• Title/Summary/Keyword: Service chain

Search Result 914, Processing Time 0.029 seconds

A Real-Time Surveillance System for Vaccine Cold Chain Based o n Internet of Things Technology

  • Shao-jun Jiang;Zhi-lai Zhang;Wen-yan Song
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.394-406
    • /
    • 2023
  • In this study, a real-time surveillance system using Internet of Things technology is proposed for vaccine cold chains. This system fully visualizes vaccine transport and storage. It comprises a 4G gateway module, lowpower and low-cost wireless temperature and humidity collection module (WTHCM), cloud service software platform, and phone app. The WTHCM is installed in freezers or truck-mounted cold chain cabinets to collect the temperature and humidity information of the vaccine storage environment. It then transmits the collected data to a gateway module in the radiofrequency_physical layer (RF_PHY). The RF_PHY is an interface for calling the bottom 2.4-GHz transceiver, which can realize a more flexible communication mode. The gateway module can simultaneously receive data from multiple acquisition terminals, process the received data depending on the protocol, and transmit the collated data to the cloud server platform via 4G or Wi-Fi. The cloud server platform primarily provides data storage, chart views, short-message warnings, and other functions. The phone app is designed to help users view and print temperature and humidity data concerning the transportation and storage of vaccines anytime and anywhere. Thus, this system provides a new vaccine management model for ensuring the safety and reliability of vaccines to a greater extent.

User Privacy management model using multiple group factor based on Block chain (블록 체인 기반의 다중 그룹 요소를 이용한 사용자 프라이버시 관리 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.107-113
    • /
    • 2018
  • With the rapid development of big data and Internet technologies among IT technologies, it is being changed into an environment where data stored in the cloud environment can be used wherever the Internet is connected, without storing important data in an external storage device such as USB. However, protection of users' privacy information is becoming increasingly important as the data being processed in the cloud environment is changed into an environment that can be easily handled. In this paper, we propose a user-reserving management model that can improve the user 's service quality without exposing the information used in the cloud environment to a third party. In the proposed model, user group is grouped into virtual environment so that third party can not handle user's privacy information among data processed in various cloud environments, and then identity property and access control policy are processed by block chain.

Big Data Processing Scheme of Distribution Environment (분산환경에서 빅 데이터 처리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.311-316
    • /
    • 2014
  • Social network server due to the popularity of smart phones, and data stored in a big usable access data services are increasing. Big Data Big Data processing technology is one of the most important technologies in the service, but a solution to this minor security state. In this paper, the data services provided by the big -sized data is distributed using a double hash user to easily access to data of multiple distributed hash chain based data processing technique is proposed. The proposed method is a kind of big data data, a function, characteristics of the hash chain tied to a high-throughput data are supported. Further, the token and the data node to an eavesdropper that occurs when the security vulnerability to the data attribute information to the connection information by utilizing hash chain of big data access control in a distributed processing.

Relay Station based Optimal Handoff Prioritization Control Algorithm (Relay Station 기반 최적 핸드오프 우선화 제어 알고리즘)

  • Yu, Hye-In;Kang, Hae-Lynn;Kim, Nak-Myeong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.7
    • /
    • pp.24-31
    • /
    • 2009
  • Resource reservation scheme is an effective method to guarantee QoS for handoff calls in the next generation multimedia mobile communication systems, but it causes negative impacts on blocking probability of new calls. In this paper, to optimize the tradeoff between dropping probability of handoff calls and blocking probability of new calls, relay station based handoff prioritization control algorithm is proposed. In this algorithm, the relay station participates in handoff procedure and enables mobile stations to have guaranteed prompt service after handoff by providing highly efficient data transmission. In this paper, Markov chain models of the proposed handoff prioritization schemes are developed, and dropping probability of handoff packets and blocking probability of new packets are derived. By numerical analysis, the proposed algorithm has been proved to outperform conventional handoff prioritization schemes in terms of dropping probability of handoff packets and blocking Probability of new packets.

Purchasing Type and Sale Strategies for High Quality Ice Creams of University Students in Seoul.Kyonggi Area (수도권 대학생들의 고급 아이스크림에 대한 구매 성향과 이에 따른 판매 전략)

  • Jung, Bu-Won;Lee, Hyun-Ja;Kang, Kun-Og
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.19 no.3
    • /
    • pp.451-458
    • /
    • 2009
  • This study surveyed university students in the Seoul and Kyonggi areas about their purchasing types and sale strategies for high quality ice cream products. The desire to buy new high quality ice cream was "moderate" (35.4%) followed by "quite a lot" (29.4%), showing that the students' interests and their desires for new high quality ice cream items were high. Among things to consider when buying ice cream, 39.2% answered that "taste" was most important, When the subjects were asked if they planned on revisiting an ice cream shop chain. 38.6% answered "quite a lot" or "very much" reflecting that their opinion on the image and service of the ice cream shop chain were very good. As for the influence of seasons on their purchasing of ice cream products, three times more students responded "quite a lot" or "very much" at 51.6% compared to "somewhat little" or "very much" (17.8%), showing that the subjects were responsive to seasonal influences, The subjects were also three times more likely (73.0%) to visit a cafe-type high quality ice cream store chain, Therefore such cafe-type chains are a way to increase sales and to overcome seasonal influences on purchasing. Finally the favorite food to eat with ice cream was cookies (51.3%).

