• Title/Summary/Keyword: Inbound and outbound systems

Search Result 29, Processing Time 0.02 seconds

Information Technology Implementation in Supply Risk and Performance (공급위험과 성과를 위한 정보 기술 실행)

  • Kim, Minkyun;Chai, Sangmi
    • Management & Information Systems Review
    • /
    • v.33 no.1
    • /
    • pp.237-261
    • /
    • 2014
  • This study is to investigate the impact of information technology implementation on supply chain risk and performance. It focuses on how information technology adoption affects supply risk as well as performance. It collected one hundred fifty nine responses from supply executives and supply and purchasing managers of U.S manufacturing firms by applying a survey methodology. The research results provide empirical evidence that the use of information technology in the supply chain mitigates supply risk and improves performance. More importantly, information technology adoption involves three aspects: inbound and outbound communications, internal communications and administration and finally, mitigation of supply risks and improved performance via order taking and procurement. This research emphasizes the importance of IT implementation in supply risk management. It also points out how information technology adoption facilitates the impact of information technology in risk mitigation in the supply chain and in performance. Thus, supply and purchasing managers need to consider IT implementation and adoption when establishing their risk mitigating strategies within the supply chains.

  • PDF

Innovation Capabilities of ICT SMEs in the Open Innovation (ICT 중소기업의 혁신 역량: 개방형 혁신을 중심으로)

  • Taehyup Roh
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.169-183
    • /
    • 2017
  • As global competition is heating up and product life cycle has been rapidly shortened, each company pursues a variety of competitive technology innovations through different means of innovation. In this study, we assume that open innovation can be a shift motive of the technology innovation paradigm of small and medium enterprises (SMEs) being beyond the limitations of R&D within a company. We analyze the process and content of open innovation and performance. In addition, we identify the problems generated in the open innovation process and analyze the ways to strengthen open innovation. This study is based on the investigations into the technological competitiveness of local SMEs. The innovation ecosystem is analyzed from the perspective of product/service innovation, organizational innovation, and marketing innovation. Situational analysis is presented on the relationship between the innovation capabilities of information and communication technology SMEs and innovation performance.

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

Analysis of Traffic and Attack Frequency in the NURION Supercomputing Service Network (누리온 슈퍼컴퓨팅서비스 네트워크에서 트래픽 및 공격 빈도 분석)

  • Lee, Jae-Kook;Kim, Sung-Jun;Hong, Taeyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.5
    • /
    • pp.113-120
    • /
    • 2020
  • KISTI(Korea Institute of Science and Technology Information) provides HPC(High Performance Computing) service to users of university, institute, government, affiliated organization, company and so on. The NURION, supercomputer that launched its official service on Jan. 1, 2019, is the fifth supercomputer established by the KISTI. The NURION has 25.7 petaflops computation performance. Understanding how supercomputing services are used and how researchers are using is critical to system operators and managers. It is central to monitor and analysis network traffic. In this paper, we briefly introduce the NURION system and supercomputing service network with security configuration. And we describe the monitoring system that checks the status of supercomputing services in real time. We analyze inbound/outbound traffics and abnormal (attack) IP addresses data that are collected in the NURION supercomputing service network for 11 months (from January to November 1919) using time series and correlation analysis method.

Design and Implementation of an InfiniBand System Interconnect for High-Performance Cluster Systems (고성능 클러스터 시스템을 위한 인피니밴드 시스템 연결망의 설계 및 구현)

  • Mo, Sang-Man;Park, Kyung;Kim, Sung-Nam;Kim, Myung-Jun;Im, Ki-Wook
    • The KIPS Transactions:PartA
    • /
    • v.10A no.4
    • /
    • pp.389-396
    • /
    • 2003
  • InfiniBand technology is being accepted as the future system interconnect to serve as the high-end enterprise fabric for cluster computing. This paper presents the design and implementation of the InfiniBand system interconnect, focusing on an InfiniBand host channel adapter (HCA) based on dual ARM9 processor cores The HCA is an SoC tailed KinCA which connects a host node onto the InfiniBand network both in hardware and in software. Since the ARM9 processor core does not provide necessary features for multiprocessor configuration, novel inter-processor communication and interrupt mechanisms between the two processors were designed and embedded within the KinCA chip. Kinch was fabricated as a 564-pin enhanced BGA (Bail Grid Array) device using 0.18${\mu}{\textrm}{m}$ CMOS technology Mounted on host nodes, it provides 10 Gbps outbound and inbound channels for transmit and receive, respectively, resulting in a high-performance cluster system.

