• Title/Summary/Keyword: 능동적 인공지능

Search Result 40, Processing Time 0.023 seconds

Autonomous Guided Vehicle Control Using SOC Genetic Algorithm (적응적 유전자 알고리즘을 이용한 무인운송차의 제어)

  • Jang, Bong-Seok;Bae, Sang-Hyun;Jung, Heon
    • Journal of Internet Computing and Services
    • /
    • v.2 no.2
    • /
    • pp.105-116
    • /
    • 2001
  • According to increase of the factory-automation's(FA) in the field of production, the autonomous guided vehicle's(AGV) role is also increased, The study about an active and effective controller which can flexibly prepare for the changeable circumstance is in progressed. For this study. the research about ac1ion base system to evolve by itself is also being actively considered In this paper. we composed an ac1ive and effective AGV fuzzy controller to be able to do self-organization, For composing it. we tuned suboptimally membership function using genetic algorithm(GA) and improved the control efficiency by the self-correction and generating the control rules. self-organizing controlled(SOC) fuzzy controller proposed in this paper is capable of Self-organizing by using the characteristics of fuzzy controller and genetic algorithm. It intuitionally controls AGV and easily adapts to the circumstance.

  • PDF

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution (4차 산업혁명 시대의 선제적 위협 대응 모델 연구)

  • Hyang-Chang Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.27-42
    • /
    • 2022
  • In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.

Autopoietic Machinery and the Emergence of Third-Order Cybernetics (자기생산 기계 시스템과 3차 사이버네틱스의 등장)

  • Lee, Sungbum
    • Cross-Cultural Studies
    • /
    • v.52
    • /
    • pp.277-312
    • /
    • 2018
  • First-order cybernetics during the 1940s and 1950s aimed for control of an observed system, while second-order cybernetics during the mid-1970s aspired to address the mechanism of an observing system. The former pursues an objective, subjectless, approach to a system, whereas the latter prefers a subjective, personal approach to a system. Second-order observation must be noted since a human observer is a living system that has its unique cognition. Maturana and Varela place the autopoiesis of this biological system at the core of second-order cybernetics. They contend that an autpoietic system maintains, transforms and produces itself. Technoscientific recreation of biological autopoiesis opens up to a new step in cybernetics: what I describe as third-order cybernetics. The formation of technoscientific autopoiesis overlaps with the Fourth Industrial Revolution or what Erik Brynjolfsson and Andrew McAfee call the Second Machine Age. It leads to a radical shift from human centrism to posthumanity whereby humanity is mechanized, and machinery is biologized. In two versions of the novel Demon Seed, American novelist Dean Koontz explores the significance of technoscientific autopoiesis. The 1973 version dramatizes two kinds of observers: the technophobic human observer and the technology-friendly machine observer Proteus. As the story concludes, the former dominates the latter with the result that an anthropocentric position still works. The 1997 version, however, reveals the victory of the techno-friendly narrator Proteus over the anthropocentric narrator. Losing his narrational position, the technophobic human narrator of the story disappears. In the 1997 version, Proteus becomes the subject of desire in luring divorcee Susan. He longs to flaunt his male egomaniac. His achievement of male identity is a sign of technological autopoiesis characteristic of third-order cybernetics. To display self-producing capabilities integral to the autonomy of machinery, Koontz's novel demonstrates that Proteus manipulates Susan's egg to produce a human-machine mixture. Koontz's demon child, problematically enough, implicates the future of eugenics in an era of technological autopoiesis. Proteus creates a crossbreed of humanity and machinery to engineer a perfect body and mind. He fixes incurable or intractable diseases through genetic modifications. Proteus transfers a vast amount of digital information to his offspring's brain, which enables the demon child to achieve state-of-the-art intelligence. His technological editing of human genes and consciousness leads to digital standardization through unanimous spread of the best qualities of humanity. He gathers distinguished human genes and mental status much like collecting luxury brands. Accordingly, Proteus's child-making project ultimately moves towards technologically-controlled eugenics. Pointedly, it disturbs the classical ideal of liberal humanism celebrating a human being as the master of his or her nature.

Design of Network Security Model using Contract Net Protocol (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계)

