• 제목/요약/키워드: Policy matrix

검색결과 194건 처리시간 0.023초

Singularity Avoidance Path Planning on Cooperative Task of Dual Manipulator Using DDPG Algorithm (DDPG 알고리즘을 이용한 양팔 매니퓰레이터의 협동작업 경로상의 특이점 회피 경로 계획)

  • Lee, Jonghak;Kim, Kyeongsoo;Kim, Yunjae;Lee, Jangmyung
    • The Journal of Korea Robotics Society
    • /
    • 제16권2호
    • /
    • pp.137-146
    • /
    • 2021
  • When controlling manipulator, degree of freedom is lost in singularity so specific joint velocity does not propagate to the end effector. In addition, control problem occurs because jacobian inverse matrix can not be calculated. To avoid singularity, we apply Deep Deterministic Policy Gradient(DDPG), algorithm of reinforcement learning that rewards behavior according to actions then determines high-reward actions in simulation. DDPG uses off-policy that uses 𝝐-greedy policy for selecting action of current time step and greed policy for the next step. In the simulation, learning is given by negative reward when moving near singulairty, and positive reward when moving away from the singularity and moving to target point. The reward equation consists of distance to target point and singularity, manipulability, and arrival flag. Dual arm manipulators hold long rod at the same time and conduct experiments to avoid singularity by simulated path. In the learning process, if object to be avoided is set as a space rather than point, it is expected that avoidance of obstacles will be possible in future research.

A Distributed Domain Document Object Management using Semantic Reference Relationship (SRR을 이용한 분산 도메인 문서 객체 관리)

  • Lee, Chong-Deuk
    • Journal of Digital Convergence
    • /
    • 제10권5호
    • /
    • pp.267-273
    • /
    • 2012
  • The semantic relationship structures hierarchically the huge amount of document objects which is usually not formatted. However, it is very difficult to structure relevant data from various distributed application domains. This paper proposed a new object management method to service the distributed domain objects by using semantic reference relationship. The proposed mechanism utilized the profile structure in order to extract the semantic similarity from application domain objects and utilized the joint matrix to decide the semantic relationship of the extracted objects. This paper performed the simulation to show the performance of the proposed method, and simulation results show that the proposed method has better retrieval performance than the existing text mining method and information extraction method.

An analysis of effectiveness and safety about matrix-based RFID authentication protocol (행렬기반 RFID 인증 프로토콜의 효율성 및 안정성 분석)

  • Shin, Hyo-Young;Hwang, Chi-Gon;Jung, Kye-Dong
    • Journal of Digital Convergence
    • /
    • 제12권2호
    • /
    • pp.249-255
    • /
    • 2014
  • RFID system is used in several fields such as traffic and access control. The study about RFID security is actively progressed as security threat has been increased. This paper suggests matrix-based authentication protocol. And we analyze the safety of authentication protocol and compares the effectiveness of the protocol with other authentication protocols. The suggested authentication protocol secures from wiretapping attack, replay attack, and spoofing attack, and reduces overload of back-end database so that has efficient performance.

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

A Study on the Development of Proposal Evaluation Index for the Overseas Weapon System Purchasing Projects using Axiomatic Design/AHP (공리적설계/AHP를 이용한 해외무기체계 구매사업 제안서 평가지표 개발에 관한 연구)

  • Cho, Hyun-Ki;Kim, Woo-Je
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • 제14권3호
    • /
    • pp.441-457
    • /
    • 2011
  • In this study, the axiomatic design(AD) method is applied to construct the hierarchical structure of evaluation criteria and the AHP method is used to calculate the weights of criteria in order to develop the proposal evaluation index for the overseas weapon system purchasing projects. The common evaluation items as main categories are selected through the review of evaluation criteria from the previous works and projects, relevant regulations and defense policy, and the design matrix using fuzzy concept is established and evaluated by the expert group in each design phase to determine the independency, that is the satisfaction of decoupled or uncoupled design, for each criteria in the same hierarchy when they are derived from the main categories. The establishment of decoupled or uncoupled design matrix provides mutually exclusiveness of how small number of DPs can be accounted for FRs within the same hierarchy. The proposal evaluation index developed in this study will be used as a general proposal evaluation index for the overseas weapon system purchasing projects which there are no systematically established evaluation tools.

