• Title/Summary/Keyword: Game A.I.

Search Result 376, Processing Time 0.058 seconds

Research Activities on PGC Propulsion based on RDE, Part I: Basic Studies (RDE 기반 PGC 추진기관 연구 동향, Part I: 기초연구)

  • Kim, Jung-Min;Niyasdeen, Mohammed;Han, Hyung-Seok;Oh, Sejong;Choi, Jeong-Yeol
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.21 no.5
    • /
    • pp.97-107
    • /
    • 2017
  • Fluid dynamic constant volume combustion technology detonation has been paid attention as a "game-changing" technology to overcome the efficiency and performance limitation of the present constant pressure combustion systems. For the past several years, a number of experimental and CFD-based theoretical studies have been conducted for the basic operation tests of RDE's. Present paper include a comprehensive survey on the research activities on RDE and its core technologies comprehensively to provide a direction for the future RDE researches, yet unfamiliar domestically.

Determinants of Mobile Application Use: A Study Focused on the Correlation between Application Categories (모바일 앱 사용에 영향을 미치는 요인에 관한 연구: 앱 카테고리 간 상관관계를 중심으로)

  • Park, Sangkyu;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.157-176
    • /
    • 2016
  • For a long time, mobile phone had a sole function of communication. Recently however, abrupt innovations in technology allowed extension of the sphere in mobile phone activities. Development of technology enabled realization of almost computer-like environment even on a very small device. Such advancement yielded several forms of new high-tech devices such as smartphone and tablet PC, which quickly proliferated. Simultaneously with the diffusion of the mobile devices, mobile applications for those devices also prospered and soon became deeply penetrated in consumers' daily lives. Numerous mobile applications have been released in app stores yielding trillions of cumulative downloads. However, a big majority of the applications are disregarded from consumers. Even after the applications are purchased, they do not survive long in consumers' mobile devices and are soon abandoned. Nevertheless, it is imperative for both app developers and app-store operators to understand consumer behaviors and to develop marketing strategies aiming to make sustainable business by first increasing sales of mobile applications and by also designing surviving strategy for applications. Therefore, this research analyzes consumers' mobile application usage behavior in a frame of substitution/supplementary of application categories and several explanatory variables. Considering that consumers of mobile devices use multiple apps simultaneously, this research adopts multivariate probit models to explain mobile application usage behavior and to derive correlation between categories of applications for observing substitution/supplementary of application use. The research adopts several explanatory variables including sociodemographic data, user experiences of purchased applications that reflect future purchasing behavior of paid applications as well as consumer attitudes toward marketing efforts, variables representing consumer attitudes toward rating of the app and those representing consumer attitudes toward app-store promotion efforts (i.e., top developer badge and editor's choice badge). Results of this study can be explained in hedonic and utilitarian framework. Consumers who use hedonic applications, such as those of game and entertainment-related, are of young age with low education level. However, consumers who are old and have received higher education level prefer utilitarian application category such as life, information etc. There are disputable arguments over whether the users of SNS are hedonic or utilitarian. In our results, consumers who are younger and those with higher education level prefer using SNS category applications, which is in a middle of utilitarian and hedonic results. Also, applications that are directly related to tangible assets, such as banking, stock and mobile shopping, are only negatively related to experience of purchasing of paid app, meaning that consumers who put weights on tangible assets do not prefer buying paid application. Regarding categories, most correlations among categories are significantly positive. This is because someone who spend more time on mobile devices tends to use more applications. Game and entertainment category shows significant and positive correlation; however, there exists significantly negative correlation between game and information, as well as game and e-commerce categories of applications. Meanwhile, categories of game and SNS as well as game and finance have shown no significant correlations. This result clearly shows that mobile application usage behavior is quite clearly distinguishable - that the purpose of using mobile devices are polarized into utilitarian and hedonic purpose. This research proves several arguments that can only be explained by second-hand real data, not by survey data, and offers behavioral explanations of mobile application usage in consumers' perspectives. This research also shows substitution/supplementary patterns of consumer application usage, which then explain consumers' mobile application usage behaviors. However, this research has limitations in some points. Classification of categories itself is disputable, for classification is diverged among several studies. Therefore, there is a possibility of change in results depending on the classification. Lastly, although the data are collected in an individual application level, we reduce its observation into an individual level. Further research will be done to resolve these limitations.

