• Title/Summary/Keyword: supply chain system

Search Result 857, Processing Time 0.03 seconds

A Basic Study for the Fabrication of Micro Cell-Fusion-Device (초소형 세포융합기구의 제작을 위한 기초연구 (원형질체 준비 및 전계인가방식에 관한 연구를 중심으로))

  • Lee, Sang-Hoon;Cha, Hyoun-Chul;Kim, Young-Uk;Kim, Young-Kweon
    • Proceedings of the KIEE Conference
    • /
    • 1993.07a
    • /
    • pp.287-289
    • /
    • 1993
  • Recently semiconductor technology is widely used in biotechnology fields and one of the represetatives is electric cell-fusion-device. In this paper. some basic researches required in the development of this fusion system was performed and they are as follows: 1) preparation of protoplast and selection of the fittest plant cell, 2) development of high frequency AC power supply for cell-alignment by using class-E resonant circuit. As a result, cabbage cell is selected and pearl-chain, which shows cell-alignment. can be observed by the applied AC field.

  • PDF

Determination of Number and Location of Central Warehouses by Heuristics (휴리스틱을 이용한 중앙창고의 수와 위치 결정)

  • Lee, Dong-Ju;Hwang, In-Keuk;Park, Dong-Jin
    • IE interfaces
    • /
    • v.19 no.1
    • /
    • pp.78-85
    • /
    • 2006
  • A centralized inventory system provides a number of stores with cost reduction, information sharing. In this paper, transportation costs are included in the inventory model. To build centralized warehouses, two things should be considered: how many warehouses are required and where these are located. The objective of this paper is to develop efficient heuristics to determine the location and the number of central warehouses by minimizing total costs. Throughout some computational experiments, the results of the heuristics are compared with an optimal solution.

Intelligent Track and Trace System for Improving Electronic Logistics (전자 물류 개선을 위한 지능형 종추적 시스템)

  • 오세원;이용준;황재각
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.620-622
    • /
    • 2003
  • 정보 및 네트워크 기술의 발전과 시장의 세계화는, 기존의 물리적인 거래 환경이 인터넷 및 이동 통신 기술을 통한 전자적인 거래 환경으로 변할 수 있는 추진력이 되어오고 있다 그러나 전자적인 업무 환경의 성공은 기존의 물리적인 상품이 정확하게 이동하며 그로부터 정보가 신속히 획득 및 공유되는 것을 기본 조건으로 하고 있다. 따라서 공급망(Supply Chain)에 속한 거래 주체들이 전자적인 협업을 원활하게 수행하고 정보를 손쉽고 정확히 교환할 수 있도록 물리적 환경과 전자 공간을 연결할 수 있는 전자 물류(Electronic Logistics) 환경이 매우 중요하게 되었다. 본 논문에서는 지능형 종추적 시스템을 중심으로 전자 물류의 핵심 구성 요소들에 대해 살펴보고자 한다.

  • PDF

Re-engineering Distribution Using Web-based B2B Technology

  • Kim, Gyeung-min
    • Journal of Distribution Research
    • /
    • v.6 no.1
    • /
    • pp.22-35
    • /
    • 2001
  • The focus of Business Process Re-engineering (BPR) has been extended to inter-business process that cuts across independent companies. Combined with Supply Chain Management (SCM), inter-business process reengineering (IBPR) focuses on synchronization of business activities among trading partners to achieve performance improvements in inventory management and cycle time. This paper reviews the business process reengineering movement from the historical perspective and presents a case of inter-business process reengineering using the latest internet-based Business-to- Business (B2B) technology based on Collaborative Planning, Forecasting, and Replenishment (CPFR). The case demonstrates how CPFR technology reengineers the distribution process between Heineken USA and its distributors. As world's first implementor of web-based collaborative planning system, Heineken USA reduces cycle time from determining the customer need to delivery of the need by 50% and increases sales revenue by 10%. B2B commerce on the internet is predicted to grow from $90 billion in 1999 to $2.0 trillion in 2003. This paper provides the management with the bench-marking case on inter-business process reengineering using B2B e-commerce technology.

  • PDF

A Study on Introduction and Application of Green SCM (Green SCM 도입 및 적용 방안에 관한 연구)

  • Lee, Gong-Seob
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.4
    • /
    • pp.79-83
    • /
    • 2012
  • This study analyzes introduction state of Green SCM technology in domestic and overseas area and suggests how to reduce greenhouse gases of logistics in the future. Thus, introduction state of Green SCM was reviewed by building and integrating logistic-related informatization systems such as WMS and TMS. And how to apply the system to track toxic substance in supply chain was performed to manage toxic substance. Therefore, it will be necessary to develop a device to display and collect vehicle condition & log through OBD-II, which is widely adopted, and hardware to measure, collect, and monitor carbon dioxide emission and power consumption of fixed facilities.

The Status of Logistics Industry Development and Cooperation between China and Korea (한중 물류산업의 현황과 협력방안에 관한 연구)

  • Li, Zhong-Shi;Wen, Hua
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.2
    • /
    • pp.45-52
    • /
    • 2021
  • Recently Korea and China's logistics industry developed rapidly. Because two countries' industry have complementarity, there are broad basis and area for cooperation between China and Korea. This study compares and analyzes the logistics development trends and competitiveness of two countries, and suggests mutual win-win logistics cooperation between the two countries based on macro cooperation of government and micro cooperation of enterprises. This is important for the two countries to participate in the global supply chain system, promote regional cooperation in Northeast Asia, and enhance the efficiency and competitiveness of the logistics industry.

Monitoring and Tracking Model of Logistics Based on ICT network

  • Cho, Sokpal;Chung, Heechang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.489-492
    • /
    • 2016
  • Transportation in the logistics, many business organizations are engaged in monitoring and tracking the vehicles in order to improve logistics services, reduce expenses and secure security in cargo transportation. It is saving time and money by tracking and monitoring vehicles which transport cargo in supply chain of logistics. Therefore the main issue of delivery flow is to improve services, and ensure the safety in transportation system. This article suggests the tracking and monitoring model to keep safety transports on ICT network. It focuses on precise delivery control by monitoring and tracking vehicles to save time and costs. The status of product movement is analyzed for proper decision making. The vehicle embedded with RFID is automatically tracked in the movement process by tracking and monitoring model. The main role keeps safety tracking to reduce costs and to deliver products at proper time and location.

  • PDF

Analyses of Vulnerability in RFID application with Lightweight Security Scheme (경량화 보안 기능을 가진 RFID 응용 분야에 대한 취약성 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.789-792
    • /
    • 2009
  • As RFID technology is becoming ubiquitous, the secunty of these systems gets much attention. Its fields of usage include personal identification, supply-chain management systems, and many more. Many kinds of RFID tags are available on the market which differ both in storage, and computational capacity. Since by standard IT means all the tags have small capacities, the security mechanisms which are in use in computer networks are not suitable. For expensive tags with relatively large computational capacities many secure communication protocols were developed, for cheap low-end tags, only a few lightweight protocols exist. In this paper we introduce our solution, which is based on the least computation demanding operator, the exclusive or function. By introducing two tags instead of one in the RFID system, our scheme provides security solutions which are comparable with those provided by the lightweight protocols. In the meantime, our scheme does not demand any computational steps to be made by the ta.

  • PDF

Analysis of the Development of Cross-border E-commerce in China's Manufacturing Industry

  • Huang, Shuqi;Ock, Young Seok
    • Asian Journal of Innovation and Policy
    • /
    • v.11 no.2
    • /
    • pp.238-257
    • /
    • 2022
  • As the global epidemic continues to worsen, the pressure on the supply chain is also increasing. In this context, Internet shopping has ushered in new development opportunities. Under the influence of globalization, the development of cross-border e-commerce (CB-EC) is particularly remarkable. As China is a big manufacturing country, the growth of CB-EC is a significant opportunity for Chinese goods to enter the international market. Therefore, this paper comprehensively analyzes the current situation of the integrated development of China's manufacturing industry and CB-EC from four aspects: the operation mode, development mode, policy environment, and development prospect of CB-EC in China's manufacturing sector. This paper constructs an evaluation system including 19 secondary indicators to rank the CB-EC development environment of 30 provinces in China that have established comprehensive pilot zones of CB-EC.

Trends of Hardware-based Trojan Detection Technologies (하드웨어 트로이목마 탐지기술 동향)

  • Choi, Y.S.;Lee, S.S.;Choi, Y.J.;Kim, D.W.;Choi, B.C.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.78-87
    • /
    • 2021
  • Information technology (IT) has been applied to various fields, and currently, IT devices and systems are used in very important areas, such as aviation, industry, and national defense. Such devices and systems are subject to various types of malicious attacks, which can be software or hardware based. Compared to software-based attacks, hardware-based attacks are known to be much more difficult to detect. A hardware Trojan horse is a representative example of hardware-based attacks. A hardware Trojan horse attack inserts a circuit into an IC chip. The inserted circuit performs malicious actions, such as causing a system malfunction or leaking important information. This has increased the potential for attack in the current supply chain environment, which is jointly developed by various companies. In this paper, we discuss the future direction of research by introducing attack cases, the characteristics of hardware Trojan horses, and countermeasure trends.