• Title/Summary/Keyword: discrete association task

Search Result 3, Processing Time 0.015 seconds

Comparison of word association between adults and children (대학생과 초등학생의 단어 연상 비교)

  • Park, Mi-Cha
    • Korean Journal of Cognitive Science
    • /
    • v.19 no.1
    • /
    • pp.17-39
    • /
    • 2008
  • The present study was conducted to provide Korean word association lists for adults and children which are needed in research area of false memory. Associated words, asso[iation strength, and the proportion of cue set size to the total number of associated words produced through the discrete association technique were compared between the two groups. The data showed that associated words with high strength wert same or similar but associated words with lower strength were various in the two groups. The result that adults produced larger proportion of cue set size than children suggests that adults have more typical and more convergent semantic network than children. The present data will be served as a database useful for the studies to investigate cognitive functions in memory and other related area.

  • PDF

Indirect Decentralized Learning Control for the Multiple Systems (복합시스템을 위한 간접분산학습제어)

  • Lee, Soo-Cheol
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 1996.11a
    • /
    • pp.217-227
    • /
    • 1996
  • The new field of learning control develops controllers that learn to improve their performance at executing a given task, based on experience performin this specific task. In a previous work[6], the authors presented a theory of indirect learning control based on use of indirect adaptive control concepts employing simultaneous identification ad control. This paper develops improved indirect learning control algorithms, and studies the use of such controllers in decentralized systems. The original motivation of the learning control field was learning in robots doing repetitive tasks such as on an assembly line. This paper starts with decentralized discrete time systems, and progresses to the robot application, modeling the robot as a time varying linear system in the neighborhood of the nominal trajectory, and using the usual robot controllers that are decentralized, treating each link as if it is independent of any coupling with other links. The basic result of the paper is to show that stability of the indirect learning controllers for all subsystems when the coupling between subsystems is turned off, assures convergence to zero tracking error of the decentralized indirect learning control of the coupled system, provided that the sample time in the digital learning controller is sufficiently short.

  • PDF

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF