• Title/Summary/Keyword: management code

Search Result 1,300, Processing Time 0.023 seconds

Establishment of Cosmetic Raw Material Weighing and Bulk Manufacturing Management System Using Bar Code, QR Code and Database (바코드, 큐알코드와 데이터베이스를 활용한 화장품 원료 칭량 및 벌크제조 관리시스템 구축)

  • Lee, Chung-Hee;Bae, Jun-Tae;Hong, Jin-Tae
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.45 no.3
    • /
    • pp.277-285
    • /
    • 2019
  • In this study, effective cosmetic raw material weighing and bulk manufacturing management system were constructed by using bar code or quick response code (QR code) and database. Raw material labels and weighing labels for bulk manufacturing were published in web environment using the information entered in the database using ScriptX, a print component of Medi&Co. By checking the weighing and manufacturing process by using scanner, tablet and PC, it was possible to remarkably improve the product error caused by erroneous amount or misapplication which is the most cause of error in the production of cosmetic bulk. In conclusion, applying a database that utilizes bar code and QR code to cosmetics manufacturing can reduce the various problems in the process, thereby improving quality control and productivity of cosmetics.

Development of Knowledge Code Converter for Design Knowledge Management

  • Nomaguchi, Yutaka;Shimomura, Yoshiki
    • International Journal of CAD/CAM
    • /
    • v.5 no.1
    • /
    • pp.83-90
    • /
    • 2005
  • This is a report on a new methodology to manage design knowledge by utilizing a knowledge-based CAD and a prototype system named $C^3$ (Cubic; CAD knowledge Code Capacitor), which is being developed using our methodology. $C^3$ facilitates (i) the automatic generation of a knowledge code for a knowledge-based CAD by processing design documents written in the format near the natural language, such as English or Japanese, and (ii) automatically generation of a design document written in the format near the natural language from the knowledge code. The features of the system facilitate document-based design knowledge management which reduces the designer's load to encode and maintain design knowledge, because it is easier for a designer to treat a natural language description than a coded description.

An Empirical Analysis for the Implementation of Safety Management System under ISM Code (ISM Code에 따른 안전관리 시스템활동의 실태 분석 - 선상 안전활동을 중심으로 -)

  • Lee, Ok-Yong
    • Journal of Navigation and Port Research
    • /
    • v.26 no.2
    • /
    • pp.245-259
    • /
    • 2002
  • According to ISM Code, from July 1, 1998 relevant shipping company and ships should establish, implement and maintain safety management system(SMS) both on ships as well as shore. Nonetheless the SMS has not yet been settled. This paper is prepared to seek for the problems occurred in relation to the implementation of SMS onboard and propose ideas to improve the system.

Development of a tool management system (Bar Code를 이용한 공구관리 시스템 개발)

  • Kim, S.H.;Kim, D.H.;Lee, C.S.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.10 no.2
    • /
    • pp.48-53
    • /
    • 1993
  • At present, the manufacturing industry is in a process of a great change. There is a demand for a variety of types and shorter product life. The change increases the number of different tools and frequencies of tool changes. For the most part, the tools are presetted and offset values are entered manually or via punched tapes to NC machines. Thus a large amount of capital is tied up in the tool area and considerable productive time is lost. Consequently, there is a need for improvement in tool management. This paper describes a computer controlled tool data management system which include: 1) tool identification with bar code. 2) computer aided management and updating of tool data. 3) tool data communication with tool presetter, CNC, etc.

  • PDF

Shipment Management System Model for Efficient Management of Transferring Automobile Transmission Parts -In Automobile Parts Manufacturing Industry- (자동차 변속기 부품 이동의 효율적 관리를 위한 출하관리 시스템 모형 -자동차 부품 제조업을 중심으로-)

  • Kong, Myung-Dal
    • Journal of the Korea Safety Management & Science
    • /
    • v.18 no.3
    • /
    • pp.147-154
    • /
    • 2016
  • This paper suggests a specific model that could efficiently improve the interaction and the interface between MES(Manufacturing Execution System) server and PDA terminal through RFID(Radio Frequency Identification) system and bar-code system in automative transmission shipment place of the finished assembly parts. The proposed model shows that the new method by RF-Tag system can more efficiently perform to reduce processing time and loading time for shipment, compared with the current approach by bar-code system. It is noted in case of the method by RF-Tag that the effects of proposed model are as follows; (a) While the shipping lead time per truck for carrying by the current method was 35 minutes, the shipping lead time by the new method was 15 minutes. (b) While the accuracy for carrying by the current method was 50%, the accuracy by the new method was 99%.

