• Title/Summary/Keyword: The Third Party

Search Result 871, Processing Time 0.028 seconds

A Basic Study on Quantification Risk Model of Human Accidents on Exterior Construction Site in South Korea (국내 건설현장 내·외부 인명사고 리스크 정량화 모델 개발 기초연구)

  • Oh, Jun-Seok;Ha, Sun-Geun;Kim, Tae-Hee;Jeon, Sang-Sub;Kim, Ji-Myung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2018.11a
    • /
    • pp.132-133
    • /
    • 2018
  • Many studies regarding construction safety management have been conducted. However, it is insufficient to research on external construction site. As a result, ordinary people around the construction site have injured and have a negative view when they think construction industrial since it has regarded having an overfull industrial accidents on media. To break the stereotype and prevention of accident on construction industry have been emphasized at this point in time, it is necessary to establish a comprehensive safety management system which is considered not only internal safety management but also external safety management. Therefore, the objective of this study is to develop the human accident risk quantification model by utilizing the third party payout data which occurred by incomplete safety management on external construction site. This study is conducted as a basic study for developing safety management manuals on internal·external construct site. In the future, it is expected to be used as a reference.

  • PDF

Efficient Mobile Node Authentication Scheme Based on the Trusted Local Third Party in Mobile Computing Environments (이동 컴퓨팅 환경에서의 로컬 신뢰 센터 기반 효율적 이동 노드 인증 기법)

  • 노환주;이기현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4A
    • /
    • pp.528-538
    • /
    • 2000
  • Mobile computing system requires both precise identification and secure authentication scheme on remote mobile entities, which is based on the distributed mobile node. In this paper, existing discrete logarithm based $Schnorr^{[7]}$ like entity authentication schemes are improved by the analysis of performance and security on the hi-directional interactive proofs. And $EIGamal^{[14]}$ like efficient authentication schemes are also proposed. Then, these are enhanced with oblivious transfer based mono directional authentication schemes based on trusted third party for applying to the mobile agent based computing systems. Therefore, proposed schemes provide compatible performance and safety on mobile entity authentication processes.

  • PDF

Development of the Freight Forwarder Information System adopting RIA

  • Choi, Hyung-Rim;Lee, Hyun-Chul;Choe, Hong-Seok
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.997-1002
    • /
    • 2007
  • In the case of international trade, the role of 3PL (third-party logistics) providers, in recent years, has drawn more attention. At the same time, computers have become faster, cheaper, and more widely available. Thus. information systems have become commonplace to freight forwarders and the increased efficiencies to be gained in improving logistics has pushed managers to explorer a number of new ideas, technologies and methods of information management and automation. However, many companies are encountering difficulties to choose an information system flexible and satisfying all needs carrying on business. In this study RIA (rich internet application) technology based on Java Swing was introduced to the .freight forwarder information systems to provide richer user interfaces and a flexible web-based application. Also considered giving stakeholders in charge of logistics especially in SMEs (Small and Medium Enterprises) cost-effective and performance-effective solutions with good accessibility of internet for smooth operations of their businesses.

  • PDF

A Genetic Algorithm Approach for Logistics Network Integrating Forward and Reverse Flows (역물류를 고려한 통합 물류망 구축을 위한 유전 알고리듬 해법)

  • Ko, Hyun-Jeung;Ko, Chang-Seong;Chung, Ki-Ho
    • IE interfaces
    • /
    • v.17 no.spc
    • /
    • pp.141-151
    • /
    • 2004
  • As today's business environment has become more and more competitive, forward as well as backward flows of products among members belonging to a supply chain have been increased. The backward flows of products, which are common in most industries, result from increasing amount of products that are returned, recalled, or need to be repaired. Effective management for the backward flows of products has become an important issue for businesses because of opportunities for simultaneously enhancing profitability and customer satisfaction from returned products. Since third party logistics service providers (3PLs) are playing an important role in reverse logistics operations, they should perform two simultaneous logistics operations for a number of different clients who want to improve their logistics operations for both forward and reverse flows. In this case, distribution networks have been independently designed with respect to either forward or backward flows so far. This paper proposes a mixed integer programming model for the design of network integrating both forward and reverse logistics. Since the network design problem belongs to a class of NP-hard problems, we present an efficient heuristic algorithm based on genetic algorithm (GA), of which the performance is compared to the lower bound by Lagrangian relaxation. Finally, the validity of proposed algorithm is tested using numerical examples.

Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality (CHSH 부등식을 이용하여 양자 키 분배와 양자 인증의 안전성을 개선한 프로토콜)

  • Heo, Jin-O;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.69-78
    • /
    • 2008
  • We propose to analyze a weakness of quantum key distribution and quantum authentication which use entangled state were proposed by Bao-sen Shi(2001) and to improve the security of the protocol. The existing protocol had a weakness against an impersonation attack of an eavesdropper, because of a only process which authenticated a third party(Center) by users. In this paper, we propose improving the security of the protocol that authenticates users by a third party using check mode which applies CHSH inequality.

An Exploratory Study on Consumers' Perception of Personal Information Provision to the Third Party (소비자의 개인정보 제3자 정보 제공 인식에 관한 탐색적 연구)

  • Koo, Hye-Gyoung;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.187-196
    • /
    • 2014
  • Most Consumers don't pay attention the process of giving consent for the provision of personal information. The terms of giving consent of personal information provision including 3rd party provision related contents. Although personal information leakage were related 3rd party sharing, consumers can't recognize the details. Therefore, this study focused on the perception of 3rd party provision of personal information. Consumers recognized 3rd party as who are related the service offer or not. Consumers want to know the cases of personal information sharing to the 3rd party, and if the business operators got benefit to share personal information with 3rd party, consumers want to know the facts. To understand the terms easily, the format have to be revised and to be standardized. Standardization of consent forms is very important for consumers to understand the difficult documents and the development of the business system to collect and use consumer's personal information to guarantee the right to self-determination of personal information.

Model and Algorithm for Logistics Network Integrating Forward and Reverse Flows (역물류를 고려한 통합 물류망 구축에 대한 모델 및 해법에 관한 연구)

  • Ko Hyun Jeung;Ko Chang Seong;Chung Ki Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.375-388
    • /
    • 2004
  • As today's business environment has become more and more competitive, forward as well as backward flows of products among members belonging to a supply chain have been increased. The backward flows of products, which are common in most industries, result from increasing amount of products that are returned, recalled, or need to be repaired. Effective management for these backward flows of products has become an important issue for businesses because of opportunities for simultaneously enhancing profitability and customer satisfaction from returned products. Since third party logistics service providers (3PLs) are playing an important role in reverse logistics operations, the 3PLs should perform two simultaneous logistics operations for a number of different clients who want to improve their logistics operations for both forward and reverse flows. In this case, distribution networks have been independently designed with respect to either forward or backward flows so far. This paper proposes a mixed integer programming model for the design of network integrating both forward and reverse logistics. Since this network design problem belongs to a class of NP-hard problems, we present an efficient heuristic based on Lagrangean relaxation and apply it to numerical examples to test the validity of proposed heuristic.

  • PDF

Service Development Tool for Micro Grid Common Platform (마이크로 그리드용 공통플랫폼 서비스 개발 도구)

  • Lee, Hyun-Hee;You, Dae-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1455-1461
    • /
    • 2015
  • Micro Grid is a new concept of electrical grid to solve several problems of Mega-Grid and it is under research and development at the national level around the world. With this background, Micro Grid Common Platform has been developed for interoperability technology of devices-systems in Micro Grid and securing enabler for new market. For supporting business models, Micro Grid Common Platform provides electric power information to Third-Party licensee via Open API function. Licensee, who want to develop electric power application by connecting to Micro Grid Common Platform, needs IDE(Integrated Development Environment) for service development and distribution. The paper proposes a service development tool for developing applications of Micro Grid Common Platform as a PaaS (Platform as a Service).

Design of User Privacy Model for Strong Reliability in SNS Environment (SNS 환경에서 신뢰성이 강한 사용자 프라이버시 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.237-242
    • /
    • 2013
  • SNS is emerging as an academic and social interest, as Facebook and Twitter are developed explosively. But, SNS has a problem of exposing user's privacy because it is originated by exchanging user's personal information and opinion. This paper proposes SNS user privacy protecting model using data separation and false data information instead of blocking which is using to protect user's personal privacy. The proposed model do not let the third party extract precise information after collecting user's context information by adding false information to separated context information. Also, it gets user's agreement beforehand if SNS service provider uses user's information not to be used illegally by the third party.

Design of Remote Data Collection System using Orbcomm Satellite Communication (오브컴 위성 통신을 이용한 원격지 데이터 수집 시스템 설계)

  • Heo, Min;Jung, Sung-Hun;Mo, Soo-Jong;Lim, Jae-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.122-125
    • /
    • 2005
  • Data collection system is now widely used. This system is divided by embedded system and communication module. And data collection system in the remote area is using Satellite communication. So, data collection system is complicated and expensive. This paper proposes stabilization and cheapness of remote data collection system in dusty. The system can be composed simply through third party Satellite Communication programming of terminal including embedded system. Finally, collected data is transmitted to multi-user through web agent.

  • PDF