• Title/Summary/Keyword: Real-life Space

Search Result 239, Processing Time 0.021 seconds

Genre Oriented Characteristics of Virtual Reality Programs (가상 리얼리티 프로그램의 장르적 특성)

  • Hong, Sook-Yeong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.202-212
    • /
    • 2010
  • The purpose of this study is at clarifying what the genre oriented characteristics of virtual reality programs are. For this, the tests of 'We Are Married' being broadcasted in 'Sunday, Sunday Night' Part 1 of MBC from episode 1 to 8. As a result of analysis, this program was mixing together virtuality and reality by placing the image of virtual couple's life and presentness of entertainers existing in reality appearing at the studio. Also, it was forming sympathy with users as it satisfies fantasy and sense of reality toward marriage by the entertainer couples showing love and conflict that may happen between real couples after setting various categories of couple types. Also, through the device for the public space to confess private feelings through television, it shows the boundary between public domain and private domain breaking up. Along with this, it has implemented amusement characteristics by inspiring enjoyment of users by a substituted satisfaction through various forms of impressions presented to spouse such as materials, effort, gesture or language, etc. Accordingly, the virtual reality program shows authenticity, fiction and amusement by being mixed together and we can see that such genre oriented characteristics act as important strategy appealing to users based on breakup of boundary and genre oriented ambiguity.

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.

A Study on Enhanced 3PAKE Scheme against Password Guessing Attack in Smart Home Environment (스마트홈 환경에서 패스워드 추측 공격에 안전한 개선된 3PAKE 기법에 대한 연구)

  • Lee, Dae-Hwi;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1471-1481
    • /
    • 2016
  • As concern about IoT is increasing recently, various IoT services are being launched. Smart home is closely related to our daily life by combining IoT with user's residential space. Therefore, if an unauthorized user accesses a device inside a Smart home, it can cause more serious damage to user as it is related with daily lives. For instance executing the command allowing unauthenticated access for the internal locking device can be a real harm to user's property like a home invasion. To prevent this problem, this paper introduces 3PAKE Techniques, which provides authenticated Key exchange through Home gateway using Password-based Authenticated Key Exchange(PAKE).

Influences of the User's Experienced Space Perception on the Flow at Digital Interactive Contents (디지털 상호작용 콘텐츠에서 체험적 공간감이 몰입에 미치는 영향)

  • Yun, Han-Kyung;Song, Bok-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.5 no.4
    • /
    • pp.198-205
    • /
    • 2012
  • This study deals with development of an evaluating tool for flow experience and presence to evaluate interactive digital contents. The tool is able to measure the grade of flow and presence by surveying with their factors which are known to affect flow experience and presence. One of reasons for reducing flow experience and presence in 3D digital contents is that the experience in the virtual world is different from user's prerequisite learning in the real life. The recent interactive contents using physical movement of users as an input is possible to provide unsafe situation to users due to the different experience. The suggested flow measurement tool is able to evaluate presence and flow experience of an interactive 3D contents as well as flow and presence factors are possible to use as a general guideline for all stages of producing interactive 3D digital contents.

Active Facial Tracking for Fatigue Detection (피로 검출을 위한 능동적 얼굴 추적)

  • 박호식;정연숙;손동주;나상동;배철수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.603-607
    • /
    • 2004
  • The vision-based driver fatigue detection is one of the most prospective commercial applications of facial expression recognition technology. The facial feature tracking is the primary technique issue in it. Current facial tracking technology faces three challenges: (1) detection failure of some or all of features due to a variety of lighting conditions and head motions; (2) multiple and non-rigid object tracking and (3) features occlusion when the head is in oblique angles. In this paper, we propose a new active approach. First, the active IR sensor is used to robustly detect pupils under variable lighting conditions. The detected pupils are then used to predict the head motion. Furthermore, face movement is assumed to be locally smooth so that a facial feature can be tracked with a Kalman filter. The simultaneous use of the pupil constraint and the Kalman filtering greatly increases the prediction accuracy for each feature position. Feature detection is accomplished in the Gabor space with respect to the vicinity of predicted location. Local graphs consisting of identified features are extracted and used to capture the spatial relationship among detected features. Finally, a graph-based reliability propagation is proposed to tackle the occlusion problem and verify the tracking results. The experimental results show validity of our active approach to real-life facial tracking under variable lighting conditions, head orientations, and facial expressions.

  • PDF

Implementation of the Smombie (smartphone zombie) VR experience game using Google Cardboard and Bluetooth controller (구글 카드보드와 블루투스 컨트롤러를 이용한 스몸비(스마트폰 좀비) VR 체험 게임)

  • Kim, Ji-hyun;Seo, Mi-hye;Yang, Seon-young;Lee, Bo-hyun;Jin, I-seul;Park, Su e;Park, Jung-kyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.212-215
    • /
    • 2017
  • In this paper, VR game was produced to inform the danger of using smartphone while walking and to raise awareness. In this VR games, you can experience Smombie (smart phone and zombie compound word) like a real situation by using Google card board and Bluetooth controller. Designed as a directions game of everyday material, the user indirectly experiences the dangerous situations that may actually occur in everyday life. In the virtual space, you can see the map on the smartphone, navigate the route, and send text messages using the controller during the game. We will explain how to implement smartphone map and send text message using controller which are the main functions of VR game.