ANALYSIS OF M/M/c RETRIAL QUEUE WITH THRESHOLDS, PH DISTRIBUTION OF RETRIAL TIMES AND UNRELIABLE SERVERS

  • CHAKRAVARTHY, SRINIVAS R.;OZKAR, SERIFE;SHRUTI, SHRUTI
    • Journal of applied mathematics & informatics
    • /
    • 제39권1_2호
    • /
    • pp.173-196
    • /
    • 2021
  • This paper treats a retrial queue with phase type retrial times and a threshold type-policy, where each server is subject to breakdowns and repairs. Upon a server failure, the customer whose service gets interrupted will be handed over to another available server, if any; otherwise, the customer may opt to join the retrial orbit or depart from the system according to a Bernoulli trial. We analyze such a multi-server retrial queue using the recently introduced threshold-based retrial times for orbiting customers. Applying the matrix-analytic method, we carry out the steady-state analysis and report a few illustrative numerical examples.

Risk Assessment in the Shipbuilding Industry: Present and the Future

  • Jeong, Byung-Yong;Kim, Woo-Jin;Jeong, Ye-Seul
    • Journal of the Ergonomics Society of Korea
    • /
    • 제31권1호
    • /
    • pp.143-149
    • /
    • 2012
  • Objective: The aim of this study is to gain an overview of the risk assessment and management system in the shipbuilding industry. Background: The use of risk assessment techniques has grown significantly in recent years. Method: Various references have been reviewed to evaluate risk assessment and management policy. Results: Adapting the risk assessment system has become an important approach not only to prevent industrial accidents but also to enhance the efficiency of works for shipbuilding workers. Conclusion: Risk assessment is an approved technology for operators to address larger hazards, and to ensure risks have been reduced to appropriate levels cost effectively. Application: These results can be used to provide baseline information for risk assessment and management policy.

A Novel Spectrum Allocation Strategy with Channel Bonding and Channel Reservation

  • Jin, Shunfu;Yao, Xinghua;Ma, Zhanyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4034-4053
    • /
    • 2015
  • In order to meet various requirements for transmission quality of both primary users (PUs) and secondary users (SUs) in cognitive radio networks, we introduce a channel bonding mechanism for PUs and a channel reservation mechanism for SUs, then we propose a novel spectrum allocation strategy. Taking into account the mistake detection and false alarm due to imperfect channel sensing, we establish a three-dimensional Markov chain to model the stochastic process of the proposed strategy. Using the method of matrix geometric solution, we derive the performance measures in terms of interference rate of PU packets, average delay and throughput of SU packets. Moreover, we investigate the influence of the number of the reserved (resp. licensed) channels on the system performance with numerical experiments. Finally, to optimize the proposed strategy socially, we provide a charging policy for SU packets.

Fuzzy Multi-Layer Relational Design for the explosive rule-based applications (폭발적인크기의 룰-기반의 응용을 위한 멀티 레이어 퍼어지 관계 설계)

  • Kim, Young Taek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2012년도 추계학술발표대회
    • /
    • pp.343-346
    • /
    • 2012
  • There are many realistic system necessities on the huge size of rule matrices with any Fuzzy Logical Inferences. This paper indicates the experimental design policy on the PCS design for the Platoon and AOS for the social application with some identical resemblances in between them so that we could use a design for two different usages feasibly.

A Maintenance Design of Connected-(r, s)-out-of-(m, n) F System Using Simulated Annealing (시뮬레이티드 어닐링을 이용한(m, n)중 연속(r,s) : F 시스템의 정비모형)

  • Lee, Sangheon;Kang, Youngtai;Shin, Dongyeul
    • Journal of Korean Institute of Industrial Engineers
    • /
    • 제34권1호
    • /
    • pp.98-107
    • /
    • 2008
  • The purpose of this paper is to present an optimization scheme that aims at minimizing the expected cost per unittime. This study considers a linear connected-(r, s)-ouI-of-(m, n):f lattice system whose components are orderedlike the elements of a linear (m, n)-matrix. We assume that all components are in the state 1 (operating) or 0(failed) and identical and s-independent. The system fails whenever at least one connected (r, s)-submatrix offailed components occurs. To find the optimal threshold of maintenance intervention, we use a simulatedannealing(SA) algorithm for the cost optimization procedure. The expected cost per unit time is obtained byMonte Carlo simulation. We also has made sensitivity analysis to the different cost parameters. In this study,utility maintenance model is constructed so that minimize the expense under full equipment policy throughcomparison for the full equipment policy and preventive maintenance policy. The full equipment cycle and unitcost rate are acquired by simulated annealing algorithm. The SA algorithm is appeared to converge fast inmulti-component system that is suitable to optimization decision problem.