• Title/Summary/Keyword: e-Business Architecture

Search Result 251, Processing Time 0.024 seconds

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

Durability Evaluation of High-Performance, Low-Heat Self-Compacting Concrete for Foundation of Tall Buildings (초고층 건축물 매트 기초용 고성능 콘크리트 내구성 평가)

  • Kim, Young-Bong;Park, Dong-Cheon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.5
    • /
    • pp.425-430
    • /
    • 2022
  • Concrete used for the foundation of high-rise buildings is often placed through in an integrated pouring to ensure construction efficiency and quality. However, if concrete is placed integrally, there is a high risk of temperature cracking during the hydration reaction, and it is necessary to determine the optimal mixing design of high-performance, high-durable concrete through the replacement of the admixture. In this study, experiments on salt damage, carbonation, and sulfate were conducted on the specimen manufactured from the optimal high-performance low-heating concrete combination determined in the author's previous study. The resistance of the cement matrix to chlorine ion diffusion coefficient, carbonation coefficient, and sulfate was quantitatively evaluated. In the terms of compression strength, it was measured as 141% compared to the structural design standard of KCI at 91 days. Excellent durability was expressed in carbonation and chlorine ion diffusivity performance evaluation. In particular, the chlorine ion diffusion coefficient, which should be considered the most strictly in the marine environment, was measured at a value of 4.09×E-12m2/y(1.2898×E-10m2/s), and is expected to be used as a material property value in salt damage durability analysis. These results confirmed that the latent hydroponics were due to mixing of the admixture and high resistance was due to the pozzolane reaction.

Workcase based Very Large Scale Workflow System Architecture (워크케이스 기반의 초대형 워크플로우 시스템 아키텍쳐)

  • 심성수;김광훈
    • Proceedings of the Korea Database Society Conference
    • /
    • 2002.10a
    • /
    • pp.403-416
    • /
    • 2002
  • 워크플로우 관리 시스템은 정부나 기업과 같은 조직의 작업을 처리하기 위한 비즈니스 프로세스를 컴퓨터를 기반으로 자동화함으로서 작업의 효율을 높이고 비용을 절감한다. 현재에 이르러 이런 워크플로우 시스템을 사용하는 조직들이 점차 거대화되어 가고 네트워크의 발달과 인터넷의 출현으로 인하여 워크플로우 시스템이 처리하여야 하는 작업의 수와 고객과 작업자 수 등이 빠른 속도로 증가하는 추세이다. 이런 추세에서 워크플로우 시스템은 거대 조직 환경에 적합한 워크플로우 시스템 아키텍쳐를 필요하게 된다. 이에 본 논문은 거대 조직 환경을 관리할 수 있는 워크플로우 관리 시스템으로 워크케이스 기반의 초대형 워크플로우 시스템의 아키텍쳐를 설계 및 구현 하고자 한다. 그리고 워크플로우 시스템 아키텍쳐를 분류, 분석하여 장단점을 가려내어 이를 기반으로 워크플로우 시스템 아키텍쳐의 성능을 예측하여 워크케이스 기반 워크플로우 시스템 아키텍쳐가 본 논문에서 제안하는 초대형 워크플로우 시스템의 아키텍쳐라는 것을 예측하여 본다. 또한 초대형 워크플로우 시스템을 위하하부 구조로 EJB(Enterprise Java Beans)를 사용하고 사용 이유를 기술한다. 본 논문에서는 이런 워크케이스 기반의 초대형 워크플로우 시스템 아키텍쳐를 위하여 개념적인 단계와 설계 단계, 구현 단계로 나누어 설계 및 구현을 하며 개념적인 단계에서는 워크케이스 기반 워크플로우 시스템 아키텍쳐에 대하여 상세히 기술하고 설계단계에서는 전체적인 기능 정의와 초대형 워크플로우 시스템의 구조를 설계한다. 그리고 구현 단계에서는 워크케이스 기반의 초대형 워크플로우 시스템 아키텍쳐를 실제 구현하기 위한 환경을 선택하고 구현 단계의 문제점들과 해결책을 기술한다. 다 솔레노이드방식 감압건조장치로 건조한 표고버섯으로 품위에 대한 유의성 검증결과, 표고버섯의 경우 온도별로는 색택과 복원률, 건조실 내부 압력별로는 수축률, 복원률에서 유의차가 있는 것으로 나타났다. 라. 본 연구에서 구명된 감압건조특성을 기초로 하여 배치식 감압건조기를 설계 제작에 활용하고자 한다.ational banks. Several financial interchange standards which are involved in B2B business of e-procurement, e-placement, e-payment are also investigated.. monocytogenes, E. coli 및 S. enteritidis에 대한 키토산의 최소저해농도는 각각 0.1461 mg/mL, 0.2419 mg/mL, 0.0980 mg/mL 및 0.0490 mg/mL로 측정되었다. 또한 2%(v/v) 초산 자체의 최소저해농도를 측정한 결과, B. cereus, L. mosocytogenes, E. eoli에 대해서는 control과 비교시 유의적인 항균효과는 나타나지 않았다. 반면에 S. enteritidis의 경우는 배양시간 4시간까지는 항균활성을 나타내었지만, 8시간 이후부터는 S. enteritidis의 성장이 control 보다 높아져 배양시간 20시간에서는 control 보다 약 2배 이상 균주의 성장을 촉진시켰다.차에 따른 개별화 학습을 가능하게 할 뿐만 아니라 능동적인 참여를 유도하여 학습효율을 높일 수 있을 것으로 기대된다.향은 패션마케팅의 정의와 적용범위를 축소시킬 수 있는 위험을 내재한 것으로 보여진다. 그런가 하면, 많이 다루어진 주제라 할지라도 개념이나 용어가 통일되지 않고

