• Title/Summary/Keyword: Multi-task

Search Result 791, Processing Time 0.022 seconds

Recognition and Modeling of 3D Environment based on Local Invariant Features (지역적 불변특징 기반의 3차원 환경인식 및 모델링)

  • Jang, Dae-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.31-39
    • /
    • 2006
  • This paper presents a novel approach to real-time recognition of 3D environment and objects for various applications such as intelligent robots, intelligent vehicles, intelligent buildings,..etc. First, we establish the three fundamental principles that humans use for recognizing and interacting with the environment. These principles have led to the development of an integrated approach to real-time 3D recognition and modeling, as follows: 1) It starts with a rapid but approximate characterization of the geometric configuration of workspace by identifying global plane features. 2) It quickly recognizes known objects in environment and replaces them by their models in database based on 3D registration. 3) It models the geometric details the geometric details on the fly adaptively to the need of the given task based on a multi-resolution octree representation. SIFT features with their 3D position data, referred to here as stereo-sis SIFT, are used extensively, together with point clouds, for fast extraction of global plane features, for fast recognition of objects, for fast registration of scenes, as well as for overcoming incomplete and noisy nature of point clouds.

  • PDF

A study on the modernity strategy to overcome the Western-centrism - By focusing on Lin, Hui-yin and Ling, Shu-hua's feminist literature (서구중심주의를 넘어서기 위한 현대성담론 - 임휘인(林徽因)과 능숙화(凌叔华)의 여성주의문학을 중심으로)

  • Ko, Hae-kyung
    • Cross-Cultural Studies
    • /
    • v.25
    • /
    • pp.363-389
    • /
    • 2011
  • Modern Chinese Literature, the so-called 'feminist' is a very modern and the traditional criticism and took an important position in the double action. Because a woman's freedom from the bondage of traditional ethics of restoring the social status equal to men but to women does not give, that compared to men and women just the dimension of the problem of isolation is not just. It is dominated by yugajeok worldview by streamlining the whole Chinese society to build a modern society and the country was a critical task. However, multi-cultural life of Lin, Hui-yin and Ling, Shu-hua in the history of the world's attention to the shrine was worried attention to soils, rather than East-West dualism law by taking a mixture of both women in modern Chinese literature and Western literature from the center of efforts to overcome the traditional point hayeotdaneun feminist literature that may be different. Lin, Hui-yin and Ling, Shu-hua to overcome the Western-oriented culture really the true dream of China's globalization and localization could be regarded. She naesewotdeon the banner of feminist literature in the traditional 'anti feudal', 'free personality' silcheondoen under such slogans as well as women's liberation from traditional, male-oriented perspective away from the women's unique experiences and new understanding of the value of the superiority the concept of a woman, and was to create. In particular, the femininity of these women who traditionally associated with women and the unique culture - the creation of a new consciousness, a re-evaluation of traditional feminine skills and talents was to try to.

A new method to predict the critical incidence angle for buildings under near-fault motions

  • Sebastiani, Paolo E.;Liberatore, Laura;Lucchini, Andrea;Mollaioli, Fabrizio
    • Structural Engineering and Mechanics
    • /
    • v.68 no.5
    • /
    • pp.575-589
    • /
    • 2018
  • It is well known that the incidence angle of seismic excitation has an influence on the structural response of buildings, and this effect can be more significant in the case of near-fault signals. However, current seismic codes do not include detailed requirements regarding the direction of application of the seismic action and they have only recently introduced specific provisions about near-fault earthquakes. Thus, engineers have the task of evaluating all the relevant directions or the most critical conditions case by case, in order to avoid underestimating structural demand. To facilitate the identification of the most critical incidence angle, this paper presents a procedure which makes use of a two-degree of freedom model for representing a building. The proposed procedure makes it possible to avoid the extensive computational effort of multiple dynamic analyses with varying angles of incidence of ground motion excitation, which is required if a spatial multi-degree of freedom model is used for representing a building. The procedure is validated through the analysis of two case studies consisting of an eight- and a six-storey reinforced concrete frame building, selected as representative of existing structures located in Italy. A set of 124 near-fault ground motion records oriented along 8 incidence angles, varying from 0 to 180 degrees, with increments of 22.5 degrees, is used to excite the structures. Comparisons between the results obtained with detailed models of the two structures and the proposed procedure are used to show the accuracy of the latter in the prediction of the most critical angle of seismic incidence.

