• Title/Summary/Keyword: 효용적 정보시스템

Search Result 423, Processing Time 0.026 seconds

Analysis on BDS B1C Signal Interface (BDS B1C 신호 체계 분석)

  • Shin, Yerin;Yoo, Hoyoung
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.461-467
    • /
    • 2020
  • Most civilian positioning systems in use are based on the Global Navigation Satellite System (GNSS), which receives signals from satellites and calculates the current location. After the successful establishment of GPS from the U.S., GNSS has led to promote satellite navigation systems in various countries. Recently, China has succeeded in the radical development of its own GNSS, the BeiDou Navigation Satellite System (BDS), based on its advanced IT technology and funding power. Considering that China is rapidly expanding the service area of BDS to the world, systematic research on BDS is also required in Korea. Therefore, this paper provides overall information on B1C, the open signal of BDS, so that this information can be utilized in the design of B1C signal system and BDS B1C receiver design.

GIS Component Extraction Method (GIS 컴포넌트 추출기법)

  • Park, Tae-Og;Kim, Kye-Hyun
    • Journal of Korea Spatial Information System Society
    • /
    • v.4 no.2 s.8
    • /
    • pp.65-74
    • /
    • 2002
  • The CBD(component based development) method has recently been on the rise as the main current among all fields of developing Information Systems. The developing system by building and integrating of components is encouraged in GIS sphere. Business domain which considerably identifies components occupies GIS shpere rather then any other sphere. Arithmetic function is quite needed in GIS sphere but non-arithmetic functions are also used in GIS sphere as well as in enterprise sphere. Component is characterized by ensuring the reuse of itself. The efficiency of reusing component is promoted as the component is functionally simple and is packed to a minimum. The GIS Component Extraction Method has already been presented in several studies but this study is about the GIS Component Extraction by the Affinity Analysis Method. CBD uses UML on a basis and the core of the UML is consisted of the use case and the class. The purpose of the Affinity Analysis is a study how relate between the use case and the class in a certain business domain and then the results identify the component. The Affinity Analysis is useful not only in GIS but also in every business domain and is considered to be popular as the procedure of this method is not complex at all.

  • PDF

Analysis of Tour Information Services using Agent-based Simulation (시뮬레이션 모형을 통한 관광정보서비스 효과 분석)

  • Kim, Hyeon-Myeong;O, Jun-Seok
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.6 s.92
    • /
    • pp.103-117
    • /
    • 2006
  • This study develops an agent-based simulation model to evaluate tourist information systems under ubiquitous environment. In this study, individual tourist's activity chaining behavior is formulated as a utility maximization problem. The underlying assumption of the model is that tourists increase their activities within their time and budget constraints to maximize their utilities. The model seeks individual's optimal tour schedule by solving Prize-Collecting Multiple-Day Traveling Salesman Problem(PC MD TSP). The simulation-based evaluation framework allows investigating individual utility gains by their information type and the total expenditure at each tour attractions. The real-time tour activity scheduling system enables tourists to optimize their tour activities by minimizing their time loss and maximizing their opportunity to use high utility facilities.

Structural System Identification by Iterative IRS (반복적 IRS를 이용한 구조 시스템 식별)

  • Baek, Sung-Min;Kim, Hyun-Gi;Kim, Ki-Ook;Cho, Maeng-Hyo
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.20 no.1
    • /
    • pp.65-73
    • /
    • 2007
  • In the inverse perturbation method, enormous computational resource was required to obtain reliable results, because all unspecified DOFs were considered as unknown variables. Thus, in the present study, a reduced system method is used to condense the unspecified DOFs by using the specified DOFs, and to improve the computational efficiency as well as the solution accuracy. In most of the conventional reduction methods, transformation errors occur in the transformation matrix between the unspecified DOFs and the specified DOFs. Thus it is hard to obtain reliable and accurate solution of inverse perturbation problems by reduction methods due to the error in the transformation matrix. This numerical trouble is resolved in the present study by adopting iterative improved reduced system(IIRS) as well as by updating the transformation matrix at every step. In this reduction method, system accuracy is related to the selection of the primary DOFs and Iteration time. And both are dependent to each other So, the two level condensation method (TLCS) is selected as Selection method of primary DOFs for increasing accuracy and reducing iteration time. Finally, numerical verification results of the present iterative inverse perturbation method (IIPM) are presented.

A Study on the Sentence Generation using Lexical Information (어휘정보를 이용한 문장작성에 관한 연구)

  • 황인정;민홍기
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.3
    • /
    • pp.198-204
    • /
    • 2004
  • This study suggests a sentence generating method to help those who have language impediment with their communication. The method suggested in this study was constructed into a system in order to be applied to AAC system. AAC system is a personal portable device that generates sentences. Those who have language impediment need another communication method, causes inconvenience when used in a conversation with those who don't have the same trouble. The method of inputting both consonants and vowels can be inconvenient and time consuming for a conversational communication because of the number of the key strokes. The lexical information for the sentence generating of this study defines the user's domain, collects the adequate words and sentences, and extracts and classifies the characteristics of the collected words. The comparison between the number of key strokes for sentence generating using the system and that of inputting consonants and vowels using a keyboard was made in order to evaluate the usefulness the sentence generating method.

