• Title/Summary/Keyword: Service chain

Search Result 914, Processing Time 0.026 seconds

Priority MAC based on Multi-parameters for IEEE 802.15.7 VLC in Non-saturation Environments

  • Huynh, Vu Van;Le, Le Nam-Tuan;Jang, Yeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.224-232
    • /
    • 2012
  • Priority MAC is an important issue in every communication system when we consider differentiated service applications. In this paper, we propose a mechanism to support priority MAC based on multi-parameters for IEEE 802.15.7 visible light communication (VLC). By using three parameters such as number of backoff times (NB), backoff exponent (BE) and contention window (CW), we provide priority for multi-level differentiated service applications. We consider beacon-enabled VLC personal area network (VPAN) mode with slotted version for random access algorithm in this paper. Based on a discrete-time Markov chain, we analyze the performance of proposed mechanism under non-saturation environments. By building a Markov chain model for multi-parameters, this paper presents the throughput and transmission delay time for VLC system. Numerical results show that we can apply three parameters to control the priority for VLC MAC protocol.

Specific detection of salmonella enteritidis using polymerase chain reaction method (PCR을 이용한 salmonella enteritidis의 특이적 검출)

  • 조미영;여용구;김영섭;이정학;이병동
    • Korean Journal of Veterinary Service
    • /
    • v.23 no.3
    • /
    • pp.227-233
    • /
    • 2000
  • Salmonella enteritidis is the most prevalent etiologic agents of foodborne acute gastroenteritis. Direct isolation and identification of S enteritidis are time consuming work and not so highly sensitive. This study was conducted to develop for the specific detection of S enteritidis using polymerase chain reaction(PCR). PCR primers were selected to amplify a 351-base pair(bp) DNA fragment from the salmonella plasmid virulence A(spv A) gene of S enteritidis. With the primers, 351 bp DNA products were amplified from S enteritidis but not from other B, D, Cl serogroup Salmonella spp. It was sensitive to detect up to 40 pg of template DNA by agarose gel electrophoresis. This PCR assay is very rapid and specific method and less time consuming than the standard bacteriological methods.

  • PDF

Optimal Routing and Uncertainty Processing using Geographical Information for e-Logistics Chain Execution

  • Kim, Jin Suk;Ryu, Keun Ho
    • Management Science and Financial Engineering
    • /
    • v.10 no.2
    • /
    • pp.1-28
    • /
    • 2004
  • The integrated supply chain of business partners for e-Commerce in cyber space is defined as Logistics Chain if the cooperative activities are logistics-related. Logistics Chain could be managed effectively and efficiently by cooperative technologies of logistics chain execution. In this paper, we propose a routing and scheduling algorithm based on the Tabu search by adding geographical information into existing constraint for pick-up and delivery process to minimize service time and cost in logistics chain. And, we also consider an uncertainty processing for the tracing of moving object to control pick-up and delivery vehicles based on GPS/GIS/ITS. Uncertainty processing is required to minimize amount of telecommunication and database on vehicles tracing. Finally, we describe the Logistics Chain Execution (LCE) system to perform plan and control activities for postal logistics chain. To evaluate practical effects of the routing and scheduling system, we perform a pretest for the performance of the tabu search algorithm. And then we compare our result with the result of the pick-up and delivery routing plan generated manually by postmen.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

Policy Safety Stock Cost Optimization : Xerox Consumable Supply Chain Case Study (정책적 안전재고의 비용 최적화 : 제록스 소모품 유통공급망 사례연구)

  • Suh, Eun Suk
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.5
    • /
    • pp.511-520
    • /
    • 2015
  • Inventory, cost, and the level of service are three interrelated key metrics that most supply chain organizations are striving to optimize. One way to achieve this goal is to create a simulation model to conduct sensitivity analysis and optimization on several different supply chain policies that can be implemented in actual operation. In this paper, a case of Xerox global supply chain modeling and analysis to assess several "what if" scenarios for the consumable policy safety stock is presented. The simulation model, combined with analytical cost model and optimization module, is used to optimize the policy safety stock level to achieve the lowest total value chain cost. It was shown quantitatively that the policy safety stock can be reduced, but it is offset by the inbound premium transportation cost to expedite supplies in shortage, and the outbound premium transportation cost to send supplies to customers via express shipment, requiring fine balance.

