• Title/Summary/Keyword: Document exchange

Search Result 229, Processing Time 0.029 seconds

One-stop System Model of Port and Logistics using SCM (공급사슬망체계하에서의 수출입화물 원스톱서비스 시스템 개발에 관한 연구)

  • 박남규;김현수;조재형
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2000.11a
    • /
    • pp.43-51
    • /
    • 2000
  • Since 1996, the document exchange method by EDI has been introduced in port and logistics industries to enhance the declaration activities to the Pusan Port Authority and Customs. In spite of these efforts, users such as shipping companies, shipping agents, and freight forwarders have complained the inconvenience of using EDI systems. The major reasons can be summarized as too much transfer time, inconvenient EDI software, and problems on message receiving confirmation. To solve these problems, although we have developed an Internet based EDI system for Port-MIS users, we have failed its implementation practically for the short of Governments readiness, the complexity of systems and separation with in-house systems. So, the writers have changed the direction of research to applying the concept of SCM to logistics system by XML/EDI. In this Paper, the prototype systems to integrate processes of shipping company, Port Authority, Customs and stevedoring company will be suggested. The new method of EDI gives us advantages, which are the accuracy of cargo data and integration of processes among firms and keeping the service of cargo trace.

  • PDF

An Action Pattern Analysis System of the Embedded Type about Network Users (네트워크 사용자에 대한 임베디드형 행동패턴 분석시스템)

  • Jeong, Se-Young;Lee, Byung-Kwon
    • The KIPS Transactions:PartA
    • /
    • v.17A no.4
    • /
    • pp.181-188
    • /
    • 2010
  • In this study, we suggest the system to analyze network users' action patterns by using Data-Mining Technique. We installed Network Tap to implement the analysis system of network action and copied the network packet. The copied packet is stored at the database through MainMemoryDB(MMDB) of the high-speed. The stored data analyze the users' action patterns by using Data-Mining Technique and then report the results to the network manager on real-time. Also, we applied the standard XML document exchange method to share the data between different systems. We propose this action pattern analysis system operated embedded type of SetToBox to install easily and support low price.

Design and Performance Evaluation of Data Models for the XML Document Management (XML 문서관리를 위한 데이터 모델 설계 및 성능평가)

  • 유재수;손충범;조혜영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.5
    • /
    • pp.59-70
    • /
    • 2001
  • Recently, in various fields XML has been become a standard for information exchange in internet. Therefore, the researches on data modeling for storing and fetching the XML documents have been made actively. However, existing researches have weak points that they can support neither versioning nor fast fetching of documents while changing documents in dynamic environments. In this paper, we propose four kinds of hybrid data modeling schemes that combine fragmentation model and nonfragmentation model. Our data modeling schemes are suitable to dynamic environments. We also present guidelines that our hybrid data modeling schemes can be used for various applications. We shaw through various experiments that our hybrid schemes partially outperforms the existing modeling schemes in terms of insertion time, storage space and retrieval time.

  • PDF

Efficient Authorization Method for XML Document Security (XML 문서 보안을 위한 효율적인 권한부여 방법)

  • Jo, Sun-Moon;Chung, Kyung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.113-120
    • /
    • 2009
  • XML can supply the standard data type in information exchange format on a lot of data generated in running database or applied programs for a company by using the advantage that it can describe meaningful information directly. Therefore, as it becomes more and more necessary to manage and protect massive XML data in an efficient way, the development of safe XML access control techniques needs a new method. In this study access authorization policies are defined to design access control systems. The findings demonstrated that algorithm suggested in this study improved system performance which was low due to the complex authorization evaluation process in the existing access control techniques. It is consequently proved that the safe XML access control policy presented in this study is in an improved form as compared with the existing access control methods.

The Study of Models for Multimeia Digital rights Managements in Home Network (홈네트워크 환경에서의 멀티미디어 디지털 컨텐트 권한 관리 모델에 관한 연구)

  • Jung, Jong-Jin;Kim, Yun-Sang;Lim, Tae-Bum;Lee, Suk-Pil
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.518-520
    • /
    • 2006
  • Due to the rapid popularization of mobile multimedia devices and the Internet as well as the realization of high-speed data transmission and large-volume data recording media, high quality content distribution and ubiquitous information services are making progress and a new type of information distribution and network sharing service has gradually emerged into the market. It is capable of utilizing terabyte sized home servers also in private homes. Under these circumstances, in distribution of content over shared networks, it is crucial to establish DRM (Digital Rights Management) technologies to protect the content from illegal copying and usage. A truly successful DRM system must be built on open worldwide specifications and provide maximum interoperability and user acceptance. An open interoperability of DRM is able to construct highly expandable PKI based DRM, targeting usage between systems, considering the expansion of recent content distribution services and clients This document gives protocol specifications for the exchange of rights information between the DRM module, description of specifications for rights information and encrypted content formats.

