• Title/Summary/Keyword: 에이전트 기반 모델

Search Result 371, Processing Time 0.026 seconds

Reuse of Analysis/Design patterns Based on Analogy (Analogy를 기반으로 한 분석/설계 패턴의 재사용)

  • Kim, Jeong-A;Kim, Haeng-Gon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.916-931
    • /
    • 1999
  • Code reuse in software reuse has several limitations such as difficulties of understanding and retrieval of the reuse code written by other developers. To overcome these problems, it should be possible to reuse the analysis/design information than source code itself. In this paper, we present analogical matching techniques for the reuse of object models and patterns. We have suggested the design patterns as reusable components and the representation techniques to store them. The contents of the paper is as follows.1. analogical matching functions to retrieve analogous components from reusable libraries. 2. the representation of reusable components to be stored in the library in order to support the analogical matching. 3. the design library with more semantic informations about domains. 4. the analogical matching agent with a user-friendly interface that can retrieve the analogous components from the library based on analogical matching techniques.

  • PDF

Mobile RFID Service QoS, Security Model (모바일 RFID 서비스를 위한 QoS 및 보안 모델)

  • Kim Mar-Ie;Lee Yong-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5C
    • /
    • pp.562-567
    • /
    • 2006
  • This paper extends Diameter AAA Protocol to provide secure communication channels between Mobile RFID Service Components and distinct service based on user's QoS level authorization. This paper supposes 900MHz, which is the target RF for Mobile RFID Forum and supposes RFID phone, which equitted with RFID reader. By using extended Diameter AAA server, user is authenticated, authorized and provided dynamic security associations between Mobile RFID Service components. The types of security associations are as followings:between RFID tag and RFID reader, between RFID reader(phone) and MobileRFID Service Agent, between phone and OIS, between phone and OTS and between phone and Accounting/Financial server.

A study of comparative of evacuation time by platform type according to the propagation speed of smoke in subway platform fire (지하철 승강장 화재시 연기의 전파속도에 따른 승강장 형태별 피난시간 비교·분석 연구)

  • Kim, Jin-Su;Rie, Dong-Ho
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.19 no.4
    • /
    • pp.577-588
    • /
    • 2017
  • There are many constraints, both economically and ethically that experimenting human evacuation behavior in situations such as fire. Therefore, the evacuation behavior is simulated based on the existing studies. In recent years, the foundation has been established as computer performance advances, models closer to reality can be studied. In this study, the evacuation time in the subway platform was analyzed from modeling human behavior and smoke propagation in a fire. The evacuation efficiency was also examined by dividing the shape of the subway station platform by the stair position and comparing the evacuation times for each platform. As a result, it was found that the side platform was longer than the island platform by 36.82% more time to evacuation. The shape of the stairs is most advantageous in terms of evacuation form side type platform was 210 seconds and island type platform was 186 seconds, when a fire occurs in the center of the platform. And most favorable in location of evacuation stairs were located at 2/5 point and 4/5 from depending on the step location.

Performance Modeling of Resource Reservation Cost in Wireless/Mobile Networks (무선 이동 망 환경에서 자원 예약 비용 성능 모델링)

  • Won, Jeong-Jae;Lee, Hyong-Woo;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.4C
    • /
    • pp.433-441
    • /
    • 2003
  • We propose a new resource reservation scheme called MC-HMRSVP(Mobile clustering based-Hierarchical mobile ReSource reserVation Protcol) that is an extension of HMRSVP[3,4]. MC-HMRSVP always establishes a virtual cluster called Mobile Cluster, which includes its immediately adjacent MA(Mobile Agent) for passive reservation as well as the current MA for active reservation to which MH(Mobile Host) belongs. Our scheme also establishes the MC regardless of intra/inter region movement by GMA(Gateway Mobile Agent) function when a MH moves. To provide a general formulation on analyzing the performance in terms of reservation cost, we also model the resource reservation cost by using a simple recursive equation. Then, we show that our scheme decreases the reservation cost in comparison with the existing HMRSVP extentions.

Design Mobility Agent Module for Healthcare Application Service (헬스케어 응용 서비스를 위한 Mobility Agent 모듈 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.378-384
    • /
    • 2008
  • The sensor network for the health care application service has the man or movable object as the main sensing object. In order to support inter-node interaction by the movement of such sensing objects, the node's dynamic function modification, dynamic self-configuration and energy efficiency must be considered. In this paper, the Agilla model which supports the dynamic function modification through the agent migration between nodes and LEACH protocol which guarantees the dynamic self-configuration and energy efficiency through the configuration of inter-node hierarchical cluster configuration are analyzed. Based on the results of the analysis, the Mobility Agent Middleware which supports the dynamic function modification between nodes is designed, and LEACH_Mobile protocol which guarantees the node nobility as the weakness of the existing LEACH protocol is suggested. Also, the routing module which supports the LEACH_Mobile protocol is designed and the interface for conjunction with Mobility Agent Middleware is designed. Then, it is definitely increase performance which un mobility node of transfer data rate through LEACH_Mobile protocol of simulation result.

A Study on the Development of Adversarial Simulator for Network Vulnerability Analysis Based on Reinforcement Learning (강화학습 기반 네트워크 취약점 분석을 위한 적대적 시뮬레이터 개발 연구)

  • Jeongyoon Kim; Jongyoul Park;Sang Ho Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.21-29
    • /
    • 2024
  • With the development of ICT and network, security management of IT infrastructure that has grown in size is becoming very difficult. Many companies and public institutions are having difficulty managing system and network security. In addition, as the complexity of hardware and software grows, it is becoming almost impossible for a person to manage all security. Therefore, AI is essential for network security management. However, since it is very dangerous to operate an attack model in a real network environment, cybersecurity emulation research was conducted through reinforcement learning by implementing a real-life network environment. To this end, this study applied reinforcement learning to the network environment, and as the learning progressed, the agent accurately identified the vulnerability of the network. When a network vulnerability is detected through AI, automated customized response becomes possible.

Dynamic Polling Algorithm Based on Line Utilization Prediction (선로 이용률 예측 기반의 동적 폴링 기법)

  • Jo, Gang-Hong;An, Seong-Jin;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.489-496
    • /
    • 2002
  • This study proposes a new polling algorithm allowing dynamic change in polling period based on line utilization prediction. Polling is the most important function in network monitoring, but excessive polling data causes rather serious congestion conditions of network when network is In congestion. Therefore, existing multiple polling algorithms decided network congestion or load of agent with previously performed polling Round Trip Time or line utilization, chanced polling period, and controlled polling traffic. But, this algorithm is to change the polling period based on the previous polling and does not reflect network conditions in the current time to be polled. A algorithm proposed in this study is to predict whether polling traffic exceeds threshold of line utilization on polling path based on the past data and to change the polling period with the prediction. In this study, utilization of each line configuring network was predicted with AR model and violation of threshold was presented in probability. In addition, suitability was evaluated by applying the proposed dynamic polling algorithm based on line utilization prediction to the actual network, reasonable level of threshold for line utilization and the violation probability of threshold were decided by experiment. Performance of this algorithm was maximized with these processes.

A Study on Developing the Enhancement Method for the Reusability of GIS Component (GIS 컴포넌트의 재사용성 향상을 위한 기법 개발 연구)

  • 조윤원;조명희
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2004.03a
    • /
    • pp.599-605
    • /
    • 2004
  • 기존의 구축된 GIS 컴포넌트 혹은 개발 중이거나 향후개발을 목표로 설계단계에 있는 컴포넌트들의 최종 목표는 재사용성과 상호운용성의 가능성 여부이다. 하지만 컴포넌트 개발에 있어 시스템 개발환경의 다양성으로 인하여 그 재활용성은 생각만큼 쉬운 작업이 아니며, 특히 공간정보를 다루고 있는 GIS(Geographic Information System)분야에서의 GIS 컴포넌트 재활용은 전 세계의 산재한 각 데이터형의 포맷, 개발 환경, 운영환경을 고려하여 볼 때 시급한 일임에도 불구하고 그에 대한 노력이 상당히 미진한 실 정 이 다. 본 논문에서는 GIS 애플리케이션을 보다 효율적이고 유용하게 개발하기 위하여 GIS 컴포넌트의 개발과 관리에 이르는 전 과정을 관리 감독할 수 있는 COGIS(Component Oriented Geographic Information System)을 제안하고, COGIS 프로세스의 가이드라인이며 GIS 컴포넌트의 기능적인 면을 정의하기 위한 GCA(GIS based Component Architecture) 아키텍처를 제안하였다. 아울러 GIS 컴포넌트의 메타데이터를 분류 및 정의하여 GIS 컴포넌트의 비 기능적면을 제시하고 이를 이용하여 웹 기반 GIS 컴포넌트 등록/검색 에이전트 시스템을 개발하였으며 기존 GIS 컴포넌트 재사용 및 확장, 신규 컴포넌트의 등록, 검색이 가능하도록 한다. 사례연구로 웹 상에서 산불 발생 위험지수 표출을 위한 GIS 공간 분포도 작성이 쉽게 이루어지도록 2FDRV.avx와 2FDRC.exe 컴포넌트를 개발하였으며, COGIS 프로세스의 컴포넌트 관리방법을 통하여 여러 관련 컴포넌트를 조합함으로써 웹 기반 산불위험지수예보시스템을 구축하였다.입력 근거의 확보’, ‘갱신주체별 역할의 정의 및 유지관리 기준의 설정’, ‘분야별업무 특성을 고려한 관련 기준의 마련 및 타 시스템과 연계되는 항목을 고려한 절차 정의’ 등에 대한 다양한 접근을 시도하였다. 본 연구에서 제시하는 유지관리 모델을 기반으로 각 지자체별로 적절한 컨설팅이 진행되고 이에 따라 담당자의 실천이 이루어진다면 지자체 GIS의 투자대비 효과에 대한 기대는 이상이 아닌 현실로 다가오게 될 것이다.가오게 될 것이다. 동일하게 25%의 소유권을 가지고 있다. ?스굴 시추사업은 2008년까지 수행될 계획이며, 시추작업은 2005년까지 완료될 계획이다. 연구 진행과 관련하여, 공동연구의 명분을 높이고 분석의 효율성을 높이기 위해서 시료채취 및 기초자료 획득은 4개국의 연구원이 모여 공동으로 수행한 후의 결과물을 서로 공유하고, 자세한 전문분야 연구는 각 국의 대표기관이 독립적으로 수행하는 방식을 택하였다 ?스굴에 대한 제1차 시추작업은 2004년 3월 말에 실시하였다. 시추작업 결과, 약 80m의 시추 코아가 성공적으로 회수되어 현재 러시아 이르쿠츠크 지구화학연구소에 보관중이다. 이 시추코아는 2004년 8월 중순경에 4개국 연구팀원들에 의해 공동으로 기재된 후에 분할될 계획이다. 분할된 시료는 국내로 운반되어 다양한 전문분야별 연구에 이용될 것이다. 한편, 제2차 시추작업은 2004년 12월에서 2005년 2월 사이에 실시될 계획이다. 수백만년에 이르는 장기간에 걸쳐 지구환경변화 기록이 보존되어 있는 ?스굴호에 대한 시추사업은 후기 신생대 동안 유라시아 대륙 중부에서 일어난 지구환경 및 기후변화를 이해함과 동시에 이러한 변화가 육상생태계 및 지표지질환경에 미친 영향을 이해하는데 크게 기여할 것이다.

