• Title/Summary/Keyword: business operator

Search Result 176, Processing Time 0.035 seconds

Simulation Optimization of Manufacturing System using Real-coded Genetic Algorithm (실수 코딩 유전자 알고리즘을 이용한 생산 시스템의 시뮬레이션 최적화)

  • Park, Kyoung-Jong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.3
    • /
    • pp.149-155
    • /
    • 2005
  • In this paper, we optimize simulation model of a manufacturing system using the real-coded genetic algorithm. Because the manufacturing system expressed by simulation model has stochastic process, the objective functions such as the throughput of a manufacturing system or the resource utilization are not optimized by simulation itself. So, in order to solve it, we apply optimization methods such as a genetic algorithm to simulation method. Especially, the genetic algorithm is known to more effective method than other methods to find global optimum, because the genetic algorithm uses entity pools to find the optimum. In this study, therefore, we apply the real-coded genetic algorithm to simulation optimization of a manufacturing system, which is known to more effective method than the binary-coded genetic algorithm when we optimize the constraint problems. We use the reproduction operator of the applied real-coded genetic algorithm as technique of the remainder stochastic sample with replacement and the crossover operator as the technique of simple crossover. Also, we use the mutation operator as the technique of the dynamic mutation that configures the searching area with generations.

A Study on the Policy Priorities for the Enhancement of the Trans-shipment Competitiveness of the Port of Busan

  • Park, Ho-Chul
    • Journal of Navigation and Port Research
    • /
    • v.45 no.2
    • /
    • pp.75-86
    • /
    • 2021
  • This paper intends to evaluate the policies which are considered necessary to enhance the T/S competitiveness of Busan's port, and thereby present suggestions to the government which would best implement the results of this research. This research first raises the claim that the majority of the following four conditions: location of the port, port productivity/service level, status of network with overseas ports, and cost competitiveness, should be satisfied in order to maintain a competitive T/S port. Based on these four conditions, seven policies, which are individually pertinent to the four conditions, have been drawn up for proposal, and they are also analyzed in the survey, where all the eligible samples participate to ensure if they are effective in enhancing the T/S competitiveness of Busan. Proposed important policies are a) Terminal operator integration, b) port infrastructure expansion, c) global carriers owned terminal operation, d) enhancement of national carrier's competitiveness, e) feeder carriers' owned terminal operation in new port, f) institutional support for effective and convenient environments for handling T/S cargo, and g) volume incentive expansion. From the analysis by which all the relevant parties (Carriers, Terminal Operators, Port Authority) are answered, it was found that all the seven policies have relevance in strengthening the transshipment competitiveness of Busan's port. Whereas in the analysis that uses AHP methodology to compare the significance among the different policies, it was found that terminal operator integration has the highest priority in terms of increasing transshipment competitiveness.

Public Key-Based Operator Authentication Mechanism for Access Control of Multi-Control Systems in OT Control Network (OT제어망에서 다중 제어시스템 접근통제용 공개키 기반 운용자 인증 방안)

  • Kim, Dae-Hwi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.64-75
    • /
    • 2022
  • The method of accessing multiple control systems in the OT control network centered on operation technology uses the operator authentication technology of each control system. An example is ID/PW operator authentication technology. In this case, since the OT control network is composed of multiple control systems, operator authentication technology must be applied to each control system. Therefore, the operator must bear the inconvenience of having to manage authentication information for each control system he manages. To solve these problems, SSO technology is used in business-oriented IT networks. However, if this is introduced into the OT control network as it is, the characteristics of the limited size of the OT control network and rapid operator authentication are not reflected, so it cannot be seen as a realistic alternative. In this paper, a public key-based authentication mechanism was newly proposed as an operator authentication technology to solve this problem. In other words, an integrated public key certificate that applies equally to all control systems in the OT control network was issued and used to access all control systems, thereby simplifying the authentication information management and making access to the control system more efficient and secure.

