• Title/Summary/Keyword: Game Development Model

Search Result 267, Processing Time 0.033 seconds

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Design of method to analyze UI structure of contents based on the Morphology (형태적 관점의 콘텐츠 UI구조 분석 방법 설계)

  • Yun, Bong Shik
    • Smart Media Journal
    • /
    • v.8 no.4
    • /
    • pp.58-63
    • /
    • 2019
  • The growth of the mobile device market has changed the education market and led to the quantitative growth of various media education. In particular, smart devices, which have better interaction than existing PCs or consoles, can develop more user-friendly content, allowing various types of educational content and inducing changes in traditional education methods for consumers. Although many researchers recently suggest viable development methods or marketing elements of contents, development companies, and developers, until now, merely rely on the human senses. Therefore, it is necessary to study the actual user's smart-device based usability and experience environment. This study aims to propose an intuitive statistical processing method for analyzing the usability of game-type educational contents in terms of form, for popular games that have been released as a basis for analyzing the user experience environment. In particular, because the game industry has a sufficient number of similar examples, it is possible to conduct research based on big data and to use them for immediate decision-making between multiple co-developers through the analysis method proposed by the research. It is expected to become an analytical model that can communicate with other industries because it is effective in securing data sources.

New idea about realizing automatic collision avoidance on the sea

  • Yao, Jie;Wu, Zhaolin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2001.10a
    • /
    • pp.65-74
    • /
    • 2001
  • The rapid development of computer technology and widely application of artificial intelligent provide technology support for realizing navigation automation on the sea. which has achieved great success in shipping advanced countries like japan, England, America, Germany and also in the developing country, China. However, it still remains in the studying Period up to now in aspects of collision avoidance decision-making mathematical model and reasoning mechanism. In this paper, approaches are proposed to establish the collision avoidance automation system. One of them is based on the former studies to realize automation system by make use of finite state machine theory and following the International regulations for Preventing Collision at Sea, 1972. The others are to establish the new idea about automatic collision avoidance system by taking advantage of the free flight idea, hybrid system, game theory used in air traffic management studies in recent years and the common characteristics in both air and sea traffic management.

  • PDF

A Study on a technology of extraction of motion objects (3차원 동작객체 추출기술에 관한 연구)

  • 오영진;박노국
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.3
    • /
    • pp.21-27
    • /
    • 1999
  • This paper introduces the research and development of automatic generation technology to develop the character agent. The R&D of this technology includes three major elements-body model generation, automatic motion generation and synthetic human generation. Main areas of application would by cyber space- 3D game, animation, virtual shopping, on line chatting, virtual education system, simulation and security system.

  • PDF

An Application Model for Game Engine Development Process based on Components (컴포넌트 기반 게임엔진 개발 프로세스의 적용모델)

  • Kim, Jung-Jong;Song, Eui-Cheol;Park, Woon-Jai;Song, Ho-Young
    • Annual Conference of KIPS
    • /
    • 2002.11c
    • /
    • pp.2027-2030
    • /
    • 2002
  • 컴퓨터 게임은 소프트웨어 분야의 새로운 고부가가치 영역으로 발전되어가고 있으나 개발공정과 방법론에 있어서는 경험중심의 개발 방법을 고수하고 있다. 따라서 본 논문에서는 기존의 개발방법을 정형화된 형태로 개선하기 위하여 컴포넌트 기반 개발방법의 적용을 위한 게임개발 프로세스의 정형화 모델을 제안하고, 재사용성의 향상에 따른 문제점과 해결방안을 제시하며, 정형화된 모델의 재사용 효율성을 위하여 컴포넌트 적용 방법을 이용한 프로세스를 정형화하는 방안을 제시하고자 한다.

