• Title/Summary/Keyword: Policy Applications

Search Result 795, Processing Time 0.028 seconds

Big Data Based Dynamic Flow Aggregation over 5G Network Slicing

  • Sun, Guolin;Mareri, Bruce;Liu, Guisong;Fang, Xiufen;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4717-4737
    • /
    • 2017
  • Today, smart grids, smart homes, smart water networks, and intelligent transportation, are infrastructure systems that connect our world more than we ever thought possible and are associated with a single concept, the Internet of Things (IoT). The number of devices connected to the IoT and hence the number of traffic flow increases continuously, as well as the emergence of new applications. Although cutting-edge hardware technology can be employed to achieve a fast implementation to handle this huge data streams, there will always be a limit on size of traffic supported by a given architecture. However, recent cloud-based big data technologies fortunately offer an ideal environment to handle this issue. Moreover, the ever-increasing high volume of traffic created on demand presents great challenges for flow management. As a solution, flow aggregation decreases the number of flows needed to be processed by the network. The previous works in the literature prove that most of aggregation strategies designed for smart grids aim at optimizing system operation performance. They consider a common identifier to aggregate traffic on each device, having its independent static aggregation policy. In this paper, we propose a dynamic approach to aggregate flows based on traffic characteristics and device preferences. Our algorithm runs on a big data platform to provide an end-to-end network visibility of flows, which performs high-speed and high-volume computations to identify the clusters of similar flows and aggregate massive number of mice flows into a few meta-flows. Compared with existing solutions, our approach dynamically aggregates large number of such small flows into fewer flows, based on traffic characteristics and access node preferences. Using this approach, we alleviate the problem of processing a large amount of micro flows, and also significantly improve the accuracy of meeting the access node QoS demands. We conducted experiments, using a dataset of up to 100,000 flows, and studied the performance of our algorithm analytically. The experimental results are presented to show the promising effectiveness and scalability of our proposed approach.

Evaluation of Managerial Efficiency in Occupational Health Service Organizations Using the Data Envelopment Analysis Method (산업보건서비스기관의 운영 효율성 분석 - 자료포락분석(DEA)기법을 이용하여 -)

  • Kim, Hee-Jeong;Shin, Eui-Chul;Kim, Jin-Hyun
    • Korean Journal of Occupational Health Nursing
    • /
    • v.11 no.2
    • /
    • pp.108-120
    • /
    • 2002
  • This study analyzed the managerial efficiency of 11 organizations, the branch centers of a occupational health service organization in Korea, using the Data Envelopment Analysis (DEA) method. The DEA is a good method for evaluating health services since it can handle multiple inputs and outputs simultaneously, and also identify the sources and amount of inefficiency. The author approached this study using two efficient models: the monetary value model and the real value model. The DEA method based on the monetary value model included cost factors, while the real value model excluded cost factors. The input variables used were manpower of physicians, medical technicians, nurses, industrial hygienists and administrators; labor, maintenance, and material expenses. The output variables used were the number of medical examinations, workplace evaluations, group health management services and income from each service. The major results were as follows: First, in the monetary value model, 6 out of 11 organizations (54.6%) showed an efficiency score of 1.0, which means that they have been operating in very efficient ways. However, 5 organizations (46.4%) showed themselves to be relatively inefficient. Second, in the real value model, 7 out of 11 organizations (63.4%) showed an efficiency score of 1.0, which means they have been operating efficiently, while 4 organizations (46.4%) showed themselves to be relatively inefficient. Third, the reliability of DEA method were analyzed by comparing the results of the monetary value model and real value model. The results of 8 out of 11 organizations were same in terms of being efficient or not. Thus, the DEA could be a valid application method for occupational health service organizations. Fourth, the organizations that displayed common inefficiency in both the monetary value model and in the real value model 3, 9, and 10, were also considered to be managed inefficiency from expertise opinion. In summary, this study evaluated the efficiency of occupational health service organizations applying the DEA method with different variables, and found that the results of analysis could be valid in terms of both modeling and expert sense. In the future, the DEA method will be used as a useful tool to identify and evaluate the efficiency of occupational health service organizations through more applications and refinements.

  • PDF

Dismantling Simulation of Nuclear Reactor Using Partial Mesh Cutting Method for 3D Model (3D 형상 모델의 부분 절단 기법을 이용한 원자로 해체 시뮬레이션)

  • Lee, Wan-Bok;Hao, Wen-Yuan;Kyung, Byung-Pyo;Ryu, Seuc-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.303-310
    • /
    • 2015
  • Game technologies are now applied in various engineering areas such as the simulation of surgical operation or the implementation of a cyber model house. One of the essential and important technology in these applications is cutting of the 3D polygon model in real time. Real-time cutting technology is an essential technology needed to implement the simulation of a building demolition or a car assembly for training or educational purpose. Previous cutting method using the conventional BSP-Tree structure has some limitations in that they divide the whole world including the 3D model and its environment, only into two parts with respect to an infinite plane. In this paper, we show a technique cutting the 3D model in a finite extent in order to solve this problem. Specifically, we restricted the cut surface in a finite rectangular area and constructed the mesh for the divided surface. To show the usefulness of our partial cutting technique, an example of the dismantling process simulation of a nuclear reactor polygon model was illustrated.

