• Title/Summary/Keyword: Environment Logistics

Search Result 720, Processing Time 0.036 seconds

A Determination of the Optical Containership Size Using a Total Shipping Cost Analysis (컨테이너선의 총 비용 분석을 통한 노선별 최적선형 도출)

  • Kim Tae-Won;Kwak Kyu-Seok
    • Journal of Navigation and Port Research
    • /
    • v.29 no.5 s.101
    • /
    • pp.421-429
    • /
    • 2005
  • Traditionally, determination of the optimal containership size is the most important factor for competitiveness of shipping companies in the shipping market. Under this environment, many shipping companies and researchers have studied about it. The objective of this research is to determine the optimal containership size using a total shipping cost in the main trunk lines. Total shipping cost is calculated at the ground of capital costs, vessel operation costs, voyage costs, port charges and miscellaneous costs for 'Europe-Far East', 'Far East-North America' and 'Europe-Far East-North America' services. Analysis results showed that the 6,500TEU containership is an optimal size on the 'Europe-Far East' and 'Europe-Far East-North America' services. And the 8,200TEU containership is an optimal size on the 'Far East-North America' service. Moreover, if the larger containerships over 8,200TEU class start operation afterward, it would be less competitive in the analyzed 3services.

Study on Globalization of Korean Fashion Enterprises -Global Configuration, Global Competitive Strategy, and Global Performance of Value Activities- (한국패션기업의 세계화 연구 -기업가치활동의 세계적 배치 및 국제경쟁전략, 세계화 성과를 중심으로-)

  • Son, Mi-Young;Rhee, Eun-Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.29 no.2
    • /
    • pp.286-297
    • /
    • 2005
  • Recently, due to the gloalization of the industry environment and the consequent multi-national companies led by industrialized countries, fashion companies of newly industrialized countries are pursuing to globalize their businesses. This study conducted to review the global configuration of activities of the added value chain, the strategies to enhance global competitiveness, and global performance of value activities of Korean fashion companies. The data were collected from the survey by questionnaire on Korean fashion companies. The methods of analysis used in this study were regression, and descriptive statistics of the data. the results werw as follows. First, Korean fashion companies were undergoing diverse value activities through their foreign subsidiaries and overseas out-sourced companies in a wide spectrum of business activities ranging from design/planning o products to marketing/logistics. Second, the global competitive strategies that the Korean fashion companies were most focused on were the cost/productivity aspects. The efforts to differentiate the products from competitors, the efforts for innovation, an the efforts of growth were the next strategies. The strategy that was least emphasized was on seeking alliance with other business partners. Third, the result of the globalization efforts showed an overseas market growth of and average of 9%, and an average overseas market profit of 7.8%. The overall satisfaction on the result of the overseas market activities, and the rate of accomplishment of market targets were generally low.

The Exploratory Study on Security Threats and Vulnerabilities for Mobile Office Environment (모바일오피스 환경에서의 보안위협 및 취약점에 대한 탐색적 연구)

  • Choi, Young-Jin;Ra, Jong-Hei;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.175-185
    • /
    • 2014
  • This study is based on the information security management system, the threat from mobile office, mobile office configuration item type, vulnerability analysis and control at the level of the current possibilities for technology to its purpose. To perform exploratory study for mobile Office to target the new technology, we were used the integrated research methods such as the documentary survey, expert FGI and real user's survey. To identify the main risk areas of mobile office services, we develop the mobile service layer model that separated the place, terminal, network, server according to service deliverly system. Finally, the result of survey for threats and vulnerabilities showed that the control of the terminal of user is a significant.

