• Title/Summary/Keyword: Plan transfer

Search Result 370, Processing Time 0.028 seconds

Planning for Intra-Block Remarshaling to Enhance the Efficiency of Loading Operations in an Automated Container Terminal (자동화 컨테이너 터미널의 적하 작업 효율 향상을 위한 블록 내 재정돈 계획 수립 방안)

  • Park, Ki-Yeok;Park, Tae-Jin;Kim, Min-Jung;Ryu, Kwang-Ryel
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.4
    • /
    • pp.31-46
    • /
    • 2008
  • A stacking yard of a container terminal is a space for temporarily storing the containers that are carried in or imported until they are carried out or exported. If the containers are stacked in an inappropriate way, the efficiency of operation at the time of loading decreases significantly due to the rehandlings. The remarshaling is the task of rearranging containers during the idle time of transfer crane for the effective loading operations. This paper proposes a method of planning for remarshaling in a yard block of an automated container terminal. Our method conducts a search in two stages. In the first stage, the target stacking configuration is determined in such a way that the throughput of loading is maximized. In the second stage, the crane schedule is determined so that the remarshaling task can be completed as fast as possible in moving the containers from the source configuration to the target configuration. Simulation experiments have been conducted to compare the efficiency of loading operations before and after remarshaling. The results show that our remarshaling plan is really effective in increasing the efficiency of loading operation.

  • PDF

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.

Cross-layer Design of Routing and Link Capacity Extension for QoS in Communication Networks (통신망 QoS를 위한 라우팅과 용량 증설의 계층간 최적화 기법)

  • Shin, Bong-Suk;Lee, Hyun-Kwan;Park, Jung-Min;Kim, Dong-Min;Kim, Seong-Lyun;Lee, Sang-Il;Ahn, Myung-Kil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1749-1757
    • /
    • 2010
  • This paper considers the cost minimization problem to satisfy QoS (Quality of Service) requirements for a given network, in particular when communication resources to each link can be additionally assigned. For the purpose of quantifying QoS requirements such as data transfer delay and packet loss, we introduce the cost function considering both the link utilization factor and the additionally assigned resource. To minimize this cost function, we firstly formulate a Basic Capacity Planning (BCP) problem, a special case of Network Utility Maximization (NUM). We show that the solution of this BCP problem cannot be optimal via a counter example. In this paper, we suggest the cross-layer design of both additionally assigned resource and routing path, whose initial values are set to the result of BCP problem. This cross-layer design is based on a heuristic approach which presents an effective way to plan how much communication resources should be added to support the QoS requirements in future. By simulation study, we investigate the convergence of the cost function in a more general network topology as well as in a given simple topology.

Development of a GIS-Based Basin Water Balance Analysis Model (GIS 기반의 유역물수지 분석모형 개발)

  • Hwang, Eui-Ho;Kim, Kye-Hyun;Park, Jin-Hyeog;Lee, Geun-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.4
    • /
    • pp.34-45
    • /
    • 2004
  • Existing Semangeum's water balance analysis simplifies whole basin to single basin and achieved volume of effluence that produce by Kajiyama way to foundation. But Semangeum is complicated and various rice-wine strainer supply system. And there is difficulty to apply as elastic when water balance element is changed at free point. Divided to unit possession station for suitable water balance analysis model application to Semangeum in this study. And developed basin water balance model of GIS base that can do details analysis is bite about development and transfer of an appropriation in the budget of basin water resources. Achieved study including abstraction and concept design that use UML (unified modeling language) diagram for details analysis, stream network composition for rice-wine strainer supply system application, preprocessing of GIS base and postprocessing module development, model revision and verification etc. Support of this water balance analysis model is available to establish efficient water resources administration plan through outward flow process analysis of water resources. And support is considered to be possible in more convenient and, reasonable water resources administration way establishment by minimizing manual processing in systematic water resources government official to user and support diversified analysis system.

