• Title/Summary/Keyword: Cyber Simulator

Search Result 37, Processing Time 0.029 seconds

Fish Schooling Simulator Using Crowd Behavior Patterns (군중 행동 패턴을 이용한 Fish 군중 시뮬레이터)

  • Kim, Jong-Chan;Cho, Seung-Il;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.106-112
    • /
    • 2007
  • Recently the crowd environment in the department of the animation is necessary to the digital industry. The goal of researching a proper crowd animation is to design character animation that is defined by the reality of scenes, performance of system and interaction with users to show the crowd vividly and effectively in cyber underwater. It is important to set up the crowd behavior patterns to represent for moving crowd naturally in cyber space. In the paper, we expressed the behavior patterns for flocks of fish in cyber underwater, and compared with the number of mesh, the number of fish, the number of frame, elapsed time, and resolution and analyzed them with the fish behavior simulating system.

  • PDF

A Simplified Web-based Simulator for Digital Logic Circuits Using ActiveX Control (ActiveX 컨트롤을 이용한 단순화된 웹 기반 디지털 논리회로 시뮬레이터)

  • Kim Dong-Sik;Han Hee-Jin;Seo Sam-Jun;Kim Hee-Sook
    • Journal of Engineering Education Research
    • /
    • v.6 no.1
    • /
    • pp.5-14
    • /
    • 2003
  • This paper presents a simplified web-based simulator for digital logic circuits with which several important principles related to digital logic circuits can be understood and confirmed. The proposed simulator is implemented to have several simplified functions which are essential to the learning process of digital logic circuits. The learners by themselves simulate several digital logic circuits on the web under specific input conditions and the design/analysis of digital logic circuits can be available. The proposed simulator, combined with multimedia contents, can be used as an auxiliary educational tool and enhance the improved learning efficiency. The results of this paper can be widely used to improve the efficiency of web-based educations in the cyber space. Several simulation results are illustrated as examples to show the validity of the proposed web-based simulator.

A Transformation Method of Polygon Data for Visualization of Height Map in SEDRIS (SEDRIS에서 높이맵의 가시화를 위한 폴리곤 데이터 변환 방법)

  • Son, Hyun-Seung;Kim, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.135-140
    • /
    • 2015
  • The Cyber-Physical Systems (CPS) complexly perform modeling and simulation (M&S) for the various embedded systems. In this case, due to use diverse formatted models, we suggest to apply with the SEDRIS to systematically manage the different formatted data on M&S. The SEDRIS can reduce time and cost with reusing and interoperating environment data developed in the specific domain. To do this, we should input the data transformed the height map for terrain representation in a simulator into raster data of SEDRIS for which interoperate between the existed simulator and the SEDRIS. To solve the problem, we propose the transformation method to transfer the polygon data from RAW file used in terrain representation. With the proposed method, we can provide two advantages. First, it can possibly express the environment data into SEDRIS. Second, we can see the terrain like an image file through a viewer. Therefore, even non-expert easily constructs the terrain environment data.

Modeling and Implementation of IDS for Security System simulation using SSFNet (SSFNet 환경에서 보안시스템 시뮬레이션을 위한 IDS 모델링 및 구현)

  • Kim, Yong-Tak;Kwon, Oh-Jun;Seo, Dong-Il;Kim, Tai-Suk
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.87-95
    • /
    • 2006
  • We need to check into when a security system is newly developed, we against cyber attack which is expected in real network. However it is impossible to check it under the environment of a large-scale distributive network. So it is need to simulate it under the virtual network environment. SSFNet is a event-driven simulator which can be represent a large-scale network. Unfortunately, it doesn't have the module to simulate security functions. In this paper, we added the IDS module to SSFNet. We implement the IDS module by modeling a key functions of Snort. In addition, we developed some useful functions using Java language which can manipulate easily a packet for network simulation. Finally, we performed the simulation to verify the function if our developed IDS and Packets Manipulation. The simulation shows that our expanded SSFNet can be used to further large-scale security system simulator.

