• Title/Summary/Keyword: Key effective policies

Search Result 81, Processing Time 0.027 seconds

On determining a non-periodic preventive maintenance schedule using the failure rate threshold for a repairable system

  • Lee, Juhyun;Park, Jihyun;Ahn, Suneung
    • Smart Structures and Systems
    • /
    • v.22 no.2
    • /
    • pp.151-159
    • /
    • 2018
  • Maintenance activities are regarded as a key part of the repairable deteriorating system because they maintain the equipment in good condition. In practice, many maintenance policies are used in engineering fields to reduce unexpected failures and slow down the deterioration of the system. However, in traditional maintenance policies, maintenance activities have often been assumed to be performed at the same time interval, which may result in higher operational costs and more system failures. Thus, this study presents two non-periodic preventive maintenance (PM) policies for repairable deteriorating systems, employing the failure rate of the system as a conditional variable. In the proposed PM models, the failure rate of the system was restored via the failure rate reduction factors after imperfect PM activities. Operational costs were also considered, which increased along with the operating time of the system and the frequency of PM activities to reflect the deterioration process of the system. A numerical example was provided to illustrate the proposed PM policy. The results showed that PM activities performed at a low failure rate threshold slowed down the degradation of the system and thus extended the system lifetime. Moreover, when the operational cost was considered in the proposed maintenance scheme, the system replacement was more cost-effective than frequent PM activities in the severely degraded system.

'Lean Startup' : The Way to Reduce the Failure Rate of Startups ('린 스타트업' : 창업 초기기업의 실패 최소화 전략)

  • Cho, Sungju;Lee, Sang-Myung;Park, Byung-Jin
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.4
    • /
    • pp.41-53
    • /
    • 2014
  • There has been lots of discussions and new policies to encourage people to start new businesses. However, they key issue such as how to raise the success rate of new start-ups still needs to be resolved. Many believe that the success of policies and discussions for promoting entrepreneurship in Korea highly depends on how to lower the risks with which early stage start-ups encounter. In this backdrop, this study aims at providing an emerging approaches in entrepreneurship, 'lean start-up', which can work as an effective method with which early stage entrepreneurs can minimize challenges they face. Even though lean start-up is a widely accepted concept among practitioners and recognized as a useful tool for entrepreneurship and education, but has not got deserved attention from the academic world. This paper offers basic framework and key principles of lean start-ups, furthermore, shows Korean cases of step-by-step application methods of its concepts. It also suggest key issues in adopting lean start-up strategy. This study has implications and contributions for entrepreneurs, educators and researchers through providing comprehensive perspectives on process of the lean start-up strategy.

  • PDF

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

Analysis of the Effectiveness of Big Data-Based Six Sigma Methodology: Focus on DX SS (빅데이터 기반 6시그마 방법론의 유효성 분석: DX SS를 중심으로)

  • Kim Jung Hyuk;Kim Yoon Ki
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.13 no.1
    • /
    • pp.1-16
    • /
    • 2024
  • Over recent years, 6 Sigma has become a key methodology in manufacturing for quality improvement and cost reduction. However, challenges have arisen due to the difficulty in analyzing large-scale data generated by smart factories and its traditional, formal application. To address these limitations, a big data-based 6 Sigma approach has been developed, integrating the strengths of 6 Sigma and big data analysis, including statistical verification, mathematical optimization, interpretability, and machine learning. Despite its potential, the practical impact of this big data-based 6 Sigma on manufacturing processes and management performance has not been adequately verified, leading to its limited reliability and underutilization in practice. This study investigates the efficiency impact of DX SS, a big data-based 6 Sigma, on manufacturing processes, and identifies key success policies for its effective introduction and implementation in enterprises. The study highlights the importance of involving all executives and employees and researching key success policies, as demonstrated by cases where methodology implementation failed due to incorrect policies. This research aims to assist manufacturing companies in achieving successful outcomes by actively adopting and utilizing the methodologies presented.

Establishing an Effective Governance System Is the Top Priority in Securing Competitiveness in the Biohealth Industry (바이오헬스정책, 거버넌스 구축이 최우선 과제이다)

  • Sun-Hee Lee
    • Health Policy and Management
    • /
    • v.33 no.4
    • /
    • pp.377-378
    • /
    • 2023
  • The Yoon Suk Yeol administration is promoting the "Global Leap of the Biohealth Industry" as one of its 120 key national policies. Recently, the administration has been showing its commitment by establishing various strategies and presenting blueprints for policy implementation. However, the results felt on the ground are still not sufficient. The biohealth industry is a difficult field to generate policy effects because the related regulations are intricately intertwined and the diverse administrative tasks are scattered in various government departments, where inter-departmental interests differ. To solve this problem, an innovative governance system should be established. In order for the government's recent approach to establish a government-wide control tower to be effective, it should demonstrate a proactive policy commitment and be given practical power to coordinate the interests between departments.