  • PDF

Effect of threats to anonymity on data reliability in internet survey (인터넷 설문조사에서 익명성 훼손이 응답에 미치는 효과)

  • Heo, Sun-Yeong;Chang, Duk-Joon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.4
    • /
    • pp.785-794
    • /
    • 2011
  • The population of internet users are rapidly increasing and the interest of the internet survey is also increasing. Recent years has seen a transition from traditional modes of data collection into internet survey. Some surveys are administered with mixed modes of traditional data collection methods and internet survey, and some surveys are conducted through internet only instead of traditional modes, such as telephone survey, postal survey, face-to-face interviews and so on. However, one of most crucial parts of a survey is the reliability of the collected data and internet survey is no exemption. Changwon National University has been annually conducting a survey of new students and transfer students with almost same contents of questionnaire. The survey is a longitudinal survey and it had been administered by paper-pencil surveys until 2009. In 2010 the survey was administered through internet. Every students has to login with student ID number and the last 7-digit of national identity registration number, and complete the 2010 survey before registration their courses. If they leave any question without being answered, then could not move to the registration site for courses. This study explores the distortion of responses using the new students survey of Changwon National University, which could occur when the survey responses are not confidential. We find that the distortion of responses occurs from the questions with social desirability pressure, pressure of winning favor with the researcher, and pressure of explaining their situations. There are no distortion of responses from the questions which are describing simple opinions or simple facts, for example, the place they plan to live while in school.

Study of the Data Exchange Format of GIS and CALS/EC System (GIS와 CALS/EC 시스템의 자료 교환 포맷 연구)

  • 이상길;정종철
    • Spatial Information Research
    • /
    • v.12 no.2
    • /
    • pp.151-163
    • /
    • 2004
  • This study aims to develop a standard protocol by which users can exchange data information efficiently between KOSDIC and GIS. The ultimate goal from this study is to propose a data exchange format using KOSIC. The background of this study is that GIS industry sector is vigorously developing linked to spatial information construction such as UIS, LIS, EIS, AM/FM through supporting by regional government institution. According to do, the format of data transformation becomes major issue. GIS data can easily transfer to CAD version but when CAD data convert to GIS format (DWG->DXF->SHP) cannot get high success rate due to errors and problems. In addition, CAD data feature is made from oriental structure which is made of point and line faeture so that GIS system is impossible to data transformation. In the reason, the biggest problem is discordance of symbolization in integration and standard of data format. By investigation the usability of this study, conclusion are drawn efficient alternative plan in data transformation. Though this wort we will be able to provide a better transformation of data conversion between CAD format and GIS format. Accordingly, it is of important to enrich the integrated construction information infrastructure, which accommodates ever-changing constructions environment.

  • PDF

A Method to Develop Security System through the Analysis on Dangerous Case (위해사례분석을 통한 경호제도의 발전방안)

  • Yu, Hyung-Chang;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.161-187
    • /
    • 2008
  • The purpose of this study is to suggest a development method of current Korean security system by analyzing the problems shown in the performance of security work in relation to the terrorism, which is enlarging in the word, from various aspects. In order to perform the study, the researcher considered the basic theory concerned to current Korean law concerned to security, principle and methodology of security, terror and new terrorism. The researcher performed the study by selecting qualitative case study focused on Park Geun-Hye case. Through the study, the methods to develop Korean security system are as follows. First, from the legal aspect, it is necessary to establish the law concerned to terrorism prevention and important person security. Moreover, it is necessary to search for the development of private security by revising Security Industry Act, which is a legal ground of private security. Second, it is necessary to improve and reinforce education & training program, which is not still divided in detail from the aspect of private security cultivation. Moreover, it is necessary to activate personal protection work and enlarge market through Security Industry Act and make an effort to change social recognition over security, which is devaluated in the society. From the viewpoint, national license about private security shall be adopted. The department of president security, which is a representative of official security, shall transfer the advanced technology to private security organization. Third, from the aspect of operation, the operation of security based on SCE principle, human shield principle, the nearest person's protection principle, body extension principle, linear protection principle and evacuation priority principle is required. Therefore, the priority shall be given to preventive security and thorough security plan shall be made for the operation.

