• Title/Summary/Keyword: Building services

Search Result 1,235, Processing Time 0.029 seconds

Cognitive Approach for Building Intelligent Agent (지능 에이전트 구현의 인지적 접근)

  • Tae Kang-Soo
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.97-105
    • /
    • 2004
  • The reason that an intelligent agent cannot understand the representation of its own perception or activity is caused by the traditional syntactic approach that translates a semantic feature into a simulated string, To implement an autonomously learning intelligent agent, Cohen introduces a experimentally semantic approach that the system learns a contentful representation of physical schema from physically interacting with environment using its own sensors and effectors. We propose that negation is a meta-level schema that enables an agent to recognize its own physical schema, To improve the planner's efficiency, Graphplan introduces the control rule that manipulates the inconsistency between planning operators, but it cannot cognitively understand negation and suffers from redundancy problem. By introducing a negative function not, IPP solves the problem, but its approach is still syntactic and is inefficient in terms of time and space. In this paper, we propose that, to represent a negative fact, a positive atom, which is called opposite concept, is a very efficient technique for implementing an cognitive agent, and demonstrate some empirical results supporting the hypothesis.

  • PDF

Efficient Sketch Map Representation in Mobile Environment (모바일 환경에서 효율적인 약도 표현 방법)

  • Lee Ki-Jung;Viswanathan Murlikrishna;Whangbo Taeg-Keun;Yang Young-Kyu;So Yong-Uk
    • Korean Journal of Remote Sensing
    • /
    • v.21 no.4
    • /
    • pp.329-339
    • /
    • 2005
  • In the mobile phone map service there are some restrictions of resolutions and process in terminals. So providing a sketch map is very efficient. This simplifies the map data and increases the understanding of the user. This sketched map marks the starting point and ending point. Then simplifies the surroundings like important roads or building so the user can find his/her way easily. First of all this sketch map service needs a method to simplify the route between starting point and ending point and the surroundings. After that it needs to make the simplified data into a sketch map and suitable to the terminal's resolution. To solve these problems this paper proposes a new method to manifest a sketch map efficiently through a mobile phone. The method, introduced in this paper, is surveyed to have a higher efficiency in data usage compared to the current services available in the market. And also it is examined to have a clear vision in process and easily understandable.

Korean Social Workers' Struggles to Be Empathic with Their Battered Women Clients (가정폭력피해여성들과 일하는 한국 사회복지사들의 감정이입 갈등에 관한 연구)

  • Chong, Hye-suk
    • Korean Journal of Social Welfare Studies
    • /
    • no.37
    • /
    • pp.145-170
    • /
    • 2008
  • This qualitative study explores social workers' phenomenological experiences with battered women, including their struggles and needs for building and maintaining an empathic identification with their battered women clients. Twelve interviews were conducted with social workers who have provided services in the domestic violence field over the last two years. They identified their clients prejudices and unfamiliarity with counseling and social work profession in Korea as related to battered women clients' initial resistance to social workers' empathic engagement. The nature of victimization between intimate partners (i.e., emotional bounds, continuing risks of victimization) requires workers' enormous energy to maintain their need for an empathic identification with their clients. Social workers emphasized the importance of clinical supervision and supportive networks that enable them to maintain their professional energy and commitment as an empathic helper.

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

A Study on the Implementation of Official Family-related Service History Archives in Korea (공적 가족사업역사 아카이브 구축을 위한 기초 연구)

  • Kim, Kyoung A;Park, Mee Sok;Kang, Bog Jeong;Lee, Young-ho;Choi, Saeeun;Chun, JeeWon;Kim, Mi Young
    • Journal of Family Resource Management and Policy Review
    • /
    • v.24 no.3
    • /
    • pp.79-102
    • /
    • 2020
  • This study aims to provide basic resources for the construction of the archives on the official family service history in Korea. The study collected records of family policies and official family service from 1948 to 2019 and thereafter attempted to classify the official family service. In addition, experts were consulted to diagnose compliance with research contents and directions, investigate priorities of the family policies, and provide opinions on the elements of each process of archiving. The results of this study were as follows. First, there were five areas of concern to be considered in the process of establishing an archive of official family services: concept, scope, collection, arrangement, preservation, and utilization. Second, the findings suggest which processes are critical to developing a sustainable and systematic archive system for the official family service history. The construction of the archives will provide a platform for understanding the contents of integrated family policies and inform the direction of future family policies in Korea. In addition, these archives will be an important factor in building a solid Korean national identity.

