• Title/Summary/Keyword: Guide Path

Search Result 197, Processing Time 0.022 seconds

Collision Avoidance and Deadlock Resolution for AGVs in an Automated Container Terminal (자동화 컨테이너 터미널에서의 AGV 충돌 방지 및 교착 해결 방안)

  • Kang, Jae-Ho;Choi, Lee;Kang, Byoung-Ho;Ryu, Kwang-Ryel;Kim, Kap-Hwan
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.3
    • /
    • pp.25-43
    • /
    • 2005
  • In modern automated container terminals, automated guided vehicle (AGV) systems are considered a viable option for the horizontal tansportation of containers between the stacking yard and the quayside cranes. AGVs in a container terminal move rather freely and do not follow fixed guide paths. For an efficient operation of such AGVs, however, a sophisticated traffic management system is required. Although the flexible routing scheme allows us to find the shortest possible routes for each of the AGVs, it may incur many coincidental encounters and path intersections of the AGVs, leading to collisions or deadlocks. However, the computational cost of perfect prediction and avoidance of deadlocks is prohibitively expensive for a real time application. In this paper, we propose a traffic control method that predicts and avoids some simple, but at the same time the most frequently occurring, cases of deadlocks between two AGVs. More complicated deadlock situations are not predicted ahead of time but detected and resolved after they occur. Our method is computationally cheap and readily applicable to real time applications. The efficiency and effectiveness of our proposed methods have been validated by simulation.

  • PDF

A Study on Development of Integrated Sports Talents' Competency Model By Career Type (체육인재의 경력유형별 융합적 역량모델 개발 연구)

  • Kim, Jin-Se;Ahn, Jai-Han;Kim, Mi-Suk
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.423-433
    • /
    • 2017
  • The purpose of this study was to develop a competency model by career type by designing the specified career paths through the analysis of career experience of the athletes in the professional sports field. For this purpose, career types were identified as sports administrators, judges, leaders, sports information analysts, and global sports talents based on literature analysis, career development type and path guide design, experts interviews. Competency candidates were derived from interviews and workshops on experts. In order to finalize the competency model, it was confirmed by completing the feasibility test of experts. As a result, it is divided into common competency, professional competency, and global professional competency. There are 6 common competencies such as global competence, OA utilization, 29 special competencies by 5 career types, and 2 global competencies like sports foreign affairs, job preparation for international sports organization and the sports league federation. Competency definitions and behavioral indicator were developed for all competencies and could be used to diagnose the competency level of sports talents and to establish career development academy programs based on the competency model.

A Study on Values of Scientifically Gifted Students and the Relations among Values (과학영재학생의 가치 특성 및 가치유형 간 상호 관계성 분석)

  • Ju, Yeong-Hyeon;Choe, Ho-Seong
    • Journal of Gifted/Talented Education
    • /
    • v.22 no.3
    • /
    • pp.679-702
    • /
    • 2012
  • Values can be regarded as an important factor which acts as an indicator showing each person's individual path of life. many researchers have suggested that values function as standards that guide thought and action. Values lead us to take particular positions on social issues and they predispose us to favor one perspective over another. Adolescence is an important period for the establishment of one's values. The values established during such a period become an important factor determining one's right personality and contents of life. In particular, it is important to take a study about the values possessed by gifted and talented children in Korea. There have been several researches regarding the cognitive and affective characteristics of gifted and talented learners in Korea. However, there has not been any research regarding their values in life. This study investigates the characteristics of values shown by 468 high-school students from two special schools for gifted students by using Schwartz's Value Survey Scale which is consisted of 57 value categories and 10 value types. According to the results of this study, the students from the special high-school for gifted children tend to promote such value types as 'autonomy' and 'stimulation' the most. Conversely, the same students tend to deny or ignore such value types as 'power' and 'tradition'. This study provides basic data regarding the values of gifted and talented students as the first research of its kind targeting gifted students in Korea. It has an important meaning for the research related to the characteristics shown by gifted students in Korea.

A Study on the Enactment of Basic Laws on the Urban Regeneration (도시재생기본법 제정의 방향설정에 관한 연구)

  • Song, Young-Hyun;Lee, Chang-Ho
    • Land and Housing Review
    • /
    • v.2 no.1
    • /
    • pp.9-17
    • /
    • 2011
  • A urban regeneration project of Korea has been promoted highly attaching to physical reforms, but without fulfilling the basic goal of reactivating city functions through concerning overall areas. Moreover, the general rule and its system of urban regeneration project which would provide roles of public and civilians as well as facilitate cooperative urban regeneration, are currently missing. Thus, social stratum continuously requests a framework act for urban regeneration project called Control Tower, to be a guide to the evidently right path to step up. The research analyzes the current status and problems of urban regeneration projects in Korea to examine the necessity of Control Tower, and to bring up the way to move on for its efficiency presented below: First, the law should be declarative; possess general, prospective influences on laws and systems related to urban regeneration. Second, the nonbinding guideline on a urban regeneration project should be suggested to reflect the conditions by the regions. Last, propulsions should be framed such as administrative principles of strengthening publicity and connection of urban regeneration projects, a committee and fund to promote the former, and a research for problem solution.

