• Title/Summary/Keyword: 내부 네트워크 정보

Search Result 727, Processing Time 0.021 seconds

Effect of Supply Chain Risk Management Factors on Risk Management Strategy and Corporate Performance (공급사슬관리 리스크 요인이 위험관리전략과 기업성과에 미치는 영향)

  • Lee, Choong-Bae;Kim, Hyun-Chung
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.3
    • /
    • pp.55-74
    • /
    • 2020
  • With globalization and the development of information and communication technology, the supply chain is becoming more widespread and complex, which increases the occurrence and damage caused by supply chain risks. Supply chain risk management has a great impact on corporate performance through the analysis of risk factors and proactive and strategic approaches. This study aims to analyze the effects of supply chain risk factors on risk management strategies and corporate performance empirically. In the research model for empirical analysis, supply chain risk factors were classified into supply, demand, operation, network, and external environment, while the risk management strategies were divided into active and passive strategies, as well as financial and operational performance for corporate performance. The data obtained via the questionnaire were analyzed for the path of the structural equation model. As a result of the analysis, companies are actively pursuing risk management for internal risk factors, rather than external factors, in terms of internal and external risk factors, and it was found that these strategies have a significant effect on corporate performance. Therefore, in the future, companies should conduct risk management strategies more proactively and preemptively through a thorough analysis of various risk factors affecting business operations.

Cluster-Based Routing Mechanism for Efficient Data Delivery to Group Mobile Users in Wireless Ad-Hoc Networks (그룹 이동성을 가지는 모바일 사용자들 간의 효율적인 데이터 공유를 위한 클러스터 기반 그룹 라우팅 기법 메커니즘)

  • Yoo, Jinhee;Han, Kyeongah;Jeong, Dahee;Lee, HyungJune
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1060-1073
    • /
    • 2013
  • In this paper, we present a cluster-based routing scheme for efficiently delivering data to group mobile users by extracting and clustering mobile user group simply from beacon message information in wireless ad-hoc networks. First, we propose an online-clustering mechanism that uses a local neighbor table on each node by recursively transmitting to neighbor nodes, and forms a group table where a set of listed nodes are classified as group members, without incurring much overhead. A node that appears the most frequently from neighbor tables throughout the network is selected as the cluster-head node, serving as a data gateway for the intra-cluster. Second, we design an inter-cluster routing that delivers data from stationary data sources to the selected cluster-head node, and a intra-cluster routing to deliver from the cluster-head node to users. Simulation results based on ns-2 in the ad-hoc networks consisting of 518 stationary nodes and 20 mobile nodes show that our proposed clustering mechanism achieves high clustering accuracy of 96 % on average. Regarding routing performance, our cluster-based routing scheme outperforms a naive one-to-one routing scheme without any clustering by reducing routing cost up to 1/20. Also, our intra-cluster routing utilizing a selected cluster-head node reduces routing cost in half as opposed to a counterpart of the intra-cluster routing through a randomly-selected internal group member.

Mobile Material Management Through Real Time Connection with ERP System (모바일을 활용한 실시간 ERP시스템 연동 모형의 구축: 자재관리 고도화 사례 중심으로)

  • Lee, Chae-Eun;Lee, Dong-Man;Yoo, Ji-Young
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.285-305
    • /
    • 2004
  • This study is based on providing core infrastructure to make or extend an ERP strategy to make the proper model to cope effectively with various customer requirements and market changes through ERP improvement. The purpose of this study is to support making a competitive advantage by raising productivity and reducing costs as a result of making and applying the "mobile real time connection to ERP"model which is accessible anywhere and anytime using PDA and wireless LAN on the basis of mobile business concept. The model is implemented as the "mobile Material Management System" on the area of material management of ERP in the enterprise which already implemented ERP system. This model is also applied into other divisions of the enterprise. This case study shows that the proper application of ERP reduces costs by reducing business process lead time, increase productivity and customer satisfaction through mobility and instant connectivity and easiness of the system. It is recommended to apply this model into the ERP system which is used in most enterprise, to make a competitive advantage. To sum up, the model in this study can be applied into the enterprise which wants to reduce costs, increase productivity and customer satisfaction through ERP improvement.

