• Title/Summary/Keyword: IT Logistics

Search Result 2,186, Processing Time 0.026 seconds

Workflow Analysis for the Process Modeling of RFID Systems (RFID 시스템의 프로세스 모델링을 위한 워크플로우 분석방안)

  • Kim, Hoon-Tae;Lee, Yong-Han
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.2
    • /
    • pp.191-203
    • /
    • 2010
  • Recently applications of RFID technologies in production and logistics systems are expanding. In this research, we deal with workflow modeling methods for handling RFID-tagged parts. We verified that the material flow processes in a RFID system can be designed and assessed using workflow modeling notations, and suggested available process patterns using BPMN. In addition, we proposed an algorithm to monitor the exact status of flows and determine whether some of the events are ghost reads or not by referring predefined workflow definitions. The major contribution of this research is that it has demonstrated how well-established workflow modeling methods can be applied to RFID-based systems.

A Study on Integration and Application Plans of Address and Location Information (주소정보와 위치정보의 통합 및 활용 방안 연구)

  • Chang, Tai-Woo
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.2
    • /
    • pp.93-105
    • /
    • 2010
  • Address and location information is gaining importance as a channel between business entities and customers. However, as the new address scheme, which is based on street name and building number, is deployed, various problems occurred in the areas of postal service, logistics and management of customer information. And therefore it is necessary to make plans for integration and application of address information and location information. In this study, we clearly identify the problems when the governments and companies manage the address and location information under the circumstances of new address system. And we suggest improvement plans from the viewpoint of code scheme and database linkage.

The Analysis of Factors Affecting Test and Evaluation in Domestic Purchase Program (국내 구매사업 시험평가에 미치는 영향요인 분석)

  • Park, Jong Wan
    • Journal of Applied Reliability
    • /
    • v.15 no.4
    • /
    • pp.222-232
    • /
    • 2015
  • Purpose : The purpose of this study is to analyse affecting factors of Test and Evaluation and to improve the institution of Test and Evaluation in the Domestic purchase program. Methods : The domestic acquisition program is currently small in terms of size, but it is gradually increasing every year. Still, the domestic purchase program has insufficient regulations and procedures compared to the other procurement methods including research & development. Various problems are likely to occur between test and evaluation group, and defense industries regarding the regulations during Test & Evaluation. Therefore, the regulations and methods need to be amended to upgrade the current domestic purchase program into an effective and flawless one. In this paper, six variables have been chosen by the help of experts working in Ministry of National Defense (MND), Joint Chiefs of Staff (JCS), Army Headquarters and DAPA. Results : The six variables are effectiveness of proposal evaluation, fairness of test and evaluation, sufficiency of operational capabilities, seasonal period of test and evaluation, fulfillment in Integrated Logistics Support (ILS) of the industries, and guaranteeing appropriate environment for related enterprises' participation. Conclusion : This paper can help defense industries to enhance their development capabilities, and to perform tests more fairly and effectively considering the key factors identified in this research.

The Construction of Service Chain Management for Optimizing Service Quality in After-Sales Service (사후서비스부문의 서비스품질 최적화를 위한 서비스사슬관리 구축)

  • Lee, Cheol-Gyu;Kim, Min-Jung;Yoo, Wang-Jin
    • Journal of Korean Society for Quality Management
    • /
    • v.33 no.4
    • /
    • pp.12-20
    • /
    • 2005
  • Supply chain management is a total systems approach to delivering manufactured products to the end customer. Using information technology to coordinate all elements of the supply chain from parts suppliers to retailers achieves a level of integration that is a competitive advantage not available in traditional logistics systems. On the other hand, service chain management is an analogous systems approach that is especially suitable for delivering mobile services such as parcel delivery, cable installation, and home health care. The key elements that distinguish service supply chain management from supply chain management are bidirectional optimization, management of productive capacity, and management of perishability. The purpose of this study is to maintain the construction of service chain management by proving that service quality in after-sales service can be improved through service chain management. First of all, supply chain management, service quality, and service chain management were introduced in theoretical research. In empirical research, it was selected the domestic enterprise that produce electronic appliances with after-sales service, and some customers using the enterprise's after-sales service in the metropolitan area were selected as a sample by convenience sampling method and examined.

The Effect of Zirconia Particle Size on Mechanical Properties of Zirconia Toughened Alumina (ZrO2의 분말크기가 ZTA의 기계적 물성에 미치는 영향)

  • Sohn, Jeongho;Shin, Hyung-Sup
    • Korean Journal of Materials Research
    • /
    • v.24 no.12
    • /
    • pp.652-657
    • /
    • 2014
  • The purpose of this study was to investigate the microstructures and mechanical properties of zirconia toughened alumina (ZTA) ceramics prepared from two kinds of 3Y-TZP powders. ZTA composites were prepared by adding two kinds of 3Y-TZP powders, 3YEH (BET = $7m^2/g$) and 3YEM (BET = $16m^2/g$), to ${\alpha}$-alumina in the range of 5-25 wt%. It was found that the microstructure photographs of the ZTA composites showed that the average grain size of alumina decreased as the content of zirconia increased. In our present study, specimens containing 3YEM zirconia exhibited smaller grain sizes compared to those of 3YEH zirconia. The Vickers hardness of the ZTA composites that were sintered at $1600^{\circ}C$ for 2 hrs was found to smoothly decrease with increasing zirconia content because of the low Young modulus in zirconia. The Vickers hardness of the ZTA containing 3YEH zirconia was greater than that of the 3YEM zirconia. In substance, the fracture toughness ($K_{1c}$) of the ZTA composites increased as the content of zirconia increased. The fracture toughness ($K_{1c}$) of ZTA containing 3YEM zirconia was greater than that of 3YEH zirconia.

An Energy Saving Method Using Cluster Group Model in Wireless Sensor Networks (무선 센서 네트워크에서 클러스터 그룹 모델을 이용한 에너지 절약 방안)

  • Kim, Jin-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.4991-4996
    • /
    • 2010
  • Clustering method in wireless sensor network is the technique that forms the cluster to aggregate the data and transmit them at the same time that they can use the energy efficiently. Even though cluster group model is based on clustering, it differs from previous method that reducing the total energy consumption by separating energy overload to cluster group head and cluster head. In this thesis, I calculate the optimal cluster group number and cluster number in this kind of cluster group model according to threshold of energy consumption model. By using that I can minimize the total energy consumption in sensor network and maximize the network lifetime. I also show that proposed cluster group model is better than previous clustering method at the point of network energy efficiency.

A Clustering Method Considering the Threshold of Energy Consumption Model in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 소모 모델의 임계값을 고려한 클러스터링 기법)

  • Kim, Jin-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3950-3957
    • /
    • 2010
  • Wireless sensor network is composed of sensor node with limited sources, and to maintain and repair is vexatious once made up. Accordingly it is important matter to maximize the network lifetime by minimizing the energy consumption in wireless sensor network, and utilizing the limited sources efficiently. In this paper, I propose a technique arranging the cluster number with efficiency in clustering method to optimize the energy consumption. The energy usage needed for wireless transmission varies in distance(threshold). This technique reduces the energy consumption considering the threshold when arranging the cluster number. I verify that the clustering method organized through the valid processes outperform the LEACH(Low-Energy Adaptive Clustering Hierarchy) in total energy consumption.

A New Effective SAP ERP Education Approach Through The Development of Educational Virtual Company (SAP ERP 시스템 교육을 위한 교육용 가상기업 구현 전략)

  • Kim, Yeong-Real
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.1
    • /
    • pp.49-58
    • /
    • 2011
  • Among the various ERP solutions, SAP R/3 solution has been chosen because SAP system follows global standard processes which include most of business solutions for various industries. The ERP education is limited by learning theory only and they are not sufficient for understanding wide scale of business processes. Real world scenarios with hands on experience approach will be the core aspect of this article. As per real world scenarios, "ChungBuk Motors. Corp." has been created and students are asked to create the organization structure and the procurement process for this virtual enterprise. As a result, students attending this class showed better understanding of overall ERP system comparing to the students attended other ERP classes. The hands-on experience with real-world scenarios proved that it is most practical and efficient solution for educating ERP system.

An Empirical Study on the Efficiency of Major Container Ports with DEA Model (DEA 모형을 이용한 세계 주요 항만의 효율성 평가)

  • Song Jae-Young;Sin Chang-Hoon
    • Journal of Navigation and Port Research
    • /
    • v.29 no.3 s.99
    • /
    • pp.195-201
    • /
    • 2005
  • This paper presents the measurement of efficiency for container ports. Data envelopment analysis(DEA), as it is called, has particular applicability in the service sector. Applying mathematical programming techniques, DEA enables relative efficiency ratings to be derived within a set of analysed units. This paper investigates the efficiency employing DEA Model on data for 53 container ports covering 1995-2001 in the world and the change in efficiency for 7 years. As a results, port of Busan was evaluated as inefficiency port compare with major ports of the world except 1995year and 1996year. But After 1997year, efficiency of Busan port is increasing somewhat better every year.

Design of protocol for RFID/USN security (RFID/USN 보안을 위한 프로토콜 설계)

  • Park, Sang-Hyun;Park, Sang-Min;Shin, Seung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.3
    • /
    • pp.103-109
    • /
    • 2007
  • Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.