• Title/Summary/Keyword: safety activity system

Search Result 507, Processing Time 0.025 seconds

A Study on Integrated Logistic Support (통합병참지원에 관한 연구)

  • 나명환;김종걸;이낙영;권영일;홍연웅;전영록
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2001.06a
    • /
    • pp.277-278
    • /
    • 2001
  • The successful operation of a product In service depends upon the effective provision of logistic support in order to achieve and maintain the required levels of performance and customer satisfaction. Logistic support encompasses the activities and facilities required to maintain a product (hardware and software) in service. Logistic support covers maintenance, manpower and personnel, training, spares, technical documentation and packaging handling, storage and transportation and support facilities.The cost of logistic support is often a major contributor to the Life Cycle Cost (LCC) of a product and increasingly customers are making purchase decisions based on lifecycle cost rather than initial purchase price alone. Logistic support considerations can therefore have a major impact on product sales by ensuring that the product can be easily maintained at a reasonable cost and that all the necessary facilities have been provided to fully support the product in the field so that it meets the required availability. Quantification of support costs allows the manufacturer to estimate the support cost elements and evaluate possible warranty costs. This reduces risk and allows support costs to be set at competitive rates.Integrated Logistic Support (ILS) is a management method by which all the logistic support services required by a customer can be brought together in a structured way and In harmony with a product. In essence the application of ILS:- causes logistic support considerations to be integrated into product design;- develops logistic support arrangements that are consistently related to the design and to each other;- provides the necessary logistic support at the beginning and during customer use at optimum cost.The method by which ILS achieves much of the above is through the application of Logistic Support Analysis (LSA). This is a series of support analysis tasks that are performed throughout the design process in order to ensure that the product can be supported efficiently In accordance with the requirements of the customer.The successful application of ILS will result in a number of customer and supplier benefits. These should include some or all of the following:- greater product uptime;- fewer product modifications due to supportability deficiencies and hence less supplier rework;- better adherence to production schedules in process plants through reduced maintenance, better support;- lower supplier product costs;- Bower customer support costs;- better visibility of support costs;- reduced product LCC;- a better and more saleable product;- Improved safety;- increased overall customer satisfaction;- increased product purchases;- potential for purchase or upgrade of the product sooner through customer savings on support of current product.ILS should be an integral part of the total management process with an on-going improvement activity using monitoring of achieved performance to tailor existing support and influence future design activities. For many years, ILS was predominantly applied to military procurement, primarily using standards generated by the US Government Department of Defense (DoD). The military standards refer to specialized government infrastructures and are too complex for commercial application. The methods and benefits of ILS, however, have potential for much wider application in commercial and civilian use. The concept of ILS is simple and depends on a structured procedure that assures that logistic aspects are fully considered throughout the design and development phases of a product, in close cooperation with the designers. The ability to effectively support the product is given equal weight to performance and is fully considered in relation to its cost.The application of ILS provides improvements in availability, maintenance support and longterm 3ogistic cost savings. Logistic costs are significant through the life of a system and can often amount to many times the initial purchase cost of the system.This study provides guidance on the minimum activities necessary to Implement effective ILS for a wide range of commercial suppliers. The guide supplements IEC60106-4, Guide on maintainability of equipment Part 4: Section Eight maintenance and maintenance support planning, which emphasizes the maintenance aspects of the support requirements and refers to other existing standards where appropriate. The use of Reliability and Maintainability studies is also mentioned in this study, as R&M is an important interface area to ILS.

  • PDF

The Correlations between Renminbi Fluctuations and Financial Results of Venture Companies in the Floating Exchange Rate (변동환율제도하의 위안화 환율변동과 벤처기업의 재무성과 간 상관관계 연구)