Studies of the possibility of external threats of the automotive ECU through simulation test environment (자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee;Park, Seung-Kyu;Kwon, Do-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.39-49
    • /
    • 2013
  • In this paper, security mechanism of internal network(CAN) of vehicle is a very incomplete state and the possibility of external threats as a way to build a test environment that you can easily buy from the market by the vehicle's ECU(Electric Control Unit) to verify and obtain a CAN message. Then, by applying it to ECU of the real car to try to attack is proposed. A recent study, Anyone can see plain-text status of the CAN message in the vehicle. so that in order to verify the information is vulnerable to attack from outside, analyze the data in a vehicle has had a successful attack, but attack to reverse engineering in the stationary state and buying a car should attempt has disadvantages that spatial, financial, and time costs occurs. Found through the car's ECU CAN message is applied to a real car for Potential threats outside of the car to perform an experiment to verify and equipped with a wireless network environment, the experimental results, proposed method through in the car to make sure the attack is possible. As a result, reduce the costs incurred in previous studies and in the information absence state of the car, potential of vehicle's ECU attack looks.

Apriori Based Big Data Processing System for Improve Sensor Data Throughput in IoT Environments (IoT 환경에서 센서 데이터 처리율 향상을 위한 Apriori 기반 빅데이터 처리 시스템)

  • Song, Jin Su;Kim, Soo Jin;Shin, Young Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.277-284
    • /
    • 2021
  • Recently, the smart home environment is expected to be a platform that collects, integrates, and utilizes various data through convergence with wireless information and communication technology. In fact, the number of smart devices with various sensors is increasing inside smart homes. The amount of data that needs to be processed by the increased number of smart devices is also increasing, and big data processing systems are actively being introduced to handle it effectively. However, traditional big data processing systems have all requests directed to cluster drivers before they are allocated to distributed nodes, leading to reduced cluster-wide performance sharing as cluster drivers managing segmentation tasks become bottlenecks. In particular, there is a greater delay rate on smart home devices that constantly request small data processing. Thus, in this paper, we design a Apriori-based big data system for effective data processing in smart home environments where frequent requests occur at the same time. According to the performance evaluation results of the proposed system, the data processing time was reduced by up to 38.6% from at least 19.2% compared to the existing system. The reason for this result is related to the type of data being measured. Because the amount of data collected in a smart home environment is large, the use of cache servers plays a major role in data processing, and association analysis with Apriori algorithms stores highly relevant sensor data in the cache.

Analysis Schemes of Wind Ventilation Forest Types - A Case Study of Daegu Metropolitan City - (바람길숲의 유형별 분석 방안 - 대구광역시를 사례로 -)

  • EUM, Jeong-Hee;OH, Jeong-Hak;SON, Jeong-Min;KIM, Kwon;BAEK, Jun-Beom;YI, Chaeyeon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.4
    • /
    • pp.12-23
    • /
    • 2019
  • This study aims to suggest analysis schemes of urban forests acting as wind ventilation corridor(wind ventilation forest). For this purpose, wind corridor forests were classified into three types: wind-generating forests(WGF), wind-spreading forests (WSF), and wind-connecting forests(WCF), and they were classified into three grades. WGF, WSF and WCF were classified based on the density of forest type map, vegetation index, and ventilation networks, respectively. As a result of analyzing wind corridor forests for Daegu Metropolitan City(883.56㎢), the area of WGF was classified as 443.1㎢ and distributed in the northern and southern regions of Daegu Metropolitan City. Among them, the first grade of WGF occupied the largest area(345.59㎢) and the highest rate(54.44%) in Dalseong-gun. On the other hand, WGF was not found in Jung-gu, because this administrative district is isolated from the forest area. WSF was 32.4㎢, which included representative urban parks of Daegu Metropolitan City, and WSF were found relatively much in Suseong-gu and Dalseong-gun. However, WSF were distributed throughout Metropolitan City, and the vegetation index was not high. The ventilation network that can form WCF included major rivers and roads in Daegu Metropolitan City, but this network was not connected to the urban park from the outer forest. Therefore, it was judged that the formation of WCF connecting WGF outside the city and WSF inside the city would be important. The results of this study can be used as a basic data for systematic wind corridor forest projects, and can be used as basic data for establishing guidelines for wind corridor forest analysis at national and local levels.