  • PDF

Implementation of a Network Simulator for Cyber Attacks and Detections based on SSFNet (SSFNet 기반 사이버 공격 및 탐지를 위한 네트워크 시뮬레이터의 구현)

  • Shim, Jae-Hong;Jung, Hong-Ki;Lee, Cheol-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.457-467
    • /
    • 2002
  • In order to simulate cyber attacks and predict network behavior by attacks, we should represent attributes of network components in the simulation model, and should express characteristics of systems that carry out various cyber attacks and defend from these attacks. To simulate how network load may change under the cyber attacks, we extended SSF[9, 10] that is process-based event-oriented simulation system. We added a firewall class and a packet manipulator into the SSFNet that is a component of SSF. The firewall class, which is related to the security, is to simulate cyber attacks, and the packet manipulator is a set of functions to write attack programs for the simulation. The extended SSFNet enables to simulate a network with the security systems and provides advantages that make easy to port already exsiting attack programs and apply them to the simulation evironment. We made a vitual network model to verify operations of the added classes, and simulated a smurf attack that is a representative denial of sevive attack, and observed the network behavior under the smurf attack. The results showed that the firewall class and packet manipulator developed in this paper worked normaly.

An Implementation of Base System for Web-based Cyber Engineering Laboratories (공학용 가상 실험실을 위한 Web용 기반 시스템의 구축)

  • Han Sang-Hoon;You Sung-Hyun;Cho Hyung-Je
    • Journal of Engineering Education Research
    • /
    • v.3 no.1
    • /
    • pp.27-41
    • /
    • 2000
  • Recently there have been many Internet-based studies to provide personal users an efficient educational tool making use of multimedia data. The typical examples are remote education and virtual university where many educational trials on theory-based contents have been performed more frequently than those on experiment-based contents for engineering area. This paper describes about a base system implemented as an example of Internet-based experiment-oriented educations to establish cyber engineering laboratories for mechanics, electronics and chemistry. For the first time as a model of cyber engineering laboratories we herein Introduce in detail a server-and-client-based simulative method in which the result may be displayed on computer monitor of client PC while a simulator program is executed on the server. Secondly we introduce an interactive method in which the user of client PC may not only communicate directly with experiment server after initial connection with management server but also he can confirm the status of experiment being performed by way of video as well as experimental result.

  • PDF

Fish Schooling Animation System for Constructing Contents of Cyber Aquarium

  • Kim, Jong-Chan;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.3
    • /
    • pp.157-162
    • /
    • 2007
  • The goal of researching a proper crowd animation is to design system that is satisfied with the reality of scenes, performance of system, and interaction with users to show the crowd vividly and effectively in virtual underwater world. In this paper, we smartly expressed the behavior patterns for flocks of fish in virtual underwater and we made up for the weak points in spending time and cost to produce crowd animation. We compared with the number of mesh, the number of fish, the number of frame, elapsed time, and resolution and analyzes them with the fish behavior simulating system. We developed a virtual underwater simulator using this system.

  • PDF

Development of the Virtual Reality Main Control Room for Ulchin Unit 3,4 Nuclear Power Plant Simulator (울진 표준형원전 시뮬레이터를 위한 강의실용 가상주제어실 교육훈련 시스템 개발)

  • 홍진혁
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2003.05a
    • /
    • pp.437-443
    • /
    • 2003
  • 전범위 복제형 시뮬레이터에 의해 이루어진 원자력 및 화력발전소에서의 운전원교육은 훈련원에게 실제 발전소 주제어실에서 운전한다는 인식을 시켜 실제감을 느끼게 한다는 면에서 장점이 있으나, 막대한 하드웨어 개발비용과 또한 동일 장소에 훈련원들이 모여야 한다는 공간적인 제약성을 가지고 있다. 이에 전력연구원은 3차원 웹기술을 접목하여 가상으로 주제어실을 개발하여 네트워크를 통하여 하나의 사이버 공간에서 공동으로 하나의 작업을 수행케 하는 Collaboration 기능을 탑재한 강의실용 가상주제어실 교육훈련 시스템(VRMCR : Virtual Reality Main Control Room)을 개발하였다. VRMCR은 3차원 웹(Web) 기술을 적용하여 공간을 이동하면서 버튼, 계기판, 경보판 등의 형상을 파악할 수 있으며, 주요 계기들은 시뮬레이터와 연동되어 있어서 특정 스위치를 조작하면 경보판의 울림, 계기판의 변화 등을 감지할 수 있도록 개발하였다. 또한 교육생들이 하나의 팀을 구성하여 네트워크상의 자신의 컴퓨터에서 각종계기의 조작 및 문제 상황 대처 방법을 학습할 수 있을 뿐 아니라, Cyber Glove, HMD 둥의 가상현실 장비를 이용하여 사용자로 하여금 한층 더 몰입감을 느낄 수 있도록 하였다.