  • PDF

A Exploratory Study on Analyzing the Multi-Dimensional Effectiveness of Broadband Network of Korea (국내 초고속정보통신망의 파급효과분석에 관한 탐색적 연구)

  • Jeong, Yong-Gwan;Kim, Yoo-Jung
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.1-24
    • /
    • 2004
  • This paper develops a framework for analyzing the effectiveness of broadband network from the value chain view. The value chain of broadband network is composed of activities such as broadband network building, application/equipments development, information systems utilization. The effectiveness from the interaction between these activities are defined as the effectiveness of informatization(private and public sector) and the effectiveness of IT Industry(effects on production on inducement of broadband carriers, IT equipments and service market creation, online digital contents market creation). For testing its real-world applicability, a case study is performed on the broadband network of Korea and the effectiveness of the framework for analyzing the effectiveness of broadband network is demonstrated.

Functional Analysis of Production Planning & Scheduling Solutions from SCM Perspective (공급망 관리 관점에서의 생산계획 솔루션 기능 분석)

  • Han, Kwan Hee
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.564-573
    • /
    • 2018
  • External environment of enterprises are rapidly changing brought about mainly by global competition, cost and profitability pressures, and emerging new technology. In particular, frequent change of customer requirements is a tough challenge to manufacturing company. To cope with these challenges, a production planning and scheduling (PP&S) function might be established to provide accountability for both customer service and operational efficiency. PP&S deals with short-term decision making in the production process of whole supply chain. The task of PP&S is to seek a balance between customer orders and limited resources. At present, many PP&S software solutions have been utilized in many enterprises to generate a realistic production plan and schedule efficiently. The aim of this paper is to analyze the PP&S functionalities and its system architecture from the perspective of SCM (Supply Chain Management), and propose the PP&S solution classification framework to facilitate the comparison among various solutions.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

Sustainability Criteria Identified in the Global Sourcing Practices of Global Fashion Retailers (글로벌 패션 기업의 해외 소싱 프로세스에서 나타난 지속 가능성 기준)

  • Lee, Ji Yeon
    • Fashion & Textile Research Journal
    • /
    • v.24 no.2
    • /
    • pp.206-216
    • /
    • 2022
  • This study sought to examine the sustainability criteria found in the global sourcing practices of global fashion retailers. Sustainable supply chain management, with a particular focus on the sustainability criteria of global sourcing, was analyzed. This qualitative study was based on a focus group interview and corporate social responsibility (CSR) annual reports. Eight master categories, 18 middle categories, and 37 bottom categories were extracted. The key categories and their middle categories were as follows: (1) Social compliance (working conditions, employment, safety); (2) Environment concerns (environmental pollution management, eco-friendly production, supply chain environment); (3) Energy efficiency (energy saving program, store environment); (4) Consumer protection (restricted substances management, consumer product safety improvement); (5) Management system (code of conduct, triangle audit system); (6) Community social activities (local community service, voluntary activities, charitable activities); (7) External stakeholder engagement (media & non-governmental organization management, maintenance of relationship with local authority); (8) Brand protection (respect for companies' intellectual property). The findings of this study offer academically significant insights into the sustainability criteria that can be encountered by companies under diverse global sourcing scenarios, revealing that global sourcing by fashion retailers is not merely a means of reducing costs, but a way of generating new jobs and making a social contribution to developing countries. The study's findings also have practical significance, offering guidelines for general CSR activities in the global sourcing process.

A study on domestic small-medium sized company's case of assimilation with global value chain (국내 중소기업의 글로벌 가치사슬 편입사례 및 지원과제에 관한 연구)

  • Lee, Joon-Ho;Choi, Jeong-Il;Lee, Ok-Dong
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.159-175
    • /
    • 2014
  • The proliferation of GVC(Global Value Chain) requires the changes of paradigm on national industrial strategy and trade. It also provides multiple implications on business strategy. The business itself is the main agent which recognizes environmental change and establishes counterstrategy. This study is based on the necessity of support for small-medium sized companies in governmental level, since they are personally and materially vulnerable. This study is emphasize on deriving matching tasks of supporting globalization of companies at governmental level. The spread of GVC requires policy makers' comprehensive view and inspires us that we should focus and provide strategic supports on not only manufacturing business but also high valued service industry as well. The government should provide supporting policies for expansion of globalization of companies. The proliferation of GVC means to enter into the chain which creates high values. This is exactly the same as the paradigm of creative economy which our government pursues constantly.