• Title/Summary/Keyword: Cyber Space

Search Result 479, Processing Time 0.026 seconds

Design of Open Collaboration Solution's Server for Smart Work (스마트워크를 위한 개방형 협업 솔루션 서버 설계)

  • Kang, Sang-Ug;Choi, YongSoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.133-141
    • /
    • 2014
  • Social needs of smart work have been increasing throughout the worldwide and several developed countries have been developing enabled framework for smart work's coming proceed for a long time. The government is leading the smart work in Korea to devise a more efficient and competitiveness. Design of public collaboration solution has been proposed to provide the integration among a variety of smart environments and the interoperability between end-to-end. This paper takes a objective to develop a universal solution applicable to between traditional PC and mobile devices, such as a home station, and to built smart workplace linking workplace, outside space and the home. In particular, this paper offer entry-level advantages of public collaboration solution in conjunction with collaboration platform and phone platform owned by mobile communication platform company are mutually interfaced and aimed at small and medium-sized businesses and public.

A Generation Methodology of Facial Expressions for Avatar Communications (아바타 통신에서의 얼굴 표정의 생성 방법)

  • Kim Jin-Yong;Yoo Jae-Hwi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.55-64
    • /
    • 2005
  • The avatar can be used as an auxiliary methodology of text and image communications in cyber space. An intelligent communication method can also be utilized to achieve real-time communication, where intelligently coded data (joint angles for arm gestures and action units for facial emotions) are transmitted instead of real or compressed pictures. In this paper. for supporting the action of arm and leg gestures, a method of generating the facial expressions that can represent sender's emotions is provided. The facial expression can be represented by Action Unit(AU), in this paper we suggest the methodology of finding appropriate AUs in avatar models that have various shape and structure. And, to maximize the efficiency of emotional expressions, a comic-style facial model having only eyebrows, eyes, nose, and mouth is employed. Then generation of facial emotion animation with the parameters is also investigated.

  • PDF

Korean Costume's Figure and Means in the Coming-of-age Ceremony (한국성년례 복식의 형태와 의미)

  • Hwang, Mi-Sun;Lee, Un-Young
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.15 no.1
    • /
    • pp.155-173
    • /
    • 2013
  • Recently, social problem of teens becomes one of the important social issues. Adolescence is the intermediate stages of childhood and adulthood. Teens have not find their identity at this time. That reason is why teens and the old generation are disconnect. That arise from the development of industry and the nuclear family, entrance examination-oriented education system. So they are wandering in the popular culture and the cyber-space. Therefore, families, schools and state should have interesting and understanding for teens, and should strive that teens establish a self established identity. Specially, ethics education using traditional culture will help to establish their identity, and that provide self-esteem and pride about korean traditional culture. This is the reason why culture contents that is based on Korean traditional culture have to make for teens. The purpose of this study is to provide the basic data that will help in the development Korean traditional cultural contents for teens. In this study, this researchers will search the following matters; first, what is ritual for Coming-of-age, second, various forms of ritual for Coming-of-age and Korean modern ritual in order to grasp the meaning of the ritual for Coming-of-age, third, costume and meaning of costume which has in both Kwan-Ryea as Korean traditional ritual for Coming-of-age and Korean modern ritual. This study will compare Kwan-Ryea with traditional ritual of modern.

  • PDF

An Evaluation System for Learning Concentricity on Distance Education (원격강의의 학습집중도 평가 시스템)

  • Choi Byung-Do;Hyun Chul-Sang;Jung Jin-Uk;Kim Dong-Hak;Kim Wook-Hyun;Kim Chong-Gun
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.181-190
    • /
    • 2005
  • The development of web-based distance education surroundings is steadily achieving. However the studying on the learning effect of learners is still weak against development of educational media itself. At present, most of the distance education system is showing limits in the evaluation of the learning effect because the teaming evaluation depends on mid or final-term exams by on-line or off-line. There is a strong point that the distance education is free from space and time. One of present weak points is limitation of evaluating learner's attitude which can estimate learning effects. Earnest teaming attitude at distance education is important factor for improving the learning effects. In this paper, we propose a model for improving the teaming effects by forcing real-time evaluation and returning feedback to learners at the cyber lectures. The developed experimental system is verified its possibilities.

