• Title/Summary/Keyword: information priority

Search Result 2,401, Processing Time 0.036 seconds

The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System (아제르바이잔 정보시스템에 대한 사이버보안 정책과 전략의 실행모델 구축)

  • Aliyeva, Leyla Mehdi;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.23-31
    • /
    • 2019
  • This study aims to build an AHP model that evaluates the priority of cyber security policies for the Azerbaijan information system. For this, 4 factors were constructed from components of ITU National Interest Model, whereas 5 alternatives were based on the best practices of the eight developed countries leading the cyber security field. Using the questionnaire, 24 security experts evaluated the strategic priority of such factors or alternatives. The analysis results using the AHP software showed that homeland defense and economic well-being were the dominant aspects of cyber security policy, whereas capacity building and infrastructure were the main concern of cyber security elements for Azerbaijan. This study presents the strategic priority of cyber security policies that can be adopted by Azerbaijan government. This study can contribute to developing the national cyber security guide of Azerbaijan.

Priority Analysis for Applying Digital Technology to Improve the Efficiency of Building Supervision Work (건축감리 업무의 효율성 제고를 위한 디지털 기술 적용 우선순위 분석)

  • Kim, Chang-Won;Yoo, Wi Sung;Lim, Hyunsu
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.1
    • /
    • pp.93-102
    • /
    • 2023
  • Building supervision can be defined as a major task that involves managing and supervising the construction process to support the creation of high-quality results. To successfully perform supervision work, it is necessary to collect various information generated in uncertain field conditions, but today, supervision is performed based on documents such as reports, so there are limitations in collecting information. In fact, it has also been reported that the recent collapse of an apartment building in Korea was caused by limitations of information communication in th supervision work. Accordingly, this study analyzed the types of digital technologies that can be used to improve the efficiency of building supervision work, and presented the prioritized application of them. Priority application was quantitatively evaluated using analytic hierarchy process on data through a survey. It is expected that the results of this study can be used as basic data to set the roadmap of digital technology for building supervision in the future.

Comparison of the Expedited Programs for Innovative Drug Development and Approval among United States, European Union, and Republic of Korea (한국, 미국, 유럽의 혁신적 의약품 개발 및 허가제도 비교 연구)

  • Jiyeon Park;Hyewon Shin;Jangik. I. Lee
    • Korean Journal of Clinical Pharmacy
    • /
    • v.34 no.1
    • /
    • pp.39-61
    • /
    • 2024
  • Background: The Food and Drug Administration (FDA), the European Medicines Agency (EMA), and the Ministry of Food and Drug Safety (MFDS) have been implementing the expedited programs that promote the innovative approval of new medications to be used for serious diseases. The authors comprehensively investigated, analyzed, and compared the regulations and guidelines associated with the expedited programs. Methods: The expedited programs for innovative drug development and approval were searched from the homepages of FDA, EMA and MFDS. The detailed information on the regulations and guidelines associated with the programs was comprehensively extracted from various electronic repositories of each regulatory authority. The information on each program was analyzed, categorized, and compared from the points of benefits, applicability with scientific rationale, application procedure, and maintenance. Results: FDA's programs include Fast Track Designation, Breakthrough Therapy Designation, Priority Review Designation, and Accelerated Approval. EMA's regulation implements PRIority MEdicines (PRIME), Accelerated Assessment, Marketing Authorization under Exceptional Circumstances (MAEC), and Conditional Marketing Authorization (CMA). MFDS has a single Expedited Program. These programs are broadly categorized into those that 1) facilitate early and proactive communication with regulatory authorities, 2) shorten the review time after submitting a marketing application, and 3) temporarily approve a marketing authorization under certain conditions. Conclusion: Each expedited program requires a different level and amount of safety and efficacy evidence to be submitted to each regulatory authority. This article will likely provide the comprehensive information on which program provides scientific and regulatory advantages to be taken for innovative medication development.

