• Title/Summary/Keyword: Checking Application

Search Result 285, Processing Time 0.023 seconds

A Study on the Usefulness of the BPO System - Focusing on Comparison with L/C System - (BPO 제도의 유용성에 관한 연구 -L/C 제도와의 비교를 중심으로-)

  • JANG, Eun-Hee;JEONG, Hee-Jin
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.73
    • /
    • pp.21-42
    • /
    • 2017
  • A BPO is an irrevocable undertaking given by an Obligor Bank acting on behalf of the buyer to a Recipient Bank acting on behalf of the seller to pay on satisfaction of certain specified conditions. There have been a Trade Service Utility(TSU), a Transaction Matching Application(TMA) and ISO 20022 TSMT messages that core electronic technical systems linked to the BPO. As a key usefulness of the BPO, it brings to market an alternative means of satisfying the risk mitigation, financing and information management needs of banks and businesses engaged in trade. That is, corporates can spread the risk among multiple Obligor Banks by requesting multiple BPOs for the same trade transaction not to exceed the value of the initial transaction. Since the BPO replaces the manual document checking process with the electronic matching of data, buyers and sellers will benefit from significantly increased accuracy and objectivity. By using BPO, buyers and sellers can become trusted counterparties by demonstrating reliability and giving sellers the assurance of being paid on time as per the payment terms and conditions agreed. When compared to L/C, the BPO requires submission of data only. This requires a change of practice of those accustomed to dealing with physical documentation. The beneficiary of a BPO is the Recipient Bank which is always the Seller's Bank. In the meantime, banks will need to agree between themselves that the URBPO 750 will be applied, modified or excluded. However, customers of banks will face low transactional costs due to a fully automated process and standardized data formats used in international trade documentation. There is no amendment and cancellation rules in the URBPO 750s, but only have Assignment of Proceeds rules. As a result, the BPO is likely to enable new business opportunities, lower costs, fast transaction process and strengthen key customer relationships.

  • PDF

AVK based Cryptosystem and Recent Directions Towards Cryptanalysis

  • Prajapat, Shaligram;Sharma, Ashok;Thakur, Ramjeevan Singh
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.97-110
    • /
    • 2016
  • Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strengths and identifies weakness key as well as enciphering algorithm. With increase in key size the time and effort required to guess the correct key increases so trend is increase key size from 8, 16, 24, 32, 56, 64, 128 and 256 bits to strengthen the cryptosystem and thus algorithm continues without compromise on the cost of time and computation. Automatic Variable Key (AVK) approach is an alternative to the approach of fixing up key size and adding security level with key variability adds new dimension in the development of secure cryptosystem. Likewise, whenever any new cryptographic method is invented to replace per-existing vulnerable cryptographic method, its deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. This work investigates AVK based cryptic techniques, in future to exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and direction from the cryptic mining perspectives.

An Algorithm for Referential Integrity Relations Extraction using Similarity Comparison of RDB (유사성 비교를 통한 RDB의 참조 무결성 관계 추출 알고리즘)

  • Kim, Jang-Won;Jeong, Dong-Won;Kim, Jin-Hyung;Baik, Doo-Kwon
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.115-124
    • /
    • 2006
  • XML is rapidly becoming technologies for information exchange and representation. It causes many research issues such as semantic modeling methods, security, conversion far interoperability with other models, and so on. Especially, the most important issue for its practical application is how to achieve the interoperability between XML model and relational model. Until now, many suggestions have been proposed to achieve it. However several problems still remain. Most of all, the exiting methods do not consider implicit referential integrity relations, and it causes incorrect data delivery. One method to do this has been proposed with the restriction where one semantic is defined as only one same name in a given database. In real database world, this restriction cannot provide the application and extensibility. This paper proposes a noble conversion (RDB-to-XML) algorithm based on the similarity checking technique. The key point of our method is how to find implicit referential integrity relations between different field names presenting one same semantic. To resolve it, we define an enhanced implicity referentiai integrity relations extraction algorithm based on a widely used ontology, WordNet. The proposed conversion algorithm is more practical than the previous-similar approach.

