• Title/Summary/Keyword: Control Policy

Search Result 3,229, Processing Time 0.024 seconds

Assessment Model for Industrial Accidents Prevention Policy (산업재해 예방정책에 대한 평가모형)

  • Kim, Youngsun;Jo, Jinnam;Baik, Jaiwook
    • Journal of Applied Reliability
    • /
    • v.17 no.1
    • /
    • pp.38-49
    • /
    • 2017
  • Purpose: The purpose of this study is to introduce the assessment model for industrial accidents prevention policy. Methods: 10 years of industrial accidents data are explored through EDA approach. Case control study is tried in order to assess the effectiveness of the measures taken by Korea Safety and Health Agency, Civilian, and 'Ministry of Employment and Labor'. Propensity score matching is used to match the characteristics of the two groups compared, and then case control study is again conducted. Next, logistic and Poisson regressions are used to assess the risk factors. Results: According to case control study involvement of 'Korea Safety and Health Agency' and 'Ministry of Employment and Labor' were not effective, but Civilian was. Propensity score matching leads to the same conclusion. Poisson regression reveals the impact of the risk factors on the industrial accidents. Industrial accidents occur more often as the number of employees grows. Mining, farming, fishing, 'transportation storage and telecommunication' and forestry have a higher level of industrial accidents but service industry has a lower level. It is odd that more involvement of Korea Safety and Health Agency, Civilian, and Ministry of Employment and Labor means more industrial accidents. Conclusion: 'Korea Safety and Health Agency', Civilian, and 'Ministry of Employment and Labor' seem to visit those industries with more industrial accidents.

Trusted Information Sharing Model in Collaborative Systems (협업 환경 내 신뢰할수 있는 정보 공유 모델)

  • Hong, Seng-Phil;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.99-113
    • /
    • 2007
  • In the rapidly changing e-business environment, organizations need to share information, process business transactions, and enhance collaborations with relevant entities by taking advantage of the various technologies. However, there are always the security issues that need to be handled in order for the e-business operations to be run efficiently. In this research, we suggest the new security authorization model for safety flexible supporting the needs of e-business (e-marketplace) in an organization. This proposed model provides the scalable of access control policy among multi-domains, and preservation of flexible authorization management in distributed system environments. For servers to take the access control policy and enforcement decisions, we also describe the feasible authorization architecture is concerned with how they might seek advice and guideline from formal access control model.

  • PDF

Suggestions for Advancing the Control of Emerging Infectious Diseases (신종감염병의 선진적 관리를 위한 제언)

  • Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.30 no.1
    • /
    • pp.1-3
    • /
    • 2020
  • Coronavirus disease 2019 (COVID-19), which originated in Wuhan, China, is pandemic. It has occurred in more than 170 countries on six continents. In Korea, COVID-19's cases are more than 9,000. The reasons of pandemic COVID-19 are that COVID-19 can spread asymptomatic or early in symptoms although similar reproductive number to severe acute respiratory syndrome coronavirus (SARS), that there are more travelers in China and world than the SARS of 2003, and that the control of COVID-19 was contaminated to political considerations in China, World Health Organization (WHO), and Korea. Emerging infectious diseases such as COVID-19 will occur in the future. To prepare for control of emerging infectious disease, first, the Ministry of Health should be independent from Ministry of Health and Welfare and the department of disease management should be established. Second, experts for making evidence about the emerging infectious diseases should be trained and the plan that is the mobilization of manpower and facilities in large cases will be established. Third, the WHO should enhance its capacity to manage emerging infectious diseases and Korea will support the country of occurred emerging diseases through experts in the analysis of emerging infectious diseases.

Distribution Impact of Rent Control on Seoul Market Rents during the COVID-19

  • Joo Han, SUNG;Jin, KIM
    • Journal of Distribution Science
    • /
    • v.21 no.2
    • /
    • pp.111-118
    • /
    • 2023
  • After the outbreak of the COVID-19 in the early 2020, Korea has attempted to reinforce the existing rent controls to help the low-income households. From July 2000, the tenants' right of lease renewal came into effect, as a policy tool to enforce the upper bound percentage of rent increases within Korea. Purpose: This study aims to examine the impact of rent control on the uncontrolled rents in Seoul Metropolitan Area (SMA). Research design, data and methodology: The study regresses the monthly panel data from 58 municipalities in SMA from January 2020 to March 2022, during the COVID-19 pandemic. Results: The data indicates that the policy had the effect of lowering rents for a period of two months, and subsequently monetary policy including quantitative easing and low interest rates, coupled with asset market bubbles lead to rent increases. During the sample data period, the quantity of money supply increased by 12.6% and CPI rose by 3.0%, these phenomena collectively increased the rents by up to 14.7%. Conclusions: The results of the present study support the findings of earlier studies in part: namely, that rent control without the government's steps to stabilize the property price may have an undesirable effect on rental tenants.

