• Title/Summary/Keyword: independent object

Search Result 390, Processing Time 0.029 seconds

An Efficiency Analysis of Management System for Academy Affairs Process Based on MDA (MDA기반 학사관리 프로세스 유효성 분석)

  • Yoon, Jung-Mo;Kim, Chi-Ho
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.187-196
    • /
    • 2008
  • The system development approach method of the new paradigm, as being standardizing MDA(Model Driven Architecture) in OMG(Object Management Group), the core technique of MDA definite technique structure for system materialization focusing on Model, is to build the design and the statement for system in PIM(Platform Independent Model), Materialization technique, and to build PSM(Platform Specific Model) adapt to materialization environment, and then to be the technique transforming into language Platform suitable to materialization environment. It includes MOF(Meta-Object Facility), UML, XMI(XML Metadata Interchange), CWM(Common Warehouse Metamodel), the core of MDA. Though these operations MDA support automatic tools product the practicable system after carrying out transform operation with the above information. In this thesis, it will be approached how to design and materialize the Bachelor management system based on MDA and the importance of modeling should be emphasized by applying to the approach method based on MDA. It should be suggested how to develop software efficiently, written it out in PIM, and suggested the process transforming PSM into EJB by J2EE Platform. The system is designed and implemented using automatic tool, edit machine(Together Architect 2006 for Eclipse, Edit plus2) supporting MDA and Database Modeling tool(ER/WIN 4.1). In conclusion, it should be suggested the efficiency analysis result for development process of traditional and based on MDA.

On a Multi-Agent System for Assisting Human Intention

  • Tawaki, Hajime;Tan, Joo Kooi;Kim, Hyoung-Seop;Ishikawa, Seiji
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1126-1129
    • /
    • 2003
  • In this paper, we propose a multi-agent system for assisting those who need help in taking objects around him/her. One may imagine this kind of situation when a person is lying in bed and wishes to take an object on a distant table that cannot be reached only by stretching his/her hand. The proposed multi-agent system is composed of three main independent agents; a vision agent, a robot agent, and a pass agent. Once a human expresses his/her intention by pointing to a particular object using his/her hand and a finger, these agents cooperatively bring the object to him/her. Natural communication between a human and the multi-agent system is realized in this way. Performance of the proposed system is demonstrated in an experiment, in which a human intends to take one of the four objects on the floor and the three agents successfully cooperate to find out the object and to bring it to the human.

  • PDF

Dynamic Analysis of Multi-Robot System Forcing Closed Kinematic Chain (복수로봇 시스템의 동력학적 연구-대상물과 닫힌 체인을 형성할때의 문제-)

  • 유범상
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.19 no.4
    • /
    • pp.1023-1032
    • /
    • 1995
  • The multiple cooperating robot system plays an important role in the research of modern manufacturing system as the emphasis of production automation is more on the side of flexibility than before. While the kinematic and dynamic analysis of a single robot is performed as an open-loop chain, the dynamic formulation of robot in a multiple cooperating robot system differs from that of a single robot when the multiple cooperating robots form a closed kinematic chain holding an object simultaneously. The object may be any type from a rigid body to a multi-joint linkage. The mobility of the system depends on the kinematic configuration of the closed kinematic chain formed by robots and object, which also decides the number of independent input parameters. Since the mobility is not the same as the number of robot joints, proper constraint condition is sought. The constraints may be such that : the number of active robot joints is kept the same as mobility, all robot joints are active and have interrelations between each joint forces/torques, two robots have master-slave relation, or so on. The dynamic formulation of system is obtained. The formulation is based on recursive dual-number screw-calculus Newton-Eulerian approach which has been used for single robot analysis. This new scheme is recursive and compact symbolically and may facilitate the consideration of the object in real time.

An Information System Analysis and Design Methodology Based on Object-Oriented IDEF0: A Case Study for the PDM System of ship Production (OOIDEF0 기반의 정보시스템 분석 및 설계 기법: 조선 PDM 시스템 적용사례)

  • Kim, Jae-Gyun;Jang, Gil-Sang
    • IE interfaces
    • /
    • v.16 no.1
    • /
    • pp.70-84
    • /
    • 2003
  • Recently, object-oriented techniques have been used more and more for developments of an information system. But, established object-oriented methodologies are hard to express a business process of various abstract degrees in the analysis level and independent components of the system. They have difficulties in developing a large-scale information system of manufacturing industry such as PDM and CIM. This paper proposes an information system development methodology that imports the object-oriented IDEF0 (OOIDEF0) function model in analysis level. This methodology is made up of requirements gathering, system analysis, system design, and implementation. In requirements gathering level, organization diagram and interview technique are used for input data of OOIDEF0 function model. The OOIDEF0 function model, the interface model and function descriptions are made out in analysis level. Information objects and implementation objects are designed on the basis of the OOIDEF0 function model in design level. The database is built and programming is accomplished in implementation level. In order to prove the consistency and efficiency of the proposed methodology, the PDM system for ship production is modeled and prototyped.