The legal responsibility of the unmanned aircraft operators and insurance (무인항공기 운영자의 법적책임과 보험)

  • Kim, Jong-Bok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.2
    • /
    • pp.367-418
    • /
    • 2018
  • Just as safety is the most important thing in aviation, safety is the most important in the operation of unmanned aircraft (RPA), and safety operation is the most important in the legal responsibility of the operator of the unmanned aircraft. In this thesis, the legal responsibility of the operator of the unmanned aircraft, focusing on the responsibility of the operator of the unmanned aircraft, was discussed in depth with the issue of insurance, which compensates for damages in the event of an accident First of all, the legal responsibility of the operator of the unmanned aircraft was reviewed for the most basic : definition, scope and qualification of the operator of the unmanned aircraft, and the liability of the operator of the Convention On International Civil Aviation, the ICAO Annex, the RPAS Manual, the Rome Convention, other major international treaties and Domestic law such as the Aviation Safety Act. The ICAO requires that unmanned aircraft be operated in such a manner as to minimize hazards to persons, property or other aircraft as a major principle of the operation of unmanned aircraft, which is ultimately equivalent to manned aircraft Considering that most accidents involving unmanned aircrafts fall to the ground, causing damage to third parties' lives or property, this thesis focused on the responsibility of operators under the international treaty, and the responsibility of third parties for air transport by Domestic Commercial Act, as well as the liability for compensation. In relation to the Rome Convention, the Rome Convention 1952 detailed the responsibilities of the operator. Although it has yet to come into effect regarding liability, some EU countries are following the limit of responsibility under the Rome Convention 2009. Korea has yet to sign any Rome Convention, but Commercial Act Part VI Carriage by Air is modeled on the Rome Convention 1978 in terms of compensation. This thesis also looked at security-related responsibilities and the responsibility for privacy infringement. which are most problematic due to the legal responsibilities of operating unmanned aircraft. Concerning insurance, this thesis looked at the trends of mandatory aviation insurance coverage around the world and the corresponding regulatory status of major countries to see the applicability of unmanned aircraft. It also looked at the current clauses of the Domestic Aviation Business Act that make insurance mandatory, and the ultra-light flight equipment insurance policy and problems. In sum, the operator of an unmanned aircraft will be legally responsible for operating the unmanned aircraft safely so that it does not pose a risk to people, property or other aircraft, and there will be adequate compensation in the event of an accident, and legal systems such as insurance systems should be prepared to do so.

Do North Korean Social Media Show Signs of Change?: An Examination of a YouTube Channel Using Qualitative Tagging and Social Network Analysis

  • Park, Han Woo;Lim, Yon Soo
    • Journal of Contemporary Eastern Asia
    • /
    • v.19 no.1
    • /
    • pp.123-143
    • /
    • 2020
  • This study examines the interplay between the reactions of YouTube users and North Korean propaganda. Interesting enough, the study has noticed changes in the strict media environment under young leader Kim. Messages delivered by the communist regime to the outside world appeared to resemble those of 'normal' countries. Although North Korean YouTube was led mainly by the account operator, visitors from different nations do comment on the channel, which suggests the possibility of building international communities for propaganda purposes. Overall, the study observed a sparsely connected social network among ordinary commenters. However, the operator did not exercise tight control over peer-to-peer communication but merely answered questions and tried to facilitate mass participation. In contrast to the many news clips, the documentary content on North Korea's YouTube channel did not explicitly advocate for North Korea's current political positions.

On the Properties of OWA Operator Weighting Functions with Constant Value of Orness

  • Ahn, Byeong-Seok
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.338-341
    • /
    • 2005
  • In this paper, we present analytic forms of the ordered weighted averaging (OWA) operator weighting functions, each of which has properties of rank-based weights and a constant level of orness, irrespective of the number of objectives considered. These analytic forms provide significant advantages for generating OWA weights over previously reported methods. First, OWA weights can be efficiently generated by use of proposed weighting functions without solving a complicated mathematical program. Moreover, convex combinations of these specific OWA operators can be used to generate OWA operators with any predefined values of orness once specific values of orness are α priori stated by decision maker. Those weights have a property of constant level of orness as well. Finally, OWA weights generated at a predefined value of orness make almost no numerical difference with maximum entropy OWA weights in terms of dispersion.