  • 서경진;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.11a
    • /
    • pp.23-28
    • /
    • 2002
  • 최근에 분산 시스템과 같이 이기종의 컴퓨팅 환경을 효율적으로 통합하는 방법에 관한 다양한 연구가 진행되고 있다. 네트워크 보안에서는 각 보안 시스템들이 효율적인 침입탐지와 차단을 위해서 분산화되고 있으며 분산된 보안 시스템들을 조정하고 통합하기 위해서 분산인공지능(Distributed Artificial Intelligence)의 개념을 도입하고 있다. 본 논문에서는 분산침입탐지 시스템(Distributed Intrusion Detection System)과 침입차단 시스템(firewall)이 계약망 프로토콜(Contract Net Protocol)에 의해 상호 연동하여 외부 네트워크에서 유입된 패킷의 정보를 통해 침입을 탐지하고 차단하는 네트워크 보안 모델을 설계하였다. 본 연구진이 구성하고 있는 시뮬레이션 환경에서는 네트워크에 존재하는 다양한 보안 모델들을 계층적으로 구성하기 위해 DEVS 방법론을 사용하였다. 보안 시스템의 연동은 계약망 프로토콜에 의해 이루어지는데 네트워크에 분산되어 있는 각각의 전문성을 가진 침입탐지 에이전트들이 중앙 콘솔에 비드(bid)글 제출하고 중앙 콘솔은 최상의 비드를 제출한 에이전트를 선택하여 침입을 탐지하게 된다. 그리고 탐지된 정보를 참조하여 침입차단 시스템은 능동적으로 침입을 차단하게 된다. 이와 같은 모델의 설계를 통해서 기존의 침입탐지 시스템들이 탐지하지 못한 침임을 탐지하게 되고 보안시스템에서의 오류발생빈도를 감소시키며 탐지의 속도를 향상시킬 수 있다.

  • PDF

An Realtime People Tracking Algorithm using Particle Filter (파티클 필터를 이용한 실시간 인물추적 알고리즘 구현)

  • Park, Jung-Hoon;Park, Jin-Bae;Yoon, Tae-Sung
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2768-2770
    • /
    • 2005
  • 컴퓨터 비젼은 지난 30년간 빠른 속도로 발전해왔다. 1970년대 초에는 인공지능분야가 굉장히 다양하게 연구되었는데, 그중 Condensation 알고리즘으로 알려진 블레이크 교수의 연구를 시작으로 많은 연구자들이 이 알고리즘을 연구하기 시작했다. 초기 단계에서 이 알고리즘은 파티클 필터라고 알려져 있고, 근래 신호처리 분야에서 두각을 나타내고 있다 하지만 파티클 필터는 내부적인 계산과정 때문에 FrameGrabber가 필요하게 되어 하드웨어 없이는 실시간 처리가 힘들고, 1분에 30프레임의 동영상 규격보다 훨씬 더 많은 50프레임을 사용하고 있다. 이에 본 논문에서는 동영상처리기법에 있어서 DirectX 기반의 제안된 프레임 컨트롤이라는 기법을 사용하여, 변화하는 동영상에 능동적으로 반응하는 하드웨어 없는 프레임 레이트(Framerate) 컨트롤 엔진을 사용하여, 실시간 인물 추적 알고리즘을 구현하려 한다.

  • PDF

Real-time active vision system using log-polar transform (다해상도 변환을 이용한 실시간 능동 시각 시스템)

  • 이상웅;최형철;강성훈;유명현;이성환
    • Proceedings of the Korean Society for Cognitive Science Conference
    • /
    • 2000.05a
    • /
    • pp.25-30
    • /
    • 2000
  • KUeyes(Korea University's eyes)는 인간의 시각 정보처리 과정을 모델로 하여 고려대학교 인공시각연구센터에서 개발된, 스테레오 컬러 영상을 실시간으로 처리할 수 있는 능동시각 시스템이다. 실시간 처리를 위하여 KUeyes는 병렬 처리가 가능하도록 개발된 영상 획득 및 영상 처리 모듈을 가지고 있으며, 다해상도 영상 변환 기법을 사용하여 입력 영상의 처리속도를 증진시키고 있다. 이 시스템은 외형적으로는 처리된 영상에 따라 반응하여 움직이는 10-자유도의 헤드 아이 시스템으로 구성되어 있다. 본 연구에서는 영상의 칼라 정보와 움직임 정보 등을 실시간으로 분석하여 지능적이고 빠르게 개체를 탐지하고 추적하는 인간의 시각 반응 및 인식 모델을 KUeyes에 탑재하여 구현하고 실험하였다. 실험에서 얻어진 결과는 KUeyes가 인간의 시각, 인식시스템을 적절히 모델링하고 있음을 보여 주었다. 이는 KUeyes의 작동 방식과 거기에 탑재된 영상 처리 기법들이 인간의 시각 정보처리 과정을 이해하는데 매우 적합한 것임을 시사한다.

  • PDF

Development of AI Speaker with Active Interaction Customized for the Elderly (고령자 맞춤 능동적 상호작용의 AI스피커 개발)

  • Jeong, Jae-Heon;Jang, Ji-Hoon;Moon, Mikyeong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1223-1230
    • /
    • 2020
  • Due to the aging of the population, the number of the elderly is increasing, and the nuclear family is rapidly progressing. Today's AI speakers respond to user's commands rather than conversations that occur on a daily basis. If the elderly living alone do not talk first, the usability of the AI speaker will decrease. In this paper, it describes the development of AI speakers for active interaction tailored to the aged. This speaker can identify the movements of the elderly who live alone and their surroundings, actively speak to them, and display emotional expressions appropriate to the content of the conversation. Through this, users will be able to anthropomorphize AI speakers, so they can feel familiarity and emotional conversation is expected to play a positive role in easing their loneliness.

A Study on the MyData Service Model Based on DID Platform (DID 플랫폼 기반의 마이데이터 서비스 모델 연구)

  • Sohyeon Park;Hyunjun Kim;Kanghyo Lee;Tae Gyun Ha;Kyungbaek Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.268-270
    • /
    • 2023
  • 기존 Web2.0 시대의 플랫폼 기업은 서비스를 통해 생성된 개인 데이터로 다양한 비즈니스를 창출해왔다. 하지만 데이터 제공자인 개인은 해당 수익에서 제외되는 모순된 상황에 놓였다. 이에 개인이 자신의 데이터를 적극 관리·통제하면서 능동적으로 활용할 수 있는 개념인 마이데이터(MyData)가 등장했다. 국내에서는 '20.8월 데이터3법(개인정보보호법, 신용정보법, 정보통신망법)이 통과되면서 신용정보법에 근거해 금융 분야 마이데이터 서비스가 활성화되기 시작했다. 그러나 현존하는 마이데이터 플랫폼은 중앙화된 시스템으로 본래 취지와 다르게 개인의 데이터 소유권과 통제권을 보장하기에 부족하다. 이에 본 논문에서는 기존 마이데이터 플랫폼의 한계점을 분석하고, Web3.0 등 변화하는 환경에서 개인의 데이터 주권을 보장하고, 데이터 가치를 공정하게 분배받을 수 있는 DID 플랫폼 기반의 마이데이터 서비스 모델을 제안한다.

Active Object Tracking System based on Stereo Vision (스테레오 비젼 기반의 능동형 물체 추적 시스템)

  • Ko, Jung-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.159-166
    • /
    • 2016
  • In this paper, an active object tracking system basing on the pan/tilt-embedded stereo camera system is suggested and implemented. In the proposed system, once the face area of a target is detected from the input stereo image by using a YCbCr color model and phase-type correlation scheme and then, using this data as well as the geometric information of the tracking system, the distance and 3D information of the target are effectively extracted in real-time. Basing on these extracted data the pan/tilted-embedded stereo camera system is adaptively controlled and as a result, the proposed system can track the target adaptively under the various circumstance of the target. From some experiments using 480 frames of the test input stereo image, it is analyzed that a standard variation between the measured and computed the estimated target's height and an error ratio between the measured and computed 3D coordinate values of the target is also kept to be very low value of 1.03 and 1.18% on average, respectively. From these good experimental results a possibility of implementing a new real-time intelligent stereo target tracking and surveillance system using the proposed scheme is finally suggested.

Simulation and Post-representation: a study of Algorithmic Art (시뮬라시옹과 포스트-재현 - 알고리즘 아트를 중심으로)

  • Lee, Soojin
    • 기호학연구
    • /
    • no.56
    • /
    • pp.45-70
    • /
    • 2018
  • Criticism of the postmodern philosophy of the system of representation, which has continued since the Renaissance, is based on a critique of the dichotomy that separates the subjects and objects and the environment from the human being. Interactivity, highlighted in a series of works emerging as postmodern trends in the 1960s, was transmitted to an interactive aspect of digital art in the late 1990s. The key feature of digital art is the possibility of infinite variations reflecting unpredictable changes based on public participation on the spot. In this process, the importance of computer programs is highlighted. Instead of using the existing program as it is, more and more artists are creating and programming their own algorithms or creating unique algorithms through collaborations with programmers. We live in an era of paradigm shift in which programming itself must be considered as a creative act. Simulation technology and VR technology draw attention as a technique to represent the meaning of reality. Simulation technology helps artists create experimental works. In fact, Baudrillard's concept of Simulation defines the other reality that has nothing to do with our reality, rather than a reality that is extremely representative of our reality. His book Simulacra and Simulation refers to the existence of a reality entirely different from the traditional concept of reality. His argument does not concern the problems of right and wrong. There is no metaphysical meaning. Applying the concept of simulation to algorithmic art, the artist models the complex attributes of reality in the digital system. And it aims to build and integrate internal laws that structure and activate the world (specific or individual), that is to say, simulate the world. If the images of the traditional order correspond to the reproduction of the real world, the synthesized images of algorithmic art and simulated space-time are the forms of art that facilitate the experience. The moment of seeing and listening to the work of Ian Cheng presented in this article is a moment of personal experience and the perception is made at that time. It is not a complete and closed process, but a continuous and changing process. It is this active and situational awareness that is required to the audience for the comprehension of post-representation's forms.