• Title/Summary/Keyword: 네트워크 설계 모형

Search Result 153, Processing Time 0.023 seconds

A Study on Network Redesign for Supply Chain Expansion (공급 사슬 확장을 위한 네트워크 재설계에 관한 연구)

  • Song, Byung Duk;Oh, Yonghui
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.141-153
    • /
    • 2012
  • According to the environment change of market, supply chain network needs to be redesigned for efficient provision of product within the budget constraint. Also, it is desired that the customer satisfaction such as on time delivery should be considered as an important element at redesigning of supply chain network in addition to the cost reduction. In this paper redesign of supply chain network for its expansion is treated as a problem situation and a related mathematical model is suggested. Moreover, the numerical examples about the total weighted distance of the redesigned supply chain network are presented with various budget constraints by using genetic algorithm to help the managerial decision.

A Mathematical Model for Coordinated Multiple Reservoir Operation (댐군의 연계운영을 위한 수학적 모형)

  • Kim, Seung-Gwon
    • Journal of Korea Water Resources Association
    • /
    • v.31 no.6
    • /
    • pp.779-793
    • /
    • 1998
  • In this study, for the purpose of water supply planning, we propose a sophisticated multi-period mixed integer programming model that can coordinate the behavior of multi-reservoir operation, minimizing unnecessary spill. It can simulate the system with operating rules which are self- generated by the optimization engine in the algorithm. It is an optimization model in structure, but it indeed simulates the coordinating behavior of multi-reservoir operation. It minimizes the water shortfalls in demand requirements, maintaining flood reserve volume, minimizing unnecessary spill, maximizing hydropower generation release, keeping water storage levels high for efficient hydroelectric turbine operation. This optimization model is a large scale mixed integer programming problem that consists of 3.920 integer variables and 68.658 by 132.384 node-arc incidence matrix for 28 years of data. In order to handle the enormous amount of data generated by a big mathematical model, the utilization of DBMS (data base management system)seems to be inevitable. It has been tested with the Han River multi-reservoir system in Korea, which consists of 2 large multipurpose dams and 3 hydroelectric dams. We demonstrated successfully that there is a good chance of saving substantial amount of water should it be put to use in real time with a good inflow forecasting system.

  • PDF

Components Clustering for Modular Product Design Using Network Flow Model (네트워크 흐름 모델을 활용한 모듈러 제품 설계를 위한 컴포넌트 군집화)

  • Son, Jiyang;Yoo, Jaewook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.263-272
    • /
    • 2016
  • Modular product design has contributed to flexible product modification and development, production lead time reduction, and increasing product diversity. Modular product design aims to develop a product architecture that is composed of detachable modules. These modules are constructed by maximizing the similarity of components based on physical and functional interaction analysis among components. Accordingly, a systematic procedure for clustering the components, which is a main activity in modular product design, is proposed in this paper. The first phase in this procedure is to build a component-to-component correlation matrix by analyzing physical and functional interaction relations among the components. In the second phase, network flow modeling is applied to find clusters of components, maximizing their correlations. In the last phase, a network flow model formulated with linear programming is solved to find the clusters and to make them modular. Finally, the proposed procedure in this research and its application are illustrated with an example of modularization for a vacuum cleaner.

Discovering Customer Service Cool Trends in e-Commerce: Using Social Network Analysis with NodeXL (e-커머스 기업의 고객서비스 쿨트랜드 발견: 사회네트워크분석 NodeXL 활용)

  • Lee, Chang-Gyun;Sung, Min-June;Lee, Yun-Bae
    • Information Systems Review
    • /
    • v.13 no.1
    • /
    • pp.75-96
    • /
    • 2011
  • This research uses coolhunting to predict the future trend of e-Commerce industry. Coolhunting is a method to take Cool Trends which are the future trend through social network analysis for discovering the trendsetter and its collective intelligence. Coolhunting is generally carried out by social network analysis while this research uses NodeXL of social network analysis tools. We designed industrial network research model for relation among e-Commerce corporation, product, the types of customer service and customer service employee to discover the Cool Trends of e-Commerce industry. According to the result of this research, e-Commerce industrial network was being changed from chaos to collective intelligence form. As a analysis result for network influences, we found that Cool Trends of e-Commerce industry invigorate social commerce industry through the collective intelligence focusing intelligence VIP, Excellence, grade of Administrating for women customers(trendsetter) and it promotes semantic consumption from customers and purchasing power will be concentrated on cosmetic, beauty, perfume product categories in social commerce. We propose the strategic direction for e-Commerce corporation and hope that domestic e-Commerce corporation continues to grow and high-quality services are provided for customers.

An Instructional Learning Effectiveness of Network Concept by Problem-Oriented Learning for Computer Education in Elementary Schools (초등컴퓨터 교육에서 문제중심 학습을 이용한 네트워크 개념의 교수학습 효과)

  • Rim, Hwakyung
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.3
    • /
    • pp.91-99
    • /
    • 2004
  • Elementary school students have a great deal of interest in Internet games which provide integrated multimedia and so they become to know well the terminology used in network such as game server, Internet service, transfer time, etc. In addition, they are used to understand the technological phenomena occurring in internet. They, however, have difficulty understanding concepts and principles regarding the phenomena mentioned above because the educational contents in elementary school computer textbooks consist of only ICT education and its applications, i.e., tool-based technology. In this paper, we apply educational learning on network concepts which are the basis on the internet to classroom instruction by using problem oriented models. We conclude that the educational contents in elementary school computer education should be transferred to the area with principles and concepts.