  • PDF

An Improved Split Algorithm for Indexing of Moving Object Trajectories (이동 객체 궤적의 색인을 위한 개선된 분할 알고리즘)

  • Jeon, Hyun-Jun;Park, Ju-Hyun;Park, Hee-Suk;Cho, Woo-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.2
    • /
    • pp.161-168
    • /
    • 2009
  • Recently, use of various position base servicesthat collect position information for moving object and utilize in real life is increasing by the development of wireless network technology. Accordingly, new index structures are required to efficiently retrieve the consecutive positions of moving objects. This paper addresses an improved trajectory split algorithm for the purpose of efficiently supporting spatio-temporal range queries using index structures that use Minimum Bounding Rectangles(MBR) as trajectory approximations. We consider volume of Extended Minimum Bounding Rectangles (EMBR) to be determined by average size of range queries. Also, Use a priority queue to speed up our process. This algorithm gives in general sub-optimal solutions with respect to search space. Our improved trajectory split algorithm is going to derive minimizing volume of EMBRs better than previously proposed split algorithm.

Design and implementation of a connectivity analyzer for the hybrid vehicular network (하이브리드 차량 네트워크를 위한 연결성 분석기의 설계 및 구현)

  • Lee, Junh-Hoon;Kim, Cheol-Min;Kwon, Sang-Cheol
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.3
    • /
    • pp.45-54
    • /
    • 2008
  • This paper designs and Implements a connectivity analyzer for the hybrid vehicular network based on the real-life movement history data achieved from the Taxi telematics system currently in operation, aiming at providing a useful guideline and information to build a telematics network. The simulator traces the location of each vehicle, sets the vehicle type, either gateway or normal, decides whether it can be connected to a mobile gateway, keeps track of status of the vehicle, and calculates the duration of disconnected state. With this analysis considering the transmission range and gateway ratio, we can decide the cost-effective number of mobile gateways having both cellular and ad-hoc network interfaces, and buffer space requirement based on the measured disconnection time and message generation ratio.

  • PDF

Poetic Imagination and Self-Image in Haizi's Poems (하이즈(海子) 시의 시적 상상력과 자아 이미지)

  • Kim, Sujin
    • Cross-Cultural Studies
    • /
    • v.33
    • /
    • pp.33-52
    • /
    • 2013
  • Haizi, who ended his life with suicide on the railroad at the age of 25, is a poet who implemented his unique poetic world alone without belonging to any of the existing Chinese poetry schools in the 1980s. The process that Haizi reveals self-inside through a poetic work is rather to hide self-inside paradoxically, too. Accordingly, even a work of figuring out the real intention, which is hidden in poetic dictions that he selected, will be meaningful. In this sense, this study tried to inquire into the poetic imagination and self-image that were revealed in poetry focusing on "Spring, Haizi of 10 People", which is a work of having his name as topic, with having been written at the time of suicide, among Haizi's many poetic works. In addition, it figured out Haizi's private conscious world through analyzing the poem titled "Facing the sea with spring blossoms", which was created ahead of death same as "Spring, Haizi of 10 People". Thus, the aim was to look back on significance of his death and to broaden the width of understanding about Haizi's poetry. As for Haizi, the death can be regarded as the completion of 'performance,' which is a kind of Haizi's own final art form. Hence, Haizi's suicide needs to be seen from the perspective dubbed the continuity of creation through this performance, not the discontinuance of creation caused by 'intended death' that the poet himself selected. In the wake of pursuing the poetic world of a gifted poet Haizi, who died early, that this study examined, there will be any poet of Korea who is recalled naturally. One poet will be first recalled Yi Sang, who is a poet and a novelist of having been broadly known. Another poet is overlapped Gi Hyeong-do, who had been active as a poet and a journalist of having been dead after living in the similar period to Haizi. A comparative analysis among works by these Korean and Chinese poets has similarity beyond the temporal space. A research on this is thought to have value of being considered a little more deeply and generally hereafter. Still, this study mentioned only possibility of a comparative research on this.

An Extended I-O Modeling Methodology based on FSM (유한상태기계에 기반한 확장된 I-O 모델링 방법론)

  • Oh, Soo-Yeon;Wang, Gi-Nam;Kim, Ki-Hyung;Kim, Kangseok
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.21-30
    • /
    • 2016
  • Recently manufacturing companies have used PLC control programs popularly for their automated production systems. Since the life cycle of production process is not so long, the change of the production lines occur frequently. Most of changes happen with modification of the position information and control process of the equipment. PLC control program is also modified based on the fundamental process. Therefore, to verify new PLC program by configuring virtual space according to real environment is needed. In this paper we show a logical modeling method, based on Timed-FSA useful for sequence control and dead-lock prevention. There is a problem wasting user's labor and time when defining a variety of states in a device. To overcome this problem, we propose an extended I-O model based on existing methods by adding a token concept of Petri Nets. Also we will show the usability of the extended I-O modeling through user study.