• Title/Summary/Keyword: GRASP

Search Result 2,721, Processing Time 0.024 seconds

Developing an Equilibrium Analysis Model of Cartel Game under Leniency Programs (자진신고자 감면제도하의 담합 게임에 대한 균형분석모형 개발)

  • Park, Jihyun;Ahn, Suneung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.36 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • This study is to develop a mathematical analysis model to grasp the behaviors of cartels. Cartels are formed tacitly and cause tremendous damage to consumers in modern society which is composed of advanced industry structure. The government authorities have instituted the leniency programs to respond cartels. However, cartels will continue unless there are legal sanctions against cartels based on an accurate analysis of leniency programs. The proposed cartel equilibrium analysis model is a mathematical behavior model which is based on the existing methods and the prison's dilemma of game theory. Therefore, the model has a form of pay off matrix of two players. We use a iterated polymatrix approximation (IPA) method to deduct a Nash equilibrium point. The model is validated by an empirical analysis as well.

Pose Selection of a Mobile Manipulator for a Pick and Place Task (집기-놓기 작업을 위한 이동 머니퓰레이터의 자세 선정)

  • Cho, Kyoung-Rae
    • The Journal of Korea Robotics Society
    • /
    • v.6 no.4
    • /
    • pp.344-352
    • /
    • 2011
  • A mobile manipulator is a system with a robotic manipulator mounted on top of a mobile base. It has both indoor and outdoor applications for transporting or transferring materials. When a user gives commands, they are usually at high levels such as "move the object to the table," or "tidy the room." By intelligently decomposing these complex commands into several subtasks, the mobile manipulator can perform the tasks with a greater efficiency. One of the crucial subtasks for these commands is the pick-and-place task. For the mobile manipulator, selection of a good base position and orientation is essential to accomplishing this task. This paper presents an algorithm that determines one of the position and orientation of a mobile manipulator in order to complete the pick-and-place task without human intervention. Its effectiveness are shown for a mobile manipulator with 9 degrees-of-freedom in simulation.

Application Trends of Deep Learning Artificial Intelligence in Autonomous Things (자율사물을 위한 심층학습 인공지능 기술 적용 동향)

  • Cho, J.M.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.1-11
    • /
    • 2020
  • Recently, autonomous things, which are pieces of equipment or devices that grasp the context of circumstances on their own and perform actions appropriate for the situation in the surrounding environment, are attracting much research interest. This is because autonomous things are expected to be able to interact with humans more naturally, supersede humans in many tasks, and further solve problems by themselves by collaborating with each other without human intervention. This prospect leans heavily on AI as deep learning has delivered astonishing breakthroughs recently and broadened its range of applications. This paper surveys application trends in deep learning-based AI techniques for autonomous things, especially autonomous driving vehicles, because they present a wide range of problems involving perception, decision, and actions that are very common in other autonomous things.

Impact of Corporate Characteristics on Personal Information Breach Accident (기업의 특성이 개인정보 유출 사고에 미치는 영향)

  • Kim, Taek-Young;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of Information Technology Services
    • /
    • v.19 no.4
    • /
    • pp.13-30
    • /
    • 2020
  • Not only does it cause damage to individuals and businesses due to the occurrence of large-scale personal information leakage accidents, but it also causes many problems socially. Companies are embodying efforts to deal with the threat of personal information leakage. However, it is difficult to obtain detailed information related to personal information leakage accidents, so there are limitations to research activities related to leakage accidents. This study collects information on personal information leakage incidents reported through the media for 15 years from 2005 to 2019, and analyzes how the personal information leakage incidents occurring to companies are related to the characteristics of the company. Through the research results, it is possible to grasp the general characteristics of personal information leakage accidents, and it may be helpful in decision making for prevention and response to personal information leakage accidents.

The Instability Behavior of Shallow Sinusoidal Arches(1) : Classification of Static Buckling According to Shape Characteristics (얕은 정현형 아치의 불안정 거동에 관한 연구(1) : 형상특성에 따른 정적좌굴의 분류)

  • 김승덕;박지윤;권택진
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.12 no.3
    • /
    • pp.407-415
    • /
    • 1999
  • There are two kinds of instability phenomena for shell-type structures which are snap-through and bifurcation buckling. These are very sensitive according to the shape characteristics including rise-span ratio and especially shape initial imperfection. In this study, the equilibrium path of shallow sinusoidal arches supported by hinges at both ends is investigated to grasp the instability behavior of shell-type structures with initial imperfection. The Galerkin method is used to get the nonlinear discretized equation of governing differential equation considering geometric nonlinearity of arches and the perturbation method is also used to transform the nonlinear equation to incremental form.