  • PDF

Simulation and Evaluation of the KOMPSAT/OSMI Radiance Imagery (다목적 실용위성 해색센서 (OSMI)의 복사영상에 대한 모의 및 평가)

  • 반덕로;김용승
    • Korean Journal of Remote Sensing
    • /
    • v.15 no.2
    • /
    • pp.131-146
    • /
    • 1999
  • The satellite visible data have been successfully applied to study the ocean color. Another ocean color sensor, the Ocean Scanning Multi-spectral Imager (OSMI) on the Korea Multi-Purpose Satellite (KOMPSAT) will be launched in 1999. In order to understand the characteristics of future OSMI images, we have first discussed the simulation models and procedures in detail, and produced typical patterns of radiances at visible bands by using radiative transfer models. The various simulated images of full satellite passes and Korean local areas for different seasons, water types, and the satellite crossing equator time (CET) are presented to illustrate the distribution of each component of radiance (i.e., aerosol scattering, Rayleigh scattering, sun glitter, water-leaving radiance, and total radiance). A method to evaluate the image quality and availability is then developed by using the characteristics of image defined as the Complex Signal Noise Ratio (CSNR). Meanwhile, a series of CSNR images are generated from the simulated radiance components for different cases, which can be used to evaluate the quality and availability of OSMI images before the KOMPSAT will be placed in orbit. Finally, the quality and availability of OSMI images are quantitatively analyzed by the simulated CSNR image. It is hoped that the results would be useful to all scientists who are in charge of OSMI mission and to those who plan to use the data from OSMI.

Development of Information Security Practice Contents for Ransomware Attacks in Digital Twin-Based Smart Factories (디지털트윈 기반의 스마트공장에서 랜섬웨어 공격과 피해 분석을 위한 정보보안 실습콘텐츠 시나리오 개발)

  • Nam, Su Man;Lee, Seung Min;Park, Young Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1001-1010
    • /
    • 2021
  • Smart factories are complex systems which combine latest information technology (IT) with operation technology (OT). A smart factory aims to provide manufacturing capacity improvement, customized production, and resource reduction with these complex technologies. Although the smart factory is able to increase the efficiency through the technologies, the security level of the whole factory is low due to the vulnerability transfer from IT. In addition, the response and restoration of the business continuity plan are insufficient in case of damage due to the absence of factory security experts. The cope with the such problems, we propose an information security practice content for analyzing the damage by generating ransomware attacks in a digital twin-based smart factory similar to the real world. In our information security content, we introduce our conversion technique of physical devices into virtual machines or simulation models to build a practical environment for the digital twin. This content generates two types of the ransomware attacks according to a defined scenario in the digital twin. When the two generated attacks are successfully completed, at least 8 and 5 of the 23 virtual elements are take damage, respectively. Thus, our proposed content directly identifies the damage caused by the generation of two types of ransomware in the virtual world' smart factory.

Optimization of anode and electrolyte microstructure for Solid Oxide Fuel Cells (고체산화물 연료전지 연료극 및 전해질 미세구조 최적화)

  • Noh, Jong Hyeok;Myung, Jae-ha
    • Korean Chemical Engineering Research
    • /
    • v.57 no.4
    • /
    • pp.525-530
    • /
    • 2019
  • The performance and stability of solid oxide fuel cells (SOFCs) depend on the microstructure of the electrode and electrolyte. In anode, porosity and pore distribution affect the active site and fuel gas transfer. In an electrolyte, density and thickness determine the ohmic resistance. To optimizing these conditions, using costly method cannot be a suitable research plan for aiming at commercialization. To solve these drawbacks, we made high performance unit cells with low cost and highly efficient ceramic processes. We selected the NiO-YSZ cermet that is a commercial anode material and used facile methods like die pressing and dip coating process. The porosity of anode was controlled by the amount of carbon black (CB) pore former from 10 wt% to 20 wt% and final sintering temperature from $1350^{\circ}C$ to $1450^{\circ}C$. To achieve a dense thin film electrolyte, the thickness and microstructure of electrolyte were controlled by changing the YSZ loading (vol%) of the slurry from 1 vol% to 5 vol. From results, we achieved the 40% porosity that is well known as an optimum value in Ni-YSZ anode, by adding 15wt% of CB and sintering at $1350^{\circ}C$. YSZ electrolyte thickness was controllable from $2{\mu}m$ to $28{\mu}m$ and dense microstructure is formed at 3vol% of YSZ loading via dip coating process. Finally, a unit cell composed of Ni-YSZ anode with 40% porosity, YSZ electrolyte with a $22{\mu}m$ thickness and LSM-YSZ cathode had a maximum power density of $1.426Wcm^{-2}$ at $800^{\circ}C$.