  • Sun, Zhong-Yuan;Chang, Seog-Ju;Na, Seung-Hwa
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.5 no.1
    • /
    • pp.45-67
    • /
    • 2010
  • On July 21st in 2005, People's Bank of China (PBOC) turned the currency peg against the U.S. dollar into managed currency system based on a basket of unnamed currencies under China's exchanged rate regime. This change means that China's enterprises are not free from currency fluctuations. The purpose of this study is to analyze the relations between Renminbi fluctuations in the floating exchange rate and financial results of venture companies. The process and outcomes of this study are as follows, First, in order to measure the financial results of venture companies, I choose venture companies in Shandong Province listed on the Shanghai Stock Exchange (SSE) at random and several quarter financial sheets according to safety ratios, profitability ratios, growth ratios, activity ratios. Second, I arrange the daily Renminbi exchange rate data announced from July 21st, 2005 to December 31st, 2008 by PBOC into the quarterly data. Third, in order to confirm the relations between Renminbi fluctuations and financial results of venture companies, I carry out Pearson's correlation analysis. As a result, the revaluation of the Chinese Renminbi has weakly negative effects on debt ratio, total assets turnover ratio and equity turnover ratio in statistics. But the revaluation of the Chinese Renminbi is not related to other financial index in statistics. The result of this study is that the revaluation of the Chinese Renminbi has little influence on the export and import of Chinese venture companies and certifies the fact that Chinese venture companies have much foreign currency assets. In addition to avoid the currency exposure risk, this study shows the effective method about currency exposure risk which adjusts proportion of Renminbi to foreign currency.

  • PDF

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

The Correlations between Renminbi Fluctuations and Financial Results of Venture Companies in the Floating Exchange Rate (변동환율제도하의 위안화 환율변동과 벤처기업의 재무성과 간 상관관계 연구)

  • Sun, Zhong Yuan;Chang, Seog-Ju;Na, Seung-Hwa
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2010.08a
    • /
    • pp.139-160
    • /
    • 2010
  • On July 21st in 2005, People's Bank of China (PBOC) turned the currency peg against the U.S. dollar into managed currency system based on a basket of unnamed currencies under China's exchanged rate regime. This change means that China's enterprises are not free from currency fluctuations. The purpose of this study is to analyze the relations between Renminbi fluctuations in the floating exchange rate and financial results of venture companies. The process and outcomes of this study are as follows, First, in order to measure the financial results of venture companies, I choose venture companies in Shandong Province listed on the Shanghai Stock Exchange (SSE) at random and several quarter financial sheets according to safety ratios, profitability ratios, growth ratios, activity ratios. Second, I arrange the daily Renminbi exchange rate data announced from July 21st, 2005 to December 31st, 2008 by PBOC into the quarterly data. Third, in order to confirm the relations between Renminbi fluctuations and financial results of venture companies, I carry out Pearson's correlation analysis. As a result, the revaluation of the Chinese Renminbi has weakly negative effects on debt ratio, total assets turnover ratio and equity turnover ratio in statistics. But the revaluation of the Chinese Renminbi is not related to other financial index in statistics. The result of this study is that the revaluation of the Chinese Renminbi has little influence on the export and import of Chinese venture companies and certifies the fact that Chinese venture companies have much foreign currency assets. In addition to avoid the currency exposure risk, this study shows the effective method about currency exposure risk which adjusts proportion of Renminbi to foreign currency.

  • PDF

Manufacture of Spent Layer Chicken Meat Products by Natural Freeze-Drying during Winter (겨울철 자연 동결 건조에 의한 노계 육제품의 제조)

  • Lee, Sung-Ki;Kang, Sun-Moon;Lee, Ik-Sun;Seo, Dong-Kwan;Kwon, Il-Kyung;Pan, Jo-No;Kim, Hee-Ju;Ga, Cheon-Heung;Pak, Jae-In
    • Food Science of Animal Resources
    • /
    • v.30 no.2
    • /
    • pp.277-285
    • /
    • 2010
  • The objective of this study was to manufacture spent layer chicken meat products by natural freeze-drying. The spent layers of chickens that were slaughtered at 80 wk were obtained from a local slaughter house and separated into two halves of carcasses. The samples were divided into the following groups: 1) control (non-curing), 2) curing, and 3) curing with 2% trehalose before drying. The cured meats were placed at $2^{\circ}C$ for 7 d and then transferred to a natural drying spot located in Injae City, Gangwondo, Korea. The experiment was conducted from January to March in 2008. The average temperature, RH, and wind speed were $-1.5^{\circ}C$, 63%, and 1.8 m/sec, respectively. The cured treatments showed higher pH, lower Aw and lower shear force value compared with the control. Based on the results of TBARS (2-thiobarbituric acid reactive substances) level and volatile basic nitrogen value, lipid oxidation and protein deterioration were inhibited in curing treatments during drying. Trehalose acted as a humectant because it maintained a lower water activity despite the relatively higher moisture content during drying. The polyunsaturated fatty acids content and sensory attributes were higher in cured treatments than in the control during drying. Most of the bacterial counts in the treated groups were lower by 2 Log CFU/g after 1 mon of drying, and Salmonella spp. and Listeria spp. were not found in any treatment. There was also no microbial safety problem associated with dried meat products. Based on the results of this experiment, dried meat products could be manufactured from precured spent layer chickens by natural freeze-drying during winter.

