• Title/Summary/Keyword: Moving Rules

Search Result 89, Processing Time 0.025 seconds

Analysis of Fashion Design Reflected Visual Properties of the Generative Art (제너러티브 아트(Generative Art)의 시각적 속성이 반영된 패션디자인 분석)

  • Kim, Dong Ok;Choi, Jung Hwa
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.41 no.5
    • /
    • pp.825-839
    • /
    • 2017
  • Generative Art (also called as the art of the algorithm) creates unexpected results, moving autonomously according to rules or algorithms. The evolution of digital media in art, which tries to seek novelty, increases the possibility of new artistic fields; subsequently, this study establishes the basis for new design approaches by analyzing visual cases of Generative Art that have emerged since the 20th century and characteristics expressed on fashion. For the methodology, the study analyzes fashion designs that have emerged since 2000, based on theoretical research that includes literature and research papers relating to Generative Art. According to the study, expression characteristics shown in fashion, based on visual properties of Generative Art, are as follows. First, abstract randomness is expressed with unexpected coincidental forms using movements of a creator and properties of materials as variables in accordance to rules or algorithms. Second, endlessly repeated pattern imitation expresses an emergent shape by endless repetition created by a modular system using rules or 3D printing using a computer algorithm. Third, the systematic variability expresses constantly changing images with a combination of system and digital media by a wearing method. It is expected that design by algorithm becomes a significant method in producing other creative ideas and expressions in modern fashion.

The Development of Cable Carrier Chain System with Low Noise and Dust for Moving Stages in Cleanrooms using TRIZ (TRIZ를 활용한 클린룸용 저소음 및 저분진 케이블 이송 체인 시스템의 개발)

  • Kim, Du-Jin;Hyun, Dong-Hoon;Kim, Young-Il
    • Journal of the Semiconductor & Display Technology
    • /
    • v.8 no.4
    • /
    • pp.83-88
    • /
    • 2009
  • In this paper TRIZ was used to solve noise and dust reduction related to cable carrier chain system. On modern machines in a clean room, the contradictions arose due to increase noise and dust for the high speed were eliminated with 40 principles and seperation rules. As the results, the sound pressure level of the new carrier chain system was reduced to below 40 dB(A), and cleanroom classifications was satisfied with ISO class 4. In these successful results, TRIZ showed its usefulness in solving the design problems even with severe constraints.

  • PDF

Co-evolutionary Genetic Algorithm for Designing and Optimaizing Fuzzy Controller

  • Byung, Jun-Hyo;Bo, Sim-Kwee
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.10a
    • /
    • pp.354-360
    • /
    • 1998
  • In general, it is very difficult to find optimal fuzzy rules by experience when a system is dynamical and/or complex. Futhermore proper fuzzy partitioning is not deterministic and there is no unique solution. Therefore we propose a new design method of an optimal fuzzy logic controller, that is a co-evolutionary genetic algorithm finding optimal fuzzy rule and proper membership functions at the same time. We formalize the relation between fuzzy rules and membership functions in terms of fitness. We review the typical approaching methods to co-evolutionary genetic algorithms , and then classify them by fitness relation matrix. Applications of the proposed method to a path planning problem of autonomous mobile robots when moving objects exist are presented to demonstrate the performance and effectiveness of the method.

  • PDF

A Study of Security Rule Management for Misuse Intrusion Detection Systems using Mobile Agent (오용 침입탐지 시스템에서 모바일 에이전트를 이용한 보안규칙 관리에 관한 연구)

  • Kim, Tae-Kyung;Lee, Dong-Young;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.525-532
    • /
    • 2003
  • This paper describes intrusion detection rule management using mobile agents. Intrusion detection can be divided into anomaly detection and misuse detection. Misuse detection is best suited for reliably detecting known use patterns. Misuse detection systems can detect many or all known attack patterns, but they are of little use for as yet unknown attack methods. Therefore, the introduction of mobile agents to provide computational security by constantly moving around the Internet and propagating rules is presented as a solution to misuse detection. This work presents a new approach for detecting intrusions, in which mobile agent mechanisms are used for security rules propagation. To evaluate the proposed approach, we compared the workload data between a rules propagation method using a mobile agent and a conventional method. Also, we simulated a rules management using NS-2 (Network Simulator) with respect to time.

A Fuzzy Logic for Autonomous Navigation of Marine Vehicles Satisfying COLREG Guidelines

  • Lee, Sang-Min;Kwon, Kyung-Yub;Joongseon Joh
    • International Journal of Control, Automation, and Systems
    • /
    • v.2 no.2
    • /
    • pp.171-181
    • /
    • 2004
  • An autonomous navigation algorithm for marine vehicles is proposed in this paper using fuzzy logic under COLREG guidelines. The VFF (Virtual Force Field) method, which is widely used in the field of mobile robotics, is modified for application to the autonomous navigation of marine vehicles. This Modified Virtual Force Field (MVFF) method can be used in either track-keeping or collision avoidance modes. Moreover, the operator can select a track-keeping pattern mode in the proposed algorithm. The collision avoidance algorithm has the ability to handle static and/or moving obstacles. The fuzzy expert rules are designed deliberately under COLREG guidelines. An extensive simulation study is used to verify the proposed method.

