• Title/Summary/Keyword: Chain Management#1

Search Result 774, Processing Time 0.021 seconds

A Coordinated Planning Model with Price-Dependent Demand

  • Nagarur, Nagendra N.;Iaprasert, Wipanan
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.1
    • /
    • pp.1-13
    • /
    • 2009
  • This paper presents a coordinated planning model of price-dependent demand for a single-manufacturer and a single-retailer. The demand is assumed to be normally distributed, with its mean being price dependent. The manufacturer and retailer coordinate with each other to jointly and simultaneously determine the retail selling price and the retailer order quantity to maximize the joint expected total profit. This model is then compared to a 'returns' policy model where manufacturer buys back unsold items from the retailers. It is shown that the optimal total profit is higher for coordinated planning model than that for the returns policy model, in which the retail price is set by the retailer. A compensation or profit sharing scheme is then suggested and it is shown that the coordinated model with profit sharing yields a 'win-win' situation. Numerical results are presented to illustrate the profit patterns for both linear and nonlinear demand functions. The coordinated planning model, in addition, has a lower optimal price than for a returns policy model, which would result in higher sales, thus expanding the markets for the whole supply chain.

A method for the protection of the message in social network service(SNS) using access control and hash-chain (SNS에서 접근제어 및 해시체인을 이용한 메시지 보호 기법)

  • Jeong, Hanjae;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • As social network service(SNS) has grown rapidly, the variety information being shared through SNS. However, the privacy of individuals can be violated due to the shared information through a SNS or the post written in the past at the SNS. Although, many researches concerned about it, they did not suggest key management and access control especially. In this paper, we propose the method for the protection of the message in SNS using access control and hash-chain.

Single Manufacturer and Multiple Retailers Multi-Product Inventory Model under Cap-and-Trade Mechanism (배출권거래제 하에서 단일 제조업자-다소매업자의 공급사슬에서 다품목의 재고모형)

  • Kim, Dae-Hong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.1
    • /
    • pp.158-166
    • /
    • 2019
  • In pursuing carbon emission reduction efforts, companies have focused for the most part on reducing emissions due to the more efficient equipment and facilities. However they overlook a significant source of carbon emissions, one that is driven by operational policies. Currently companies are looking for solutions to reduce carbon emissions associated with their operations. Operational adjustments, such as modifications in order quantities could an effective way in reducing carbon emissions in the supply chain. Also, Cap-and-Trade mechanism is generally accepted as on of the most effective market-based mechanism to reduce carbon emissions. In this paper, we investigate a supply chain with single manufacturer and multiple retailers multi-product inventory model under the cap-and-trade system incorporating the carbon emissions caused by transportation and warehousing activities. Also, we provide an iterative solution algorithm and derive the common order interval and the number of intervals for each product. We show by numerical example that the inventory model incorporating cap & trade mechanism can reduce total cost and carbon emissions compared to the classical inventory model. Using the numerical examples, we also investigates different carbon price on the performance of the inventory model.

Bayesian Model for Cost Estimation of Construction Projects

  • Kim, Sang-Yon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.11 no.1
    • /
    • pp.91-99
    • /
    • 2011
  • Bayesian network is a form of probabilistic graphical model. It incorporates human reasoning to deal with sparse data availability and to determine the probabilities of uncertain cases. In this research, bayesian network is adopted to model the problem of construction project cost. General information, time, cost, and material, the four main factors dominating the characteristic of construction costs, are incorporated into the model. This research presents verify a model that were conducted to illustrate the functionality and application of a decision support system for predicting the costs. The Markov Chain Monte Carlo (MCMC) method is applied to estimate parameter distributions. Furthermore, it is shown that not all the parameters are normally distributed. In addition, cost estimates based on the Gibbs output is performed. It can enhance the decision the decision-making process.

Technologies and Standards for the Coordinated Implementation of Global e-SCM

  • Shim, Sang-Ryul;Park, Tae-Ho
    • International Commerce and Information Review
    • /
    • v.1 no.1
    • /
    • pp.25-39
    • /
    • 2008
  • Global e-SCM (electronic Supply Chain Management) has become an important business strategy in a rapidly changing global competition environment. It encompasses both domestic business and overseas business. Overseas business, including B2B and B2G, involves the complex trade procedures across countries. So, the standardization of electronic documents (messages) and business processes is one of critical factors for the successful implementation of global e-SCM. Without standardized messages and streamlined business processes, the benefits of global e-SCM would not be guaranteed because of human intervention like re-keying business data, which may create errors, delay processes, cause additional data or procedures, etc. Thus, this paper is to review the implementation challenges of Global e-SCM, to address the needs for electronic information flows through the standardization in electronic documents and business processes for fast and accurate trade transactions in the global supply chain activities, and to assert the importance of adoption of international standards.