Government R&D Technology Commercialization Policy Case Study: Focusing on Technical Information Distribution (정부 R&D 지원사업의 공공 기술사업화 정책 사례연구: 기술정보 유통 확산을 중심으로)

  • Yun, Jeong-Keun;Kwon, Jae-Chul;Choi, Sun-Hee
    • Journal of Distribution Science
    • /
    • v.17 no.2
    • /
    • pp.53-69
    • /
    • 2019
  • Purpose - National scientific technology R&D investment is exceeding 60 trillion won per year, and the results of patent applications and technology transfers are visually improving. However, despite the improving research results of national R&D, the practical results of technology startups are mediocre. It is now time to expand the construction of the technology commercialization ecosystem, where the expansion of national R&D leads to the results of technology startups. Therefore, this study discussed the measures to increase the competitiveness of technology startups through the factual survey of the companies that benefitted from R&D support programs. Research design, data, and methodology - This study targeted 996 companies that benefitted from the R&D projects of the Technology Transfer Center for National R&D Programs, and deducted itemized issues through the survey replies. Survey questions were prepared to estimate the national R&D results, and the technology recognition path, the purpose of detailed introduction of the technology, investment of the commercialization fund, economic results, and the factors of success and failure were analyzed. Results - As for the recognition rate of technology during the process of corporate technology commercialization through the technology transfer, recognition through project participation showed a high response rate, and diverse implications of technology commercialization were deducted through the analysis of economic results. As for the resolution alternatives, the proliferation of technology commercialization platform that can create excellent technology for the companies in early stages and the measure of expanding the distribution of technology infrastructure were suggested. In this study, public technology commercialization strategy is established, and the innovative marketing strategy is presented. Conclusions - This study reveal that the result of creating scientific technology jobs should be deducted, in order to produce the revolutionary results of job creation by suggesting the success models of technology commercialization based on domestic scientific technology. In particular, even though the support systems for public research results are being diversely suggested, accurate studies on their actual conditions are currently lacking. Therefore, this study suggest realistic political alternatives to assure results in the process of public technology commercialization, by examining the current state of public research results of R&D support institutions and diagnosing the issues.

The Study on the Achievement of University-Industrial Collaboration in Science and Technology field (과학기술분야 산학협력의 성과에 관한 연구)

  • Han, Chan-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.340-349
    • /
    • 2017
  • The purpose of this study was to analyze achievements in industry - academia cooperation and to draw policy implications. To accomplish this, I analyzed the achievements of industry - academia cooperation in a timely manner. Research shows that the total research fund of universities has (consistently)increased, and the intellectual property rights in various fields have increased. Domestic patents are the most successful, and design and trademarks have significantly increased. Second, as the number of patent applications increases, the required research funding per piece has decreased, and the productivity has increased significantly. In addition, the number of technology patents exceeded 4 per 1 billion won of research funding. The third transfer period of technology started in earnest following the establishment of the Industry-University Cooperation Act in 2003, and has shown positive results. A recent trend, however, has been a tendency that the technology fee per technology transfer has been declining. It is necessary to evaluate the industry-university cooperation system and improve the performance of the technical fee. In addition, it is necessary to increase research funding not only in science and technology, but also in the humanities and social sciences.

Health Management Experiences of Adolescents with Severe Congenital Heart Disease (중증 선천성 심장병 청소년의 건강관리 경험)

  • Hwang, Ji-Hye;Chae, Sun-Mi
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.659-671
    • /
    • 2020
  • Severe congenital heart disease (CHD) is a chronic disease requiring continuous and holistic health management to improve patients' quality of life. This study explored the health management experiences of adolescents with severe CHDs in Korea. On the basis of in-depth interviews with nine youths, four categories and 12 subcategories were identified. The participants lacked a full understanding of their health status and the need for appropriate health management for their health status. Nonetheless, they practiced health management to some extent, in ways that were affected by heart function, self-identity, and social support. Although adolescents with severe CHDs were affected by physical limitations and the discriminatory gaze around them, they tried to achieve normalcy through managing information, seeking homogeneity with peers, and fostering positive acceptance about their disease. Regarding demands for health management programs, disease knowledge and mental health content were preferred, and the preferred delivery methods were self-help group camps and smartphone applications. Based on the results of this study, we suggest a health management intervention to promote a healthy transition to adulthood for adolescents with severe CHDs, and that policy-makers should consider measures that would enable a successful transition to adulthood in the future of youth with severe CHDs.

Priority- and Budget-Based Protocol Processing Using The Bottom-Half Mechanism for End-to-End QoS Support (종단간 QoS 지원을 위해 Bottom-half 메커니즘을 이용한 우선순위 및 예산 기반의 네트워크 프로토콜 처리)

  • Kim, Ji-Min;Ryu, Min-Soo
    • The KIPS Transactions:PartA
    • /
    • v.16A no.3
    • /
    • pp.189-198
    • /
    • 2009
  • The traditional interrupt-based protocol processing at end hosts has two priority-inversion problems. First, low-priority packets may interrupt and delay high-priority process executionssince interrupts have the highest priority in most operating systems. Second, low-priority packet may delay high priority packets when they arrive almost simultaneously since interrupt processing is performed in a FCFS (first come, first served) order. These problems can be solved by a priority-based protocol processing policy and implementation. However, general priority-based schemes commonly have the problem of starvation and cannot support the each network flow requiring the mutually exclusive QoS since the packets are processed in the FCFS order. Therefore, the priority-based schemes are not appropriate for different QoS-demanding applications. In this paper, we present a bottom-half-based approach that relies on priority- and budget-based processing. The proposed approach allows us to solve both the starvation and priority-inversion problems, and further enables effective QoS isolation between different network connections. This feature also enables bounding the protocol processing time at an end host. We finally show through experiments that the proposed approach achieves QoS isolation and control.

A Study on Applicable Methods of Web 2.0 into the National Geographic Information Systems (웹 2.0을 국토지리정보체계에 적용하는 방안 모색)

  • Lee, Chong-Soo;Lee, Woo-Kyun;Jeon, Seong-Woo
    • Journal of Environmental Policy
    • /
    • v.7 no.1
    • /
    • pp.81-100
    • /
    • 2008
  • This paper reviewed the main characteristics of Web 2.0 and discussed the possible applications related to National Geographic Information Systems. In general, Web 2.0 refers to a next generation World Wide Web environment that let people participate and share information and data. The recent examples using Web 2.0 with geo-spatial information are convincing us apply Web 2.0 into National Geographic Information Systems. In order to imply Web 2.0 into National Geographic Information Systems, we should consider not only technological advancements related to providing the services but also shifting the relationship between information provider(government agencies) and end-users. In other words, new platform should be provided to users so that users can easily create, share, and mash-up data, which was previously managed and owned only by government agencies. Successful integration Web 2.0 platform into National Geographic Information Systems require some important points such that; 1) the consideration for the data should be changed from closed and agency owned data to opened and shared data. 2) data standards should be established to integrate all data from different sources. 3) real change need to be happened rather than different naming on the same system.

  • PDF

Review on the Theory of Nursing Client Advocacy and Its Applications in Child Healthcare (간호대상자옹호이론의 발전전망과 아동간호에의 적용방안)

  • Cho, Kap-Chul
    • Child Health Nursing Research
    • /
    • v.19 no.3
    • /
    • pp.149-158
    • /
    • 2013
  • Since 1990, descriptive studies about the concept of client advocacy have been published in the health journals. However, empirical studies of the concept are still lacking. There are not enough bases to apply the concept of client advocacy in nursing practice. The purpose of this paper is to encourage empirical research about client advocacy by clarification of the concept and to discusses application of the theory in child healthcare. The literature was reviewed that empirical studies on client advocacy conducted after the year 2000. The changing trends in the client advocacy concept was examined; it was changed from the philosophical concept to nursing action and changed from individual advocacy to collective advocacy, with the rise of the self advocacy concept. The research trends on client advocacy evolves from descriptive study to quasi-experimental study and instrument development study, with diversification and expansion of research methods, advocates, clients and settings. The advocacy role of the nurse in child healthcare is significant due to the child's lack of self determination ability. In ill child care, the application of individual advocacy is potent, while in healthy child care, collective advocacy, policy advocacy, and social advocacy is effective.

The Dynamic Group Authentication for P2P based Mobile Commerce (P2P 기반의 모바일 상거래를 위한 동적 그룹 인증)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.335-341
    • /
    • 2014
  • To play the networked video contents in a client's mobile device in real time, the contents should be delivered to it by the contents server with streaming technology. Generally, in a server-client based commerce model, the server is in charge of both the authentication of the paid customer and distribution of the contents. The drawback of it is that if the customers' requests go on growing rapidly, the service quality would be degraded results from the problems of overloaded server or restricted network bandwidth. On the contrary, in P2P based networks, more and more the demand for service increasing, the service quality is upgraded since a customer can act as a server. But, in the P2P based network, there are too many servers to manage, it's possible to distribute illegal contents because the P2P protocol cannot control distributed servers. Thus, it's not suitable for commercial purposes. In this paper, the dymanic group authentication scheme is proposed which is suited to P2P based applications. The proposed scheme consists of group based key generation, key update, signature generation and verification protocols. It can control the seeder's state whether the seeder is joining or leaving the network, and it can be applied to hybrid P2P based commerce model where sales transactions are covered by the index server and the contents are distributed by the P2P protocol.