• Title/Summary/Keyword: Logistics Security Management

Search Result 88, Processing Time 0.024 seconds

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

A scheme on strengthening of R.O.K reserved force (예비전력 정예화 방안)

  • Kim, Jae-Sam
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.1-45
    • /
    • 2007
  • Reserved forces of ROKA are in charge of replacement of TOE in the wartime and mission of rear area operation. But there is institutional inertia in the law and organization oriented to fill human resources rather than take mission. We need to prepare for the investment and arrangement of reserved forces as military power that would be replaced standing forces. In this portion, to reinforce reserve forces elite, First, efficient mobilization regulations and systems are suggested. I covered a maintenance of relevant mobilization ordinances which need to legislated and approved by national assembly for wartime and development of mobilization system which might lose the appropriate time for mobilization due to complicated declaration procedures and measures to overcome the panic at the initial stage of the war and organization and employment of nationwide transportation system and mobilization center. To ensure efficient resource management and mobilization of reserve forces with a number of approximately 3 million, there's a necessity of organization for integration and conciliation. To make it real, I suggested establishing and employing the mobilization center, on first phase, employ the mobilization center focusing on homeland divisions, on second phase, it is advisable to convert to national level mobilization system and develop to central mobilization center focusing on national emergency planning committee. During peacetime, in conjunction with Mobilization Cell, mobilization center can conduct resource survey and integrate and manage mobilization resources and take charge of mobilization training of subordinate units, and during wartime, in conjunction with mobilization coordination team and Cell, can ensure the execution of mobilization. Second, Future oriented reserve forces management system such as service system of reserve forces and support system of homeland defense operations. Current service and trainings of reserve forces by the year have very low connection, as it is very complex to manage the resources and trainings, and service and training lack the equity, re-establishment of service system is required. Also in an aspect of CSS and cultivation support for reserve forces, as the scope and limitation of responsibility between the armed forces and autonomous organization is obscure, conditions to conduct actual-fighting exercises are limited. Concentrated budgetting is extremely difficult because reserve forces training fields are scattered nationwide, and facilities and equipments are rapidly getting older. To improve all these, I suggest the organization of homeland defense battalion with a unit of "City-Gun-District" and supporting the local reserve forces. Conduct unit replacement or personal replacement for those who have finished their 1 or 2 years and homeland defense operation duty for those with 3-5 years for consistency and simplification. Third, I suggest Future oriented Reserved Training(FRT) and Training Center oriented training management to establish a reliable reserve training. Reserves carry out expansion of unit, conventional combat mission, homeland defense and logistics support during wartime, and actual-fighting exercise, and disaster relief, peace keeping activities. Despite diverse activities and roles, their training condition still stays definitely poor. For these reasons, Modernization of weapons and facilities through gradual replacement and procurement is essential to enhance mobilization support system.

  • PDF

A Model-based Performance Study of the EPCglobal Network (모델 기반 EPCglobal 네트워크의 성능 분석)

  • Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae
    • IE interfaces
    • /
    • v.24 no.2
    • /
    • pp.139-150
    • /
    • 2011
  • The EPCglobal Network is a computer network used to share product data among trading partners. It provides the supply chain with improved visibility and traceability by using Electronic Product Code (EPC), which is stored on an RFID tag. Although this network model is widely accepted as a global standard and the growth of EPCglobal-subscriber base is considerable, the EPC technology adoption process is still in its infancy. This is because some of the critical issues on this model still remain to be verified such as scalability, data management, security, privacy and the economic value of data sharing. In this paper, we focus on scalability issue among the challenges to overcome and we regard performance of the EPCglobal Network only as a track and trace query-processing cost in the network. We developed performance models consisting of three elements of the EPCglobal Network : Discovery Services (DS), EPC Information Services (EPCIS), Object Naming Services (ONS). Then we abstracted out the track and trace query execution model to evaluate performance of the overall EPCglobal Network. Finally using the proposed models, we carried out simulation analysis based on an RFID-based inbound logistics process of automobile parts. This work is an important step towards the EPC technology diffusion and provides guidelines for businesses looking to buy or build the EPCglobal Network-based systems.

