• Title/Summary/Keyword: Supply chain

Search Result 2,066, Processing Time 0.03 seconds

Development of the Military-3PL Integrated Operation Strategy for National Defense Transportation using Simulation (시뮬레이션을 활용한 국방수송물류의 민·군 통합 운영 방안 수립)

  • Suraraksa, Juthatip;Gong, In-Taek;Kim, Jaewon;Seo, HanSeok;Shin, KwangSup
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.111-128
    • /
    • 2019
  • In the current procurement system in Korean military, the army, navy and air force have their own distributors, military branches and warehouses. However, especially, it has been hard to have the economy of scale because most of suppliers have shipped their order from the suppliers to each of Korean military directly. Koran military considers the transportation cost as one of the management cost factors among various kinds of cost. Furthermore they have contracted with the suppliers in annual and collectively on the transportation. Hence they have been in trouble with getting efficiency of Defense budget execution because it is hard to make a decision of Defense budget with real transportation cost. Moreover Korean army, navy and air force have their own supply chain separately, so they can not cooperate flexible and quickly when they need. Therefore, in this research, we provide a benchmarking of DTCI (Defense Transportation Coordination Initiative) which has been proved that it has improved the procurement system in US implementing the integrated transportation system with 3PL and military. In addition we propose advanced integrated shipping model using Hub & Spoke system for Korean military. In order to prove its effect, we simulate our model based on the real data of the suppliers' delivery to compare with the current system when it comes to how much we can save the cost. Our research can provide evidence that the integrated procurement system in Korean military will improve Korean military procurement system.

A Methodology for Integrating Security into the Automotive Development Process (자동차 개발 프로세스에서의 보안 내재화 방법론)

  • Jeong, Seungyeon;Kang, Sooyoung;Kim, Seungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.12
    • /
    • pp.387-402
    • /
    • 2020
  • Conventional automotive development has mainly focused on ensuring correctness and safety and security has been relatively neglected. However, as the number of automotive hacking cases has increased due to the increased Internet connectivity of automobiles, international organizations such as the United Nations Economic Commission for Europe(UNECE) are preparing cybersecurity regulations to ensure security for automotive development. As with other IT products, automotive cybersecurity regulation also emphasize the concept of "Security by Design", which considers security from the beginning of development. In particular, since automotive development has a long lifecycle and complex supply chain, it is very difficult to change the architecture after development, and thus Security by Design is much more important than existing IT products. The problem, however, is that no specific methodology for Security by Design has been proposed on automotive development process. This paper, therefore, proposes a specific methodology for Security by Design on Automotive development. Through this methodology, automotive manufacturers can simultaneously consider aspects of functional safety, and security in automotive development process, and will also be able to respond to the upcoming certification of UNECE automotive cybersecurity regulations.

An Exploratory Study on Sales and Operations Planning as SCM Supporting Tool (공급망 관리 지원도구로서의 S&OP 운영에 관한 탐색적 연구)

  • Park, Seong Taek;Kim, Tae Ung;Kim, Mi Ryang
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.93-103
    • /
    • 2021
  • S&OP(Sales and Operations Planning) is an ongoing process of periodic planning, reviewing, and evaluation through the involvement of all key stakeholders. Within this process, performance is regularly reviewed and early warning signals are generated, so that the company can react quickly to changing market and operational environment. This paper presents a framework for effective S&OP for fair alignment, accountability, teamwork, visibility, and risk management. This framework focuses on supply chain information governance, level of information sharing through S&OP, role of S&OP as coordination mechanism, APS effectivesness as a planning tool and SCM performance. In addition, a brief case study on the operating characteristics of S&OP at three Korean firms is presented. Implications of the study finding are also provided. It will also make companies that are considering the introduction of S&OP aware of the importance of S&OP, which will provide practical guidelines for the introduction of S&OP.

Risk assessment of Staphylococcus aureus infection in ready-to-eat Samgak-Kimbap (즉석섭취 삼각김밥에서의 Staphylococcus aureus 위해평가 연구)

  • Lee, Chae Lim;Kim, Yeon Ho;Ha, Sang-Do;Yoon, Yo Han;Yoon, Ki Sun
    • Korean Journal of Food Science and Technology
    • /
    • v.52 no.6
    • /
    • pp.661-669
    • /
    • 2020
  • Samgak-Kimbap is a popular ready-to-eat (RTE) food at convenience stores, in Korea. Although Samgak-Kimbap is distributed through the cold chain supply system, inappropriate temperature storage conditions prior to consumption are a cause of concern. The objective of this study was to evaluate the risk of Staphylococcus aureus growth in Samgak-Kimbap in the retail market. The prevalence and contamination levels of S. aureus in Samgak-Kimbap (n=170) were monitored, and the predictive growth model of a five-strain cocktail of enterotoxin-producing S. aureus (SEA, SEB, SEC, SED, and SEE) was developed in Samgak-Kimbap as a function of temperature (4, 10, 11, 20, 25, and 37℃). We could not observe the growth of S. aureus and enterotoxin-producing S. aureus in Samgak-Kimbap at temperatures below 10℃. The probability of illness with S. aureus per serving of Samgak-Kimbap was 1.44×10-10 per day. The most influential factor in increasing the risk of foodborne illnesses was the contamination level of S. aureus in Samgak-Kimbap.