  • PDF

Bi-directional response control of a building using one TLD (1 개의 TLD 를 이용한 건물의 양방향 진동제어)

  • Min, Kyung-Won;Lee, Sung-Kyung;Park, Eun-Churn
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2009.04a
    • /
    • pp.119-124
    • /
    • 2009
  • This paper proposes a tuned liquid column sloshing damper(TLCSD) and presents experimental results to evaluate its control performance. The proposed damper acts as a tuned liquid column damper(TLCD) and a tuned liquid damper(TLD), respectively, in both principal axes of building structures. Shaking table test was performed to grasp its dynamic characteristics. Testing results showed that under inclined incident excitations, a TLCSD used in this study have dynamic characteristics coupled by both TLCD and TLD.

  • PDF

Implementation of the Logistics Management System for the Small-Shopping Mall Based on Web Environment (웹 환경과 연동된 중소쇼핑몰 물류관리 시스템 구현)

  • Choi, Sei-Hyun;Kim, Yei-Chang
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.325-347
    • /
    • 2005
  • Development of efficient integration management system needs to operate and manage internet shopping mall for customer, sale, product, stock, account management. The purpose of this paper implements of small shopping mall logistics management system as a plan to raise efficiency of management of the Internet shopping mall which was a representative business form of electronic commerce. Logistics management system operates an Internet shopping mall, progressed with the aim of construction of the management system that systematizes a member, a product, a stock, customer management, and can efficiently manage a total stock grasp and the amount of transaction of a product based on Web environment by real time.

  • PDF

Implementation of IPv6 Neighbor Discovery Protocol supporting CGA

  • Kim Joong Min;Park In Kap;Yu Jae Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.571-575
    • /
    • 2004
  • Having age of ubiquitous ahead, existing IPv4's address space insufficiency phenomenon appears because of increasing network usage as well as multimedia data transmission becomes much, necessity of new IP address system that guarantee QoS are needed. IPv6 was made to solve these problem. IPv6 solves address space insufficiency phenomenon offering by 128bit address space, and also offers hierarchical address layer that support improved QoS. IPv6 defines relation between surrounding node using Neighbor Discovery protocol. Used Neighbor Discovery messages, grasp surrounding node, include important informations about network. These network information outcrops can give rise in network attack and also service that use network will paralysis. Various kinds of security limitation was found in Present Neighbor Discovery protocol therefore security function to supplement tris problem was required. In this thesis, Secure Neighbor Discovery protocol that add with security function was design and embody by CGA module and SEND module.

  • PDF

Improved methods for measuring early reflections from Five-channel room impulse response using newly introduced Peak-Detecting algorithm

  • Kim Lae-Hoon;Doo Sejin;Oh Yangki;Lee Heewon;Sung Koeng-Mo
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • spring
    • /
    • pp.439-442
    • /
    • 2000
  • When we measure the acoustical properties of a room using multiple microphone system, it is important to grasp exact time delay of the early reflections from impulse response pair. But it is often very difficult to identify the early reflections in natural shape, because a waveform may be deformed due to the characteristics of a sound source loudspeaker, microphone and reflected wall and overlapping of plural waveform. In this paper to obtain more accurate and enough early reflections, we propose the brand-new five-channel sound receiving system and introduce peak-detecting algorithm. The system has microphones mounted at the origin and four points of a regular tetrahedron. The newly introduced peak-detecting algorithm can show exact peak position in each channel, in spite of deformation due to reflected walls, loudspeaker and microphone.

  • PDF

A Study on the Practical Usage of STEP data (STEP 데이터의 활용 방안에 대한 연구)

  • 예도경;박정선
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.2
    • /
    • pp.133-160
    • /
    • 1996
  • It is accomplished on the practical usage for STEP in enterprise. But they has feeble grasp of STEP, therfore it is hard to apply. That is due to take a negative policy with the lack of advertising and understanding, most of studies are going on a studentlike attitude rather than the practical usage or implementation, so they don't know exactly what is STEP, and how can they apply to their own enterprise. This paper aimed to present more detail understanding of STEP usage and practical usage of STEP data in enterprise. We describe EXPRESS that is description method of STEP, four ways of implementation method, and introduce to using ST-Developer and ST-Oracle by STEP Tools Inc. for more detail understand of STEP. Thereafter we propose practical usage of STEP with CAD systems and PDM systems on the knowledge of previous study, and propose total system implementation image on STEP data in enterprise, finally discuss conclusion and luther study issues.

  • PDF