• Title/Summary/Keyword: Policy Delay

Search Result 309, Processing Time 0.024 seconds

The Impact of COVID-19 Pandemic on Indonesia's Economy and Alternative Prospects for Untact Society

  • Lee, Kyungchan
    • SUVANNABHUMI
    • /
    • v.13 no.2
    • /
    • pp.7-35
    • /
    • 2021
  • This research is an attempt to understand the economic and social consequences that are occurring in Indonesia due to the spread of COVID-19. Indonesia, which has maintained solid economic growth since the inauguration of President Jokowi's government, is also experiencing difficulties to deal with unexpected COVID-19 pandemic as the global economic turmoil has had a very significant impact on its economy. The economic impact of COVID-19 can be felt, starting from the phenomenon of panic buying, the free fall of the stock price index, the depreciation of the Rupiah against the Dollar, sluggish activities in the processing industry, and ultimately it has an impact on slowing economic growth. Various policies and measures have been taken by the Indonesian government to minimize the negative impact caused by the COVID-19 pandemic on the economy. One such area is electronic commerce business or e-commerce that witnessed a vast increase of online and non-cash transaction amid rising voices that the country needs to prepare for the advent of a new economic system, the so-called New Normal era. The Covid-19 pandemic will temporarily slow economic growth and delay some development projects and policy initiatives as the Indonesian government diverts capital from infrastructure development to help respond to the crisis. However, the Jokowi administration's efforts for continuous reform are expected to accelerate the transition to the digital economy.

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm

  • Vamshi Krishna. K;Ganesh Reddy K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.233-262
    • /
    • 2024
  • Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.

The Scope and the Meaning of 'Time of Arrival' in Carriage of Passengers by Air : Focused on the Germanwings GmbH v. Ronny Henning, Case C-452/13 (2014). (항공여객운송에서의 지연보상과 도착시각의 의미 - EU 사법재판소 2014. 9. 14. 판결(ECLI:EU:C:2014:2141)을 중심으로 -)

  • Sur, Ji-Min
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.2
    • /
    • pp.267-290
    • /
    • 2018
  • This paper reviews and criticizes the EU Case of C-452/13, Germanwings GmbH v. Ronny Henning. Under this case, Ronny Henning later sued Lufthansa's budget carrier Germanwings after it refused to pay him 250 euros compensation for a delay he said totalled more than three hours. Germanwings, however, maintained his flight had arrived only two hours and 58 minutes behind schedule. In those circumstances, the following question to the European Court of Justice (ECJ) for a preliminary ruling: What time is relevant for the term time of arrival used in Articles 2, 5 and 7 of Regulation [No 261/2004]: (a) the time that the aircraft lands on the runway (touchdown); (b) the time that the aircraft reaches its parking position and the parking brakes are engaged or the chocks have been applied (in-block time); (c) the time that the aircraft door is opened; (d) a time defined by the parties in the context of party autonomy? ECJ says that the situation of passengers on a flight does not change substantially when their aircraft touches down on the runway at the destination airport, when that aircraft reaches its parking position and the parking brakes are engaged or when the chocks are applied, as the passengers continue to be subject, in the enclosed space in which they are sitting, to various constraints. Therefore, it is only when the passengers are permitted to leave the aircraft and the order is given to that effect to open the doors of the aircraft that the passengers may in principle resume their normal activities without being subject to those constraints. ECJ rules that it is apparent that Articles 2, 5 and 7 of Regulation No 261/2004 must be interpreted as meaning that the concept of 'arrival time', which is used to determine the length of the delay to which passengers on a flight have been subject, corresponds to the time at which at least one of the doors of the aircraft is opened, the assumption being that, at that moment, the passengers are permitted to leave the aircraft.

A Study of Domain Name Disputes Resolution with the Korea-U.S. FTA Agreement (한미자유무역협정(FTA)에 따른 도메인이름 분쟁해결의 개선방안에 관한 연구)

