• Title/Summary/Keyword: Intelligent Framework

Search Result 635, Processing Time 0.031 seconds

A Framework for Supporting Virtual Engineering Services Using Ubiquitous and Context-Aware Computing (가상공학 서비스를 위한 유비쿼터스 및 상황인식 컴퓨팅 프레임워크)

  • Seo D.W.;Kim H.;Kim K.S.;Lee J.Y.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.10 no.6
    • /
    • pp.402-411
    • /
    • 2005
  • Context-aware engineering services in ubiquitous environments are emerging as a viable alternative to traditional engineering services. Most of the previous approaches are computer-centered rather than human-centered. In this paper, we present a Ubiquitous and Context-Aware computing Framework for collaborative virtual Engineering $(U-CAF\acute{E})$ services. The proposed approach utilizes BPEL-based (Business Process Execution Language) process templates for engineering service orchestration and choreography and adopts semantic web-based context-awareness for providing human-centered engineering services. The paper discusses how to utilize engineering contexts and share this knowledge in support of collaborative virtual engineering services and service interfaces. The paper also discusses how Web services and JINI (Java Intelligent Network Infrastructure) services are utilized to support engineering service federations and seamless Interactions among persons, devices, and various kinds of engineering services.

Comparison and Experiments on the Electronic Commerce Agent Protocols under Time-Bounded Negotiation Framework (시간제한적 협상 구조에 근거한 전자상거래 에이전트를 위한 프로토콜의 비교와 실험)

  • 이경전;장용식
    • Journal of Intelligence and Information Systems
    • /
    • v.4 no.2
    • /
    • pp.103-116
    • /
    • 1998
  • 본 논문은 시간 기반의 약속 방법을 강조하는 시간제한적 협상구조를 소개한다. 에이전트들이 보내는 메세지에 약속기간을 첨부함으로써, 기존의 contact wet protocol(on)을 시간이 제약되어 있는 환경에서 효과적으로 사용될 수 있도록 확장할 수 있으며, 그로부터 시간제한적 협상 구조(TBNF: Time-Bounded Negotiation Framework)를 만들 수 있다. 이 논문에서는 약속기간을 가진 메시지를 의미론적으로 해석하고, 세가지 프로토콜 - 무보장 프로토콜, 승인보장 프로토콜, 그리고 유한시간 보장 프로토콜을 비교하는데, 이것들은 시간제한적 협상구조에 모두 포함될 수 있다. 제안된 협상 구조는 약속 기간 연장 요청이라는 새로운 메시지 유형과 부정적 약속(Negative Commitment)이라는 새로운 약속 개념을 가지고 있다. 시간제한적 협상 구조(TBNF)는 각 에이전트의 적응적 협상 전략을 수용하면서 효율적이며 효과적인 전자상거래 협상에 대한 구조를 제공할 것으로 예상되며, 이의 유용성을 평가하기 위해 실험결과를 비교 분석하였다.

  • PDF

Web Mining for successful e-Business based on Artificial Intelligence Techniques (성공적인 e-Business를 위한 인공지능 기법 기반 웹 마이닝)

  • 이장희;유성진;박상찬
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.2
    • /
    • pp.159-175
    • /
    • 2002
  • Web mining is an emerging science of applying modem data mining technologies to the problem of extracting valid, comprehensible, and actionable information from large databases of web in e-Business environment and of using it to make crucial e-Business decisions. In this paper, we present the noble framework of data visualization system based on web mining for analyzing the characteristics of on-line customers in e-Business. We also propose the framework of forecasting system for providing the forecasting information of sales/purchase through the use of web mining based on artificial intelligence techniques such as back-propagation network, memory-based reasoning, and self-organizing map.

  • PDF

An Improved Hybrid Kalman Filter Design for Aircraft Engine based on a Velocity-Based LPV Framework

  • Liu, Xiaofeng
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.18 no.3
    • /
    • pp.535-544
    • /
    • 2017
  • In-flight aircraft engine performance estimation is one of the key techniques for advanced intelligent engine control and in-flight fault detection, isolation and accommodation. This paper detailed the current performance degradation estimation methods, and an improved hybrid Kalman filter via velocity-based LPV (VLPV) framework for these needs is proposed in this paper. Composed of a nonlinear on-board model (NOBM) and VLPV, the filter shows a hybrid architecture. The outputs of NOBM are used for the baseline of the VLPV Kalman filter, while the system performance degradation factors on-line estimated by the measured real system output deviations are fed back to the NOBM for its updating. In addition, the setting of the process and measurement noise covariance matrices' values are also discussed. By applying it to a commercial turbofan engine, simulation results show the efficiency.

The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training (사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현)

  • Hong, Suyoun;Kim, Kwangsoo;Kim, Taekyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.6
    • /
    • pp.797-805
    • /
    • 2019
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.