  • PDF

Proximal Policy Optimization Reinforcement Learning based Optimal Path Planning Study of Surion Agent against Enemy Air Defense Threats (근접 정책 최적화 기반의 적 대공 방어 위협하 수리온 에이전트의 최적 기동경로 도출 연구)

  • Jae-Hwan Kim;Jong-Hwan Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.33 no.2
    • /
    • pp.37-44
    • /
    • 2024
  • The Korean Helicopter Development Program has successfully introduced the Surion helicopter, a versatile multi-domain operational aircraft that replaces the aging UH-1 and 500MD helicopters. Specifically designed for maneuverability, the Surion plays a crucial role in low-altitude tactical maneuvers for personnel transportation and specific missions, emphasizing the helicopter's survivability. Despite the significance of its low-altitude tactical maneuver capability, there is a notable gap in research focusing on multi-mission tactical maneuvers that consider the risk factors associated with deploying the Surion in the presence of enemy air defenses. This study addresses this gap by exploring a method to enhance the Surion's low-altitude maneuvering paths, incorporating information about enemy air defenses. Leveraging the Proximal Policy Optimization (PPO) algorithm, a reinforcement learning-based approach, the research aims to optimize the helicopter's path planning. Visualized experiments were conducted using a Surion model implemented in the Unity environment and ML-Agents library. The proposed method resulted in a rapid and stable policy convergence for generating optimal maneuvering paths for the Surion. The experiments, based on two key criteria, "operation time" and "minimum damage," revealed distinct optimal paths. This divergence suggests the potential for effective tactical maneuvers in low-altitude situations, considering the risk factors associated with enemy air defenses. Importantly, the Surion's capability for remote control in all directions enhances its adaptability in complex operational environments.

Geospatial Analysis and Modeling in Korea: A Literature Review (한국의 지리공간분석 및 모델링 연구)

  • Lee, Sang-Il;Kim, Kam-Young
    • Journal of the Korean Geographical Society
    • /
    • v.47 no.4
    • /
    • pp.606-624
    • /
    • 2012
  • The main objective of this paper is to provide an adequate and comprehensive review of what has been done in South Korea in the field of geospatial analysis and modeling. This review focuses on spatial data analysis and spatial statistics, spatial optimization, and geosimulation among various aspects of the field. It is recognized that geospatial analysis and modeling in South Korea got through the initial stage during the 1990s when computer and analytical cartography and GIS were introduced, moved to the growth stage during the first decade of the $21^{st}$ century when there was a surge of relevant researches, and now is heading for its maturity stage. In spatial data analysis and spatial statistics, various topics have been addressed for spatial point pattern data, areal data, geostatistical data, and spatial interaction data. In spatial optimization, modeling and applications related to facility location problems, districting problems, and routing problems have been mostly researched. Finally, in geosimulation, while most of research has focused on cellular automata, studies on agent-based model and simulation are in beginning stage. Among all these works, some have fostered methodological advances beyond simple applications of the standard techniques.

  • PDF