• Title/Summary/Keyword: Logistics Information Management

Search Result 720, Processing Time 0.029 seconds

The Study on Application of Activity-Based Costing System on the Department of Clinical Pathology (임상병리과의 활동기준원가 관리 적용에 관한 연구)

  • Jung, Soo-Kyung;Jung, Key-Sun;Choi, Hwang-Gue;Rhyu, Kyu-Soo
    • Korea Journal of Hospital Management
    • /
    • v.5 no.1
    • /
    • pp.129-155
    • /
    • 2000
  • This empirical study, activity-based costing, a newly introduced approach that has proved to be an improvement over the conventional costing system in product or service costing, is applied at department of clinical pathology in K university hospital. The study subjects were 233 test procedures done in clinical laboratory of K university hospital. Activity analysis was done by interview, questionnaires, and time study, and the amount of resources consumed by each activity and their costs are then traced and applied to the laboratory tests. The main purpose of this study were to compare the test costs of activity-bases costing with those of conventional costing, and test fees of medical insurance, and to provide accurate cost informations for the decision makers of hospital. The major findings of this study were as belows. 1. The cost drivers for application of activity-based costing at clinical laboratory were cases of sample collection, case of specimen, cases of test, and volume-related allocation bases such as direct labor hours and total revenue of each test. 2. The profits of each clinical laboratory fields analyzed by conventional costing were different from the profits analyzed by activity-based costing, especially in the field of Urinalysis(approximately over estimated 750%). 3. The standard full costs by conventional costing were quite different from the costs computed by using activity-based costing, and the difference is most significant with the tests of long labor time. 4. From the comparison between costs computed by using activity-based costing and medical insurance fees, some test fees were significantly lower than the costs, especially in the non-automated fields. As described in this study, activity-based costing provides more accurate cost information than does conventional costing system. The former approach is especially important in the health care industry including hospitals in which planning and controlling the costs services provided are the key to maintaining a healthy financial status for the organization. Despite the contribution of activity-based costing the economic as well as technical feasibilities of implementing such a cost accounting system in an organization must be evaluated. In the development of activity-based costing systems, an activity analysis has to be conducted to identify activities that consume resources. This involves a detailed study of the organization's logistics and accounting information systems, and it is an expensive project in itself. Besides, it can be quite difficult and time consuming to identify and trace resource consumption to a specific activity. Thus the activity-based costing system should be implemented only when the decrease in cost of error far exceeds the increase in cost of measurement. By combining activity-based costing with standard costing, health care administrators can better plan and control the costs of health services provided while ensuring that the organization's bottom line is healthy.

  • PDF

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

RBAC for multi-organizational Business Process Management (기업간 비즈니스 프로세스 관리에서의 접근 권한 통제)

  • Bae, Hye-Rim;Hur, Won-Chang
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.151-166
    • /
    • 2007
  • As the number of users who are involved in a business process increases, it becomes imperative to effectively control their privileges of accessing sensitive data and information which are usually easily obtained by BPM system. Traditional RBAC (Role-based Access Control) model was first introduced to provide a logical framework to prevent unauthorized users from obtaining confidential, but in more dynamic environment such as B2B and SCM process, it usually lacks in capability of addressing such issues as configurability, customizability, or scalability of user privileges. In this study, we have proposed a privilege-template based RBAC model that can address such issues effectively. We also provided a design of the RBAC model along with illustrative examples and pseudo codes that can be used for implementing a prototype system.

  • PDF

An Exploratory Study on Security Threats of Smartwork Environment (스마트워크 환경에서의 보안 위협에 관한 탐색적 연구)

  • Ra, Jong-Hei;Choi, Young-Jin;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2012
  • Present many organizations are introduced to smartwork for reducing the operational cost and getting the labor's flexibility. The smartwork is the future-oriented worker's environment in which they can engage in their task, anytime and anywhere conveniently and efficiently. In spite of many smartwork advantages, the security problems are major issues and prevent to introducing and spreading of smartwork for organizations. Therefore, the success of the organization for smartwork environment is put in place appropriate security control model. This study is about security threats for smartwork security control model. We apply the exploratory method for this research, which are reviewing, analyzing of literature for extracting the security threats and clustering of the extracted security threats. Finally we define the 16's security threats according to the aspect of smartwork service layers.

