• Title/Summary/Keyword: CYBER제어언어

Search Result 5, Processing Time 0.02 seconds

CyberClass Avatar System using Task-Level Behavior Description Language (작업 수준의 행위 표현 언어를 이용한 사이버강의용 아바타 시스템)

  • Kim, Jung-Hee;Lim, Soon-Bum
    • The KIPS Transactions:PartB
    • /
    • v.11B no.5
    • /
    • pp.597-602
    • /
    • 2004
  • In spite of recent increase in the use of avatar systems in Web and Virtual Reality, there has not been a service that allows users to control directly the avatar behaviors. In addition, the conventional behavior control languages required a lot of complicated information for controlling the behaviors, so that users had difficulty using them. To apply written languages to a different task domain, moreover, it was necessary to modify or rewrite the languages. In this paper, for the avatar behavior control more simply define, “Task-Level Behavior Description Language,” which allows description the avatar behaviors in each task domain and “Motion Representation Language,” which enables writing detailed data for motion control. The system, developed in this paper, “included an Interpreter,” which automatically creates the Motion Representation Language, allowing users to easily control the avatar behaviors simply with the Behavior Description Language. The system was also applied to cyber classes, and the Task-level Behavior Description Language was compared with conventional languages to see how it was more effective in behavior description.

A Visualization Tool Implementation for Evaluation of Binary Code to Smart Intermediate Language Conversion (바이너리 코드-SIL 중간언어 변환 검증을 위한 시각화 도구 구현)

  • Lim, Jung-Ho;Lee, Tae-Gue;Baik, Do-Woo;Son, Yunsik;Jeong, Junho;Choi, Jin-Young;Ko, Kwangman;Oh, Seman
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.280-282
    • /
    • 2017
  • 최근 소프트웨어에 내장된 취약점 분석을 위한 자동화 도구 개발 연구가 각 분야에서 활발히 연구되고 있다. 그 중 바이너리 코드를 대상으로 바로 보안취약점을 분석하는 방법이 아닌 중간언어를 활용하여 분석하는 방법이 대두되고 있으며 이를 위한 다양한 중간언어가 제시되었다. 그 중 하이레벨 언어 수준의 내용의 기술이 가능하며 명령어 자체적으로 자료형을 유지하여 보안 취약점 분석에 효과적인 언어로 SIL 중간언어가 재조명 받고 있다. 따라서 본 논문에서는 이룰 위해서 x86/64 기반 어셈블리어를 SIL 로 효과적으로 변환하며 프로그램의 의미가 변하지 않는 것을 확인하기 위해서 프로그램의 제어흐름을 시각화하는 기능을 가진 시스템을 제안한다.

Method of DNC System Communication for FMS Construction (FMS 구축을 위한 DNC 시스템 통신기법)

  • 이석희;배용환
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.4
    • /
    • pp.805-815
    • /
    • 1994
  • The development of automatic production systems has a trend toward Computer Integrated Manufacturing System(CIMS) in recent years. In hardware configuration, CIMS are composed of intelligent CAD/CAM work stations, multifunction CNC machining centers including material handling systems. The DNC systems present the key element of automation hierarchy in a FMS. A DNC system is one which connects a number of numerically-controlled machines to a common memory in a digital computer for part program storage with provision for on-demand distribution of part program data to machines using communication in hierarchical structure of central computer, control computer and cell controller. This paper describes the development of Behind-the-Tape-Reader(BTR) type DNC system using CYBER 180-830 as a central computer and IBM PC-386 cell control computer and NC lathe with FANUC 5T NC controller. In this system, the connection between central computer and cell control computer is done via RS-232C serial interface board, and the connection between cell control computer and FANUC 5T controller is done via parallel interface board. The software consists of two module, central computer communication module for NC program downloading and status uploading, NC machine running module for NC operating.

Design and Implementation of avatar behaving on Internet Using EAI (EAI를 이용한 인터넷 상에서의 아바타 동작에 관한 설계 및 구현)

  • 정회경;안성옥;정재길
    • The Journal of Information Technology
    • /
    • v.4 no.1
    • /
    • pp.97-108
    • /
    • 2001
  • This thesis is about the design and implementation of the system for controlling Avatar, user's alter ego in a simulated world using the EAI(External Authoring Interface) technology to be able to control VRML(Virtual Reality Modeling Language). In this thesis, user's Avatar described in VRML language embodied interactions to move and show an expression by JAVA according to a user's demand. In the future, this would be able to develop into a research to try to embody and construct a simulated society based on web for the purpose of various integration of society such as cyber government, lecture, trial performance, and auction.

  • PDF

A Study on a Computer Program Visualization Method Effective for the e-Learning Contents (이 러닝 콘텐츠에 효과적인 컴퓨터 프로그램 시각화 방안에 대한 연구)

  • Ha, Sang-Ho
    • Journal of Engineering Education Research
    • /
    • v.10 no.3
    • /
    • pp.109-124
    • /
    • 2007
  • With the advance of the Internet and computing technologies, e-learning is now a hot issue worldwide for providing the effective learning on the cyber-space. However, most of existing e-learning contents have been developed mainly based on text, including simple multimedia elements such as images, animations, and voices. This paper suggests a method effective for the computer programming e-learning. The method is based on program visualization using flowcharts. It features the stepwise hierarchical program visualization on the level of statements, the flowchart based visualization for control constructs of languages, visualization over whole programs, visualization compared with source codes, and interaction with users. Finally, we implement a system to realize the suggested method, and execute it for an example program.