• Title/Summary/Keyword: Computer model

Search Result 14,699, Processing Time 0.046 seconds

Development of KBIMS Architectural and Structural Element Library and IFC Property Name Conversion Methodology (KBIMS 건축 및 구조 부재 라이브러리 및 IFC 속성명 변환 방법 개발)

  • Kim, Seonwoo;Kim, Sunjung;Kim, Honghyun;Bae, Kiwoo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.6
    • /
    • pp.505-514
    • /
    • 2020
  • This research introduces the method of developing Korea BIM standard (KBIMS) architectural and structural element library and the methodology of converting KBIMS IFC property names with special characters. Diverse BIM tools are utilizing in project, however BIM library researches lack diversity on BIM tool selection. This research described the method to generate twelve categories and seven hundred and ninety-three elements library containing geometrical and numerical data in CATIA V6. KBIMS has its special property data naming systems which was the challenge inputting to ENOVIA IFC database. Three mapping methods for special naming characters had been developed and the ASCII code method was applied. In addition, the convertor prototype had been developed for searching and replacing the ASCII codes into the original KBIMS IFC property names. The methodology was verified by exporting 2,443 entities without data loss in the sample model conversion test. This research would provide a wider choice of BIM tool selection for applying KBIMS. Furthermore, the research would help on the reduction of data interoperability issues in projects. The developed library would be open to the public, however the continuous update and maintenance would be necessary.

A Study on Minimization of Harbor Oscillations by Infragravity Waves Using Permeable Breakwater (투과제를 이용한 중력외파의 항내 수면진동 저감 방법에 대한 연구)

  • Kwak, Moon Su;Jeong, Weon Mu
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.32 no.6
    • /
    • pp.434-445
    • /
    • 2020
  • In this study, the minimization of harbor oscillation using permeable breakwater was applied to the actual harbor and investigated an effect of minimization by computer simulation in order to take into account the water quality problems and measures of harbor oscillation by infragravity waves at the same time. The study site is Mukho harbor located at East coast of Korea that harbor oscillation has been occurred frequently. The infragravity waves obtained by analyzing the observed field data for five years focused on the distribution between wave periods of 40 s and 70 s and wave heights in less than 0.1 m was 94% of analyzing data. The target wave periods was 68.0 s. The most effective method of minimization of harbor oscillation by infragravity waves was to install a detached permeable breakwater with transmission coefficient of 0.3 on the outside harbor and replace some area of the vertical wall in the harbor with wave energy dissipating structure to achieve a reflectivity of 0.9 or less. The amplitude reduction rate of this method shown in 27.4%. And the effect of the difference in transmission coefficient of permeable breakwater on the reduction rate of the amplitude was not significant.

A Study on Analysis and Development of Education Program in Information Security Major (대학의 정보보호 관련학과 교육과정분석과 모델개발에 관한 연구)

  • 양정모;이옥연;이형우;하재철;유승재;이민섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.17-26
    • /
    • 2003
  • Recently, as the internet is widespread rapidly among the public, people can use a variety of useful information services through the internet. Accordingly, the protection of information supplied by computer networks 5 has become a matter of primary concern on the whole world. To accede to the realistic demands, it has been worked out some countermeasures to cultivate the experts in information security by the government and many educational facilities. Already the government authority has carried out the each kinds of concerning projects under the framed a policy, Five-Year Development Plan for Information Security Technology. Also, many domestic universities perceives such an international trend, and so they frame their plans to train for the experts in this field, including to found a department with respect to the information security. They are ready to execute their tangible works, such as establishment of educational goal, development of teaching materials, planning curriculum, construction of laboratories and ensuring instructors. Moreover, such universities lead to their students who want to be information security experts to get the fundamental knowledge to lay the foundation for acquiring the information security technology in their bachelor course. In this note, we survey and analyze the curricula of newly-established or member-extended departments with respect to information security fields of some leading universities in the inside and outside of the country, and in conclusion, we propose the effective model of curriculum and educational goal to train the students for the information security experts.

