• Title/Summary/Keyword: electronic logistics system

Search Result 156, Processing Time 0.022 seconds

A Study on System Requirements for the Development of Intelligent Container using QFD (QFD를 활용한 지능형컨테이너의 시스템요구사항 도출)

  • Kim, Chae-Soo;Choi, Hyung-Rim;Kim, Jae-Joong;Hong, Soon-Goo;Kim, Hui-Yun;Kim, Jea-Hwan;Shin, Joong-Jo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.4
    • /
    • pp.64-72
    • /
    • 2008
  • Recently security is being an important issue in almost every field of industry. This situation has affected port logistics industry deeply. Ports are now leaving operational methods that only focus on productivity, and shifting to new ones which focus on safety and customer services on the basis of it. Thus a lot of companies and institutions have offered various solutions as this issue becomes more and more intense. Among them, most typical solutions involve installing special devices to ordinary containers to improve its security, such as CSD (Container Security Device) of GE (General Electric) and eSeal of Savi Networks. On the other hand, these devices focus only on international standards or technical implementation, and this causes inconvenience to actual users like cargo owners, sea carriers, or stevedoring companies. This is considered to be due to lack of sufficient consideration on user demands. This research uses QFD (Quality Function Deployment) method for deducting system requirements in order to solve the problems of previous security devices and to develop a security system that can not only reflect the demands of the users but also considers real-world conditions. According to the QFD results, a total of 21 system CTO's were deducted under 5 categories.

  • PDF

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

A Study on the Diffusion Factor of e-finance (e-Finance의 확산요인에 관한 연구)

  • Kim, Min-Ho;Song, Chae-Hun;Song, Sun-Yok;Cha, Sun-Kwon
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.253-277
    • /
    • 2002
  • Nowaday, the advanced technology in information and communication has been leading the dramatic change of transaction paradigm expansion from physical basis to electronic one. As we know, financial services support most of financial exchange between two business parties. So the expansion of electronic transaction paradigm affects to every financial institutions which provide financial services. Thus, financial institutions have accepted e-Finance systems and providing internet financial services to live in the competition. The purpose of this study is to contribute the qualitative enhancement of its customer service, rapid diffusion and accurate strategy establishment for e-Finance industry in the user side. Through the literature review and factor and reliability analysis, this study selects six diffusion factors such as efficiency of perceived e-Finance, reliability and safety of e-Finance in perceived e-Finance itself's characteristic; confidence, technical factors and the customer service quality of e-Finance system in perception on e-Finance System; inclination to innovation in the personal characteristic. According to result of hypothesis verification by using logistics regression analysis, technical factors and the customer service quality of e-Finance system in perception on e-Finance System and inclination to innovation in the personal characteristic gave statistically positive effect to the diffusion decision at the significant level 0.05 and 0.01. However efficiency of perceived e-Finance, reliability and safety of e-Finance in perceived e-Finance itself's characteristic didn't affect to diffusion decision and confidence of e-Finance system in perception on e-Finance System didn't have any statistical significancy. This study can be used as a basic material for the forward empirical study of diffusion factors in the user side and be able to apply to company and government policy making or embodiment, determination for customer service quality degree of financial institutions. But this study has some limitations like didn't touch satisfaction factors and its effect, only deal domestic customers and didn't use multi-regression analysis.

  • PDF

Simulation analysis of AGV introduction in the convenience store logistics distribution centers (편의점 유통물류센터의 AGV 도입에 대한 시뮬레이션 분석)

  • Kim, Jeonghoon;Kim, Younjin;Lee, Hongchul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.6
    • /
    • pp.61-69
    • /
    • 2016
  • Since 2000, the market of convenient stores in Korea has developed rapidly due to the explosive growth in single households but it still consists mainly of manual work due to the nature of the domestic industry. Hence the explosive increase in demand in the market is mostly due to workers. Therefore, the research aimed at encouraging efficiency via automation, which is carried out in manufacturing, such as electronic, cars and so on, is inadequate. This study performed a feasibility analysis of investment for introducing an automated system on brand A, which is domestic famous convenience store company. Productivity growth according to the introduction of an automated guided vehicle and the cost-benefits was studied with using a simulation for the picking process, which is most personnel and time consuming. As a result, the simulation showed that the equipment AGV introduced for choosing the process has the effects of cost saving and increased time efficiency for performing manual labor. Furthermore, appropriate numbers of AGV were forecasted considering the capacity of the distribution Center in the brand A convenient store, which has been growing steadily. There are increasing numbers of worker labor costs in the distribution industry these days. Before building a large new automate center, it is expected to provide a good information to investors who are considering increasing productivity through partial automation of each of unit process to achieve some cost reduction.

A Study on the Collaborative Partnership Factors between Freight Forwarders and Consignors (국제물류주선업체와 화주기업의 협력적 파트너쉽 요인에 관한 연구)

  • Jun, Kyung Sook;Jang, Hyun Mi;Kim, Sang Youl
    • Journal of Korea Port Economic Association
    • /
    • v.30 no.4
    • /
    • pp.169-198
    • /
    • 2014
  • Due to the recent worldwide economic downturn, companies are required to put more effort into their innovation and quality improvement. In particular, business relationship is increasingly emphasized to be changed from a vertical relationship to a more horizontal relationship, such as collaborative partnership based on trust. In the logistics industry, through the collaboration, consignors can gain competitive advantages by focusing on their core capabilities, and freight forwarders also take advantages of securing stable cargoes and specialist expertise in distribution. Therefore, this study aims to identify key factors for developing a collaborative partnership between freight forwarders and consignors, and further examine the differences between the two groups empirically by using questionnaire survey. Based on the results, the main factors were found as follows: 1) Trust Building, 2) Competence Improvement, 3) Business Ecosystem and 4) Government Assistance. According to the analysis on sub-factors, first, among the four main factors, it turned out that trust is the most important variable. Specifically, the sub-factor of providing regular and stable service was revealed to be most critical. Second, it was found that forwarders need to improve services on 'Information Exchange System' and 'Electronic Data Interchange'. Finally, it is necessary for both consignors and forwarders to have better understanding of partnership. Key implications for both groups are highlighted based on the results.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.