Agent Based Information Security Framework for Hybrid Cloud Computing

  • Tariq, Muhammad Imran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.406-434
    • /
    • 2019
  • In general, an information security approach estimates the risk, where the risk is to occur due to an unusual event, and the associated consequences for cloud organization. Information Security and Risk Management (ISRA) practices vary among cloud organizations and disciplines. There are several approaches to compare existing risk management methods for cloud organizations but their scope is limited considering stereo type criteria, rather than developing an agent based task that considers all aspects of the associated risk. It is the lack of considering all existing renowned risk management frameworks, their proper comparison, and agent techniques that motivates this research. This paper proposes Agent Based Information Security Framework for Hybrid Cloud Computing as an all-inclusive method including cloud related methods to review and compare existing different renowned methods for cloud computing risk issues and by adding new tasks from surveyed methods. The concepts of software agent and intelligent agent have been introduced that fetch/collect accurate information used in framework and to develop a decision system that facilitates the organization to take decision against threat agent on the basis of information provided by the security agents. The scope of this research primarily considers risk assessment methods that focus on assets, potential threats, vulnerabilities and their associated measures to calculate consequences. After in-depth comparison of renowned ISRA methods with ABISF, we have found that ISO/IEC 27005:2011 is the most appropriate approach among existing ISRA methods. The proposed framework was implemented using fuzzy inference system based upon fuzzy set theory, and MATLAB(R) fuzzy logic rules were used to test the framework. The fuzzy results confirm that proposed framework could be used for information security in cloud computing environment.

Prior Task to Prepare for International Terrorism: Focusing on Multiple-use Facilities (국제테러리즘 대비를 위한 선결과제 : 다중이용시설을 중심으로)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.89-93
    • /
    • 2018
  • As terrorist organizations like ISIL and Al-Qaeda attack multiple-use facilities such as subways and department stores that many unknown citizens are using, the fear and anxiety are expanding. If international terrorism occurs in Korea, it may attack multiple-use facilities. Therefore, we need to have countermeasures against the attack. However, as the concept of multiple-use facilities has multi-faceted meanings and the scope is wide, there is a limitation in the preparation for international terrorism. In this study, it was tried to find the solution through reviewing the multiple-use facilities related laws. First of all, as the multiple-use facilities related laws were legislated by government organizations according to the necessities, the concept and scope are very inclusive. Therefore, it is possible to have controversies on the scope of the review related to anti-terrorism. Next, the department responsible for the international terrorism is not clear, which can make issue of rights and responsibility. To overcome such limitations, this study tried to set the concept and scope of multiple-use facilities and discussed the issue of the responsible department.

  • PDF

A HARMS-based heterogeneous human-robot team for gathering and collecting

  • Kim, Miae;Koh, Inseok;Jeon, Hyewon;Choi, Jiyeong;Min, Byung Cheol;Matson, Eric T.;Gallagher, John
    • Advances in robotics research
    • /
    • v.2 no.3
    • /
    • pp.201-217
    • /
    • 2018
  • Agriculture production is a critical human intensive task, which takes place in all regions of the world. The process to grow and harvest crops is labor intensive in many countries due to the lack of automation and advanced technology. Much of the difficult, dangerous and dirty labor of crop production can be automated with intelligent and robotic platforms. We propose an intelligent, agent-oriented robotic team, which can enable the process of harvesting, gathering and collecting crops and fruits, of many types, from agricultural fields. This paper describes a novel robotic organization enabling humans, robots and agents to work together for automation of gathering and collection functions. The focus of the research is a model, called HARMS, which can enable Humans, software Agents, Robots, Machines and Sensors to work together indistinguishably. With this model, any capability-based human-like organization can be conceived and modeled, such as in manufacturing or agriculture. In this research, we model, design and implement a technology application of knowledge-based robot-to-robot and human-to-robot collaboration for an agricultural gathering and collection function. The gathering and collection functions were chosen as they are some of the most labor intensive and least automated processes in the process acquisition of agricultural products. The use of robotic organizations can reduce human labor and increase efficiency allowing people to focus on higher level tasks and minimizing the backbreaking tasks of agricultural production in the future. In this work, the HARMS model was applied to three different robotic instances and an integrated test was completed with satisfactory results that show the basic promise of this research.