A Study on the Current Situation and Problems of Agricultural Products e-Commerce in Korea (B2B 농산물 전자상거래 활성화 방안과 과제에 관한 연구)

  • Kim, Kyu-Hyong;Lee, Moon-Seok
    • International Commerce and Information Review
    • /
    • v.13 no.1
    • /
    • pp.29-52
    • /
    • 2011
  • A predictable and manageable output is desirable for most businesses. However, it is very difficult to control the quality and quantity of products in the food and agriculture business. Predictable outputs help managers plan their marketing, sales, and inbound and outbound logistics, but these are not easy to achieve in the food and agriculture business. Various industries have adopted different levels of automation and utilization of information systems for quality/quantity control; however e-Commerce of the food and agriculture industry is far behind those of other industries. Today, the food and agriculture industry is supposed to be more integrated than ever in order to reduce risks and improve processing costs, from farm to table. Since its operations including production, processing, storage, distribution, and management are dispersed all over the world, the food and agricultural industries now depend more on IT than other industries. This study attempts to develop a framework to analyze the current situation of agricultural product e-Commerce in Korea, and finds out the actual situation of the farmers operating on-line shopping systems through the developed framework and suggests some improvements.

  • PDF

A Study on Estimating Tourism Elasticities using Autoregressive Distributed Lag(ARDL) model (ARDL 모형을 이용한 관광탄력성 추정에 대한 연구)

  • Lee, Kyung-Hee;Kim, Kyung-Soo
    • Management & Information Systems Review
    • /
    • v.36 no.2
    • /
    • pp.81-92
    • /
    • 2017
  • This study was to investigate the elasticity in tourism demand of Chinese tourists visiting Malaysia through ARDL models by using Chinese tourists arrivals, GDP, CPI, transportation costs and others. When China was implementing an open-door policy with foreign countries in the early 15th century, the movement of Chinese was very limited, and then communication between China and other countries was very weak. However, the Chinese government persistently and entirely implemented an open-door policy by participating in the World Trade Organization(WTO) in 2001. The Chinese government has opened the economy through foreign direct investment by providing various incentives for foreign investment. As a result, inbound and outbound Chinese movements increased in the early 21st century. China was one of the top five most visited tourist destinations in the world by 2016, and also Chinese tourists traveling abroad increased, so they made Malaysia a popular tourists destination because of increase sharply to around 1.41 million. This study examined the significance of major economic factors affecting the increase in Chinese tourists arriving in Malaysia. Other factors that induced their arrival included income, tourism prices, transportation costs and promotional activities. Short-run shocks from the Asian economic crisis and the outbreak of SARS were included to understand how tourism demand in Malaysia was affected. Finally this study found that the combination of the ARDL and the Error Correction Model were useful to statistically estimate the elasticities of tourism demand.

  • PDF

A Study on Evaluation of Harbor VTS Operators' Workload by the Analysis of Marine Traffic (교통량 분석을 통한 항만 VTS 관제사의 업무량 평가)

