• Title/Summary/Keyword: policy information model

Search Result 2,155, Processing Time 0.029 seconds

Performance Improvement of Soft Real-Time Scheduler in OSF/1 (OSF/1 기반 SRT 스케쥴러의 성능 향상)

  • Lee, Seung-Ho;Heu, Shin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.246-254
    • /
    • 1997
  • This paper proposes an improved scheduling model and algorithm which threads in the fixed-priority policy have faster response time and turnaround time than existing ones in SRT system. Sub run queue is added into the system and is used for the quick execution and aging of threads in the fixed-priority policy. Using simulation two method are compared. The results shows that the new scheduling model gets threads in the fixed-priority policy to run faster than existing ones.

  • PDF

BoxBroker: A Policy-Driven Framework for Optimizing Storage Service Federation

  • Heinsen, Rene;Lopez, Cindy;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.340-367
    • /
    • 2018
  • Storage services integration can be done for achieving high availability, improving data access performance and scalability while preventing vendor lock-in. However, multiple services environment management and interoperability have become a critical issue as a result of service architectures and communication interfaces heterogeneity. Storage federation model provides the integration of multiple heterogeneous and self-sufficient storage systems with a single control point and automated decision making about data distribution. In order to integrate diverse heterogeneous storage services into a single storage pool, we are proposing a storage service federation framework named BoxBroker. Moreover, an automated decision model based on a policy-driven data distribution algorithm and a service evaluation method is proposed enabling BoxBroker to make optimal decisions. Finally, a demonstration of our proposal capabilities is presented and discussed.

The Impacts of the Number of Suppliers on Inventory Management in a Make-to-order Manufacturer (공급업체 수가 주문 생산 제조 기업의 재고 관리에 미치는 영향 분석)

  • Kim, Eun-Gab
    • IE interfaces
    • /
    • v.23 no.4
    • /
    • pp.327-336
    • /
    • 2010
  • We consider a supply chain consisting of a make-to-order manufacturer and N component suppliers and study the impacts of the number of suppliers on component inventory management. The manufacturer has full information and continuously observes the state of both component inventory level and customer backorders. Based on this information, the manufacturer determines whether or not to place a component purchasing order to a supplier among N suppliers even though some orders are in process by other suppliers. The goal of this paper is to numerically identify the manufacturer's purchasing policy which minimizes the total supply chain cost and the best choice of N. Our model contributes to the current literature in that the problem of simultaneously considering multiple outstanding orders and incorporating order setup cost into the model has not been covered yet. From numerical experiment, we investigate how much the policy with N suppliers can contribute to reducing the supply cost compared to the policy with a single supplier.

Developing a Basic Framework for the Korean National Collection Policy (국가장서개발정책 기본모형 연구)

  • Chang, Hye-Rhan;Hong, Hyun-Jin;Noh, Young-Hee;Oh, Eui-Kyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.4
    • /
    • pp.193-215
    • /
    • 2009
  • A more sophisticated library collection policy is required due to the changing information environment. Both traditional resources and diversified networked information resources are increasing continuously. The National Library of Korea should construct a systematic collection development policy in order to fulfill its mission. The purpose of this study is to develop a basic framework that is intended to improve the coverage of national collection. Examining previous studies and the national collection development policies of major advanced countries, a model consisting of four sub-models has been proposed. It includes hybrid collection, cooperative linking collection, collection evaluation, and a collection policy statement. Details of the sub-models and strategies are described.

A Study on the Advanced Policy Directions of the U-Echo City Implementation (U-Echo City 구축(構築)의 고도화(高度化) 정책방안(政策方案) 연구(硏究))

  • Oh, Jong-Woo;Oh, Sung-Hoon
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.325-332
    • /
    • 2007
  • The purpose of this study is to get a politic advanced idea to operate a pro-environment based u-city through the overcome problems on the construction policy for the even areal distribution, and the development for the model structure of the high level. Advanced pro-environmental ubiquitous urban construction becomes an example of the practical level linked by the national agenda as uKorea policy. The Idea of the national land informal ion systems transforms to enhance or to guide the national strategic industry to implement balanced development as grand objectives of the national land due to the factor that 'the economic development 5 years plan' altered to 'the national land 5 years plan'. Therefore, ubiquitous echo city construct ion becomes realized as static spatial informal ion construct ion and dynamic mobile based ubiquitous lives operable by the information infrastructure and IT839 policy items operation. For the synergy effects through this task, it requires a strong empowerment of the information industries and a new growing core engine of the national economy through the policy of the mutual satisfaction on the spat io-temporal information and the pro-environment information systems.

  • PDF

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

Social Welfare Analysis of Policy-based Finance with Support for Corporate Loan Interest

  • NAM, CHANGWOO
    • KDI Journal of Economic Policy
    • /
    • v.43 no.4
    • /
    • pp.45-67
    • /
    • 2021
  • We analyze the social welfare effect when a policy-based financial system (PFS) enters a decentralized financial market. Particularly, the PFS in this case supports the interest spread for corporate loans held by firms with heterogeneous bankruptcy decisions under an imperfect information structure. Although support for capital costs through the PFS expands the economy consistently, the optimal level of PFS out of the corporate loan market is estimated to be 8.6% by a simulation model considering social welfare adjusted by the disutility of labor. This result is much lower than the recent level of PFS in the Korean financial sector.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

A Naive Bayesian-based Model of the Opponent's Policy for Efficient Multiagent Reinforcement Learning (효율적인 멀티 에이전트 강화 학습을 위한 나이브 베이지만 기반 상대 정책 모델)

  • Kwon, Ki-Duk
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.165-177
    • /
    • 2008
  • An important issue in Multiagent reinforcement learning is how an agent should learn its optimal policy in a dynamic environment where there exist other agents able to influence its own performance. Most previous works for Multiagent reinforcement learning tend to apply single-agent reinforcement learning techniques without any extensions or require some unrealistic assumptions even though they use explicit models of other agents. In this paper, a Naive Bayesian based policy model of the opponent agent is introduced and then the Multiagent reinforcement learning method using this model is explained. Unlike previous works, the proposed Multiagent reinforcement learning method utilizes the Naive Bayesian based policy model, not the Q function model of the opponent agent. Moreover, this learning method can improve learning efficiency by using a simpler one than other richer but time-consuming policy models such as Finite State Machines(FSM) and Markov chains. In this paper, the Cat and Mouse game is introduced as an adversarial Multiagent environment. And then effectiveness of the proposed Naive Bayesian based policy model is analyzed through experiments using this game as test-bed.

  • PDF

Based on the Analysis of Entrepreneurship Support Policy Information, Establishment of Customized Entrepreneurship Promotion Model for Sports Major

  • Byung-Kwan Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.165-175
    • /
    • 2024
  • In this paper, the purpose of this study was to analyze various information related to the government's youth entrepreneurship support policy, propose a customized entrepreneurship promotion strategy for college students majoring in sports, and increase their entrepreneurship efficacy. Through this, the aim was to increase the entrepreneurship efficacy of sports majors. Firstly, a literature study was conducted, and secondly, alternatives for promoting entrepreneurship among college students majoring in sports were analyzed based on expert interviews. Therefore, the following suggestions were made. 1. Recognizing the added value and individuality of the sports field in startup policy. 2. Creation of a start-up network and platform for sports majors to start a business. 3. Sports start-up space composition. 4. Organizing and supporting start-up clubs. 5. Activating entrepreneurship education and competitions in capstone design and employment seminar subjects. 6. Increasing start-up efficacy through start-up mentoring.