• Title/Summary/Keyword: Cyber Simulator

Search Result 37, Processing Time 0.027 seconds

The MPI CyberMotion Simulator: A Novel Research Platform to Investigate Human Control Behavior

  • Nieuwenhuizen, Frank M.;Bulthoff, Heinrich H.
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.2
    • /
    • pp.122-131
    • /
    • 2013
  • The MPI CyberMotion Simulator provides a unique motion platform, as it features an anthropomorphic robot with a large workspace, combined with an actuated cabin and a linear track for lateral movement. This paper introduces the simulator as a tool for studying human perception, and compares its characteristics to conventional Stewart platforms. Furthermore, an experimental evaluation is presented in which multimodal human control behavior is studied by identifying the visual and vestibular responses of participants in a roll-lateral helicopter hover task. The results show that the simulator motion allows participants to increase tracking performance by changing their control strategy, shifting from reliance on visual error perception to reliance on simulator motion cues. The MPI CyberMotion Simulator has proven to be a state-of-the-art motion simulator for psychophysical research to study humans with various experimental paradigms, ranging from passive perception experiments to active control tasks, such as driving a car or flying a helicopter.

Production of Contents Embodiment for Cyber Underwater Using Environment Fish Schooling Behavior Simulator

  • Kim, Jong-Chan;Cho, Seung-Il;Kim, Chee-Yong;Kim, Eung-Kon
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.6
    • /
    • pp.770-778
    • /
    • 2007
  • Fish schooling or group moving in cyber underwater is a part of beautiful and familiar ecosystem. It is not so easy to present the behavior of fish crowd naturally as a computer animation. Thanks to development of computer graphics in entertainment industry, the numbers of digital films and animations is increased and the scenes of numerous crowd are shown to us. Though there are many studies on the techniques to process the behavior of crowd effectively and the developments of crowd behavioral systems, there is not enough study on the development for an efficient crowd behavioral simulator. In this' paper, we smartly present the types offish behavior in cyber underwater and make up for the weak points of time and cost. We develop the fish schooling behavior simulator for the contents of cyber underwater, automating fish behavioral types realistically and efficiently.

  • PDF

Fish Schooling Behavior Simulator for the Contents Production of Cyber Underwater Environment (가상 해저 환경 콘텐츠 제작을 위한 Fish 군중행동 시뮬레이터)

  • Kim, Jong Chan;Cho, Seung Il;Kim, Eung Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.1 no.1
    • /
    • pp.27-35
    • /
    • 2006
  • Crowd behaviors on cyber underwater environment are often produced in entertainment contents, such as films and games. It is easy for us to come in contact with the scenes appearing a lot of characters as digital films and animation works are increased gradually, owing to developing of computer graphics. Though the processing a scene of crowd and the behavior system of crowd, related to the processing techniques of crowd behavior in cyber space, have been implemented so far, the research for developing the natural crowd behavior simulator can not be still satisfying. In this paper, we designed a realistic and efficient Fish Schooling Behavior Simulator for the contents production of cyber underwater environment, which showed each type of fish behavior in cyber underwater smartly, and which generated the animating the behavior automatically, reducing the time and cost.

  • PDF

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

Fish Schooling Behavior Simulator for the Contents Production of Cyber Underwater Environment (가상 해저 환경 콘텐츠 제작을 위한 Fish 군중행동 시뮬레이터)

  • Kim, Jong-Chan;Cho, Seung-Il;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.1
    • /
    • pp.25-33
    • /
    • 2007
  • Crowd behaviors on cyber underwater environment are often produced in entertainment contents, such as films and games. It is easy for us to come in contact with the scenes appearing a lot of characters as digital films and animation works are increased gradually, owing to developing of computer graphics. Though the processing a scene of crowd and the behavior system of crowd, related to the processing techniques of crowd behavior in cyber space, have been implemented so far, the research for developing the natural crowd behavior simulator can not be still satisfying. In this paper, we designed a realistic and efficient Fish Schooling Behavior Simulator for the contents production of cyber underwater environment, which showed each type of fish behavior in cyber underwater smartly, and which generated the animating the behavior automatically, reducing the time and cost.

