• Title/Summary/Keyword: Policy Applications

Search Result 792, Processing Time 0.024 seconds

Policy Directions for an Effective Establishment of the Applications of the Information Infrastructure (정보화 응용서비스의 효율적 구축을 위한 정책방향)

  • 현창희
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 1998.05a
    • /
    • pp.17-17
    • /
    • 1998
  • As the environment of the info-telecommunications policy is rapidly changing, the issue of promoting the informatization is emerging as a primary one of a government. In this sense, it is getting more recognized that, the informatization strategies centering on network-building should be interconnected with the issues of promoting the applications. Since the strategies to promote the informatization would necessarily result in the development, supply, and usage of the applications, needed are the consideration of policy directions to develop, supply, and use the applications effectively and of desirable policy means to carry them out. This study analyses the policies, which were related the issue of promoting the national informatization. And, this study also proposes the useful policy directions for an effective establishment of the applications in order to promote the national informatization.

  • PDF

A Smartphone Swapping Policy that Considers the Characteristics of Applications and Memory Situations (앱의 특성과 메모리 상황을 고려하는 스마트폰 스와핑 정책)

  • Hyokyung Bahn;Jisun Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.13-18
    • /
    • 2023
  • As the number of mobile applications increases rapidly, the overhead of swapping in smartphone memory systems keeps increasing. Unlike desktop or server systems, the basic setting of smartphones does not support swapping, so applications are killed when available memory is exhausted. This is because swapping in smartphones incurs excessive storage I/O overhead. In this article, we propose a swapping policy for smartphones, which significantly reduces storage I/Os. The proposed policy categorizes mobile applications based on their functional characteristics, and controls the number of applications to be swapped based on application priorities and memory situations. Measurement experiments with Android reference devices show that the proposed swapping policy dramatically reduces the overhead of swapping in various mobile applications.

Case Study for RFID Applications from Business Model Perspective (RFID 응용 사례 연구 : 비즈니스 모델 관점)

  • Joung, Seok-In;Kim, Dae Shik
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.1
    • /
    • pp.197-216
    • /
    • 2013
  • Despite the vast potential opportunities of RFID technology in various industrial applications, deployment of RFID applications is rather limited to meet a large industrial demand in Korea. We conducted in-depth case study to organize the RFID applications in business model framework in order to provide practical insights for the development of innovative RFID applications. Throughout extensive searching for RFID applications in literature, web, news, and policy reports, we first classified passive RFID applications, mobile RFID applications, and active RFID applications. Value creation and implementation issues are compared and analyzed for each of RFID applications using Afuah and Tucci business model. This study can contribute in establishing future development of RFID technology, competitive business strategy, and government policy to stimulate Korea RFID industry.

A Queue Policy for Multimedia Communications

  • Jeong, Seong-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.129-132
    • /
    • 2002
  • To support UDP-based real-time multimedia applications over the Internet, it is necessary to provide a certain amount of bandwidth within the network so that the performance of the applications will not be seriously affected during periods of congestion. Since the flow rates of some of these applications do not back of during periods of congestion, it is also necessary to protect flow-controlled TCP flows from unresponsive or aggressive UDP flows. To achieve these goals, we propose a simple queue policy to support multimedia applications, called threshold-based queue management (TBQM). TBQM isolates UDP flows efficiently from TCP flows to protect TCP flows while supporting bandwidth requirements of UDP applications that require QoS. In addition, TBQM supports drop fairness between TCP flows without maintaining per-flow state. We also present some experimental results to show that the proposed queue policy can work well.

  • PDF

Recent trends of smart applications and implications for digital policy (스마트 어플리케이션 동향과 디지털 정책 시사점)

  • Han, Hyun-Soo;Woo, Jeong-Ah
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.1-10
    • /
    • 2012
  • In this paper, we review recently emerging smart applications, and analyzed policy implications in light of digital convergence perspective. While extant literatures on smart applications mainly dealt with consumer behaviors based in technology acceptance model or innovation adoption, the research on digital management policy is rather limited. We intend to fill this research gap. As such, we first organize two categories of smart work and smart commerce, and investigate the representative service models, four service models were reviewed for each category respectively. Next, the three policy related constructs are extracted, which are QoL(Quality of Life), public impacts in both the positive and negative ways. Finally, empirical analysis following the Delphi principle was conducted to investigate the policy implications. The results offer useful insights for the further research in digital convergence related policy areas.

xPMP : UML-based High-Level Modeling of Policy-Driven Management Applications (xPMP - 정책 기반 관리 어플리케이션의 상위 단계 모델링)

  • Tran, Doan Thanh;Choi, Eun-Mi
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.209-218
    • /
    • 2008
  • The Unified Modeling Language becomes popular to specify, visualize, construct, and document software-intensive systems, especially in supporting the design phase of software engineering. Most of designs in UML have focused on firm designing of software system structure. Recently, some researches have raised additional demands in many emerging complex software systems, such as aspect-oriented design. In this paper, we work on the dynamic aspect of policy-driven architecture. We present a UML-based high-level modeling of policy-driven management which is applicable in various application domains. In order to manage a number of activities of applications, dynamics and flexibility should be supported with policies consistently on different resources in the same context. Thus, a methodology of meta-modeling to represent dynamic aspects of policy-driven architecture is studied. Based on our methodology, we could achieve meta-modeling to develop a number of policy-driven management applications.

  • PDF

An Access Control System for Ubiquitous Computing based on Context Awareness (상황 인식 기반의 유비쿼터스 컴퓨팅을 위한 접근 제어 시스템)

  • Lee, Ji-Yeon;Ahn, Joon-Seon;Doh, Kyung-Goo;Chang, Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.35-44
    • /
    • 2008
  • It is important to manage access control for secure ubiquitous applications. In this paper, we present an access-control system for executing policy file which includes access control rules. We implemented Context-aware Access Control Manager(CACM) based on Java Context-Awareness Framework(JCAF) which provides infrastructure and API for creating context-aware applications. CACM controls accesses to method call based on the access control rules in the policy file. We also implemented a support tool to help programmers modify incorrect access control rules using static analysis information, and a simulator for simulating ubiquitous applications. We describe simulation results for several ubiquitous applications.

Silver ICT Trends and Policy Implications (실버ICT 동향과 정책적 시사점)

  • Han, Hyun-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.4_spc
    • /
    • pp.501-516
    • /
    • 2014
  • Rapidly shifting to aging population is a global trend, and one of the challenging issue for the government, business and welfare perspective. In this paper, we focus on application potentials of information and communication technologies, to capture the insights for effectively coping with population aging issue. As the research for silver ICT field is rather limited, we adopt case study research method to extract policy implications and related foundation research agenda. As such, we first investigated comprehensive up-to-date trends, cases for innovative ICT applications, and policy initiatives mainly from the works of OECD nations. With reference to the review findings, we propose policy implications and guidelines for ICT innovations which contributes better quality of life and continuing job opportunities for silver population. The results provides insights for government policy initiative and further research in silver ICT area.

A Network Management Architecture Using XML-based PIB (XML기반 PIB를 이용한 네트워크 관리구조)

  • 윤권섭;홍충선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.414-426
    • /
    • 2003
  • XML is being used to describe components and applications in a vendor and language neutral. Therefore it already has a role in distributed system. XML is also being used as a data interchange format between components and applications in loosely coupled large-scale application. Until now, policy is described for specific applications and devices. Its use has been very limited. In current network management system, we can only invoke predefined operations and actions using policy-based network management. The main motivation for the recent interests in policy-based networks is to support dynamic adaptability of behavior by changing policy without recoding or stopping system. For these reasons we present the use of the XML for describing the policy and PIB(Policy Information Base) in COPS-PR. It improves flexibility and interoperability among heterogeneous network systems. It also can add new functionality into network components. In this paper, we propose a dynamically extensible network management architecture using XML-based PIB.

TF-CPABE: An efficient and secure data communication with policy updating in wireless body area networks

  • Chandrasekaran, Balaji;Balakrishnan, Ramadoss;Nogami, Yasuyuki
    • ETRI Journal
    • /
    • v.41 no.4
    • /
    • pp.465-472
    • /
    • 2019
  • The major challenge in wireless body area networks (WBAN) is setting up a protected communication between data consumers and a body area network controller while meeting the security and privacy requirements. This paper proposes efficient and secure data communication in WBANs using a Twofish symmetric algorithm and ciphertext-policy attribute-based encryption with constant size ciphertext; in addition, the proposed scheme incorporates policy updating to update access policies. To the best of the author's knowledge, policy updating in WBAN has not been studied in earlier works. The proposed scheme is evaluated in terms of message size, energy consumption, and computation cost, and the results are compared with those of existing schemes. The result shows that the proposed method can achieve higher efficiency than conventional methods.