A Study on Improving the Quality of Clothing Companies: Focusing on Kutesmart using Quality 4.0 Matrix (의류기업의 품질 개선 방안 연구: Quality 4.0 매트릭스를 활용한 쿠트스마트 사례)

  • Jang, Jin Myeong;Seo, Seung Ju;Lee, Yuna;Kim, Youn Sung
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.1
    • /
    • pp.199-211
    • /
    • 2019
  • Purpose: The concept of quality is changing in the quality 4.0 era with the fourth industrial revolution in the world. This research aims to understand the characteristics of well-adapted companies against the quality 4.0 era and to improve the quality of clothing companies. Methods: We analyzed companies that responded well to the quality 4.0 era, especially Kutesmart using Quality 4.0 Matrix. We focused on the service process of Kutesmart and we suggested modified service process to improve quality. We also interviewed an expert to verify this process is valid. Results: We found that two types are classified of well-adapted companies against the quality 4.0 era. Especially, Kutesmart has built a smart factory and introduced new technologies like 3D scanner and big data analysis. However, Kutesmart has a weakness in post-purchase process like other clothing companies. Kutesmart could solve this problem with modular production method for damaged part of customer. Conclusion: This research can be used for better understanding of the characteristics of well-adapted companies against the quality 4.0 era and service process of Kutesmart that is custom clothing company for providing information for benchmarking in this industry. This study suggests that further empirical researches on the costs and the efficiencies of applying the new technologies are necessary.

Research on Artificial Intelligence Based Shipping Container Loading Safety Management System (인공지능 기반 컨테이너 적재 안전관리 시스템 연구)

  • Kim Sang Woo;Oh Se Yeong;Seo Yong Uk;Yeon Jeong Hum;Cho Hee Jeong;Youn Joosang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.273-282
    • /
    • 2023
  • Recently, various technologies such as logistics automation and port operations automation with ICT technology are being developed to build smart ports. However, there is a lack of technology development for port safety and safety accident prevention. This paper proposes an AI-based shipping container loading safety management system for the prevention of safety accidents at container loading fields in ports. The system consists of an AI-based shipping container safety accident risk classification and storage function and a real-time safety accident monitoring function. The system monitors the accident risk at the site in real-time and can prevent container collapse accidents. The proposed system is developed as a prototype, and the system is ecaluated by direct application in a port.

A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model (키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법)

  • Cho, Won-Chin;Rho, Sang-Kyu;Yun, Ji-Young Agnes;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

A Review of the Research on E-commerce Ecosystem in China (중국 전자상거래 생태계 동향에 관한 연구)

  • Gao, Lan;Han, Jeong-Soo;Kim, Hyung-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.141-148
    • /
    • 2019
  • Based on the theory of information ecology, this paper conducts a quantitative analysis on the research literature of e-commerce ecosystem in China, and clarifies the research hotspots and development trends, so as to provide reference for subsequent studies. With the key words related literatures collected by CNKI as the data source, and the software CiteSpaceIV is used to draw a visual knowledge map, the distribution of e-commerce ecosystem research papers in China is statistically analyzed by econometric analysis method, and literature research is summarized and evaluated. The research results show that previous studies mainly focus on the concept of e-commerce ecosystem, and there are relatively few research results on the construction and evolution mechanism of e-commerce ecosystem, so the depth and breadth of research should be expanded. Applying the concept of e-commerce ecosystem to solve the problems in cross-border e-commerce will be the future research trend.

A Study on the Analysis of Ship Officers' Collision-Avoidance Behavior During Maritime Traffic Simulation (해상교통분석 시뮬레이션을 위한 항해사의 충돌회피 행동분석에 관한 연구)

  • Kim, Hongtae;Ahn, Young-Joong;Yang, Young-Hoon
    • Journal of Navigation and Port Research
    • /
    • v.44 no.6
    • /
    • pp.469-476
    • /
    • 2020
  • Modeling and Simulation (M&S) systems which deal with situational complexity often require human involvement due to the high-level decision-making that is necessary for ship movement, navigation, control center management, shipping company logistics, meteorological system information, and maritime transportation GIS. In order to properly simulate maritime traffic, it is necessary to accurately model the human decision-making process of the ship officer, including aspects of the ship officer's behavioral tendencies, personal navigation experience, and pattern of voyage errors, as this is the most accurate way in which to reproduce and predict realistic maritime traffic conditions. In this paper, which looks at agent-based maritime traffic simulation, we created a basic survey in order to conduct behavior analysis on ship operators' collision avoidance strategies. Using the information gathered throughout the survey, we developed an agent-based navigational behavior model which attempts to capture the behavioral patterns of a ship officer during an instance of ship collision. These results could be used in the future in further developments for more advanced maritime traffic simulation.