• Title/Summary/Keyword: ETRI

Search Result 9,887, Processing Time 0.032 seconds

Implementation of Intelligent Characters adapting to Action Patterns of Opponent Characters (상대캐릭터의 행동패턴에 적응하는 지능캐릭터의 구현)

  • Lee, Myun-Sub;Cho, Byeong-Heon;Jung, Sung-Hoon;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.42 no.3
    • /
    • pp.31-38
    • /
    • 2005
  • This paper proposes an implementation method of intelligent characters that can properly adapt to action patterns of opponent characters in fighting games by using genetic algorithm. For this intelligent characters, past actions patterns of opponent characters should be included in the learning process. To verify the effectiveness of the proposed method, two types of experiments are performed and their results are compared. In first experiment(exp-1), intelligent characters consider current action and its step of an opponent character. In second experiment (exp-2), on the other hands, they take past actions of an opponent characters into account additionally. As a performance index, the ratio of score obtained by an intelligent character to that of an opponent character is adopted. Experimental results shows that even if the performance index of exp-1 is better than that of exp-2 at the beginning of stages, but the performance index of exp-2 outperforms that of exp-1 as stages go on. Moreover, optimum solutions are always found in all experimental cases in exp-2. Futhermore, intelligent characters in exp-2 could learn moving actions (forward and backward) and waiting actions for getting more scores through self evolution.

A Study on the Next VWorld System Architecture: New Technology Analysis for the Optimal Architecture Design (차세대 브이월드 시스템 아키텍처 구성에 관한 연구: 최적의 아키텍처 설계를 위한 신기술 분석)

  • Go, Jun Hee;Lim, Yong Hwa;Kim, Min Soo;Jang, In Sung
    • Spatial Information Research
    • /
    • v.23 no.4
    • /
    • pp.13-22
    • /
    • 2015
  • There has been much interest in the VWorld open platform with the addition of a variety of contents or services such as 2D map, 3D terrain, 3D buildings, and thematic map since 2012. However, the VWorld system architecture was not stable for the system overload. For example, the system was stopped due to the rapidly increasing user accesses when the 3D terrain service of the North Korea and the Baekdu mountain was launched at September 2012 and September 2013, respectively. It was because the system architect has just extended the server system and the network bandwidth whenever the rapid increase of user accesses occurs or new service starts. Therefore, this study proposes a new VWorld system architecture that can reliably serve the huge volume of National Spatial Data by applying the new technologies such as CDN, visualization and clustering. Finally, it is expected that the results of this study can be used as a basis for the next VWorld system architecture being capable of a huge volume of spatial data and users.

Study on the Measurement System for MIMO Channel Considering Urban Environment at Microwave Frequencies (도심 환경을 고려한 마이크로파 대역 MIMO 전파 채널 측정 시스템에 관한 연구)

  • Lim, Jae-Woo;Kwon, Se-Woong;Moon, Hyun-Wook;Park, Yoon-Hyun;Yoon, Young-Joong;Yook, Jong-Gwan;Jeong, Jin-Soub;Kim, Jong-Ho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.10
    • /
    • pp.1142-1149
    • /
    • 2007
  • In this paper, the development of wideband MIMO channel sounder and a pilot measurement result is described for research on the multi antenna radio propagation characteristics considering urban environment at microwave frequencies. We developed $4{\times}4$ MIMO(BW:100 MHz) channel sounder using the high speed switching mechanism and periodic pseudo random binary signals method considering next generation mobile communication system. A pilot measurement campaign at the urban area of Bundang is presented for confirmation of system performance. From the analysis of measurement data, wideband path loss exponent of 3.7 and 8 GHz band is 1.79 and 1.76. Average RMS delay spread is 200 ns and 42 ns respectively. From the experiment results, operation of this measurement system is confirmed considering research for a coverage, SNR and channel capacity in urban environment at microwave frequencies.