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.17 no.2
    • /
    • pp.167-187
    • /
    • 2007
  • As Korea has reached a free trade agreement with the United States of America, it is required to provide an appropriate procedure to ".kr" domain name disputes based on the principles established in the Uniform Domain Name Dispute Resolution Policy(UDRP). Currently, Internet address Dispute Resolution Committee(IDRC) established under Article 16 of the Act on Internet Address Resources provides the dispute resolution proceedings to resolve ".kr" domain name disputes. While the IDRC's proceeding is similar to the UDRP administrative proceeding in procedural aspects, the Domain Name Dispute Mediation Policy that is established by the IDRC and that applies to disputes involving ".kr" domain names is very different from the UDRP for generic Top Level Domain (gTLD) in substantial aspects. Under the Korea-U.S. Free Trade Agreement(KORUS FTA), it is expected that either the Domain Name Dispute Mediation Policy to be amended to adopt the UDRP or the IDRC to examine the Domain Name Dispute Mediation Policy in order to harmonize it with the principles established in the UDRP. It is a common practice of cybersquatters to warehouse a number of domain names without any active use of these domain names after their registration. The Domain Name Dispute Mediation Policy provides that the complainant may request to transfer or delete the registration of the disputed domain name if the registrant registered, holds or uses the disputed domain name in bad faith. This provision lifts the complainant's burden of proof to show the respondent's bad faith because the complainant is only required to prove one of the three bad faiths which are registration in bad faith, holding in bad faith, or use in bad faith. The aforementioned resolution procedure is different from the UDRP regime which requires the complainant, in compliance with paragraph 4(b) of the UDRP, to prove that the disputed domain name has been registered in bad faith and is being used in bad faith. Therefore, the complainant carries heavy burden of proof under the UDRP. The IDRC should deny the complaint if the respondent has legitimate rights or interests in the domain names. Under the UDRP, the complainant must show that the respondent has no rights or legitimate interests in the disputed domain name. The UDRP sets out three illustrative circumstances, any one of which if proved by the respondent, shall be evidence of the respondent's rights to or legitimate interests in the domain name. As the Domain Name Dispute Mediation Policy provides only a general provision regarding the respondent's legitimate rights or interests, the respondent can be placed in a very week foundation to be protected under the Policy. It is therefore recommended for the IDRC to adopt the three UDRP circumstances to guide how the respondent can demonstrate his/her legitimate rights or interests in the disputed domain name. In accordance with the KORUS FTA, the Korean Government is required to provide online publication to a reliable and accurate database of contact information concerning domain name registrants. Cybersquatters often provide inaccurate contact information or willfully conceal their identity to avoid objection by trademark owners. It may cause unnecessary and unwarranted delay of the administrative proceedings. The respondent may loss the opportunity to assert his/her rights or legitimate interests in the domain name due to inability to submit the response effectively and timely. The respondent could breach a registration agreement with a registrar which requires the registrant to submit and update accurate contact information. The respondent who is reluctant to disclose his/her contact information on the Internet citing for privacy rights and protection. This is however debatable as the respondent may use the proxy registration service provided by the registrar to protect the respondent's privacy.

  • PDF

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

Priority- and Budget-Based Protocol Processing Using The Bottom-Half Mechanism for End-to-End QoS Support (종단간 QoS 지원을 위해 Bottom-half 메커니즘을 이용한 우선순위 및 예산 기반의 네트워크 프로토콜 처리)

  • Kim, Ji-Min;Ryu, Min-Soo
    • The KIPS Transactions:PartA
    • /
    • v.16A no.3
    • /
    • pp.189-198
    • /
    • 2009
  • The traditional interrupt-based protocol processing at end hosts has two priority-inversion problems. First, low-priority packets may interrupt and delay high-priority process executionssince interrupts have the highest priority in most operating systems. Second, low-priority packet may delay high priority packets when they arrive almost simultaneously since interrupt processing is performed in a FCFS (first come, first served) order. These problems can be solved by a priority-based protocol processing policy and implementation. However, general priority-based schemes commonly have the problem of starvation and cannot support the each network flow requiring the mutually exclusive QoS since the packets are processed in the FCFS order. Therefore, the priority-based schemes are not appropriate for different QoS-demanding applications. In this paper, we present a bottom-half-based approach that relies on priority- and budget-based processing. The proposed approach allows us to solve both the starvation and priority-inversion problems, and further enables effective QoS isolation between different network connections. This feature also enables bounding the protocol processing time at an end host. We finally show through experiments that the proposed approach achieves QoS isolation and control.

A Study on Interconnectioned LAN of Token Ring Network (토큰링 네트워크가 상호 연결된 근거리 통신망에 관한 연구)

  • 이상훈;김경식;강준길
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1206-1218
    • /
    • 1992
  • Token ring systems which control to switch the data stream of networks by passing the token have been widely used to medium access controls in many ring or bus topology LANs. The system could be modeled for analysis as single-server-multi-queue system of the cyclic service method. These concepts could be expanded to multi-token ring systems interconnected with single ring consisting of bridges implemented simply to be stored and transmitted. In the proposal for the performance analysis of the interconnected token ring system, in has been assumed M/G/1 queueing model that frame arrivals are the Poisson process at each station queue and frame sizes are independently and identically distributed. And the average time delays were analyzed mathematically for arbitrary frame transferred from source station to destination area. The time delay of the frame transmission could be explained as the sum of the average time which the token passed from arbitrary position to source station, such as the waiting time in the source station transferring the previous arrival frames, and the propagation time from source station to interdestinated point. These delays were given as the sum of the duration from inner and outer bridge queues, the time delays from inner and outer bridge queues, and the time from outer bridge queue to destination station. These results were investigated by varing parameters effected to total time delays. In the results, those factors to be effected to dominant the total time delays were increased were in the cases of the high arrival rates and the high ration of destination of the other outerring. The system were shown the time delays increased exponentially in spite of the priority service policy. In order to decreasing the number of outerrings and increasing the number of nodes in backbone relatively, so the systems could be decreased the total delay in the interconnected token ring system.

