• Title/Summary/Keyword: 경로점

Search Result 1,537, Processing Time 0.025 seconds

Search Space Reduction by Vertical-Decomposition of a Grid Map (그리드 맵의 수직 분할에 의한 탐색 공간 축소)

  • Jung, Yewon;Lee, Juyoung;Yu, Kyeonah
    • Journal of KIISE
    • /
    • v.43 no.9
    • /
    • pp.1026-1033
    • /
    • 2016
  • Path-finding on a grid map is a problem generally addressed in the fields of robotics, intelligent agents, and computer games. As technology advances, virtual game worlds tend to be represented more accurately and more realistically, resulting in an excessive increase in the number of grid tiles and in path-search time. In this study, we propose a path-finding algorithm that allows a prompt response to real-time queries by constructing a reduced state space and by precomputing all possible paths in an offline preprocessing stage. In the preprocessing stage, we vertically decompose free space on the grid map, construct a connectivity graph where nodes are the decomposed regions, and store paths between all pairs of nodes in matrix form. In the real-time query stage, we first find the nodes containing the query points and then retrieve the corresponding stored path. The proposed method is simulated for a set of maps that has been used as a benchmark for grid-based path finding. The simulation results show that the state space and the search time decrease significantly.

The Relationship between Narcissism and Sexual Aggression: A Path Model (자기애와 성폭력의 관계: 경로모형 검증)

  • Gop Je Park ;Sung moon Lim
    • Korean Journal of Culture and Social Issue
    • /
    • v.19 no.1
    • /
    • pp.45-68
    • /
    • 2013
  • In this study, We examined the dual path model in which entitlement rage and sexual dominance on the one of two pathway, sexual permissiveness and sexual objectification on another pathway mediated the relation between narcissism and sexual aggression. In addition, it was investigated whether alcohol use and rape myths acceptance have moderating effects in the pathways from sexual dominance and sexual objectification to sexual aggression on our path model. Data from 368 male college students in four university in Chungcheong province were analyzed using structural equation modeling. Results in structural equation modeling exhibited that narcissism affected sexual aggression through mediating effects of entitlement rage and sexual dominance, and through mediating effects of sexual permissiveness and sexual objectification. Furthermore, alcohol use and rape myths acceptance only moderated the relation between sexual dominance and sexual aggression on our model. We discussed the meaning of results and the implications for further study.

Design and Implementation of Ethernet Bandwidth Manager for Supporting Controlled-Load Service (부하제어형 서비스 지원을 위한 이더넷 대역폭 관리기의 설계 및 구현)

  • Kim, Byeong-Sik;Lee, Jae-Kuk;Chun, Woo-Jik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.430-440
    • /
    • 2000
  • To support Integrated Services in the Internet, the Internet Engineering Task Force(IETF) has developed new mechanisms. These new mechanisms include Resource Reservation Protocol(RSVP) and Integrated Services model. RSVP and Integrated Services are independent of the underlying link layer technologies and it is necessary to define the mapping of RSVP and Integrated Services specifications onto specific link layer technologies. IETF proposed a Subnet Bandwidth Manager(SBM) providing a method for mapping RSVP onto IEEE802 style networks. However, the SBM has several constraints and problems. For solving these constraints and problems, we design and implement a new Ethernet Bandwidth Manager(EBM). This paper discusses (1) new bandwidth management mechanism independent of RSVP, (2) simulation of Ethernet bandwidth to analyze the characteristics of Ethernet and accomplish Ethernet bandwidth management, (3) design and implemetation of EBM that allows Controlled-Load Service, and (4) results of our experiments on EBM.

  • PDF

Development of A Estimation Method of Traffic Demand Between ICs and An Algorithm for Providing Traffic Information (고속도로 IC간 교통수요 추정과 이를 통한 교통정보 제공 알고리즘 개발)

  • Lee, Jun;Cho, Han-Seon;Kwon, Young-In
    • International Journal of Highway Engineering
    • /
    • v.13 no.3
    • /
    • pp.83-91
    • /
    • 2011
  • The objective of VMS(Variable Message Sign) is to provide the traffic information downstream to drivers upstream so that they can choose their routes or expect the travel time to arrive the destination. Because there is not enough time and space to show the message, VMS message should be selected carefully. However, the message of VMS has been simply selected among the pre-designed message sets based on the priority rule of events. If the traffic demand between origin and destination is identified along the freeway, message can be selected to provide the information of a route that more drivers will use. In this study, a time sliced OD(Origin/Destination) estimation method will be developed using the detector information of the on-ramp, exit ramp, and the main lanes. And the strategy of a priority rule of message was planned.

