• Title/Summary/Keyword: Policy and Code

Search Result 280, Processing Time 0.026 seconds

The Paradigm Shift of Family Policy for Healthy Families in Korea : The Basic Code of Healthy Families and Healthy Families Support Center (건강가족을 위한 한국가족정책 패러다임의 전환 : 건강가정기본법과 건강가정지원센터를 중심으로)

  • Yoon, Gyung-Ja
    • Journal of Families and Better Life
    • /
    • v.26 no.4
    • /
    • pp.85-101
    • /
    • 2008
  • This paper examines the traits and directions of family policy represented in the Basic Code of Healthy Families. Strategies for the development of family policy for family professionals and policy makers to provide integrated services for families and the implications of such strategies are also discussed. A family-friendly and a life course perspective are adopted in order to strengthen and expand family policies and promote the establishment of a healthy families' support center. The perspectives and issues of the Basic Code of Healthy Families are reviewed in the light of a paradigm shift in family policy in Korea, with suggestions for adoption of the family policy also addressed.

A study of the stack allocation policy on JIT Code Generator (JIT Code Generator 상의 스택할당 정책 적용에 관한 연구)

  • 김효남
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.100-103
    • /
    • 2001
  • The best solution to improve the execution speed of Java program is to make use of the high speed JVM(Java Virtual Machine). The performance of JVM depends on the difference of its implementation. One of the technologies to enhance JVM performance is a JIT(Just-in-Time) code generator. The JIT code generator transforms Java byte code to the native machine code in accordance with computer system platform. The native machine code is faster than the existing interpreter method, since it can reduce the time to analyze the Java byte code. But the JIT code generator have the problem of increasing the traffic between stack and register because of using many register. Therefore, this paper suggests how to reduce the traffic by applying the policy of stack allocation to JIT code generation, as one of the methods to enhance the performance of JVM.

  • PDF

The Effect of the QR Code Commission Rate on Commercial Banks in China (QR코드 수수료율이 중국 상업은행에 미치는 영향)

  • Zhu, Yongjie;Jin, Shanyue
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.99-105
    • /
    • 2022
  • In China, with the rise of third-party payments such as WeChat Pay and Alipay, the traditional business of banks has been greatly affected. Banks can encourage and expand QR code payments to merchants. Therefore, it is meaningful to analyze and study the QR code work of banks. The purpose of this study is to analyze the effect of the execution of the zero-rate of the comprehensive payment QR code combined with the payment cycle and Funds Transfer Pricing (FTP) on commercial banks in China. Based on the manually collected customer data of Chinese commercial banks, this paper conducts a case analysis combined with the calculation method of financial indicators. As a result of the study, it was found that commercial banks need to continue to implement the policy as the advantages of introducing the integrated QR code fee rate 0 policy are greater than the disadvantages. This paper provides feasible suggestions on how to quickly occupy the offline payment market for commercial banks, which has guiding significance for commercial banks' marketing decisions. Presently, there are few studies on the zero-rate subsidy policy implemented by Chinese commercial banks.

RECENT DEVELOPMENTS IN EU SPACE POLICY AND LAW

  • Masson-Zwaan, Tanja
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.25 no.2
    • /
    • pp.231-247
    • /
    • 2010
  • This paper starts with a brief overview of the history of the European Space Agency and recalls some of its main features. Next, the gradual process of cooperation between ESA and the EU is outlined, leading to the creation of the Framework Agreement in 2004 and the adoption of the European Space Policy in 2007. The entry into force of the Lisbon Treaty in 2009 codified the space competence of the EU, and its implications are addressed. Lastly, some attention is paid to the issue of space security in Europe, through ESA's new SSA programme adopted in 2008, and to the relevance of the EU Council initiative for a Code of Conduct for Outer Space Activities in 2008. The paper ends with some conclusions.

  • PDF

An Efficient Repository Model for Online Software Education

  • Lee, Won Joo;Baek, Yuncheol;Yang, Byung Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.219-226
    • /
    • 2016
  • In this paper, we propose an efficient repository model for online software education. The software education of app development consists of 7 stages: coding & debugging, submit, collaboration, review, validate, deployment, certification. Proposed repository model supports all 7 stages efficiently. In the coding & debugging stage, the students repeat coding and debugging of source. In the submit stage, the output of previous process such as source codes, project, and videos, are uploaded to repository server. In the collaboration stage, other students or experts can optimize or upgrade version of source code, project, and videos stored in the repository. In the review stage, mentors can review and send feedbacks to students. In the validate stage, the specialists validate the source code, project, and the videos. In the deployment stage, the verified source code, project, and videos are deployed. In the certification stage, the source code, project, and the videos are evaluated to issue the certificate.

DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)

  • Jang, Sung-Soon;Kwan, Sung-Woo;Yoo, Ho-Sik;Kim, Jung-Soo;Yoon, Wan-Ki
    • Nuclear Engineering and Technology
    • /
    • v.41 no.5
    • /
    • pp.747-752
    • /
    • 2009
  • A vulnerability assessment is essential for the efficient operation of a physical protection system (PPS). Previous assessment codes have used a simple model called an adversary sequence diagram. In this study, the use of a two-dimensional (2D) map of a facility as a model for a PPS is suggested as an alternative approach. The analysis of a 2D model, however, consumes a lot of time. Accordingly, a generalized heuristic algorithm has been applied to address this issue. The proposed assessment method was implemented to a computer code; Systematic Analysis of physical Protection Effectiveness (SAPE). This code was applied to a variety of facilities and evaluated for feasibility by applying it to various facilities. To help upgrade a PPS, a sensitivity analysis of all protection elements along a chosen path is proposed. SAPE will help to accurately and intuitively assess a PPS.

Comparative Analysis on Korea-U.S. space policy system (한미간 우주정책 체계 비교분석)

  • HWANG, Chin Young;LEE, Joon
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.1
    • /
    • pp.1-6
    • /
    • 2021
  • U.S contains the best technology, man power, and big investment in space. It considers space as not only a science and technology related area, but also as an industry and national security related area. Korea's space policy focuses on the development of space systems such as satellites and launch vehicles. Space policy systems of the two countries are also different, causing some discrepancy in mutual interest when we talk about cooperation with the U.S. This study introduced U.S space policy framework and compared it with Korea's policy. It is meaningful in that we can find an effective way of cooperation between two countries.

A Study on History of Criminal Policy in Korea (한국(韓國)의 형사정책(刑事政策)에 관한 역사적(歷事的) 고찰(考察))

  • Kim, Hyeong-Cheong
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.1-46
    • /
    • 2003
  • During the ancient times, there was no separative judicial system and administrative , legislative and judiciary functions were ultimately concentrated in the all-powerful monarch. And the three states developed state organization , adopting hieratical structures and placing at the pinnacle . State Codes were promulgated to initiate a legal system to rule the people, these codes instituted under influence of China codes. The people tradition sees crime control as the preservation of the authority of hereditary rulers. In the period of the Koryeo dynasty, government accepted a serious of detailed penal code from Tang dynasty . Legal response to crime stressed preservation of the dynasty rather than making citizen behave according to certain rules. In the period of Early Joseon , the compilation of Grand Code for state administration was initiated, the Kyeongkuk Taejeon ,became comer stone of the dynastic administration and provided the monarchial system with a sort of constitutional law in written form. This national code was in portant means of criminal policy at that time, Late Joseon , the impact of Western culture entering through China gave further impetus to pragmatic studies which called for socio-economic reforms and readjustment. Approach to criminal justice policy emphasized more equitable operation of the criminal justice system ,rehabilitation and crime control. Korea-Japanese Treaty concluded on 22 August ,1910 and proclaim a week later ,Japan gave the coup de grace to the Korea Empire and changed the office of the Resident - General into the Government - General . Thus korean criminal policy were lost during a dark ages ,which lasted for 36 years after fall of Joseon Dynasty (the colnial period,1910${\sim}$1945). After 1945 Korea's liberation from Japanese colonial rule, the occupation of devided Korea by the United States and Soviet Union frustrated the efforts of Koreans to establish an independent government, and the transplantation of two conflicting political ideologies to south and the north of the 38th parallel further intensified the national split. U.S. military government office occupied the south of the 38 the parallel and placed emphasis on democracy of criminal policy. ln 1948, the U.S. military government handed over to the ROK government its administrative authority.

  • PDF

The Role of the Green Building Code in Achieving Sustainable Green Built Environment: the Philippines

  • Dela Cruz, John Christopher R.
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.750-753
    • /
    • 2015
  • The continuing trend of built environment set forth by the rise of modernization and industrialization has led every country in achieving their respective economic development. Along side this trend is an issue that needs to be addressed - the environmental impacts of the built industry. Construction and maintenance of buildings are said to consume 40% of the world's energy, 65% of electricity, and 40% of raw materials, creating drastic pollutants harmful not only to the environment but also to human. Figures have been released and analyzed proving the contributions of built environment with environmental depreciation. Said figures earned concerns not just from different private and non-profit organizations but also the governments of every country, thus, steps towards sustainable development are being implemented. As a response, the "green" was added in the built environment. Later on, the now emerging concept of "National Green Building Code" found its role in the policy of various states in protecting the people in accord with the nature. This paper appreciates the initiatives of various countries and non-profit organizations in their drive to pursue sustainable green built environment in general, and specifically proposes an establishment of an "incentives grant framework" as an additional legislative policy to be included in the draft of the National Green Building Code of the Philippines.

  • PDF

Performance Analysis of Differentiated Services by Classifying Traffic (트래픽 구분을 통한 차등화 서비스의 성능 분석)

  • Chun, Sang Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.10
    • /
    • pp.817-823
    • /
    • 2013
  • This paper examined the performance of differentiated services applied to each different traffic. For this purpose, we used three traffics which have a different quality of service and generate packets from a specific source to destination. To allocate a proper code point according to QoS, a common policy which is the simple policy model of time sliding window with 3 color marking (TSW3CM) was established to each traffic. To evaluate the performance, we investigate and compare code points to each traffic. Simulation results using NS-2 showed that the code points 10, 11, and 12 can be differently allocated to each traffic according to its sending rates 1Mbps, 2.5Mbps, and 4Mbps.