• Title/Summary/Keyword: computing model

Search Result 3,371, Processing Time 0.043 seconds

An intelligent planner of processing equipment for CSCW-based shop floor control in agile manufacturing

  • Kim, Hwajin;Cho, Hyunbo;Jung, Mooyoung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.185-192
    • /
    • 1995
  • A common control model used to implement computer integrated manufacturing(CIM) is based on the hierarchical decomposition of the shop floor activities, in which supervisory controllers are responsible for all the interactions among subordinates. Although the hierarchical control philosophy provides for easy understanding of complex systems, an emerging manufacturing paradigm, agile manufacturing, requires a new control structure necessary to accommodate the rapid development of a shop floor controller. This is what is called CSCW(computer supported cooperative work)-based control or component-based heterarchical control. As computing resources and communication network on the shop floor become increasingly intelligent and powerful, the new control architecture is about to come true in a modern CIM system. In this paper, CSCW-based control is adopted and investigated, in which a controller for a unit of device performs 3 main functions - planning, scheduling and execution. In this paper, attention is paid to a planning function and all the detailed planning activities for CSCW-based shop floor control are identified. Interactions with other functions are also addressed. Generally speaking, planning determines tasks to be scheduled in the future. In other words, planning analyzes process plans and transforms process plans into detailed plans adequate for shop floor control. Planning is also responsible for updating the process plan and identifying/resolving replanning activities whether they come from scheduling or execution.

  • PDF

H-Anim-based Definition of Character Animation Data (캐릭터 애니메이션 데이터의 H-Anim 기반 정의)

  • Lee, Jae-Wook;Lee, Myeong-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.10
    • /
    • pp.796-800
    • /
    • 2009
  • Currently, there are many software tools that can generate 3D human figure models and animations based on the advancement of computer graphics technology. However, we still have problems in interoperability of human data models in different applications because common data models do not exist. To address this issue, the Web3D Consortium and the ISO/IEC JTC1 SC24 WG6 have developed the H-Anim standard. However, H-Anim does not include human motion data formats although it defines the structure of a human figure. This research is intended to obtain interoperable human animation by defining the data for human motions in H- Anim figures. In this paper, we describe a syntactic method to define motion data for the H-Anim figure and its implementation. In addition, we describe a method of specifying motion parameters necessary for generating animations by using an arbitrary character model data set created by a general graphics tool.

Development of a Web Service based GIS-Enabled Storm-surge Visualization System (웹 서비스 기반 GIS 연동 폭풍.해일 시각화 시스템 개발)

  • Kim, Jin-Ah;Park, Jin-Ah;Park, K.S.;Kwon, Jae-Il
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.841-849
    • /
    • 2008
  • Natural disaster such as inundation due to the typhoon induced storm-surge has inflicted severe losses on the coastal area. The problem of global warming and sea surface rising has issued and thus influences the increase of frequency and potential power of storm-surge. What we can do is to make intelligent effort to predict and prevent the losses through the early warning and prevention activity from the accurate prediction and forecasting about the time-varying storm-surge height and its arriving time resulted from the numerical simulation with sea observations. In this paper, we developed the web service based GIS-Enabled storm-surge visualization system to predict and prevent the storm-surge disasters. Moreover. for more accurate topography around coastal area and fine-grid storm-surge numerical model, we have accomplished GIS-based coastal mapping through LiDAR measurement.

A Context-aware Messenger for Sharing User Contextual Information (사용자 컨텍스트 공유를 위한 상황인지 메신저)

  • Hong, Jin-Hyuk;Yang, Sung-Ihk;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.906-910
    • /
    • 2008
  • As the mobile environment becomes widely used, there is a growth on the concern about recognizing and sharing user context. Sharing context makes the interaction between human more plentiful as well as helps to keep a good social relationship. Recently, it has been applied to some messengers or mobile applications with sharing simple contexts, but it is still required to recognize and share more complex and diverse contexts. In this paper, we propose a context-aware messenger that collects various sensory information, recognizes representative user contexts such as emotion, stress, and activity by using dynamic Bayesian networks, and visualizes them. It includes a modular model that is effective to recognize various contexts and displays them in the form of icons. We have verified the proposed method with the scenario evaluation and usability test.