A study on the Estimation of $CO_2$ Emission in Container Port by using Container O/D Analysis (컨테이너 O/D 분식에 따른 $CO_2$ 배출량 추정)

  • Kim, Hwan-Seong;Jo, Min-Ji;Choi, Se-Kyung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2009.06a
    • /
    • pp.194-195
    • /
    • 2009
  • According to the issue "global warming", many regulations and agreements with countries in the world are becoming set and it is being fulfill now. Under the progress of Post Kyoto Protocol agreement, It will be sure that Korea rave a duty to reduce $CO_2$ emission from 2013. For them, Korea have to make a strategies about the Climatic Change Convention for all industries. Recently, a great attention about $CO_2$ emission in the world is focused on port, shipping line and airline. Most countries are establishing policies to prevent environment from these industry fields, but Korea has not yet made for them. Thus, Korea need to collect $CO_2$ emission data not only the routes of container from port but also activities in the port. In this paper, an estimation of $CO_2$ emission under the route of container transportation at Korea by using O/D analysis will be addressed. And then, it will be used to make a optimal routes of container transportation which can reduce $CO_2$ emission in future.

  • PDF

The Influence of Organizational External Factors on Construction Risk Management among Nigerian Construction Companies

  • Adeleke, A.Q.;Bahaudin, A.Y.;Kamaruddeen, A.M.;Bamgbade, J.A.;Salimon, Maruf Gbadebo;Khan, Muhammad Waris Ali;Sorooshian, Shahryar
    • Safety and Health at Work
    • /
    • v.9 no.1
    • /
    • pp.115-124
    • /
    • 2018
  • Background: Substantial empirical research has shown conflicting results regarding the influence of organizational external factors on construction risk management, suggesting the necessity to introduce a moderator into the study. The present research confirmed whether rules and regulations matter on the relationships between organizational external factors and construction risk management. Methods: Based on discouragement and organizational control theory, this research examined the effects of organizational external factors and rules and regulations on construction risk management among 238 employees operating in construction companies in Abuja and Lagos, Nigeria. A personally administered questionnaire was used to acquire the data. The data were analyzed using partial least squares structural equation modeling. Results: A significant positive relationship between organizational external factors and construction risk management was asserted. This study also found a significant positive relationship between rules and regulations and construction risk management. As anticipated, rules and regulations were found to moderate the relationship between organizational external factors and construction risk management, with a significant positive result. Similarly, a significant interaction effect was also found between rules and regulations and organizational external factors. Implications of the research from a Nigerian point of view have also been discussed. Conclusion: Political, economy, and technology factors helped the construction companies to reduce the chance of risk occurrence during the construction activities. Rules and regulations also helped to lessen the rate of accidents involving construction workers as well as the duration of the projects. Similarly, the influence of the organizational external factors with rules and regulations on construction risk management has proven that most of the construction companies that implement the aforementioned factors have the chance to deliver their projects within the stipulated time, cost, and qualities, which can be used as a yardstick to measure a good project.

Evaluation of the Highway Traffic Safety Exposure Measures (도로교통안전도 비교평가지수 산정연구)

  • Kim, Ki Yong;Kim, Won Chul;Chang, Myungsoon
    • Journal of Korean Society of Transportation
    • /
    • v.31 no.5
    • /
    • pp.26-36
    • /
    • 2013
  • Highway traffic safety evaluation of area on the basis of the accident rate has a limitation, thus its result is dependent on the exposure variables. It works an obstacle to decision making for effective budget execution. In this paper, we developed a methodology of taking simultaneously macroscopic exposure indicators into account in evaluating the safety using least squares method. The weight of exposure indicators to make up of highway traffic safety evaluation index is that accident rate per population, accident rate per registration vehicle and accident rate per length of road is 0.29, 0.52 and 0.19 respectively and calculated the highway traffic safety index of total local governments in Korea. The methodology to calculate highway traffic safety evaluation index proposed in this paper can be utilized in executing the traffic safety policies to increase the efficiency of investment about traffic safety budget.