Research of generate a test case to verify the possibility of external threat of the automotive ECU (차량 ECU의 외부 위협성 가능성을 검증하기 위한 테스트 케이스 생성 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • ECU(Electric Control Unit) on the important features of the vehicle is equipped, ECU between sending and receiving messages is connected to one of the internal network(CAN BUS), but this network easily accessible from the outside and not intended to be able to receive attacks from an attacker, In this regard, the development of tools that can be used in order to verify the possibility of attacks on attacks from outside, However, the time costs incurred for developing tools and time to analyze from actual car for CAN messages to be used in the attack to find. In this paper, we want to solve it, propose a method to generate test cases required for the attack is publicly available tool called Sulley and it explains how to find the CAN messages to be used in the attack. Sulley add the CAN messages data generated library files in provided library file and than Sulley execute that make define and execute file conform to the CAN communication preferences and create message rules. Experiments performed by the proposed methodology is applied to the actual car and result, test cases generated by the CAN messages fuzzing through Sulley send in the car and as a result without a separate tool developed was operating the car.

Design of a XML-based Data Store Architecture for Run-time Process Monitor (실행시간 프로세스 모니터를 위한 XML 기반의 데이터 저장소의 설계)

  • Jeong, Yoon-Seok;Kim, Tae-Wan;Chang, Chun-Hyon
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.715-722
    • /
    • 2003
  • Monitoring is used to see if a real-time system provides a service on time. The target of monitoring is not only an interior system but also a remote system which is located in the remote network. Monitoring needs data store to monitor data from each system. But a data store should be designed on the considerations of time constraints and data accessibility. In this paper, we present an architecture of XML-based data store and network delivery. XML-based data store is based on XML which is a standardized data format. So any platform which supports TCP/IP and HTTP can access data in the data store without any conversion. The XML-based delivery architecture is designed to reduce the time of data access and delivery. In addition, some experiments were tested to provide the timing guideline to be kept by a real-time system which uses the architecture presented in this paper. The architecture of XML-based data store and delivery designed in this paper can be used in the domains of remote real-time monitoring and control.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Sharing of DLNA Media Contents among Inter-homes based on DHCP or Private IP using Homeserver (동적 사설 IP 기반의 다중 홈간 DLNA 미디어 컨텐츠 공유)

  • Oh, Yeon-Joo;Lee, Hoon-Ki;Kim, Jung-Tae;Paik, Eui-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.709-716
    • /
    • 2006
  • According to the increase of various AV media devices and contents in the digital home, the DLNA becomes to play an important role as the interoperability standard between then Since this guideline only focuses on the interoperability among home networked devices, media players, and media contents existing inside of the homenetwork, there is no retrieval and transmission method for sharing multimedia contents located over several homes via Internet. Additionally, this guideline lets device-detection and notification messages to be transmitted using W multicast methods, and current Internet environment cannot guarantee consistent IP multicast services, it has the limitation that it cannot retrieve and control DLNA devices in other digital homes remotely via the Internet. Therefore, in this paper, we propose the IHM(Inter-Home Media) proxy system and its operating mechanism to provide a way of sharing media contents distributed over multiple DLNA-based homes, through analyzing these limitations and building up a sharing method for A/V media contents distributed over the DLNA homes based on the dynamic or private IP networks. Our method removes the limitation on the user locations through sharing distributed media contents, and also makes cost-downs for storing media contents, from the view point of individual residents.