A Study on the Cost Reduction Strategy of Aviation Ammunition (항공탄약 구매 비용 절감 방안에 관한 연구)

  • Kim, Yu-Hyun;Eom, Jung-Ho
    • Journal of National Security and Military Science
    • /
    • s.15
    • /
    • pp.57-86
    • /
    • 2018
  • The ROKAF has been training for a number of exercise for victory in the war, but the lack of aviation ammunition has become a big issue every year. However, due to the limitation of defense resources, there are many difficulties in securing and stockpiling ammunition for the war readiness. Therefore, there is a need to find a way to secure aviation ammunition for war readiness in a more economical way, so In this study, we analyze the precedent research case and the case of the reduction of the purchase cost of weapon system of other countries, and then I have suggested a plan that is appropriate for our situation. As a result of examining previous research cases for this study, there were data that KIDA studied in 2012, Precision-guided weapons acquisition cost reduction measures pursued by US Air Force And the use of procurement agencies that are being implemented by NATO member countries. Based on this study, the following four measures were proposed to reduce the purchase cost of aviation ammunition. First, the mutual aid support agreement was developed to sign the ammunition joint operation agreement. Second, join the NATO Support & Procurement Agency (NSPA) Third, it builds a purchasing community centered on the countries operating the same ammunition Fourth, participating in the US Air Force's new purchase plan for ammunition and purchase it jointly. The main contents of these four measures are as follows. 1. the mutual aid support agreement was developed to sign the ammunition joint operation agreement. Korea has signed agreements on mutual logistics support with 14 countries including the United States, Israel, Indonesia, Singapore, Australia, and Taiwan. The main purpose of these agreements is mutual support of munitions and materials, also supporting the training of the peace time and promoting exchange and cooperation. However, it is expected that there will be many difficulties in requesting or supporting mutual support in actual situation because the target or scope of mutual aid of ammunition is not clearly specified. Thus, a separate agreement on the mutual co-operation of more specific and expanded concepts of aviation ammunition is needed based on the current mutual aid support agreements 2. join the NATO Support & Procurement Agency (NSPA) In the case of NATO, there is a system in which member countries purchase munitions at a low cost using munitions purchase agencies. It is the NATO Purchasing Agency (NSPA) whose mission is to receive the purchasing requirements of the Member Nations and to purchase them quickly and efficiently and effectively to the Member Nations. NSPA's business includes the Ammunition Support Partnership (ASP), which provides ammunition purchase and disarming services. Although Korea is not a member of NATO, NSPA is gradually expanding the scope of joint procurement of munitions, and it is expected that Korea will be able to join as a member. 3. it builds a purchasing community centered on the countries operating the same ammunition By benchmarking the NSPA system, this study suggested ways to build a purchasing community with countries such as Southeast Asia, Australia, and the Middle East. First, it is necessary to review prospectively how to purchase ammunition by constructing ammunition purchasing community centered on countries using same kind of ammunition. 4. participating in the US Air Force's new purchase plan for ammunition When developing or purchasing weapons systems, joint participation by several countries can reduce acquisition costs. Therefore, if the US Air Force is planning to acquire aviation ammunition by applying it to the purchase of aviation ammunition, we will be able to significantly reduce the purchase cost by participating in this plan. Finally, there are some limitations to the method presented in this study, but starting from this study, I hope that the research on these methods will be actively pursued in the future.