Content-Dependent Authorization Mechanism using Predicates (술어를 이용한 내용 의존적 권한부여 기법)

  • 홍성림;박창원;정진완
    • Journal of KIISE:Databases
    • /
    • v.30 no.1
    • /
    • pp.1-13
    • /
    • 2003
  • In this paper, we present a content-dependent authorization mechanism for object-oriented database systems. So far, several models of authorization for object-oriented databases have been proposed, but most of these models do not support the authorization based on the database content. This paper shows how the traditional content-independent authorization model can be extended to provide the content-dependent authorization using predicates on the values of attributes of a class. The proposed model makes it possible to group objects that satisfy the specified conditions on the values of the objects and to grant a single authorization on those objects. This model supports the negative authorization and provides the concept of the strong and weak authorization to resolve conflicts between positive and negative authorizations. In addition, we address and resolve some of the problems that arise when the predicates are associated with the authorization. In particular, since the authorization operations of the traditional content- independent model become inadequate for our mode, we redefine the semantics of the authorization operations.

Distributed Parallel Computing Environment for Java (자바를 위한 분산된 병렬 컴퓨팅 환경)

  • 이상윤;김승호
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.23-37
    • /
    • 2004
  • Since java thread is an object which is treated as independent process within one execution space in the multiprocessing environment, we can use it for independent process of parallel processing. Using thread and synchronization mechanism of java enables us to write parallel application program easily. Therefore, a lot of results are exist which is apply the feature of java that support parallel processing to the distributed computing environment. In this paper, we introduce a system of environment that support parallel execution of thread which is included in legacy java program. The system named TORB(Transparent Object Request Broker) enables us parallel execution of legacy java program after simple converting process, since it support the feature of programming transparency. TORB is extended version of distributed programming tool that is published by our research team. And it had only typical distributed processing feature that is execute a specified function at the specified computer.

A Study on the Reference System for Spatial Information of Railway Object (철도 선로 및 시설물 공간정보 참조체계에 관한 연구)

  • Won, Jong-Un
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.441-448
    • /
    • 2014
  • The application of spatial information has drawn significant attention from a wide range of industries. Railway spatial information facilitates the cooperation among related parties and improves the efficiency of asset management and operations. This study proposes the structure of Railway Object IDentifier(ROID) on railway spatial information. Current facility management and train operation are based on relative positioning system. Despite many advantages, relative positioning system causes serious problems such as the entire reconfiguration of positioning in the case of line change. Another major concern is the interface compatibility between individual facilities with different relative positioning. ROID based on absolute positioning addresses these issues, allowing the information exchange and convergence between independent parties. This study proposes ROID based on OID standard with object IDentifier and service object-oriented reference system. Our ROID employs the absolute positioning and the unique identifier, maintaining the compatibility with existing management system.

Framework Model for Software Productivity Enhancement In Object-Oriented Environment (객체지향 환경에서 소프트웨어 생산성 향상을 위한 프레임워크 모델)

  • Kim, Young-Gyu;Yang, Hae-Sool;Choi, Hyung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.6
    • /
    • pp.1678-1689
    • /
    • 2008
  • Recently, OOM(Object-Oriented Method) access method which begins to apply to software development is emphasizing development cost and time reduction through independent software reuse. But because of planning to the exclusion of the lack of knowledge and expansion or performance for development technology many problems are coming out. Therefore, this thesis suggests Effective Object-Oriented Modeling methods considering the plan for higher productivity enhancement of software in the software development life cycle. Effective Object-Oriented Modeling method includes, methods, Use Case modeling methods, Analysis Modeling methods, Design Modeling methods and others. This thesis suggests Framework model method read in characteristics as follows. First, suggestion about effective object-oriented standard model development, Second, retrenchment of software development or maintenance cost, Third, solution about uncertain problems of projects in line with the application of new technology.

(Distance and Speed Measurements of Moving Object Using Difference Image in Stereo Vision System) (스테레오 비전 시스템에서 차 영상을 이용한 이동 물체의 거리와 속도측정)

  • 허상민;조미령;이상훈;강준길;전형준
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1145-1156
    • /
    • 2002
  • A method to measure the speed and distance of moving object is proposed using the stereo vision system. One of the most important factors for measuring the speed and distance of moving object is the accuracy of object tracking. Accordingly, the background image algorithm is adopted to track the rapidly moving object and the local opening operator algorithm is used to remove the shadow and noise of object. The extraction efficiency of moving object is improved by using the adaptive threshold algorithm independent to variation of brightness. Since the left and right central points are compensated, the more exact speed and distance of object can be measured. Using the background image algorithm and local opening operator algorithm, the computational processes are reduced and it is possible to achieve the real-time processing of the speed and distance of moving object. The simulation results show that background image algorithm can track the moving object more rapidly than any other algorithm. The application of adaptive threshold algorithm improved the extraction efficiency of the target by reducing the candidate areas. Since the central point of the target is compensated by using the binocular parallax, the error of measurement for the speed and distance of moving object is reduced. The error rate of measurement for the distance from the stereo camera to moving object and for the speed of moving object are 2.68% and 3.32%, respectively.

  • PDF

Development of a Formal Access Control Model in CORBA Security using the Z Language (Z 언어를 기반으로 CORBA 보안의 정형화된 접근 제어 모델 개발)

  • 김영균;김경범;인소란
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.79-94
    • /
    • 1997
  • OMG (Object Management Group) published a security service specification, called CORBA (Common Object Request Broker Architecture) security reference model because the integration of security and object-oriented techniques was critical for successful deployment of distributed object systems. The CORBA security reference model treats access control as an implementation independent semantic concept but has incomplete semantics of the access control function. Because of such imcompleteness it is difficult for the system administrator and the CORBA security implementor to have the same understanding for the meaning of access control in the CORBA security. We propose a formal model for access control the CORBA security using the formal description language, which is called Z language based on typed set theory. The proposed model provides concrete semantics of the access control function to both the system administrator and the implementor.