  • PDF

An User-Friendly Kiosk System Based on Deep Learning (딥러닝 기반 사용자 친화형 키오스크 시스템)

  • Su Yeon Kang;Yu Jin Lee;Hyun Ah Jung;Seung A Cho;Hyung Gyu Lee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.1
    • /
    • pp.1-13
    • /
    • 2024
  • This study aims to provide a customized dynamic kiosk screen that considers user characteristics to cope with changes caused by increased use of kiosks. In order to optimize the screen composition according to the characteristics of the digital vulnerable group such as the visually impaired, the elderly, children, and wheelchair users, etc., users are classified into nine categories based on real-time analysis of user characteristics (wheelchair use, visual impairment, age, etc.). The kiosk screen is dynamically adjusted according to the characteristics of the user to provide efficient services. This study shows that the system communication and operation were performed in the embedded environment, and the used object detection, gait recognition, and speech recognition technologies showed accuracy of 74%, 98.9%, and 96%, respectively. The proposed technology was verified for its effectiveness by implementing a prototype, and through this, this study showed the possibility of reducing the digital gap and providing user-friendly "barrier-free kiosk" services.

Memory Allocation Scheme for Reducing False Sharing on Multiprocessor Systems (다중처리기 시스템에서 거짓 공유 완화를 위한 메모리 할당 기법)

  • Han, Boo-Hyung;Cho, Seong-Je
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.4
    • /
    • pp.383-393
    • /
    • 2000
  • In shared memory multiprocessor systems, false sharing occurs when several independent data objects, not shared but accessed by different processors, are allocated to the same coherency unit of memory. False sharing is one of the major factors that may degrade the performance of memory coherency protocols. This paper presents a new shared memory allocation scheme to reduce false sharing of parallel applications where master processor controls allocation of all the shared objects. Our scheme allocates the objects to temporary address space for the moment, and actually places each object in the address space of processor that first accesses the object later. Its goal is to allocate independent objects that may have different access patterns to different pages. We use execution-driven simulation of real parallel applications to evaluate the effectiveness of our scheme. Experimental results show that by using our scheme a considerable amount of false sharing faults can be reduced with low overhead.

  • PDF

Implementation of an Indoor Location Based Contents Displaying System Using Web Services (웹 서비스 이용 옥내위치기반 콘텐츠 디스플레이 시스템 구현)

  • Yim, Jae-Geol;Kim, Min-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.147-155
    • /
    • 2011
  • Map rendering, positioning, database managements are key elements of location based services. Google map and GPS (Global Positioning System) have become a very popular solution for map rendering and positioning, respectively. They are very effective and yet free of charge. However, they cannot be used for an indoor location based service system. We cannot render a building drawing with Google map, we cannot determine a moving object's position when it is indoor. This paper introduces our web services of rendering drawings, indoor positioning, and multimedia contents up-loading and playing so that any programmers can use them in developing indoor location based service systems. In order to experimentally show the efficiency of our web services, we have built a location based contents displaying system for museum visitors with them.

A Control System of 4 d.o.f Human Arm type Redundant Robot (인간형 4자유도 로봇팔 제어 시스템)

  • Hwang, Sung-Ri;Park, Jae-woo;Na, Sang-min;Hyun, Woong-keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.301-303
    • /
    • 2018
  • This paper describes a robot control system and control method of a human arm type redundant manipulator. The control of a redundant manipulator suffer from computational complexity and singularity problem because of numerical inverse kinematics. To deal with such problems, analytical methods for a redundant robot arm have been researched to enhance the performance of inverse kinematics. In this research, we propose a numerical control method and weighted pseudo inverse kinematics algorithm. Using this algorithm, it is possible to generate a trajectory passing through the singular points and intuitively move the elbow without regard to the end-effector pose. Performance of the proposed algorithm was verified by various simulations. It is shown that the trajectory planning and using this algorithm provides correct results near the singular points and can utilize redundancy intuitively. We proved this system's validity through field test.

  • PDF

L-CAA : An Architecture for Behavior-Based Reinforcement Learning (L-CAA : 행위 기반 강화학습 에이전트 구조)

  • Hwang, Jong-Geun;Kim, In-Cheol
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.3
    • /
    • pp.59-76
    • /
    • 2008
  • In this paper, we propose an agent architecture called L-CAA that is quite effective in real-time dynamic environments. L-CAA is an extension of CAA, the behavior-based agent architecture which was also developed by our research group. In order to improve adaptability to the changing environment, it is extended by adding reinforcement learning capability. To obtain stable performance, however, behavior selection and execution in the L-CAA architecture do not entirely rely on learning. In L-CAA, learning is utilized merely as a complimentary means for behavior selection and execution. Behavior selection mechanism in this architecture consists of two phases. In the first phase, the behaviors are extracted from the behavior library by checking the user-defined applicable conditions and utility of each behavior. If multiple behaviors are extracted in the first phase, the single behavior is selected to execute in the help of reinforcement learning in the second phase. That is, the behavior with the highest expected reward is selected by comparing Q values of individual behaviors updated through reinforcement learning. L-CAA can monitor the maintainable conditions of the executing behavior and stop immediately the behavior when some of the conditions fail due to dynamic change of the environment. Additionally, L-CAA can suspend and then resume the current behavior whenever it encounters a higher utility behavior. In order to analyze effectiveness of the L-CAA architecture, we implement an L-CAA-enabled agent autonomously playing in an Unreal Tournament game that is a well-known dynamic virtual environment, and then conduct several experiments using it.

  • PDF