  • PDF

A study on Operation Rules of Korean Air Defence Identification Zone (한국 방공식별구역 운영규칙에 관한 고찰)

  • Kwon, Jong-Pil;Lee, Yeong H.
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.189-217
    • /
    • 2017
  • Declaration of Air Defense and Identification Zones started with the United States in 1950, which was followed by declaration of KADIZ by the Republic of Korea in 1951. Initial ADIZ were solely linked with air defense missions, but their roles have changed as nations around the globe manifested a tendency to expand their influence over maritime resources and rights. In particular, China declared ADIZ over the East China Sea in October 2013 and forced all passing aircraft to submit flight plan to ATC or military authority, saying failure of submission will be followed by armed engagement. China announced it would declare another zone over the South China Sea despite the ongoing conflict in the area, clearly showing ADIZ's direct connection with territorial claim and EEZ and that it serves as a zone within which a nation can execute its rights. The expanded KADIZ, which was expanded in Dec 15, 2013 in response to Chinese actions, overlaps with the Chinese ADIZ over the East China Sea and the Japanese ADIZ. The overlapping zone is an airspace over waters where not only the Republic of Korea but also of China and Japan argue to be covering their continental shelf and EEZ. Military conventions were signed to prevent contingencies among the neighboring nations while conducting identifications in KADIZ, including the overlapping zone. If such military conventions and practice of air defense identification continue to be respected among states, it is under the process of turning into a regional customary law, although ADIZ is not yet recognized by international law or customary law. Moreover, identification within ADIZ is carried out by military authorities of states, and misguided customary procedures may cause serious negative consequences for national security since it may negatively impact neighboring countries in marking the maritime border, which calls for formulation of operation rules that account for other state activities and military talks among regional stake holders. Legal frameworks need to be in place to guarantee freedom of flights over international seas which UN Maritime Law protects, and laws regarding military aircraft operation need to be supplemented to not make it a requirement to submit flight plan if the aircraft does not invade sovereign airspace. Organizational instructions that require approval of Chairman of Joint Chiefs of Staff for entrance and exit of ADIZ for military aircraft need to be amended to change the authority to Minister of National Defense or be promoted to a law to be applicable for commercial aircraft. Moreover, in regards to operation and management of ADIZ, transfer of authority should be prohibited to account for its evolution into a regional customary law in South East Asia. In particular, since ADIZ is set over EEZ, military conventions that yield authority related to national security should never be condoned. Among Korea, China, Japan and Russia, there are military conventions that discuss operation and management of ADIZ in place or under negotiation, meaning that ADIZ is becoming a regional customary law in North East Asia region.

  • PDF

Forest Fire Monitoring System Using Satellite (위성활용 산불감시 시스템 구축)

  • Park, Beom-Sun;Cho, In-Je;Lim, Jae-Hwan;Kim, In-Bae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.143-150
    • /
    • 2021
  • It introduces the contents of establishing a geostationary satellite-based forest fire monitoring system that can monitor areas of the Korean Peninsula 24 hours a day for forest fire monitoring, and describes how to establish a forest fire monitoring system and use it in various ways. In order to establish a satellite-utilized forest fire monitoring system, we will describe and draw conclusions on literature research, technical principles, forest fire monitoring means, and satellite forest fire monitoring system. The satellite-utilized forest fire monitoring system can consist of one geostationary satellite equipped with infrared detection optical sensors and a ground processing station that processes data received from satellites to spread surveillance information. Forest fire monitoring satellites are located in the country's geostationary orbit and should be operated 24 hours a day, 365 days a day. Forest fire monitoring technology is an infrared detection technology that can be used in national public interests such as forest fire monitoring and national security. It should be operated 24 hours a day, and to satisfy this, it is efficient to establish a geostationary satellite-based forest fire monitoring satellite system.

