• Title/Summary/Keyword: VMI System

Search Result 29, Processing Time 0.02 seconds

Coordinated Transportation and Inventory Decision using Shipment Consolidation (선적 통합을 이용한 수송과 재고의 통합 결정에 관한 연구 분석)

  • Hong, Gi-Seong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.661-664
    • /
    • 2006
  • Under a VMI (Vendor Managed Inventory) system, the vendor holds a certain level of control over not only inbound replenishment decisions on stocking but also outbound re-supply decisions. In this situation, vendor faces a better opportunity to synchronize the inventory and transportation decisions. However, shipment consolidation can reduce transportation expenses, but delivery time about the customer comes to be long and a customer service is fallen. Thus, a stock and transportation decision must consider this correlation. This study look into the relevant literature and suggest about further research direction.

  • PDF

VMI with Upper Limit of Inventory for Vendor and Retailer (판매자와 구매자의 재고상한이 존재하는 VMI)

  • Lee, Dongju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.4
    • /
    • pp.105-111
    • /
    • 2017
  • Vendor Managed Inventory is a well-known vendor-retailer coordination approach in supply chain management where the vendor manages inventory of the retailer and determines the order interval and order quantity for the retailer. To consider practical situation, the upper limit of inventory for the retailer is set. If the inventory level for the retailer exceeds the upper limit, then the penalty cost is charged to the retailer. Furthermore, maximum allowable inventory level is set for the vendor to prevent the vendor from keeping much inventory. Single-vendor multi-retailer supply chain model with upper limit of inventory for vendor and retailers is studied. All the retailers' are assumed to have the common cycle time, and a vendor manages retailers' inventory and replenishes products. The mathematical formulation is introduced to minimize the total cost including the penalty cost violating the upper limit of inventory for retailers with the constraint of maximum allowable inventory level. The solution procedure based on Karush-Kuhn-Tucker (KKT) conditions is derived. KKT conditions are often applied to find an optimal solution of nonlinear programming problem with constraints. An illustrative example is used to show the application of the proposed solution procedure. Furthermore, sensitivity analysis is done to find out the relationship between maximum allowable inventory level and other values such as order quantity, the number of shipment, vendor's cost, retailer's cost, and total cost. As maximum allowable inventory level decreases, the number of shipment decreases but total cost increases. Order quantity has the trend of decline and is affected by the number of shipment.

A Case Study on Electronic Commerce for Medical Fields in e-Marketplace of EZmedicom (이지메디컴의 e-마켓플레이스를 통한 의료전자상거래 시스템 사례연구)

  • Kim, Jong-Uk;Park, Sang-Cheol;Seo, Jeong-Wook
    • Journal of Information Technology Services
    • /
    • v.6 no.3
    • /
    • pp.141-162
    • /
    • 2007
  • In this study, we conduct a case analysis on EZmedicom which is one of the leading companies in e-Marketplace for medical fields. By examining major business models of EZmedicom, we provide the success factors in launching the electronic commerce to the potential companies which are interested in participating in e-marketplace for medical fields. Especially, we deduct the solution, logistics field, and electronic group-purchasing as its major business model. Based on these factors, we also propose the MDvan solution which is one of the electronic purchase and supply system, Ezlogis that is the system supporting logistics parts in medical fields, VMI(vendor management inventory), standardization of item code and the linkage of SCM as its critical success factors of EZmedicom. The findings of this study suggest practical and managerial implications for e-Marketplace implementation in the medical field and further research.

DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing

  • Zhou, Zhen-Ji;Wu, Li-Fa;Hong, Zheng;Xu, Ming-Fei;Pan, Fan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.305-325
    • /
    • 2014
  • In cloud computing infrastructure, current virtual machine trust measurement methods have many shortcomings in dynamism, security and concurrency. In this paper, we present a new method to measure the trust of virtual machine. Firstly, we propose "behavior trace" to describe the state of virtual machine. Behavior trace is a sequence of behaviors. The measurement of behavior trace is conducted on the basis of anticipated trusted behavior, which not only ensures security of the virtual machine during runtime stage but also reduces complexity of the trust measurement. Based on the behavior trace, we present a Dynamic Tree Style Trust Measurement Model (DTSTM). In this model, the measurement of system domain and user domain is separated, which enhances the extensibility, security and concurrency of the measurement. Finally, based on System Call Interceptor (SCI) and Virtual Machine Introspection (VMI) technology, we implement a DTSTM prototype system for virtual machine trust measurement. Experimental results demonstrate that the system can effectively verify the trust of virtual machine and requires a relatively low performance overhead.

A Long-term Replenishment Contract under (R, S) Policy ((R, S)정책하에서의 장기 보충계약)

  • Kim, Yong Chan;Kim, Jong Soo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.30 no.3
    • /
    • pp.241-249
    • /
    • 2004
  • By committing to a long-term replenishment contract, suppliers can mitigate the pressure to find new customers and afford to charge a discounted price to buyers seeking to lower their purchasing costs. In this paper, we develop an analytical model from buyer's perspective for the contracting process to investigate the buyer-supplier interactions. Based on the developed model, we propose an algorithm to derive optimal strategy for the contract. We consider a system with a single buyer and a supplier in a situation where the buyer's inventory is controlled by (R, S) policy under VMI setting. According to the contract, the supplier should replenish the buyer's inventory up to a fixed level every R times during a specified period. The buyer purchases any deficient amount from a spot market at a higher price. We show by computational experiment that our proposed algorithm finds the global optimum solution.