  • PDF

Development of an Hazard Analysis Critical Control Point Application Model for a Olive Flounder (Paralichthys olivaceus) Aquaculture Farm (넙치 양식장 위해요소중점관리기준(HACCP) 적용모델 개발)

  • Kim, Tae-Jin;Min, Jin-Gi;Park, Sun-Mee;Choi, Jae-Suk;Lee, Myung Suk;Kim, Young-Mog;Chung, Yong-Hyun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.5
    • /
    • pp.1055-1067
    • /
    • 2013
  • We attempted to apply the HACCP system adopted in the food industry to a olive flounder (Paralichthys olivaceus) aquaculture farm to ensure the hygiene safety of farmed fish. In this study, HACCP system procedures, including HACCP team organization, critical point determination, establishment of standard limits etc., were established using Codex 12 procedures. To determine whether hazards were critical elements, we evaluated the likelihood and seriousness of each hazard element. The likelihood of residual medicine exceeding the acceptable limit in shipped fish products was demonstrated to be a critical hazard element. Management of the shipment stage was determined to be a critical control point (CCP). Checking the records for stock and release and maintaining a history of medicine use before shipping the fish were suggested as monitoring methods. The standards for acceptable residual medicine were set based on relevant laws and regulations, and then the limits were adapted and established for the CCP. An HACCP plan applicable to olive flounder farms was established.

Integrated Manpower Information Systems on Construction Site - Using RFID and QR-Code - (RFID와 QR-코드를 활용한 건설현장 통합노무정보관리 효율화 체계 구축)

  • Choi, Yun-Gil;Yoon, Su-Won;Chin, Sang-Yoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.4
    • /
    • pp.106-116
    • /
    • 2011
  • It is very important to collect and manage labor information in the construction industry that is labor-intensive. Although research and cases that utilize RFID are increasing for more effective labor management, labor management is limited to the checking-in and -out information management at the entrance of a construction site due to high expense of an RFID reader. Labor and safety information is still managed based on the redundant process that is hand-written in a book and re-input of information by using a personnel-computer. Therefore, the objective of this paper is to develop more effective and efficient process for labor information record and management. This paper presents a prototype application that supports integrated labor information management by incorporating QR-code into RFID-based labor management system and verifies the application through a pilot test and comparison with the existing labor management syste.

A Study on Applicability of Custom-Tailored Clothing of 3D Virtual Clothing System - Focused on Middle-Aged Women - (3 시스템의 맞춤복 시장 적용가능성에 관한 연구 - 중년여성을 대상으로 -)

  • Lee, Su-Yeon;Lee, Jung-Soon
    • Journal of Fashion Business
    • /
    • v.14 no.4
    • /
    • pp.161-173
    • /
    • 2010
  • This study aims to examine for efficient production methods of custom-tailored clothing and application of 3D virtual clothing system in custom-tailored clothing market, by producing and analyzing both real clothing and 3D virtual clothing. For this study, a middle-aged woman is selected as the subject figure and one-piece is selected as the experimental clothes item. In real clothing, I conducted the wearing evaluation for experts and the subject figure. And In the virtual clothing, I conducted the wearing evaluation with i-Designer using 3D virtual clothing on simulation program. There are some differences between the data from body scanning and the real body size. In the custom-tailored clothing market in which the fitness is important, the research which measures the more exact data is needed. And in the case of complicate design, the functions which measure the activity and the fitness variously and correct the parts of curves are needed. This study experiments the availability of application of 3D Virtual Clothing System in custom-tailored clothing market by selecting one-piece as the experimental clothes item. So the follow-up studies for the other designs and fabrics are needed. Also, if the studies for checking the clothes pressure, the amount of composure, the space between skin and clothing when the virtual model wearing clothes is walking or shaking his arms are proceeding, then 3D virtual clothing System is applicable in custom-tailored clothing market. But there are some restrictions and lack of education in virtual clothing System yet, and it makes hard for workers in clothing market to use it in real production. However, 3D virtual clothing System will be practical in real market if there would be more research on its usability and practicality, and workers in clothing market can be easily educated on techniques of 3D virtual clothing system.

