• Title/Summary/Keyword: In/Outbound

Search Result 156, Processing Time 0.027 seconds

A New Filtering System against the Disclosure of Sensitive Internal Information (내부 중요정보 유출 방지를 위한 차단 시스템 개발)

  • Ju, Tae-kyung;Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1137-1143
    • /
    • 2015
  • Sensitive internal information has been transmitted in a variety of services of Internet environment, but almost users do not know what internal information is sent. In this paper, we intend to develop a new filtering system that continuously monitors the sensitive information in outbound network packets and notifies the internal user whether or not to expose. So we design a filtering system for sensitive information and analyze the implementation results. Thus users visually can check whether disclosure of the important information and drop the corresponding packets by the proposed system. The results of this study can help decrease cyber threats various targeting internal information of company by contributing to prevent exposure of sensitive internal information.

Case Study on the continuous pickup and delivery vehicle routing problem in Multi-level Logistic Network based on S automobile Part Logistics Process (다단계 물류 네트워크에서 A/S 부품 집화 및 배송이 연속적으로 발생하는 문제에 관한 사례연구 -자동차 부품 물류 프로세스를 중심으로-)

  • Song, Jun-Woo;Kim, Kyung-Sup;Jeong, Suk-Jae
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.2
    • /
    • pp.193-204
    • /
    • 2013
  • The growing logistics strategy of a company is to optimize their vehicle route scheduling in their supply chain system. It is very important to analyze for continuous pickups and delivery vehicle scheduling. This paper is a computational study to investigate the effectiveness of continuous pickups and delivery vehicle routing problems. These scheduling problems have 3 subproblems; Inbound Vehicle Routing Problem with Makespan and Pickup, Line-haul Network Problem, and Outbound Vehicle Routing Problem with Delivery. In this paper, we propose 5 heuristic Algorithms; Selecting Routing Node, Routing Scheduling, Determining Vehicle Type with Number and Quantity, and Modification Selecting Routing Node. We apply these Algorithms to S vehicle company. The results of computational experiments demonstrate that proposed methods perform well and have better solutions than other methods considering the basic time and due-date.

Study of Regional Differences Between Attitudes Toward Service and Behavior of Chinese Passengers Using Incheon International Airport (인천국제공항 이용 중국여객의 권역별 서비스 인식 및 행동특성에 관한 연구)

  • Lee, Myeong-U;Choe, Yeon-Cheol;Lee, Su-Mi
    • 한국항공운항학회:학술대회논문집
    • /
    • 2015.11a
    • /
    • pp.231-236
    • /
    • 2015
  • Ever since the permission of overseas travel by the Chinese government in 1983, the Chinese outbound travel market has been growing at an expanding rate. The Republic of Korea has been able to reap great benefits from this growth, and this has been noticeable especially in the aviation market. Chinese passengers count for 23.9% of the total passengers at Incheon International Airport (IIA), and it is no doubt Chinese passengers will remain important customers for IIA. Given the fact that China has such a huge territory and possesses a population of more than 1.3 billion, there rises the need to divide China into smaller regions. By doing so, the different thoughts Chinese passengers have, and the actions they show in terms of travel and airport service consumption according to differing regions can be figured out. With knowledge of the differences, IIA can provide different services to fit Chinese passengers from differing regions, hence increasing the total consumer value and satisfaction rate of IIA. This study has divided China into 5 different regions according to official regional recognition of China, and difference of economical, social factors, etc... With the results obtained from this study, different strategies can be implemented for the 5 regions.

  • PDF

RFID-Based Automatic Inspection System Design and Implementation for Manufacturing and Retail Industry (제조 및 유통산업을 위한 RFID 기반 자동 검수 시스템의 설계 및 구현)

  • Kim, Jin-Suk;Park, Jong-Kwon;Shin, Yong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.97-105
    • /
    • 2014
  • Current manufacturing and distribution industries work with handwritten shipping information or receive operation results in excel files and have to go through computer processing for their logistics. Thus, hand writing error or computer entry error, non-real-time data processing, quantity shortage and excess operating problems have been frequently occurring in many logistics points. In this paper, we will be proposing a RFID based automatic inspection system that will ensure more accurate data for inbound and outbound. Real-time data processing and automatic inspection system will show cost saving effect compared to the existing system.

An Adaptive Genetic Algorithm for a Dynamic Lot-sizing and Dispatching Problem with Multiple Vehicle Types and Delivery Time Windows (다종의 차량과 납품시간창을 고려한 동적 로트크기 결정 및 디스패칭 문제를 위한 자율유전알고리즘)

  • Kim, Byung-Soo;Lee, Woon-Seek
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.37 no.4
    • /
    • pp.331-341
    • /
    • 2011
  • This paper considers an inbound lot-sizing and outbound dispatching problem for a single product in a thirdparty logistics (3PL) distribution center. Demands are dynamic and finite over the discrete time horizon, and moreover, each demand has a delivery time window which is the time interval with the dates between the earliest and the latest delivery dates All the product amounts must be delivered to the customer in the time window. Ordered products are shipped by multiple vehicle types and the freight cost is proportional to the vehicle-types and the number of vehicles used. First, we formulate a mixed integer programming model. Since it is difficult to solve the model as the size of real problem being very large, we design a conventional genetic algorithm with a local search heuristic (HGA) and an improved genetic algorithm called adaptive genetic algorithm (AGA). AGA spontaneously adjusts crossover and mutation rate depending upon the status of current population. Finally, we conduct some computational experiments to evaluate the performance of AGA with HGA.

