• Title/Summary/Keyword: behavior-based systems

Search Result 2,102, Processing Time 0.032 seconds

Sequencing Strategy for Autonomous Mobile Robots in Real Environments (이동로봇 자율주행을 위한 행위모듈의 실행순서 조정기법)

  • 송인섭;박정민;오상록;조영조;박귀태
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.5 no.3
    • /
    • pp.297-305
    • /
    • 1999
  • Autonomous mobile robots are required to achieve multiple goals while responding quickly to the dynamic environments. An appropriate robot control architecture, which clearly and systematically defines the relationship among the inputs, the processing functions and the outputs, thus needs to be embedded in the robot controller. This paper proposes a kind of hybrid control architecture which combines the key features of the two well-known robot control architectures; hierarchical and behavioral- based. The overall control architecture consists of three layers, i.e. the highest planner, the middle plan executor, and the lowest monitor and behavior-based controller. In the planned situation, only one behavior module is chosen by the logical coordinator in the plan executor according to the way point bin. In the exceptional situation, the central controller in the plan executor issues an additional control command to reach the planned way point. Several simulations and experiments with autonomous mobile robot show that the proposed architecture enables the robot controller to achieve the multiple sequential goals even in dynamic and uncertain environments.

  • PDF

Localization for Cooperative Behavior of Swarm Robots Based on Wireless Sensor Network (무선 센서 네트워크 기반 군집 로봇의 협조 행동을 위한 위치 측정)

  • Tak, Myung-Hwan;Joo, Young-Hoon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.8
    • /
    • pp.725-730
    • /
    • 2012
  • In this paper, we propose the localization algorithm for the cooperative behavior of the swarm robots based on WSN (Wireless Sensor Network). The proposed method is as follows: First, we measure positions of the L-bot (Leader robot) and F-bots (Follower robots) by using the APIT (Approximate Point In Triangle) and the RSSI (Received Signal Strength Indication). Second, we measure relative positions of the F-bots against the pre-measured position of the L-bot by using trilateration. Then, to revise a position error caused by noise of the wireless signal, we use the particle filter. Finally, we show the effectiveness and feasibility of the proposed method though some simulations.

The effect of architectural form on the earthquake behavior of symmetric RC frame systems

  • Inan, Tugba;Korkmaz, Koray;Cagatay, Ismail H.
    • Computers and Concrete
    • /
    • v.13 no.2
    • /
    • pp.271-290
    • /
    • 2014
  • In this study, structural irregularities in plan, which has a considerable effect on earthquake behavior of buildings, have been investigated in detail based on Turkish Earthquake Code 2007. The study consists of six main parametric models and a total of 144 sub-models that are grouped based on RC structural systems such as frame, frame + rigid core, frame with shear wall, and frame with shear wall + rigid core. All models are designed to have both symmetrical plan geometry and regular rigidity distribution. Changes in the earthquake behavior of buildings were evaluated according to the number of storeys, number of axes and the configuration of structural elements. Many findings are obtained and assessed as a result of the analysis for each structural irregularity. The study shows that structural irregularities can be observed in completely symmetric buildings in terms of plan geometry and rigidity distribution.

User Behavior on Changing the Password from the Shadow Work View (그림자노동 차원에서 본 IT 사용자의 비밀번호 변경행동 연구)

  • Park, Sang Cheol
    • The Journal of Information Systems
    • /
    • v.28 no.2
    • /
    • pp.93-107
    • /
    • 2019
  • Purpose The purpose of this study is to explain the mechanism of user behaviors in password reset context based on descriptive data from conducting interviews. Specifically, this study attempted to describe the process of changing password from the shadow work perspective. Design/methodology/approach This study has interviewed 8 participants who can freely use numerous online web-sites. This study also employed the grounded theory methodology to analyze interview manuscripts. After conducting analyzing the manuscripts, this study has extracted 46 codes in the coding steps and ultimately presented 8 categories by combining similar concepts from those codes. Findings According to the results, this study provides new viewpoints to explain unique user behavior in the password reset context by capturing the shadow work based on the results. This study further offers practical implications to numerous practitioners by finding various codes, which related to users' reaction and behavior.

User Intention-Awareness System for Goal-oriented Context-Awareness Service

  • Lee, Jung-Eun;Yoon, Tae-Bok;Lee, Jee-Hyong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.154-158
    • /
    • 2007
  • As the technology developed, the system is being developed as the structure that is adapted to the intelligent environment. Therefore, the existing situation information system couldn't provide satisfactory service to the user as it provides service only by the information which it received from the sensor. This paper analyzed the problems of the existing user intention awareness system and suggested user intention awareness system to provide a stable and efficient service that fits to the intention of the user compensating this. This paper has collected the behavior data based on the scenario of the sequential behavior course of the user that occurs at breakfast time in the kitchen which is the home domain environment thai is closely related to our lives. This scenario course also showed the flow that the goal intentional user intention awareness system acted that it suggested, and showed the sequential course processing the user behavior data by tables and charts.

Role-Behavior Based Access Control on Mobile Agent System for Workflow Management System (워크플로우 응용을 위한 이동 에이전트 시스템에의 역할-행위 기반 접근통제 적용)

  • Shin, Wook;Lee, Dong-Ik;Yoon, Seok-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.11-28
    • /
    • 2000
  • In these days it is rapidly increasing that multi-user, multi-layered commercial software developments for companies or public institutions. Security services are necessary for most of systems and the access control service is the essential of security services. Current access control methods that are used as access control policies are classified as Discretionary Access Control Mandatory Access Control and Role Based Access Control. However there are some inefficiencies when those methods are applied to current multi-user, multi-layered systems. Therefore it is required that a new access control method that takes complex system resources into account from the side of policy. In this paper extending previous Role Based of 'Behavior' and a basic model of the method. And we simply implement the method on the mobile agent based workflow management system that is a representative example of multi-user. multi-layered softwares and shows implementation results to tap possibilities of real-world application.

