• Title/Summary/Keyword: Policy-Based

Search Result 12,106, Processing Time 0.035 seconds

Drop Policy Considering Performance of TCP in Optical Burst Switching Networks (Optical Burst Switching Network에서 TCP 성능을 고려한 Drop Policy)

  • 송주석;김래영;김현숙;김효진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.203-209
    • /
    • 2004
  • In OBS networks, the burst dropping due to contention significantly affects the performance of TCP, but existing drop policies have not considered this problem and researches related to TCP have been mainly studied on burst assembling. We propose the drop policy considering retransmission of TCP to improve the performance of TCP in OBS networks. The proposed drop policy is the Retransmission Count-based DP that regards retransmission count of bursts as priority when it selects dropping burst. This paper evaluates the performance of RC-based DP model and general DP model using ns-2. The metrics of performance evaluation are TCP throughput, maximum sequence number of received TCP packets and drop rate of packet as simulation time increases.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

Architecture of Policy-Based Network Management for Providing Internet Differentiated Service on Mobile IP Environment (이동 IP 환경에서 인터넷 차별화 서비스 제공을 위한 정책기반 네트워크 관리 구조)

  • 강승완;김태경;유상조
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.721-736
    • /
    • 2004
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. Today users want to be provided suitable QoS in the internet since demand of services is variety. The policy-based network management is method which can solve various problems of QoS, security, and complication of management in IP networks. This paper presents the network topology constitution, operation procedure and architecture of policy-based network management for providing internet DiffServ on mobile IP environment. In this paper we propose policy classes of policy-based DiffServ network management on mobile environment and create policy scenarios using the proposed policy description language to represent the policy classes. Finally, we implemented a policy-based DiffServ network management system on mobile IP environment.

  • PDF

Application of the hierarchical scheduling policy to FMC (FMC에 계층적 스케쥴링 전략의 적용)

  • Yeo, Yong-Kee;Lyou, Joon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.482-487
    • /
    • 1991
  • The scheduling algorithm based on the hierarchical scheduling policy is presented for the Job Shop type FMC control, and the simulation results using this hierarchical scheduling policy are with the results which are based on the heuristic scheduling policy. The results show that the hierarchical ling policy is more efficient than the heuristic scheduling policy in either case that there exist machine failures in the FMC or not.

  • PDF

An Optimal Design of Double Carousel System Under Two Class Based Assignment Policy (등급별 저장방식하에서의 이중 캐로절시스템의 최적구성)

  • Kim, Chae-Soo;Hwang, Hark
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.27 no.4
    • /
    • pp.384-393
    • /
    • 2001
  • The performance of a double carousel system depends on its design and operation strategy. The two-class based assignment policy is expected to be an appropriate storage policy for its efficient operation, since it has two independently-moved carousels, lower and upper sub-carousels. This paper conducts a comparative analysis of the effects of the two-class based assignment policy and those of randomized assignment policy on the throughput of a double carousel system. We also show that, by allowing the sub-carousels not to be equal in size, a further improvement in the throughput can be obtained.

  • PDF

Evidence-based Pharmaceutical Policy-making; A Challenging Task? Vivid Voices from Korean Experts (근거중심 의약품 정책 결정; 극복하기 어려운 과제인가? 한국 전문가의 생생한 의견)

  • Lee, Iyn-Hyang
    • Korean Journal of Clinical Pharmacy
    • /
    • v.23 no.3
    • /
    • pp.185-196
    • /
    • 2013
  • This study aims to explore the difficulties of evidence-based pharmaceutical policy-making in the Korean context where several pharmaceutical policies were introduced within a short period. Semi-structured in-depth interviews were performed with eight experts in the Korean pharmaceutical arena. The key challenge in Korean situation might be the apparent lack of available evidence caused by the limited resources, the lack of policy consistency and coordination ability in the authorities and distrust across stakeholders. To build an evidence-based tradition, it is essential to resolve the tangible lack. At once, more fundamental changes seem to be required in the intangible policy environments.

Exploratory Analysis of AI-based Policy Decision-making Implementation

  • SunYoung SHIN
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.203-214
    • /
    • 2024
  • This study seeks to provide implications for domestic-related policies through exploratory analysis research to support AI-based policy decision-making. The following should be considered when establishing an AI-based decision-making model in Korea. First, we need to understand the impact that the use of AI will have on policy and the service sector. The positive and negative impacts of AI use need to be better understood, guided by a public value perspective, and take into account the existence of different levels of governance and interests across public policy and service sectors. Second, reliability is essential for implementing innovative AI systems. In most organizations today, comprehensive AI model frameworks to enable and operationalize trust, accountability, and transparency are often insufficient or absent, with limited access to effective guidance, key practices, or government regulations. Third, the AI system is accountable. The OECD AI Principles set out five value-based principles for responsible management of trustworthy AI: inclusive growth, sustainable development and wellbeing, human-centered values and fairness values and fairness, transparency and explainability, robustness, security and safety, and accountability. Based on this, we need to build an AI-based decision-making system in Korea, and efforts should be made to build a system that can support policies by reflecting this. The limiting factor of this study is that it is an exploratory study of existing research data, and we would like to suggest future research plans by collecting opinions from experts in related fields. The expected effect of this study is analytical research on artificial intelligence-based decision-making systems, which will contribute to policy establishment and research in related fields.

The big data analysis framework of information security policy based on security incidents

  • Jeong, Seong Hoon;Kim, Huy Kang;Woo, Jiyoung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.73-81
    • /
    • 2017
  • In this paper, we propose an analysis framework to capture the trends of information security incidents and evaluate the security policy based on the incident analysis. We build a big data from news media collecting security incidents news and policy news, identify key trends in information security from this, and present an analytical method for evaluating policies from the point of view of incidents. In more specific, we propose a network-based analysis model that allows us to easily identify the trends of information security incidents and policy at a glance, and a cosine similarity measure to find important events from incidents and policy announcements.

Understanding the Evidence-Based Policy Making (EBPM) Discourse in the Making of the Master Plan of National Research (RIRN) Indonesia 2017-2045

  • Setiadarma, Eunike Gloria
    • STI Policy Review
    • /
    • v.9 no.1
    • /
    • pp.30-54
    • /
    • 2018
  • The government of Indonesia has initiated the Master Plan of National Research (RIRN) 2017-2045 as a policy umbrella of national research activity. The initiative has been in place since 2015, yet the process required a long period of coordination. And with the extensive movement of evidence-based policymaking (EBPM), there has been a call of expectation towards policymakers to accurately use scientific evidence in their policymaking process. However, the complexity of policymaking process renders the ideal notion of EBPM questionable. This research attempts to understand how the EBPM as an idea can shape the interactions of actors in the policymaking process by using the discursive institutionalism as the analytical framework. By conducting ten interviews with actors involved in the making of RIRN and close examination of the policy documents for content analysis, this research describes the institutional features of EBPM discourse in Indonesia, which are reflected in the interactions of policy actors in the policymaking process of RIRN. This research also offers descriptive and learning narratives on the role of discourse in the policymaking process.

An Analysis of the Policy Making Process of Gyeonggido Cyber Library Establishment: Based on the Policy Streams Model of Kingdon (경기도사이버도서관 설립의 정책형성과정 분석: 킹던의 정책흐름모형을 중심으로)

  • Chu, Yoonmi;Kim, Giyeong
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.3
    • /
    • pp.71-87
    • /
    • 2013
  • In this study, we analyze the agenda setting and policy making process of the establishment of Gyeonggido Cyber Library, which has played an important role for development of public libraries in Gyeonggido since its launching, based on Kingdon's policy streams model. According to the model, policy formation is described as the result from the convergence of the three streams, such as problem, policy and politics streams. When these streams converge on a specific time point, a policy window is created so that the issues become policy agenda. At this moment, policy entrepreneurs propose their alternatives, which have been prepared already, and try to pass it through the window. We identify coupling of the streams in the policy window and the role of policy entrepreneurs in the process of agenda setting and selection of alternatives of Gyeonggido Cyber Library policy. Suggestions are provided based on the analysis for public policy formation in public libraries domain.