Developing an AR based Command Post eXercise(CPX) Simulator (증강현실 기반 지휘통제훈련 시뮬레이터 개발)

  • Park, Sangjun;Shin, Kyuyoung;Kim, Dongwook;Kim, Tai Hyo;Roh, Hyo Bin;Lee, Wonwoo
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.53-60
    • /
    • 2018
  • As science and technology develops, it is expected that more precise and various weapons will be used in a much more complicate future battlefield environment. C4I is a system that provides the proper and necessary information to commanders and their staffs to recognize the battlefield situation by connecting and visualizing the complex battlefield environment and various weapon systems together. Commanders and staffs perform battle command training based on a computer or paper map to better utilize the C4I system and Command Post eXercise(CPX) is a process of the training. This is the way for them to improve command control and decision making skills. Analyzing of line of sight(LOS), identifying communication fringe area, deploying troop strength, and determining unit maneuver are highly restricted under the 2D based CPX. In recent years, however, three-dimensional (3D) CPX simulators have been developed to overcome these drawbacks. In response to this trend, this paper proposes a multi-user based CPX simulator using augmented reality (AR) glass, which can be used as a practical war game simulator.

  • PDF

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

Proposal Convergence profitable model of mobile games that utilize the mileage system (마일리지 시스템을 활용한 모바일게임의 융복합 수익모델 제안)

  • Kim, Tae-Gyu;Heo, Tae-In;Jeong, Hyung-Won
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.333-340
    • /
    • 2015
  • Mileage system in some online media, I have a lot of use. In addition, there are a lot of companies that are making money by using the mileage system. A mileage system is the first airline in such a way that the service in the late 1980s, many states now listed sungineung and features. In addition, there are many industries that reported good results using a mileage system used by carriers in other industries. However, mileage of the current game industry has not been introduced, it is not the service by using the concept of point returning to the user is purely a function of mileage. So a lot of developed payment systems in the mobile industry since 2010, proposed a better and more current online payment systems industry has an easy hybrid revenue model for mobile games service convergence mileage using this system.

Analysis of Kinematic Factors between Success and Failure of Free Aerial Cartwheel on the Balance Beam (평균대 한발 몸 펴 옆 공중돌기의 성패에 따른 운동학적 요인 분석)

  • Jung, Choong Min;Park, Sang-Kyoon
    • Korean Journal of Applied Biomechanics
    • /
    • v.32 no.1
    • /
    • pp.24-30
    • /
    • 2022
  • Objective: The purpose of this study was to determine the factors of successful and unsuccessful movements through the analysis of kinematics and muscle activity of the Free Aerial Cartwheel on the balance beam. Method: Subjects (Age: 22.8 ± 2.4 yrs., Height: 158.7 ± 5.0 cm, Body mass: 54.1 ± 6.4 kg, Career: 13 ± 2.4 yrs.) who were currently active as female gymnasts participated in the study. They had no history of surgical treatment within 3 months. Subject criteria included more than 10 years of professional experience in college and professional level of gymnastics and the ability to conduct the Free Aerial Cartwheel on the Balance Beam. Each subject performed 10 times of Free Aerial Cartwheel on the balance beam. One successful trial and one unsuccessful trial (failure) among 10 trials were selected for the comparison. Results: It was found that longer time required in case of unsuccessful trial when performing the Free Aerial Cartwheel on the balance beam compared with successful trial. It is expected to be the result of movement in the last landing section (i.e. phase 5). In addition, it was found that the center of gravity of the body descends at a high speed to perform the jump (i.e. phase 2) in order to obtain a sufficient jumping height when the movement is successful while the knee joint is rapidly extended to perform a jump when movement fails. In the single landing section after the jump (i.e. phase 4), if the ankle joint rapidly dorsiflexed after take-off and the hip joint rapidly flexed, so landing was not successful. Conversely, in a successful landing movement, muscle activity of the biceps femoris was greatly activated resulting no shaking in the last landing section (i.e. phase 5). Conclusion: In order to succeed in this movement, it is necessary to perform a strong jump after rapidly descending the center of gravity of the body using the force of the biceps femoris muscle. Further improvement of the skills on the balance beam requires the analysis of the game-like situation with continuous research on kinematic and kinematic analysis of various techniques, jumps, turns, etc.

