• Title/Summary/Keyword: Paper Receipt

Search Result 91, Processing Time 0.033 seconds

A Study on the Development of Joint Logistics System for Small and Medium Sized Companies (중소기업 공동물류 시스템 구축에 관한 연구)

  • 김성태
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.20 no.44
    • /
    • pp.311-321
    • /
    • 1997
  • The development of Joint-Logistics System(JTS) for small/medium sized companies has been proposed for, particularity, Namdong Indusrial Complex located in Incheon. In this paper, JTS methodology is introduced and characterized in terms joint-control transportation, material handling and storage and order receipt. This methodology, which is unprecedented in Korea, has been considerably investigated and developed to implement a feasible model in Japan. A number of successful cases in Japanese companies are also presented to show how it works.

  • PDF

An Authentication Technology for On-line Computer Program Distribution (컴퓨터 프로그램 온라인 판매를 위한 유통 및 인증 기술)

  • Lim, Shin-Young;Lee, Sung-Min;Kim, Tai-Yun
    • IE interfaces
    • /
    • v.13 no.1
    • /
    • pp.141-146
    • /
    • 2000
  • Through an on-line software distribution, a user can get the software easily using Internet. As purchase, receipt and installation of software are executed via on-line batch process the time for software purchase and installation can be reduced. In this paper, we describe technologies for on-line software distribution and propose a secure software distribution and installation protocol for electronic commerce.

  • PDF

A Wireless TCP Protocol for Throughput Enhancement in Wireless Broadband (휴대 인터넷에서 처리율 향상을 위한 Wireless TCP 프로토콜)

  • Moon, Il-Young
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.57-59
    • /
    • 2006
  • In this paper, we investigate the wireless TCP protocol for throughput improvement in wireless Broadband. If the burst error duration of a wireless link is significantly long, retransmissions of lost packets by Snoop TCP are fulfilled mainly not by the receipt of duplicate acknowledgement (DUPACKs) but by local timer expiration. With the proposed scheme, Snoop TCP recovers packet losses fast by shortening the interval of local retransmissions based on the channel status. From the simulation results, we can show that the proposed scheme can improve TCP throughput considerably.

  • PDF

Receipt and issue model for Automated Warehouse based of Mobile rack (모바일랙 기반 자동화 창고 입출고 운영모델 연구)

  • Shin, Jae-Young;Park, Jong-won;Kim, Hwan-sung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.211-212
    • /
    • 2016
  • It is important to adopt an operation system to operate the Automated warehouses using limited resources such as space, mobile racks, and forklift. The main purpose from the operation system is to reduce the length of moving and time for both mobile racks and forklift. The complexity of the warehouse will be higher because the racks and vehicles are moving at the same time. This complexity influences badly so the operation system has to control it well. Not only layout or receipt or issue, but also conflict between mobile racks and vehicles give more complexity to the warehouse. This paper aims to fine the proper operation method related to the layout and the cargo assignment.

  • PDF

Design of a Secure Payment Mechanism based on S/MIME (S/MIME을 적용한 안전한 지불 메커니즘 설계)

  • Chun, Cheul-Woo;Lee, Jong-Hu;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.482-494
    • /
    • 2002
  • In E-mail based accounting system, the remitter does not have need to find collector's account number. To transfer money to a collector's account, what remitter need is just a collector's E-mail address. But the current E-mail based accounting systems are built on SSL technology. Basically SSL provides some security services - confidentiality, user authentication and data integrity, but does not provide non-repudiation. So, in the current E-mail based accounting system, it is possible to deny transaction. And there is no receipt of transaction. In this paper, we design and implementation of a S/MIME applied Secure Payment Mechanism. In our system, every account information - account number, receiver name, amount of money, etc. - is included in a 'check' message. And this message is protected under the Secure Web-mail using S/MIME. In a view point of the convenience, users using our system do not have need to find collector's account number. And in a view point of the security, our system provides confidentiality, user authentication, data integrity and non-repudiation. Moreover our system provides a receipt.

Transfer of Right and Negotiability of the Electronic Bill of Lading in Electronic Trade Transactions (전자무역거래에서 전자식 선화증권의 권리이전과 유통에 관한 고찰)

  • Jo, Sang-Hyeon;Kang, Won-Jin
    • International Commerce and Information Review
    • /
    • v.10 no.2
    • /
    • pp.23-43
    • /
    • 2008
  • Requirement of facilitating electronic trade transactions and efforts to platform on the electronic trade in major countries are link to the interest of Bill of Lading, the major transportation document, to be electronic, namely interest in Electronic Bill of Lading. Regardless of the benefits from replacing paper based Bill of Lading to the electronic form, which are eliminating of the Crisis of Bill of Lading and cost saving of international trade community, it has not been successful so far. Among the three functions of Bill of Lading, evidence of contracts and receipt of goods can be easily transferable to the electronic form. However the most important function, Document of Title, became the hardest work to replicate in electronic form. The purpose of this paper is to clarify what kind of conditions shall be prepared to ensure the transfer of right and negotiability of the Electronic Bill of Lading and propose to ensure the use of electronic bill of lading and its transfer of right and negotiability in the era of the electronic transactions.

