• Title/Summary/Keyword: Run-Time Environment

Search Result 282, Processing Time 0.026 seconds

Dog park planning items and needs assessment in consideration of Korean pet culture (애견문화를 고려한 '도그파크' 계획항목과 요구도)

  • Lim, Soo-Hee;Lee, Gwan-Gyu;Yang, Byoung-E
    • KIEAE Journal
    • /
    • v.5 no.1
    • /
    • pp.19-25
    • /
    • 2005
  • Rapid urbanization and social development have brought about changes in family structure. In urbanized areas, recently the number of dogs that are a majority of companion animals has increased significantly in Korea. Consequently, a lot of friction between the general public who are not fond of dogs and dog owners in public places such as parks has been happening. A lot of countries that are taking a lead role in animal welfare have built dog parks that the general public and dogs can enjoy together. This research starts with the realization that the concept of 'dog park' needs to be introduced in Korea as more and more Koreans own dogs and other pets. This research aims to provide guidance for dog park planning by drawing planning items and analyzing the needs of each item. Total 56 planning items including dog zone, dog playground, and dog training facility, are drawn in this research. There are differences in the needs according to sex, age and the amount of time they spent with their dogs, however overall there is the highest needs in separated area for dogs in parks.

Optimization of parameters in mobile robot navigation using genetic algorithm (유전자 알고리즘을 이용한 이동 로봇 주행 파라미터의 최적화)

  • 김경훈;조형석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1161-1164
    • /
    • 1996
  • In this paper, a parameter optimization technique for a mobile robot navigation is discussed. Authors already have proposed a navigation algorithm for mobile robots with sonar sensors using fuzzy decision making theory. Fuzzy decision making selects the optimal via-point utilizing membership values of each via-point candidate for fuzzy navigation goals. However, to make a robot successfully navigate through an unknown and cluttered environment, one needs to adjust parameters of membership function, thus changing shape of MF, for each fuzzy goal. Furthermore, the change in robot configuration, like change in sensor arrangement or sensing range, invokes another adjusting of MFs. To accomplish an intelligent way to adjust these parameters, we adopted a genetic algorithm, which does not require any formulation of the problem, thus more appropriate for robot navigation. Genetic algorithm generates the fittest parameter set through crossover and mutation operation of its string representation. The fitness of a parameter set is assigned after a simulation run according to its time of travel, accumulated heading angle change and collision. A series of simulations for several different environments is carried out to verify the proposed method. The results show the optimal parameters can be acquired with this method.

  • PDF

Implementation of Hybrid Deliberative/Reactive Control Architecture for Autonomous Navigation of a Mobile Robot in Dynamic Environments (동적 환경에서 이동로봇의 자율주행을 위한 혼합 심의/반응 제어구조의 구현)

  • Nam Hwa-Sung;Song Jae-Bok
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.2
    • /
    • pp.154-160
    • /
    • 2006
  • Instantaneous reaction and intelligence are required for autonomous mobile robots to achieve multiple goals in the unpredictable and dynamic environments. Design of the appropriate control architecture and clear definitions of systems are needed to construct and control these robots. This research proposes the hybrid deliberative/reactive control architecture which consists of three layers and uses the method of software structure design. The highest layer, Deliberative Layer makes the overall run-time schedule for navigation and/or manipulation, and the middle layer, Task Execution Layer carries out various missions. The lowest layer, Reactive Layer enables a robot to react rapidly in the dynamic environment and controls the mechanical devices concurrently. This paper proposes independent system supervisors called Manager to reuse the modules so that the Manager supports common use of the system and multi-processing tasks. It is shown that the mobile robot based on the proposed control scheme can perform the basic navigation and cope with the dynamic obstacles reasonably well.

Implementation of a Joint System for Waves and Currents in the Black Sea

  • Toderascu, Robert;Rusu, Eugen
    • International Journal of Ocean System Engineering
    • /
    • v.4 no.1
    • /
    • pp.29-42
    • /
    • 2014
  • The objective of this paper is to present the implementation of a joint modeling system able to evaluate the propagation of the polluting agents in the marine environment. The system is composed by circulation model (Mohid) and a spectral wave model (SWAN). The results coming from the circulation model are provided as input to the SWAN simulations. Following this target the Mohid water circulation model was implemented and calibrated in the Black Sea basin. The current simulations were run for one year (2010) with a time step of 24 hours, using wind fields from ECMWF. The results concerning the current fields were introduced into SWAN, and the difference between the results of the SWAN simulations with and without the current input from Mohid was assessed. In this regard, 10 points where the significant wave height difference is higher were considered and analyzed. The conclusion of the work is that such a joint system provides more reliable results concerning the wave and current conditions in the Black Sea as it is very useful in providing the support in the case of the environmental alerts that may occur in marine environments.

A Methodology for Security Vulnerability Assessment Process on Binary Code (실행코드 취약점 분석 프로세스 방법론)

  • Hwang, Seong-Oun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.237-242
    • /
    • 2012
  • Cyber attacks have rapidly increased by exploiting the underlying vulnerabilities in the target software. However, identifying and correcting these vulnerabilities are extremely difficult and time consuming tasks. To address these problems efficiently, we propose a systematic methodology for security vulnerability assessment process on binary code in the paper. Specifically, we first classified the existing vulnerabilities based on whether the target software run in a Web environment and features of the software. Based on the classification, we determined the list and scope of the vulnerabilities. As our future research direction, we need to further refine and validate our methodology.