  • PDF

A Novel on a Crops Management Growth System using Web and Design Development Method

  • Jung, Se-Hoon;Kim, Jong Chan;Kim, Cheeyong
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.93-98
    • /
    • 2017
  • A new cultivation diary system based on environment sensor data and Web 2.0 with Flex is suggested, to improve the previous system using the subjective data of cultivators. The proposed system is designed by applying an object-oriented model called mini-architecture, in order to enhance the reliability of software as well as promote stability to overall system design. The environment sensor data such as temperature and humidity are used to develop the new reliable diary. Also, an active interface based on Web 2.0 and Android as the user GUI are implemented to maximize the convenience while recording the cultivation diary. The result of the performance evaluation shows that the data from sensors has 99.1% of correlation with that of analogue.

A Survey for Testing Model Development of the Game Software (게임 소프트웨어의 평가 모델 개발을 위한 설문조사)

  • Jung, Hye-Jung;Jung, Won-Tae;Cho, Yu-Deok;Jung, Yung-Eun;Shin, Seok-Kyoo
    • Annual Conference of KIPS
    • /
    • 2005.05a
    • /
    • pp.267-270
    • /
    • 2005
  • 국내에서는 게임용 소프트웨어의 개발을 통한 부가가치의 창출 효과가 높아지면서 많은 IT 업체에서 제품 개발과 동시에 제품에 대한 평가에 관심을 가지게 되었다. 본 연구는 게임 소프트웨어의 품질 평가를 위해서 게임 소프트웨어의 결함을 발견하기 위한 버그 체크리스트를 구성하였다. 이러한 버그 체크리스트 구성을 위해서 게임 소프트웨어 사용자를 중심으로 설문조사를 실시하였으며 이러한 조사결과를 게임 소프트웨어의 품질 평가 메트릭을 개발하는데 적용하여 ISO/IEC 9126 평가 메트릭을 제시하였다.

  • PDF

Development of Boxing Robot System for Mechatronics Education (메카트로닉스 교육을 위한 복싱 로봇 시스템의 개발)

  • Jeon, Poong-Woo;Jang, Pyung-Soo;Joo, Byung-Kyu;Cho, Ki-Ho;Jung, Seul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.330-330
    • /
    • 2000
  • In this paper, as an entertainment robot the implementation of boxing robot system is presented for mechatronics education. In order for students to learn robot as a mechatronics system, boxing robot is a good model. The boxing robot consists of three parts: two link arms for punching, controller for actuating wheeled mobile robot, infrared rays sensors for the detection of he other robot and ring. The strategic algorithm for playing boxing is presented as wel as simple game rules.

  • PDF

Development of a Game Model Based on Virtues Education for Information & Communication Ethics Education (정보통신윤리 교육을 위한 덕 교육 기반 게임 모형 개발)

  • Han, Ji-Hye;Jun, Woo-Chun
    • 한국정보교육학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.113-121
    • /
    • 2009
  • 정보화 사회에서의 일원으로 꼭 갖추어야 할 정보통신윤리 덕목들은 기존 산업화 사회에서의 교수-학습방법으로는 부적절하다. 덕 교육 (Virtues Education)은 행위자가 교육의 중심이 되어, 인지 정의 행동의 통합과 공동체주의를 중요시 여겨 학습자 스스로 윤리를 체득하도록 하는 장점이 있다. 본 연구에서는 덕 교육의 장점을 기반으로 학습자가 보다 재미있고 쉬운 학습을 통해 정보통신윤리의 능동적이고 자연스러운 체득이 가능하도록 게임 모형을 개발하였다. 본 게임 모형은 문제 사태를 확인하고, 그에 관련된 규범을 찾고, 규범의 의미와 근거를 찾은 후, 판단을 예측하고, 판단하여 미션을 해결하는 모형이다. 본 모형의 장점 (특징)은 다음과 같다. 첫째, 학습자가 쉽고 재미있게 정보통신윤리 학습을 할 수 있다. 둘째, 게임을 진행하며 윤리의식을 교사가 전달하는 것이 아닌, 학습자 스스로 체득하게 할 수 있다. 셋째, 정보화 사회의 구성원으로서 알맞은 가치관을 확립하여, 정보화 사회의 역기능에 대해 올바르게 판단하고 실천할 수 있다.

  • PDF