Factors That Influence the Intentions to Revisit Korea of Vietnamese Tourists

  • NGUYEN, Xuan Truong
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.4
    • /
    • pp.247-258
    • /
    • 2020
  • The study investigates the influences of different factors on revisit intention to Korea of Vietnamese tourists. A mixed-method including qualitative and quantitative methodologies were utilized. A focus group of 9 experts was carried out for reviewing and exploring different factors and the conceptual model. An in-depth interview with 19 participants was developed with an aim to develop and correct measurement items. The conceptual model was tested and developed using data collected by a questionnaire, from a sample of 473 respondents, who have visited Korea by both electronic and paper surveys with non-probability and convenience sampling techniques. The questionnaire in this research applied a 5-point Likert scale and was distributed both electronically using Google form and by questionnaire paper. The Bootstrap model was used for estimating the model parameters for retesting the reliability of the estimates. Factor analysis and Structural Equation Modelling are employed to analyze the data. Results showed that 427 tourists traveling by groups organized by travel companies and 46 tourists traveling on their own. The reliability, tangibility, empathy, and assurance had influences on tourists' intention to revisit a destination, especially through satisfaction mediating construct. Destination image, self-congruity, and the emergence of Hallyu had influences intension revisit through attitude and tourist motivation.

ArcGIS based Analysis of Multiple Accident Areas Caused by Marine Plastic Litter in Republic of Korea

  • Kim, Bo-Ram;Park, Young-Kwon
    • Applied Chemistry for Engineering
    • /
    • v.33 no.4
    • /
    • pp.408-418
    • /
    • 2022
  • Marine accidents involving the entanglement of marine litter have continued to increase, with over 300 to 400 cases per year according to the statistical agency. Entanglement of marine litter may also lead to large-scale marine accidents which cause capsizing and sinking, thereby further causing detrimental casualties and material damages, and thus exceptional attention and care are required. In this study, Incheon, Busan, and Geoje and Tongyeong were found to be the high-frequency locations for accidents, which were selected by considering the ArcGIS analysis about the marine accidents of entanglement of marine litter and the occurrence frequency by the standard. The characteristics of the multiple accident areas involving entanglement of marine litter were the coastal cities where fishing facilities or marine leisure related conditions were activated, with the port which handles much of the traffic of outbound and inbound vessels located nearby. Marine plastic pollution impacts not only the marine ecosystem and food chain, but also the hull and engine of ships, and may further pose threats to the safety of vessels and crews. It is necessary to find a common link between the relevant areas and to strive to remove the root causes of marine accidents by reducing marine litter.

Analysis on Types of Golf Tourism After COVID-19 by using Big Data

  • Hyun Seok Kim;Munyeong Yun;Gi-Hwan Ryu
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.1
    • /
    • pp.270-275
    • /
    • 2024
  • Introduction. In this study, purpose is to analize the types of golf tourism, inbound or outbound, by using big data and see how movement of industry is being changed and what changes have been made during and after Covid-19 in golf industry. Method Using Textom, a big data analysis tool, "golf tourism" and "Covid-19" were selected as keywords, and search frequency information of Naver and Daum was collected for a year from 1 st January, 2023 to 31st December, 2023, and data preprocessing was conducted based on this. For the suitability of the study and more accurate data, data not related to "golf tourism" was removed through the refining process, and similar keywords were grouped into the same keyword to perform analysis. As a result of the word refining process, top 36 keywords with the highest relevance and search frequency were selected and applied to this study. The top 36 keywords derived through word purification were subjected to TF-IDF analysis, visualization analysis using Ucinet6 and NetDraw programs, network analysis between keywords, and cluster analysis between each keyword through Concor analysis. Results By using big data analysis, it was found out option of oversea golf tourism is affecting on inbound golf travel. "Golf", "Tourism", "Vietnam", "Thailand" showed high frequencies, which proves that oversea golf tour is now the re-coming trends.

Legal Aspects of International Joint Ventures (합작투자계약(合作投資契約)에 관한 법적(法的) 문제(問題))

  • Park, Whon-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.18
    • /
    • pp.159-188
    • /
    • 2002
  • International joint ventures are usually formed and managed by domestic companies and foreign investors for the common objectives. They offer an opportunity for each partner to benefit significantly from the comparative advantages of the other. Local partners bring knowledge of the domestic market; familiarity with government bureaucracies and regulations; understanding of local labor markets; and existing manufacturing facilities. Foreign partners can offer advanced process and product technologies, management know-how, and access to export markets. In Korea, joint ventures have been encouraged to usher in foreign investors with foreign currency capital badly needed during the IMF financial crisis. In the meantime, Korean laws and regulations with respect to joint ventures have been largely overhauled to promote foreign direct investment (FDI) both inbound and outbound. They include four types of FDI, i.e., acquisition of foreign stocks, provision of long-term loans, participation in joint operations like resources development, and establishment of foreign offices. From the legal point of view, the formal joint venture agreement must be an offspring of a series of tough negotiations between domestic and foreign partners. They usually stress the long-term relationship with the good will and dedication to each other, and restrict the free transfer of stocks. Both partners are earnestly interested in the ownership and management of the joint venture. So they keep a close eye on the articles of incorporation, changes of business environment, conflict resolution methods, transparency of accounting and other financial matters. When a multinational corporation (MNC) is involved in the joint venture, conflicts over management strategies, marketing and other issues take place more often than not between the MNC and local partners. We have to pay attention to joint ventures, particularly, in China and North Korea. As witnessed in other transition economies, China is eagerly bringing in foreign direct investments for the development of nation's economy. China encourages foreign investors to establish ordinary joint ventures, contractual joint ventures, solely invested foreign capital companies and jointly operated development companies with local partners. In North Korea, however, joint ventures have a different meaning like contractual joint ventures in China, in which North Korean partners have an initiative in the management. Rather, jointly operated companies or simply processing-for-wage companies are recommended in view of the unpredictable legal infrastructure in North Korea.

  • PDF

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF