• 제목/요약/키워드: the itself problem

검색결과 814건 처리시간 0.031초

Near-optimum trajectory planning for robot manipulators

  • Yamamoto, Motoji;Marushima, Shinya;Mohri, Akira
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1989년도 한국자동제어학술회의논문집; Seoul, Korea; 27-28 Oct. 1989
    • /
    • pp.621-626
    • /
    • 1989
  • An efficient algorithm for planning near-optimum trajectory of manipulators is proposed. The algorithm is divided into two stages. The first one is the optimization of time trajectory with given spatial path. And the second one is the optimization of the spatial path itself. To consider the second problem, the manipulator dynamics is represented using the path parameter "s", then a differential equation corresponding to the dynamics is solved as two point boundary value problem. In this procedure, the gradient method is used to calculate improved input torques.t torques.

  • PDF

콜린 로우(Colin Rowe) '투명성(transparency) 이론'의 비판적 고찰 - 투명성에 내재된 시간 개념의 분석을 중심으로 - (A Critical Study on Colin Rowe's 'Transparency' - Focusing on the Analysis of the meaning of 'Time and Simultaneity' implicated in 'Transparency' -)

  • 권태일
    • 건축역사연구
    • /
    • 제15권2호
    • /
    • pp.115-136
    • /
    • 2006
  • Colin Rowe's 'Transparency' is one of core ideas applied to 20th Modern Architecture. It implies not only an optical characteristic, the perfectly clear, but also a broader spacial order, a simultaneous perception of different spacial locations. The former connected with physical attribute itself, and the latter deeply with the metaphorical idea of time, 'Simultaneity', embodying a new spacial quality. However, If we analyze the meaning of "Simultaneity" implicated in "Transparency" with the perspective of Henry Bergson's "Duration", there would be only little possibility as a solution to the problem of embodying a new spacial quality in architecture. As such a question emerging, this paper attempts to point out the problem of Colin Rowe's idea, "Simultaneity", and suggest a new architectural design method to overcome its inconsistency by interpretation and application of Bergson's "Image and Rhythm".

  • PDF

WorldView-2 pan-sharpening by minimization of spectral distortion with least squares

  • Choi, Myung-Jin
    • 대한원격탐사학회지
    • /
    • 제27권3호
    • /
    • pp.353-357
    • /
    • 2011
  • Although the intensity-hue-saturation (IHS) method for pan-sharpening has a spectral distortion problem, it is a popular method in the remote sensing community and has been used as a standard procedure in many commercial packages due to its fast computing and easy implementation. Recently, IHS-like approaches have tried to overcome the spectral distortion problem inherited from the IHS method itself and yielded a good result. In this paper, a similar IHS-like method with least squares for WorldView-2 pan-sharpening is presented. In particular, unlike the previous methods with three or four-band multispectral images for pan-sharpening, six bands of WorldView-2 multispectral image located within the range of panchromatic spectral radiance responses are considered in order to reduce the spectral distortion during the merging process. As a result, the new approach provides a satisfactory result, both visually and quantitatively. Furthermore, this shows great value in spectral fidelity of WorldView-2 eight-band multispectral imagery.

스마트 카드에 적합한 인증 프로토콜에 관한 연구 (A Study on the Authentication Protocols Fitted for Smart Cards)

  • 이지영
    • 한국컴퓨터정보학회논문지
    • /
    • 제4권4호
    • /
    • pp.9-14
    • /
    • 1999
  • 공개키 암호화 알고리즘을 사용하는 인증기법은 비밀키로 인증값을 생성하여 자신을 증명하고. 공개키를 통하여 검증하는 방법이다. 본 연구에서는 대칭형 암호화 알고리즘을 이용한 인증에서의 문제점이었던 비밀키의 분배 및 관리의 문제점은 해결하고 공개키 리스트에 대한 관리 문제를 인증센타를 통하여 인증서를 발급받는 형태의 방법을 제공하여 공개키 관리를 효율적으로 할 수 있는 알고리즘을 제시한다.

  • PDF

An Evolutionary Computing Approach to Building Intelligent Frauds Detection System

  • Kim, Jung-Won;Peter Bentley;Chol, Jong-Uk;Kim, Hwa-Soo
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2001년도 The Pacific Aisan Confrence On Intelligent Systems 2001
    • /
    • pp.97-108
    • /
    • 2001
  • Frauds detection is a difficult problem, requiring huge computer resources and complicated search activities Researchers have struggled with the problem. Even though a fee research approaches have claimed that their solution is much better than others, research community has not found 'the best solution'well fitting every fraud. Because of the evolving nature of the frauds. a novel and self-adapting method should be devised. In this research a new approach is suggested to solving frauds in insurance claims credit card transaction. Based on evolutionary computing approach, the method is itself self-adjusting and evolving enough to generate a new self of decision-makin rules. We believe that this new approach will provide a promising alternative to conventional ones, in terms of computation performance and classification accuracy.