Bullwhip Effect and Lot Size: the Main Cause of BwE is Lot Size (황소채찍효과와 발주크기: 대형할인마트에서의 황소채찍효과)

  • Paik, Si-Hyun
    • IE interfaces
    • /
    • v.21 no.2
    • /
    • pp.161-169
    • /
    • 2008
  • Normally, suppliers have to decide on what, how much, and when to replenish stocks of goods based on a data flow generated by a vendor managed inventory(VMI) system. But information from supply chain is often misleading. It is common for such data to be distorted by a lack of coordination and synchronization across several business entities managing different supply chain operations. This phenomenon is called the 'bullwhip effect(BwE)'. Many researchers, working over many years, have studied the reasons for the BwE. They have proposed various remedies, but this phenomenon persists. Though overlooked in previous research, this paper reveals that the 'lot size' of a supply chain of distribution is indeed the main cause of the BwE. In addition, some problems in the existing methods of measuring the BwE are identified and a revised much improved method of measurement is suggested.

The Development of the Distribution/VMI Game Based on Theory of Constraints

  • Zheng, Kai-Wen;Tsai, Chih-Hung;Li, Rong-Kwei;Chen, Ching-Piao;Tsai, Shih-Chieh
    • International Journal of Quality Innovation
    • /
    • v.10 no.1
    • /
    • pp.53-76
    • /
    • 2009
  • As the flourish of today's supply chain, the traditional model of replenishment will cause accumulation of excessive inventory to the retailers and customers, or cause shortages and inability to meet the demands. To solve this problem, Theory of Constraints (TOC) proposed the replenishment model of demand-pull, combined with the establishment of factory-ware-house to achieve performance improvement. In the absence of empirical research, this study applied the Bean Game developed by Dr. Goldratt to design a supply chain system for different scenarios, in order to allow players and managers better understanding and supporting the TOC replenishment method through the operations of the game.

A study on the governance of using soldier's smartphone Management system on the National Defense Cloud (국방 클라우드 기반 스마트폰 관리 시스템을 활용한 병사 스마트폰 거버넌스 방안에 관한 연구)

  • Moon, Seung-Joo;Lee, Jae-Du
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.60-62
    • /
    • 2022
  • 본 논문은 국방 클라우드를 기반으로 병사 스마트폰 사용에 대한 거버넌스의 방안을 연구한다. 2020 년부터 군 부대 내에서 병사의 스마트폰의 사용이 전면 시행되었다. 하지만 대량의 병사 스마트폰을 인적자원을 통해 관리하기 때문에 많은 인적자원 리소스가 필요하고, 보안이 중요한 부대 특성상 보안 점검을 사유로 인권침해가 발생하고 있다. 따라서 군 부대 특성을 고려한 거버넌스를 정의하고 도입할 필요가 있다. VMI(Virtual Mobile Infrastructure) 시스템을 이용한 국방 클라우드 기반 스마트폰 관리 시스템은 스마트폰을 군 보급품으로 지급하고 모든 스마트폰 프로세스 및 데이터를 중앙 서버를 통해 관리한다. 본 논문에서는 국방 클라우드 기반 스마트폰 거버넌스를 정의하고 중앙 서버를 통해 모든 스마트폰의 프로세스와 데이터를 관리함으로써 얻을 수 있는 기대효과를 관리적, 보안적 측면에서 연구하였다.

VirtAV: an Agentless Runtime Antivirus System for Virtual Machines

  • Tang, Hongwei;Feng, Shengzhong;Zhao, Xiaofang;Jin, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5642-5670
    • /
    • 2017
  • Antivirus is an important issue to the security of virtual machine (VM). According to where the antivirus system resides, the existing approaches can be categorized into three classes: internal approach, external approach and hybrid approach. However, for the internal approach, it is susceptible to attacks and may cause antivirus storm and rollback vulnerability problems. On the other hand, for the external approach, the antivirus systems built upon virtual machine introspection (VMI) technology cannot find and prohibit viruses promptly. Although the hybrid approach performs virus scanning out of the virtual machine, it is still vulnerable to attacks since it completely depends on the agent and hooks to deliver events in the guest operating system. To solve the aforementioned problems, based on in-memory signature scanning, we propose an agentless runtime antivirus system VirtAV, which scans each piece of binary codes to execute in guest VMs on the VMM side to detect and prevent viruses. As an external approach, VirtAV does not rely on any hooks or agents in the guest OS, and exposes no attack surface to the outside world, so it guarantees the security of itself to the greatest extent. In addition, it solves the antivirus storm problem and the rollback vulnerability problem in virtualization environment. We implemented a prototype based on Qemu/KVM hypervisor and ClamAV antivirus engine. Experimental results demonstrate that VirtAV is able to detect both user-level and kernel-level virus programs inside Windows and Linux guest, no matter whether they are packed or not. From the performance aspect, the overhead of VirtAV on guest performance is acceptable. Especially, VirtAV has little impact on the performance of common desktop applications, such as video playing, web browsing and Microsoft Office series.