• Title/Summary/Keyword: Policy-based

Search Result 12,125, Processing Time 0.037 seconds

A Study on Improving Subway Crowding Based on Smart Card Data : a Focus on Early Bird Policy Alternative (교통카드 자료를 활용한 지하철 혼잡도 개선 연구 : Early Bird 정책대안을 중심으로)

  • Lee, Sang Jun;Shin, Sung Il
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.125-138
    • /
    • 2020
  • Currently, subway crowding is estimated by observing a specific point at specific hours once or twice every 1 or 2 years. Given the extensive subway network in Seoul Metropolitan Area covering 588 stations, 11 lines and 80 transfer stations as of 2017, implementing crowding mitigation policy may have its limitations due to data uncertainty. A proposal has recently been made to effectively use smart card data, which generates big data on the overall subway traffic related to an estimated 8 million passengers per day. To mitigate subway crowding, this study proposes two viable options based on data related to smart card used in Seoul Metropolitan Area. One is to create a subway passenger pattern model to accurately estimate subway crowding, while the other is to prove effectiveness of early bird policy to distribute subway demand that is concentrated at certain stations and certain time. A subway passenger pattern model was created to estimate the passenger routes based on subway terminal ID at the entrance and exit and data by hours. To that end, we propose assigning passengers at the routes similar to the shortest routes based on an assumption that passengers choose the fastest routes. In the model, passenger flow is simulated every minute, and subway crowding level by station and line at every hour is analyzed while station usage pattern is identified by depending on passenger paths. For early bird policy, highly crowded stations will be categorized based on congestion level extracted from subway passenger pattern model and viability of a policy which transfers certain traveling demands to early commuting hours in those stations will be reviewed. In particular, review will be conducted on the impact of policy implemented at certain stations on other stations and lines from subway network as a whole. Lastly, we proposed that smart card based subway passenger pattern model established through this study used in decision making process to ensure effective implementation of public transport policy.

Trends and its Policy Implications of Copayment System on Office-Based Medical Care during the Last Decade in Korea (의원 외래 본인부담정액제의 변천과 정책적 함의)

  • 김창보;이상이
    • Health Policy and Management
    • /
    • v.11 no.4
    • /
    • pp.1-20
    • /
    • 2001
  • Korean government had introduced copayment system as cost sharing to office-based medical care in order to reduce the demand for care in 1986. This review focuses on trends and characteristics of copayment on office-based medical care from 1991 to the end of Jan. 2001. Objectives of this study is ${\circled}1$ to analyse historical trends of copayment on office-based medical care during the last decade, ${\circled}2$ to analyse the effect of copayment introduced to office-based medical care on NHI finance, ${\circled}3$ to analyse the changing trends of the size of copayment in utilizing office-based medical care for the past 10 years, ${\circled}4$ to evaluate the meaning of copayment alteration implemented after the introduction of new prescription system and finally ${\circled}5$ to draw a some policy implications from the results of this review. We found that the main purpose of copayment introduction had been reduction in the expenditure of NHI finance. But, the reduction effect of insurer's expenditure has turned out to be negative and NHI finance has been in crisis after the introduction of new prescription system. Also, the copayment level of the insured has increased actually on a large scale. It seems that the introduction of new prescription system has changed the meanings and its policy implications of copayment system.

  • PDF

Philosophical Review of Korean Public Informatization Policy (우리나라 공공 정보화 정책에 대한 철학적 조망 : 가치철학을 기반으로)

  • Lee, Jae Min;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.4
    • /
    • pp.263-293
    • /
    • 2014
  • This study reviews Korean public informatization policy implemented in last 20 years from the philosophical perspective and attempts to suggest directions to be considered in the future. To accomplish the research goal, this study first analyzes literature in the relevant areas, including philosophy of value, administrative ideology, and public informatization policy. Second, based on the results of literature review, criteria to analyze the public informatization policy are established. Then, the Korean public informatization policy is analyzed based on the established criteria. Lastly, implications for planning and implementing public informatization policy are suggested. Significance of the study lies in its attempt to examine public informatization policy from the philosophical perspective. However, due to its exploratory nature, this study has limitations including less rigorous measurement instruments, limited source of data, limited number of propositions established. Therefore, further studies are needed in these areas.

Exploring the Causal Structure of Adolescent Media Addiction and Policy Intervention

  • Hwang, In Young;Park, Jeong Hun
    • International Journal of Contents
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2016
  • Adolescent media addiction has emerged as an important social agenda in Korea. However, there has not been enough discussion on the causal structure of media addiction and policy interventions. The objective of this study is to identify and assess the mechanism of the existing and the revised Shutdown policy based on the systems thinking approach. To achieve this purpose, we establish the relationship between media usage, flow, and addiction, and develop a causal loop diagram. Based on the causal loop diagram, we explore the causal structure of two policy scenarios: shutdown policy and deregulation. Our study suggests that policy interventions inducing direct parental control on children's media usage time are ineffective since the time control reduces children's autonomy, which helps alleviate media addiction. Therefore, this study suggests that policy intervention should focus on alleviating addiction itself rather than on controlling media usage time.

Design and Evaluation of an Adaptive Reservation-based Batching Polity for Popular Videos (인기 있는 비디오를 위한 적응적 예약기반 일괄처리 정책의 설계 및 평가)

  • Lee, Gyeong-Suk;Bae, In-Han
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2790-2796
    • /
    • 1999
  • In video-on-demand systems, the I.O bandwidth of video servers is the critical resource which contributes to increase in latency. Several approaches: bridging, piggybacking are used to reduce the I/O demand on the video server through sharing. Batching delays the requests for the different videos for a batching window so that more requests for the same video arriving during the current batching window may be served using the same stream. In this paper, we propose an adaptive reservation-based batching policy which dynamically reserves video server capacity for popoular videos according to video server loads. The performance of the proposed policy is evaluated through a simulation, and is compared with simple batching and static reservation-based batching policies. As the result, we know that the adaptive reservation-based batching policy more improves service ratio and average waiting time than simple batching and simple reservation-based batching policy more improves service ratio and average waiting time than simple batching and simple reservation-based batching polices.

  • PDF

An Analysis on Student Burden Double Reduction Policy in China - Based on Kingdon's Policy Stream Model (중국 의무교육단계 학생 부담경감 정책의 흐름 분석 - Kingdon의 정책흐름모형을 중심으로)

  • Xiaohui Li
    • Journal of the International Relations & Interdisciplinary Education
    • /
    • v.4 no.1
    • /
    • pp.35-56
    • /
    • 2024
  • Based on Kingdon's policy stream model, the logical mechanism of student burden double reduction policy agenda setting process in China was analyzed from three aspects: problem stream, policy stream, political stream. It was found that the direct reflection of data, the feedback and improvement of current policies constitute the problem stream.The high attention of government departments, the suggestions of CPPCC members and experts and scholars, the strong voice of schools, and the continuous voice of stakeholders constitute the policy stream. The ruling party's governing idea and educational policy, national mood and interest game during the transition period constitute the political policy stream. The three streams, coupling interaction, open the policy window, promoting the introduction of the 'double reduction' policy.

Periodic Packet Discard Policy for Frame Based Scheduler (프레임 기반 스케줄러를 위한 주기적 패킷 폐기 기법)

  • Lee, Sung-Hyung;Lee, Hyun-Jin;Cha, Jae-Ryong;Kim, Jae-Hyun;Kum, Dong-Won;Baek, Hae-Hyeon;Shin, Sang-Heon;Jun, Jehyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.2
    • /
    • pp.97-104
    • /
    • 2013
  • This paper introduces waiting time based periodic packet discard policy for frame based scheduler. This policy can be used with conventional packet discard policy or buffer management schemes, such as drop-tail or random early detection. Proposed discard policy discards packets, which are stayed in the buffer longer than threshold, at every period of scheduling. This decision of discard is based on waiting time of packet. In this paper, mathematical analysis is performed with situation of network congestion. Also, the simulation is performed to evaluate the performance of proposed discard policy. In the result, proposed discard policy can limit queuing delay by threshold. Also, if the packet discard is performed before scheduling and threshold is set with smaller value than frame length, it can limit the throughput of traffic.

Promotion of Technology-based Start-ups: TIPS Policy of Korea

  • Han, Jung-wha
    • Asian Journal of Innovation and Policy
    • /
    • v.8 no.3
    • /
    • pp.396-416
    • /
    • 2019
  • The key conditions for the promotion of innovative technology-based start-ups are expanding the market for innovative technology products and services, increasing equity-based funding opportunities, promoting the commercialization of technological innovation, and establishing a fair-trade system for start-ups to compete fairly in the market. Besides, there is a need for a support system that minimizes the cost of failure in case of business failure to facilitate re-challenge and provides education and training opportunities to enhance entrepreneurial capabilities. To activate technology-based start-ups, the Korean government introduced the TIPS policy in 2013. It is a program that creates technology start-up with private investment led by successful venture entrepreneurs, which has shown remarkable achievement and is regarded as the most successful policy in this field up to now. The most critical factor contributed to the success of this program is to invite private investors to select a technology entrepreneurship team and provide mentoring with the investment. The government provides R&D funding with matching investment, commercialization and marketing support to ensure that technology start-ups survive crossing the death-valley. Subsequent investments from domestic and abroad investors are actively made and it is becoming a representative technology-based start-up program in Korea.

Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email

  • Alhumaidi, Hind;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.212-222
    • /
    • 2022
  • There has been a rapid increase in the use of cloud email services. As a result, email encryption has become more commonplace as concerns about cloud privacy and security grow. Nevertheless, this increase in usage is creating the challenge of how to effectively be searching and filtering the encrypted emails. They are popular technologies of solving the issue of the encrypted emails searching through searchable public key encryption. However, the problem of encrypted email filtering remains to be solved. As a new approach to finding and filtering encrypted emails in the cloud, we propose a ciphertext-based encrypted policy attribute-based encryption scheme and keyword search procedure based on hidden policy ciphertext. This feature allows the user of searching using some encrypted emails keywords in the cloud as well as allowing the emails filter-based server toward filter the content of the encrypted emails, similar to the traditional email keyword filtering service. By utilizing composite order bilinear groups, a hidden policy system has been successfully demonstrated to be secure by our dual system encryption process. Proposed system can be used with other scenarios such as searching and filtering files as an applicable method.

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF