• Title/Summary/Keyword: 패턴 지도 방안

Search Result 373, Processing Time 0.034 seconds

Integration of Blackboard Architecture into Multi-Agent Architecture (블랙보드 구조와 다중 에이전트 구조의 통합)

  • Chang, Hai-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.355-363
    • /
    • 2012
  • The Integration of multi-agent architecture and blackboard architecture may lead to a new architecture to cope with new application areas which need some good and strong points of both the architectures. This paper suggests an integrated architecture of blackboard architecture and multi-agent architecture by using event-based implicit invocation pattern and a blackboard event detection mechanism based on Rete network. From the viewpoints of weak couplings of system components and flexible control of knowledge source agents, it is desirable to use the event-based implicit invocation pattern in the integrated architecture. But the pattern itself does not concern the performance of the architecture, and it is very critical to the performance of the integrated architecture to detect efficiently the blackboard events which can activate knowledge source agents which can contribute to the problem-solving processes of the integrated architecture. The integrated architecture suggested in this paper uses a blackboard event detection mechanism based on Rete network to detect efficiently blackboard events which can activate knowledge source agents.

합리적인 터널설계를 위한 정량화 지표(Multiple Index)개발 및 적용에 관한 연구

  • 위용곤;박준경;전성권;김영근
    • Proceedings of the Korean Society for Rock Mechanics Conference
    • /
    • 2002.10a
    • /
    • pp.31-42
    • /
    • 2002
  • 최근 지하철 터널은 사용자 편의성, 도심지 접근성 및 원활한 교통처리 등을 고려하여 지반조건이 불리한 상황에서도 터널로 계획되는 경우가 많아지고 있다 따라서 시공중의 터널안정성확보, 굴착에 따른 인접구조물의 침하영향, 발파진동영향 등을 종합적으로 고려한 지보패턴 및 보조·보강공법의 결정이 매우 중요하나 정량적인 판단기준의 부재로 인하여 주로 경험적인 설계에 의존하는 경우가 많다. 본 연구에서는 도심지 지하철 터널의 복합적인 거동특성을 고려하기 위하여 여러 가지 예상위험요소의 정량화 방안을 제안하고, 다변량 통계분석기법을 활용하여 여러 가지 위험 요소들의 특성을 함축적으로 나타내는 소수의 총합적인 지표(안정성인자, 환경성인자)로 대표화 할 수 있음을 검증하였다. 안정성 인자 및 환경성 인자를 이용한 서울시 지하철 00공구 설계사례를 통해 정량화지표(Multiple Index)의 터널설계에의 적용성을 평가하고 이의 설계시 활용방안을 제안하고자 하였다.

  • PDF

Application of Genetic Algorithm for Railway Crew Rostering (철도 승무교번 배치를 위한 유전알고리즘 적용방안)

  • Park, Sang mi;Kim, Hyeon Seung;Kang, Leen Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.133-141
    • /
    • 2019
  • Crew rostering in railway operations is usually done by arranging a crew diagram in accordance with working standards every month. This study was done to identify the problems related to the creation of crew rosters in railway operations and to suggest an optimum crew rostering method that can be applied in railway operations planning. To do this, the work standards of a railway company were identified, and a genetic algorithm was used to develop an optimal roster with equal working time while considering actual working patterns. The optimization process is composed of analysis of the input data, creation of work patterns, creation of a solution, and optimization steps. To verify the method, the roster derived from the proposed process was compared with a manually created roster. The results of the study could be used to reduce the deviation of business hours when generating a roster because the standard deviation of working time is the objective function.

Analysis of Scratch code for Student Assessment about Computational Thinking Capability (Computational Thinking 역량에 대한 학습자 평가를 위한 스크래치 코드 분석)

  • Kim, Soohwan
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.5
    • /
    • pp.25-34
    • /
    • 2015
  • The purpose of this research is to suggest the method of code analysis for evaluating learners' projects in computational thinking(CT) education. Recently, block programming tools are applied to K-12 SW education, this study considered the assessment method for evaluating students' levels and learning about CT concepts through analyzing codes of the Scratch projects that students created. As a result from the analysis of 45 projects of novices, it showed the bad coding patterns of novices and verified that it is possible to evaluate students' learning about CT concepts through the analysis of their codes. The higher learner's level, the greater scores of logical thinking, synchronization, flow control, and data representation. This result is able to apply to student assessment of CT concepts in K-12 SW education.

Development, value and use of wetland inventory (습지목록의 개발, 가치 및 활용방안)

  • Yi, Gi Chul
    • Journal of Wetlands Research
    • /
    • v.14 no.2
    • /
    • pp.303-315
    • /
    • 2012
  • This study developed a wetland inventory describing the characteristics and change of Nakdong estuary wetland ecosystem. The data which are used to develop the inventory are Landsat TM(April 1, 1986; June 23, 1987; June 18, 1997), Kompsat(Jan. 12, 2008) and LiDAR(March 1, 2009) images and published monitoring data of Busan metropolitan city. The developed inventory was utilized for the classification of wetland cover, the spatiotemporal analysis of wetland and landscape pattern, the distribution of benthos species etc. Furthermore, the developed 3 dimensional wetland map showed a better way to delineate wetland boundary and understand wetland dynamics. Considering these results, it's concluded that it is possible to use the similar techniques for the development of wetland inventory in Korea.

A Study on Metering Data De-identification Method for Smart Grid Privacy Protection (스마트그리드 개인정보보호를 위한 미터링 데이터 비식별화 방안 연구)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1593-1603
    • /
    • 2016
  • In the smart grid environment, there are various security threats. In particular, exposure of smart meter data can lead to serious privacy violation. In this paper, we propose a method for de-identification method of metering data. The proposed method is to de-identify the time data and the numeric data, respectively. Therefore, it can't analyze the pattern information from the metering data. In addition, there is an advantage that the query is available, such as the range of search in the database for statistical analysis.

Framework Architecture of Intrusion Detection System against Denial-of-Service Attack, especially for Web Server System (웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성)

  • Kim, Yoon-Jeong
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • The pattern matching part of Intrusion Detection System based on misuse-detection mechanism needs much processing time and resources, and it has become a bottleneck in system performance. Moreover, it derives denial-of-service attack. In this paper, we propose (1) framework architecture that is strong against denial-of-service attack and (2) efficient pattern matching method especially for web server system. By using both of these 2 methods, we can maintain web server system efficiently secure against attacks including denial-of-service.

  • PDF

A study for object recognition based on location information (위치 정보 기반 객체인지에 대한 연구)

  • Kim, Kwan-Joong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1988-1992
    • /
    • 2013
  • In this paper, we propose a method of object recognition to real image object which enter into an area. We needs this method for an application module to detect and trace the moving pattern of some objects entered into an specific area. A scheme to the object recognition is adopted to some applied modules that it is moved from only real image information recognition to real coordination recognition, the mapping between the GPS coordination and real image information provides object coordination.

Integrated Procedure of Self-Organizing Map Neural Network and Case-Based Reasoning for Multivariate Process Control (자기조직화 지도 신경망과 사례기반추론을 이용한 다변량 공정관리)

  • 강부식
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.1
    • /
    • pp.53-69
    • /
    • 2003
  • Many process variables in modem manufacturing processes have influence on quality of products with complicated relationships. Therefore, it is necessary to control multiple quality variables in order to monitor abnormal signals in the processes. This study proposes an integrated procedure of self-organizing map (SOM) neural network and case-based reasoning (CBR) for multivariate process control. SOM generates patterns of quality variables. The patterns are compared with the reference patterns in order to decide whether their states are normal or abnormal using the goodness-of-fitness test. For validation, it generates artificial datasets consisting of six patterns, normal and abnormal patterns. Experimental results show that the abnormal patterns can be detected effectively. This study also shows that the CBR procedure enables to keep Type 2 error at very low level and reduce Type 1 error gradually, and then the proposed method can be a solution fur multivariate process control.

  • PDF

The Design and Implementation of System for Blocking the Harmful Information on Client/server Environment (클라이언트/서버 환경에서 유해정보차단을 위한 시스템의 설계 및 구현)

  • 염태영
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.10
    • /
    • pp.571-580
    • /
    • 2003
  • A intercepting program of Black List Filtering System is widely used for blocking the harmful information in the internet. Hut The Black List Filtering System give rise to reduce the performance of Client PC. In this thesis the author proposes the good way to solve a problem of the Black List Filtering System. Keep to the point that is puting the black List into The Black List Serve on Client/server Environment and building Black List into Client PC in use of revisiting pattern of web-user. The best effect that tried to Solve the problem in the experiment concerning the thesis is presented not only to maintain the performance of Client PC, but also to improve the speed of performance of Client PC.

  • PDF