• Title/Summary/Keyword: Chain Method

Search Result 2,634, Processing Time 0.025 seconds

G-ASPOO-L: The Technopreneurship-Based Supply Chain Management Model for Souvenirs MSMEs to Reach Customer Value Creation

  • NOERSASONGKO, Edi;SARTIKA, Mila;AQMALA, Diana;HASIBUAN, Zainal Arifin
    • Journal of Distribution Science
    • /
    • v.20 no.12
    • /
    • pp.59-69
    • /
    • 2022
  • Purpose: The purpose of this research is to identify and design a model for the integration between marketing and supply chain management (SCM) of technopreneurship-based souvenirs MSMEs to fulfil customer value creation. Research design, data and methodology: This research method uses the system development life cycle method. This study draws its insights and conclusions from a literature review in several fields followed by an interactive research approach that helps identify, validate, and implement a theoretical framework so that the modelling results can be adopted in applicative manner for souvenir MSMEs. Result: Implementing the "G-ASPOO-L" supply chain management integration model based on technopreneruship to fulfil value creation in the 5.0 society era created three perspectives: an inter-functional perspective, a process perspective, and an integrated business concept perspective. The supply chain management involves enterprise integration, strategic customer integration, strategic supplier integration, and marketing strategy integration. Conclusion: The proposed model framework leads to managerial problems of supply chain management strategy, which urgently requires an interaction approach that challenges the traditional view of demand creation and implementation of supply chain management to fulfil value creation. This research leverages existing knowledge and advances our understanding of the strategic integration issues companies face in digital-based competition.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

Sentence-Chain Based Seq2seq Model for Corpus Expansion

  • Chung, Euisok;Park, Jeon Gue
    • ETRI Journal
    • /
    • v.39 no.4
    • /
    • pp.455-466
    • /
    • 2017
  • This study focuses on a method for sequential data augmentation in order to alleviate data sparseness problems. Specifically, we present corpus expansion techniques for enhancing the coverage of a language model. Recent recurrent neural network studies show that a seq2seq model can be applied for addressing language generation issues; it has the ability to generate new sentences from given input sentences. We present a method of corpus expansion using a sentence-chain based seq2seq model. For training the seq2seq model, sentence chains are used as triples. The first two sentences in a triple are used for the encoder of the seq2seq model, while the last sentence becomes a target sequence for the decoder. Using only internal resources, evaluation results show an improvement of approximately 7.6% relative perplexity over a baseline language model of Korean text. Additionally, from a comparison with a previous study, the sentence chain approach reduces the size of the training data by 38.4% while generating 1.4-times the number of n-grams with superior performance for English text.

An Efficient Contour Coding Method Using Depth First Search Algorithm (Depth first search 알고리듬을 이용한 윤곽선 영상의 효과적인 부호화 기법)

  • 김종훈;김한수;김성대;김재균
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.25 no.12
    • /
    • pp.1677-1685
    • /
    • 1988
  • In this paper, a new contour coding algorithm is investigated for use in region based image coding. Generally the contour data may be encoded by its chain codes or chain difference codes. But the data compression efficiency is low because of heavy burden for initial absolute coordinates of each chain. To alleviate this problem, the depth first search in graph traversal algorithm, is applied to the chain difference coding method. The proposed coding scheme is shown to be very efficient for contour images obtained by split-merge segmentation. Finally, we can reuce data about 60% in comparison with modified chain difference coding.

  • PDF

Estimation of Defect Clustering Parameter Using Markov Chain Monte Carlo (Markov Chain Monte Carlo를 이용한 반도체 결함 클러스터링 파라미터의 추정)

  • Ha, Chung-Hun;Chang, Jun-Hyun;Kim, Joon-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.3
    • /
    • pp.99-109
    • /
    • 2009
  • Negative binomial yield model for semiconductor manufacturing consists of two parameters which are the average number of defects per die and the clustering parameter. Estimating the clustering parameter is quite complex because the parameter has not clear closed form. In this paper, a Bayesian approach using Markov Chain Monte Carlo is proposed to estimate the clustering parameter. To find an appropriate estimation method for the clustering parameter, two typical estimators, the method of moments estimator and the maximum likelihood estimator, and the proposed Bayesian estimator are compared with respect to the mean absolute deviation between the real yield and the estimated yield. Experimental results show that both the proposed Bayesian estimator and the maximum likelihood estimator have excellent performance and the choice of method depends on the purpose of use.