The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination - (모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 -)

  • Min, Kyeong-Eun;Kim, Sung-Jun;Kwon, Du-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.207-233
    • /
    • 2016
  • Currently mobile messenger industry, based on mobile application, is growing. And it has aroused innovative change, offering services in various forms beyond the form simply sharing messengers. Also because messenger securities are becoming personalized and intelligent, the importance of more diverse mobile applications' securities is increasing. This study carries out the empirical study of the causal relationship that the factors of using application services influence on security recognition and security Intention of mobile securities, and consequentially impact upon protection of personal information of users. In order that, we present the research model which prime variables of SDT, which emphasized on natural immanent motivation of human, applied to. To verify the research model of this study empirically, we conducted a survey targeting the public and university students which have ever used mobile messenger applications. With this, we desire to contribute to emphasizing the significance of individual messenger security and playing a positive role to develop security guide for consumers. The path analysis results are as follows. First, perceived autonomy has a positive effect on both security awareness and security intention. Second, perceived competence has a positive effect on security intention. Third, perceived relatedness has a positive effect on both security awareness and security intention. Last, security awareness and security intention. have a positive effect on privacy protection behavior. Through emphasizing the importance of the security of the messenger of individuals and contribute to a positive role for development of the necessary security guidelines to consumers.

  • PDF

Modelling protection behaviour towards micronutrient deficiencies: Case of iodine biofortified vegetable legumes as health intervention for school-going children

  • Mogendi, Joseph Birundu;De Steur, Hans;Gellynck, Xavier;Makokha, Anselimo
    • Nutrition Research and Practice
    • /
    • v.10 no.1
    • /
    • pp.56-66
    • /
    • 2016
  • BACKGROUND/OBJECTIVES: Despite successes recorded in combating iodine deficiency, more than 2 billion people are still at risk of iodine deficiency disorders. Rural landlocked and mountainous areas of developing countries are the hardest hit, hence the need to explore and advance novel strategies such as biofortification. SUBJECTS/METHODS: We evaluated adoption, purchase, and consumption of iodine biofortified vegetable legumes (IBVL) using the theory of protection motivations (PMT) integrated with an economic valuation technique. A total of 1,200 participants from three land-locked locations in East Africa were recruited via multi-stage cluster sampling, and data were collected using two, slightly distinct, questionnaires incorporating PMT constructs. The survey also elicited preferences for iodine biofortified foods when offered at a premium or discount. Determinants of protection motivations and preferences for iodine biofortified foods were assessed using path analysis modelling and two-limit Tobit regression, respectively. RESULTS: Knowledge of iodine, iodine-health link, salt iodization, and biofortification was very low, albeit lower at the household level. Iodine and biofortification were not recognized as nutrient and novel approaches, respectively. On the other hand, severity, fear, occupation, knowledge, iodine status, household composition, and self-efficacy predicted the intention to consume biofortified foods at the household level; only vulnerability, self-efficacy, and location were the most crucial elements at the school level. In addition, results demonstrated a positive willingness-to-pay a premium or acceptance of a lesser discount for biofortification. Furthermore, preference towards iodine biofortified foods was a function of protection motivations, severity, vulnerability, fear, response efficacy, response cost, knowledge, iodine status, gender, age. and household head. CONCLUSIONS: Results lend support for prevention of iodine deficiency in unprotected populations through biofortification; however 'threat' appraisal and socio-economic predictors are decisive in designing nutrition interventions and stimulating uptake of biofortification. In principle, the contribution is threefold: 1) Successful application of the integrated model to guide policy formulation; 2) Offer guidance to stakeholders to identify and tap niche markets; 3) stimulation of rural economic growth around school feeding programmes.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

Application of CFD Methods to Improve Performance of Denitrification Facility (탈질 설비의 성능 개선을 위한 CFD 기법 적용에 관한 연구)

