• Title/Summary/Keyword: Information Strategy Policy

Search Result 884, Processing Time 0.023 seconds

Energy Optimal Transmission Strategy in CDMA System: Duality Perspective

  • Oh, Changyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.61-66
    • /
    • 2015
  • We investigate rate scheduling and power allocation problem for a delay constrained CDMA systems. Specifically, we determine an energy efficient scheduling policy, while each user maintains the short term (n time slots) average throughput. More importantly, it is shown that the optimal transmission strategy for the uplink is same as that of the downlink, called uplink and downlink duality. We then examine the performance of the optimum transmission strategy for the uplink and the downlink for various system environments.

Farm-map Application Strategy for Agri-Environmental Resources Management (농업환경자원관리를 위한 팜맵 활용전략에 관한 연구)

  • Wee, Seong-Seung;Lee, Won-Suk;Jung, Nam-Su
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.64 no.3
    • /
    • pp.1-8
    • /
    • 2022
  • In this study, a farm map utilization strategy for sustainable agricultural environmental resource management was derived. In addition, it is intended to present an efficient method of providing farm map-related services. As a result of the demand survey, the additional information required for the farm map includes 29% of information on crops grown on farmland, 21% of management-related information such as the owner or business entity, 17% of topographical information including slope, 15% of agricultural water information, 17% of land status information, and the addition of functions. 2% was investigated. As a result of intensive interview survey, it was found that it can be used for information on crops cultivated by agricultural businesses, actual cultivated area by township, arable land consolidation division boundary, and management of agricultural promotion zones. The farm map can be used as basic data to efficiently manage agricultural environmental resources. Since the status of support for individual farms or lots, such as soil improvement agent support and organic fertilizer support, may belong to personal information, it can be processed and provided in units required by administration or policies, such as administrative boundaries, subwatersheds, and watersheds. It can serve as a basis for executing the direct payment currently supported only by individual farms, even in a community unit that manages environmental direct payments.

Policy and Strategy for Intelligence Information Education and Technology (지능정보 교육과 기술 지원 정책 및 전략)

  • Lee, Tae-Gyu;Jung, Dae-Chul;Kim, Yong-Kab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.359-368
    • /
    • 2017
  • What is the term "intelligence information society", which is a term that has been continuously discussed recently? This means that the automation beyond the limits of human ability in the whole societies based on intelligent information technology is a universalized social future. In particular, it is a concept that minimizes human intervention and continuously pursues evolution to data (or big data) -based automation. For example, autonomous automation is constantly aiming at unmanned vehicles with artificial intelligence as a key element. However, until now, intelligent information research has focused on the intelligence itself and has made an effort to improve intelligence logic and replace human brain and intelligence. On the other hand, in order to replace the human labor force, we have continued to make efforts to replace workers with robots by analyzing the working principles of workers and developing optimized simple logic. This study proposes important strategies and directions to implement intelligent information education policy and intelligent information technology research strategy by suggesting access strategy, education method and detailed policy road map for intelligent information technology research strategy and educational service. In particular, we propose a phased approach to intelligent information education such as basic intelligence education, intelligent content education, and intelligent application education. In addition, we propose education policy plan for the improvement of intelligent information technology, intelligent education contents, and intelligent education system as an important factor for success and failure of the 4th industrial revolution, which is centered on intelligence and automation.

A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity (금융회사 정보보안정책의 위반에 영향을 주는 요인 연구 : 지각된 고객정보 민감도에 따른 조절효과)

  • Lee, Jeong-Ha;Lee, Sang-Yong Tom
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.225-251
    • /
    • 2015
  • This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees' perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.

A methodology of the IMO e-navigation strategy for the development of a new maritime ICT policy (신 해양정보통신 정책 개발을 위한 IMO e-navigation 전략 개발 방법론)

  • Shim, Woo-Seong;Lee, Sang-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.316-319
    • /
    • 2011
  • During the past several decades, the development of the maritime policy have been focused on the level of regulation based on the lessons from the individual accidents. Recently, the development of IMO e-navigation strategy has been discussed actively and has been focusing on the new frame and architecture based on the user requirements and definition of function and services for user requirements, which might produce the user-friendly policy, infrastructure and user service. For the new maritime ICT policy getting fusion of ICT and innovation of ship/ocean industry, the overarching methodology, as IMO e-navigation strategy, should be applied to primarily setup the architecture from the user requirements to technology. In this paper, we analyze the IMO e-navigation strategy procedure and provide the consideration and lessons for the strategic methodology to develop a new maritime ICT policy.