Detection of Coliform and Escherichia coli in Spring Water by Polymerase Chain Reaction (PCR법을 이용한 옹달샘물의 대장균군 및 대장균 검출)

  • 류승희;박석기
    • Journal of Environmental Health Sciences
    • /
    • v.28 no.2
    • /
    • pp.193-202
    • /
    • 2002
  • The polymerase chain reaction(PCR) of target lacZ and uidA genes were used to detect total coliform and Escherichia coli for determining water quality, respectively. Of 109 spring waters, coliform were detected from 38 spring waters by lacZ PCR method but 21 spring waters by culture method accepted by the Ministry of Environment for water quality monitoring. The lacz PCR method gave the results statistically equivalent to those of the culture method(kappa=0.62, McNemar=17.00). The uidA PCR method gave the same results to those of the culture method. The sensitivity and specificity of coliform and E. coli by PCR method were 100% and 80.7%, respectively. Therefore, PCR can be used for the rapid identification of Escherichia coli and coliform in potable water using uidA and lacZ.

An Efficient Data Authentication Scheme for Content Centric Networking (컨텐츠 중심 네트워크에서 해시 체인 기반의 효율적인 데이터 인증 기법)

  • Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1375-1386
    • /
    • 2016
  • This paper presents an efficient hash chain-based data authentication mechanism which can considerably reduce the overhead of processing and transmission for authenticating segments in CCN. The proposed method makes use of hash chain and MHT(Merkle Hash Tree). At first, it applies hash chain methods for data segments and encodes them to Data part. Then, it constitutes Meta part with the hash values generated at the previous step and properly applies both hash chain method and MHT-based signing for not only achieving efficiency, but also mitigating the drawback(data-loss, out-of-order transmission) of hash chain method. We have implemented our method in the CCNx library and measured the performance. When transmitting 100Mbyte of content, the proposed method generates only 2.596% of processing overhead and 1.803% of transmission overhead.

Optimal Path Finding Considering Smart Card Terminal ID Chain OD - Focused on Seoul Metropolitan Railway Network - (교통카드 단말기ID Chain OD를 반영한 최적경로탐색 - 수도권 철도 네트워크를 중심으로 -)

  • Lee, Mee Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.6
    • /
    • pp.40-53
    • /
    • 2018
  • In smart card data, movement of railway passengers appears in order of smart card terminal ID. The initial terminal ID holds information on the entering station's tag-in railway line, the final terminal ID the exit station tag-out railway line, and the middle terminal ID the transfer station tag subway line. During the past, when the metropolitan city rail consisted of three public corporations (Seoul Metro, Incheon Transit Corporation, and Korail), OD data was expressed in two metrics of initial and final smart card terminal ID. Recently, with the entrance of private corporations like Shinbundang Railroad Corporation, and UI Corporation, inclusion of entering transfer line terminal ID and exiting transfer line terminal ID as part of Chain OD has become standard. Exact route construction using Chain OD has thus become integral as basic data for revenue allocation amongst metropolitan railway transport corporations. Accordingly, path detection in railway networks has evolved to an optimal path detection problem using Chain OD, hence calling for a renewed solution method. This research proposes an optimal path detection method between the initial terminal ID and final terminal ID of Chain OD terminal IDs within the railway network. Here, private line transfer TagIn/Out must be reflected in optimal path detection using Chain OD. To achieve this, three types of link-based optimum path detection methods are applied in order of 1. node-link, 2. link-link, 3. link-node. The method proposed based on additional path costs is shown to satisfy the optimal conditions.

Dynamic Analysis of a Chain of Rigid Rods

  • Attia, Hazem Ali
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.8 no.2
    • /
    • pp.75-86
    • /
    • 2004
  • In this study, a recursive algorithm for generating the equations of motion of a chain of rigid rods is presented. The methods rests upon the idea of replacing the rigid body by a dynamically equivalent constrained system of particles. The concepts of linear and angular momentums are used to generate the rigid body equations of motion without either introducing any rotational coordinates or the corresponding transformation matrices. For open-chain, the equations of motion are generated recursively along the serial chains. For closed-chain, the system is transformed to open-chain by cutting suitable kinematic joints with the addition of cut-joints kinematic constraints. An example of a closed-chain of rigid rods is chosen to demonstrate the generality and simplicity of the proposed method.

  • PDF

- A Simulation Study on Efficient Modular Production System Analysis in Supply Chain Management - (SCM 환경에서의 실용적 모듈 생산 시스템 분석의 시뮬레이션 연구)

  • Yang Kwang Mo;Park Jin Hong;Kim Tae Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.3
    • /
    • pp.187-196
    • /
    • 2004
  • By successful establishment of Supply Chain Management System they should make the supply chains speedy and combine production information system with the outcome system and thus they reinforce the competition of the production system of local enterprises in accordance with the rapid decision making. Supply chain coordination improves if all supplier of chain take actions that together increase total supply chain profits. To design of Modularity by the grouping supplier, the proposed method is to develop the most appropriate production system models through the reflection of JIT system in the Supply Chain Management which is necessity of the times and its importance. The objects of this study is to develop the most appropriate production system Model and optimal profit model in the process line and to provide the enterprises with the models which are based on the Supply Chain Management.