Uncertainty for Privacy and 2-Dimensional Range Query Distortion

  • Sioutas, Spyros;Magkos, Emmanouil;Karydis, Ioannis;Verykios, Vassilios S.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.210-222
    • /
    • 2011
  • In this work, we study the problem of privacy-preservation data publishing in moving objects databases. In particular, the trajectory of a mobile user in a plane is no longer a polyline in a two-dimensional space, instead it is a two-dimensional surface of fixed width $2A_{min}$, where $A_{min}$ defines the semi-diameter of the minimum spatial circular extent that must replace the real location of the mobile user on the XY-plane, in the anonymized (kNN) request. The desired anonymity is not achieved and the entire system becomes vulnerable to attackers, since a malicious attacker can observe that during the time, many of the neighbors' ids change, except for a small number of users. Thus, we reinforce the privacy model by clustering the mobile users according to their motion patterns in (u, ${\theta}$) plane, where u and ${\theta}$ define the velocity measure and the motion direction (angle) respectively. In this case, the anonymized (kNN) request looks up neighbors, who belong to the same cluster with the mobile requester in (u, ${\theta}$) space: Thus, we know that the trajectory of the k-anonymous mobile user is within this surface, but we do not know exactly where. We transform the surface's boundary poly-lines to dual points and we focus on the information distortion introduced by this space translation. We develop a set of efficient spatiotemporal access methods and we experimentally measure the impact of information distortion by comparing the performance results of the same spatiotemporal range queries executed on the original database and on the anonymized one.

ViStoryNet: Neural Networks with Successive Event Order Embedding and BiLSTMs for Video Story Regeneration (ViStoryNet: 비디오 스토리 재현을 위한 연속 이벤트 임베딩 및 BiLSTM 기반 신경망)

  • Heo, Min-Oh;Kim, Kyung-Min;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.3
    • /
    • pp.138-144
    • /
    • 2018
  • A video is a vivid medium similar to human's visual-linguistic experiences, since it can inculcate a sequence of situations, actions or dialogues that can be told as a story. In this study, we propose story learning/regeneration frameworks from videos with successive event order supervision for contextual coherence. The supervision induces each episode to have a form of trajectory in the latent space, which constructs a composite representation of ordering and semantics. In this study, we incorporated the use of kids videos as a training data. Some of the advantages associated with the kids videos include omnibus style, simple/explicit storyline in short, chronological narrative order, and relatively limited number of characters and spatial environments. We build the encoder-decoder structure with successive event order embedding, and train bi-directional LSTMs as sequence models considering multi-step sequence prediction. Using a series of approximately 200 episodes of kids videos named 'Pororo the Little Penguin', we give empirical results for story regeneration tasks and SEOE. In addition, each episode shows a trajectory-like shape on the latent space of the model, which gives the geometric information for the sequence models.

An Interface Sharing Service based on Jini (Jini 기반의 인터페이스 공유 서비스)

  • 문창주;문석현;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.227-240
    • /
    • 2003
  • When we develop and use the java-based distributed object system, the system developer must deploy distributed object, which is implemented to predefined interface, to network and the system user acquires reference about distributed object and changes reference to interface type. Sharing of interface is essential for these works In this paper, we propose the IRSJ(interface repository service based on jim) to improve efficiency of interface sharing at the JINI system development. the IRSJ is consisted of the java classes for JINI system and interface sharing service. If development teams perform collaborative work in short distance, the IRSJ can search interface file without information of lookup server or interface writer If development teams perform collaborative work in long distance, the IRJS can search interface with only an address of server that executes lookup service. Although the interface object not requires additional search, the interface object that failed search interface can download interface and use interface using remote event model. When the message service fails in interface search, the message service sends interface request message to a development team member who use the IRSJ automatically, so that interface sharing may be possible in short time.

Development of Speech Recognition System based on User Context Information in Smart Home Environment (스마트 홈 환경에서 사용자 상황정보 기반의 음성 인식 시스템 개발)

  • Kim, Jong-Hun;Sim, Jae-Ho;Song, Chang-Woo;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.328-338
    • /
    • 2008
  • Most speech recognition systems that have a large capacity and high recognition rates are isolated word speech recognition systems. In order to extend the scope of recognition, it is necessary to increase the number of words that are to be searched. However, it shows a problem that exhibits a decrease in the system performance according to the increase in the number of words. This paper defines the context information that affects speech recognition in a ubiquitous environment to solve such a problem and develops user localization method using inertial sensor and RFID. Also, we develop a new speech recognition system that demonstrates better performances than the existing system by establishing a word model domain of a speech recognition system by context information. This system shows operation without decrease of recognition rate in smart home environment.

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

Analysis for the Applicability of Automated Quantity Take-off Technique Using BIM Authoring Tools on Road Construction (BIM 저작도구를 활용한 도로공사 수량산출 자동화 활용성 분석)

  • Moon, Jin-Seok;Sun, Ji-Won;Choi, Won-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.5184-5191
    • /
    • 2013
  • The automated quantity take off technique using BIM authoring tools has been recently issued, and the studies of this method for the accuracy, efficiency, and the unit computing for the simple volume, area and number have been developed. Meanwhile the main concerns such as the details for the level of modelling, and the costs and time for the calculating BOQ item are still required to study. In this paper, the earth works, drainage works, pavement works, and facility works using BIM authoring tools are designed in 3D, and the applicability of automated quantity take off technique using BIM authoring tools is discussed, respectively. As a result, automated quantity take off are limited in the earth works, drainage works, pavement works, and facility works. But Most items of BOQ can be supported in Re-bar model.