• Title/Summary/Keyword: Model Requirements

Search Result 2,626, Processing Time 0.034 seconds

Applicability of Blockchain based Bill of Lading under the Rotterdam Rules and UNCITRAL Model Law on Electronic Transferable Records

  • Yang, Jung-Ho
    • Journal of Korea Trade
    • /
    • v.23 no.6
    • /
    • pp.113-130
    • /
    • 2019
  • Purpose - This paper investigates applicability of blockchain based bill of lading under the current legal environment. Legal requirements of electronic bill of lading will be analyzed based on the Rotterdam Rules and recently enacted UNCITRAL Model Law on Electronic Transferable Records. Using comparative analysis with the previous registry model for electronic bill of lading, this paper examines the advantages of blockchain based bill of lading. Design/methodology - This research reviewed previous efforts for dematerializing bill of lading with its limitation. Main features of blockchain technology which can make up for deficiencies of registry model also be investigated to analyze whether these features can satisfy the requirements for the legal validity of the negotiable electronic transport record or electronic transferable records under the Rotterdam Rules and the MLETR. Findings - Main findings of this research can be summarized as follows: Blockchain system operated in an open platform can improve transparency and scalability in transfer of electronic bill of lading by assuring easy access for transaction. Distributed ledger technology of blockchain makes it more difficult to forge or tamper with transactions because all participants equally shares identical transaction records. Consensus mechanism and timestamp in a blockchain transaction guarantee the integrity and uniqueness of a transaction. These features are enough to satisfy the requirements of electronic transferable records under the Rotterdam Rules and MLTER. Originality/value - This study has significance in that it provided implications for the introduction of electronic bill of lading by analyzing whether the blockchain based electronic bill of lading model meets the legal requirements under the current legal system prepared prior to the introduction of blockchain technology, and by presenting the advantages of the blockchain based bill of lading model through comparative analysis with the existing registry model.

Studies on the Operating Requirements of Multi-Resolution Modeling in Training War-Game Model and on the Solutions for Major Issues of Multi-Resolution Interoperation between Combat21 Model and TMPS (훈련용 워게임 모델의 다중해상도모델링 운영소요 및 전투21모델과 TMPS의 다중해상도 연동간 주요 이슈 해결 방안 연구)

  • Moon, Hoseok;Kim, Suhwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.865-876
    • /
    • 2018
  • This study focuses on the operating requirements of multi-resolution modeling(MRM) in training war-game model and proposes solutions for major issues of multi-resolution interoperation between Combat21 model and tank multi-purpose simulator(TMPS). We study the operating requirements of MRM through interviews with defense M&S experts and literature surveys and report the various issues that could occur with low-resolution model Combat21 and high-resolution model TMPS linked, for example, when to switch objects, what information to exchange, what format to switch to, and how to match data resolutions. This study also addresses the purpose and concept of training using multi-resolution interoperation, role of each model included in multi-resolution interoperation, and issue of matching damage assessments when interoperated between models with different resolutions. This study will provide the common goals and directions of MRM research to MRM researchers, defense modeling & simulation organizations and practitioners.

An Evaluation Method for Security Policy Model Based on Common Criteria (공통평가기준에 의한 보안정책모델 평가방법)

  • 김상호;임춘성
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.57-67
    • /
    • 2003
  • Security Policy Model is a structured representation using informal, semiformal or formal method of security policy to be enforced by TOE. It provides TOE to get an assurance to mitigate security flaws resulted from inconsistency between security functional requirements and functional specifications. Therefore, Security Policy Model has been required under an hish evaluation assurance level on an evaluation criteria such as ISO/IEC 15408(Common Criteria, CC). In this paper, we present an evaluation method for security policy model based on assurance requirements for security policy model in Common Criteria through an analysis of concepts, related researches and assurance requirements for security policy model.

A Study on the Investment Priority Using Kano Analysis and AHP (AHP를 이용한 Kano 품질요소의 투자우선순위 결정에 관한 연구)

  • 임성욱;양정희
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.2
    • /
    • pp.199-209
    • /
    • 2004
  • Kano(1984) distinguishes five types of Quality requirement which influence customer satisfaction; Attractive, One-dimensional, Must-be, Indifferent, Reverse Quality element. Attractive requirements lead more than proportional satisfaction. Attractive Quality requirements are the key factors of order winner and the sources of customer delight. Attractive requirements do not influence customer satisfaction equally. This study presents Kano's model using AHP(Analysis Hierarchy Process) for the priorities of attractive Quality requirements.