RFID Authentication System with ID Synchronization (ID 동기화를 가지는 RFID 인증 시스템)

  • Park Jang-Su;Lee Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.615-623
    • /
    • 2006
  • It has been estimated that 'RFID' technology would be playing an important role in the incoming ubiquitous environment. For this reason, many studies on 'RFID' have been conducted and its application has been on the increase in various fields such as finance, medicine, transportation and culture as well as in logistics distribution. However, the communication between Tag and Reader in RFID system has been conducted by wireless communication of radio frequency so that the information on identification could be eavesdropped by the third party maliciously. Such eavesdropped information could be also used as basic information in attacking others; in this regard, it could impair the privacy of its users and the users have avoided using 'RFID.' To solve theses problems, many studies are being performed to different output of tags by renewing ID. However, protocols have been devised without considering an ID Synchronization in the ID renewal process between database and tag in the existing studies. In this regard, this study has suggested a RFID Authentication Protocol while considering the ID Synchronization.

  • PDF

A Decision Support System for Designing Container Terminals (컨테이너 터미널 설계를 위한 의사결정 지원시스템)

  • Won, Seung Hwan;Chun, Bong Kyung;Jeon, Su Min;Lee, Byung Kwon;Jang, Dong Won;Cho, Hwan Gue;Kim, Kap Hwan
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.4
    • /
    • pp.91-107
    • /
    • 2006
  • This study introduces a software system for supporting the engineering process of container terminals. The design procedure consists of data input, capacity requirements, alternative design, alternative evaluation, and results output. In order to design and evaluate alternatives rapidly, a set of libraries for container terminals was developed. The libraries consist of Wharf, Yard, TravellingArea, and Gate. The architecture of the set of libraries was designed by an object-oriented approach. Various types of container terminal models can be constructed by using a user friendly interface, the CAD based environment, and the combinations of the elements of the libraries. Alternative models can be evaluated by a simulation.

  • PDF

Case Study on Key Activities for Effective Supplier Relationship Management(SRM) (효과적인 공급자관계관리(SRM)를 위한 핵심활동 사례연구)

  • Choi, Hye Won
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.4
    • /
    • pp.813-823
    • /
    • 2019
  • Supplier Relationship Management (SRM) is a strategic partnership activity for an enterprise and is expected to be a significant performance element in the current enterprise environment where uncertainty is growing. Despite the effective SRM allows companies to manage quality and inventory throughout their logistics procurement process with their suppliers and increase the profitability of the company, there is a scarce of theory about supplier relationship management (SRM) and many companies are not aware of the importance of SRM and depend only on simple electronic purchasing methods. Therefore, I analyze the H Company as a case company, which is a large domestic company and has reached 2,500 domestic and overseas suppliers. SRM process and its effects are evaluated as (1) Purchasing strategy division 2) Process division (3) IT infrastructure division. By analyzing SRM as one of the management strategies that bring the overall value of enterprise performance up, and by looking at how domestic large corporations manage their suppliers, I hope that manufacturers with many suppliers will recognize the importance of SRM and build an SRM tailored to their business.

Improving development environment for embedded software (내장 소프트웨어를 위한 개발 환경의 개선)

  • AHN, ILSOO
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • RFID systems have been widely used in various fields such as logistics, distribution, food, security, traffic and others. A RFID middleware, one of the key components of the RFID system, perform an important role in many functions such as filtering, grouping, reporting tag data according to given user specifications and so on. However, manual test data generation is very hard because the inputs of the RFID middleware are generated according to the RFID middleware standards and complex encoding rules. To solve this problem, in this paper, we propose a black box test technique based on RFID middleware standards. Firstly, we define ten types of input conversion rules to generate new test data from existing test data based on the standard specifications. And then, using these input conversion rules, we generate various additional test data automatically. To validate the effectiveness of generated test data, we measure coverage of generated test data on actual RFID middleware. The results show that our test data achieve 78% statement coverage and 58% branch coverage in the classes of filtering and grouping, 79% statement coverage and 64% branch coverage in the classes of reporting.

  • PDF