Monitoring social networks based on transformation into categorical data

  • Lee, Joo Weon;Lee, Jaeheon
    • Communications for Statistical Applications and Methods
    • /
    • v.29 no.4
    • /
    • pp.487-498
    • /
    • 2022
  • Social network analysis (SNA) techniques have recently been developed to monitor and detect abnormal behaviors in social networks. As a useful tool for process monitoring, control charts are also useful for network monitoring. In this paper, the degree and closeness centrality measures, in which each has global and local perspectives, respectively, are applied to an exponentially weighted moving average (EWMA) chart and a multinomial cumulative sum (CUSUM) chart for monitoring undirected weighted networks. In general, EWMA charts monitor only one variable in a single chart, whereas multinomial CUSUM charts can monitor a categorical variable, in which several variables are transformed through classification rules, in a single chart. To monitor both degree centrality and closeness centrality simultaneously, we categorize them based on the average of each measure and then apply to the multinomial CUSUM chart. In this case, the global and local attributes of the network can be monitored simultaneously with a single chart. We also evaluate the performance of the proposed procedure through a simulation study.

A Study of Security Rule Management for Misuse Intrusion Detection Systems using Mobile Agen (오용침입탐지시스템에서보바일에이전트를이용한보안규칙관리에관한연구)

  • Kim, Tae-Kyoung;Seo, Hee-Suk;Kim, Hee-Wan
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.8
    • /
    • pp.781-790
    • /
    • 2004
  • This paper describes intrusion detection rule mangement using mobile agents. Intrusion detection can be divided into anomaly detection and misuse detection. Misuse detection is best suited for reliably detecting known use patterns. Misuse detection systems can detect many or all known attack patterns, but they are of little use for as yet unknown attack methods. Therefore, the introduction of mobile agents to provide computational security by constantly moving around the Internet and propagating rules is presented as a solution to misuse detection. This work presents a new approach for detecting intrusions, in which mobile agent mechanisms are used for security rules propagation. To evaluate the proposed appraoch, we compared the workload data between a rules propagation method using a mobile agent and a conventional method. Also, we simulated a rules management using NS-2(Network Simulator) with respect to time.

  • PDF

Application of Patient-based Real-time Quality Control (환자 기반 실시간 정도관리의 적용)

  • Seung Mo LEE;Kyung-A SHIN
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.56 no.2
    • /
    • pp.105-114
    • /
    • 2024
  • Clinical laboratories endeavor to secure quality by establishing effective quality management systems. However, laboratory environments are complex, and single quality control procedures may inadequately detect many errors. Patient-based real-time quality control (PBRTQC) is a laboratory tool that monitors the testing process using algorithms such as Bull's algorithm and several variables, such as average of normal, moving median, moving average, and exponentially weighted moving average. PBRTQC has many advantages over conventional quality control, including low cost, commutability, continuous real-time performance monitoring, and sensitivity to pre-analytical errors. However, PBRTQC is not easily implemented as it requires statistical algorithm selection, the design of appropriate rules and protocols, and performance verification. This review describes the basic concepts, methods, and procedures of PBRTQC and presents guidelines for implementing a patient-based quality management system. Furthermore, we propose the combined use of PBRTQC when the performance of internal quality control is limited. However, clinical evaluations were not conducted during this review, and thus, future evaluation is required.

Range-Doppler Clustering of Radar Data for Detecting Moving Objects (이동물체 탐지를 위한 레이다 데이터의 거리-도플러 클러스터링 기법)

  • Kim, Seongjoon;Yang, Dongwon;Jung, Younghun;Kim, Sujin;Yoon, Joohong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.6
    • /
    • pp.810-820
    • /
    • 2014
  • Recently many studies of Radar systems mounted on ground vehicles for autonomous driving, SLAM (Simultaneous localization and mapping) and collision avoidance are reported. In near field, several hits per an object are generated after signal processing of Radar data. Hence, clustering is an essential technique to estimate their shapes and positions precisely. This paper proposes a method of grouping hits in range-doppler domains into clusters which represent each object, according to the pre-defined rules. The rules are based on the perceptual cues to separate hits by object. The morphological connectedness between hits and the characteristics of SNR distribution of hits are adopted as the perceptual cues for clustering. In various simulations for the performance assessment, the proposed method yielded more effective performance than other techniques.

Behavior Control of Autonomous Mobile Robot using Schema Co-evolution (스키마 공진화 기법을 이용한 자율이동로봇의 행동제어)

  • Sun, Joung-Chi;Byung, Jun-Hyo;Bo, Sim-Kwee
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.03a
    • /
    • pp.123-126
    • /
    • 1998
  • The theoretical foundations of GA are the Schema Theorem and the Building Block Hypothesis. In the Meaning of these foundational concepts, simple genetic algorithm(SGA) allocate more trials to the schemata whose average fitness remains above average. Although SGA does well in many applications as an optimization method, still it does not guarantee the convergence of a global optimum. Therefore as an alternative scheme, there is a growing interest in a co-evolutionary system, where two populations constantly interact and co-evolve in contrast with traditional single population evolutionary algorithms. In this paper, we propose a new design method of an optimal fuzzy logic controller using co-evolutionary concept. In general, it is very difficult to find optimal fuzzy rules by experience when the input and/or output variables are going to increase. So we propose a co-evolutionary method finding optimal fuzzy rules. Our algorithm is that after constructing two population groups m de up of rule vase and its schema, by co-evolving these two populations, we find optimal fuzzy logic controller. By applying the proposed method to a path planning problem of autonomous mobile robots when moving objects exist, we show the validity of the proposed method.

  • PDF