Current research trends in HACCP principles (HACCP의 연구동향)

  • Hwang, Tae-Young;Lee, Sun-Yong;Yoo, Jae-Weon;Kim, Dong-Ju;Lee, Je-Myung;Go, Ji-Hun;Kim, Myung-Ho
    • Food Science and Industry
    • /
    • v.54 no.2
    • /
    • pp.93-101
    • /
    • 2021
  • Hazard Analysis Critical Control Point (HACCP) systems were developed to ensure a high level of food safety and reduced risk of foodborne illness. This paper focuses on significant issues associated with the implementation of HACCP; it provides an overview on recent literature. The structure of the paper follows six groupings of issues in the international literature of HACCP: (1) comparative studies and unification plan between HACCP and other food safety regulations; (2) verification of the HACCP system's effectiveness in improving food safety; (3) establishment of critical control point (CCP) for various foods HACCP model development; (4) expansion of HACCP application in the various fields and small businesses;(5) the impacts of HACCP on consumer's preferences and firms' financial performance in food industry; (6) HACCP and technological changes. The paper concludes with some suggestions for the future research in order to promote safe food supply chain for global customers.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.

Effect of Irrigation of River Water and Swine Slurry Liquid Fertilizer on Kenaf (Hibiscus cannabinus L.) Growth Cultivated Using Soil Moisture Control System in Reclaimed Land (자동 수분 제어시스템을 이용한 간척지 케나프 재배시 하천수 및 액비 관개 효과)

  • Kang, Chan-Ho;Lee, In-Sok;Lee, Jin-Jae;Kim, Hee-Jun
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.66 no.1
    • /
    • pp.87-96
    • /
    • 2021
  • Information and Communication Technology (ICT) remote soil moisture control system including soil sensing, automatic water supply chain, and remote alarming system was established on reclaimed land and operated stably. The system was operated using river water around the reclaimed land without fertilizer. On applying this system to control soil moisture, the kenaf germination rate was improved up to two times. Kenaf biomass was 4,748 kg/10a and was higher than that of untreated soil moisture management. When the nutritious liquid fertilizer was used, kenaf yield reached 8,390 kg/10a, which was lower than 10,848 kg/10a of the non-reclaimed land treated with standard chemical fertilizers. As the soil moisture was managed stably through the ICT remote soil moisture control system, the quality of the kenaf crop was improved, resulting in a 7% increase in dry weight, and a 11.5% increase in plant hardness. The estimated kenaf yield was 5,039 kg/10a when 800 tonnes of water were supplied by the ICT remote soil moisture control system with the stream water around Saemangeum reclaimed land without chemical fertilizers and organic matter.

Biocontrol of Rice Diseases by Microorganisms (미생물을 활용한 친환경적인 벼 병해 방제법)

  • Kim, Jung-Ae;Song, Jeong-Sup;Jeong, Min-Hye;Park, Sook-Young;Kim, Yangseon
    • Research in Plant Disease
    • /
    • v.27 no.4
    • /
    • pp.129-136
    • /
    • 2021
  • Rice is responsible for the stable crop of 3 billion people worldwide, about half of Asian depends on it, and rice is grown in more than 100 countries. Rice diseases can lead to devastating economic loss by decreasing yield production, disturbing a stable food supply and demand chain. The most commonly used method to control rice disease is chemical control. However, misuse of chemical control can cause environmental pollution, residual toxicity, and the emergence of chemical-resistant pathogens, the deterioration of soil quality, and the destruction of biodiversity. In order to control rice diseases, research on alternative biocontrol is actively pursued including microorganism-oriented biocontrol agents. Microbial agents control plant disease through competition with and antibiotic effects and parasitism against plant pathogens. Microorganisms isolated from the rice rhizosphere are studied comprehensively as biocontrol agents against rice pathogens. Bacillus sp., Pseudomonas sp., and Trichoderma sp. were reported to control rice diseases, such as blast, sheath blight, bacterial leaf blight, brown spot, and bakanae diseases. Here we reviewed the microorganisms that are studied as biocontrol agents against rice diseases.

A Study on the Structural Changes in Global Container Ports' Throughput(2003~'19) based on Top 100 Container Ports in the World (글로벌 컨테이너 항만 물동량의 구조적 변화에 관한 연구(2003~'19) - 세계 100대 컨테이너 항만을 대상으로)

  • Lee, Choong-bae;Lee, Young Shin;Liu, Yanfeng
    • Journal of Korea Port Economic Association
    • /
    • v.37 no.3
    • /
    • pp.55-74
    • /
    • 2021
  • The role of container ports contributes greatly to international trade and national or regional economic development by supporting maritime transportation and occupies a central position in the supply chain connecting sea and land. The performance(traffic volume) of a port generally depends on geographic, economic, and operational factors etc. For the past several decades, container port volumes have grown with fluctuation. This study amis to analyze how global ports have undergone changes in terms of cargo volume by region, size and period. For the analysis, only the volumes of global top 100 ports were used. Shift-share analysis and BCG matrix analysis were employed as methodologies. According to the result of the analysis, the relative volatility of port traffic over the past 16 years as a whole was found to be limited. On the other hand, ports in China and Southeast and Southwest Asia, which are economically growing for the last decades, showed growing trends, while ports in Northeast Asia and Europe appeared to be in a stagnant or declining phase. It also shows that most of the global ports maintain limited changes in cargo volume because they are already positioned as central ports in the region. In addition, it can be seen that the global port volume has a close relationship with the change in the economic capability of the relevant region or country.