  • PDF

Efficient Structural Information Extraction for XML Data (XML데이터를 위한 효율적인 구조 정보 추출 기법)

  • Min, Jun-Ki
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.285-292
    • /
    • 2007
  • There has been an increasing interest in n since it is spotlighted as the standard for data representation and exchange in the Web. The structural information for XML documents serves several important purposes. In spite of its importance, the schema is not mandatory for XML documents. Thus, much research to extract structural information for XML document has been conducted. In this paper, we present a technique for efficient extraction of concise and accurate DTD for XML documents. By restriction of DTD content model using the mixed content model of DTD and XML Schema as well as applying some heuristic rules proposed in this paper, we achieve the efficiency and conciseness. The result of an experiment with real life DTDs shows that our approach is superior to existing approaches.

Nominal Price Anomaly in Emerging Markets: Risk or Mispricing?

  • HOANG, Lai Trung;PHAN, Trang Thu;TA, Linh Nhat
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.125-134
    • /
    • 2020
  • This study examines the nominal price anomaly in the Vietnamese stock market, that is, whether stocks with low nominal price outperform stocks with high nominal price. Using a sample of all 351 companies listed on the Ho Chi Minh Stock Exchange (HOSE) from June 2009 to March 2018, we confirm our hypothesis and document that cheaper stocks yield higher subsequent abnormal returns. The results are robust after controlling for various stock characteristics that have been documented to be value-relevant in prior literature, including firm size, book-to-market ratio, intermediate-term momentum, short-term reversal, skewness, market risk, idiosyncratic risk, illiquidity and extreme daily returns, using both the portfolio analysis and the Fama-MacBeth cross-sectional regression. The negative effect persists in the long term (i.e., after up to 12 months), implying a slow adjustment of stock prices to their intrinsic value. Further analysis show that the observed nominal price anomaly is mainly driven by mispricing but not a latent risk factor proxied by stock price, thus the observed anomaly reflects a mispricing but not a fundamental risk. The study highlights the irrational behaviour of investors and market inefficiency in the Vietnamese stock market and provides important implication for investors in the market.

XML-Based Tourism Information System Using Mobile Agent under Distributed Environment (이동 에이전트를 이용한 분산환경 하에서의 XML-기반 관광정보시스템)

  • Lee Dong-Cheol;Choi Doug W.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.654-660
    • /
    • 2005
  • The internet is comprised of various users with diverse hardware and software platforms. This paper presents a tourism information system which enables the stable and reliable transmission of information over the dispersed, heterogeneous, and/or mobile platforms. The proposed system assumes XML as the basic document format since it has been accepted by W3C as the standard for information exchange on the internet This paper exploits the characteristics of JAVA and XML as they provide software applications independent of the platforms. The proposed system also deploys Aglet, a mobile agent developed by IBM, to ensure a dynamic and flexible performance of the system over the internet. The system provides the user oriented search and retrieval of tourism information, and also enables the reservation of various services and facilities with mobile devices.

Model of the ebXML-based BPSS Conformance Validation in B2B Enviroment (B2B 환경에서 ebXML 기반 BPSS 적합성 검증 모델)

  • Shin, Myeong-Sook;Choi, Jong-Sik;Ahn, Seong-Soo;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.113-117
    • /
    • 2007
  • Recently B2B electronic transactions which go through an Internet being diffused, according to support the Internet business of the form which is various the techniques for are appearing. B2B electronic transaction systems respect B2B transactions consequently to control the system of selfish bell environmnet and various information, must exchange. But currently the tentative tool for the verification of BPSS is the condition which is wholly lacking with the domestic foreign enemy. In this paper the suitability ebMS standard verification entry written in conjunction with ebXML BPSS document the suitability of the case, depending on the item to evaluate whether the BPSS model, suggesting that fitness will be verified.

  • PDF

Document Research for the Restoration of Traditional Acupunctural Methods (전통침구기법(傳統鍼灸技法)의 복원을 위한 문헌조사)

  • Oh, Jun Ho;Ahn, sang woo
    • The Journal of Korean Medical History
    • /
    • v.18 no.1
    • /
    • pp.103-126
    • /
    • 2005
  • 1) Objective This research is a process of examining the Traditional Acupunctural Methods left in our documents. The objectives of this paper are explaining the process of researching documents and reporting several points revealed in this process. 2) Process This study was done through the following steps: (1) We located the Acupunctural Methods in the original text database on the web. (2) We sorted them according to criterion. (3) We set up some standard clauses in order to organize the selected information. (4) We re-organized the information following the standards within the categories. (5) As for clauses that were not fully explained in the documents, we tried to restore them through other documents. 3) Results (1) 11 standard clauses were set up in order to organize the Traditional Acupunctural Methods. (2) Traditional Acupunctural Methods were extracted from 22 documents, (3) 24 Traditional Acupunctural Methods were extracted and organized by standards. (4) We learned of similar methods with resembling ways of drawing blood and methods with deep interest in the depth of needle insertion. Also, we were able to gain a clue to the exchange of Acupunctural Methods among the three Asian countries and the possibility of research using the Korean Medicine Database.

  • PDF