Deadline Constrained Adaptive Multilevel Scheduling System in Cloud Environment

  • Komarasamy, Dinesh;Muthuswamy, Vijayalakshmi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1302-1320
    • /
    • 2015
  • In cloud, everything can be provided as a service wherein a large number of users submit their jobs and wait for their services. hus, scheduling plays major role for providing the resources efficiently to the submitted jobs. The brainwave of the proposed ork is to improve user satisfaction, to balance the load efficiently and to bolster the resource utilization. Hence, this paper roposes an Adaptive Multilevel Scheduling System (AMSS) which will process the jobs in a multileveled fashion. The first level ontains Preprocessing Jobs with Multi-Criteria (PJMC) which will preprocess the jobs to elevate the user satisfaction and to itigate the jobs violation. In the second level, a Deadline Based Dynamic Priority Scheduler (DBDPS) is proposed which will ynamically prioritize the jobs for evading starvation. At the third level, Contest Mapping Jobs with Virtual Machine (CMJVM) is roposed that will map the job to suitable Virtual Machine (VM). In the last level, VM Scheduler is introduced in the two-tier VM rchitecture that will efficiently schedule the jobs and increase the resource utilization. These contributions will mitigate job iolations, avoid starvation, increase throughput and maximize resource utilization. Experimental results show that the performance f AMSS is better than other algorithms.

Exploring the Feasibility of Differentiating IEEE 802.15.4 Networks to Support Health-Care Systems

  • Shin, Youn-Soon;Lee, Kang-Woo;Ahn, Jong-Suk
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.132-141
    • /
    • 2011
  • IEEE 802.15.4 networks are a feasible platform candidate for connecting all health-care-related equipment dispersed across a hospital room to collect critical time-sensitive data about patient health state, such as the heart rate and blood pressure. To meet the quality of service requirements of health-care systems, this paper proposes a multi-priority queue system that differentiates between various types of frames. The effect of the proposed system on the average delay and throughput is explored herein. By employing different contention window parameters, as in IEEE 802.11e, this multi-queue system prioritizes frames on the basis of priority classes. Performance under both saturated and unsaturated traffic conditions was evaluated using a novel analytical model that comprehensively integrates two legacy models for 802.15.4 and 802.11e. To improve the accuracy, our model also accommodates the transmission retries and deferment algorithms that significantly affect the performance of IEEE 802.15.4. The multi-queue scheme is predicted to separate the average delay and throughput of two different classes by up to 48.4% and 46%, respectively, without wasting bandwidth. These outcomes imply that the multi-queue system should be employed in health-care systems for prompt allocation of synchronous channels and faster delivery of urgent information. The simulation results validate these model's predictions with a maximum deviation of 7.6%.

A Study on the Inter-Korean Cooperation for Natural Disaster Damage Reduction Using Spatial Information

  • Lee, Sunmin;Song, Taejung;Lee, Moung-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.1
    • /
    • pp.163-177
    • /
    • 2019
  • As inter-Korean relations progress, the issue of natural disasters which could directly affect the lives of the people in both Koreas, has not yet been discussed. Considering the current status of inter-Korean relations and the ongoing disaster-related damage in North Korea, it is imperative to establish a technical plan at the pan-governmental level to reduce the damage from natural disasters. The purpose of this study is to secure the Korea Peninsula against natural disasters by organizing South Korea's science and technologies related to natural disasters in order to reduce the damage, and to evaluate the applicability of said technologies. The situation of natural disasters in North Korea for 17 years has been summarized and reclassified based on eight types of natural disasters. Technologies related to natural disasters in South Korea were also investigated and reclassified. Based on the data, a priority evaluation was performed and the prioritization of technology application for each natural disaster type in North Korea was calculated through a quadrant analysis. As a result, the three major categories of high-priority technologies were classified as natural disaster monitoring with remote sensing and spatial information technology, construction of research basis and database based on geographic information system (GIS) and integrated management of complex natural disasters.