  • PDF

Workflow Manager for OSICC System (OSICC 시스템을 위한 워크플로우 관리자)

  • Han, Youngjoo;Youn, Chan-Hyun;Shim, Eun Bo;No, Kyoung Tai;Nam, Ky-Youb
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1739-1742
    • /
    • 2010
  • IT 기술과 바이오 기술의 융합을 통해 경제적, 기술적 측면에서 효과적인 연구 및 개발을 위한 노력들이 증가하고 있다. 이를 위해서는 계산 집약적인 다양한 응용 프로그램들이 서로 유기적으로 통합되어 결과를 도출하도록 관리할 수 있어야 한다. 본 논문에서는 인체 생리기능 단위들을 모사한 신약개발 시뮬레이션을 지원하는 OSICC (e-Organ Simulator-Integrated Cyber Computing) 시스템을 위한 워크플로우 관리자를 제안한다. 제안하는 시스템은 복잡한 약물독성 시뮬레이션을 위해 워크플로우를 이용해 시뮬레이션의 구성과 조합을 효율화하였으며, 프로토타입으로 구현되어 효율적인 시뮬레이션 환경 제공이 가능함을 확인하였다.

Evaluation of usefulness for Stereotactic Partial Breast Irradiation(S-PBI) by using Surface Fiducial Marker (표면위치표지자를 적용한 정위적 부분유방방사선치료의 유용성 평가)

  • Kim, JongYeol;Jung, DongMin;Kim, SeYoung;Yoo, HyunJong;Choi, JungHoan;Park, HyoKuk;Baek, JongGeol;Lee, SangKyu;Cho, JeongHee
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.33
    • /
    • pp.99-108
    • /
    • 2021
  • Purpose: The goal of this study is to evaluate usefulness of noninvasive method instead of previous inserting Fiducial Marker Method when performing Stereotactic Partial Breast Irradiation in CyberKnife. Material and methods: For consistency of Imaging Center, we evaluated both oblique images at angle 45 and 315 acquired from 2D Simulator and CyberKnife quantitatively through dice similarity coefficient. Also, location reproducibility of Surface Fiducial Marker was analyzed from 2D Simulator, treatment plans and CyberKinfe images by using 8 Fiducial Markers made of gold attached to ATOM Phantom based on our institution's protocols. Results: The results of the estimated consistency were 0.87 and 0.9 at the oblique angle 45 and 315, respectively. For location consistency of Surface Fiducial Markers, values of horizontal vertical direction of left breast were Superior/Inferior 0.3 mm, Left/Right -0.3 mm, Anterior/Posterior 0.4 mm, and the values of rotational direction were Roll 0.3 °, Pitch 0.2 °, Yaw 0.4 °. The values of horizontal vertical direction of right breast were Superior/Inferior -0.1 mm, Left/Right -0.1 mm, Anterior/Posterior -0.1 mm, and the values of rotational direction were Roll 0.2°, Pitch 0.1°, Yaw 0.1°. Conclusions: We expect that the protocols used by Surface Fiducial Markers when performing Stereotactic Partial Breast Irradiation in CyberKnife will provide protection from pain and cut expenses for treatment and reduce treatment errors and make treatment more accurate by suggesting treatment protocols based on high consistency of Imaging Center and reproducibility of Fiducial Markers.