• Title/Summary/Keyword: Game Security

Search Result 254, Processing Time 0.026 seconds

Developing an AR based Command Post eXercise(CPX) Simulator (증강현실 기반 지휘통제훈련 시뮬레이터 개발)

  • Park, Sangjun;Shin, Kyuyoung;Kim, Dongwook;Kim, Tai Hyo;Roh, Hyo Bin;Lee, Wonwoo
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.53-60
    • /
    • 2018
  • As science and technology develops, it is expected that more precise and various weapons will be used in a much more complicate future battlefield environment. C4I is a system that provides the proper and necessary information to commanders and their staffs to recognize the battlefield situation by connecting and visualizing the complex battlefield environment and various weapon systems together. Commanders and staffs perform battle command training based on a computer or paper map to better utilize the C4I system and Command Post eXercise(CPX) is a process of the training. This is the way for them to improve command control and decision making skills. Analyzing of line of sight(LOS), identifying communication fringe area, deploying troop strength, and determining unit maneuver are highly restricted under the 2D based CPX. In recent years, however, three-dimensional (3D) CPX simulators have been developed to overcome these drawbacks. In response to this trend, this paper proposes a multi-user based CPX simulator using augmented reality (AR) glass, which can be used as a practical war game simulator.

  • PDF

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

A Watermarking Algorithm of 3D Mesh Model Using Spherical Parameterization (구면 파라미터기법을 이용한 3차원 메쉬 모델의 워더마킹 알고리즘)

  • Cui, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.149-159
    • /
    • 2008
  • In this paper, we propose a blind watermarking algorithm of 3d mesh model using spherical parameterization. Spherical parameterization is a useful method which is applicable to 3D data processing. Especially, orthogonal coordinate can not analyse the feature of the vertex coordination of the 3D mesh model, but this is possible to analyse and process. In this paper, the centroid center of the 3D model was set to the origin of the spherical coordinate, the orthogonal coordinate system was transformed to the spherical coordinate system, and then the spherical parameterization was applied. The watermark was embedded via addition/modification of the vertex after the feature analysis of the geometrical information and topological information. This algorithm is robust against to the typical geometrical attacks such as translation, scaling and rotation. It is also robust to the mesh reordering, file format change, mesh simplification, and smoothing. In this case, the this algorithm can extract the watermark information about $90{\sim}98%$ from the attacked model. This means it can be applicable to the game, virtual reality and rapid prototyping fields.

Hakeem: An Arabic Application Aimed to Teaching Children First Aid using Augmented Reality

  • Al-ajlan, Monirah;Altukhays, Wujud;Alyousef, Deema;Almansour, Aljawharah;Alsukayt, Layan;Alajlan, Halah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.368-374
    • /
    • 2022
  • Children are by nature curious and enthusiastic about learning and love to explore and search for everything they see around them, but as a result of this exploration they may sometimes be exposed to dangerous situations ranging from falls to poisoning and suffocation. That is why when supporting a child's natural desire to explore the world and supporting his awareness of dangerous situations and good handling of them, helps him build a conscious scientific mind and enhance his curiosity in the natural world. It is not easy to imagine a difficult situation in which we or one of our family is in danger, unable to help ourselves or to help them in time, due to our complete ignorance of the rules of first aid. Hence the importance of learning first aid not only for the child but for the community and the world at large. "Hakeem" is an Arabic E-health educational application that aims to teach children from the age of six to eleven years first aid, in our belief that the seed of renaissance lies in the care and education of children, and the lack of Arabic content that aims to teach children first aid skills. The idea is to create a scenario in which the child is responsible for saving the person who will be in a dangerous situation using Augmented Reality (AR) technology, to increase engagement and interaction and provides a rich user experience, and according to the child's performance, he will get reward points. The game will have several levels: Beginner, Intermediate, and Hakeem, and based on the player's points he will get a title and move to the next level, and when he reaches the end, he will get the certificate.

