• Title/Summary/Keyword: 정형화된 문제

Search Result 197, Processing Time 0.026 seconds

On-line Trajectory Optimization Based on Automatic Time Warping (자동 타임 워핑에 기반한 온라인 궤적 최적화)

  • Han, Daseong;Noh, Junyong;Shin, Joseph S.
    • Journal of the Korea Computer Graphics Society
    • /
    • v.23 no.3
    • /
    • pp.105-113
    • /
    • 2017
  • This paper presents a novel on-line trajectory optimization framework based on automatic time warping, which performs the time warping of a reference motion while optimizing character motion control. Unlike existing physics-based character animation methods where sampling times for a reference motion are uniform or fixed during optimization in general, our method considers the change of sampling times on top of the dynamics of character motion in the same optimization, which allows the character to effectively respond to external pushes with optimal time warping. In order to do so, we formulate an optimal control problem which takes into account both the full-body dynamics and the change of sampling time for a reference motion, and present a model predictive control framework that produces an optimal control policy for character motion and sampling time by repeatedly solving the problem for a fixed-span time window while shifting it along the time axis. Our experimental results show the robustness of our framework to external perturbations and the effectiveness on rhythmic motion synthesis in accordance with a given piece of background music.

A Study on the Product Design Process in I-Business Environment Focusing on Development of the Internet-based Design Process - (e-비지니스환경에서의 제품디자인 프로세스에 관한 기초연구-인터넷기반의 디자인 프로세스 개발을 중심으로-)

  • 이수봉;이돈희
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.181-198
    • /
    • 2003
  • The purpose of this study is to develop a on-line design tool for effectively coping with e-Business environment, or product design process into a Cyber model for traditional manufacturers which attempts new product development under such environment. It was finally developed as a model named $\ulcorner$Design Vortal Site; e-BVDS) that was based on the structure and style of internet web site. Results of the study can be described as follows ; \circled1 e-Business is based on the Internet. All processes in the context of e-Business require models whose structure and method of use are on-line styles. \circled2 In case that a traditional manufacturing business is converted into e-Business, it is better to first consider Hybrid Model that combines resources and advantages of both such traditional and digital businesses. \circled3 The product design process appropriate for e-Business environment has to have a structure and style that ensure utilization of the process as an Internet web site, active participation by product developers and interactive communication between participants in designing and designers. \circled4 $\ulcorner$e-BDVS) makes possible the use of designers around the wend like in-house designers, overcoming lack in creativity, ideas and human resources traditional business organizations face. However, the operation of $\ulcorner$e-BDVS$\lrcorner$ requires time and budget investments in securing related elements and conditions. \circled5 Cyber designers under $\ulcorner$e-BDVS$\lrcorner$ can easily perform all design projects in cyber space. But they have some limits in playing a role as designers and they have difficulty in getting rewards if such projects completed by them are not finally accepted. \circled6 $\ulcorner$e-BDVS) ensures the rapid use of a wide range of design information and data, reception of a variety of solutions and ideas and effective design development, all of which are not possible through traditional processes. However, this process may not be suitable to be used routine process or tool. \circled7 $\ulcorner$e-BDVS$\lrcorner$ makes it possible for out-sourcing or partners businesses to overcome restrictions in time and space and improve productivity and effectiveness. But such they may have to continue off-line works that can not be treated on-line.

  • PDF

Policy Modeling for Efficient Reinforcement Learning in Adversarial Multi-Agent Environments (적대적 멀티 에이전트 환경에서 효율적인 강화 학습을 위한 정책 모델링)

  • Kwon, Ki-Duk;Kim, In-Cheol
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.3
    • /
    • pp.179-188
    • /
    • 2008
  • An important issue in multiagent reinforcement learning is how an agent should team its optimal policy through trial-and-error interactions in a dynamic environment where there exist other agents able to influence its own performance. Most previous works for multiagent reinforcement teaming tend to apply single-agent reinforcement learning techniques without any extensions or are based upon some unrealistic assumptions even though they build and use explicit models of other agents. In this paper, basic concepts that constitute the common foundation of multiagent reinforcement learning techniques are first formulated, and then, based on these concepts, previous works are compared in terms of characteristics and limitations. After that, a policy model of the opponent agent and a new multiagent reinforcement learning method using this model are introduced. Unlike previous works, the proposed multiagent reinforcement learning method utilize a policy model instead of the Q function model of the opponent agent. Moreover, this learning method can improve learning efficiency by using a simpler one than other richer but time-consuming policy models such as Finite State Machines(FSM) and Markov chains. In this paper. the Cat and Mouse game is introduced as an adversarial multiagent environment. And effectiveness of the proposed multiagent reinforcement learning method is analyzed through experiments using this game as testbed.

Design and Implementation of Assessment System for SPICE Maintenance Process (SPICE 유지보수 프로세스 심사 시스템 설계 및 구현)

  • Kwon, Young-Oh;Ko, Young-Cheol;Kim, Jin-Woen;Koo, Yeon-Seol
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.141-154
    • /
    • 2002
  • More efforts have been given to solve the problems related to computer software by process assessment. ISO/IEC 15504(SPICE) has been developed as standardized means for process assessment. The purpose of this paper is to design and implement a process assessment system which is appropriated to the Korean assessment environment based on ISO/IEC 15504. Referring documents are: IS0/1EC 15504 standardized documents, the assessment provisions of the SPICE committee in Korea, and research papers applied the existing process assessment system to real cases. Among a lot of processes, this system is designed for (ENG2). The proposed system in the paper will support the whole process of assessment, presenting the goals and end-products for each assessment step and making it possible to compose and save the product on the same screen. In determining process rating, assessors can retrieve the saved data and documents. By doing so, the system will improve reliability in process rating. The proposed system includes 7 steps of pre-assessment and 9 steps of actual assessment in order to fully prepare assessors for process assessment. And each step has been standardized to improve user-friendliness. This system is designed to provide assessors with specific details of standardized documents, the goals of the process, outcomes of implementing the process, and presentations of base practices and input/output products. Above all, the system automatically generates an assessment rating, by calculating based on input data which assessors make out. It also presents outcomes graphically.

The Study of QoS Parameter Metrics For Efficient End-to-End QoS Management (효율적인 End-to-End QoS 관리를 위한 QoS 인자 Metrics 에 관한 연구)

  • Lee, Sang-Young;Sohn, Jin-Ho;Ahn, Gae-Soon;Hwang, Sun-Ha;Chun, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.907-910
    • /
    • 2003
  • 이동통신 기술이 발전함에 따라 이동통신 네트워크를 통한 서비스들이 다양해지고, 사용자들의 수는 점점 늘어가고 있다. 또한 사용자들은 일반적으로 이동통신 서비스에 대해 유선 망과 동등한 수준의 품질을 기대한다. 그러나, 이동통신망은 유무선 통합망으로 구성되어 있으며, 이들 복잡한 구성을 갖는 네트워크에 대한 서비스 품질 보장은 유선망에 비해 훨씬 어렵다. 이의 결과로, 이동통신 서비스 네트워크의 트래픽은 과거에 비해 폭발적으로 증가하였다. 따라서, 네트워크 사업자와 서비스 제공자들은 서비스의 성능 문제에 직면하고 있으며, 네트워크 사업자나 서비스 제공자들은 효과적인 서비스 품질관리 기술을 강력하게 요구하고 있다. QoS 감시는 QoS 제공과 보장을 위한 기본적인 기술로서, 실제 네트워크에서 QoS 감시를 위해서는 네트워크 및 서비스 성능 인자들과 QoS 인자들의 관계를 식별해야 한다. 본 논문에서는 서비스와 네트워크 성능인자 그리고, QoS 인자들간의 관계를 QoS metrics로 정의하며, 각 인자들의 관계는 계층적인 그래프로 나타낸다. QoS metrics의 정의와 이에 따른 계층적 그래프의 구성을 통해 세 가지 이점을 기대 할 수 있다. 첫째, 네트워크 사업자들은 QoS 저하의 주요 원인을 신속하게 식별 할 수 있다. 둘째, 네트워크 사업자들과 서비스 제공자들은 주관적인 QoS 를 수치 적인 성능 지표를 통해 측정이 가능하다. 마지막으로, QoS metrics 는 네트워크 사업자들과 서비스 제공자들이 QoS 감시 활동의 결과에 따라 그들의 네트워크를 재구성하는 데 도움을 주며 E2E QoS 제공에 효율성을 가져다 준다.현을 정형화하기 위해 Oolong 코드의 명령어들을 문법으로 작성하였으며, PGS를 통해 생성된 어휘 정보를 가지고 스캐너를 구성하였으며, 파싱테이블을 가지고 파서를 설계하였다. 파서의 출력으로 AST가 생성되면 번역기는 AST를 탐색하면서 의미적으로 동등한 MSIL 코드를 생성하도록 시스템을 컴파일러 기법을 이용하여 모듈별로 구성하였다.적용하였다.n rate compared with conventional face recognition algorithms. 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유

  • PDF

The Aesthetic Transformation of Shadow Images and the Extended Imagination (그림자 이미지의 미학적 변용과 확장된 상상력 :디지털 실루엣 애니메이션과 최근 미디어 아트의 흐름을 중심으로)