An Empirical Study about Internet and Social Network Security Behavior of End User (최종사용자의 인터넷과 소셜 네트워크 보안 행동에 대한 실증 연구)

  • Park, Kyung-Ah;Lee, Dae-Yong;Koo, Chul-Mo
    • The Journal of Information Systems
    • /
    • v.21 no.4
    • /
    • pp.1-29
    • /
    • 2012
  • The purpose of this study was to find about personal information security of internet and social networks by focusing on end users. User competence and subjective criterion, which are the antecedents, are affecting security behaviors For these security behaviors, the study examined the relationship between security behavior intention on internet use and security behavior intention about social network that is actively achieved in many fields. Behaviors of internet and social network were classified into an action of executing security and an action of using a security technology. In addition, this study investigated a theory about motivational factors of personal intention on a certain behavior based on theory of reasoned action in order to achieve the purpose of this study. A survey was conducted on 224 general individual users through online and offline, and the collected data was analyzed with SPSS 12.0 and SmartPLS 2.0 to verify demographic characteristics of respondents, exploratory factor analysis, and suitability of a study model. Interesting results were shown that security behavior intention of social network is not significant in all security behavior execution, which is security performance behavior, and security technology use. Internet security behavior is significant to security technology use but it does not have an effect on behavior execution.

Dynamic behavior control of a collective autonomous mobile robots using artificial immune networks (인공면역네트워크에 의한 자율이동로봇군의 동적 행동 제어)

  • 이동욱;심귀보
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.124-127
    • /
    • 1997
  • In this paper, we propose a method of cooperative control based on immune system in distributed autonomous robotic system(DARS). Immune system is living body's self-protection and self-maintenance system. Thus these features can be applied to decision making of optimal swarm behavior in dynamically changing environment. For the purpose of applying immune system to DARS, a robot is regarded as a B lymphocyte(B cell), each environmental condition as an antigen, and a behavior strategy as an antibody respectively. The executing process of proposed method is as follows. When the environmental condition changes, a robot selects an appropriate behavior strategy. And its behavior strategy is simulated and suppressed by other robot using communication. Finally much simulated strategy is adopted as a swarm behavior strategy. This control scheme is based on clonal selection and idiotopic network hypothesis. And it is used for decision making of optimal swarm strategy.

  • PDF

Examining the Impact of Online Friendship Desire on Citizenship Behavior (온라인 환경에서 친교욕구가 시민행동에 끼치는 영향)

  • Jang, Yoon-Jung;Lee, So-Hyun;Kim, Hee-Woong
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.29-51
    • /
    • 2013
  • In line with network technology development and smart device penetration, the social network service (SNS) has expanded its influence. The SNS which is a service based on communication and sharing among people, has grown based on users' voluntary engagement and participation and its influence has appeared beyond the cyberspace into the overall areas of domestic and foreign culture and society. In particular, SNS-based real-time communication during diverse disasters, can help prevent further damage. By sharing information on social donation activities and environmental campaigns, people have used SNS as a tool to change the society in a more positive way. Such series of activities functioning as a power to change the society have been made much faster and wider through the help of a new media called SNS. To better understand such trends, we are required to study about the SNS and its user relationships first. In this context, this study sought to identify the effects of people's desire to build friendships through SNS on the voluntary and society-friendly activities of people. This study considers online pro-social behavior and proposes online citizenship behavior. Citizenship behavior has been examined in organization context. That is, organizational citizenship behavior explains an employee's pro-social behavior in an organization context. Organizational citizenship behavior is characterized by the individual's helping others and promoting the functioning of the organization. By applying organizational citizenship behavior to an online context, we propose online citizenship behavior, an individual's pro-social behavior in an online context. An individual's pro-social behavior, i.e., online citizenship behavior, could be considered as a way for the better management of online community and society. It also needs to examine the development of online citizenship behavior. This study examined online citizenship behavior from the friendship desire. Because online society or community is characterized by online relationships between members, the friendship between members would lead to pro-social behavior, i.e., helping others and promoting the functioning of the online society, in such online context. This study further examines the antecedents of friendship desire in terms of SNS interactivity with its four factors. The findings based on the survey from real SNS users explain that the three factors of SNS interactivity (connectivity, enjoyment, and synchronicity) increases online friendship desire which then increases online citizenship behavior significantly. This study contributes to the literature by examining the key role of online friendship desire in leading to online citizenship behavior and identifying its antecedents in terms of SNS characteristics. The findings in this study also provide guidance on how to manage online society and how to promote the effective functioning of SNS.

A user behavior prediction technique using mobile-based Lifelog (모바일 기반 라이프로그를 이용한 사용자 행동 예측 기법)

  • Bang, Jae-Geun;Kim, Byeong Man
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.6
    • /
    • pp.63-76
    • /
    • 2014
  • Recently the desired information has been recommended to many people in a number of ways using the smartphone. Though there are many applications for that purpose, but most applications does not consider the user's current situation. In order to automatically recommend the information considering the user's situation, it is necessary to predict the future behavior of the user from the records of the past behavior of the user. Therefore, in this paper, we propose a method that predicts the user's future behavior through association analysis based on the user's current behavior which is identified by applying the user's current situation data collected via a smartphone to the Bayesian network built from the user's life log. From the experiments and analysis for five students and five virtual workers, the usefulness of the proposed method is confirmed.