  • PDF

Design and Analsis of a high speed switching system with two priority (두개의 우선 순위를 가지는 고속 스윗칭 시스템의 설계 및 성능 분석)

  • Hong, Yo-Hun;Choe, Jin-Sik;Jeon, Mun-Seok
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.793-805
    • /
    • 2001
  • In the recent priority system, high-priority packet will be served first and low-priority packet will be served when there isn\`t any high-priority packet in the system. By the way, even high-priority packet can be blocked by HOL (Head of Line) contention in the input queueing System. Therefore, the whole switching performance can be improved by serving low-priority packet even though high-priority packet is blocked. In this paper, we study the performance of preemptive priority in an input queueing switch for high speed switch system. The analysis of this switching system is taken into account of the influence of priority scheduling and the window scheme for head-of-line contention. We derive queue length distribution, delay and maximum throughput for the switching system based on these control schemes. Because of the service dependencies between inputs, an exact analysis of this switching system is intractable. Consequently, we provide an approximate analysis based on some independence assumption and the flow conservation rule. We use an equivalent queueing system to estimate the service capability seen by each input. In case of the preemptive priority policy without considering a window scheme, we extend the approximation technique used by Chen and Guerin [1] to obtain more accurate results. Moreover, we also propose newly a window scheme that is appropriate for the preemptive priority switching system in view of implementation and operation. It can improve the total system throughput and delay performance of low priority packets. We also analyze this window scheme using an equivalent queueing system and compare the performance results with that without the window scheme. Numerical results are compared with simulations.

  • PDF

Mathematical Modeling of the Novel Influenza A (H1N1) Virus and Evaluation of the Epidemic Response Strategies in the Republic of Korea (수학적 모델을 이용한 신종인플루엔자 환자 예측 및 대응 전략 평가)

  • Suh, Min-A;Lee, Jee-Hyun;Chi, Hye-Jin;Kim, Young-Keun;Kang, Dae-Yong;Hur, Nam-Wook;Ha, Kyung-Hwa;Lee, Dong-Han;Kim, Chang-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.43 no.2
    • /
    • pp.109-116
    • /
    • 2010
  • Objectives: The pandemic of novel influenza A (H1N1) virus has required decision-makers to act in the face of the substantial uncertainties. In this study, we evaluated the potential impact of the pandemic response strategies in the Republic of Korea using a mathematical model. Methods: We developed a deterministic model of a pandemic (H1N1) 2009 in a structured population using the demographic data from the Korean population and the epidemiological feature of the pandemic (H1N1) 2009. To estimate the parameter values for the deterministic model, we used the available data from the previous studies on pandemic influenza. The pandemic response strategies of the Republic of Korea for novel influenza A (H1N1) virus such as school closure, mass vaccination (70% of population in 30 days), and a policy for anti-viral drug (treatment or prophylaxis) were applied to the deterministic model. Results: The effect of two-week school closure on the attack rate was low regardless of the timing of the intervention. The earlier vaccination showed the effect of greater delays in reaching the peak of outbreaks. When it was no vaccination, vaccination at initiation of outbreak, vaccination 90 days after the initiation of outbreak and vaccination at the epidemic peak point, the total number of clinical cases for 400 days were 20.8 million, 4.4 million, 4.7 million and 12.6 million, respectively. The pandemic response strategies of the Republic of Korea delayed the peak of outbreaks (about 40 days) and decreased the number of cumulative clinical cases (8 million). Conclusions: Rapid vaccination was the most important factor to control the spread of pandemic influenza, and the response strategies of the Republic of Korea were shown to delay the spread of pandemic influenza in this deterministic model.

Energy-Performance Efficient 2-Level Data Cache Architecture for Embedded System (내장형 시스템을 위한 에너지-성능 측면에서 효율적인 2-레벨 데이터 캐쉬 구조의 설계)

  • Lee, Jong-Min;Kim, Soon-Tae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.5
    • /
    • pp.292-303
    • /
    • 2010
  • On-chip cache memories play an important role in both performance and energy consumption points of view in resource-constrained embedded systems by filtering many off-chip memory accesses. We propose a 2-level data cache architecture with a low energy-delay product tailored for the embedded systems. The L1 data cache is small and direct-mapped, and employs a write-through policy. In contrast, the L2 data cache is set-associative and adopts a write-back policy. Consequently, the L1 data cache is accessed in one cycle and is able to provide high cache bandwidth while the L2 data cache is effective in reducing global miss rate. To reduce the penalty of high miss rate caused by the small L1 cache and power consumption of address generation, we propose an ECP(Early Cache hit Predictor) scheme. The ECP predicts if the L1 cache has the requested data using both fast address generation and L1 cache hit prediction. To reduce high energy cost of accessing the L2 data cache due to heavy write-through traffic from the write buffer laid between the two cache levels, we propose a one-way write scheme. From our simulation-based experiments using a cycle-accurate simulator and embedded benchmarks, the proposed 2-level data cache architecture shows average 3.6% and 50% improvements in overall system performance and the data cache energy consumption.