3D Shape Descriptor Based on Surface Distance (표면 거리 기반 3차원 형태 기술자)

  • Park Hyun;Kim Jea-Hyup;Moon Young-Shik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.3 s.309
    • /
    • pp.59-66
    • /
    • 2006
  • In this thesis, we propose a new 3D shape descriptor. The proposed descriptor measures geometric characteristics by using the shortest path on surfaces. The descriptor is robust against a change of local posture. We measure the geometric characteristics of 3D object through a new shape function to construct the shape distribution. The proposed shape function is the shortest path shape function. The shape function measures the distance between two points on the surface of a 3D object. We evaluate the performance of the proposed method, compared with the previous method. The precision of retrievals improved by 23% in the case of articulated objects and is improved by 12% in the case of general objects.

Route matching delivery recommendation system using text similarity

  • Song, Jeongeun;Song, Yoon-Ah
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.151-160
    • /
    • 2022
  • In this paper, we propose an algorithm that enables near-field delivery at a faster and lowest cost to meet the growing demand for delivery services. The algorithm proposed in this study involves subway passengers (shipper) in logistics movement as delivery sources. At this time, the passenger may select a delivery logistics matching subway route. And from the perspective of the service user, it is possible to select a delivery man whose route matches. At this time, the delivery source recommendation is carried out in a text similarity measurement method that combines TF-IDF&N-gram and BERT. Therefore, unlike the existing delivery system, two-way selection is supported in a man-to-man method between consumers and delivery man. Both cost minimization and delivery period reduction can be guaranteed in that passengers on board are involved in logistics movement. In addition, since special skills are not required in terms of transportation, it is also meaningful in that it can provide opportunities for economic participation to workers whose job positions have been reduced.

Design of track path-finding simulation using Unity ML Agents

  • In-Chul Han;Jin-Woong Kim;Soo Kyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.2
    • /
    • pp.61-66
    • /
    • 2024
  • This paper aims to design a simulation for path-finding of objects in a simulation or game environment using reinforcement learning techniques. The main feature of this study is that the objects in the simulation are trained to avoid obstacles at random locations generated on a given track and to automatically explore path to get items. To implement the simulation, ML Agents provided by Unity Game Engine were used, and a learning policy based on PPO (Proximal Policy Optimization) was established to form a reinforcement learning environment. Through the reinforcement learning-based simulation designed in this study, we were able to confirm that the object moves on the track by avoiding obstacles and exploring path to acquire items as it learns, by analyzing the simulation results and learning result graph.

A Path Analytic Exploration of Consumer Information Search in Online Clothing Purchases (온라인 의복구매를 위한 소비자 정보탐색의 경로분석적 탐구)

  • Kim, Eun-Young;Knight, Dee K.
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.12
    • /
    • pp.1721-1732
    • /
    • 2007
  • This study identified types of information source, and explored a path model for consumer information search by shopping attributes in the context of online decision making. Participants completed self-administered questionnaires during regularly scheduled classes. A total of 219 usable questionnaires were obtained from respondents who enroll at universities in the southwestern region of the United States. For data analysis, factor analysis and path model estimation were used. Consumer information source was classified into three types for online clothing purchases: Online source, Offline retail source, and Mass media. Consumers were more likely to rely on offline retail source for online clothing purchases, than other sources. In consumer information search by shopping attributes, online sources were more likely to be related to transaction-related attributes(e.g., incentive service), whereas offline retail source(e.g., displays in stores, manufacturer's catalogs and pamphlets) were more likely to be related to product and market related attributes(e.g., aesthetics, price) when purchasing clothing online. Also, the path model emphasizes the effect of shopping attributes on traditional retailer search behavior, leading to online purchase intention for clothing. This study supports consumer information search by attributes, and discusses a managerial implication of multi-channel retailing for apparel.

