• Title/Summary/Keyword: 프레임워크 구현

Search Result 1,167, Processing Time 0.025 seconds

Reproducing water flow using 3D game engine (3D게임엔진을 이용한 물 흐름 재현)

  • Woochul Kang;Eun-kyung Jang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.432-432
    • /
    • 2023
  • 한국건설기술연구원(Korea Institute of Civil Engineering and Building Technology, KICT)의 안동하천연구센터(Andong River Experiment Center, REC)는 다양한 하천 관련 실규모 실험을 수행하기 위해 3개의 수로를 보유하고 있다. 본 연구의 주목적인 실증 실험 계측 결과를 기반으로 3D 게임엔진을 이용하여 물 흐름을 재현하기 위해 A1 수로를 대상구간으로 설정하였다. 실증 실험의 경우 2개의 수문 개도율 조건에서 ADV와 ADCP를 활용하여 계측된 유량 및 유속 결과들을 비교하였으며, 추가적으로 영상 데이터로 부터 표면유속(LS-PIV)을 산정하였다. 3D 게임 엔진은 렌더링 엔진, 물리 엔진, 오디오 엔진, UI 시스템, 게임플레이 프레임워크 등이 잘 융합된 소스코드들과 개발자들이 이용하기 쉬운 방식으로 변환된 툴(tool)로 제공하여 현실 세계를 가상 세계에 시각화하여 구현하는데 큰 장점을 가지고 있다. 또한 기존의 흐름 재현이 가능한 수리/수문 모델링의 경우 특정한 목적으로만 이용가능하고 연산에 소용되는 시간 때문에 실시간 흐름재현이 어렵지만, 3D 게임엔진을 이용하는 경우 다양한 목적과 여러 분야와의 고려가 동시에 가능하며 연산의 단순화를 통해 실시간 흐름 재현이 가능하다는 장점이 있다. 본 연구에서는 언리얼 엔진의 Niagara Fluids와 Fluid flux 툴들을 활용하여 하천실증실험 시설 일부 구간에 대해 물 흐름을 재현하였다. 먼저 하천실험실증시설을 드론과 RTK-GPS를 이용하여 촬영된 결과를 정합하여 3D 게임엔진 기반 흐름 재현을 위한 지형 기초 자료를 구축하였다. 지형 계측 결과를 기반으로 A1 수로 전체 구간을 대상구간으로 설정한 이후 수문 조절을 통해 흐름 조건을 제어할 수 있도록 제작하였으며, 실제 흐름에 대한 계측 결과를 기반으로 재현된 흐름을 대상으로 material 값의 조정(방향 X, Y값을 RGB값으로 변환한 뒤 벡터 길이 값으로 환산)을 통해 0~100 사이 값을 이용하여 유속을 표현하였다. 최근 가상공간 (i.e. 디지털트윈) 관련 시장 성장이 매우 빠르고 다양한 사업에서 해당 기술의 수요가 증가하고 있으며, 본 연구를 통해 물 흐름의 디지털 트윈화를 위한 수단으로서 3D 게임 엔진의 활용 가능성을 확인하였다. 다만 실제 하천의 적용과 하천관리를 위한 실용화를 위해서는 추가적인 연구와 분석이 이루어져야 할 것이다.

  • PDF

Exploring the Effectiveness of GAN-based Approach and Reinforcement Learning in Character Boxing Task (캐릭터 복싱 과제에서 GAN 기반 접근법과 강화학습의 효과성 탐구)

  • Seoyoung Son;Taesoo Kwon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.29 no.4
    • /
    • pp.7-16
    • /
    • 2023
  • For decades, creating a desired locomotive motion in a goal-oriented manner has been a challenge in character animation. Data-driven methods using generative models have demonstrated efficient ways of predicting long sequences of motions without the need for explicit conditioning. While these methods produce high-quality long-term motions, they can be limited when it comes to synthesizing motion for challenging novel scenarios, such as punching a random target. A state-of-the-art solution to overcome this limitation is by using a GAN Discriminator to imitate motion data clips and incorporating reinforcement learning to compose goal-oriented motions. In this paper, our research aims to create characters performing combat sports such as boxing, using a novel reward design in conjunction with existing GAN-based approaches. We experimentally demonstrate that both the Adversarial Motion Prior [3] and Adversarial Skill Embeddings [4] methods are capable of generating viable motions for a character punching a random target, even in the absence of mocap data that specifically captures the transition between punching and locomotion. Also, with a single learned policy, multiple task controllers can be constructed through the TimeChamber framework.