Exploratory Analysis of AI-based Policy Decision-making Implementation

  • SunYoung SHIN
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.203-214
    • /
    • 2024
  • This study seeks to provide implications for domestic-related policies through exploratory analysis research to support AI-based policy decision-making. The following should be considered when establishing an AI-based decision-making model in Korea. First, we need to understand the impact that the use of AI will have on policy and the service sector. The positive and negative impacts of AI use need to be better understood, guided by a public value perspective, and take into account the existence of different levels of governance and interests across public policy and service sectors. Second, reliability is essential for implementing innovative AI systems. In most organizations today, comprehensive AI model frameworks to enable and operationalize trust, accountability, and transparency are often insufficient or absent, with limited access to effective guidance, key practices, or government regulations. Third, the AI system is accountable. The OECD AI Principles set out five value-based principles for responsible management of trustworthy AI: inclusive growth, sustainable development and wellbeing, human-centered values and fairness values and fairness, transparency and explainability, robustness, security and safety, and accountability. Based on this, we need to build an AI-based decision-making system in Korea, and efforts should be made to build a system that can support policies by reflecting this. The limiting factor of this study is that it is an exploratory study of existing research data, and we would like to suggest future research plans by collecting opinions from experts in related fields. The expected effect of this study is analytical research on artificial intelligence-based decision-making systems, which will contribute to policy establishment and research in related fields.

Performance Optimization of Two-Way AF Relaying in Asymmetric Fading Channels

  • Qi, Yanyan;Wang, Xiaoxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4432-4450
    • /
    • 2014
  • It is widely observed that in practical wireless cooperative communication systems, different links may experience different fading characteristics. In this paper, we investigate into the outage probability and channel capacity of two-way amplify-and-forward (TWAF) relaying systems operating over a mixed asymmetric Rician and Rayleigh fading scenario, with different amplification policies (AP) adopted at the relay, respectively. As TWAF relay network carries concurrent traffics towards two opposite directions, both end-to-end and overall performance metrics were considered. In detail, both uniform exact expressions and simplified asymptotic expressions for the end-to-end outage probability (OP) were presented, based on which the system overall OP was studied under the condition of the two source nodes having non-identical traffic requirements. Furthermore, exact expressions for tight lower bounds as well as high SNR approximations of channel capacity of the considered scenario were presented. For both OP and channel capacity, with different APs, effective power allocation (PA) schemes under different constraints were given to optimize the system performance. Extensive simulations were carried out to verify the analytical results and to demonstrate the impact of channel asymmetry on the system performance.

Mutable Encryption for Oblivious Data Access in Cloud Storage

  • Ahmad, Mahmood;Hussain, Shujjat;Pervez, Zeeshan;Lee, Sungyoung;Chung, Tae Choong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.157-158
    • /
    • 2013
  • Data privacy and access control policies in computer clouds are a prime concerns while talking about the sensitive data. Authorized access is ensured with the help of secret keys given to a range of valid users. Granting the role access is a trivial matter but revoking user access is tricky and compute intensive. To revoke a user and making his data access ineffective the data owner has to compute new set of keys for the rest of effective users. This situation is inappropriate where user revocation is a frequent phenomenon. Time based revocation is another way to deal this issue where key for data access expires automatically. This solution rests in a very strong assumption of time determination in advance. In this paper we have proposed a mutable encryption for oblivious data access in cloud storage where the access key becomes ineffective after defined number of threshold by the data owner. The proposed solution adds to its novelty by introducing mutable encryption while accessing the data obliviously.

Analysis on the Effects of Renewable Policies in OECD Countries Using Dynamic Panel Model (동적 패널 모형을 이용한 재생에너지 정책의 OECD 국가 재생에너지 보급 효과 분석)

  • Kim, Eunsung;Heo, Eunnyeong
    • Environmental and Resource Economics Review
    • /
    • v.25 no.2
    • /
    • pp.229-253
    • /
    • 2016
  • To achieve the socially optimum level of renewable generation, governments should design renewable policies to induce renewable technologies competitive with conventional generation technologies. And to do that, it is needed to understand how each policy has been effective in promoting renewables for power sector. In most of the literatures, there are two key limitations that they did not considered autocorrelation problem using the amount of generation from renewables as a dependent variable and technology innovation which needs to be preceded technology adoption. In this study, I try to overcome these two problems by using dynamic panel model and adding an additional variable for technology innovation. According to the result, FIT has been effective rather than RPS in promoting renewables for generation and I found the possibility that the counterintuitive results which commonly appeared in existing studies might be due to the two limitations mentioned above.

Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis (교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석)

  • Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.695-706
    • /
    • 2018
  • In recent years, industrial convergence centered on ICBM (internet of things (IoT), cloud, big data, mobile) has been experiencing rapid development in various fields such as agriculture and the financial industry. In order to prepare for cyber threats, one of the biggest problems facing the convergence industry in the future, the development of the industry must proceed in tandem with a framework of information security. In this study, we analyze the details of the current industrial development policy and related information protection policies using cross impact analysis and present policy priorities through the expert questionnaire. The aim of the study was to clarify the priorities and interrelationships within information security policy as a first step in suggesting effective policy direction. As a result, all six information security policy tasks derived from this study belong to key drivers. Considering the importance of policies, policies such as improving the constitution of the security industry and strengthening of support, training of information protection talent, and investing in the information security industry need to be implemented relatively first.