  • Park, Sung-Yong;Park, Jin-Soo;Kang, Jung-Gu;Park, Young-Soo
    • Journal of Navigation and Port Research
    • /
    • v.32 no.8
    • /
    • pp.569-576
    • /
    • 2008
  • By the development of international trade in last decades, Korean International Trade has been grown rapidly and Korean Port and Port facilities have been improved stimultaneously: finally volume of the marine traffic increased rapidly. Presently, 15 VTS centers have serving in Korean waters and since the introduction of the first VIS Center in Korea there is no quantitative analysis to find workload of VIS operator. After that Port-MIS and De-brief data have been gathered for 7 days and inbound-outbound vessels time-g/t table prepared and traffic volume examined for each V1S center. Hence $L^2$ conversion traffic volume and dangerous vessel ratio obtained Later on conversion controlled number obtained by denoting ratio 1.0 to directly controlled vessels by VTSO and denoting ratio 0.3 to indirectly controlled vessels by VTSO. Traffic volume, large vessel ratio, dangerous vessel ratio, dimension of VTS controlled area, marine accident occurrence frequency and communication volume of comm. log can be counted as a factor which influence to workload of VTSO. All those factors have been examined and analyzed. Finally, ship's size and dangerous vessel ratio have been chosen to derive the Number of composite conversion control for workload formula.

Building battery deterioration prediction model using real field data (머신러닝 기법을 이용한 납축전지 열화 예측 모델 개발)

  • Choi, Keunho;Kim, Gunwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.243-264
    • /
    • 2018
  • Although the worldwide battery market is recently spurring the development of lithium secondary battery, lead acid batteries (rechargeable batteries) which have good-performance and can be reused are consumed in a wide range of industry fields. However, lead-acid batteries have a serious problem in that deterioration of a battery makes progress quickly in the presence of that degradation of only one cell among several cells which is packed in a battery begins. To overcome this problem, previous researches have attempted to identify the mechanism of deterioration of a battery in many ways. However, most of previous researches have used data obtained in a laboratory to analyze the mechanism of deterioration of a battery but not used data obtained in a real world. The usage of real data can increase the feasibility and the applicability of the findings of a research. Therefore, this study aims to develop a model which predicts the battery deterioration using data obtained in real world. To this end, we collected data which presents change of battery state by attaching sensors enabling to monitor the battery condition in real time to dozens of golf carts operated in the real golf field. As a result, total 16,883 samples were obtained. And then, we developed a model which predicts a precursor phenomenon representing deterioration of a battery by analyzing the data collected from the sensors using machine learning techniques. As initial independent variables, we used 1) inbound time of a cart, 2) outbound time of a cart, 3) duration(from outbound time to charge time), 4) charge amount, 5) used amount, 6) charge efficiency, 7) lowest temperature of battery cell 1 to 6, 8) lowest voltage of battery cell 1 to 6, 9) highest voltage of battery cell 1 to 6, 10) voltage of battery cell 1 to 6 at the beginning of operation, 11) voltage of battery cell 1 to 6 at the end of charge, 12) used amount of battery cell 1 to 6 during operation, 13) used amount of battery during operation(Max-Min), 14) duration of battery use, and 15) highest current during operation. Since the values of the independent variables, lowest temperature of battery cell 1 to 6, lowest voltage of battery cell 1 to 6, highest voltage of battery cell 1 to 6, voltage of battery cell 1 to 6 at the beginning of operation, voltage of battery cell 1 to 6 at the end of charge, and used amount of battery cell 1 to 6 during operation are similar to that of each battery cell, we conducted principal component analysis using verimax orthogonal rotation in order to mitigate the multiple collinearity problem. According to the results, we made new variables by averaging the values of independent variables clustered together, and used them as final independent variables instead of origin variables, thereby reducing the dimension. We used decision tree, logistic regression, Bayesian network as algorithms for building prediction models. And also, we built prediction models using the bagging of each of them, the boosting of each of them, and RandomForest. Experimental results show that the prediction model using the bagging of decision tree yields the best accuracy of 89.3923%. This study has some limitations in that the additional variables which affect the deterioration of battery such as weather (temperature, humidity) and driving habits, did not considered, therefore, we would like to consider the them in the future research. However, the battery deterioration prediction model proposed in the present study is expected to enable effective and efficient management of battery used in the real filed by dramatically and to reduce the cost caused by not detecting battery deterioration accordingly.