  • PDF

The Requirement and Effect of the Document of Carriage in Respect of the International Carriage of Cargo by Air (국제항공화물운송에 관한 운송증서의 요건 및 효력)

  • Lee, Kang-Bin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.23 no.2
    • /
    • pp.67-92
    • /
    • 2008
  • The purpose of this paper is to research the requirements and effect of the document of carriage in respect of the carriage of cargo by air under the Montreal Convention of 1999, IATA Conditions of Carriage for Cargo, and the judicial precedents of Korea and foreign countries. Under the Article 4 of Montreal Convention, in respect of the carriage of cargo, an air waybill shall be delivered. If any other means which preserves a record of the carriage are used, the carrier shall, if so requested by the consignor, deliver to the consignor a cargo receipt. Under the Article 7 of Montreal convention, the air waybill shall be made out by the consignor. If, at the request of the consignor, the carrier makes it out, the carrier shall be deemed to have done so on behalf of the consignor. The air waybill shall be made out in three original parts. The first part shall be marked "for the carrier", and shall be signed by the consignor. The second part shall be marked "for the consignee", and shall be signed by the consignor and by the carrier. The third part shall be signed by the carrier who shall hand it to the consignor after the goods have been accepted. Under the Article 5 of Montreal Convention, the air waybill or the cargo receipt shall include (a) an indication of the places of departure and destination, (b) an indication of at least one agreed stopping place, (c) an indication of the weight of the consignment. Under the Article 10 of Montreal Convention, the consignor shall indemnify the carrier against all damages suffered by the carrier or any other person to whom the carrier is liable, by reason of the irregularity, incorrectness or incompleteness of the particulars and statement furnished by the consignor or on its behalf. Under the Article 9 of Montreal Convention, non-compliance with the Article 4 to 8 of Montreal Convention shall not affect the existence of the validity of the contract, which shall be subject to the rules of Montreal Convention including those relating to limitation of liability. The air waybill is not a document of title or negotiable instrument. Under the Article 11 of Montreal Convention, the air waybill or cargo receipt is prima facie evidence of the conclusion of the contract, of the acceptance of the cargo and of the conditions of carriage. Under the Article 12 of Montreal Convention, if the carrier carries out the instructions of the consignor for the disposition of the cargo without requiring the production of the part of the air waybill or the cargo receipt, the carrier will be liable, for any damage which may be accused thereby to any person who is lawfully in possession of that part of the air waybill or the cargo receipt. According to the precedent of Korea Supreme Court sentenced on 22 July 2004, the freight forwarder as carrier was not liable for the illegal delivery of cargo to the notify party (actual importer) on the air waybill by the operator of the bonded warehouse because the freighter did not designate the boned warehouse and did not hold the position of employer to the operator of the bonded warehouse. In conclusion, as the Korea Customs Authorities will drive the e-Freight project for the carriage of cargo by air, the carrier and freight forwarder should pay attention to the requirements and legal effect of the electronic documentation of the carriage of cargo by air.

  • PDF

Analyses of Detection and Protection for Phishing on Web page (웹페이지의 피싱 차단 탐지 기술에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

A Medium Access Control Scheme for Reducing Energy Consumption through Avoiding Receipt of Redundant Messages in Wireless Sensor Networks (무선 센서 네트워크에서 중복 메세지 순신 회피를 통한 에너지 소비절감 매체 접근 제어)

  • Han, Jung-An;Lee, Moon-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.13-24
    • /
    • 2005
  • The sensor network is a key component of the ubiquitous computing system which is expected to be widely utilized in logistics control, environment/disaster control, medical/health-care services, digital home and other applications. Nodes in the sensor network are small-sized and exposed to adverse environments. They are demanded to perform their missions with very limited power supply only. Also the sensor network is composed of much more nodes than the wireless ad hoc networks are. In case that some nodes consume up their power capacity, the network topology should change, and rerouting/retransmission is necessitated. Communication protocols studied for conventional wireless networks or ad hoc networks are not suited for the sensor network resultantly. Schemes should be devised to control the efficient usage of node power in the sensor network. This paper proposes a medium access protocol to enhance the efficiency of energy consumption in the sensor network node. Its performance is analyzed by simulation.

  • PDF

Optimal Throughput of Secondary Users over Two Primary Channels in Cooperative Cognitive Radio Networks

  • Vu, Ha Nguyen;Kong, Hyung-Yun
    • Journal of electromagnetic engineering and science
    • /
    • v.12 no.1
    • /
    • pp.1-7
    • /
    • 2012
  • In this paper, we investigated the throughput of a cognitive radio network where two primary frequency channels (PCs) are sensed and opportunistically accessed by N secondary users. The sharing sensing member (SSM) protocol is introduced to sense both PCs simultaneously. According to the SSM protocol, N SUs (Secondary User) are divided into two groups, which allows for the simultaneous sensing of two PCs. With a frame structure, after determining whether the PCs are idle or active during a sensing slot, the SUs may use the remaining time to transmit their own data. The throughput of the network is formulated as a convex optimization problem. We then evaluated an iterative algorithm to allocate the optimal sensing time, fusion rule and the number of members in each group. The computer simulation and numerical results show that the proposed optimal allocation improves the throughput of the SU under a misdetection constraint to protect the PCs. If not, its initial date of receipt shall be nullified.