• Title/Summary/Keyword: Virtual System

Search Result 4,624, Processing Time 0.034 seconds

Information-Based Urban Regeneration for Smart Education Community (스마트 교육 커뮤니티 정보기반 도시재생)

  • Kimm, Woo-Young;Seo, Boong-Kyo
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.12
    • /
    • pp.13-20
    • /
    • 2018
  • This research is to analyze the public cases of information facilities in terms of central circulations in multi level volumes such as atrium or court which provide visual intervention between different spaces and physical connections such as bridges. Hunt Library design balances the understood pre-existing needs with the University's emerging needs to create a forward-thinking learning environment. While clearly a contemporary structure within a traditional context of the NCSU campus, the Hunt Library provides a positive platform for influencing its surroundings. Both technical and programmatic innovations are celebrated as part of the learning experience and provide a versatile and stimulating environment for students. Public library as open spaces connecting to an interactive social domain over communities can provide variety of learning environments, or technology based labs. There are many cases of the public information spaces with dynamic networks where participants can play their roles in physical space as well as in the intellectual stimulation. In the research, new public projects provide typologies of information spaces with user oriented media. The research is to address a creative transition between the reading space and the experimental links of the integration of state-of-the-art technology is highly visible in the building's design. The user-friendly browsing system that replaces the traditional browsing with the virtual shelves classified and archived by their form, is to reduce the storage space of the public library and it is to allow more space for collaborative learning. In addition to the intelligent robot of information storages, innovative features is the large-scale visualization space that supports team experiments to carry out collaborative online works and therefore the public library's various programs is to provide visitors with more efficient participatory environment.

BLE-based Indoor Positioning System design using Neural Network (신경망을 이용한 BLE 기반 실내 측위 시스템 설계)

  • Shin, Kwang-Seong;Lee, Heekwon;Youm, Sungkwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.75-80
    • /
    • 2021
  • Positioning technology is performing important functions in augmented reality, smart factory, and autonomous driving. Among the positioning techniques, the positioning method using beacons has been considered a challenging task due to the deviation of the RSSI value. In this study, the position of a moving object is predicted by training a neural network that takes the RSSI value of the receiver as an input and the distance as the target value. To do this, the measured distance versus RSSI was collected. A neural network was introduced to create synthetic data from the collected actual data. Based on this neural network, the RSSI value versus distance was predicted. The real value of RSSI was obtained as a neural network for generating synthetic data, and based on this value, the coordinates of the object were estimated by learning a neural network that tracks the location of a terminal in a virtual environment.

A Study on the Metaverse: Focused on the Application of News Big Data Service and Case Study (메타버스에 관한 연구: 뉴스 빅데이터 서비스 활용과 사례 연구를 중심으로)

  • Kim, Chang-Sik;Lee, Yunhee;Ahn, Hyunchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.2
    • /
    • pp.85-101
    • /
    • 2021
  • This study aims to gain insight through understanding the Metaverse, which has recently become a hot topic. The study utilizes the methods of case study and News Bigdata Analysis Services. The Metaverse can be defined as a world with no separation between the virtual and real worlds. Currently, the Metaverse is dominated mainly by the MZ generation, but just like smartphones have quickly entered our lives, the Metaverse will soon, too, become a part of our lives. To follow up on this change, all companies, including global companies, are going after the Metaverse. Today, the Metaverse is successfully being used in all types of fields, including gaming, performing arts, business, etc., and its essential technologies include VR/AR/MR/XR and AI. This study intends to help understand the Metaverse through a case analysis of Zepeto, which has 200 million users worldwide. On Zepeto, users can decorate their own avatars, hang out with friends, go to art galleries and performances, and create and sell items. Of these users, 90% are from outside of South Korea, and 80% are teenagers. With most of the users being underage, many legal and social problems also follow. Nevertheless, who will be the first to conquer the new world of the Metaverse will continue to be a big issue. This study also analyzes domestic news articles about the Metaverse by utilizing the BigKinds system. Starting in 1996, the number of articles about the Metaverse each year remains single digit, until in 2020 when the number sharply rises to 86 news. As of June 2021, there are 1,663 articles on the Metaverse. This study suggests that the Metaverse should now be carefully examined and closely followed.