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.

Russia-Ukraine War and a Change in the International Order (러시아-우크라이나 전쟁과 국제질서의 변화)

  • Jang, Seho
    • Analyses & Alternatives
    • /
    • v.6 no.2
    • /
    • pp.5-36
    • /
    • 2022
  • The Russia-Ukraine War was a "three-layer compounded war" between the US and Russia, Russia and Ukraine, and Ukrainian government forces and rebels. First, the war is a phenomenon that occurred when the western sphere of influence seeking to maintain and strengthen the liberal international order and the Sino-Russian sphere of influence seeking a new alternative order collided in Ukraine, a geopolitical fault zone. Second, this war is the result of a typical 'security dilemma' phenomenon caused by the 'chain reaction' game of NATO's continuous expansion and Russia's response. Third, the Russia-Ukraine war was caused by the Russian military projection to prevent the military restoration of Donbas region by Ukraine. Until now, the Western world, led by the US, showed unexpected solidarity after the war despite subtle differences in positions. However, the non-Western world, including China, is not participating in the condemnation and sanctions against Russia. This war will be an important turning point in the existence and change of the current international order that has been formed and is operating since the end of the Cold War. The direction of maintenance/restoration, revision/change, and end/transformation of the current international order is highly likely to be determined depending on the development pattern and method of ending the war.

A Study on the Practice of Performance Assessment in the Elementary School Mathematics - Focussing on Self-assessment and Peer-observation - (초등학교 수학과 수행평가 실천에 관한 연구 - 자기평가.동료평가.관찰평가를 중심으로 -)

  • Kim Song-Ja;Choi Chang-Woo
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.10 no.1
    • /
    • pp.67-87
    • /
    • 2006
  • This study is to recognize a problem in the practice of performance assessment in elementary school, and to find out some suggestive points for improvement of teaching·learning method in elementary mathematics through assessment by reducing time restriction according to assessment through the practice of self-assessment, peer-assessment and observation, and then by reflecting the results of assessment on teaching learning plan. For that, the questions of study set up are as follows ; 1. How should self-assessment and peer-assessment be applied to in elementary mathematics assessment? 2. How should the time for 'let's play an interesting game' be managed for assessment of elementary mathematics? 3. How should the results of assessment be reflected on the Process of teaching and learning of mathematics? To solve these problems, a researcher of this thesis performed self-assessment, peer-assessment on 40 students of second grade under her charge as a class teacher, and applied observation in the time management process for 'let's play an interesting game' for a semester. self-assessment was made by mathematics journal, self-assessment chart, peer-assessment was by the analysis of conversation record among students in the situations of assessment, and observation was by observation of activity when playing with the results data of play analyzed. the concrete methods of application as follows ; First, mathematics journal was applied $1{\sim}2$ times by each unit with reconstruction into the level of second grade on the basis of the preceding-study models. Second, peer-assessment was applied to the unit-assessment time and the play-activities time by the method of recording·analyzing the contents of conversation among students in the process of assessment. Third, mathematical attitude & dispositions of students making use of the self- assessment table were examined referring to the teaching learning plan. Fourth, the time management for 'let's play an interesting game' was made through the prior recognition of play method and the joyful play-activities by use of the play-plate. Assessment depended on analysis of play-activities results of students making use of an observation form. Fifth, the results of self-assessment, peer-assessment, and observation were analyzed, and then they were made use of as self-observation data, of teacher her/his self, or teaching·learning improvement data. Students' self-assessment datum (mathematics diary, self-assessment sheets, conversation contents in the process of assessment) and observation materials (check lists, Play-activity result materials, conversation contents in the process of play) obtained in the process of application was analyzed as follows ; 1. From the practice of self-assessment in form of mathematics journal, I could obtain not only datum showing how much students was understanding the learning aims by unit time and to any degree they reached but also information about their response to learning datum and favorable type of learning. 2. Assessment by self-assessment chart was useful in planning the mathematics teaching learning process because it helps ascertain mathematical attitude & dispositions of students. 3. Through the application of peer-assessment, students had the opportunity of communicating with other students looking back on his/her explaining process, and teachers could obtain basic materials for assessment of students. 4, In case of time management for 'let's play an interesting game', there was natural extension of play made through time-security by prior looking into the method of play-activity, and then, for a remained time, by making children play a new game. 5, I could easily record the activities of students by use of the observation. form, and make use of it as basic data for descriptive assessment. 6, Each kinds of data obtained from the results of assessment was helpful for securing self-observation materials in the process of teaching learning and for their betterment in mathematics subject. However, because they were in the second grade of elementary school and there was an individual difference, some students could not make use of mathematics diary or self-assessment form properly. In case of these students, assessment data would be obtained through interview or observation. And for effective operation of play, its purpose & method and matters that demand special attention when play-acting should be clearly guided. Also, when applying an effective play in addition to play activities in textbook, to lessons, interesting mathematics lessons could be guided.