Environmental Interpretation on soil mass movement spot and disaster dangerous site for precautionary measures -in Peong Chang Area- (산사태발생지(山沙汰發生地)와 피해위험지(被害危險地)의 환경학적(環境學的) 해석(解析)과 예방대책(豫防對策) -평창지구(平昌地區)를 중심(中心)으로-)

  • Ma, Sang Kyu
    • Journal of Korean Society of Forest Science
    • /
    • v.45 no.1
    • /
    • pp.11-25
    • /
    • 1979
  • There was much mass movement at many different mountain side of Peong Chang area in Kwangwon province by the influence of heavy rainfall through August/4 5, 1979. This study have done with the fact observed through the field survey and the information of the former researchers. The results are as follows; 1. Heavy rainfall area with more than 200mm per day and more than 60mm per hour as maximum rainfall during past 6 years, are distributed in the western side of the connecting line through Hoeng Seong, Weonju, Yeongdong, Muju, Namweon and Suncheon, and of the southern sea side of KeongsangNam-do. The heavy rain fan reason in the above area seems to be influenced by the mouktam range and moving direction of depression. 2. Peak point of heavy rainfall distribution always happen during the night time and seems to cause directly mass movement and serious damage. 3. Soil mass movement in Peongchang break out from the course sandy loam soil of granite group and the clay soil of lime stone and shale. Earth have moved along the surface of both bedrock or also the hardpan in case of the lime stone area. 4. Infiltration seems to be rapid on the both bedrock soil, the former is by the soil texture and the latter is by the crumb structure, high humus content and dense root system in surface soil. 5. Topographic pattern of mass movement spot is mostly the concave slope at the valley head or at the upper part of middle slope which run-off can easily come together from the surrounding slope. Soil profile of mass movement spot has wet soil in the lime stone area and loose or deep soil in the granite area. 6. Dominant slope degree of the soil mass movement site has steep slope, mostly, more than 25 degree and slope position that start mass movement is mostly in the range of the middle slope line to ridge line. 7. Vegetation status of soil mass movement area are mostly fire field agriculture area, it's abandoned grass land, young plantation made on the fire field poor forest of the erosion control site and non forest land composed mainly grass and shrubs. Very rare earth sliding can be found in the big tree stands but mostly from the thin soil site on the un-weatherd bed rock. 8. Dangerous condition of soil mass movement and land sliding seems to be estimated by the several environmental factors, namely, vegetation cover, slope degree, slope shape and position, bed rock and soil profile characteristics etc. 9. House break down are mostly happen on the following site, namely, colluvial cone and fan, talus, foot area of concave slope and small terrace or colluvial soil between valley and at the small river side Dangerous house from mass movement could be interpreted by the aerial photo with reference of the surrounding site condition of house and village in the mountain area 10. As a counter plan for the prevention of mass movement damage the technics of it's risk diagnosis and the field survey should be done, and the mass movement control of prevention should be started with the goverment support as soon as possible. The precautionary measures of house and village protection from mass movement damage should be made and executed and considered the protecting forest making around the house and village. 11. Dangerous or safety of house and village from mass movement and flood damage will be indentified and informed to the village people of mountain area through the forest extension work. 12. Clear cutting activity on the steep granite site, fire field making on the steep slope, house or village construction on the dangerous site and fuel collection in the eroded forest or the steep forest land should be surely prohibited When making the management plan the mass movement, soil erosion and flood problem will be concidered and also included the prevention method of disaster.

  • PDF