Survey of Knowledge and Attitudes about HIV/AIDS in Some Male High School Students (남자고등학생(男子高等學生)들의 HIV/AIDS에 대한 지식(知識)과 태도(態度)조사(調査))

  • Lee, Ji-Yong;Lee, Moo-Sik;Hong, Jee-Young;Lim, Nam-Gu
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.331-335
    • /
    • 2009
  • 본 연구는 AIDS에 대한 지식과 태도를 파악하여 AIDS에 관한 올바른 지식을 전달할 수 있고, AIDS 교육의 기초 자료를 확보하고 제공하여 남자고등학생들의 AIDS예방과 편견불식에 도움을 주고자 시도 되었다. 조사 대상자는 울산지역에 소재하는 D고등학교 전교생 961명을 조사 대상으로 하여 설문조사를 실시하고 분석하여 906명의 표본으로 다음과 같은 결론을 얻었다. 1. 조사대상자의 AIDS에 대한 지식은 총29점 중 19.7점의 지식도를 보였고, 일반적지식, 전파경로에 대한지식, 예방지식 중 일반적 지식이 가장 높았고 전파경로에 대한 지식이 가장 낮게 조사되었다. 2. 조사대상자의 AIDS에 대한 태도는 100점 환산하여 64.5점의 긍정을 보였고, 그 중 AIDS감염환자에 대한 편견이 있었다. 3. AIDS관련 지식은 AIDS관련 교육횟수, 교육의 도움정도, AIDS관련 정보획득방법, 흡연경험, 음란물접촉경험, 이 성교제경험, 성관계경험에 따라 통계적 유의한 차이를 보였다.(p<0.05) 4. AIDS에 대한 태도는 교육의 도움정도, AIDS관련 정보획득방법, 흡연경험, 음란물접촉경험, 이성교제경험에 따라 통계적 유의한 차 이를 보였다.(p<0.05) 5. AIDS관련 지식과 태도의 상관관계는 흡연경험과 이성교제경험이 있는 학생들에게서 지식의 수준이 낮을수록 긍정적 태도를 보였으며, 음란물접촉경험이 있는 학생들은 지식의 수준이 높을수록 긍정적 태도를 보였으며 통계적으로 유의하였다.(p<0.01) 6. AIDS에 대한 지식과 태도간의 관련성을 살펴보면 일반적 지식과는 0.158, 전파경로에 대한 지식과는 0.161, 예방에 관한 지식과는 0.204로 조사되었고 전체 지식과 태도간의 관련성은 0.198로 통계적으로 유의한 차이가 있었다.(p=.000) 7. 회귀분석 결과 HIV/AIDS에 대한 태도에 영향력이 가장 큰 것은 음주경험(-0.279), 이성 교제경험(0.259), 흡연경험(0.231), 음란물접촉경험(0.180), 예방지식(0.165), 전파경로지식(0.129), 교육도움(-0.125)순이었고 20.7%의 설명력을 가졌다. 고등학생들이 AIDS에 대한 올바른 지식과 감염환자에 대한 편견을 갖지 않도록 많은 교육 시간과 경험적인 학습의 AIDS관련 보건교육이 필요할 것이다.

  • PDF

사이버보안 위협 변화에 따른 취약점 분석 방안

  • Min, Byung-Gil;Ahn, Woogeun;Seo, Jungtaek
    • Review of KIISC
    • /
    • v.24 no.1
    • /
    • pp.7-12
    • /
    • 2014
  • 각종 악성코드와 취약점이 하루가 다르게 출현하고 있다. 주기적인 취약점 분석 평가는 새로운 사이버보안 위협에 신속하게 대응하고 지속적으로 사이버보안을 강화하는 중요한 활동이다. 그러나 최근 스마트폰 이용 확산에 따른 모바일 보안위협 증가와 기반시설 제어시스템에 대한 보안위협 증가는 기존 취약점 분석 평가 방법의 구조적인 변화를 요구하고 있다. 본 논문에서는 스마트폰 테더링과 같은 모바일 보안위협에 따른 취약점 분석 평가 시의 고려사항과 시스템 영향을 최소화 할 수 있는 분석 절차와 방안을 제시하고 있다. BYOD를 사용한 모바일 인터넷 사용은 내 외부 네트워크 구분을 무의미하게 만들고 있기 때문에 다양한 침입경로에 대한 분석이 필요하다. 또한 제어시스템과 같이 높은 가용성이 요구되는 시스템에 대해서는 유휴시간 점검, 백업 시스템 점검, 테스트 베드 등을 사용한 취약점 점검 방법의 도입이 필요하다.