  • PDF

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution

  • Singh, Manmeet Mahinderjit;Ng, Ping Jie;Ya, Kar Ming;Husin, Mohd Heikal;Malim, Nurul Hashimah Ahamed Hassain
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.559-572
    • /
    • 2017
  • Cyberbullying has been an emerging issue in recent years where research has revealed that users generally spend an increasing amount of time in social networks and forums to keep connected with each other. However, issue arises when cyberbullies are able to reach their victims through these social media platforms. There are different types of cyberbullying and like traditional bullying; it causes victims to feel overly selfconscious, increases their tendency to self-harm and generally affects their mental state negatively. Such situations occur due to security issues such as user anonymity and the lack of content restrictions in some social networks or web forums. In this paper, we highlight the existing solutions, which are Intrusion Prevention System and Intrusion Detection System from a number of researchers. However, even with such solutions, cyberbullying acts still occurs at an alarming rate. As such, we proposed an alternative solution that aims to prevent cyberbullying activities at a younger age, e.g., young children. The application would provide an alternative method to preventing cyberbullying activities among the younger generations in the future.

Digital Watermarking for Copyright Protection of 3-D CAD Design Drawing Based on Vector Data Using Digital Watermarking

  • Kwon, Ki-Ryong;Lee, Suk-Hwan;Park, Seung-Seob;Jeong, Tai-Il
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1596-1606
    • /
    • 2006
  • There has been more increased the development of 3D technique since many 3D contents of 3D graphic model, 3D mobile/computer game, and 3D CAD have been serviced in Web or industry fields. Therefore, the watermarking system is more required to protect the copyright for 3D contents. Currently there has been researched about the watermarking for 3D graphic model of mesh or NURBS. However, watermarking technique based on CAD design drawing leaves something to be desired yet. This paper proposed the watermarking technique for 3D CAD design drawing using Line and Arc components. After drawing out Line and Arc components from designed drawing, we embed the watermark into both the length of Line component and the radius of Arc component. Experimental results verified that the proposed algorithm satisfies the transparency about watermarked drawing and also has the robustness against several attacks by using public CAD tool.

  • PDF

Management Plan for Mobile Contents Bypassing In App Billing Application (모바일 컨텐츠 인앱 결제 우회 애플리케이션에 대한 대처 방안)

  • Lee, Sang-Ho;Shin, Miyea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.21-26
    • /
    • 2015
  • As mobile contents grow up, In App Billing is brisk at applications including mobile contents. But some of users don't pay and use charged content for free to use cheating payment module or hacking through applications. Call this bypass payment. Applications, helping bypass, are Freedom, IAP Cracker, and DNS server suggested by the hacker named Borodin. In case of mobile game, Despite sell a lot of charged content but income is different revenue in sales log with real profits. Because of users using bypass payment application. Management plan to bypass payment are checking OrderID, encrypting public key and verifying receipt.

  • PDF