• Title/Summary/Keyword: Policy Applications

Search Result 792, Processing Time 0.023 seconds

Cross-national Analysis of Robot Research Using Non-Structured Text Analytics for R&D Policy

  • Kim, Jeong Hun;Seo, Han Sol;Lee, Jae Woong;Lee, Jung Won;Kwon, Oh Byung
    • Asia Pacific Journal of Business Review
    • /
    • v.1 no.2
    • /
    • pp.63-88
    • /
    • 2017
  • With the advent of new frontiers in robotics, the spectrum of robot research area has widened in many fields and applications. Other than conventional robot research, many technologies such as smart devices, drones, healthcare robots, and soft robots are emerging as promising applications. Due to the research complexity of this topic, this research requires international collaboration and should be fertilized by R&D policies. This paper aims to propose a method to perform a cross-national analysis of robot research with unstructured data such as papers in the proceedings of an international conference. Text analytics are applied to extract research issues and applications in an automatic manner.

A Review and Comparison between Quality Policy and Quality Strategy (품질정책과 품질전략에 관한 비교 및 고찰)

  • Chung, Kyu Suk;Hyun, Young Suk
    • Journal of Korean Society for Quality Management
    • /
    • v.43 no.3
    • /
    • pp.313-326
    • /
    • 2015
  • Purpose: The terminology of "policy" or "quality policy" is widely used in quality management areas. But few people know and use that word with the accurate concept. This paper compares the concepts and suggests the contents for quality policy and quality strategy. Methods: This paper compares the concepts between policy and strategy through the literatures and suggests the contents for quality policy and quality strategy by exploratory study. Results: This paper suggests the contents for quality policy and quality strategy which are useful to establish the quality planning in companies. Conclusion: Strategy and policy are intimately related, and so confused in applications, therefore distinguishing both concepts clearly is necessary for effective use of them. This paper will help the right use of both concepts by showing the examples.

Modeling and Simulation of Policy-based Network Security

  • Lee, Won-young;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.155-162
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. Policy-based network provides a means by which the management process can be simplified and largely automated. In this paper we build a foundation of policy-based network modeling and simulation environment. The procedure and structure for the induction of policy rules from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Base) are developed. The structure also transforms the policy rules into PCIM (Policy Core Information Model). The effect on a particular policy can be tested and analyzed through the simulation with the PCIMs and SVDB.

  • PDF

Operational Availability Under A Continuous Review Inventory Model for Logistics Support

  • Jeong, H.S.;Kwon, Y.I.
    • International Journal of Reliability and Applications
    • /
    • v.5 no.2
    • /
    • pp.75-80
    • /
    • 2004
  • Relationships between inventory policy and operational availability of military equipment maintained under a logistics support system are analyzed. A continuous review inventory model with a stochastic demand typically used in a military logistics support is considered and some numerical studies are provided.

  • PDF

Philosophical Review of Korean Public Informatization Policy (우리나라 공공 정보화 정책에 대한 철학적 조망 : 가치철학을 기반으로)

  • Lee, Jae Min;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.4
    • /
    • pp.263-293
    • /
    • 2014
  • This study reviews Korean public informatization policy implemented in last 20 years from the philosophical perspective and attempts to suggest directions to be considered in the future. To accomplish the research goal, this study first analyzes literature in the relevant areas, including philosophy of value, administrative ideology, and public informatization policy. Second, based on the results of literature review, criteria to analyze the public informatization policy are established. Then, the Korean public informatization policy is analyzed based on the established criteria. Lastly, implications for planning and implementing public informatization policy are suggested. Significance of the study lies in its attempt to examine public informatization policy from the philosophical perspective. However, due to its exploratory nature, this study has limitations including less rigorous measurement instruments, limited source of data, limited number of propositions established. Therefore, further studies are needed in these areas.

A study on the Application of Policy-Based Networking for QoS in The Defense Information System (국방정보체계의 서비스 품질(QoS) 보장을 위한 정책기반(Policy-Based)네트워킹 적용에 관한 연구)

  • 김광영;이승종
    • Journal of the military operations research society of Korea
    • /
    • v.29 no.1
    • /
    • pp.57-75
    • /
    • 2003
  • Policy-based networking offers a network manager the ability to manage the network in a holistic and dynamic fashion rather than force a network manager to manage the network by dealing with each device individually. Policy-based networking is focusing on users and applications instead of emphasizing devices and interfaces. An important part of the policy-based networking is to simplify the task of administration and management for different disciplines. The Defense Information System(DIS) of today are complex and heterogeneous systems. Operational needs are not a trivial task and Quality of Service(QoS) is not generally guaranteed. So, important data may be missed or congested by trivial data. Policy-based networking provide a way to support QoS and simplify the management of multiple devices deploying complex technologies. This paper suggest implementation of policy-based networking in DIS to improvement of performance, and implementation is progressed step by step. Especially this paper is focusing on the providing QoS with policy-based networking using Lightweight Directory Access Protocol(LDAP) Server.

A Study on the Convergence Policy of Broadcasting and Telecommunication in IPTV Convergence Service with Reference to Rent Seeking Theory (방송과 통신정책, IPTV 융합정책의 지대추구론적 분석 : 지대추구의 효율성 분석을 중심으로)

  • Lee, Sang-Ho;Kim, Jai-Beom
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.199-225
    • /
    • 2007
  • This study deals with the regulatory policy of government on the convergence of broadcasting and telecommunication by applying rent seeking theory to Internet Protocal TV (IPTV). Existing literature has mainly focused on the negative implications of rent seeking since Tullock [1967], Krueger [1974] and Buchanan [1980]. We have investigated the regulatory policy along with the progress of the convergence of broadcasting and telecommunication. Regulatory policy on broadcasting, despite its impartial intent. has created the entry barrier in the industry, resulting in high rents. Meanwhile, regulatory policy in telecommunication is more geared by the encouragement of more competitive environments, resulting in reasonably low rents in the market. Regulatory policy in the age of convergence needs to improve the efficacy of the industry and welfare, while maintaining the rent at a reasonably low level. This research has contributed to emphasizing the positive aspect of rent seeking in policy concerned with the convergence of broadcasting and telecommunication, notably IPTV.

  • PDF

Remote Integrated Management System for applying Efficient Security Policy based on Linux (리눅스 기반의 효율적인 보안 정책 적용을 위한 원격통합관리시스템)

  • 김동환;김현성
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.72-81
    • /
    • 2002
  • Management for security product and application is becoming more difficult because they became more specialized. Most of research is focused on combining policies for information security management policy, security standard, and security tools. However, there are no researches for total solution for both application and security policy. Thereby, the purpose of this research is to propose a remote integrated management system based on linux. The system could efficiently manage data update for application and policy update for a server supporting the distinct configuration of each server. By using the remote integrated management system, system manager with poor secure knowledge also could easily manage their system securely.

  • PDF

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

Optimal Inventory-Transportation Policy for the Simplified Physical Distribution System (단순화된 물적유통체계에서의 최적재고-운송정책)

  • 차동원;류춘번
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.3 no.1
    • /
    • pp.69-73
    • /
    • 1978
  • This paper deals with the problem of determining the optimal inventory-transportation policy of the idealistically simple inventory-transportation system with the following assumptions: (1) The system consists of a single central warehouse and a single local warehouse, (2) The planning horizon is finite, (3) Demand rate is fixed costant, and so forth. Developed is the algorithm by which to identify the optimal inventory policy which minimizes the total cost incurred to the system over the given finite planning horizon. A sample numerical example is presented along with a discussion of the possible applications of the approach used n the algorithm.

  • PDF