  • PDF

A Study on Authentication Model using Blockchain (블록체인 기술을 활용한 진본인증 모형 연구)

  • Lee, Kyung-nam
    • The Korean Journal of Archival Studies
    • /
    • no.59
    • /
    • pp.47-78
    • /
    • 2019
  • With the rapid changes in the digital technology, it is necessary to shift to a new paradigm corresponding to the changing environment was recognized. This study actively explores the possibility of applying new technologies for recordkeeping. This study aimed to investigate the applicability of blockchain to recordkeeping and to develop a new model for recordkeeping based on it. Through a conceptual analysis of blockchain and consideration of the recordkeeping process, a blockchain model that is suitable for the authentication of records was proposed. For this the network structure, the structure of blockchain blocks, a consensus algorithm, and recordkeeping blockchain model were designed. It also predicted potential changes in digital records management when applying blockchain. It predicted change in governance aspects to implement a horizontal cooperation system among the archives.

Designing Index for Assessing Structural Vulnerability of Supply Chain considering Risk Propagation (위험 전파 모형을 고려한 공급사슬의 구조적 취약성 평가 지표 설계)

  • Moon, Hyangki;Shin, KwangSup
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.125-140
    • /
    • 2015
  • It is general that the impact of supply chain risk spread out to the whole network along the connected structure. Due to the risk propagation the probability to exposure a certain risk is affected by not only the characteristics of each risk factor but also network structure. It means that the structural connectivity among vertices should be considered while designing supply chain network in order to minimize disruption cost. In this research, the betweenness centrality has been utilized to quantitatively assess the structural vulnerability. The betweenness centrality is interpreted as the index which can express both the probability of risk occurrence and propagation of risk impact. With the structural vulnerability index, it is possible to compare the stability of each alternative supply chain structure and choose the better one.

Desing and Implementation of Host-Based IDS for Policy-Driven (정책을 이용한 Host 기반의 침입탐지 시스템 설계 및 구현)

  • 박익수;이경효;이군승;명근홍;오병균
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.289-291
    • /
    • 2004
  • 정보시스템에 대한 침입탐지는 네트워크 기반의 침입탐지시스템에 의존하였으나, 네트워크 규모의 확대와 암호사용의 증가로 인하여 호스트 기반의 침입탐지시스템을 중심으로 연구되고 있다. 본 논문에서는 CB(Check-Box)에 규정된 정책을 이용한 호스트 기반의 침입탐지 시스템을 설계하여 이를 실험하였다. 침입탐지 실험을 위한 시스템호출 기술은 커널에 프로세스들의 특성을 자세하게 정의하고, 이를 실행할 수 있도록 기반을 구축함으로서 가능하게 하였다. 이러한 기법의 특성은 실행 가능한 프로세스가 시스템에 자원에 정당하게 접근할 수 있는 정책을 자세하게 규정해야 하며, 규정을 기술하기 위한 언어는 보안영역을 효과적으로 표현하고 번역될 수 있어야 한다. 본 연구는 Linux의 커널에서 침입탐지기법에 대한 모형을 제시하고, 공격에 대한 탐지와 탐지결과를 검증할 수 있는 정책을 설정하였다. 제안된 시스템은 커널의 변화에 대한 영향력을 최소화하도록 함으로서 새로운 커널을 쉽게 설치할 수 있기 때문에 정책에 의한 호스트기반의 침입탐지시스템은 운영 탐지 분석을 통하여 침입을 예방할 수 있는 방안을 마련할 수 있다.

  • PDF

Design and implementation of shipping electronic commerce agent in distributed computing environment (분산환경하에서 해운 전자상거래 에이전트 설계 및 구현)

  • Jang, Il-Dong;Wee, Seung-Min;Kim, Si-Hwa
    • Journal of Navigation and Port Research
    • /
    • v.26 no.1
    • /
    • pp.78-84
    • /
    • 2002
  • In this thesis a shipping broker agent system, which can be executed by a CORBA-based environment using the distributed object technique, CORBA is designed and implemented Nowadays, while the EC system is extensive on the web, legacy host systems have limitations and its capacity-upgrade os required. In order to solve these problems the method that distributes programs into several computer systems can reduce their loads, set low system capacity and minimize network bottleneck. In this thesis using Agent Communication Language(ACL), we propose an agent based prototype and implement an intelligent agent prototype for ships search using CORBA, which can exchange and shiare data between different systems.

Development of Educational Model for ICT-based Convergence Expert (ICT 기반의 융합전문가 양성을 위한 교육모형 개발)

  • Ryu, Gab-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.75-80
    • /
    • 2015
  • To train convergence experts ICT infrastructure must be learned IoT use capabilities of things. In this paper, targeted to students that are majoring in computer science, and for the design of the curriculum and the educational model that handles education of operation in general for training IoT-related education for five months to experts of convergence training describe the contents. Course is the basic ability of the process, core competence course, is divided into real-life capability process and on-site training course, was constructed in a total of 10 stages of the process details. Curriculum, it was designed to learn sensing technology, network technology, security, and content production technology. This educational model is utilized for job creation human resource training project of 2015 Ministry of Employment and Labor, it demonstrated the utility to contribute in order to achieve a high completion and the employment rate. Applicable to future university education plans to expand the curriculum, including courses that complement the Java.