• 제목/요약/키워드: computer environment

검색결과 8,387건 처리시간 0.034초

미지 환경에서의 자율주행 로봇의 청소 알고리즘 (A Sweeping Algorithm for an Autonomous Mobile Robot under the Unknown Environment)

  • 박주용;이기동
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제48권1호
    • /
    • pp.61-67
    • /
    • 1999
  • There has been an ever increasing interest in mobile robot for home services. However, issues currently being investigated for path planning of the mobile robot is concentrated to solving the problem of finding the optimal path from the initial location to the final location under the given performance index. In this study, we newly present a sweeping algorithm for autonomous mobile robot to cover the whole closed area under the unknown environment. And we verify the validity the validity of the formalized algorithm by computer simulation with the changing environment conditions. In addition to this, we analyse the effect of real system implementation of the proposed algorithm to a experimental miniature mobile robit(Khepera).

  • PDF

MLLR 화자적응 기법을 이용한 적은 학습자료 환경의 화자식별 (Speaker Identification in Small Training Data Environment using MLLR Adaptation Method)

  • 김세현;오영환
    • 대한음성학회:학술대회논문집
    • /
    • 대한음성학회 2005년도 추계 학술대회 발표논문집
    • /
    • pp.159-162
    • /
    • 2005
  • Identification is the process automatically identify who is speaking on the basis of information obtained from speech waves. In training phase, each speaker models are trained using each speaker's speech data. GMMs (Gaussian Mixture Models), which have been successfully applied to speaker modeling in text-independent speaker identification, are not efficient in insufficient training data environment. This paper proposes speaker modeling method using MLLR (Maximum Likelihood Linear Regression) method which is used for speaker adaptation in speech recognition. We make SD-like model using MLLR adaptation method instead of speaker dependent model (SD). Proposed system outperforms the GMMs in small training data environment.

  • PDF

Esterel 인터프리터를 위한 문맥지시적 디버거 (A syntax-directed debugger for Esterel interpreter)

  • 하오 선;임기욱;남지은;이재호;한태숙
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 추계학술발표대회
    • /
    • pp.763-765
    • /
    • 2007
  • As a useful tool for embedded system codesign approach, it's necessary to make a custom-built interpreter for the system description verification. Usually, designers need to write their program to simulate the environment their system works in. Sometimes making the simulation environment consumes designers more time and energy than describing their embedded system. The interpreter saves the cost that is spent on making such an environment. In this paper, the necessity and motivation of the interpreter will be introduced first, and then the details about each part of it will be illuminated.

Virtual Gaming Environments as our Future Adobe

  • Lee, Kang-Hyuk
    • International Journal of Contents
    • /
    • 제7권4호
    • /
    • pp.6-9
    • /
    • 2011
  • Currently, the argument that humanity will eventually reside in some sort of a simulated environment with unlimited resources is actively being discussed in the realm of science and engineering. This paper addresses the issue from the perspective of computer engineering, more specifically in terms of the future gaming environment which is very likely to be brought to us in the form of virtual reality probably in the not-so-distant future. In so doing, Bostrom's simulation argument[1]and Kurzweil's singularity[5] are reviewed, and how our future adobe indistinguishable from our 'real' reality that may be attained by explosive technological advancement relates to the future gaming environment. The problem of human consciousness which is inevitably intertwined with the issue of living in a virtual reality environment is also addressed.

A Graph-based Model for RSUs Deployment in Vehicular Networks by Considering Urban and Network Limitations and QoS Requirements of Service Advertisement and Discovery

  • Balouchzahi, Nik Mohammad;Fathy, Mahmood;Akbari, Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1662-1681
    • /
    • 2015
  • The efficient send and receive of information in VANET improves the efficiency of the safety and traffic services advertisment and discovery. However, if the V2V is the only communication system used, the restrictions of the urban environment and network drop the performance of VANET. In order to improve the performance of the network, it is necessary to use V2I communication as well as V2V communication. Therefore, RSUs must be placed in the environment. However due to the high costs of placement, the full coverage of the environment would not be possible. Therefore, it is necessary to optimally install a limited number of RSUs in the environment.

네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘 (Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment)

  • 장은겸;이범석
    • 디지털산업정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

JXTA Based P2P Services for Mobile Devices

  • Park, Hae-Woo;Jung, Hun;Seo, Yeung-Su;Yu, Chun-Gun;Lee, Jun-Hyuk;Kang, Byung-Wook
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 한국정보컨버전스학회 2008년도 International conference on information convergence
    • /
    • pp.195-198
    • /
    • 2008
  • The JXTA was made in order to solve the problem of being generated with the computer platform suggested with the P2P(Peer-to-peer) method in the distributed computing. JXTA makes a communication between the various network and the devices is connected to a network which possible. It was designed to the client having the minimum computing ability could attend in the peer-to-peer network. However, for smoothly applying JXTA in the wireless environment, there is a limit with the limited resource of the Mobile Device. By using the Relay of the JXTA based for the Mobile Device, this paper implemented the P2P service which is flexibly effective in the wireless network environment.

  • PDF

게임 플레이어의 행동 패턴을 이용한 동적인 게임 환경의 설계 (Design of Dynamic-Game Environment based on Behavior Patterns of Game Player)

  • 윤태복;홍병훈;이지형
    • 한국게임학회 논문지
    • /
    • 제9권2호
    • /
    • pp.125-133
    • /
    • 2009
  • 게임 인공지능은 플레이어에게 지능적이고 적응된 게임 환경을 제공하기 위해 주로 사용된 다. 기존에는 사용자의 게임 행위를 수집/분석하여 동반자 또는 적대적 역할을 하는 Non-player character (NPC)를 위해 사용되었다. 그러나 사용자의 행동을 모방하는 것에서 그치는 경우가 많았다. 본 논문은 사용자의 게임 행위를 분석하여 게임 환경을 변화하는 방법을 소개한다. 사용자의 게임 성향을 파악하기 위해 게임 행위 데이터를 이용하였다. 또한, 사용자의 성향은 지형, 아이템, NPC의 분포를 결정하는데 반영하여 동적인 게임 환경을 제공하기 위해 사용하였다. 제안하는 방법의 실험을 위해 실제 2D 액션 게임에 적용하였고, 사용자의 게임 플레이 행위에 대하여 적절히 변화하는 게임 환경을 확인하였다.

  • PDF

Multi-scale 3D Panor ama Content Augmented System using Depth-map

  • Kim, Cheeyong;Kim, Eung-Kon;Kim, Jong-Chan
    • 한국멀티미디어학회논문지
    • /
    • 제17권6호
    • /
    • pp.733-740
    • /
    • 2014
  • With the development and spread of 3D display, users can easily experience an augmented reality with 3D features. Therefore, the demand for content of an augmented reality is exponentially growing in various fields. A traditional augmented reality environment was generally created by CG(Computer Graphics) modelling production tools. However, this method takes too much time and efforts to create an augmented environment. To create an augmented environment similar to the real world, everything in the real world should be measured, gone through modeling, and located in an augmented environment. But the time and efforts spent in the creation don't produce the same environment as the real world, making it hard for users to feel the sense of reality. In this study, multi-scale 3D panorama content augmented system is suggested by using a depth-map. By finding matching features from images to add 3D features to an augmented environment, a depth-map is derived and embodied as panorama, producing high-quality augmented content system with a sense of reality. With this study, limits of 2D panorama technologies will be overcome and a sense of reality and immersion will be provided to users with a natural navigation.