Spatial Correlation Based Fast Coding Depth Decision and Reference Frame Selection in HEVC (HEVC의 공간적 상관성 기반 고속 부호화 깊이 및 참조영상 결정 방법)

  • Lee, Sang-Yong;Kim, Dong-Hyun;Kim, Jae-Gon;Choi, Hae-Chul;Kim, Jin-Soo;Choi, Jin-Soo
    • Journal of Broadcast Engineering
    • /
    • v.17 no.5
    • /
    • pp.716-724
    • /
    • 2012
  • In this paper, we propose a fast decision method of maximum coding depth decision and reference frame selection in HEVC. To reduce computational complexity and encoding time of HEVC, two methods are proposed. In the first method, the maximum depth of each coding unit (CU) in a largest CU (LCU) is constrained by using the maximum coding depth used by adjacent LCUs based on the assumption that the spatial correlation is very high and rate-distortion (R-D) cost. And we constrain the number of reference pictures for prediction unit (PU) performing motion estimation by using the motion information of the upper depth PU. The proposed methods reduce computational complexity of the HEVC encoder by constraining the maximum coding depth and the reference frame. We could achieve about 39% computational complexity reduction with marginal bitrate increase of 1.2% in the comparison with HM6.1 HEVC reference software.

Patent Citation Network Analysis as a Measure of Technical Knowledge Diffusion in Korea: Focusing on ICT (특허 인용 네트워크 분석을 통한 기술지식의 확산 경로 분석: 정보통신기술을 중심으로)

  • Choi, Byoung-Chul;Baek, Hyunmi;Kim, Myung Seuk
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.1
    • /
    • pp.143-151
    • /
    • 2015
  • Technology convergence, recently accelerated in various technical fields, can be achieved by discovering a new technology while exchanging the knowledge among the different technologies and utilizing such knowledge into the existing fields of technology. In particular, technology convergence actively occurs in knowledge-intensive ICT. However, limited research is available on the routes of ICT technical knowledge diffusion because of insufficient data. Therefore, this study built a database on the citations of patent data applied from 2006 to 2013 in Korea and their cited patents. We drew a patent citation network, a technology citation network and an applicant citation network, after which we analyzed the routes of technical knowledge diffusion. Results showed that ICT played a leading role in knowledge citation among technologies and that such diffusion took a shorter time in technology citation when it occurred more frequently and when the citation occurred between ICTs. In addition, most of the ICT showed a strong citation relationship with the other ICTs or such technologies in the field of physics or electricity, whereas electric elements (H01) showed various citation relationships with technologies other than ICT. Furthermore, we found a strong technology diffusion relationship between domestic corporations and domestic natural persons. National organizations often cited the patents of other applicants, whereas the patents of domestic corporations were actively cited between domestic corporations or by other applicants. Thus, this study is expected to be useful in measuring the performance of technologies, including the diffusion to other technologies. As well as in considering the routes of technical knowledge diffusion in Korea.

  • PDF

SAR analysis with variety of the antenna structures on PCS handset (PCS 전화기의 안테나 구조에 따른 SAR 분석)

  • Kim, Hyoun-Kyoung;Park, Ju-Deok;Kim, Jin-Seok;Kim, Nam
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.11
    • /
    • pp.8-16
    • /
    • 2000
  • In this paper, on calculating SARs on human head using computer simulation, SARs caused by PCS handsets are calculated and compared, and the design parameters that affect SAR values are analyzed. Is and 10 g peak averaged SARs are calculated as the type of antenna, the location of antenna, and the type of handset are changed and SAR distributions as depth of human head are shown. Among the antennas on flip type handsets, side mounted PIFA has the lowest SARs 1g and 10g peak averaged SARs are 0.686W/kg and 0.353W/kg. The SARs caused by monopole antenna on folder type handset are 1.133W/kg and 0.709W/kg. and are about 30% lower than monopole 1.759W/kg and 0.978W/kg, respectively. SAR distributions as depth of human head of side mounted PIFA and monopole antenna on folder-type handset are more slowly changed than those of top mounted PIFA and monopole antenna on flip-type handset.