  • PDF

A Study on the Japanese Railway Station Development (철도역 개발동향에 관한연구 : 일본사례를 중심으로)

  • Lee Kyung-Chul;Lee Jinsun;Kim Kyong-Tae
    • Proceedings of the KSR Conference
    • /
    • 2004.06a
    • /
    • pp.445-450
    • /
    • 2004
  • A railway station is a place where the railway operator concretize his marketing policy to meet the internal and external changes of a railway. Hence the analysis on the railway stations could give some useful information on the conditions which influence the shape of railway station. The purpose of this study is to analyze the development of Japanese railway stations. This study shows that the influencing factors on the shape of Japanese railway stations are as follows: invitation of investment from outside the japanese railway, necessity to define measures against the cut off the urban fabric by the railway facilities, profitability of the railway operator by the creation of subsidiary business, integration of administrative or public function into the station building. And the future of Japanese railway stations is now preparing by the policies on the accessibility and commodity of users and by the research projects on the environmental quality, user satisfaction.

  • PDF

An Establishment of Emergency Response Scenarios For Railroad Emergency Accident and a way to derive appropriate activities from the train operator (철도비상사고 대비 비상대응 시나리오 설정 및 기관사 행동요령 도출방안 -공항철도 사례-)

  • Shin, Jong-Hyun;Kim, Si-Gon;Kim, Kang-Seob
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.2325-2331
    • /
    • 2008
  • This article is about a new law of railroad industry has come into effect in 2004 and that left the railroad company operated under the private system. Accordingly, it has to encounter a variety of managers on the railroad safety part too. Incheon Airport Railroad that was, from Incheon International Airport to Kimpo Airport, opened to traffic on the 23th March, 2007 as the first private railroad company in Korea. This railroad company is working hard to be a safe and convenient airport railroad. There is not operated an effective emergency response that the railroad company and the emergency response personnel without standard operation procedure, recently. The original emergency manual and the emergency procedure of the synthesized railroad safety development business. I am proposing to establish the emergency response scenario according to the different situations that the train operator.

  • PDF

Risk Based Approach to Business Planning and Management Control -Case Study on London Underground (위험도 기반에 의한 사업계획수립과 경영관리 -런던지하철 사례연구)

  • Jung, Won;Lim, Seung-Soo;Wang, Jong-Bae;Park, Chan-Woo
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.577-583
    • /
    • 2007
  • In railway business plan, operations require a strategic and sustained level of planned investment to ensure assets are fit for purpose over the whole of their planned life. Therefore it is essential that operator can confidently plan and predict capital investment requirements over a number of years. This research addresses that how the London Underground apply a systematic risk based approach to their health and safety planning and investment decision making. Through this case study, we investigate the elements of management system that includes arrangements for the ongoing identification of hazards, assessment of risks and the implementation necessary control measures. Risk based business planning processes are also addressed.

  • PDF

Analysis of Purchase Process Using Process Mining (프로세스 마이닝을 이용한 구매 프로세스 분석)

  • Kim, Seul-Gi;Jung, Jae-Yoon
    • The Journal of Bigdata
    • /
    • v.3 no.1
    • /
    • pp.47-54
    • /
    • 2018
  • Previous studies of business process analysis have analyzed various factors such as task, customer service, operator convenience, and execution time prediction. To accurately analyze these factors, it is effective to utilize actual historical data recorded in information systems. Process mining is a technique for analyzing various elements of a business process from event log data. In this case study, process mining was applied to the transaction data of a purchase agency to analyze the business process of their procurement process, the execution time, and the operators.