• 제목/요약/키워드: IT-based

검색결과 112,717건 처리시간 0.083초

지역 및 전역 환경에 대한 세선화 기반 위상지도의 작성 (Thinning-Based Topological Map Building for Local and Global Environments)

  • 권태범;송재복
    • 제어로봇시스템학회논문지
    • /
    • 제12권7호
    • /
    • pp.693-699
    • /
    • 2006
  • An accurate and compact map is essential to an autonomous mobile robot system. For navigation, it is efficient to use an occupancy grid map because the environment is represented by probability distribution. But it is difficult to apply it to the large environment since it needs a large amount of memory proportional to the environment size. As an alternative, a topological map can be used to represent it in terms of the discrete nodes with edges connecting them. It is usually constructed by the Voronoi-like graphs, but in this paper the topological map is incrementally built based on the local grid map using the thinning algorithm. This algorithm can extract only meaningful topological information by using the C-obstacle concept in real-time and is robust to the environment change, because its underlying local grid map is constructed based on the Bayesian update formula. In this paper, the position probability is defined to evaluate the quantitative reliability of the end nodes of this thinning-based topological map (TTM). The global TTM can be constructed by merging each local TTM by matching the reliable end nodes determined by the position probability. It is shown that the proposed TTM can represent the environment accurately in real-time and it is readily extended to the global TTM.

FINITELY BASED LATTICE VARIETIES (I)

  • Yim, Sang-Gyou;Kang, Young-Yug
    • 대한수학회지
    • /
    • 제33권2호
    • /
    • pp.439-453
    • /
    • 1996
  • In R. McKenzie[12], it is shown that the cardinality of the lattice variety is $2^\aleph_0$ and K. Baker[1] contains the stronger result that M, the variety of all modular lattices, has $2^\aleph_0$ subvarieties. It follows that there exists a variety of modular lattices that is not finitely based. In fact, K. Baker[2] gave an example of such a variety. And it was proved by K. Baker [2] and B. Jonsson [8] that join of two finitely based lattice varieties is not always finitely based. K. Baker[2] gave an explicit example of case of nonmodular lattice variety. Then it is proposed whether the join of two finitely based varieties if finitely based under certain conditions. The answer to the question is not affirmative.

  • PDF

취약성 정보를 활용한 정책 기반 보안 시스템 모델링 (Policy-based Security System Modeling using Vulnerable Information)

  • 서희석;김동수;김희완
    • 한국IT서비스학회지
    • /
    • 제2권2호
    • /
    • pp.97-109
    • /
    • 2003
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. And Policy-based network provides a means by which the management process can be simplified and largely automated. In this article we build a foundation of policy-based network modeling environment. The procedure and structure for policy rule induction from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Based) is conducted. It also transforms the policy rules into PCIM (Policy Core Information Model).

신뢰성에 기반한 효과적 제안 Communication Framework (Effective Proposal Communication Framework Based on Credibility)

  • 정성화;김업
    • 한국IT서비스학회:학술대회논문집
    • /
    • 한국IT서비스학회 2008년도 추계학술대회
    • /
    • pp.47-52
    • /
    • 2008
  • The purpose of this research is to develop a communication framework based on credibility for information technology (IT) proposal. It is necessary to develop a communication framework for IT proposal since it has become more important how effective IT service providers can deliver an IT proposal to customers. In this paper, we develop a communication framework for IT proposal through dividing customer's recognition steps and analyzing key factors based on the credibility. Key factors affecting communication framework have been identified and analyzed by focus group interview and questionnaires with experienced staffs. The results of this study can be used for enhancement of IT proposal's quality through the introduction of communication framework.

  • PDF

IT융합 서비스 산업 모델의 프로세스 효과성 탐색 (Exploratory Analysis to Investigate the Process Effectiveness of IT Convergence based Service Industry Model)

  • 한현수;문태은
    • Journal of Information Technology Applications and Management
    • /
    • 제19권4호
    • /
    • pp.227-242
    • /
    • 2012
  • It is a daunting task to theorize the process effectiveness of IT convergence based service model. Despite the criticalness of investigating process enhancement impact of IT-convergence based service model, the theoretical research in this field is relatively scarce, possibly due to the too wide and comprehensiveness of research scope. In this vein, we conducted exploratory study to understand the contributional impact of IT convergence based service model on resolving service process limitations. We first identified five IT convergence based service models in the area of typical service industry, which include entertainment, learning, location based services, tourism, and healthcare. Our research model classified value creation factors of the IT convergence model in twofold. The one is defined as basic value creation factor of the IT convergence, which is treated as the second-order factor that consists of two first-order factors of mobile functionality and Internet with digital contents merging functionality. The other is defined as service process limitations resolving factor which are comprised with the two first-order factors of simultaneousity and perishability. Both the second-order factors are modeled, each respectively, with the two first-order factors in formative manner. Using PLS, empirical validation is executed to analyze each value creating factor's contribution impact on the relative advantage, as well as the mediating effect of basic value creation factor on resolving service process limitations. On the basis of the insights revealed from this paper, further theory building research could be elaborated in the area of IT convergence applications for service industry.

IT기반 커뮤니케이션 요인이 서비스재이용의도에 미치는 영향분석 : 정비서비스를 중심으로 (The Analysis of Impact of IT-Based Communication Level on Customer's Intention of Service Reuse : Auto Repair Service)

  • 한복우;김철수
    • 한국IT서비스학회지
    • /
    • 제13권3호
    • /
    • pp.333-342
    • /
    • 2014
  • As for the dimensions of service quality, reliability, responsiveness, assurance, empathy, and tangibles are the main factors that determine the company's service quality. To improve quality of service, companies emphasize the balance among the dimensions of service quality. These emphases improve definitely customer satisfaction and intention of reusing service, while communication at customer encounters give direct affects in customer satisfaction and intention of reusing service. This study shows how communications at customer encounters affect intention of reusing service and be affected by the dimensions of service quality. It especially analyzes how IT-based communications, one of physical one, such as phones, emails, messengers, and SNSs affect and be affected. In addition, it analyzes car repair service. This research uses a factor of communications at service encounter as for intermediate parameter and analyzes how it relates to dimensions of service quality and intention of reusing service. With following research model, it will analyze how IT-based communication affects intention of reusing service and be also affected by dimensions of service quality.

위치기반 서비스에 따른 개인정보보안 취약점의 사례분석 (Analysis of Privacy Vulnerability Caused by Location-Based Service)

  • 최희식;조양현;김정숙
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.151-159
    • /
    • 2014
  • Recently, spread of large amount Smartphones made users to download location-based service applications, which provided by application developers. These location-based service applications are convenient tool for users. Location-based service use technology to find location of user and provide information of user's location. Leakage of information of user's location and expose of privacy life raised new controversy. In this thesis, it will analyze relations of increase of Smartphone market, usage of Location-based service and severity of personal information leakage. Also, it will analyze examples of user's case of damage which caused by leakage personal information and find solutions to reduce damage of personal information leakage. In research, it will find cases of damage that cause by Location-based service. Also it will analyze and research cases of damage and present with graph and chart. In conclusion, to reduce and prevent from damage which caused by leakage personal information, it is important that users and application developers to realize danger of private and personal information leakage. Also, user's personal information must deal with cautiously and application developers have to research and develop the application with powerful security.

Role-based Morality, Ethical Pluralism, and Morally Capable Robots

  • Zhu, Qin;Williams, Tom;Wen, Ruchen
    • Journal of Contemporary Eastern Asia
    • /
    • 제20권1호
    • /
    • pp.134-150
    • /
    • 2021
  • Dominant approaches to designing morally capable robots have been mainly based on rule-based ethical frameworks such as deontology and consequentialism. These approaches have encountered both philosophical and computational limitations. They often struggle to accommodate remarkably diverse, unstable, and complex contexts of human-robot interaction. Roboticists and philosophers have recently been exploring underrepresented ethical traditions such as virtuous, role-based, and relational ethical frameworks for designing morally capable robots. This paper employs the lens of ethical pluralism to examine the notion of role-based morality in the global context and discuss how such cross-cultural analysis of role ethics can inform the design of morally competent robots. In doing so, it first provides a concise introduction to ethical pluralism and how it has been employed as a method to interpret issues in computer and information ethics. Second, it reviews specific schools of thought in Western ethics that derive morality from role-based obligations. Third, it presents a more recent effort in Confucianism to reconceptualize Confucian ethics as a role-based ethic. This paper then compares the shared norms and irreducible differences between Western and Eastern approaches to role ethics. Finally, it discusses how such examination of pluralist views of role ethics across cultures can be conducive to the design of morally capable robots sensitive to diverse value systems in the global context.

모바일 로봇의 목표물 추적을 위한 이미지 궤환 제어 (A Image Feedback control of Mobile Robot for Target Tracking)

  • 황원준;이우송
    • 한국산업융합학회 논문집
    • /
    • 제18권2호
    • /
    • pp.90-98
    • /
    • 2015
  • This research propose with image-based visual a new approach to design a feedback control of mobile robot. because mobile robot must be recharged periodically, it is necessary to detect and move to docking station. Generally, laser scanner is used for detect of position of docking station. CCD Camera is also used for this purpose. In case of using camera, the position-based visual servoing method is widely used. But position-based visual servoing method requires the accurate calibration and it is hard and complex work. Another method using cameras is inmage-based visual feedback. Recently, image based visual feedback is widely used for robotic application. But it has a problem that cannot have linear trajectory in the 3-dimensional space. Because of this weak point, image-based visual servoing has a limit for real application. in case of 2-dimensional movement on the plane, it has also similar problem. In order to solve this problem, we point out the main reason of the problem of the resolved rate control method that has been generally used in the image-based visual servoing and we propose an image-based visual feedback method that can reduce the curved trajectory of mobile robot in th cartesian space.

워키태깅 : 스마트폰 환경에서 음성기반의 효과적인 영상 콘텐츠 어노테이션 방법에 관한 연구 (WalkieTagging : Efficient Speech-Based Video Annotation Method for Smart Devices)

  • 박준영;이수빈;강동엽;석영태
    • 한국IT서비스학회지
    • /
    • 제12권1호
    • /
    • pp.271-287
    • /
    • 2013
  • The rapid growth and dissemination of touch-based mobile devices such as smart phones and tablet PCs, gives numerous benefits to people using a variety of multimedia contents. Due to its portability, it enables users to watch a soccer game, search video from YouTube, and sometimes tag on contents on the road. However, the limited screen size of mobile devices and touch-based character input methods based on this, are still major problems of searching and tagging multimedia contents. In this paper, we propose WalkieTagging, which provides a much more intuitive way than that of previous one. Just like any other previous video tagging services, WalkieTagging, as a voice-based annotation service, supports inserting detailed annotation data including start time, duration, tags, with little effort of users. To evaluate our methods, we developed the Android-based WalkieTagging application and performed user study via a two-week. Through our experiments by a total of 46 people, we observed that experiment participator think our system is more convenient and useful than that of touch-based one. Consequently, we found out that voice-based annotation methods can provide users with much convenience and satisfaction than that of touch-based methods in the mobile environments.