Analyses of Requirement of Security based on Gateway Architecture for Secure Internet (사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.461-470
    • /
    • 2016
  • As IoT is broadly used in many fields, the security of IoT is becoming especially important and critical issues. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. Sensor has limited resources such as computing power, memory, battery. By means of deeply analyzing the security architecture and features in security framework. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape. This special issue features recent and emerging advances IoT architecture, protocols, services and applications. The alternative method is IoT security gateway. In this paper, we surveyed the demands and requirements. By means of deeply analyzing the security architecture and features, we analyzed the demands and requirements for security based on gateway application.

Development of AI-based Smart Agriculture Early Warning System

  • Hyun Sim;Hyunwook Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.67-77
    • /
    • 2023
  • This study represents an innovative research conducted in the smart farm environment, developing a deep learning-based disease and pest detection model and applying it to the Intelligent Internet of Things (IoT) platform to explore new possibilities in the implementation of digital agricultural environments. The core of the research was the integration of the latest ImageNet models such as Pseudo-Labeling, RegNet, EfficientNet, and preprocessing methods to detect various diseases and pests in complex agricultural environments with high accuracy. To this end, ensemble learning techniques were applied to maximize the accuracy and stability of the model, and the model was evaluated using various performance indicators such as mean Average Precision (mAP), precision, recall, accuracy, and box loss. Additionally, the SHAP framework was utilized to gain a deeper understanding of the model's prediction criteria, making the decision-making process more transparent. This analysis provided significant insights into how the model considers various variables to detect diseases and pests.

Strengthening Enterprise Security through the Adoption of Zero Trust Architecture - A Focus on Micro-segmentation Approach - (제로 트러스트 아키텍처 도입을 통한 기업 보안 강화 방안 - 마이크로 세그먼테이션 접근법 중심으로 -)

  • Seung-Hyun Joo;Jin-Min Kim;Dae-Hyun Kwon;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Zero Trust, characterized by the principle of "Never Trust, Always Verify," represents a novel security paradigm. The proliferation of remote work and the widespread use of cloud services have led to the establishment of Work From Anywhere (WFA) environments, where access to corporate systems is possible from any location. In such environments, the boundaries between internal and external networks have become increasingly ambiguous, rendering traditional perimeter security models inadequate to address the complex and diverse nature of cyber threats and attacks. This research paper introduces the implementation principles of Zero Trust and focuses on the Micro Segmentation approach, highlighting its relevance in mitigating the limitations of perimeter security. By leveraging the risk management framework provided by the National Institute of Standards and Technology (NIST), this paper proposes a comprehensive procedure for the adoption of Zero Trust. The aim is to empower organizations to enhance their security strategies.

Analysis of Data Isolation Methods for Secure Web Site Development in a Multi-Tenancy Environment (멀티테넌시 환경에서 안전한 웹 사이트 개발을 위한 데이터격리 방법 분석)

  • Jeom Goo Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.35-42
    • /
    • 2024
  • Multi-tenancy architecture plays a crucial role in cloud-based services and applications, and data isolation within such environments has emerged as a significant security challenge. This paper investigates various data isolation methods including schema-based isolation, logical isolation, and physical isolation, and compares their respective advantages and disadvantages. It evaluates the practical application and effectiveness of these data isolation methods, proposing security considerations and selection criteria for data isolation in the development of multi-tenant websites. This paper offers important guidance for developers, architects, and system administrators aiming to enhance data security in multi-tenancy environments. It suggests a foundational framework for the design and implementation of efficient and secure multi-tenant websites. Additionally, it provides insights into how the choice of data isolation methods impacts system performance, scalability, maintenance ease, and overall security, exploring ways to improve the security and stability of multi-tenant systems.

Design and Implementation of GML Transformation System based on Standard Transportation Framework Model of TTA (TTA 표준 교통 프레임워크 데이터 모델 기반 GML 변환 시스템 설계 및 구현)

  • Lee, Ki-Won;Kim, Hak-Hoon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.3
    • /
    • pp.25-35
    • /
    • 2006
  • Standardization or standard-related study are regarded as main issues in GIS applications. Though several GIS standards and specifications have been released, there are a few actual application cases adapting those. In this study, we designed and implemented a geo-spatial information processing system with editing, storing, and disseminating functions, in which standard GIS transportation data model by TTA linked with OGC-GML, XML-based geographic features encoding standard. The system developed in this study enables us to transfer and edit transportation entities based on TTA standards to GML, importing ESRI shapefile. In web-based system, GML-based databases are transformed to SVG file, for the purpose of web publishing. TTA GIS transportation data model is used in this study, and tested; however, standard data models from other application fields also can be easily applied because this system basically provides data importing and editing functions. This system as practical tools can be utilized for applicability test of GIS standard data model and practical operation of standard specification.

