being destroyed by fire. The software that collects data will receive unusual values such as increasing heat and gas pressure and in consequence will sends an alert message to the warehouse manager. This last is responsible of the security maintain and will understand that an accident occurred on a dock. He will then deploy emergency procedures and will be helped by the software that provide strategic information with the alert messages. The software will send information about the pallet whose sensors are broken, the CLP designation of goods present on these pallets will be sent. By this way, the retailer manager will know exactly what the involved goods are, he will adapt

In the second scenario, the context and the assumptions are the same than the first one: the action takes place on the stow where the truck is being unloaded by an operator. Goods considered are housekeeping products, they are flammable liquids. An handling error such

are currently responsible of goods so that they can intervene on goods.

**5.5. Scenarios: Explosion and chemical reactions on stow**

goods considered are aerosols and are commercialized as air fresheners.

emergency procedures as a function of physicochemical properties of goods.

• Overheating (temperature sensor); • Pallet squashing (pressure sensor); • Pallet overturn (stability sensor);

• Humidity constraint (humidity sensor);

• Incompatible product (RFID tag).

warehouse building structure.

• Pallet lost (gps sensor); • Gas release (gas sensor); • Fluid leak (fluid sensor); • Solid product dumping;

> In the global context of supply chain management, the three common flows of goods, information and physical are subject to modelling regarding optimization concerns. Risk studies allow identifying logistics missions that may represent danger on persons, environment and goods. Scenarios are then extracted to describe risk management strategies and then improving emergency procedures.

> In this chapter, three scenarios are developed to answer specific events, located in quite precise places and representing real risks. The chosen scenarios presented three types of accidents:

• the creation of an explosive area resulting from a leak of aerosol;


In the presented scenarios, only the product concept and application of procedures and risk prevention differ. It is the analysis of risks, its causes and its impacts which will enable to set up one of the mechanisms of detection and prevention.

**Enterprise Risk Management** 

The integration of communicating objects such as RFID tags and wireless sensors offer new features for a dynamic risk assessment. Sensors are then used for accident risk detections, collected data are transmitted to a centralized software that is able to compare them with confidence intervals and in case of mismatches alerts are sent. Then, communicating objects are used to risk detection and also to risk mitigation. Risk mitigation consists in providing strategic information (involved goods, their quality and quantities, accident place, etc.) to emergency services that can then plan and adapt their intervention.