  • PDF

Mutual Authentication Protocol Using a Low Power in the Ubiquitous Computing Environment

  • Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2004년도 Proceedings of ISRS 2004
    • /
    • pp.91-94
    • /
    • 2004
  • Ubiquitous sensor network is to manage and collect information autonomously by communicating user around device. Security requirements in Ubiquitous based on sensor network are as follows: a location of sensor, a restriction of performance by low electric power, communication by broadcasting, etc. We propose new mutual authentication protocol using a low power of sensor node. This protocol solved a low power problem by reducing calculation overload of sensor node using two steps, RM(Register Manager) and AM(Authentication Manager). Many operations performing the sensor node itself have a big overload in low power node. Our protocol reduces the operation number from sensor node. Also it is mutual authentication protocol in Ubiquitous network, which satisfies mutual authentication, session key establishment, user and device authentication, MITM attack, confidentiality, integrity, and is safe the security enemy with solving low electric power problem.

  • PDF

An Evolutionary Computing Approach to Building Intelligent Frauds Detection Systems

  • Kim, Jung-Won;Peter Bentley;Park, Jong-Uk
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2001년도 춘계정기학술대회
    • /
    • pp.293-304
    • /
    • 2001
  • frauds detection is a difficult problem, requiring huge computer resources and complicated search activities. researchers have struggled with the problem. Even though a flew research approaches have claimed that their solution is much bettor than others, research community has not found 'the best solution'well fitting every fraud. Because of the evolving nature of the frauds, a Revel and self-adapting method should be devised. In this research a new approach is suggested to solving frauds in insurance claims and credit card transaction. Based on evolutionary computing approach, the method is itself self-adjusting and evolving enough to generate a new set of decision-making rules. We believe that this new approach will provide a promising alternative to conventional ones, in terms of computation performance and classification accuracy.

  • PDF

Hyperinvariant Subspaces for Some 2 × 2 Operator Matrices, II

  • Jung, Il Bong;Ko, Eungil;Pearcy, Carl
    • Kyungpook Mathematical Journal
    • /
    • 제59권2호
    • /
    • pp.225-231
    • /
    • 2019
  • In a previous paper, the authors of this paper studied $2{\times}2$ matrices in upper triangular form, whose entries are operators on Hilbert spaces, and in which the the (1, 1) entry has a nontrivial hyperinvariant subspace. We were able to show, in certain cases, that the $2{\times}2$ matrix itself has a nontrivial hyperinvariant subspace. This generalized two earlier nice theorems of H. J. Kim from 2011 and 2012, and made some progress toward a solution of a problem that has been open for 45 years. In this paper we continue our investigation of such $2{\times}2$ operator matrices, and we improve our earlier results, perhaps bringing us closer to the resolution of the long-standing open problem, as mentioned above.

스마트 배움터 시스템 설계에 관한 연구 (Eliciting and Analyzing Requirements for Smart Environment for Future-Oriented Learning and Coaching)

  • 이정우;이혜정;김민선
    • 지식경영연구
    • /
    • 제14권1호
    • /
    • pp.121-132
    • /
    • 2013
  • In education, innovative ways of teaching and learning are always under development and keep being proposed with advanced concepts since the ancient times. Student-centered learning, problem-based learning and cooperative learning have been three major trends under development in secondary education research and practice more than a decade or so. Combined with advanced information and communication technologies, these trends will greatly transform the way we teach and learn in classroom environment and may change the classroom environment itself, into a more interactive and self-centered coaching type environment. In this study, a smart environment that utilizes advanced information technology devices and network is conceptualized, accommodating requirements contained and proposed in the recent trendy pedagogies. Pedagogical cases discussed in these trends are analyzed in detail, producing requirements for such a learning and coaching environment. These requirements are modeled using unified modeling language, leading to a proposal of a basic architecture for an information system supporting this environment.

  • PDF

Development of a novel set of criteria to select methodology for designing product service systems

  • Tran, Tuananh;Park, Joon Young
    • Journal of Computational Design and Engineering
    • /
    • 제3권2호
    • /
    • pp.112-120
    • /
    • 2016
  • This paper proposes eight groups of twenty nine scoring criteria that can help designers and practitioners to compare and select an appropriate methodology for a certain problem in designing product service system (PSS). PSS has been researched for more than a decade and is now becoming more and more popular in academia as well as industry. Despite that fact, the adoption of PSS is still limited for its potential. One of the main reasons is that designing PSS itself is a challenge. Designers and developers face difficulties in choosing appropriate PSS design methodologies for their projects so that they can design effective PSS offerings. By proposing eight groups of twenty nine scoring criteria, this paper enables a "step by step" process to identify the most appropriate design methodology for a company's PSS problem. An example is also introduced to illustrate the use of the proposed scoring criteria and provide a clear picture of how different design methodologies can be utilized at their best in terms of application.