Application of the BMORE Plot to Analyze Simulation Output Data with Bivariate Performance Measures (이변량 성과척도를 가지는 시뮬레이션 결과 분석을 위한 BMORE 도표의 활용)

  • Lee, Mi Lim;Lee, Jinpyo;Park, Minjae
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.83-93
    • /
    • 2020
  • Bivariate measure of risk and error(BMORE) plot is originally designed to depict bivariate output data and related statistics obtained from a stochastic simulation such as sample mean, median, outliers, and a boundary of a certain percentile of simulation data. When compared to the static numbers, the plot has a big advantage in visualization that enables scholars and practitioners to understand the potential variability and risk in the simulation data. In this study, beyond just the construction of the plot to depict the variability of a certain system, we add a chance constraint to the plot and apply it for decision making such as checking the feasibility of systems, comparing performances of the systems on statistical background, and also analyzing the sensitivity of the problem parameters. In order to demonstrate an application of the plot, we employ an inventory management problem as an example. However, the techniques and algorithms suggested in this paper can be applied to any other problems comparing systems on bivariate performance measures with simulation/experiment results.

An Extended Data Model based on the IFC for Representing Detailed Design Information of Steel Bridge Members (강교 부재의 상세 설계정보 표현을 위한 IFC기반의 데이터 모델 확장)

  • Lee, Jin-Hoon;Lee, Ji-Hoon;Kim, Hyo-Jin;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.3
    • /
    • pp.253-263
    • /
    • 2008
  • Extension of IFC data model for steel bridge members is proposed to represent detailed design information. First of all, the design data items and their representation method are classified by analyzing primary references such as design specification, structural calculation documents and shop drawings. Some of the classified items are enough to be represented by the existing IFC model. However, the need of additional model is noted to systematically represent the design information for other items such as stiffener, diaphragm, joint system, and shear connector. An inheritance relations and properties for added model are also defined. The application program based on the proposed data model is developed. In the end, by loading the application program on the AutoCAD 2002 program, end-users can input the design information of steel bridge members. The applicability and efficiency of the proposed data model and the program are verified by checking the section area, intervals, and interferences.

A Development and Application of Independent Study Checklist for Mathematics Gifted Students (초등수학 영재학생을 위한 독립연구 점검표 개발 및 적용)

  • Bak, Jeong Ung;Lee, Dae Hyun
    • Education of Primary School Mathematics
    • /
    • v.18 no.2
    • /
    • pp.77-89
    • /
    • 2015
  • In this study, an 'Independent Study Checklist' for gifted mathematics students was developed and applied. The characteristics shown in the results after the 'Independent Study Checklist' was applied to mathematics gifted students were analysed. The checklist was divided into six phases of the independent study process and included checking contents at each stage. Observations, student interviews and results of the process of 'Independent Study' were collected and analysed to understand the characteristics of students' outcomes. The results from the application of the 'Independent Study Checklist' suggest the followings. First, the 'Independent Study Checklist' took the role of a self-check list to identify the process of the 'Independent Study'. Second, the check points of the 'Independent Study Checklist' presented the view of discussion to gifted students. Third, the 'Independent Study Checklist' was used as teaching material for teachers of gifted students. Fourth, 'Independent Study Checklist' was optionally used according student's study topics and method. Fifth, the checklist at each phase was continuously used during the whole process of 'Independent Study'. The teachers' interest and encouragement took the role of facilitating students' study process.

Comparative Analysis of Network-based Vulnerability Scanner for application in Nuclear Power Plants (원전 적용을 위한 네트워크 기반 취약점 스캐너의 비교 분석)

  • Lim, Su-chang;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1392-1397
    • /
    • 2018
  • Nuclear power plants(NPPs) are protected as core facilities managed by major countries. Applying general IT technology to facilities of NPPs, the proportion of utilizing the digitized resources for the rest of the assets except for the existing installed analog type operating resources is increasing. Using the network to control the IT assets of NPPs can provide significant benefits, but the potential vulnerability of existing IT resources can lead to significant cyber security breaches that threaten the entire NPPs. In this paper, we analyze the nuclear cyber security vulnerability regulatory requirements, characteristics of existing vulnerability scanners and their requirements and investigate commercial and free vulnerability scanners. Based on the proposed application method, we can improve the efficiency of checking the network security vulnerability of NPPs when applying vulnerability scanner to NPPs.