Cooperative Action Controller of Multi-Agent System (다 개체 시스템의 협동 행동제어기)

  • Kim, Young-Back;Jang, Hong-Min;Kim, Dae-Jun;Choi, Young-Kiu;Kim, Sung-Shin
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.3024-3026
    • /
    • 1999
  • This paper presents a cooperative action controller of a multi-agent system. To achieve an object, i.e. win a game, it is necessary that a robot has its own roles, actions and work with each other. The presented incorporated action controller consists of the role selection, action selection and execution layer. In the first layer, a fuzzy logic controller is used. Each robot selects its own action and makes its own path trajectory in the second layer. In the third layer, each robot performs their own action based on the velocity information which is sent from main computer. Finally, simulation shows that each robot selects proper roles and incorporates actions by the proposed controller.

  • PDF

Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood

  • Sharma, Neeraj;Lee, Joon-Jae
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1577-1584
    • /
    • 2007
  • Fingerprint verification is being adopted widely to provide positive identification with a high degree of confidence in all practical areas. This popular usage requires reliable methods for matching of these patterns. To meet the latest expectations, the paper presents a pair wise distance histogram method for fingerprint matching. Here, we introduced a randomized algorithm which exploits pair wise distances between the pairs of minutiae, as a basic feature for match. The method undergoes two steps for completion i.e. first it performs the matching locally then global matching parameters are calculated in second step. The proposed method is robust to common problems that fingerprint matching faces, such as scaling, rotation, translational changes and missing points etc. The paper includes the test of algorithm on various randomly generated minutiae and real fingerprints as well. The results of the tests resemble qualities and utility of method in related field.

  • PDF

A Case Study for Finding an Efficient M&S Meta Model through Sequential Response Surface Methodology (축차적 반응표면 분석을 통한 M&S 메타모형 구축에 관한 사례 연구)

  • Kim, Sang-Ik;Kim, Yong-Dai;Lim, Yong-Bin;Choi, Ki-Heon;Kim, Jeong-Eun
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.1
    • /
    • pp.49-59
    • /
    • 2012
  • In computer simulation models the output from the computer code is often deterministic, i.e., running the code twice with the same values for the input variables would give the same output. It is discussed why the response surface method with polynomial approximation for the true response function is a good approximation to the computer experiments model. A sequential strategy to find the proper reduced quadratic polynomial model is illustrated with a case study in the military war game computer simulation model.

Mathematical modeling and simulation of an intelligent arm-wrestling system (지능형 Arm-wrestling system의 수학적 모델과 시뮬레이션)

  • Son I.X.;Lee H.S.;Kang C.G.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.275-276
    • /
    • 2006
  • An intelligent arm-wrestling system is recently developed in our laboratory that is comprised of an arm-force generation mechanism and a control system that detects the maximum arm-force of a user in the early stage of the match, generates a different game scenario each time, and executes force feedback control to implement the scenario. This paper presents the mathematical model of the force control system of the intelligent arm-wrestling system, and some improvements of it via experimental frequency responses using a control signal analyzer.

  • PDF