  • PDF

Digital Knowledge Ecosystem to Reduce Uncertainty and Coordination Failure in Agricultural Markets - Study of "Govi Nena" Mobile-Based Information System

  • Sugathadasa, Lalinda;Ginige, Athula;Wikramanayake, Gihan;Goonetillake, Jeevani;De Silva, Lasanthi;Walisadeera, Anusha I.
    • Agribusiness and Information Management
    • /
    • v.8 no.1
    • /
    • pp.11-16
    • /
    • 2016
  • This paper presents how Digital Knowledge Ecosystem such as "Govi Nena" (translates as agriculture intelligence) can be used to provide a more effective and practical solution to eliminate the inefficiencies in agricultural markets and achieve higher productivity and price stability. In order to establish the framework to analyze the system, this paper uses a set of hypothetical scenarios faced by value chain actors based on a review of the literature, established knowledge and recent developing country experiences. The scenario analysis reveals that "Govi Nena" enables farmers to make effective production decisions, deepens the level of value chain integration, and enhances the level of welfare for the society as a whole.

RFID Implementation Readiness Model : Impact of Technology, Human, Vender, and Task Factors

  • Lim, Se-Hun
    • Journal of Digital Convergence
    • /
    • v.9 no.1
    • /
    • pp.71-87
    • /
    • 2011
  • Currently, many companies are interested in (Radio Frequency Identification (RFID). Nonetheless, technical imperfection and the uncertainty of Return on Investment (ROD is discouraging the companies' intention to implement RFID. Accordingly, while a number of companies concede the efficiency of RFID, few of them expresses enthusiasm, making a rain check to adopt RFID. Moreover, the recent economic depression has down-sized the companies' investment on Information Technology (IT), subsequently hindering RFID implementation. In adopting RFID, the collaboration of supply chain is the most importance factor. Therefore, in implementing RFID, many companies reinforced collaboration of supply chain. Therefore, this study will focus on performing an analysis on several factors which influence the intention to adoption of RFID, such as the human factor, technology factor, vender factor and task factor. The results of this study will provide useful guidelines for RFID adoption strategy to Korean companies.

A Data Provenance System for Myanmar Rice Cycle Based on Ethereum Blockchain

  • Latt, Cho Nwe Zin;Rahmadika, Sandi;Rhee, Kyung-Hyune
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.35-44
    • /
    • 2021
  • The Myanmar rice cycle's existing system is still relying on a third party to manage every rice data information from several organizations. It is inconvenient to supervise simultaneously due to the unreliability of information provided by organizations. Thus, the rice cycle's original data is challenging to be utterly trusted since irresponsible parties can manipulate the current state of information. Moreover, the applied system does not preserve a proper incentive for the involved parties. In this paper, we leverage the Ethereum blockchain to be adopted to tackle the aforementioned issues. The main objective is to build trust between parties in the Myanmar rice cycle system. Our proposed scheme allows customers to check and trace information about the rice cycle information without worrying about the integrity of the data. Furthermore, the authorized parties are also rewarded by the government through Ethereum smart contract features. Eventually, our scheme achieves traceability in the rice chain system and leads to the complete digitization and automation of the rice cycle information.

A New Dynamic Auction Mechanism in the Supply Chain: N-Bilateral Optimized Combinatorial Auction (N-BOCA) (공급사슬에서의 새로운 동적 경매 메커니즘: 다자간 최적화 조합경매 모형)

  • Choi Jin-Ho;Chang Yong-Sik;Han In-Goo
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.139-161
    • /
    • 2006
  • In this paper, we introduce a new combinatorial auction mechanism - N-Bilateral Optimized Combinatorial Auction (N-BOCA). N-BOCA is a flexible iterative combinatorial auction model that offers optimized trading for multi-suppliers and multi-purchasers in the supply chain. We design the N-BOCA system from the perspectives of architecture, protocol, and trading strategy. Under the given N-BOCA architecture and protocol, auctioneers and bidders have diverse decision strategies f3r winner determination. This needs flexible modeling environments. Hence, we propose an optimization modeling agent for bid and auctioneer selection. The agent has the capability to automatic model formulation for Integer Programming modeling. Finally, we show the viability of N-BOCA through prototype and experiments. The results say both higher allocation efficiency and effectiveness compared with 1-to-N general combinatorial auction mechanisms.

  • PDF

RFID Tag Ownership Transfer Protocol Using Lightweight Computing Operators (간단한 연산을 사용한 RFID 태그 소유권 이전 프로토콜)

  • Lee, Jae-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1413-1426
    • /
    • 2013
  • RFID thecnology has been widely adopted by industries for supply chain management. When a product item is manufactured RFID tag is attached to the product item and supply chain management among factories, distributors, retailers and customers needs to handle ownership transfer for the product item carefully. With RFID technology, the secure and efficient ownership transfer protocol is an important issue for the identification of product items and the overall system efficiency on supply chain. Many ownership transfer protocols have been proposed now. They have security problems and use complex operations such as encryption operation and hash function. Lo et al. proposed a protocol using lightweight operations such as shift, addition, XOR, and random number generation[1]. However, this protocol has a security problem in which the secret key between the tag and the new owner is disclosed to the attackers, and it is also weak against the Fraud attack[2]. In this paper, we propose a new ownership transfer protocol using lightweight operations such as shift, addition, and random number generation. This protocol is the modified version of Lo et al.'s protocol and is secure against the security attacks.