• Title/Summary/Keyword: Logistics Security Management

Search Result 94, Processing Time 0.024 seconds

Analysis of Technology for Secure Container with RFID (RFID를 활용한 컨테이너 보안기술의 현황분석)

  • Byeon, Eui-Seok;Byeon, Ji-Seok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.11-16
    • /
    • 2011
  • Information of freight tracking and tracing is one of core elements in logistics point of view. We can monitor the vehicle or vessel where freights are loaded and get the in-transit data via GPS. However, security problem exists after the shipments are unloaded. RFID is well utilized for securing the container which products are stuffed into. International standard organization sets relevant specification and e-seal appears to be at issue. The paper investigates current status of corresponding technology and proposes the policy for development of logistics industry.

Understanding Relationships Among Risk Factors in Container Port Operation UsingBayesian Network

  • Tsenskhuu Nyamjav;Min-Ho Ha
    • Journal of Navigation and Port Research
    • /
    • v.47 no.2
    • /
    • pp.93-99
    • /
    • 2023
  • This study aimed to determine relationships among risk factors influencing container port operation using Bayesian network. Risk factors identified from prior studies were classified into five groups: human error, machinery error, environmental risk, security risk, and natural disasters. P anel experts discussed identified risk factors to fulfil conditional probability tables of the interdependence model. The interdependence model was also validated by sensitivity analysis and provided an interrelation of factors influencing the direction of each other. Results of the interdependence model were partially in line with results from prior studies while practices in the global port industry confirmed interrelationships of risk factors. In addition, the relationship between top-ranked risk factors can provide a schematic drawing of the model. Accordingly, results of this study can expand the prior research in the Korean port industry, which may help port authorities improve risk management and reduce losses from the risk.

A Implementation of Blockchain based Manufacturing Supply Chain Tracking System (블록체인 기반 제조 공급망 추적 시스템 구현)

  • Lee, Jae-Ho;Nam, Ho-Ki
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.4
    • /
    • pp.183-188
    • /
    • 2017
  • Block Chain is a technology that records and shares distributed ledgers without a central authority, providing a decentralized platform for transparent transactions in the business and enhancing transparency and traceability in all transactions to ensure trust in the transaction. Despite initial doubts about this technology, it is committed to adopting, adapting and improving the technology in a wide range of industries, including finance, government, security, logistics, food, medical, legal, and real estate. This study examines this technology, its applicability and potential benefits to the manufacturing supply chain. A tracking system of manufacturing supply chain to visualize transparency and traceability is implemented, and the conditions for adopting the technology in the manufacturing supply chain and the issues to be addressed are discussed.

Evaluation of Key Success Factors for Web Design in Taiwan's Bike Case Study

  • LAI, I-Sung;HUANG, Yung-Fu;SIANG, Jie-Hua;WENG, Ming-Wei
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.927-937
    • /
    • 2020
  • Global warming awareness through energy conservation is growing due to the regulatory policies issued by governments and voluntary organization that established carbon emission limits. Transportation is one of the major contributors to carbon emissions. Bike will be simultaneously saving money, getting fit and helping to reduce global warming. Web design has been identified as a key factor for the acceptance and success of the websites and electronic commerce. The purpose of this research is to investigate the effective implementation of the proposed Analytic Hierarchy Process (AHP) technique on a bike case study whose company (Bike Company) is involved in web design for a critical component in the demonstration. Survey research used a variety of data collection methods, with the most common being questionnaires and interviews of some exporters. The research results reveal that the top five key success factors are Good reputation, Transaction security, Ease of use, Promotion, and Diversified choices, which provide the guidelines and directions for decision-makers to design effective websites in the current competitive business scenario. The major findings of this study are suggesting that Internet marketing channels are securing the company's relevance, together with paving the way for methods to increase web traffic.

Design of Port Security System Using Deep Learning and Object Features (딥러닝과 객체 특징점을 활용한 항만 보안시스템 설계)

  • Wang, Tae-su;Kim, Minyoung;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.50-53
    • /
    • 2022
  • Recently, there have been cases in which counterfeit foreign ships have entered and left domestic ports several times. Vessels have a ship-specific serial number given by the International Maritime Organization (IMO) to identify the vessel, and IMO marking is mandatory on all ships built since 2004. In the case of airports and ports, which are representative logistics platforms, a security system is essential, but it is difficult to establish a security system at a port and there are many blind spots, which can cause security problems due to insufficient security systems. In this paper, a port security system is designed using deep learning object recognition and OpenCV. The security system process extracts the IMO number of the ship after recognizing the object when entering the ship, determines whether it is the same ship through feature point matching for ships with entry records, and stores the ship image and IMO number in the entry/exit DB for the first arrival vessel. Through the system of this paper, port security can be strengthened by improving the efficiency and system of port logistics by increasing the efficiency of port management personnel and reducing incidental costs caused by unauthorized entry.