  • PDF

Dual Process Linear Protection Switching Method Supporting Node Redundancy (노드 이중화를 위한 이중 프로세스 선형 보호 절체 방법)

  • Kim, Dae-Ub;Kim, Byung Chul;Lee, Jae Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.26-37
    • /
    • 2016
  • The core technologies of the current transport network are OAM and protection switching to meet the sub-50ms protection switching time via a path redundancy when a link or node failure occurs. The transport networks owned by public network operators, central/local governments, and major enterprises are individually configured and managed with service resiliency in each own protected sub-network. When such networks are cascaded, it is also important to provide a node resiliency between two protected sub-networks. However, the linear protection switching in packet transport networks, such as MPLS-TP and Carrier Ethernet, does not define a solution of dual node interconnection. Although Ethernet ring protection switching covers the dual node interconnection scheme, a large amount of duplicated data frames may be flooded when a failure occurs on an adjacent (sub) ring. In this paper, we suggest a dual node interconnection scheme with linear protection switching technology in multiple protected sub-networks. And we investigate how various protected sub-network combinations with a proposed linear or ring protection process impact the service resiliency of multiple protected sub-networks through extensive experiments on link and interconnected node failures.

Development of Rotation Invariant Real-Time Multiple Face-Detection Engine (회전변화에 무관한 실시간 다중 얼굴 검출 엔진 개발)

  • Han, Dong-Il;Choi, Jong-Ho;Yoo, Seong-Joon;Oh, Se-Chang;Cho, Jae-Il
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.4
    • /
    • pp.116-128
    • /
    • 2011
  • In this paper, we propose the structure of a high-performance face-detection engine that responds well to facial rotating changes using rotation transformation which minimize the required memory usage compared to the previous face-detection engine. The validity of the proposed structure has been verified through the implementation of FPGA. For high performance face detection, the MCT (Modified Census Transform) method, which is robust against lighting change, was used. The Adaboost learning algorithm was used for creating optimized learning data. And the rotation transformation method was added to maintain effectiveness against face rotating changes. The proposed hardware structure was composed of Color Space Converter, Noise Filter, Memory Controller Interface, Image Rotator, Image Scaler, MCT(Modified Census Transform), Candidate Detector / Confidence Mapper, Position Resizer, Data Grouper, Overlay Processor / Color Overlay Processor. The face detection engine was tested using a Virtex5 LX330 FPGA board, a QVGA grade CMOS camera, and an LCD Display. It was verified that the engine demonstrated excellent performance in diverse real life environments and in a face detection standard database. As a result, a high performance real time face detection engine that can conduct real time processing at speeds of at least 60 frames per second, which is effective against lighting changes and face rotating changes and can detect 32 faces in diverse sizes simultaneously, was developed.

Detecting near-duplication Video Using Motion and Image Pattern Descriptor (움직임과 영상 패턴 서술자를 이용한 중복 동영상 검출)

  • Jin, Ju-Kyong;Na, Sang-Il;Jenong, Dong-Seok
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.4
    • /
    • pp.107-115
    • /
    • 2011
  • In this paper, we proposed fast and efficient algorithm for detecting near-duplication based on content based retrieval in large scale video database. For handling large amounts of video easily, we split the video into small segment using scene change detection. In case of video services and copyright related business models, it is need to technology that detect near-duplicates, that longer matched video than to search video containing short part or a frame of original. To detect near-duplicate video, we proposed motion distribution and frame descriptor in a video segment. The motion distribution descriptor is constructed by obtaining motion vector from macro blocks during the video decoding process. When matching between descriptors, we use the motion distribution descriptor as filtering to improving matching speed. However, motion distribution has low discriminability. To improve discrimination, we decide to identification using frame descriptor extracted from selected representative frames within a scene segmentation. The proposed algorithm shows high success rate and low false alarm rate. In addition, the matching speed of this descriptor is very fast, we confirm this algorithm can be useful to practical application.

Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.105-114
    • /
    • 2020
  • In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization's defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements.