• Title/Summary/Keyword: Policy Applications

Search Result 806, Processing Time 0.03 seconds

Digital Health in Southeast Asia: Startups and Digital Technology Applications

  • Hoe, Siu Loon
    • Asian Journal of Innovation and Policy
    • /
    • v.11 no.2
    • /
    • pp.183-201
    • /
    • 2022
  • The purpose of this article is to provide preliminary findings on the state of digital technology applications of startups in Southeast Asia and to discuss issues related to digital health adoption in the region. This exploratory study is based on an empirical analysis of startups and digital technology applications information from various publicly available website databases. Public and private organizations would benefit from a better understanding of the current state of digital technology applications provided by startups and the challenges faced in digital health adoption. This article contributes to the existing literature by offering an overview of startups and digital technology applications in the digital health space in the fast-growing region of Southeast Asia. It offers advice to organizations intending to pursue healthtech initiatives on the types of health services provided by startups and issues that need to be addressed to increase the adoption rate.

A Verified Formal Specification of A Secured Communication Method For Smart Card Applications

  • Kim, Donald D.
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.172-187
    • /
    • 2021
  • In remote villages without access to modern IT technology, simple devices such as smartcards can be used to carry out business transactions. These devices typically store multiple business applications from multiple vendors. Although devices must prevent malicious or accidental security breaches among the applications, a secure communication channel between two applications from different vendors is often required. In this paper, first, we propose a method of establishing secure communication channels between applications in embedded operating systems that run on multi-applet smart cards. Second, we enforce the high assurance using an intransitive noninterference security policy. Thirdly, we formalize the method through the Z language and create the formal specification of the proposed secure system. Finally, we verify its correctness using Rushby's unwinding theorem.

Some Recent Results of Approximation Algorithms for Markov Games and their Applications

  • 장형수
    • Proceedings of the Korean Society of Computational and Applied Mathematics Conference
    • /
    • 2003.09a
    • /
    • pp.15-15
    • /
    • 2003
  • We provide some recent results of approximation algorithms for solving Markov Games and discuss their applications to problems that arise in Computer Science. We consider a receding horizon approach as an approximate solution to two-person zero-sum Markov games with an infinite horizon discounted cost criterion. We present error bounds from the optimal equilibrium value of the game when both players take “correlated” receding horizon policies that are based on exact or approximate solutions of receding finite horizon subgames. Motivated by the worst-case optimal control of queueing systems by Altman, we then analyze error bounds when the minimizer plays the (approximate) receding horizon control and the maximizer plays the worst case policy. We give two heuristic examples of the approximate receding horizon control. We extend “parallel rollout” and “hindsight optimization” into the Markov game setting within the framework of the approximate receding horizon approach and analyze their performances. From the parallel rollout approach, the minimizing player seeks to combine dynamically multiple heuristic policies in a set to improve the performances of all of the heuristic policies simultaneously under the guess that the maximizing player has chosen a fixed worst-case policy. Given $\varepsilon$>0, we give the value of the receding horizon which guarantees that the parallel rollout policy with the horizon played by the minimizer “dominates” any heuristic policy in the set by $\varepsilon$, From the hindsight optimization approach, the minimizing player makes a decision based on his expected optimal hindsight performance over a finite horizon. We finally discuss practical implementations of the receding horizon approaches via simulation and applications.

  • PDF

Block Replacement Policy by Multiple Choice with Used Items

  • Jeong, Hai-Sung
    • Communications for Statistical Applications and Methods
    • /
    • v.6 no.2
    • /
    • pp.403-412
    • /
    • 1999
  • A block replacement policy where at failure the item is either replaced by a new or used item or remains inactive until the next planned replacement is considered. in this paper our interests are focused on reusing all the used items created by the policy. Numerical results for the case where the underlying life distribution is gamma are obtained.

  • PDF

On Optimal Burn-in and Maintenance Policy

  • Na, Myung Hwan;Son, Young Nam
    • Communications for Statistical Applications and Methods
    • /
    • v.9 no.3
    • /
    • pp.865-870
    • /
    • 2002
  • Burn-in is a widely used method to eliminate the initial failures. Preventive maintenance policy such as age replacement is often used in field operation. In this paper burn-in and maintenance policy are taken into consideration at the same time. The properties of the corresponding optimal burn-in times and optimal maintenance policy are discussed.

An Integrated RFID Service Management Policy Infromation Model (통합 RFID 서비스 관리 정책 모델)

  • Ahn, Hyung-Jin;Bang, Hyo-Chan;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.177-187
    • /
    • 2009
  • Typical RFID-device applications have provided users to each vendor-specific interface for supporting control and management of RF-tags and readers within their managed domain. Also, typical RFID-business applications have been implemented by using each event-data structure of RF-readers or RFID middlewares. RFID infrastructure managers, thus, are difficult to handle individual control and management specifications for managed RF-tags, devices and systems. Most RFID application services, also, are attached to providing visibility and traceability of an RF-tag item. To solve these problems, this paper proposes an RFID service management policy information model which supports to define unified control and management for heterogeneous RFID devices, middlewares and applications. This paper describes an example procedure that an RFID service management policy definition based on the proposed model is adaptively transformed and executed on a specific RFID sub-infrastructure.

