• Title/Summary/Keyword: Hierarchical Policy

Search Result 510, Processing Time 0.02 seconds

Application of the hierarchical scheduling policy to FMC (FMC에 계층적 스케쥴링 전략의 적용)

  • Yeo, Yong-Kee;Lyou, Joon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.482-487
    • /
    • 1991
  • The scheduling algorithm based on the hierarchical scheduling policy is presented for the Job Shop type FMC control, and the simulation results using this hierarchical scheduling policy are with the results which are based on the heuristic scheduling policy. The results show that the hierarchical ling policy is more efficient than the heuristic scheduling policy in either case that there exist machine failures in the FMC or not.

  • PDF

Using Multilevel Model for Evaluation on Community Support Program (다층모형을 활용한 상수원 관리지역 주민지원사업 평가에 관한 연구)

  • Kim, Dong Hyun;Jung, Juchul
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.3D
    • /
    • pp.469-476
    • /
    • 2011
  • The purposes of research is to understand the need of and the effectiveness of multilevel model to evaluate community support program in watershed areas. If the properties of policy target have hierarchical characteristics, the multilevel analysis is an adequate method to evaluate and test the effectiveness of policy. Also, the technique of multilevel modeling is extended to testing the relevance between performance appraisal and policy effectiveness. The case study of watershed region's community support program was estimated using satisfaction and economic aid level of policy target. This research has three results. First, the multilevel analysis should be used in nested data structure to estimate the effect of policy intervention. Second, the indexes of multilevel modeling should be used complementally to that of the traditional index approach. Third, the spatial hierarchical structure should be considered as the hierarchical structure in policy evaluation.

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

A Study on the Hierarchical Ranking Structure of University and Education (대학서열화와 대학교육에 관한 연구)

  • Oh, Hoyoung
    • Journal of Engineering Education Research
    • /
    • v.18 no.2
    • /
    • pp.8-13
    • /
    • 2015
  • This paper deals with the formation and development of hierarchical ranking stmcture among universities in Korea and the nature of university education. As the growing number of university graduates have trouble with finding job opportunity, the development of skills and competency which are required for the labor market is becoming the most important role for universities. Finally, I proposed several policy suggestions to overcome negative aspect of hierarchical ranking structure of university.

Design of A Spammail Control Model Based on Hierarchical Policy (정책기반의 계층적 스팸메일 제어모델 설계)

  • Lee Yong-Zhen;Baek Seung-Ho;Park Nam-Kyu;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.143-151
    • /
    • 2005
  • As the internet and I-commerce have been developing. a novel method for marketing is needed. A new advertisement using E-mail is becoming popular, because it has characteristics with low costs and relative efficiency. However. as the spam mails are increasing rapidly, mail service companies and users are deeply damaged in their mind and economically. In this paper, we design a hierarchical spam mail blocking policy through cooperation of all the participants-user, administrator, ISP to cut off the spam mail efficiently and Propose an efficient model to block and manage the spam mails based on the Policy. Also we prove the efficiencies and effectiveness of the proposed model through evaluation process .

  • PDF

A Hierarchical Analysis on the Commuting Behaviors and Urban Spatial Characteristics II (통행행태와 도시공간특성에 관한 위계적 분석 II)

  • Seo, Jong Gook
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.2
    • /
    • pp.182-193
    • /
    • 2018
  • Purpose: The purpose of the study is to analyze the relationship between travel behavior and urban spatial characteristics in a hierarchical manner. Method: This study analyzed the relationship between traffic patterns and urban spatial characteristics for 83 cities in Korea by using a hierarchical linear model. Results: It was found that the urban spatial characteristics influenced the choice of transportation mode and travel time with personal attributes. However, the degree of influence on the choice of the means and the time required is relatively low through the policy of changing the city attribute, so the policy effect of mobilizing the land use policy for the traffic is theoretically, but the scale is not bigger than expected. Conclusion: In high density or the bigger scale of the city, the mass transportation system is widely supplied and used, but it does not overcome the drawback that it takes more time than the autos.

