• Title/Summary/Keyword: Rule-chain

Search Result 96, Processing Time 0.029 seconds

A Study on the Importer Security Filing and Additional Carrier Requirements(10+2 rule) in U.S. (미국 관세청의 선적전 추가 보안관련 정보 제출법안(10+2 Rule)에 관한 연구)

  • Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.395-416
    • /
    • 2008
  • The advance information for oceangoing cargoes destined to th United States enable CBP to evaluate the potential risk of smuggling WMD and to facilitate the prompt release of legitimate cargo following its arrival in the Unites States. On January 1, 2008, CBP promulgate regulations, also known as 10+2 rule, to require the electronic transmission of additional data elements for improved high-risk targeting, including appropriate security elements of entry data for cargo destined to the United States by vessel prior to loading of such cargo on vessels at foreign seaports. The potential impact to an importer's international supply chain will be as follows ; Firstly, importers will take incremental supply chain costs and filing costs. Secondly, anticipate delay in shipment of containerized cargo. Thirdly, importers could be charged fines if they fail to file and file inaccurate or missing data. Companies exporting to the United States should be interested in 10+2 rule, analyze their current processes and procedures to ensure that they are prepared to handle the additional filing requirements of 10+2 rule. And they should focus on how 10+2 impacts their supply chain in terms of costs and sourcing. They will be necessary to revise service legal agreements with their forwarders, customs brokers or carriers in order to meet filing requirements of 10+2 rule.

  • PDF

Group Item Recommendation based on Generalized a Chain Rule (Generalized $\alpha$ chain rule에 기반한 Group Item Recommendation)

  • 염선희;조동섭
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10b
    • /
    • pp.241-243
    • /
    • 2001
  • 데이터 마이닝을 통해 우리는 숨겨진 지식, 예상되지 않았던 경향 그리고 새로운 법칙들을 방대한 데이터에서 이끌어내고자 한다. 본 논문에서 우리는 사용자들의 구매 트랜잭션을 시간에 따라 분석하여 동시에 구매되는 상품을 미리 예측하는 알고리즘을 제안하고자 한다. 기존의 방법들에서는 구매된 상품간의 시간차를 고려하지 않은 방법만을 제안해 왔다. 따라서 서로 연관되지 않은 상품군이 예측될 확률이 높았다. 본 논문에서 제안하고 있는 $\alpha$ chain rube에서는 일정 시간동안의 사용자들이 상품을 구매한 후 다음 상품을 구매할 때까지의 시간을 고려한다. 따라서 좀더 정확히 동시에 구매될 상품군을 예측할 수 있다. 본 논문은 제안하고 있는 $\alpha$ chain rule을 계산해 내는 알고리즘에 대해 주로 논의하겠다.

  • PDF

ATP Model Related CRM in SCM Environment (SCM환경에서 CRM을 이용한 ATP 모델 연구)

  • 박주식;김원식;남호기;박상민
    • Journal of the Korea Safety Management & Science
    • /
    • v.3 no.1
    • /
    • pp.45-56
    • /
    • 2001
  • In the supply chain, The ATP function doesn't only give customers to confirmation of delivery. It can be used by the core function with ATP rule that can reconcile supplies and demands on the supply chain. Therefore We can acquire the conformation about accuracy on the due date of supplier by using the ATP function of management about real and concurrent access on the supply chain, also can decide the affect about product availability due to forecasting or customer's orders through the ATP. This study analyze the data concerned with ATP and define the necessity on a SCM solution. Under the these environments, after defining the ATP rule that can improve the customer value and data flow related the CRM, we propose the advanced ATP model that proposes the method and classification system that can flexibly aggregate the ATP data with ATP rule on the supply chain.

  • PDF

Development of Rule-Based Malicious URL Detection Library Considering User Experiences (사용자 경험을 고려한 규칙기반 악성 URL 탐지 라이브러리 개발)

  • Kim, Bo-Min;Han, Ye-Won;Kim, Ga-Young;Kim, Ye-Bun;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.481-491
    • /
    • 2020
  • The malicious URLs which can be used for sending malicious codes and illegally acquiring private information is one of the biggest threat of information security field. Particularly, recent prevalence of smart-phone increases the possibility of the user's exposing to malicious URLs. Since the way of hiding the URL from the user is getting more sophisticated, it is getting harder to detect it. In this paper, after conducting a survey of the user experiences related to malicious URLs, we are proposing the rule-based malicious URL detection method. In addition, we have developed java library which can be applied to any other applications which need to handle the malicious URL. Each class of the library is implementation of a rule for detecting a characteristics of a malicious URL and the library itself is the set of rule which can have the chain of rule for deteciing more complicated situation and enhancing the accuracy. This kinds of rule based approach can enhance the extensibility considering the diversity of malicious URLs.

CONSTRUCTING GENE REGULATORY NETWORK USING FREQUENT GENE EXPRESSION PATTERN MINING AND CHAIN RULES

  • Park, Hong-Kyu;Lee, Heon-Gyu;Cho, Kyung-Hwan;Ryu, Keun-Ho
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.623-626
    • /
    • 2006
  • Group of genes controls the functioning of a cell by complex interactions. These interacting gene groups are called Gene Regulatory Networks (GRNs). Two previous data mining approaches, clustering and classification have been used to analyze gene expression data. While these mining tools are useful for determining membership of genes by homology, they don't identify the regulatory relationships among genes found in the same class of molecular actions. Furthermore, we need to understand the mechanism of how genes relate and how they regulate one another. In order to detect regulatory relationships among genes from time-series Microarray data, we propose a novel approach using frequent pattern mining and chain rule. In this approach, we propose a method for transforming gene expression data to make suitable for frequent pattern mining, and detect gene expression patterns applying FP-growth algorithm. And then, we construct gene regulatory network from frequent gene patterns using chain rule. Finally, we validated our proposed method by showing that our experimental results are consistent with published results.