  • Min-Kyu Kim;Hee-Taeg Chung
    • Clean Technology
    • /
    • v.29 no.4
    • /
    • pp.305-312
    • /
    • 2023
  • Due to the strengthening of environmental requirements, aging denitrification facilities need to improve their performance. The present study aims to suggest the possibility of improving performance using computational analysis techniques. This involved modifying both the geometric design and the operating conditions, including the flow path shape of the equipment such as the inlet guide vane and the curved diffusing part, and the flow control of the ammonia injection nozzle. The conditions presented in this study were compared with existing operating conditions in terms of the flow uniformity, the NH3/NO molar ratio of the mixed gas flowing into the catalyst layer, and the total pressure drop of the facility. The flow field applied in the computational analysis ranged from the outlet of the economizer in the combustion furnace to the inlet of the air preheater, the full domain of the denitrification facility. The performances were derived by solving the flow fields using ANSYS-Fluent and the injection amount of ammonia was adjusted for each nozzle using Design Xplorer. Compared to the denitrification performances of the equipment currently in operation, the conditions proposed in this study showed an improvement in the flow uniformity and NH3/NO composition ratio by 45.1% and 8.7%, respectively, but the total pressure drop increased by 1.24%.

Factors Influencing the Intention to Use Digital Technology in Education (학습에서 디지털기술 사용의도에 영향을 주는 요인에 대한 분석)

  • Jang, Moonkyoung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.2
    • /
    • pp.153-165
    • /
    • 2022
  • The COVID-19 Pandemic incident forced all educational and learning activities to move online, so it is no longer an option to use information and communication technology for education and learning. Venture capital has made the largest investment ever in Edu-tech startups. This study investigates the factors influencing the intention to use digital technology in education, taking into account the Unified Theory of Acceptance and Use of Technology (UTAUT) along with digital literacy, which has become an essential ability in the digital age. As a result of the structural equation model analysis, we find that performance expectation, effort expectation, and social influence have a positive effect on the intention to use digital technology in education. Moreover, digital literacy has a positive effect on performance expectation, effort expectation, and social impact, but the direct effect on the intention to use digital technology on learning is not significant. Furthermore, to see the moderating effect of age, the results of multi-group analysis present that the differences between 10s and 60s, between 20s and 60s, between 30s and 60s on the path of social influence on the intention to use digital technology in education are significantly reduced. This study academically contributes to expanding the research on the factors affecting the intention to use digital technology in a specific situation of education by considering both digital literacy and Unified Theory of Acceptance and Use of Technology (UTAUT). In addition, it can be used as a practical guide to the factors to be considered for each age when making learning participants more actively use digital technology.

Deviations of Implant Position between Pre- and Post-operation in Computer-guided Template-based Implant Placement (Computer-guided template를 이용한 임플란트 식립에서 술 전과 술 후 사이의 임플란트 위치에 따른 변위량 검사)

  • Kim, Won;Kim, Seung-Mi;Kim, Hyo-Jung;Song, Eun-Young;Lee, Si-Ho;Oh, Nam-Sik
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.27 no.2
    • /
    • pp.175-184
    • /
    • 2011
  • With a development of implant restoration technique, there are increasing use of computer-guided system for edentulous patients. It was carried out simulated operation based on CT information about patient's bone quantity, quality and anatomical landmark. However, there are some difference between the programmed implant and post-operative implant about it's position. If the deviation was severe, it could happen a failure of 'passive fit' and not suited for path of implant restoration. The aim of this presentation is to evaluate about a degree of deviations between programmed implant and post-operative implant. Five patients treated by 'NobelGuide' system (Nobel Biocare AB, G$\ddot{o}$teborg, Sweden) in Department of Prosthodontics, Inha University were included in this study. The patients were performed CT radiograph taking and intra-oral impression taking at pre-operation. Based on CT images and study model, surgical stent was produced by NobelBiocareTM. To fabricated a pre-operative study model, after connected lab analog to surgical template, accomplished a pre-operative model using type 4 dental stone. At final impression, a post-operative study model was fabricated in the conventional procedures. Each study model was performed CT radiograph taking. Based on CT images, each implant was simulated in three dimensional position using $Procera^{(R)}$ software (Procera Software Clinical Design Premium, version 1.5; Nobel Biocare AB). In 3D simulated model, length and angulation between each implant of both pre- and post-operative implants were measured and recorded about linear and angular deviation between pre-and post-operative implants. A total of 24 implants were included in this study and 58 inter-implant sites between each implant were measured about linear and angular deviations. In the linear deviation a mean deviation of 0.41 mm (range 0~1.7 mm) was reported. In the angular deviation, a mean deviation was $1.99^{\circ}$ (range $0^{\circ}{\sim}6.7^{\circ}$). It appears that the both linear and angular mean deviation value were well acceptable to application of computer-guided implant system.