A Technique for Detecting Malicious Java Applet Using Java-Methods Substitution (메서드 치환을 이용한 악성 자바 애플릿 탐지 기법)

  • 이승수;오형근;배병철;고재영;박춘식
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.15-22
    • /
    • 2002
  • Java applet, executed in user's web browsers which is via proxy server on web sever, can approach client files or resources, so it is necessary to secure against malicious java applet. Currently, the previous security countermeasures against malicious java applet use two ways: one is making a filter system to detect malicious java applet hewn in proxy, the other is that establishes another security java virtual machine. However, the first one can not detect unknown malicious java applet, and the other one nay increase loads, because it decides whether there is malicious or not after implementing java applet on proxy server. In this paper, after inserting monitoring function to java applet on proxy server using java-methods substitution and transfer it to user to detect malicious java applet, we propose a technique for detecting malicious java applet that can detect the unknown malicious java applet with reducing loads

A study on the effective method of detecting denial of service attack to protect Guest OS in paravirtualization (반가상화 환경 Guest OS 보호를 위한 효율적인 서비스 거부 공격 탐지 방법에 관한 연구)

  • Shin, Seung-Hun;Jung, Man-Hyun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.659-666
    • /
    • 2012
  • Recently, cloud computing service has become a rising issue in terms of utilizing sources more efficiently and saving costs. However, the service still has some limitations to be popularized because it lacks the verification towards security safety. In particular, the possibility to induce Denial of service is increasing as it is used as Zombie PC with exposure to security weakness of Guest OS's. This paper suggests how cloud system, which is implemented by Xen, detects intrusion caused by Denial of service using hypercall. Through the experiment, the method suggested by K-means and EM shows that two data, collected for 2 mins, 5 mins, 10mins and 20mins each, are distinguished 90% when collected for 2mins and 5mins while collected over 10mins are distinguished 100% successfully.

Design and Development of XR Contents Authoring Framework for IT Convergence Education (융합영상콘텐츠 교육을 위한 XR 콘텐츠저작 프레임워크 설계 및 제작)

  • Leem, Eek-Su
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.633-639
    • /
    • 2020
  • Despite the growing educational demand for the extended reality (XR) convergence content creation for non-IT students, fewer studies have attempted to education material development. In this paper, non-IT students' requirement to create XR convergence contents was analyzed and designed framework system specification. The object-oriented application framework (OOAF) was developed for non-IT students to create XR convergence contents through simple interaction methods such as drag and drop in-game engines. To evaluate the developed framework XR contents development course was operated with 26 industrial design majors sophomore in university. More than 90% of students succeeded in working on prototype XR contents in Oculus Rift. This result will be expected to improve the quality of XR contents creation education for non-IT students and contribute to the growth of the future convergence contents industry.

Design Requirement Analysis and Configuration Proposal of a Vertiport for Domestic Applications of the Urban Air Mobility (도심항공 모빌리티(UAM)의 국내 적용을 위한 수직이착륙장 설계 요구조건 분석 및 형상 제안)

  • Ahn, Byeong-Seon;Hwang, Ho-Yon
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.1
    • /
    • pp.40-51
    • /
    • 2021
  • In this paper, the design requirements was produced by analyzing domestic and foreign regulations of the vertical takeoff and landing site required to operate the urban air mobility (UAM) system in Korea and the size of the take-off and landing pads were defined, and the configuration of vertiport was proposed. First, for the metropolitan area with high population density, pilot locations of the vertical take-off and landing site were selected based on the demonstration routes suggested by the Ministry of Land, Infrastructure and Transport and analyzed the characteristics of each location and determined the number of possible installations of vertiport by measuring each site. After that, variables necessary for the operation of the vertical takeoff and landing area were set, and the hourly, daily, monthly aircraft operating cycle, the number of acceptable people, and efficiency were calculated according to the number of simultaneous operation and the number of stand. Finally, using CATIA, the configurations of the virtual vertiport was created by applying the design requirements.