  • PDF

Big Data based Tourist Attractions Recommendation - Focus on Korean Tourism Organization Linked Open Data - (빅데이터 기반 관광지 추천 시스템 구현 - 한국관광공사 LOD를 중심으로 -)

  • Ahn, Jinhyun;Kim, Eung-Hee;Kim, Hong-Gee
    • Management & Information Systems Review
    • /
    • v.36 no.4
    • /
    • pp.129-148
    • /
    • 2017
  • Conventional exhibition management information systems recommend tourist attractions that are close to the place in which an exhibition is held. Some recommended attractions by the location-based recommendation could be meaningless when nothing is related to the exhibition's topic. Our goal is to recommend attractions that are related to the content presented in the exhibition, which can be coined as content-based recommendation. Even though human exhibition curators can do this, the quality is limited to their manual task and knowledge. We propose an automatic way of discovering attractions relevant to an exhibition of interests. Language resources are incorporated to discover attractions that are more meaningful. Because a typical single machine is unable to deal with such large-scale language resources efficiently, we implemented the algorithm on top of Apache Spark, which is a well-known distributed computing framework. As a user interface prototype, a web-based system is implemented that provides users with a list of relevant attractions when users are browsing exhibition information, available at http://bike.snu.ac.kr/WARP. We carried out a case study based on Korean Tourism Organization Linked Open Data with Korean Wikipedia as a language resource. Experimental results are demonstrated to show the efficiency and effectiveness of the proposed system. The effectiveness was evaluated against well-known exhibitions. It is expected that the proposed approach will contribute to the development of both exhibition and tourist industries by motivating exhibition visitors to become active tourists.

  • PDF

Design and Implementation of an Ontology-based Access System of Nutrition and Food Guide Tower in Middle School Home Economics (온톨로지 기반 중학교 기술. 가정교과 영양소의 질의응답 시스템 설계 및 구현)

  • Cho, Young-Sun;Baek, Hyeon-Gi;Kim, Jeong-Kyoum;Yu, Jeong-Su
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.3
    • /
    • pp.317-327
    • /
    • 2007
  • The purpose of this study is to consider ontology theory and get to forge design and implementation of ontology-based access system which is support to the nutrition and food guide tower of Home Economics textbooks in middle school in order to offer the way of effective learning performance. It offers a model by establishing a nutrition and food guide tower access system based on Protege-2000 framework. This system is on the basis of XML, and it makes possible to work with semantic web, a next generation internet technology, and provides a meaning structure that can be shared in the field of nutrition in order to build up the fundament of knowledge an information system for the mutual operations. A learner can systemize the knowledge through a self-information access and an instructor can also check out the degree of learner's learning-accomplishment and interests, directly putting the access system into the teaching and learning process. In addition, it is supposed that the learner can maintain a balance and healthy life by internalizing his or her knowledge throughout ontology not only in a teaching and learning process but also in a daily life.

  • PDF

Study on surface processing design of aluminum alloy materials that is applied to IT and electronics (IT 및 전자제품에 적용되는 알루미늄 합금소재의 표면처리디자인에 관한 연구)

  • Han, Jisu;Kim, Pureum;Kim, Hyun-Sung
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.27 no.4
    • /
    • pp.212-219
    • /
    • 2017
  • To become a person that is suitable to the 'High-Touch' generation where emotion takes over, we can focus on 6 skill including design, story, harmony, empathy, play, and meaning. Among these skills, harmony with design was chosen as the most important skill. Design can be seen as the basic element of all business, but it will be difficult to match the flow of the future Sensibility and intuitive generation with just the modern design that has been made based on reasonable and objective information and knowledge. This study suggests system and standardization of Sensibility surface processing design that satisfies great quality, attractive quality and Sensibility quality by applying surface processing design of product and Sensibility cognitive factors felt by the consumer by setting differentiated strategy and CMF (Color, Material, Finishing) understanding along with the importance of design materials in primary aspect. By considering the efficacy/characteristic of new surface processing characteristic/differentiation/possibility of implementation according to setting direction of differentiated CMF strategy per type of parts applied to the product, visual surface processing sample was implemented. Through this, it is expected that practical communication connected tool and Sensibility surface processing design's strategic access framework can be applied by understanding and sharing comprehensive elements such as target product, part type, applied material, applied surface processing, surface color, surface texture, and implementing feeling to environments such as designers, CMF designers, surface processing experts, and engineers in IT, electronics, and other areas. when developing a product.