  • PDF

Patent Analysis for Aquaculture (수산 증·양식 분야에 대한 특허 분석)

  • Oh, Jung-Han;Kim, Min-Ju
    • The Journal of Fisheries Business Administration
    • /
    • v.45 no.2
    • /
    • pp.1-13
    • /
    • 2014
  • This study analyzes patent trends regarding farming-related technologies such as breeding or nursery technology, production systems, and new cultivation methods in order to provide objective patent information about the trends of R&D on marine products' proliferation or farming. Presently, in Korea, we try to secure marine living resources through the formation of artificial resources instead of environmental improvement policy or resource management policy. However, this is not about eliminating the causes of marine environment destruction but just the policy for improvement, so it is needed to revise the related policy with more ultimate measures. And it is necessary to develop technology that can secure the rights by integrating patent application strategies from the stage of R&D for medicine that can be utilized in chief farming countries and provide intensive support for the research centering around strategic varieties for farming in each region as well as strategic national farming varieties afterwards. Also, the analysis shows that it is urgent to make applications overseas based on domestic applications in order to develop technology that can be commercialized in not just Korean but overseas market as well.

Factors Influencing Use of Smartphone Applications for Healthcare Self-Management: An Extended Technology Acceptance Model

  • Jo, Heui-Sug;Jung, Su-Mi
    • Korean Journal of Health Education and Promotion
    • /
    • v.31 no.4
    • /
    • pp.25-36
    • /
    • 2014
  • Objectives: The self-management of chronic diseases is currently receiving much attention. This study applied an extended technology acceptance model (ETAM) to analyze the factors influencing acceptance of a healthcare smartphone application. Methods: Three hundred people living in Seoul and Gyeonggi who used smartphones were quota sampled. A telephone survey was conducted using a structured questionnaire based on ETAM. A path analysis was carried out using the AMOS 17.0 program, and the model was verified. Results: The analysis revealed significant factors of perceived usefulness (.374, p < .001), enjoyment (.210, p < .001), subjective norms (.168, p < .001), perceived costs (.146, p < .001), and innovativeness (.138, p < .001). Cost directly influenced intention to use health applications; self-efficacy and perceived ease of use indirectly affected intention through innovation and perceived usefulness. Conclusions: This study helped to identify the main factors that influence usage intention of smartphone applications. These findings could contribute to promoting the self-management of chronic disease through future health applications using smartphones.

Functional Requirements to Increase Acceptance of M-Learning Applications among University Students in the Kingdom of Saudi Arabia (KSA)

  • Badwelan, Alaa;Bahaddad, Adel A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.21-39
    • /
    • 2021
  • The acceptance of smartphone applications in the learning field is one of the most significant challenges for higher education institutions in Saudi Arabia. These institutions serve large and varied sectors of society and have a tremendous impact on the knowledge gained by student segments at various ages. M-learning is of great importance because it provides access to learning through a wide range of mobile networks and allows students to learn at any time and in any place. There is a lack of quality requirements for M-learning applications in Saudi societies partly because of mandates for high levels of privacy and gender segregation in education (Garg, 2013; Sarrab et al., 2014). According to the Saudi Arabian education ministry policy, gender segregation in education reflects the country's religious and traditional values (Ministry of Education, 2013, No. 155). The opportunity of many applications would help the Saudi target audience more easily accept M-learning applications and expand their knowledge while maintaining government policy related to religious values and gender segregation in the educational environment. In addition, students can share information through the online framework without breaking religious restrictions. This study uses a quantitative perspective to focus on defining the technical aspects and learning requirements for distributing knowledge among students within the digital environment. Additionally, the framework of the unified theory of acceptance and use of technology (UTAUT) is used to modify new constructs, called application quality requirements, that consist of quality requirements for systems, information, and interfaces.

Characterizing Memory References for Smartphone Applications and Its Implications

  • Lee, Soyoon;Bahn, Hyokyung
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.2
    • /
    • pp.223-231
    • /
    • 2015
  • As smartphones support a variety of applications and their memory demand keeps increasing, the design of an efficient memory management policy is becoming increasingly important. Meanwhile, as nonvolatile memory (NVM) technologies such as PCM and STT-MRAM have emerged as new memory media of smartphones, characterizing memory references for NVM-based smartphone memory systems is needed. For the deep understanding of memory access features in smartphones, this paper performs comprehensive analysis of memory references for various smartphone applications. We first analyze the temporal locality and frequency of memory reference behaviors to quantify the effects of the two properties with respect to the re-reference likelihood of pages. We also analyze the skewed popularity of memory references and model it as a Zipf-like distribution. We expect that the result of this study will be a good guidance to design an efficient memory management policy for future smartphones.