SDN-COR: An Efficient Network Coding Opportunistic Routing Method for Software-Defined Wireless Sensor Networks

  • Yifan Hu;Xiqiang Hou;Fuqiang Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1795-1816
    • /
    • 2024
  • A Software-Defined Wireless Sensor Networks (SDWSNs) architecture is firstly proposed to address the issues of inflexible architecture strategies and low scalability of traditional WSNs in this article. The SDWSNs architecture involves the design of a software-defined sensor network model and a customized controller architecture, along with an analysis of the functionalities of each management module within the controller architecture. Secondly, to tackle limited energy problem of sensor nodes, a network coding opportunistic routing method (SDN-COR) is presented based on SDWSNs. This method incorporates considerations of coding opportunities, vertical distance, and remaining energy of nodes to design a metric for encoding opportunistic routing. By combining opportunistic forwarding mechanisms, candidate forwarding sets are selected and sorted based on priority to prioritize data transmission by higher-priority nodes. Simulation results indicate that, comparing with conventional methods, this approach achieves reduction in energy consumption by an average of 21.5%, improves network throughput by 24%, and extends network lifetime by 20%.

A Study on Priority Rankings of Actions Providing Personal Information Security (개인정보의 안전성 확보조치 기준에서의 우선순위 정립에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.9-17
    • /
    • 2014
  • With the rapid development of the Internet and information technology, a company that deals with personal information does not have proper action to protect personal privacy and not take measures for the safe handling and management of personal information. It generates the case to abuse of personal information occurring frequently. In order to focus the effort to reduce damage and protect the privacy of personal information entity and enhance privacy laws based on the connection method and the processing of personal information, Korea encourages a company to follow regulation by providing certain criteria. However, in the case of items of measures standard of safety of personal information such as priority applicable criteria in accordance with the importance of itemized characteristics and the company of each individual information processing is not taken into account, and there are some difficulties to execute. Therefore, we derive criteria by law and reviewing existing literature related, the details of the measures standard of safety of personal information in this study and generate a hierarchical structure by using the KJ method for layering and quantification of the evaluation in integration of the reference item similar and the grouping. Accordingly, the weights calculated experts subject using the AHP method hierarchical structures generated in this manner, it is an object of the proposed priority for privacy and efficient more rational enterprise.

Study on Utilization of Digital Tacho Graph in Construction Machinery Information Systemm (건설기계 정보화시스템 구축을 위한 운행기록장치 활용방안)

  • Yoon, Janet;Lee, Seung-Cheol
    • Journal of Auto-vehicle Safety Association
    • /
    • v.8 no.2
    • /
    • pp.17-23
    • /
    • 2016
  • Construction of our machine "Digital Tacho Graph" toghether with development and intergrated management system information is attached under Traffic Safety Law in article submission. This machine "Digital Tach Graph" has been mandated on a priority basis. The entire machine is constructed with specialised components to collect data that can retrive basic information. To obtain the components to perfect the information to optimize the device and system.

A Flow Control Scheme based on Queue Priority (큐의 우선순위에 근거한 흐름제어방식)

  • Lee, Gwang-Jun;Son, Ji-Yeon;Son, Chang-Won
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.237-245
    • /
    • 1997
  • In this paper, a flow control mechanism is proposed which is based on the priority control between communication path of a node. In this scheme, demanding length of a data queue for any pre-defined, then each node in that path is forced to maintains buffer size under the limit by controlling priority level of the path. The communication path which requires higher bandwidth sets its demanding queue length smaller. By providing relationship between the priority of a path and length of its queue, the high bandwidth requesting path has a better chance to get high bandwidth by defining the smaller demanding queue size. And also, by forcing a path which has high flow rate to maintain small queue size in the path of the communication, the scheme keep the transmission delay of the path small. The size of the demanding queue of a path is regularly adjusted to meet the applications requirement, and the load status of the network during the life time of the communication. The priority control based on the demanding queue size is also provided in the intermediate nodes as well as the end nodes. By that the flow control can provide a quicker result than end to-end flow control, it provides better performance advantage especially for the high speed network.

  • PDF