A WF-KMS Framework on the Semantic Web (시맨틱 웹을 이용한 워크플로우 기반의 지식관리 시스템 프레임워크)

  • Kwon Hyung-Cheol;Choi Doug-Won;Lee Dong-Cheol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.27 no.4
    • /
    • pp.69-76
    • /
    • 2004
  • A framework for knowledge management system has been explored which enables the semantic search of knowledge on the web. Knowledge representation by RDF and RDF schema enables machine cognition of knowledge documents. Dublin core was adopted for structured metadata representation. Thereby, it enables the CBR and rule based reasoning for intelligent knowledge retrieval. Grafting of the WFMS technique unto the KMS facilitates the effective utilization of process knowledge and creation of new knowledge.

Predicting RFID Adoption Towards Urban Smart Mobility in Ulaanbaatar, Mongolia

  • Gantulga, Urandelger;Sampil, Burmaa;Tugsbat, Ariunsaikhan
    • Asia Marketing Journal
    • /
    • v.24 no.1
    • /
    • pp.3-12
    • /
    • 2022
  • Smart city technologies such as transportation and parking systems make our daily lives more efficient and intelligent. However, it is impossible to implement a smart mobility system without analyzing the individual's behavior toward the new technology. This research study attempts to develop a framework for predicting smart mobility antecedents using SEM in primary data analysis. The Technology Acceptance Model (TAM) was the conceptual foundation for this study. To achieve the objectives of the study, one thousand five hundred and twelve effective questionnaires were collected and analyzed using Smart PLS 3.3. The results show that perceived usefulness, perceived ease of use, and perceived risk significantly affect attitudes towards adopting smart mobility systems. Our study provides a comprehensive framework to understand individual-level smart city technology adoption. This study offers implications for policymakers to update existing policies concerning road technology.

A Design and Implementation of Shopping Chatbot (쇼핑 챗봇 설계 및 구현)

  • Lee, Won Joo;Wang, Gun Woo;Lee, Dae Seong;Lee, Hang Ju
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.233-234
    • /
    • 2021
  • 본 논문에서는 Microsoft Bot Framework와 Microsoft Azure Service, LUIS AI를 활용하여 쇼핑몰 이용에 도움을 주는 쇼핑 챗봇을 설계하고 구현한다. 이 챗봇은 쇼핑몰을 이용하는 사용자들에게 대화형 인터페이스를 통한 편의성을 제공하고 접근성을 증가시킨다. 또한 직접 찾는 방식이 아닌 AI의 선택이 중심이 되어 검색 시간 감소로 인한 시간 절약 효과를 얻을 수 있다.

  • PDF

Path planning of a Robot Manipulator using Retrieval RRT Strategy

  • Oh, Kyong-Sae;Kim, Eun-Tai;Cho, Young-Wan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.138-142
    • /
    • 2007
  • This paper presents an algorithm which extends the rapidly-exploring random tree (RRT) framework to deal with change of the task environments. This algorithm called the Retrieval RRT Strategy (RRS) combines a support vector machine (SVM) and RRT and plans the robot motion in the presence of the change of the surrounding environment. This algorithm consists of two levels. At the first level, the SVM is built and selects a proper path from the bank of RRTs for a given environment. At the second level, a real path is planned by the RRT planners for the: given environment. The suggested method is applied to the control of $KUKA^{TM}$, a commercial 6 DOF robot manipulator, and its feasibility and efficiency are demonstrated via the cosimulatation of $MatLab^{TM}\;and\;RecurDyn^{TM}$.

A Portscan Attack Detection Mechanism based on Fuzzy Logic for Abnormal Traffic Control Framework (비정상 트래픽 제어 프레임워크를 위한 퍼지 로직 기반의 포트스캔 공격 탐지 기법)

  • Kim, Jae-Gwang;Lee, Ji-Hyeong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.357-361
    • /
    • 2007
  • 비정상 트래픽 제어 프레임워크에 적용된 비정상 트래픽 제어 기술은 침입, 분산서비스거부 공격, 포트스캔 공격과 같은 비정상 행위의 트래픽을 제어하는 공격 대응 방법이다. 이 대응 방법은 비정상 행위에 대한 true-false 방식의 공격 대응 방법이 가지는 높은 오탐율(false-positive rate)을 낮출 수 있다는 장점이 있지만, 공격 지속시간에만 의존하여 비정상 트래픽을 판단하기 때문에, 공격에 대한 신속한 대응을 하지 못한다는 한계를 가지고 있다. 이에 본 논문에서는 비정상 트래픽 제어 프레임워크에 퍼지 로직을 적용하여 신속한 공격 대응이 가능한 포트스캔 공격 탐지 기법을 제안한다.

  • PDF