Citizens' Perception on Establishing a New Public Library in Jung-gu, Daegu (대구 중구립 공공도서관 건립에 관한 주민인식 연구)

  • Cho, Yong Wan;Koo, Joung Hwa
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.115-143
    • /
    • 2021
  • The purpose of the study is to examine citizens' perception regarding establishing a new public library in Jung-gu, Daegu. The study conducted a survey and the participants(N=300) were recruited using a quota sampling method(174 residents of Jung-gu and 126 others in Daegu who may use public libraries in Jung-gu). The respondents highly recognized both the present and future value of public libraries and the impact to themselves and their families, but they perceived that they currently have very few public libraries in Jung-gu, Deagu. Thus, they damanded that new public libraries be built in Jung-gu, and had high willingness to use the public libraries. The study also found that respondents' basic direction regarding building a new public library in Jung-gu and their preference on library location, collection, services, etc. The study finally earned the validity in establishing a new municipal library in Jung-gu, Daegu from the results. On the basis of the findings, the study suggested planing the detailed guidelines and directions for further library construction and operation.

A Study on the Smoke control Design parameter of Large Volume space by Fire Dynamic Simulation (화재 시뮬레이션(FDS)을 이용한 대형공간의 제연 설계인자에 관한 연구)

  • Choi, Sang-Gon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.237-243
    • /
    • 2018
  • Performance-oriented design has been introduced in fire protection design, and various efforts have been made to minimize the damage caused by fire in the design stage. We conducted a study to provide information for reasonable design factors using a Fire Dynamic Simulation code provided by the NIST on boundary width and amount of supply. This paper shows that using a living-room air-supply system in a large space and dividing the space by a ventilation boundary are the two factors that are considered to have the greatest influence on the design of the living room ventilation. The results show that for performance-based design, the width of the ventilation boundary is designed to be the maximum limit in the initial design. It is judged that reasonable air volume determination should be made through various methods.

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

Development of Supervised Machine Learning based Catalog Entry Classification and Recommendation System (지도학습 머신러닝 기반 카테고리 목록 분류 및 추천 시스템 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.57-65
    • /
    • 2019
  • In the case of Domeggook B2B online shopping malls, it has a market share of over 70% with more than 2 million members and 800,000 items are sold per one day. However, since the same or similar items are stored and registered in different catalog entries, it is difficult for the buyer to search for items, and problems are also encountered in managing B2B large shopping malls. Therefore, in this study, we developed a catalog entry auto classification and recommendation system for products by using semi-supervised machine learning method based on previous huge shopping mall purchase information. Specifically, when the seller enters the item registration information in the form of natural language, KoNLPy morphological analysis process is performed, and the Naïve Bayes classification method is applied to implement a system that automatically recommends the most suitable catalog information for the article. As a result, it was possible to improve both the search speed and total sales of shopping mall by building accuracy in catalog entry efficiently.

Privacy-preserving Customized Order Service Protocol based on Smart Contract in Smart Factory (프라이버시를 제공하는 스마트 컨트랙트 기반의 스마트 팩토리 주문제작 프로토콜)

  • Lee, YongJoo;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.215-222
    • /
    • 2019
  • Advances in technologies about 3D (three-dimensional) printing and smart factory related issues will have the effect of reducing the cost of building a smart factory and making various types of service available. Manufacturers and service providers of small assets work with outside experts to provide small amounts of customized ordering services. If customers have to disclose their private information to subscribe to a new service, they may be reluctant to use it and the availability of developed technology may cause slow progress. We propose a new protocol for customized order service for smart factory. The proposed approach is designed to meet requirements of security and based on smart contract in IoT convergence network. We analyzed the requirements of the proposed approach which provided anonymity, privacy, fairness, and non-repudiation. We compared it with closely related studies to show originality and differences.