A study on the design method of tight fit Thorso patterns for adult males using fashion CAD system - Focusing on the sway back somatotype and the bend forward somatotype - (패션 CAD 시스템을 활용한 성인남성의 타이트 핏 토르소원형 설계방법 연구 - 휜체형과 숙인체형을 중심으로 -)

  • Hong, Eun-Hee
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.23 no.4
    • /
    • pp.149-166
    • /
    • 2021
  • This study tried to suggest a drafting method to draft tight fit torso patterns suitable for adult males with a sway back somatotype and a bend forward somatotype by setting and distributing the ease through the completion of the somatic surface pattern using the 3D body surface segment method. It was intended to be presented as a drafting method. As for the research method, the suitability of the somatic surface patterns and the tight fit torso patterns were confirmed by the evaluation of virtual wear, and the patterns were modified and supplemented. The research results are as follows. In the first evaluation of the tight fit torso patterns, the average, for 55 evaluation items, was 3.92 points for the sway back somatotype and 3.89 points for the bend forward somatotype. In the second evaluation, the bend forward somatotype was 4.51 points and the sway back somatotype was 4.62 points. The chest circumference ease amount for the bend forward somatotype and the sway back somatotype are 6.5% (6.8 cm) and 7% (6.8 cm) of the chest circumference, respectively, and the distribution of the front and back ease is the same at 4:6 (2.72 cm:4.08 cm). The waist circumference ease amount is 6.5% (5.8cm) and 6.5% (5.6 cm) of the waist circumference dimensions, and the distribution of the front and backease are 5:5 (1.45 cm: 1.45 cm) and 4:6 (2.24 cm: 3.36 cm), respectively. The completed tight fit torso patterns were converted into institutional formulas and presented as a drafting method.

Thread Block Scheduling for GPGPU based on Fine-Grained Resource Utilization (상세 자원 이용률에 기반한 병렬 가속기용 스레드 블록 스케줄링)

  • Bahn, Hyokyung;Cho, Kyungwoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.49-54
    • /
    • 2022
  • With the recent widespread adoption of general-purpose GPUs (GPGPUs) in cloud systems, maximizing the resource utilization through multitasking in GPGPU has become an important issue. In this article, we show that resource allocation based on the workload classification of computing-bound and memory-bound is not sufficient with respect to resource utilization, and present a new thread block scheduling policy for GPGPU that makes use of fine-grained resource utilizations of each workload. Unlike previous approaches, the proposed policy reduces scheduling overhead by separating profiling and scheduling, and maximizes resource utilizations by co-locating workloads with different bottleneck resources. Through simulations under various virtual machine scenarios, we show that the proposed policy improves the GPGPU throughput by 130.6% on average and up to 161.4%.

Current Status and Challenges of BGP Hijacking Security Threat (BGP 하이재킹 보안 위협 대응 현황 및 과제)

  • Han, Wooyoung;Hong, Yunseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1525-1530
    • /
    • 2022
  • BGP(Border Gateway Protocol) is a routing protocol that is actively used in inter-AS routing on the Internet. However, BGP routing protocol is vulnerable to BGP hijacking attacks that hijack the network by impersonating normal BGP sessions. BGP Hijacking attacks can lead to causing intercept IP traffic or interference with the normal service operation. Recently, BGP hijacking attacks, which have often occurred overseas, have also occurred in Korea. It means threatening the security of the Internet. In this paper, we analyze the overall process of attack through representative attack cases and virtual scenarios of BGP hijacking and based on the results of analyzing the application status of security technology to prevent BGP hijacking attacks by Korea and global major ISPs. It covers the technical proposal of ISPs and autonomous system operators should take to defend against BGP hijacking attacks.