  • Kim, Young-Ok
    • Cartoon and Animation Studies
    • /
    • s.49
    • /
    • pp.651-676
    • /
    • 2017
  • Shadow images are a representative medium and means of expression for the imagination that exists between consciousness and unconsciousness for thousands of years. Wherever light exists, people create play with their own shadows without special skills, and have made a fantasy at once. Shadow images have long been used as subjects and materials of literacy, art, philosophy, and popular culture. Especially in the field of art, people have been experimenting with visual stimulation through the uniqueness of simple silhouettes images. In the field of animation, it became to be recognized as a form of non - mainstream areas that are difficult to make. However, shadow images have been used more actively in the field of digital arts and media art. In this Environment with technologies, Various formative imaginations are being expressed more with shadow images in a new dimension. This study is to introduce and analyze these trends, the aesthetic transformations and extended methods focusing on digital silhouette animation and recent media art works using shadow images. Screen-based silhouette animation combines digital technology and new approaches that have escaped conventional methods have removed most of the elements that have been considered limitations, and these factors have become a matter of choice for the directors. Especially, in the display environment using various light sources, projection, and camera technology, shadow images were expressed with multiple-layered virtual spaces, and it becomes possible to imagine a new extended imagination. Through the computer vision, it became possible to find new gaze and spatial images and use it more flexibly. These changes have given new possibility to the use shadow images in a different way.

Metrics Measurement System Supporting Quality Evaluation of Java Program (Java 프로그램의 품질평가를 지원하는 메트릭 측정 시스템)

  • Park, Ok-Cha;Yoo, Cheol-Jung;Chang, Ok-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.2
    • /
    • pp.151-164
    • /
    • 2001
  • Java, used as the most representative object-oriented language, isil becoming the popular language for Internet/Intranet based program development. Moreover, it is used for development language in a variety of areas such as component based development language. In the view of reuse and maintenance of developed program, quality evaluation of program is becoming a more important issue. So, metrics measurement for quality evaluation of program that is developed at present including existing Java application is necessary. However, it is necessary that whether existing object-oriented software metrics is suitable on Java program is to be validated So, in this paper, we build an automated metrics measurement system that needs to validate on object-oriented software metrics and wish to support metrics measurement that is to determine it. The purpose of this system is to support a precise quality evaluation tool. In this system, we apply the metrics classified by Briand. Briand classified the metrics by formalizing mathematically them to verify feasibility of existing object-oriented software metrics. Using the proposed system, we can make comparison and analysis of validation on existing object-oriented metrics by calculating quantitative information more rapidly from Java source program. If there is any problem in feasibility of the metrics, we can establish a suitable metrics on Java program by considering reiJ,1forcement of the existing metrics or proposing new metrics.

  • PDF

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

Constitution of Work Process for Apartment Renovation Project in Design Phase (공동주택 리모델링 설계단계에서의 사업수행 프로세스 구축)

  • Kwon, Won;Chun, Jae-Youl
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.4
    • /
    • pp.167-175
    • /
    • 2007
  • A renovation project of apartment housing is generally divided into four stages: Project inquiry stage, planning and feasibility stage, design stage and construction stage. Currently, procedure and managerial technique for a remodeling project has not been systematically established so that many companies have difficulty in doing their business. In particular, the design stage in participant which a project managers, designers, residents and engineers is more complicate than the other stages in terms of roles and working procedure. The design documents can be found trial and error if it is not well managed. The insufficient design caused by lack of ability to efficiently utilize information obtained during the stage and inappropriate decision-making not only results in diverse problems in the construction stage but also makes people suspect satisfaction and reliability on the remodeling improvements. Therefore the design stage is very significant issue on the renovation project. As the consequence, the design stage of a remodeling project is so important that it should be carefully managed, and composite understanding of the process to be executed. To do this, we provide roles and responsibility of each participant in the design stage and analyze the process where information is utilized in design stage. The information is analyzed in terms of input, tool and output.

A Participatory Action Research of Social Workers on the Practice Methods for Single Parents Self-help Groups in Community Welfare Centers (지역사회복지관 한부모 자조집단 지원 실천 방안 모색을 위한 사회복지사 참여실행연구)

  • Yang, Haewon;Kim, Heesoo;Choi, Jung Sook;Kim, Sun Hwa;Kim, Eun Kyung
    • Korean Journal of Family Social Work
    • /
    • no.61
    • /
    • pp.93-136
    • /
    • 2018
  • The purpose of this study is to find specific practice methods of single parents self-help groups in community welfare centers. A participatory action research was conducted to achieve the purpose. Six social workers and three researchers participated in the study who shared the problem of lack of specific practice methods even though a self-help group was useful for self-reliance and empowerment of low-income single-parents. Various activities such as reading articles, analysis of each self-help group, case studies, and learning facilitation methods were conducted during 10 meetings. At the same time, peer supervision proceeded at each meeting. The progress of each group was shared, the application of practice methods and plans were discussed, and applying discussed methods to group practice and reviewing the process and outcomes of the practice were repeated in the peer supervison. As a result, the following positive changes appeared: First, the goals and vision of each group became clearer. Second, initiative of the members was promoted. Third, intimacy, mutual cooperation, the attatchment to the group were strengthened. A qualitative analysis was also conducted on the content discussed. As a result, 17 practice methods were derived in four themes such as initiative/ empowerment, cohesion, leadership, and destandardization. Practice issues concerning single parents self-help groups in community welfare centers were discussed based on the results.