A Study on the Awareness of User s to Avatar Characters in the Cyberspace (가상공간의 아바타 캐릭터에 대한 사용자의 인식조사)

  • 이향재
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.61-70
    • /
    • 2004
  • This study is focused on user awareness of avatar character in the cyber space. The purpose of this study is to investigate user preference toward avatar and test their awareness on it. The awareness of avatar is based on the applied degree of self-awareness, and also analyzed by factors using 3 elements such as loyalty, value and confidence in Maurice Wagner's study but self-projection was added to these three variables. The result shows that there is no significant statistical difference among response groups for age and sex classification but the preference and the value variables are significantly dependent on sex and age, respectively. There are strong correlation among each response variables for the awareness of avatar character and the loyalty and the preference variables are mostly correlated. The regression analysis shows that the preference of avatar is mostly affected by loyalty and thus the self awareness of avatar in the Cyberspace is proportional to user preference. It is shown that users do not awareness an avatar as a visual image but identify their avatar as an another selfness since they project themselves into those avatars.

  • PDF

Malware Analysis Based on Section, DLL (Section, DLL feature 기반 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Ho-gyeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1077-1086
    • /
    • 2017
  • Malware mutants based on existing malware is widely used because it can easily avoid the existing security system even with a slight pattern change. These malware appear on average more than 1.6 million times a day, and they are gradually expanding to IoT / ICS as well as cyber space, which has a large scale of damage. In this paper, we propose an analytical method based on features of PE Section and DLL that do not give much significance, rather than pattern-based analysis, Sandbox-based analysis, and CFG, Strings-based analysis. It is expected that the proposed model will be able to cope with effective malicious code in case of combined operation of various existing analysis technologies.

Digital Image Watermarking Scheme in the Singular Vector Domain (특이 벡터 영역에서 디지털 영상 워터마킹 방법)

  • Lee, Juck Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.4
    • /
    • pp.122-128
    • /
    • 2015
  • As multimedia information is spread over cyber networks, problems such as protection of legal rights and original proof of an information owner raise recently. Various image transformations of DCT, DFT and DWT have been used to embed a watermark as a token of ownership. Recently, SVD being used in the field of numerical analysis is additionally applied to the watermarking methods. A watermarking method is proposed in this paper using Gabor cosine and sine transform as well as SVD for embedding and extraction of watermarks for digital images. After delivering attacks such as noise addition, space transformation, filtering and compression on watermarked images, watermark extraction algorithm is performed using the proposed GCST-SVD method. Normalized correlation values are calculated to measure the similarity between embedded watermark and extracted one as the index of watermark performance. Also visual inspection for the extracted watermark images has been done. Watermark images are inserted into the lowest vertical ac frequency band. From the experimental results, the proposed watermarking method using the singular vectors of SVD shows large correlation values of 0.9 or more and visual features of an embedded watermark for various attacks.

An Extended I-O Modeling Methodology based on FSM (유한상태기계에 기반한 확장된 I-O 모델링 방법론)

  • Oh, Soo-Yeon;Wang, Gi-Nam;Kim, Ki-Hyung;Kim, Kangseok
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.21-30
    • /
    • 2016
  • Recently manufacturing companies have used PLC control programs popularly for their automated production systems. Since the life cycle of production process is not so long, the change of the production lines occur frequently. Most of changes happen with modification of the position information and control process of the equipment. PLC control program is also modified based on the fundamental process. Therefore, to verify new PLC program by configuring virtual space according to real environment is needed. In this paper we show a logical modeling method, based on Timed-FSA useful for sequence control and dead-lock prevention. There is a problem wasting user's labor and time when defining a variety of states in a device. To overcome this problem, we propose an extended I-O model based on existing methods by adding a token concept of Petri Nets. Also we will show the usability of the extended I-O modeling through user study.

Experimental Implementation of Digital Twin Simulation for Physical System Optimization (물리시스템 최적화를 위한 디지털 트윈 시뮬레이션의 실험적 구현)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.19-25
    • /
    • 2021
  • This study proposes a digital twin implementation method through simulation so that the manufacturing process can be optimized in a manual manufacturing site. The scope of the proposal is a knowledge management mechanism that collects manual motion with a sensor and optimizes the manufacturing process with repetitive experimental data for motion recognition. In order to achieve the research purpose, a simulation of the distribution site was conducted, and a plan to create an optimized digital twin was prepared by repeatedly experiencing the work simulation based on the basic knowledge expressed by the worker's experience. As a result of the experiment, it was found that it is possible to continuously improve the manufacturing process by transmitting the result of configuring the optimized resources to the physical system by generating the characteristics of the work space configuration and working step within a faster time with the simulation that creates the digital twin.

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF