• Title/Summary/Keyword: policy information model

Search Result 2,144, Processing Time 0.027 seconds

Optimal Inspection Period for the System Subject to Random Shocks

  • Kim, Sung-Soon;Choi, Seung-Kyoung;Lee, Eui-Yong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.4
    • /
    • pp.725-733
    • /
    • 2005
  • A system subject to random shocks is considered. The shocks arrive according to a Poisson process and the amount of each shock is exponentially distributed. In this paper, a periodic inspection policy for the system is compared with a random inspection policy. After assigning several maintenance costs to the system, we calculate and compare the long-run average costs per unit time under two policies.

  • PDF

Drop Policy Considering Performance of TCP in Optical Burst Switching Networks (Optical Burst Switching Network에서 TCP 성능을 고려한 Drop Policy)

  • 송주석;김래영;김현숙;김효진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.203-209
    • /
    • 2004
  • In OBS networks, the burst dropping due to contention significantly affects the performance of TCP, but existing drop policies have not considered this problem and researches related to TCP have been mainly studied on burst assembling. We propose the drop policy considering retransmission of TCP to improve the performance of TCP in OBS networks. The proposed drop policy is the Retransmission Count-based DP that regards retransmission count of bursts as priority when it selects dropping burst. This paper evaluates the performance of RC-based DP model and general DP model using ns-2. The metrics of performance evaluation are TCP throughput, maximum sequence number of received TCP packets and drop rate of packet as simulation time increases.

Industry 4.0 in India: A Comparative Study

  • Pinosh Kumar Hajoary
    • Asia pacific journal of information systems
    • /
    • v.31 no.3
    • /
    • pp.433-447
    • /
    • 2021
  • The purpose of this paper is to shed light on the current status of Industry 4.0 policies in India and provide holistic policy recommendations in the transition towards Industry 4.0. The study was conducted based on the content-centric review of written policy documents like policy memoranda (memos), green papers and white papers, policy briefs, policy reports, opinion pieces, and newspaper and academic publications on Industry 4.0. India lacks infrastructure, regulatory framework, architectural reference model, incentives, skills, and standard roadmap towards Industry 4.0. The current policy status and policy recommendations presented in this study can serve as a great asset for academicians, policymakers, and practitioners to prepare a holistic roadmap for Industry 4.0 policy implementation. The study is first to assess India's current policy status and compare with Germany towards Industry 4.0. Besides, it is expected to assist government policymakers in formulating tangible policy outputs and strategic roadmaps.

A Technology Diffusion Model Based on Technology Policy: The Case of Solid-State Lighting Technology Diffusion in the U.S. (정책변수를 고려한 확산모형의 연구 - 고체조명(Solid-State Lighting : SSL) 기술을 중심으로)

  • Jin, Mei-Yue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2522-2527
    • /
    • 2011
  • Technology policy has a substantial impact on the diffusion of a new technology. This paper uses technology policy as a variable in the general epidemic model to quantify the effects of the policy on technology diffusion. The results obtained in this study, using data on solid-state technology diffusion in the U.S. indicate that technology policy plays a positive role in technology diffusion and provide a firm basis for understanding the relationship between technology policy and technology diffusion through the use of quantitative data.

Analysis of the Effects of Information Security Policy Awareness, Information Security Involvement, and Compliance Behavioral Intention on Information Security behavior : Focursing on Reward and Fairness (정보보안 정책 인식과 정보보안 관여성, 준수 의도성이 정보보안 행동에 미치는 영향 분석: 보상 차원과 공정성 차원을 중심으로)

  • Hu, Sung-ho;Hwang, In-ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.91-99
    • /
    • 2020
  • The aim of this study to assess the effect of information security policy awareness, information security involvement, compliance behavioral intention on information security behavior The research method is composed of a cross-sectional design of reward and fairness. This paper focuses on the process of organizational policy on the information security compliance intention in the individual decision-making process. As a result, the reward had a significant effect on compliance behavioral intention, and it was found that influence of the psychological reward-based condition was greater than the material reward-based condition. The fairness had a significant effect on information security policy awareness, information security involvement, information security behavior, and it was found that influence of the equity-based condition was greater than the equality-based condition. The exploration model was verified as a multiple mediation model. In addition, the discussion presented the necessary research direction from the perspective of synergy by the cultural environment of individuals and organizations.

Analysis of a Maintenance·Repair Service Center Model Operating under Alternating Complementary Dyadic Policies (상호보완적인 이변수 운영정책이 교대로 적용되는 정비서비스센터 모형분석)

  • Rhee, Hahn-Kyou
    • Journal of Applied Reliability
    • /
    • v.17 no.1
    • /
    • pp.58-65
    • /
    • 2017
  • Different from general operating policies applied for various waiting line situations, two complementary dyadic operating policies are applied alternatingly to a single server maintenance service center model. That is, either of the two dyadic Min (N, T) or Max (N, T) policy is applied to operate such center first and the other operating policy should be applied later, and then the same sequence of both operating policies is followed repeatedly. This operating policy is denoted by the Minimax (N, T) policy. Purpose: Because of the newly introduced operating policy, important system characteristics of the considered service center model such as the expected busy and idle periods, the expected number of customers in the service center and so on should be derived to provide necessary information for determination of the optimal operating policy. Methods: Based on concepts of the newly introduced Minimax (N, T) policy, all necessary system characteristics should be redefined and then derived by constructing appropriate relations between complementary two dyadic operating policies. Results: Desired system characteristics are obtained successfully using simple procedures developed by utilizing peculiar structure of the Minimax (N, T) policy. Conclusion: Applying Minimax (N, T) operating policy is equivalent to applying the simple N and T operating policies alternatingly.

A Study on Security Model Design of Adaptive Access Control based Context-Aware (상황인식 기반 적응적 접근제어 보안모델 설계에 관한 연구)

  • Kim, Nam-Il;Kim, Chang-Bok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.211-219
    • /
    • 2008
  • This paper is proposed context-aware based access control, model by extending original access control model. In this paper, we survey the recent researches about security model based context-aware such as xoRBAC and CAAC. For exactly policy evaluation, we make an addition Context Broker and Finder in existing CAAC security model. By this security model, Context information and context decision information is able to be collected easily for more correct policy decision. This paper controlled access of possible every resources that is able to access by user's event and constraint from primitive access resources. In this paper proposed security model can be offer dynamically various security level and access authority method alone with specified policy and constraint adjustment at user's role.

  • PDF

A study for the refusing enforcement on Foreign Arbitral Awards - Focus on the International Public Policy - (외국중재판정의 승인거부사유에 관한 연구 -공서양속에 관한 논의를 중심으로-)

  • Park, Jong-Don
    • International Commerce and Information Review
    • /
    • v.8 no.1
    • /
    • pp.357-369
    • /
    • 2006
  • All over the country tries to clarify the content of 'Public Policy' in recognition and implementation of Foreign Arbitral Awards : it makes comments of the international consensus of Geneva Convention(1927), New York Convention(1958) and the UNCITRAL Model Law on Public Policy, and it takes a general view of domestic laws how they deal with Public policy and Foreign Arbitral Awards. Foreign Arbitral Awards should be appropriately respected and implementation by the courts of countries encourage parties in a legal procedure to refuse enforcement by invoking "Public Policy." In order to cope with such invocations, the purport of the above recommendation on Foreign Arbitral Awards should be internationally recognized and the exceptional circumstances should be restricted unless the International Court of Arbitral Awards is not established a Dr. Holtzmann/Schwebel brought forward. In this paper suggests the list of the exceptional circumstances. Korean Arbitration Law stipulates as the Civil proceeding Law did, "good morals and the social order of the Republic of Korea" as a ground for refusing enforcement of Arbitral Awards. Studies on counteraction against invocations of Public Policy to refuse enforcement of Foreign Arbitral Awards should be developed.

  • PDF

A Study On Causal Relationship between Exchange Rate and Economic Growth in Korea (한국의 환율과 경제성장과의 인과관계)

  • Choi, Bong-Ho
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.329-347
    • /
    • 2008
  • The purpose of this study is to examine the causal relationship between the exchange rate and economic growth, and to induce policy implications. In order to test whether time series data is stationary and the model is fitness or not, we put in operation unit root test, cointegration test. And we apply Granger causality based on an error correction model. The results indicate that uni-dierctional causality between exchange rate and economic growth is detected. Exchange rate impacts on economic growth, but economic growth don't impact on exchange rate. The analysis of impulse reaction function shows that the impulse of exchange rate impacts on Korean economic growth in negative direction. We can infer policy suggestion as follows: The fluctuation of exchange rate much affects economic growth, thus we must make a stable policy of exchange rate to continue economic growth.

  • PDF

A Reconfigurable Memory Allocation Model for Real-Time Linux System (Real-Time Linux 시스템을 위한 재구성 가능한 메모리 할당 모델)

  • Sihm, Jae-Hong;Jung, Suk-Yong;Kang, Bong-Jik;Choi, Kyung-Hee;Jung, Gi-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.3
    • /
    • pp.189-200
    • /
    • 2001
  • This paper proposes a memory allocation model for Real-Time Linux. The proposed model allows users to create several continuous memory regions in an application, to specify an appropriate region allocation policy for each memory region, and to request memory blocks from a necessary memory region. Instead of using single memory management module in order to support the proposed model, we adopt two-layered structure that is consisted of region allocators implementing allocation policies and a region manager controlling regions and region allocator modules. This structure separates allocation policy from allocation mechanism, thus allows system developers to implement same allocation policy using different algorithms in case of need. IN addition, it enables them to implement new allocation policy using different algorithms in case of need. In addition, it enables them to implement new allocation policy easily as long as they preserver predefined internal interfaces, to add the implemented policy into the system, and to remove unnecessary allocation policies from the system, Because the proposed model provides various allocation policies implemented previously, system builders can also reconfigure the system by just selecting most appropriate policies for a specific application without implementing these policies from scratch.

  • PDF