Traffic control technologies without interruption for component replacement of long-span bridges using microsimulation and site-specific data

  • Zhou, Junyong;Shi, Xuefei;Zhang, Liwen;Sun, Zuo
    • Structural Engineering and Mechanics
    • /
    • v.70 no.2
    • /
    • pp.169-178
    • /
    • 2019
  • The replacement of damaged components is an important task for long-span bridges. Conventional strategy for component replacement is to close the bridge to traffic, so that the influence of the surrounding environment is reduced to a minimum extent. However, complete traffic interruption would bring substantial economic losses and negative social influence nowadays. This paper investigates traffic control technologies without interruption for component replacement of long-span bridges. A numerical procedure of traffic control technologies is proposed incorporating traffic microsimulation and site-specific data, which is then implemented through a case study of cable replacement of a long-span cable-stayed bridge. Results indicate traffic load effects on the bridge are lower than the design values under current low daily traffic volume, and therefore cable replacement could be conducted without traffic control. However, considering a possible medium or high level of daily traffic volume, traffic load effects of girder bending moment and cable force nearest to the replaced cable become larger than the design level. This indicates a potential risk of failure, and traffic control should be implemented. Parametric studies show that speed control does not decrease but increase the load effects, and flow control using lane closure is not effectual. However, weight control and gap control are very effective to mitigate traffic load effects, and it is recommended to employ a weight control with gross vehicle weight no more than 65 t or/and a gap control with minimum vehicle gap no less than 40 m for the cable replacement of the case bridge.

Research and Optimization of Face Detection Algorithm Based on MTCNN Model in Complex Environment (복잡한 환경에서 MTCNN 모델 기반 얼굴 검출 알고리즘 개선 연구)

  • Fu, Yumei;Kim, Minyoung;Jang, Jong-wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.50-56
    • /
    • 2020
  • With the rapid development of deep neural network theory and application research, the effect of face detection has been improved. However, due to the complexity of deep neural network calculation and the high complexity of the detection environment, how to detect face quickly and accurately becomes the main problem. This paper is based on the relatively simple model of the MTCNN model, using FDDB (Face Detection Dataset and Benchmark Homepage), LFW (Field Label Face) and FaceScrub public datasets as training samples. At the same time of sorting out and introducing MTCNN(Multi-Task Cascaded Convolutional Neural Network) model, it explores how to improve training speed and Increase performance at the same time. In this paper, the dynamic image pyramid technology is used to replace the traditional image pyramid technology to segment samples, and OHEM (the online hard example mine) function in MTCNN model is deleted in training, so as to improve the training speed.

The Image of Suicide as the Functions of Reality and Art (현실과 예술적 기능으로서의 자살 이미지)

  • Choi, Eunjoo
    • English & American cultural studies
    • /
    • v.13 no.1
    • /
    • pp.83-103
    • /
    • 2013
  • This paper focuses on the function of suicidal images in the history of art including literature. Death has been romanticized or repoliticized into an existential act of defiance and rebellion in literary works, so questions remain about the correlation between literary suicide and the essence of suicide. Although Jacques Ranciere insists that the order of art contrasts with the order of common people whose acts and gestures can express either their specific purposes nor the rationalities of their frustration, literary suicide reflects the outside life of readers. In fact, images of suicide produces the order of things about the real world. William Shakespeare's Hamlet handled two oppositional self-murder significantly. As Ron M. Brown pointed out, Hamlet, by choosing confrontation, seeks out an end which is voluntary, thus he avoids self-destruction and feels triumph of heroic fashion. Ophelia's self-chosen death stems from loss, frailty and the disintegration of reason, which demeans the act and diminishes her from the tragic to the pathetic(16). In the $19^{th}$ century, the resurrection of Ophelia acted as the context for later periods where life itself is fictionalized from the differing periods of network of signifier and texts. Finally, in Ophelia's case, fiction became life(Brown 285). Her suicidal image was fixed in the Victorian Culture whose visual discourse was strikingly similar to that of the men. Likewise, the ambiguities of the suicide became intertwined with the social, cultural issues of a certain period, and the paradigm of suicide was conformed to the changing needs of successive generations. However, if literary art understands that a European culture grappled with the almost impossible task and coming to terms with this strangest and most persistent of phenomena, it will be able to focus on of the multi-layered suicide by recognizing the inherent instability of the verbal sign which cannot reveal the design and grammar of truth.

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.