Educational Effects of a Virtual IV Simulator and a Mannequin Arm Model Combined Training in Teaching Intravenous Cannulation for Nursing Students (간호대학생을 위한 정맥주사용 가상학습 시뮬레이터와 마네킨 팔 모형을 병합한 정맥주사 실습교육의 효과)

  • Kim, Yun-Ji;Kim, Jin Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.131-141
    • /
    • 2020
  • The purpose of this study is to compare the effects on nursing students' knowledge, performance confidence, and skills from combined virtual IV simulator and mannequin arm IV cannulation training against training with a mannequin arm only. A non-equivalent control group pretest-posttest experimental study was carried out. Ninety-three sophomore nursing students who were just beginning their fundamental skills training were recruited. Participants were divided into two groups (46 for the combined group and 47 for the mannequin-only group). Data were collected from March 18-29. For the experimental group, both virtual IV simulator and mannequin-arm training were provided for 30 minutes (15 minutes each). For the control group, training for 30 minutes with a mannequin arm only was provided. After intervention, there was no statistically significant difference in the knowledge score between the two groups (F=2.52, p=.116). However, there was a significant improvement in performance confidence (t=2.14, p=.035) and nursing skills (t=5.34, p<.001) in the experimental group, compared with the control. Overall, this study provides empirical evidence that the combination of virtual IV simulator and mannequin arm training may further enhance nursing students' performance confidence and nursing skills.

A Case Study on the Effect of the Artificial Intelligence Storytelling(AI+ST) Learning Method (인공지능 스토리텔링(AI+ST) 학습 효과에 관한 사례연구)

  • Yeo, Hyeon Deok;Kang, Hye-Kyung
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.5
    • /
    • pp.495-509
    • /
    • 2020
  • This study is a theoretical research to explore ways to effectively learn AI in the age of intelligent information driven by artificial intelligence (hereinafter referred to as AI). The emphasis is on presenting a teaching method to make AI education accessible not only to students majoring in mathematics, statistics, or computer science, but also to other majors such as humanities and social sciences and the general public. Given the need for 'Explainable AI(XAI: eXplainable AI)' and 'the importance of storytelling for a sensible and intelligent machine(AI)' by Patrick Winston at the MIT AI Institute [33], we can find the significance of research on AI storytelling learning model. To this end, we discuss the possibility through a pilot study targeting general students of an university in Daegu. First, we introduce the AI storytelling(AI+ST) learning method[30], and review the educational goals, the system of contents, the learning methodology and the use of new AI tools in the method. Then, the results of the learners are compared and analyzed, focusing on research questions: 1) Can the AI+ST learning method complement algorithm-driven or developer-centered learning methods? 2) Whether the AI+ST learning method is effective for students and thus help them to develop their AI comprehension, interest and application skills.

Development of a DEVS Simulator for Electronic Warfare Effectiveness Analysis of SEAD Mission under Jamming Attacks (대공제압(SEAD) 임무에서의 전자전 효과도 분석을 위한 DEVS기반 시뮬레이터 개발)

  • Song, Hae Sang;Koo, Jung;Kim, Tag Gon;Choi, Young Hoon;Park, Kyung Tae;Shin, Dong Cho
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.4
    • /
    • pp.33-46
    • /
    • 2020
  • The purpose of Electronic warfare is to disturbe, neutralize, attack, and destroy the opponent's electronic warfare weapon system or equipment. Suppression of Enemy Air Defense (SEAD) mission is aimed at incapacitating, destroying, or temporarily deteriorating air defense networks such as enemy surface-to-air missiles (SAMs), which is a representative mission supported by electronic warfare. This paper develops a simulator for analyzing the effectiveness of SEAD missions under electronic warfare support using C++ language based on the DEVS (Discrete Event Systems Specification) model, the usefulness of which has been proved through case analysis with examples. The SEAD mission of the friendly forces is carried out in parallel with SSJ (Self Screening Jamming) electronic warfare under the support of SOJ (Stand Off Jamming) electronic warfare. The mission is assumed to be done after penetrating into the enemy area and firing HARM (High Speed Anti Radiation Missile). SAM response is assumed to comply mission under the degraded performance due to the electronic interference of the friendly SSJ and SOJ. The developed simulator allows various combinations of electronic warfare equipment specifications (parameters) and operational tactics (parameters or algorithms) to be input for the purpose of analysis of the effect of these combinations on the mission effectiveness.

A Deep Learning Method for Cost-Effective Feed Weight Prediction of Automatic Feeder for Companion Animals (반려동물용 자동 사료급식기의 비용효율적 사료 중량 예측을 위한 딥러닝 방법)

  • Kim, Hoejung;Jeon, Yejin;Yi, Seunghyun;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.263-278
    • /
    • 2022
  • With the recent advent of IoT technology, automatic pet feeders are being distributed so that owners can feed their companion animals while they are out. However, due to behaviors of pets, the method of measuring weight, which is important in automatic feeding, can be easily damaged and broken when using the scale. The 3D camera method has disadvantages due to its cost, and the 2D camera method has relatively poor accuracy when compared to 3D camera method. Hence, the purpose of this study is to propose a deep learning approach that can accurately estimate weight while simply using a 2D camera. For this, various convolutional neural networks were used, and among them, the ResNet101-based model showed the best performance: an average absolute error of 3.06 grams and an average absolute ratio error of 3.40%, which could be used commercially in terms of technical and financial viability. The result of this study can be useful for the practitioners to predict the weight of a standardized object such as feed only through an easy 2D image.