Design of A Database Architecture for Hierarchical Security Policy Model (계층적 구조 보안 정책 모델을위한 데이터 베이스 구조 설계)

  • Yun, Yeo-Wung;Hwang, Yoon-Cheol;Um, Nam-Kyeong;Kim, Kwun-Woo;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.711-720
    • /
    • 2001
  • An enlarging a scale of logical domain organizing Internet, security policy association among entities become complicated. Establishment and control of security policies for each system is a hard problem to solve because of the environment and composite factors with variable properties. In this paper, to solve this actual problems, we orgainze a hierarchical structure of network and than we design the structure of database to apply security policies for secure communication. This enables efficient management of security data and association of security policy by using designed data structure between different domain in hierarchical structure with make secure communication possible.

  • PDF

A Study on Work Values of Hospital Employees (병원근로자의 근로가치관에 대한 연구)

  • 윤방섭;이해종
    • Health Policy and Management
    • /
    • v.10 no.1
    • /
    • pp.95-110
    • /
    • 2000
  • The purpose of this study is to evaluate work values of hospital employees. Their work values was compared with that of other corporate's employees or among that of specialties in hospital. It was surveyed to 893 persons; 164 in hospital and 709 in others. The work values of hospital employees are similar to that of other corporate's employees. But they have first priority to working environment, and emphasize monetary incentive much more than hierarchical development. There are some gap in work value between age groups in hospital, different from other corporate. That means hospital manager need to development the more developed work value in hospital. The work values are different in monetary incentive, hierarchical development, safety, working environment, creativity among specialties in hospital. The more special employees emphasize much more to monetary incentive, hierarchical development, working environment and the less special employees have priority to safety work value. Specially, because the hospital managers want to have safety than creativity, it must to make some changing program of work value for advance of future hospital.

  • PDF

A SYN flooding attack detection approach with hierarchical policies based on self-information

  • Sun, Jia-Rong;Huang, Chin-Tser;Hwang, Min-Shiang
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.346-354
    • /
    • 2022
  • The SYN flooding attack is widely used in cyber attacks because it paralyzes the network by causing the system and bandwidth resources to be exhausted. This paper proposed a self-information approach for detecting the SYN flooding attack and provided a detection algorithm with a hierarchical policy on a detection time domain. Compared with other detection methods of entropy measurement, the proposed approach is more efficient in detecting the SYN flooding attack, providing low misjudgment, hierarchical detection policy, and low time complexity. Furthermore, we proposed a detection algorithm with limiting system resources. Thus, the time complexity of our approach is only (log n) with lower time complexity and misjudgment rate than other approaches. Therefore, the approach can detect the denial-of-service/distributed denial-of-service attacks and prevent SYN flooding attacks.

A Study to Hierarchical Visualization of Firewall Access Control Policies (방화벽 접근정책의 계층적 가시화 방법에 대한 연구)

  • Kim, Tae-yong;Kwon, Tae-woong;Lee, Jun;Lee, Youn-su;Song, Jung-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1087-1101
    • /
    • 2020
  • Various security devices are used to protect internal networks and valuable information from rapidly evolving cyber attacks. Firewall, which is the most commonly used security device, tries to prevent malicious attacks based on a text-based filtering rule (i.e., access control policy), by allowing or blocking access to communicate between inside and outside environments. However, in order to protect a valuable internal network from large networks, it has no choice but to increase the number of access control policy. Moreover, the text-based policy requires time-consuming and labor cost to analyze various types of vulnerabilities in firewall. To solve these problems, this paper proposes a 3D-based hierarchical visualization method, for intuitive analysis and management of access control policy. In particular, by providing a drill-down user interface through hierarchical architecture, Can support the access policy analysis for not only comprehensive understanding of large-scale networks, but also sophisticated investigation of anomalies. Finally, we implement the proposed system architecture's to verify the practicality and validity of the hierarchical visualization methodology, and then attempt to identify the applicability of firewall data analysis in the real-world network environment.