• 제목/요약/키워드: Operational Process

검색결과 1,437건 처리시간 0.028초

국내기업에서의 JIT 운용기법 중요성 평가에 관한 연구 -Compatibility를 이용한 AHP를 중심으로- (A Study on the Evaluation of JIT Operational Techniques in the Domestic Industries -Using Compatibility in the AHP-)

  • 구일섭;임익성;김태성
    • 산업경영시스템학회지
    • /
    • 제21권48호
    • /
    • pp.241-251
    • /
    • 1998
  • The purpose of this study is to evaluate the relative importance of seven JIT operational techniques in Domestic industries. These techniques are used to improve manufacturing effectiveness and efficiency such as : Setup time reduction, Kanban, Multi-functional worker, U type layout, Andon(line stop), Atonomation, and Smoothing production. The new analytic hierarchy process(AHP) model is used in order to evaluate the relative importance of the seven JIT operational techniques which are used to increase the manufacturing effectiveness and efficiency. To aggregate the multi-divisions priorities, in this paper, we suggest a way which decision maker can exclude outlier matrix from group by using the concept of the compatibility in AHP.

  • PDF

부품재활용이 허용될 때 목표운용가용도 조건을 갖는 소모성 동시조달부품의 구매량 결정 (Provisioning Quantity Determination of Consumable Concurrent Spare Part with Objective Availability Limitation under Cannibalization Allowed)

  • 오근태;김명수
    • 한국신뢰성학회지:신뢰성응용연구
    • /
    • 제4권2호
    • /
    • pp.91-104
    • /
    • 2004
  • In this paper we consider the concurrent spare part(CSP) requirements problem of new equipment system. When a part fails, the part is replaced and the repair of failed part is impossible and cannibalization is allowed. We assume that the failure of a part knows a Poisson process. The operational availability concept in CSP is defined, and derive a formula to calculate the operational availability using expected machine operating time during CSP period. A mathematical model is derived for making an CSP requirement determination subject to the constraint of satisfying any given operational availability limitation and an heuristic solution search procedure is derived. An illustrative example is shown to explain the solution procedure.

  • PDF

Application of curvature of residual operational deflection shape (R-ODS) for multiple-crack detection in structures

  • Asnaashari, Erfan;Sinha, Jyoti K.
    • Structural Monitoring and Maintenance
    • /
    • 제1권3호
    • /
    • pp.309-322
    • /
    • 2014
  • Detection of fatigue cracks at an early stage of their development is important in structural health monitoring. The breathing of cracks in a structure generates higher harmonic components of the exciting frequency in the frequency spectrum. Previously, the residual operational deflection shape (R-ODS) method was successfully applied to beams with a single crack. The method is based on the ODSs at the exciting frequency and its higher harmonic components which consider both amplitude and phase information of responses to map the deflection pattern of structures. Although the R-ODS method shows the location of a single crack clearly, its identification for the location of multiple cracks in a structure is not always obvious. Therefore, an improvement to the R-ODS method is presented here to make the identification process distinct for the beams with multiple cracks. Numerical and experimental examples are utilised to investigate the effectiveness of the improved method.

부품재활용이 허용될 때 소모성 동시조달부품의 적정구매량 결정 (Provisioning Quantity Determination of Consumable Concurrent Spare Part under Cannibalization Allowed)

  • 오근태;나윤균
    • 산업경영시스템학회지
    • /
    • 제28권1호
    • /
    • pp.97-104
    • /
    • 2005
  • Considered is the concurrent spare part(CSP) requirements problem of new equipment system. In the considered system, when a part fails, the part cannot be repaired and should be replaced. In addition, cannibalization is allowed. It is assumed that the failure of a part follows a Poisson process. The operational availability concept in CSP is defined, and a formula is derived to calculate the operational availability using expected machine operating time during CSP period. The problem is formulated as the operational availability maximization problem with available budget constraint and a heuristic solution search procedure is developed. An illustrative example is shown to explain the solution procedure.

헬기 운용환경을 고려한 가상 사격 통제 시스템 개발 (The Development of Virtual Fire Control System Considering Operational Environment of Helicopter)

  • 김우식;이동호;장인동;박한준
    • 한국군사과학기술학회지
    • /
    • 제17권4호
    • /
    • pp.448-455
    • /
    • 2014
  • Virtual Fire Control System(VFCS) in attack helicopter is developed. VFCS is comprised of multifunction display, store management computer, mission computer, target acquisition and designation system, mission planning system, weapon simulator and flight simulator. Weapon engagement process under the operational environment of helicopter was considered by using the VFCS. We considered hellfire missile, tow missile, unguided rocket and turret gun. The results of this study will be utilized efficiently on integrated fire control system SIL(System Integration Lab.) in attack helicopter.

