• Title/Summary/Keyword: 재고관리시스템

Search Result 323, Processing Time 0.031 seconds

Page Replacement Policy for Memory Load Adaption to Reduce Storage Writes and Page Faults (스토리지 쓰기량과 페이지 폴트를 줄이는 메모리 부하 적응형 페이지 교체 정책)

  • Bahn, Hyokyung;Park, Yunjoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.57-62
    • /
    • 2022
  • Recently, fast storage media such as phage-change memory (PCM) emerge, and memory management policies for slow disk storage need to be revisited. In this paper, we propose a new page replacement policy that makes use of PCM as a swap device of virtual memory systems. The proposed policy aims at reducing write traffic to the swap device as well as reducing the number of page faults pursued by traditional page replacement policies. This is because a write operation in PCM is slow and PCM has limited write endurances. Specifically, the proposed policy focuses on the reduction of page faults when the memory load of the system is high, but it aims at reducing write traffic to storage when free memory space is sufficient. Simulation experiments with various memory reference traces show that the proposed policy reduces write traffic to PCM without performance degradations.

Establishment of Database System for Radiation Oncology (방사선 종양 자료관리 시스템 구축)

  • Kim, Dae-Sup;Lee, Chang-Ju;Yoo, Soon-Mi;Kim, Jong-Min;Lee, Woo-Seok;Kang, Tae-Young;Back, Geum-Mun;Hong, Dong-Ki;Kwon, Kyung-Tae
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.20 no.2
    • /
    • pp.91-102
    • /
    • 2008
  • Purpose: To enlarge the efficiency of operation and establish a constituency for development of new radiotherapy treatment through database which is established by arranging and indexing radiotherapy related affairs in well organized manner to have easy access by the user. Materials and Methods: In this study, Access program provided by Microsoft (MS Office Access) was used to operate the data base. The data of radiation oncology was distinguished by a business logs and maintenance expenditure in addition to stock management of accessories with respect to affairs and machinery management. Data for education and research was distinguished by education material for department duties, user manual and related thesis depending upon its property. Registration of data was designed to have input form according to its subject and the information of data was designed to be inspected by making a report. Number of machine failure in addition to its respective repairing hours from machine maintenance expenditure in a period of January 2008 to April 2009 was analyzed with the result of initial system usage and one year after the usage. Results: Radiation oncology database system was accomplished by distinguishing work related and research related criteria. The data are arranged and collected according to its subjects and classes, and can be accessed by searching the required data through referring the descriptions from each criteria. 32.3% of total average time was reduced on analyzing repairing hours by acquiring number of machine failure in addition to its type in a period of January 2008 to April 2009 through machine maintenance expenditure. Conclusion: On distinguishing and indexing present and past data upon its subjective criteria through the database system for radiation oncology, the use of information can be easily accessed to enlarge the efficiency of operation, and in further, can be a constituency for improvement of work process by acquiring various information required for new radiotherapy treatment in real time.

  • PDF

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

An Analysis of Influence Factor of ROK Military Supply-Network Efficiency by Social Network Analysis (사회연결망분석을 통한 한국군 공급네트워크 구조의 효율성 영향요인 분석)

  • Eom, Jin-Wook;Won, You-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.47-55
    • /
    • 2019
  • The army of republic of korea have been continued to transform their logistics support system structure for better efficient logistics support system in preparation for the future environment. Logistics system has supply network structure which is connected by various units and supply network structure received attention as a factor of success of supply network. Many researchers have continuously researched inventory management, transportation or economy factors for supply network, but such a study on the one in military supply network structure analysis is still slower than the study of analysis of other factors until now. In this study, we identify military supply network structure influence factor by application of social network analysis method which is used broadly and analyze co-relationships between supply network structure influence factor and valued APL(average path length) as a criteria of efficiency of military supply network. By this study it has value of military supply network influence factor identification for the better military supply network fabrication.

Certificateless Public Key Encryption Revisited: Security Model and Construction (무인증서 공개키 암호 기법의 재고: 안전성 모델 및 설계)

  • Kim, Songyi;Park, Seunghwan;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1109-1122
    • /
    • 2016
  • Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user's ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.

