• Title/Summary/Keyword: Game Programming

Search Result 162, Processing Time 0.025 seconds

Proposal of Game Programming Education Model for Collaborative Problem Solving Ability and Computational Thinking (협력적 문제해결력 및 컴퓨팅 사고력을 위한 게임 프로그래밍 교육 모델 제안)

  • Han, Jeong-Min;Yi, Soyul;Lee, Young-Jun
    • Proceedings of The KACE
    • /
    • 2018.08a
    • /
    • pp.29-31
    • /
    • 2018
  • 복잡다단한 현대사회의 문제들을 해결하기 위해 필요한 역량으로 컴퓨팅 사고력과 협력적 문제해결력을 들 수 있다. 이를 위해 초등학생을 위해 소프트웨어 교육은 이 두 가지 역량을 키워줄 수 있는 교육 내용과 방법을 제공하여야 한다. 본 연구에서는 게임 소프트웨어 개발이라는 소재를 가지고 학생들에게 게임의 기획자와 개발자의 역할을 부여해 추상화 및 자동화의 과정 속에서 일어나는 의사소통을 통해 협력적 문제해결력을 향상시킬 수 있는 교육 모델을 제안하고자 한다.

  • PDF

A Study on Retrival Using Educational Visual C++ (교육용 Visual C++를 이용한 검색에 관한 연구)

  • 전근형;김광휘
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.1
    • /
    • pp.1-8
    • /
    • 2002
  • This study is discussed research on management of items in PC's GUI(Graphical User Interface) environment. A items are general knowledge data like books, musical CD, English CD, and game CD, which are the time when we don't seek the right items in the case of re-reading and re-listening the items. In this paper, We propose an example designed to be used in the management of a items. The proposed example is implemented by educational VC++(Visual C++) programming language. This program and discussions for management of a items will understand the development procedure of searching and storing data, which will provide some basics into designing large database systems.

  • PDF

A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels

  • Huang, Boyang;Kong, Zhengmin;Fang, Yanjun;Jin, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1904-1921
    • /
    • 2019
  • In this paper, we investigate the problem of secure communications in multiple-input-multiple-output interference networks from the perspective of physical layer security. Specifically, the legitimate transmitter-receiver pairs are divided into different categories of active and inactive. To enhance the security performances of active pairs, inactive pairs serve as cooperative jammers and broadcast artificial noises to interfere with the eavesdropper. Besides, active pairs improve their own security by using joint transceivers. The encoding of active pairs and inactive pairs are designed by maximizing the difference of mean-squared errors between active pairs and the eavesdropper. In detail, the transmit precoder matrices of active pairs and inactive pairs are solved according to game theory and linear programming respectively. Experimental results show that the proposed algorithm has fast convergence speed, and the security performances in different scenarios are effectively improved.

A Study on Internet Addiction of Teenagers and College Students, and Development of Therapeutic Techniques (청소년과 대학생의 인터넷 중독 실태 및 치료기법 개발에 관한 연구)

  • Lee, Hun-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.157-165
    • /
    • 2012
  • The purpose of this study is to treat the students addicted to the internet by implementing a program using computers. In order to accomplish the purpose, the program was created by combining the game making activities using scratch programming, self-examination activities, and future occupation search activities. This treatment program will have major positive effects on the students who are addicted to the internet. First, it will be effective for reducing the time for using the internet and it will also improve the addictiveness such as being immersed in playing games. Second, there will be a change in attitude toward the internet and an improvement in intellectual capacity of the students. They will realize the fun of making and sharing the programs with friends, and their thinking skills will be improved by getting training for algorithmic and creative thinking. Third, this treatment program will have positive effects on the students' affective domain. They will have deeper and wider perspective on occupation by searching their future occupation, and discover the meta-ego through self-examination., which in turn, help them gain confidence and feel a sense of accomplishment.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Automated Bar Placing Model Generation for Augmented Reality Using Recognition of Reinforced Concrete Details (부재 일람표 도면 인식을 활용한 증강현실 배근모델 자동 생성)

  • Park, U-Yeol;An, Sung-Hoon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.3
    • /
    • pp.289-296
    • /
    • 2020
  • This study suggests a methodology for automatically extracting placing information from 2D reinforced concrete details drawings and generating a 3D reinforcement placing model to develop a mobile augmented reality for bar placing work. To make it easier for users to acquire placing information, it is suggested that users takes pictures of structural drawings using a camera built into a mobile device and extract placing information using vision recognition and the OCR(Optical Character Registration) tool. In addition, an augmented reality app is implemented using the game engine to allow users to automatically generate 3D reinforcement placing model and review the 3D models by superimposing them with real images. Details are described for application to the proposed methodology using the previously developed programming tools, and the results of implementing reinforcement augmented reality models for typical members at construction sites are reviewed. It is expected that the methodology presented as a result of application can be used for learning bar placing work or construction review.