Multimedia Traffic Analysis using Markov Chain Model in CDMA Mobile Communication Systems (CDMA 이동통신 시스템에서 멀티미디어 트래픽에 대한 마르코프 체인 해석)

  • 김백현;김철순;곽경섭
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1219-1230
    • /
    • 2003
  • We analyze an integrated voice/data CDMA system, where the whole channels are divided into voice prioritized channels and voice non-prioritized channels. For real-time voice service, a preemptivc priority is granted in the voice prioritized channels. And, for delay-tolerant data service, the employment of buffer is considered. On the other hand, the transmission permission probability in best-effort packet-data service is controlled by estimating the residual capacity available for users. We build a 2-dimensional markov chain about prioritized-voice and stream-data services and accomplish numerical analysis in combination with packet-data traffic based on residual capacity equation.

  • PDF

A method for the protection of the message in social network service(SNS) using access control and hash-chain (SNS에서 접근제어 및 해시체인을 이용한 메시지 보호 기법)

  • Jeong, Hanjae;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • As social network service(SNS) has grown rapidly, the variety information being shared through SNS. However, the privacy of individuals can be violated due to the shared information through a SNS or the post written in the past at the SNS. Although, many researches concerned about it, they did not suggest key management and access control especially. In this paper, we propose the method for the protection of the message in SNS using access control and hash-chain.

An Empirical Study on the Effect of Trust between Firms in the Supply Chain on Agility and Logistics Performance

  • Soohyo KIM;Changjoon LEE;Byoung Chun HA
    • Journal of Distribution Science
    • /
    • v.22 no.7
    • /
    • pp.95-106
    • /
    • 2024
  • Purpose: This study explores the effect on supply chain agility and logistics performance of building mutual trust between manufacturing companies that have adopted supply chain management. Previous studies have categorized trust into affective and cognitive types, and speed, flexibility, and responsiveness are recognized as subfactors of supply chain agility. Methodology: A survey gathered responses from employees of domestic manufacturing firms with supply chain management implementations. 254 valid responses underwent statistical analysis using structural equation modeling (SPSS 23.0 and AMOS 23.0). Results: Affective trust positively influences speed and responsiveness but not flexibility. Cognitive trust positively affects speed, flexibility, and responsiveness. Supply chain agility positively impacts logistics performance. However, neither affective nor cognitive trust significantly influences logistics performance. Conclusions: The study suggests that cognitive trust based on capabilities is more important than affective trust for flexibility in corporate relationships, a subfactor of supply chain agility. However, trust alone cannot enhance corporate performance. This research is significant as it examines the roles of trust and agility in the context of the COVID-19 pandemic, which has exacerbated the manufacturing business environment.

A Case Study on Mobile Web-service Implementation for a VMI System of Small.medium sized the Auto-parts Manufacturer in Supply Chain (공급사슬관계에서 중.소 자동차부품제조업체의 VMI시스템에 관한 웹서비스구현)

  • Na, Sang-Gyun;Oh, Myung-Hyun;Jeong, Byung-Ho;Lee, Jun-Su
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.30 no.2
    • /
    • pp.29-36
    • /
    • 2007
  • This study was concerned about mobile web-service of a VMI in the SCM system. The VMI would be a main module part of the SCM and regarded as very important thing on supply chain. Therefore, it was essential to react in real time of materials production and situation of used auto-part in procurement company. We could find an affordable method to realize the VMI in a web service. The web service has made inter relevant enterprise easy to collaborate because of supporting most operating system and frame-work. Moreover, the use of a mobile tools was guaranteed a product recording and requirement of materials to real time in a rapid changing of production environments. The result of this research was very useful to apply the VMI system in medium and small sized auto parts company. This web service package has programmed the Visual Studio Dot Net 2003 and the MS SQL 2000 as database.

Internet-of-Things Based Approach for Monitoring Pharmaceutical Cold Chain (사물인터넷을 이용한 의약품 콜드체인 관리 시스템)

  • Chandra, Abel Avitesh;Back, Jong Sang;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.9
    • /
    • pp.828-840
    • /
    • 2014
  • There is a new evolution in technological advancement taking place called the Internet of Things (IoT). The IoT enables physical world objects in our surroundings to be connected to the Internet. For this idea to come to life, two architectures are required: the Sensing Entity in the environment which collects data and connects to the cloud and the Cloud Service that hosts the data. In particular, the combination of wireless sensor network for sensing and cloud computing for managing sensor data is becoming a popular intervention for the IoT era. The pharmaceutical cold chain requires controlled environmental conditions for the sensitive products in order for them to maintain their potency and fit for consumption. The monitoring of distribution process is the only assurance that a process has been successfully validated. The distribution process is so critical that anomaly at any point will result in the process being no longer valid. Taking the cold chain monitoring to IoT and using its benefits and power will result in better management and product handling in the cold chain. In this paper, Arduino based wireless sensor network for storage and logistics (land and sea) is presented and integrated with Xively cloud service to offer a real-time and innovative solution for pharmaceutical cold chain monitoring.