  • PDF

UNDP's Adaptation Policy Framework for Climate Change (국제연합개발계획의 기후변화 적응 정책 체계 소개)

  • Shm, Im-Chul;Lee, Eun-Jeong;Kwon, Won-Tae;Lim, Jaekyu
    • Atmosphere
    • /
    • v.15 no.1
    • /
    • pp.59-68
    • /
    • 2005
  • United Nations Development Programme (UNDP) introduced the Adaptation Policy Framework (APF) to support the developing countries in order to help to make adaptation policy and strategy to climate change. This study provides the summary of the APF and will help for preparing policy regarding the impact of climate change and its adaptation. APF consists of five basic and two cross-cutting steps. Five basic steps are made of (a) defining project scope and design, (b) assessing current vulnerability and adaptation, (c) assessing future climate-related risks, (d) developing an adaptation strategy, and (e) continuing the adaptation process. Cross-cutting steps consist of engaging stakeholder and enhancing adaptive capacity. The project scope and design process includes four major tasks: scope the project and define its objectives, establish the project team, review and synthesize existing information on vulnerability and adaptation, and design the APF project. The main purpose of assessing current vulnerability and adaptation is to understand the characteristics of current climate-related vulnerability in priority systems and the scope of adaptive responses. Future climate-related risks are assessed in order to characterize future climate-related risks, so that adaptation policies and measures can be designed to reduce the system's exposure to future climate hazard. In developing an adaptation strategy, all of the preceding APF-related work is synthesized into a well-considered strategy that can direct real adaptation action. Continuing the adaptation process is in order to implement and sustain the APF-strategy, polices, and measure. The purpose of involvement of stakeholders is to communicate between individuals and groups about projects. Finally, enhancing adaptive capacity provides guidance on how adaptive capacity can be assessed and enhanced.

PERFORMANCE OF MYOPIC POLICY FOR OPPORTUNISTIC SPECTRUM SHARING

  • Lee, Yu-Tae
    • East Asian mathematical journal
    • /
    • v.27 no.1
    • /
    • pp.23-33
    • /
    • 2011
  • Due to underutilization of spectrum under current inefficient and static spectrum management policy, various kinds of opportunistic spectrum access (OSA) strategies have appeared. Myopic policy is a simple and robust OSA strategy with reduced complexity that maximizes immediate throughput. In this paper, we propose mathematical models to evaluate the throughput and the MAC delay of a myopic policy under saturation tra c conditions. Using the MAC delay distribution, we evaluate the packet delay of secondary users under nonsaturation conditions. Numerical results are given to show the performance of the myopic policy in cognitive radio networks.

Energy-Saving Strategy for Green Cognitive Radio Networks with an LTE-Advanced Structure

  • Jin, Shunfu;Ma, Xiaotong;Yue, Wuyi
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.610-618
    • /
    • 2016
  • A green cognitive radio network (CRN), characterized by base stations (BSs) that conserve energy during sleep periods, is a promising candidate for realizing more efficient spectrum allocation. To improve the spectrum efficiency and achieve greener communication in wireless applications, we consider CRNs with an long term evolution advanced (LTE-A) structure and propose a novel energy-saving strategy. By establishing a type of preemptive priority queueing model with a single vacation, we capture the stochastic behavior of the proposed strategy. Using the method of matrix geometric solutions, we derive the performance measures in terms of the average latency of secondary user (SU) packets and the energy-saving degree of BSs. Furthermore, we provide numerical results to demonstrate the influence of the sleeping parameter on the system performance. Finally, we compare the Nash equilibrium behavior and social optimization behavior of the proposed strategy to present a pricing policy for SU packets.

Future IPTV Service's Shift and Policy Issues in Convergence Environments (컨버전스 관점에서 미래 IPTV 서비스 변화와 정책이슈 전망)

  • Lee, Myung-Soon;Lee, Young-Hee;Kim, Moon-Sun
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.13-21
    • /
    • 2013
  • IPTV Service, a convergence service of broadcasting, seems to have great potential as a nation's future growth driver for the 21st century. As IPTV service is future-oriented industry, adopting IPTV policy by freeing oneself from shortsighted policy and considering long-term strategy and rapidly changing convergence environment would be desirable. Therefore, the purpose of this research is to deduct future IPTV service under convergence environment by applying T.A.I.D.A, which is strategy planning tool effective for planning mid-long strategy, under uncertain environment among scenario method and offer new policy direction in order to realize future IPTV service.

A Study on the Information Security Measures Influencing Information Security Policy Compliance Intentions of IT Personnel of Banks (은행 IT 인력의 정보보호 정책 준수에 영향을 미치는 정보보호 대책에 관한 연구)

  • Shim, Joonbo;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.2
    • /
    • pp.171-199
    • /
    • 2015
  • This study proposes the practical information security measures that help IT personnel of banks comply the information security policy. The research model of the study is composed of independent variables (clarity and comprehensiveness of policy, penalty, dedicated security organization, audit, training and education program, and top management support), a dependent variable (information security policy compliance intention), and moderating variables (age and gender). Analyses results show that the information security measures except 'clarity of policy' and 'training and education program' are proven to affect the 'information security policy compliance intention.' In case of moderating variables, age moderated the relationship between top management support and compliance intention, but gender does not show any moderating effect at all. This study analyzes information security measures based solely on the perception of the respondents. Future study may introduce more objective measurement methods such as systematically analyzing the contents of the information security measures instead of asking the respondents' perception. In addition, this study analyzes intention of employees rather than the actual behavior. Future research may analyze the relationship between intention and actual behavior and the factors affecting the relationship.