Simulation of Rice Circulating Concurrent-flow Dryer (벼의 순환병류건조기(循環竝流乾操機)의 시뮬레이션)

  • Keum, D.H.;Lee, W.S.
    • Journal of Biosystems Engineering
    • /
    • v.13 no.3
    • /
    • pp.59-70
    • /
    • 1988
  • A computer simulation model for rice circulating concurrent-flow dryer was developed and verified by conduction a series of pilot-scale experiment. The effects of design parameter and operating conditions on dryer performance were analyzed by using simulation. The results indicated that the developed model was found suitable for analyzing operating characteristics. The other results from simulation also showed that; 1) an increse in the initial moisture content resulted in an increase in the drying rate and a reduction in the grain temperature and total energy requirements. 2) an increase in the drying air temperature resulted in an increase in the drying rate and grain temperature. 3) an increase in air flow rate resulted in an radical increase in drying rate, fan power requirements and total energy requirements but an radical decrease in final head rice yield. 4) an increase in the bed depth resulted in an increase in fan power requirements and a lowering of the final head rice yield.

  • PDF

The Determination of Replacement Requirements for 1/4ton Truck by Using Markov Chain Process (마코프체인 과정을 이용한 1/4ton 기동장비의 대체소요량 결정)

  • Lee Sun-Gi;Min Gye-Ryo
    • Journal of the military operations research society of Korea
    • /
    • v.17 no.1
    • /
    • pp.1-24
    • /
    • 1991
  • This report concerns the study of deciding replacement requirements for 1/4ton truck in Korea. Two causes of replacement, accidental loss and wearout are considered in the replacement requirements model which was developed in Defence Logistics Agency. The model represents the state of 1/4 ton truck inventory over time as a finite Markov chain process. An accidental loss rate, yearly usage rates. wearout rates are used in conjuction with the current mileage distribution of the inventory to forecast replacement requirements in future time periods.

  • PDF

A Case study of the requirement verification model development for High Speed Railway Systems (고속철도시스템 요구사항 검증 모델 개발 사례)

  • Jeong, Jae-Deok;Lee, Jae-Cheon;Kim, Chan-Muk;Yun, Jae-Han;Wang, Jong-Bae;Choe, Yo-Cheol
    • 시스템엔지니어링워크숍
    • /
    • s.6
    • /
    • pp.126-129
    • /
    • 2005
  • Systems engineering requirement verification model developmetn for High Speed Railway systems in progress is a national large system development program that is not only large-size and complex but also multi-disciplinary in nature. For the High Speed Railway TEP development, verification requirements that could verify system function, performance, and constraint, should be derived from SSS(system Segment specification). Hereafter, this could be referred to as verification requirements. System engineering process establishes traceability between verification requirements and system requirements. These tasks could be accomplished by the schema. using computer-aided Systems Engineering tool(CORE), High Speed Railway program can become a database and other system related to High Speed Railway program will be developed effectively and efficiently.

  • PDF

The Effect of Initial Margin on Long-run and Short-run Volatilities in Japan

  • Kim, Sangbae;Jung, Taehun
    • East Asian Economic Review
    • /
    • v.17 no.3
    • /
    • pp.311-332
    • /
    • 2013
  • This paper examines the effect of initial margin requirements on long-run and short-run volatilities in the Japanese stock market using the Component GARCH model. Our empirical results show that when we do not divide the margin requirement into positive and negative changes, increasing margin requirement is effective for reducing long-run volatility, while not effective in short-run volatility. However, separating the positive and negative changes in margin requirements reveals the fact that the negative changes in margin requirements decrease long-run volatilities, while the higher margin requirements increase short-run volatilities in the Japanese stock market. This suggests that if the Japanese financial authorities intend to increase margin level to reduce volatility, unexpectedly, short-run volatility would be even higher.

A Solution Procedure for Designing Automated Storage/Retrieval Systems (자동창고 설계를 위한 최적화 모델 및 해법에 관한 연구)

  • 나윤균
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.18 no.34
    • /
    • pp.9-14
    • /
    • 1995
  • A cost minimization model for designing AS/RS (Automated Storage/Retrieval Systtems) has been developed under the S/R (Storage/Retrieval) machine throughput rate and total storage capacity requirements. The objective function includes S/R machine cost storage rack cost, and interface conveyor cost. Since the model is a nonlinear integer programming problem which is very hard to solve with large problem size, the model is simplified using previous research results to be solved exactly and a simultion procedure is combined to verify that throughput rate requirements are satisfied.

  • PDF

A Methodology for CC-based Security Requirements Analysis and Specification by using Misuse Case Model (Misuse Case 모델을 이용한 CC기반의 보안요구사항 분식 및 명제 방법론)

  • 최상수;장세진;최명길;이강수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.85-100
    • /
    • 2004
  • All information system is information security system that enforced security function. To improve qualify of information security system, suity requirement analysis and specification must be Performed by consistently and typically at early requirement analysis step. In this paper, we propose a security requirements analysis and specification model and process by using Misuse Case Model that extends UML's Use Case Model. And, we propose a cost-effective security product selection algorithm that security product is sufficient of all constructed security functional requirements. It may raise quality of information security system that developed through proposed model and process.