  • PDF

A Case Study on the Implementation of a River Water Level Monitoring System using PLC(Programmable Logic Controller) and Public Telecommunication Network (PLC(Programmable Logic Controller)와 공중통신망을 이용한 하천수위감시시스템 구축 사례 연구)

  • Kim, Seokju;Kim, Minsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.1-17
    • /
    • 2015
  • A river water level monitoring system which prevents salt water damages and effectively excludes floods has been developed to contribute efficient operation of Nakdong river estuary barrage. The system can be used for monitoring upstream conditions more quickly and do appropriate responses over changes. Telemetry and telecontrols using PLCs have been built at the three sites that directly influence on the operation of barrage gates, and are linked to Nakdong river estuary barrage's IOS (Integrated Operation System) through public communication networks. By using PLC, the system can achieve even higher reliability and versatility than before as well as easy management. By power control devices, we can remotely control the power of PLCs to treat the minor troubles instantly without going on-sites. The power control devices also save data in preparation for the cases of communication failures. The system uses ADSL (FTTH) as a main network between SCADA server and PLCs, and CDMA (M2M) as a secondary network. In order to compensate security vulnerabilities of public communication network, we have installed the VPNs for secure communication between center and the observation stations, just like a dedicated network. Generally, river water level observations have been used custom-manufactured remote terminals to suit their special goals. However, in this case, we have established a system with open architecture considering the interface between different systems, the ease of use and maintenance, security, price, etc.

A Case Study on the Implementation of Integrated Operation System of the Nakdong River Estuary Barrage Due to the Drainage Gate Extension (낙동강 하굿둑의 배수문 증설에 따른 통합운영시스템의 구축 사례에 대한 연구)

  • Kim, Seokju;Lim, Taesoo;Kim, Minsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.183-199
    • /
    • 2015
  • Due to the Four Major Rivers Restoration Project, Nakdong River Estuary Barrage's designed flood quantity has been largely increased, and this has caused to construct several drainage gates at the right side of Eulsukdo island to secure the safety of downstream river area. For successful functioning of Nakdong River Estuary Barrage, such as flood control, disaster prevention, and the securing of sufficient water capacity, drainage gates at the both sides of island have to operate systematically and reliably. To manage this under restricted personnel and resources, we have implemented the IOS (Integrated Operation System) by integrating previous facilities and resources via information and communication technologies. The IOS has been designed to have higher availability and fault tolerance to function continuously even with the partial system's failure under the emergency situation like flood. Operators can use the system easily and acknowledge alarms of facilities through its IWS (Integrated Warning System) earlier. Preparing for Integrated Water Resources Management and Smart Water Grid, the architecture of IOS conformed to open system standards which will be helpful to link with the other systems easily.

A Web-based System for Real-time Monitoring of Dangerous Objects using RFID (RFID를 이용한 웹 기반의 실시간 위험물 모니터링 시스템 구축 사례)

  • Kim, Ju-Il;Lee, Woo-Jin;Chong, Ki-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.101-115
    • /
    • 2008
  • Recently in the human society, the crime using small arms has increased. Also, many accidents happen because of incomplete management of chemicals and radiation. Accordingly, it is necessary to manage dangerous objects by tracing the position of dangerous objects and rapidly providing the correct information for them. This paper presents a web-based system for real-time monitoring of dangerous objects using RFID in order to overcome the limitations and problems of current dangerous objects management techniques. In this paper, we define the architecture for web-based dangerous objects monitoring system and the scheme for storing information of a dangerous object in the RFID tag. We also implement the web-based monitoring system and present the execution result of the system. The proposed real-time monitoring system is composed of the dangerous objects monitoring server which manages information of dangerous objects and controls them, the dangerous objects monitoring middleware which is mediator between dangerous objects and the server, the RFID reader which reads information of dangerous objects from RFID tags attached to the objects and the database which stores information, status and position of dangerous object. The proposed system manages diverse dangerous objects such as small arms, radiation and harmful chemicals based on the position of them using RFID, so the user can check dangerous objects when they are checked in and checked out and the user can acquire the real-time position information of them through the system. Furthermore, the user can visually monitor dangerous objects through web browser from any where and at any time because the system is web-based system and it provides graphical user interface.