Development of the Experimental Driving System with PLD for PDPs (PLD를 사용한 PDP용 구동실험장치의 개발)

  • Son, Hyeon-Sung;Lim, Chan-Ho;Ryeom, Jeong-Duk
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.3
    • /
    • pp.48-54
    • /
    • 2004
  • We have developed a new experimental driving system in order to make an easier drive experiment of PDP. By using the system, we can design and simulate the timing of the pulse in computer environment. As a result of the designed timing, we are able to program at PLD(Programmable Logic Device) and control high-voltage FET switches. The new system can reduce the time of the pulse compared with the previous logic gate ICs that realizes switching logic through hardware. In addition, it is a much easier way of changing the timing of the pulse due to the change of the driving method. By using the developed driving system we experimented on two different things- First, the realization of ADS Driving Method that run commonly; Second, gray scale realization on the three electrodes AC PDP.

Development of New Rapid Prototyping System Performing both Deposition and Machining (II) (적층과 절삭을 복합적으로 수행하는 새로운 개념의 판재 적층식 쾌속 시작 시스템의 개발(II) - 공정계획 시스템 -)

  • Heo, Jeong-Hun;Lee, Geon-U
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.9 s.180
    • /
    • pp.2235-2245
    • /
    • 2000
  • The necessity of using rapid prototyping(RP) for short-run manufacturing is continuously driving a development of a cost-effective technique that will produce completely-finished quality parts in a very short time. To meet these demands, the improvements in production speed, accuracy, materials, aid cost are crucial. Thus, a new hybrid-RP system performing both deposition and machining in a station is proposed. For the new hybrid RP process to maintain the same degree of process automation as in currently available processes like SLA or FDNI, a sophisticated process planning system is developed. In the process planner, CAD models(STEP AP203) are partitioned into 3D manufacturable volumes called 'Ueposition feature segment"(DFS) after machining features called "machining feature segmenf'(MFS) are extracted from the initial CAD model. Once MFS and DFS are identified, the process planner arranges them into a chain of processes and automatically generates machining information for each DFS and MFS. The goal of this paper is to present a framework for a process planning system for hybrid RP processes and to outline the geometric algorithms involved in developing such an environment.

An Efficient Encryption Technique for Cloud-Computing in Mobile Environments (모바일환경에서 클라우드 컴퓨팅 보안을 위한 효율적인 암호화기술)

  • Hwang, Jae-Young;Choi, Dong-Wook;Chung, Yeon-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.298-302
    • /
    • 2011
  • In this paper, we propose an efficient encryption algorithm for ensuring data privacy and security for cloud computing in mobile environments. As part of the evaluation of the proposed algorithm, we have implemented the algorithm in a PC environment and compared with the well-known encryption algorithm of the Data Encryption Standard (DES). The conventional DES algorithm is hard to maintain privacy, due to the fact that its initial and final permutation are known to the network To prevent this critical weakness, a triple DES algorithm has been reported, but it has a disadvantage of long encryption time. In this study, we propose random interleaving algorithm that uses the permutation table for improving privacy further. The proposed algorithm is found to run faster than the triple DES algorithm and also offers improved security in a wireless communication system.

A Design of A Dynamic Configurational Multimedia Spreadsheet for Effective HCI (효과적인 HCI를 위한 동적 재구성 멀티미디어 스프레드쉬트 설계)

  • Jee Sung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.14-22
    • /
    • 2006
  • The multimedia visualizational spreadsheet environment is shown to be extremely effective in supporting the organized visualization of multi-dimensional data sets. In this paper, we designed the visualization model that consists of the configurational 2D arrangement of spreadsheet elements at run time and each spreadsheet element has a novel framestack. As the feature, it supports 3D data structure of each element on the proposed model. It enables the visualization spreadsheet 1) to effectively manage, organize, and compactly encapsulate multi-dimensional data sets, 2) to reconfigure cell-structures dynamically according to client request, and 3) to rapidly process interactive user interface. Using several experiments with scientific users, the model has been demonstrated to be a highly interactive visual browsing tool for 2D and 3D graphics and rendering in each frame.

  • PDF

The Emergence of Competitiveness in Korea-China Ship Distribution Industry

  • Lee, Jae-Sung;Kim, Yung-Keun;Noh, Hyun-Soo
    • Journal of Distribution Science
    • /
    • v.13 no.7
    • /
    • pp.11-18
    • /
    • 2015
  • Purpose - This paper reviews the changes in the ship export and import structure between Korea and China. It utilizes the comparative advantage trade theory to analyze time-series statistical data from the market share index, revealed comparative advantage index (RCA), and trade specialization index(TSI). Research design, data, and methodology - Based on their economic phases, both Korea and China have similar country characteristics. The purpose of this research is to understand the two country's trade structures to fortify the Korea-Sino economic relationship including verifying what is working and what is not. Results - Based on the analysis, bilateral economic activity to achieve a plus trade stimulus environment should be realized in the long run. Both countries should establish guarantee-free trade negotiations and boundaries instead of various non-tariff barriers. Conclusion - Reviewing the research, a sound competitive relationship can be grown for mutual benefit including export market diversification in the near future. The review of the Korea-Sino ship industry is keenly important and investigative research about it is timely because it is a major industry in each country.