On the Attractive Teaching Methods of Mathematics for High School students in Island's region (도서지역 고등학생을 위한 흥미로운 수학지도 방안)

  • Park, Hyung-Bin;Lee, Heon-Soo
    • Journal of the Korean School Mathematics Society
    • /
    • v.8 no.4
    • /
    • pp.481-494
    • /
    • 2005
  • In this study, the goal is to spread profound knowledge and theory through providing with accumulated methods in mathematics education to the students who are relatively neglected in educational benefits. The process is divided into 3 categories: mathematics for obtaining common sense and intelligence, practical math for application, and math as a liberal art to elevate their characters. Furthermore, it includes the reasons for studying math, improving problem-solving skills, machinery application learning, introduction to code(cipher) theory and game theory, utilizing GSP to geometry learning, and mathematical relations to sports and art. Based on these materials, the next step(goal) is to train graduate students to conduct researches in teaching according to the teaching plan, as well as developing interesting and effective teaching plan for the remote high school learners.

  • PDF

A Study of Blending Methods for Generating Multiple Skeletal Animations (멀티플 골격 애니메이션을 위한 블렌딩 방법의 연구)

  • Zhang, Dongsen;Hur, Gi-Taek
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.648-652
    • /
    • 2008
  • We all know *.x file is a bridge of the 3D model developer and the game developer. In today's 3D game programming, more and more advanced hardware support it to run, but we still need to consider the methods to generate the animations. 3D model maker is tired of rectifying the skeletal animations. If he mistakes one point in some one animation, this will lead to distortion in *.x file. Then the modification consumes long time. So finding a good blending method is the best choice for generating multiple skeletal animations. There were some methods for animations blending. In this paper, we could use 3D max or Maya to blend animations; and we could use *.x file and blend animations in coding. And we will use 3D max 8.0 to export the *.x file and present a better way to combine skeletal animations.

  • PDF

Puzzle Rule Algorithm of Euler Square Game (오일러 방진 게임 퍼즐 규칙 알고리즘)

  • Lee, Sang-Un
    • Journal of Industrial Convergence
    • /
    • v.19 no.4
    • /
    • pp.23-28
    • /
    • 2021
  • This paper finds the regular pattern of n = [3, ∞] for Euler square game related with n = 6(6×6=36) thirty-six officer problem that is still unsolved problem. The solution of this problem is exists for n = [3, 10] without n = 6. Also, previous researchers finds the random assigned solution for specific number using computer programming. Therefore, the solution of n = [11, ∞] Euler squares are unsolved problem because of anything but easy. This paper attempts to find generalized patterns for domains that have been extended to n = [3, ∞], while existing studies have been limited to n = [3, 10]. This paper classify the n = [3, ∞] into n = odd, 4k even, 4k+2 even of three classes. Then we find the simple regular pattern solution for n = odd and 4k even(n/2 = even). But we can't find the regular pattern for 4k+2 even(n/2 = odd).

Research about CAVE Practical Use Way Through Culture Content's Restoration Process that Utilize CAVE (가상현실시스템(CAVE)을 활용한 문화 Content의 복원 과정을 통한 CAVE활용 방안에 대한 연구)

  • Kim, Tae-Yul;Ryu, Seuc-Ho;Hur, Yung-Ju
    • Journal of Korea Game Society
    • /
    • v.4 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • Virtual reality that we have seen from the movies in 80's and 90's is hawing near based on the rapid progress of science together with a computer technology. Various virtual reality system developments (such as VRML, HMD FishTank, Wall Type, CAVE Type, and so on) and the advancement of those systems make for the embodiment of virtual reality that gives more sense of the real. Virtual reality is so immersive that makes people feel like they are in that environment and enable them to manipulate without experiencing the environment at first hand that is hard to experience in reality. Virtual reality can be applied to the spheres, such as education, high-level programming, remote control, surface exploration of the remote satellite, analysis of exploration data, scientific visualization, and so on. For some connote examples, there are training of a tank and an aeroplane operation, fumiture layout design, surgical operation practice, game, and so on. In these virtual reality systems, the actual operation of the human participant and virtual workspace are connected each other to the hardware that stimulates the five senses adequately to lend the sense of the immersion. There are still long way to go, however, before long it will be possible to have the same feeling in the virtual reality as human being can have by further study and effort. In this thesis, the basic definition, the general idea, and the kind of virtual reality were discussed. Especially, CAVE typed in reality that is highly immersive was analyzed in definition, and then the method of VR programming and modeling in the virtual reality system were suggested by showing the restoration process of Kyongbok Palace (as the content of the original form of the culture) that was made by KISTI(Korea Institute of Science and Technology Information) in 2003 through design process in virtual reality system. Through these processes, utilization of the immersive virtual reality system was discussed and how to take advantage of this CAVE typed virtual reality system at the moment was studied. In closing the problems that had been exposed in the process of the restoration of the cultural property were described and the utilization plan of the virtual reality system was suggested.

  • PDF