Legal Issues in Application of the ISPS Code under Marine Cargo Insurance (해상적하보험에서 국제선박 및 항만시설 보안규칙의 적용상 법률적 쟁점)

  • Lee, Won-Jeong;Yoo, Byung-Ryong
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.3
    • /
    • pp.307-316
    • /
    • 2014
  • In view of the increased threat arising terrorism, the International Maritime Organization(IMO) adopted the International Ship and Port Facility Security Code (ISPS Code) which attached to the SOLAS Convention. The ISPS Code requires a comprehensive set of measures to enhance the security of ships and port facilities. For example, a shipowner must obtain the International Ship Security Certificate(ISSC). If the carrying vessel has not ISSC, the ship may be detained by the contracting governments. The Joint Cargo Committee(JCC) in London adopted the Cargo ISPS Endorsement, in which the assured who knowingly ships the cargoes on a non-ISPS Code compliant vessel will have no cover. However, where there is no the Cargo ISPS Endorsement in a Marine Cargo Insurance Policy and the cargo is carried by a non-ISPS Code certified vessel, the legal problem is whether or not it would constitute a breach of an implied warranty of seaworthiness and/or an implied warranty of legality. The purpose of this article is to analyze the potential legal issue on the relations between non-ISPS Code compliant vessel and two implied warranties under Marine Insurance Act(1906) in U.K.

The Design of User-Authentication technique using QR-Code recognition (스마트폰의 QR-Code의 인식 기법을 이용한 사용자 인증 기법 설계)

  • Lee, Yong Jae;Kim, Young Gon;Park, Tae Sung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.85-95
    • /
    • 2011
  • Smart phones, greatly expanding in the recent mobile market, are equipped with various features compared to existing feature phones and provide the conveniences to in several ways. The camera, one of the features of a smartphone, creates the digital contents, such photos and videos, and plays a role for the media which transmits information, such as video calls and bar code reader. QR-Code recognition is also one of the camera features. It contains a variety of information in two-dimensional bar code type in matrix format, and makes it possible to obtain the information by using smart phones. This paper analyzes the method of QR-Code recognition, password method-the existing user-authentication technique, smart card, biometrics and voice recognition and so on and thenn designs a new user-authentication technique. The proposed user-authentication technique is the technique in which QR-Code, which can be simply granted is read by smart phones and transmitted to a server, for authentication. It has the advantages in view that it will simply the process of authentication and conteract the disadvantages, such as brute force attack, man-inthe-middle attack, and keyboard hacking, which may occur in other authentication techniques.

Development of Web-based Mold manufacturing process monitoring & control system using G-code control (G-code control 을 이용한 웹 기반 금형 가공 공정 모니터링 &컨트롤 시스템 개발)

  • 김건희;최진화;전병철;조명우
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.269-272
    • /
    • 2004
  • The target of this paper is the development of Web-based monitoring & control system which is for effective and economic management of mold manufacturing process. This system has three module; G-code Control, Monitoring Module and Result analysis module. Also, as the environment of development is based on internet, this system which is possible to the remote site management of manufacturing process works on Web. To be possible to control the manufacturing monitoring by client, each module is made ActiveX control and is based on socket communication. This system makes the foundation which is possible to manage the mold manufacturing process efficiently from remote site by matching real-time monitoring with manufacturing process in factory using G-code control and displaying the result of manufacturing using Ch-CGI.

  • PDF

Buffer Overflow Malicious Code Detection by Tracing Executable Area of Memory (메모리 실행영력 추적을 사용한 버퍼오버플로 악성코드 탐지기법)

  • Choi, Sung-Woon;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.189-194
    • /
    • 2009
  • Most of anti-virus programs detect and compare the signature of the malicious code to detect buffer overflow malicious code. Therefore most of anti-virus programs can't detect new or unknown malicious code. This paper introduces a new way to detect malicious code traces memory executable of essentials APIs by malicious code. To prove the usefulness of the technology, 7 sample codes were chosen for compared with other methods of 8 anti-virus programs. Through the simulation, It turns out that other anti-virus programs could detect only a limited portion of the code, because they were implemented just for detecting not heap areas but stack areas. But in other hand, I was able to confirm that the proposed technology is capable to detect the malicious code.