  • PDF

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.

Development of Special Asset Management System Using RFID (RFID를 이용한 특수 자산 관리 시스템 개발)

  • Han, Sang-Hoon;Min, Jang-Geun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.33-41
    • /
    • 2011
  • RFID technology is already used in the various application fields such as identification card, traffic card and etc. Many RFID application systems using UHF have been developed in the field of asset management, logistics and security. Because a human being can make mistakes, we need the system that can efficiently manage the special assets such as small arms, jewelry and medicine and can monitor them in real time. In this paper, we proposed a special assets management system to keep assets in safe custody, to monitor their safety status in real time and to manage distribution channels and history of those assets. The developed system is called Smart Cabinet because it has cabinet's form. Smart Cabinet integrates such technologies as RFID, smart card, fingerprint recognition, several sensors and LCD display in order to provide the functions for special asset management. Those functions include condition monitoring of assets, traceability management, distribution channels and security logs, which are to interact with a management server. The article demonstrated the potentiality of RFID by presenting special asset management solutions dedicated to guns and medicine management, and also showed the effectiveness and possibility of those solutions.

A Study on the Improvement Scheme of Quality Management System for Shipping & Port Operation Company (해운항만업체의 품질경영시스템 개선방안에 관한 연구)

  • Ahn, Ki-Myung;Hong, Sog-Min;Kim, Hyun-Duk
    • Journal of Navigation and Port Research
    • /
    • v.30 no.8 s.114
    • /
    • pp.675-683
    • /
    • 2006
  • From Quality Management System in early 1990, through Safety Management System in 1998, to Maritime Security System in 2002, the shipping/port industries had no choice but to accept such management systems as occasion demands or compulsory in recent 10 years. Furthermore some companies have introduced other system such as Environment Management System(ISO 14000), Occupational Health & Safety Assesment Series(OHSAS 18000) additionally. But most companies have introduced & implemented the quality, safety & security management system generally. This paper is to suggest the effective measurement & improvement plan of Quality Management System.

The Utilization of Health Service by Psychiatric Outpatients (정신과 외래환자들의 의료이용에 관한 연구)

  • Kim, Chae-Bong;Hwang, Sung-Wan
    • The Korean Journal of Health Service Management
    • /
    • v.6 no.1
    • /
    • pp.77-86
    • /
    • 2012
  • Objective of the study represents experiences of medical utilization of Psychiatric Outpatients. This research draws on information obtained from the 2008 National-wide sampling study of the Korean Healthcare Panel(KHP) conducted. The results of our study suggest the significance of variables such as the gender(p<.001) in the social demographical characteristics, the medical security type(p<.016), medical institution utilization(p<.012) treatment type(p<.004) in the utilization factors. In the case of medical utilization cost, the financial support factor(p<.018) showed a significant relationship. Depending on the particularities of gender, medical security type, financial support, medical institution utilization, treatment type were determined through a multiple logistics regression analysis. Gender showed that, among Psychiatric outpatient age of 30-59 level was 5.358 times and 60 years and older, their the second medical examination level was 4.490 times higher than Psychiatric outpatients under the age of 29. Health insurance type showed for the others medical allowance was 6.712 times higher than job health insurance and the other treatment was 0.395 times lower than drug treatment. Psychiatric outpatients utilization are rooted in the thoughts and factor levels of the Psychiatric patients and must be understood from the Psychiatric outpatients's perspective. The point is not only to gauge the patients research during Psychiatric medical utilization. The important of social community mental healthcare services levels goes beyond the goal of enhancing healthcare.

Extenuating Food Integrity Risk through Supply Chain Integration: The Case of Halal Food

  • Ali, Mohd Helmi;Tan, Kim Hua;Pawar, Kulwant;Makhbul, Zafir Mohd
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.2
    • /
    • pp.154-162
    • /
    • 2014
  • Effects of food scandals on religious belief, human health and even on causes of death indicate that firms and consumers are vulnerable to integrity risks in the global supply chain. Mitigating the integrity risk and maintaining the credence quality products like halal food is very challenging, if not impossible. Our aim in this research is to show that supply chain integration can mitigate the halal food integrity risk. To illustrate this idea, we have conducted case studies and interviews in seven Malaysian chicken supply chain focal firms. We unpack the halal integrity risks along the supply chain, such as production risk, raw material risk, food security risk, outsourcing practices risk, service risk, and logistics risk. The research argues that supply chain integration, such as internal integration and external integration practices, could minimize the halal integrity risk. The advantages of supply chain integration in mitigating the halal integrity risk are also highlighted in this paper.