Emission Control Routes in Container Shipping between Korea-China

  • Je-Ho Hwang;Si-Hyun Kim
    • Journal of Korea Trade
    • /
    • v.27 no.3
    • /
    • pp.119-146
    • /
    • 2023
  • Purpose - As the severity of air pollution caused by the shipping industry is becoming evident, port authorities have started making efforts to reduce air pollutants. Considering the limitations of the currently implemented emission-control area (ECA) and vessel-speed reduction program (VSRP), which are narrow in the designation range and navigation behavior of ships, this study proposes an emission-control route (ECR) that can complement the aforementioned two environmental policies. Design/methodology - This study was conducted on Korea-China trade service routes (ports of call) of regular liners. This study employed vessel-specific data, which is from an automatic identification system (AIS), for 1,728 maritime transportations performed by 387 container vessels during one year (July 1, 2021, to June 30, 2022). Performing a scenario analysis, this study analyzed the effectiveness of reduced air-pollutant emissions. Findings - This study found that the implementation of ECRs could increase average voyage time by 12.38%-25.28% but reduced air-pollutant emissions by 29.02%-43.54%. Additionally, the increase in average voyage times reduces the anchorage time of ships outside ports, providing an incentive for ship operators to voluntarily participate in compliance with regulations, thereby contributing to the establishment of a virtuous cycle of air-environmental policies related to ships. Originality/value - This study aims to verify the policy effectiveness by designing an ECR scope for liner trade routes between Korea and China. Therefore, originality and the value of this study includes conceptualizing the ECR system, analyzing its environmental performance, and exploring new policies that can be implemented while complementing existing policies.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

Optimal Scheduling of Multi-product Batch Process for Common Intermediate Storage Policy; A Model for Batch Process Automation (다품종용 회분식 공정에서의 중간 저장 탱크 공유를 위한 최적 생산계획 ; 회분식 조업의 자동화 모델)

  • 정재학;이인범;양대륙;장근수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.303-308
    • /
    • 1992
  • In this study, we propose a shared storage system which is more efficient policy than MIS(Mixed Intermediate Storage) policy for relatively rare storage system and can be called CIS(Common Intermediate Storage) policy. Using this strategy, we develop a new completion time algorithm and apply it to two kinds of optimal or near optimal scheduling method; combinatorial search and simulated annealing method. We also extend this strategy to other storage policy, for example MIS policy, with PLC(Programmable Logic Controller) logic and on/off action of electronic valves. It thus can be accepted as a basic form of FMS(Flexible Manufacturing System) for operating various storage policies. Finally we suggest the interlocking block to compansate for the shortcoming of CIS policy, i.e, complication of operation and safety, resulting in a basic batch process automation mode.

  • PDF

Partially Observable Markov Decision Process with Lagged Information over Infinite Horizon

  • Jeong, Byong-Ho;Kim, Soung-Hie
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.16 no.1
    • /
    • pp.135-146
    • /
    • 1991
  • This paper shows the infinite horizon model of Partially Observable Markov Decision Process with lagged information. The lagged information is uncertain delayed observation of the process under control. Even though the optimal policy of the model exists, finding the optimal policy is very time consuming. Thus, the aim of this study is to find an .eplison.-optimal stationary policy minimizing the expected discounted total cost of the model. .EPSILON.- optimal policy is found by using a modified version of the well known policy iteration algorithm. The modification focuses to the value determination routine of the algorithm. Some properties of the approximation functions for the expected discounted cost of a stationary policy are presented. The expected discounted cost of a stationary policy is approximated based on these properties. A numerical example is also shown.

  • PDF

Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

  • Yin, Hongjian;Zhang, Leyou;Cui, Yilei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2768-2780
    • /
    • 2019
  • Ciphertext-policy attribute-based encryption (CP-ABE) is one of the practical technologies to share data over cloud since it can protect data confidentiality and support fine-grained access control on the encrypted data. However, most of the previous schemes only focus on data confidentiality without considering data receiver privacy preserving. Recently, Li et al.(in TIIS, 10(7), 2016.7) proposed a CP-ABE with hidden access policy and testing, where they declare their scheme achieves privacy preserving for the encryptor and decryptor, and also has high decryption efficiency. Unfortunately, in this paper, we show that their scheme fails to achieve hidden access policy at first. It means that any adversary can obtain access policy information by a simple decisional Diffie-Hellman test (DDH-test) attack. Then we give a method to overcome this shortcoming. Security and performance analyses show that the proposed scheme not only achieves the privacy protection for users, but also has higher efficiency than the original one.

Determination of Quality Cost Policy under Multiple Assignable Causes (다중이상원인하의 경제적 품질비용 정책결정)

  • 김계완;김용필;박지연;윤덕균
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.26 no.1
    • /
    • pp.7-16
    • /
    • 2003
  • At present, company has to produce a product that consumer like with a competitive price, a good quality, and a fitting time to supply. Process control and quality control are very important to supply with a product uniformly and inexpensively. Process control is given much weight in the quality control in manufacturing system. Statistical process controls(SPC) that are used in process generally have major impact on manufacturing, product design activities, and process development potentially. Control charts in statistical process control method can be interpreted the data from quality characteristics in production process and discriminated between chance variation and assignable variation in process. In addition, control chart can be used to monitor the process output and detect when changes in the inputs are required to bring the process back to an in-control state. The models that relate the influential inputs to process outputs help determine the nature and magnitude of the adjustments required. In this paper, the characteristic of product quality is monitored by control chart during the machining process and construction of quality control cycle is considered to divide into two types in this case that different assignable causes lead to shifts having different magnitudes. Then we are intended to find a process shift magnitude which has economical quality cost policy and are considered to quality cost functions to find a process shift magnitude. Those costs are categorized into the well-known categories of prevention, appraisal, and internal failure and external failure. This paper ends with numerical examples that demonstrate the usefulness of the model.