Anomaly detection and attack type classification mechanism using Extra Tree and ANN (Extra Tree와 ANN을 활용한 이상 탐지 및 공격 유형 분류 메커니즘)

  • Kim, Min-Gyu;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.79-85
    • /
    • 2022
  • Anomaly detection is a method to detect and block abnormal data flows in general users' data sets. The previously known method is a method of detecting and defending an attack based on a signature using the signature of an already known attack. This has the advantage of a low false positive rate, but the problem is that it is very vulnerable to a zero-day vulnerability attack or a modified attack. However, in the case of anomaly detection, there is a disadvantage that the false positive rate is high, but it has the advantage of being able to identify, detect, and block zero-day vulnerability attacks or modified attacks, so related studies are being actively conducted. In this study, we want to deal with these anomaly detection mechanisms, and we propose a new mechanism that performs both anomaly detection and classification while supplementing the high false positive rate mentioned above. In this study, the experiment was conducted with five configurations considering the characteristics of various algorithms. As a result, the model showing the best accuracy was proposed as the result of this study. After detecting an attack by applying the Extra Tree and Three-layer ANN at the same time, the attack type is classified using the Extra Tree for the classified attack data. In this study, verification was performed on the NSL-KDD data set, and the accuracy was 99.8%, 99.1%, 98.9%, 98.7%, and 97.9% for Normal, Dos, Probe, U2R, and R2L, respectively. This configuration showed superior performance compared to other models.

Deep Learning Based Group Synchronization for Networked Immersive Interactions (네트워크 환경에서의 몰입형 상호작용을 위한 딥러닝 기반 그룹 동기화 기법)

  • Lee, Joong-Jae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.373-380
    • /
    • 2022
  • This paper presents a deep learning based group synchronization that supports networked immersive interactions between remote users. The goal of group synchronization is to enable all participants to synchronously interact with others for increasing user presence Most previous methods focus on NTP-based clock synchronization to enhance time accuracy. Moving average filters are used to control media playout time on the synchronization server. As an example, the exponentially weighted moving average(EWMA) would be able to track and estimate accurate playout time if the changes in input data are not significant. However it needs more time to be stable for any given change over time due to codec and system loads or fluctuations in network status. To tackle this problem, this work proposes the Deep Group Synchronization(DeepGroupSync), a group synchronization based on deep learning that models important features from the data. This model consists of two Gated Recurrent Unit(GRU) layers and one fully-connected layer, which predicts an optimal playout time by utilizing the sequential playout delays. The experiments are conducted with an existing method that uses the EWMA and the proposed method that uses the DeepGroupSync. The results show that the proposed method are more robust against unpredictable or rapid network condition changes than the existing method.

A Study on the Cerber-Type Ransomware Detection Model Using Opcode and API Frequency and Correlation Coefficient (Opcode와 API의 빈도수와 상관계수를 활용한 Cerber형 랜섬웨어 탐지모델에 관한 연구)

  • Lee, Gye-Hyeok;Hwang, Min-Chae;Hyun, Dong-Yeop;Ku, Young-In;Yoo, Dong-Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.363-372
    • /
    • 2022
  • Since the recent COVID-19 Pandemic, the ransomware fandom has intensified along with the expansion of remote work. Currently, anti-virus vaccine companies are trying to respond to ransomware, but traditional file signature-based static analysis can be neutralized in the face of diversification, obfuscation, variants, or the emergence of new ransomware. Various studies are being conducted for such ransomware detection, and detection studies using signature-based static analysis and behavior-based dynamic analysis can be seen as the main research type at present. In this paper, the frequency of ".text Section" Opcode and the Native API used in practice was extracted, and the association between feature information selected using K-means Clustering algorithm, Cosine Similarity, and Pearson correlation coefficient was analyzed. In addition, Through experiments to classify and detect worms among other malware types and Cerber-type ransomware, it was verified that the selected feature information was specialized in detecting specific ransomware (Cerber). As a result of combining the finally selected feature information through the above verification and applying it to machine learning and performing hyper parameter optimization, the detection rate was up to 93.3%.