  • PDF

Development of a Web-based On-line Digital Simulator Using ActiveX Control Technology (엑티브엑스 컨트롤 기법을 이용한 웹기반 온라인 디지털 시뮬레이터의 개발)

  • Han, Kyu-In;Kim, Dong-Sik;Seo, Sam-Jun
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.3112-3114
    • /
    • 2000
  • Recently. internet applications for efficient cyber education have drawn much interests. The world-wide web provides new opportunities for cyber education over the internet. In this paper, we developed the internet-based educational simulator for design and virtual experiment of the digital logic circuits. The proposed simulator provides the improved learning methods which can enhance the educational efficiency in digital theory. If the students execute the Digital simulator on the web. they can simulate in digital circuits through simple mouse manipulation. The proposed digital simulator can be used so that the students can easily understand the well-known digital principles.

  • PDF

Dynamic Simulation on a Network Security Simulator using SSFNet (SSFNet을 이용한 네트워크 보안 시뮬레이터에서 동적 시뮬레이션 방법)

  • 박응기;윤주범;임을규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.101-106
    • /
    • 2004
  • Recently, a network defense simulator becomes essential in studying cyber incidents because the cyber terror become more and more interesting. The network defense simulator is a tool to estimate damages and an effectiveness of a defense mechanism by modeling network intrusions and defense mechanisms. Using this tool, users can find efficient ways of preventing a cyber terror and recovering from the damage. Previous simulators start the simulation after entire scenario has made and been loaded to simulation engine. However, in this way it can't model human judgement and behavior, and it can't simulate the real cyber terror very well. In this paper, we have added a dynamic simulation component to our previous network security simulator. This component improved accurate modeling of network intrusions and defense behaviors. We have also proposed new modified architecture of the simulation system. Finally we have verified correct simulation results from stammer worn simulation.

Design and Implementation of Network Defense Simulator (네트워크 방어 시뮬레이터 설계 및 구현)

  • 이철원;윤주범;임을규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.441-447
    • /
    • 2004
  • Information security simulator is required for the study on the cyber intrusion and defense as information security has been increasingly popular Until now, the main purposes of information security simulation are security estimation of small network as well as performance analysis of information protection systems. However, network simulators that can simulate attacks in a huge network are in needs since large scale internet attacks are very common in these days. In this paper we proposed a simulator design and its implementation details. Our simulator is implemented by expanding the SSFNet program to the client-sewer architecture. A cyber attack scenario used in our simulator is composed by the advanced attack tree model. We analyzed the simulation results to show the correctness of our network defense simulator.

A Study on Cyber Sickness according to Shader Application of 3D Objects in Virtual Reality Content (가상현실(VR) 콘텐츠에서 3D 객체의 셰이더 적용에 따른 사이버 멀미 연구)

  • Lee, SuYeol;Bak, Seon-Hui;Bae, Jong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.11
    • /
    • pp.1560-1566
    • /
    • 2021
  • Cyber Sickness, which occurs when using Virtual Reality contents, is the most serious problem in immersive Virtual Reality contents. The purpose of this study is to identify the effects and causes of graphic environmental factors on Cyber Sickness in Virtual Reality contents. To this end, cyber sickness experiments were conducted according to the light source and material settings, which are most commonly used in graphical environmental elements. Cyber Sickness measurements were based on the Simulator Sickness Question(SSQ) tool to derive an index that causes Cyber Sickness As a result of the analysis, the smaller the surface roughness, the higher the degree of Cyber Sickness, and the smaller the surface roughness, the smoother the surface of the 3D object, and many specular reflections from the light source occurred, which was confirmed to be the cause of great Cyber Sickness.

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.