  • PDF

Analysis and Compare for Control Charts Under the Changed Alarm Rule

  • Haiyu Wang;Jichao Xu;Park, Young H.
    • International Journal of Quality Innovation
    • /
    • v.4 no.2
    • /
    • pp.65-72
    • /
    • 2003
  • This paper mainly studies to build control charts under different alarm rule. For different alarm rule, the control limit parameters of a control chart should be changed, then some kinds of control schemes under different alarm rule were compared and the methods of calculating ARL for different control schemes were given.

An Inventory Rationing Method in a M-Store Regional Supply Chain Operating under the Order-up-to Level System

  • Monthatipkul, Chumpol
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.2
    • /
    • pp.80-92
    • /
    • 2009
  • This paper addresses the inventory rationing issue embedded in the regional supply chain inventory replenishment problem (RSIRP). The concerned supply chain, which was fed by the national supply chain, consisted of a single warehouse distributing a single product to multiple stores (M-stores) with independent and normally distributed customer demand. It was assumed that the supply chain operated under the order-up-to level inventory replenishment system and had only one truck at the regional warehouse. The truck could make one replenishment trip to one store per period (a round trip per period). Based on current inventories and the vehicle constraint, the warehouse must make two decisions in each period: which store in the region to replenish and what was the replenishment quantity? The objective was to position inventories so as to minimize lost sales in the region. The warehouse inventory was replenished in every fixed-interval from a source outside the region, but the store inventory could be replenished daily. The truck destination (store) in each period was selected based on its maximum expected shortage. The replenishment quantity was then determined based on the predetermined order-up-to level system. In case of insufficient warehouse inventories to fulfill all projected store demands, an inventory rationing rule must be applied. In this paper, a new inventory rationing rule named Expected Cost Minimization (ECM) was proposed based on the practical purpose. The numerical results based on real data from a selective industry show that its performance was better and more robust than the current practice and other sharing rules in the existing literature.

A Performance Comparison between Operation Strategies for Idle Vehicles in Automated Guided Vehicle System

  • Kim, Kap-Hwan;Kim, Jae-Yeon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.23 no.2
    • /
    • pp.67-81
    • /
    • 1998
  • An Automated Guided Vehicle System (AGVS) with a unidirectional loop guide path is modeled as a discrete-time stationary Markov chain. It is discussed how to estimate the mean response time, the utilization, and the cycle time of AGV for a delivery order. Three common operation strategies for idle vehicles - central zone positioning rule, circulatory loop positioning rule and point of release positioning rule - are analyzed. These different operation strategies are compared with each other based on the performance measures.

  • PDF

Design of Capable to Promise Using Lifetime Value (고객생애가치를 이용한 납기확약 모델 구현에 관한 연구)

  • 박재현;양광모;강경식
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.2
    • /
    • pp.71-81
    • /
    • 2002
  • Today's environment of enterprise is changing. They have to face customer' demands with the right product, the right service and supply them at the right time. And also cut down logistics and inventory cost and bring up the profit as much as they can. This means the change of putting enterprise first in importance to putting customer first importance. therefore to correspond to customer's demand, shorting lead time is becoming a essential condition. The answer to this changes of environment is supply chain management. In the Supply chain, The ATP function doesn't only give customers to conformation of delivery. It can be used by the core function with ATP rule that can reconcile supplies and demands on the supply chain. Therefore We can be acquire the conformation about on the due date of supplier by using the ATP function of management about real and concurrent access on the supply chain, also decide the affect about product availability due to forecasting or customer's orders through the ATP. In this paper, It consolidates the necessity on a CTP and analyzes data which is concerned of ATP. Under the these environments, defines the ATP rule that can improve the customer value and data flow related the LTV(Life Time Value) and builds on a algorithm.

Transaction Pattern Discrimination of Malicious Supply Chain using Tariff-Structured Big Data (관세 정형 빅데이터를 활용한 우범공급망 거래패턴 선별)

  • Kim, Seongchan;Song, Sa-Kwang;Cho, Minhee;Shin, Su-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.121-129
    • /
    • 2021
  • In this study, we try to minimize the tariff risk by constructing a hazardous cargo screening model by applying Association Rule Mining, one of the data mining techniques. For this, the risk level between supply chains is calculated using the Apriori Algorithm, which is an association analysis algorithm, using the big data of the import declaration form of the Korea Customs Service(KCS). We perform data preprocessing and association rule mining to generate a model to be used in screening the supply chain. In the preprocessing process, we extract the attributes required for rule generation from the import declaration data after the error removing process. Then, we generate the rules by using the extracted attributes as inputs to the Apriori algorithm. The generated association rule model is loaded in the KCS screening system. When the import declaration which should be checked is received, the screening system refers to the model and returns the confidence value based on the supply chain information on the import declaration data. The result will be used to determine whether to check the import case. The 5-fold cross-validation of 16.6% precision and 33.8% recall showed that import declaration data for 2 years and 6 months were divided into learning data and test data. This is a result that is about 3.4 times higher in precision and 1.5 times higher in recall than frequency-based methods. This confirms that the proposed method is an effective way to reduce tariff risks.