Conceptual Models for Evaluation of Urban Logistics Improvement (도시물류 개선 대안 평가를 위한 개념적 모형 정립)

  • 허윤수;남기찬;윤항묵
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.5
    • /
    • pp.7-18
    • /
    • 2001
  • This study is concerned with theoretical aspects of urban logistics with the aim of revealing limitations of the literature, suggesting directions for further studies and developing a conceptual model for evaluating policy alternatives. Several limitations have been revealed and, based on these, the directions for further studies were suggested as more effort needs to be put on microscopic aspects of urban logistics ; and integrated conceptual evaluation models need to be developed. For the models it defined microscopic evaluation factors by the subject of urban logistics activities, and with these factors it established a conceptual model. Especially it introduced the simulation models developed recently to predict the route of freight vehicles and suggested how both microscopic and macroscopic aspects of urban logistics could be evaluated.

  • PDF

Performance Analysis of Campus Inter-library Loan on Library Automation (캠퍼스 상호대차서비스 전산화에 따른 성과 분석)

  • Lee, Hye-Young
    • Journal of Information Management
    • /
    • v.40 no.4
    • /
    • pp.73-92
    • /
    • 2009
  • Generally, we used to provide ILL to users for overcoming the limited resource and satisfying user's desires for information. ILL makes library service's paradigm change from ownership to sharing. K-university Library has been providing Campus inter-library loan as ILL to users for long time and continually trying to improve the service's quality. This case study is to analysis the performance of campus inter-library loan in the past 9 years. As the related automation system was developed and upgraded, the service requests have been increasing annually. Campus inter-library loan requests were 12% of total book requests in 2001, and then were 75% of total book requests in 2008. The transaction time was reduced until 17% of 2004.

A Study on the Structural Relationship between SCM Activity and Process Innovation, and Quality Performance in SMEs (중소기업의 SCM활동과 프로세스 혁신 및 품질성과 간의 구조적 관계 분석)

  • Lee, Seol-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.2
    • /
    • pp.170-185
    • /
    • 2019
  • This study is intended to look into the structural relationship between SCM activity, process innovation and quality performance in small and medium sized enterprisers(SMEs). To achieve this, a survey was empirically carried out to 354 SCM operating officers and managers who perform the SCM activities in small and medium sized manufacturing firms. The results are summarized as follows. Overall, the SCM activity and process innovation had a significant effect on the quality performance, having a structural relationship with the quality performance in SEMs. This implies that the strategic alliance of the SCM activities and competence concentration based on technology development in SEMs can organize the unity through organizational members' information sharing. In other words, when the information integration supports the compatibility and reliability of shared information system by raising technological competence through this, the process innovation can lead to non-financial cost reduction, product quality, delivery compliance and inventory cost reduction as quality performance of the structured process, management and distribution.

A Utilization Strategy of Nursing Staff by Types of Medical Institutions - nurse staffing level of medium and small-sized hospitals (의료기관별 간호인력 활용방안-중소병원 간호사 확보를 중심으로)

  • Hong, Ji Yeon;Chae, JungMi;Song, Mi Ra;Kim, Eun Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.8
    • /
    • pp.162-170
    • /
    • 2017
  • This study analyzed the current situation of medium and small-sized hospital nursing staff and related policies, and identified the factors that affect staffing level to provide evidence for planning and adopting policy. By analyzing the statistical data published by public institutions such as the Ministry of Health and Welfare and Health Insurance Review and Assessment Service, the result was viewed based on the understanding of various internal and external health care environments. The number of active nurses was less than 50% of the number of licensed nurses and has decreased every year. This means that the cost-effectiveness of increases in nursing college enrollment should be reconsidered. Inpatient nursing fees by staffing grades has caused nurses to move from medium and small-sized hospitals, where there is a severe lack of staff, to more advanced general hospitals. As a result, the lack of nursing staff in medium and small-sized hospitals has worsened. In conclusion, reexamination is needed to improve effectiveness of inpatient nursing fees by staffing grades as a policy to secure the workforce of medium and small-sized hospitals. Furthermore, the tracking management system of licensed nurses must be able to solve the imbalance between demand and supply of nursing staff.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.