Retail Product Development and Brand Management Collaboration between Industry and University Student Teams (산업여대학학생단대지간적령수산품개발화품패관리협작(产业与大学学生团队之间的零售产品开发和品牌管理协作))

  • Carroll, Katherine Emma
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.3
    • /
    • pp.239-248
    • /
    • 2010
  • This paper describes a collaborative project between academia and industry which focused on improving the marketing and product development strategies for two private label apparel brands of a large regional department store chain in the southeastern United States. The goal of the project was to revitalize product lines of the two brands by incorporating student ideas for new solutions, thereby giving the students practical experience with a real-life industry situation. There were a number of key players involved in the project. A privately-owned department store chain based in the southeastern United States which was seeking an academic partner had recognized a need to update two existing private label brands. They targeted middle-aged consumers looking for casual, moderately priced merchandise. The company was seeking to change direction with both packaging and presentation, and possibly product design. The branding and product development divisions of the company contacted professors in an academic department of a large southeastern state university. Two of the professors agreed that the task would be a good fit for their classes - one was a junior-level Intermediate Brand Management class; the other was a senior-level Fashion Product Development class. The professors felt that by working collaboratively on the project, students would be exposed to a real world scenario, within the security of an academic learning environment. Collaboration within an interdisciplinary team has the advantage of providing experiences and resources beyond the capabilities of a single student and adds "brainpower" to problem-solving processes (Lowman 2000). This goal of improving the capabilities of students directed the instructors in each class to form interdisciplinary teams between the Branding and Product Development classes. In addition, many universities are employing industry partnerships in research and teaching, where collaboration within temporal (semester) and physical (classroom/lab) constraints help to increase students' knowledge and experience of a real-world situation. At the University of Tennessee, the Center of Industrial Services and UT-Knoxville's College of Engineering worked with a company to develop design improvements in its U.S. operations. In this study, Because should be lower case b with a private label retail brand, Wickett, Gaskill and Damhorst's (1999) revised Retail Apparel Product Development Model was used by the product development and brand management teams. This framework was chosen because it addresses apparel product development from the concept to the retail stage. Two classes were involved in this project: a junior level Brand Management class and a senior level Fashion Product Development class. Seven teams were formed which included four students from Brand Management and two students from Product Development. The classes were taught the same semester, but not at the same time. At the beginning of the semester, each class was introduced to the industry partner and given the problem. Half the teams were assigned to the men's brand and half to the women's brand. The teams were responsible for devising approaches to the problem, formulating a timeline for their work, staying in touch with industry representatives and making sure that each member of the team contributed in a positive way. The objective for the teams was to plan, develop, and present a product line using merchandising processes (following the Wickett, Gaskill and Damhorst model) and develop new branding strategies for the proposed lines. The teams performed trend, color, fabrication and target market research; developed sketches for a line; edited the sketches and presented their line plans; wrote specifications; fitted prototypes on fit models, and developed final production samples for presentation to industry. The branding students developed a SWOT analysis, a Brand Measurement report, a mind-map for the brands and a fully integrated Marketing Report which was presented alongside the ideas for the new lines. In future if the opportunity arises to work in this collaborative way with an existing company who wishes to look both at branding and product development strategies, classes will be scheduled at the same time so that students have more time to meet and discuss timelines and assigned tasks. As it was, student groups had to meet outside of each class time and this proved to be a challenging though not uncommon part of teamwork (Pfaff and Huddleston, 2003). Although the logistics of this exercise were time-consuming to set up and administer, professors felt that the benefits to students were multiple. The most important benefit, according to student feedback from both classes, was the opportunity to work with industry professionals, follow their process, and see the results of their work evaluated by the people who made the decisions at the company level. Faculty members were grateful to have a "real-world" case to work with in the classroom to provide focus. Creative ideas and strategies were traded as plans were made, extending and strengthening the departmental links be tween the branding and product development areas. By working not only with students coming from a different knowledge base, but also having to keep in contact with the industry partner and follow the framework and timeline of industry practice, student teams were challenged to produce excellent and innovative work under new circumstances. Working on the product development and branding for "real-life" brands that are struggling gave students an opportunity to see how closely their coursework ties in with the real-world and how creativity, collaboration and flexibility are necessary components of both the design and business aspects of company operations. Industry personnel were impressed by (a) the level and depth of knowledge and execution in the student projects, and (b) the creativity of new ideas for the brands.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.