시뮬레이션을 통한 정류형 초전도 전류발생장치의 동작특성해석 (The Analysis of operational characteristic of superconducting current generator by computer simulation)

  • 추용;주민석;홍중배;고태국
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1995년도 하계학술대회 논문집 A
    • /
    • pp.95-97
    • /
    • 1995
  • A superconducting current generator, or a superconducting rectifier(SCR) is used as a current source to energize a superconducting magnets in SMES, MRI. We selected a full-wave SCR among various SCR models and analyzed its operational characteristics by computer simulation. In process of pumping the current, the improvement of performance is dependent on how much bigger the open resistance of the switch is in comparison to load coil impedance when one of two switches become active. Faster transfer can he seen in resistive commutation mode by shortening the time elapsed for the resistance to arrive at certain level from zero state. Although recovery time for the switch has no direct effect on current pumping, optimal switch design is needed to increasing operational frequency.

  • PDF

소기업의 IT 지식, IT 커뮤니케이션과 운영 성과와의 관계 분석 (The Effect of IT Knowledge and IT Communication on the Operational Performance of Small Firms)

  • 이윤석;김진한;김성홍
    • 기술혁신연구
    • /
    • 제13권3호
    • /
    • pp.1-25
    • /
    • 2005
  • This Paper examines the effect of IT knowledge and IT communication on the operational performance of small firms. Small firms which could be defined firms with less than 50 people in total lags behind medium and large firms in computerization. In order to fill up the computerization gap resulted from size differences, Korean government has been promoting the 'Networking Small Firms' project since 2001. Survey data with 698 small firms in Korea, we could find that If knowledge and IT communication significantly contributed to the operational performance of small firms. Internal process performance is affected by individual IT knowledge, traditional communication, and e-mail communication. Customer performance is affected by above three factors, organizational IT knowledge and internet/EDI communication. Interestingly, financial performance is not affected by traditional communication but only IT knowledge and IT communication.

  • PDF

사이버공격 추적시스템 운용아키텍처 (Cyberattack Tracing System Operational Architecture)

  • 안재홍
    • 한국군사과학기술학회지
    • /
    • 제26권2호
    • /
    • pp.179-187
    • /
    • 2023
  • APT cyber attacks have been a problem for over a past decade, but still remain a challenge today as attackers use more sophisticated techniques and the number of objects to be protected increases. 'Cyberattack Tracing System' allows analysts to find undetected attack codes that penetrated and hid in enterprises, and to investigate their lateral movement propagation activities. The enterprise is characterized by multiple networks and mass hosts (PCs/servers). This paper presents a data processing procedure that collects event data, generates a temporally and spatially extended provenance graph and cyberattack tracing paths. In each data process procedure phases, system design considerations are suggested. With reflecting the data processing procedure and the characteristics of enterprise environment, an operational architecture for CyberAttack Tracing System is presented. The operational architecture will be lead to the detailed design of the system.

K21 보병전투차량의 도하작전 간 안정성에 관한 시뮬레이션 연구 (A Simulated Study on the Stability during Crossing Operation of K21 Infantry Fighting Vehicle)

  • 김성도;이병길;허장욱
    • 시스템엔지니어링학술지
    • /
    • 제19권1호
    • /
    • pp.39-43
    • /
    • 2023
  • In ground weapon systems, the design and analysis technology for water operation stability is a relatively unknown area compared to maritime weapon systems. Through this study, it was confirmed that our weapon system satisfies the criteria for stability on the water when considering the operational concept and operational performance. However, there is a limitation of the study that it did not perform verification tests on the actual system. Therefore, in the future research and weapon system acquisition process, a procedure to prove the stability through freeboard analysis using the actual system is required.

디지털 전환(DX) 시대에 기업의 정보보안 투자 수준에 따른 운영성과에 관한 연구 (A Study on the Operational Performance by the Investment Level of Companies Information Security in the Digital Transformation(DX) Era)

  • 정병호;주형근
    • 디지털산업정보학회논문지
    • /
    • 제20권1호
    • /
    • pp.119-131
    • /
    • 2024
  • The purpose of this study is to examine the operational performances by the investment level of information security in companies. The theoretical background summarized the meaning of information security, management information security, and network security. The research process was carried out in four stages. As a result of the analysis, the level of information security was classified into four groups, and the difference in operational performance was confirmed. According to the categorical regression analysis of the three dependent variables, independent variables such as network threats, non-network threats, executive information security awareness, industry, organizational size, and information security education all affected information security regulations, in-house information security checks, and information security budget investments. The theoretical implications of this study have contributed to updating the latest information security theory. Practical implications are that rational investments should be made on the level of information security of companies.