  • PDF

Classification of the Architectures of Web based Expert Systems (웹기반 전문가시스템의 구조 분류)

  • Lim, Gyoo-Gun
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.1-16
    • /
    • 2007
  • According to the expansion of the Internet use and the utilization of e-business, there are an increasing number of studies of intelligent-based systems for the preparation of ubiquitous environment. In addition, expert systems have been developed from Stand Alone types to web-based Client-Server types, which are now used in various Internet environments. In this paper, we investigated the environment of development for web-based expert systems, we classified and analyzed them according to type, and suggested general typical models of web-based expert systems and their architectures. We classified the web-based expert systems with two perspectives. First, we classified them into the Server Oriented model and Client Oriented model based on the Load Balancing aspect between client and server. Second, based on the degree of knowledge and inference-sharing, we classified them into the No Sharing model, Server Sharing model, Client Sharing model and Client-Server Sharing model. By combining them we derived eight types of web-based expert systems. We also analyzed the location problems of Knowledge Bases, Fact Bases, and Inference Engines on the Internet, and analyzed the pros & cons, the technologies, the considerations, and the service types for each model. With the framework proposed from this study, we can develop more efficient expert systems in future environments.

  • PDF

Attribute Utility-Based Negotiation Agent Methodology for Customer-To-Customer Electronic Commerce (소비자간 전자상거래를 위한 속성효용기반 자동협상 방법론의 개발)

  • Song Yong U.;Hong June S.;Kim Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.73-89
    • /
    • 2004
  • Since people have come to access more and more information about products with the proliferation of the Internet, more and more customer-to-customer e-marketplaces are being introduced with rapidly increasing transaction volumes. As the role of customer-to-customer electronic commerce has become increasingly regarded as vital to the economy, much research has delved into developing intelligent agent systems to efficiently support customer-to-customer electronic commerce. Most of this research, however, has focused only on supporting simple negotiation for the price of common goods along the time span. To expand the negotiation object to the differentiated goods, the customer must be allowed to negotiate over multi-at-tributes of the product besides the price, including the attributes related to the transaction activity itself, such as delivery time and payment method. To satisfy this requirement, we propose an agent marketplace for differentiated goods where the agent of a customer can negotiate not only the price but also the various attributes of the product and the transaction in order to achieve a better utility level for both buyer and seller. The formal protocol and the architecture issues to support the proposed e-marketplace and agents are also addressed.

  • PDF

Landscape Value Analysis of Hallyǒ Haesang Sea National Park (한려해상국립공원(閑麗海上國立公園)의 경관자원(景觀資源) 가치분석(價値分析))

  • Kim, Sei-Cheon
    • Journal of Korean Society of Forest Science
    • /
    • v.89 no.2
    • /
    • pp.145-160
    • /
    • 2000
  • This study is focused to the national park of Korean typical Sea Hally$\check{o}$ Haesang, and its visual resources and practiced inspect course by the way of suppositions and tests, to show the visual resource management objectively, and that of qualitative basic data. Accordingly by measuring the physical amount spatial structure with the visual amount originated from the Mesh Analyzing Method and the Visual Preference from the Scenic Beauty Estimation(S.B.E.) method and analyzed the valuation of the visual resource by Iverson method. Spatial image structure measured by Semantic Differential(S.D.) Scale was shown through the factor analysis algorithm for the analyzing psychological amount and examined the flowing out of decisive factor and the objective importance related to the mutual factors by appling the measurement of the visual quality. As a national Park, the visual factors that have natural landscape harmonized with forest, sky, surface of the water, curious stones and rocks, and temples should be escalated their values affirmatively so as to be the scenery of pointed direction and enjoyable, and it is of more needed for visual resource and its' controlling technique to make artificial structures more intentional planning and systemical setting. When we are viewing the improvement for the national park along with the visual resource management, reasonable level of development is needed, because when men interference surpass plantations and leasts will be damaged and the quality of natural landscape can be lowered, so it is needed to set up a management end, tangibly or clearly; and it is permitted limit coming and going ablably by accounting the suitable number for availing. But the controling end should be set in every level, positive management, very actively within the permissive varcability. It is the main business for the national park to prevent the damage from human for their gay life or to prevent the damage of a land carpet, and to restorate for the visual resource management.

  • PDF

P2P DRM Algorithm for the protection of contents copyright (콘텐츠 저작권 보호를 위한 P2P DRM 알고리즘)

  • Ha Tae-Jin;Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1783-1789
    • /
    • 2004
  • It is evaluated that there is infinit capability of creating new e business using P2P program. but the research for the method to protect the copyright of digital contents is urgent even for development of the p2p service because the problem of copyright protection for digital contents is not solved. Though this article, it can be induced that reliable contents sharing use to a flow fund by secure settlement architecture, user authentication and contents encryption and then it as the problem of copyright fee is solved, it is able to discontinue which trouble with a creation work for copyright fee and protection it's once again as growth of p2p market, p2p protocal is will be grow into a important protocal of advanced network. In this article, When users send digital contants to each other in internet, we proposed the P2P DRM algorism to offer a security function which using the technology of copyright management to use a AES Algorithm based on PKI.